background image
while using their headphones and smart cards.The centre's staff must take time to ensure
that the convenience offered by this new technology does not adversely affect the visi-
tor's overall enjoyment of the experience.
Scenario III Library
A library is looking for ways to offer better customer service and to improve its secu-
rity system while keeping staff numbers at the same level.The library decides to use
RFID tags, liking their anti-theft features and new principles of check-in and check-out.
Typical library processes where the technology can be applied are considered:
- Check in
- Check out
- Security (anti-theft)
- Inventory management, including assets management
For the initiation of the project the management of the library decides to cover the
first three of these, with a view to incorporating inventory management in the future.
The library has to choose between a number of available systems.This process is easier
now than in the past, as the library management can consult peers.The experience of
other libraries shows that tagging of similarly sized collections can be achieved without a
need for additional employees.
The library organises its new system as follows:
1. A sensor is located at the entrance/exit. It registers immediately any books which
are not checked out. If an attempt is made to steal a book, the information system
reports immediately details of the offending item, as the tags combine security bits
with identification data.
2. A staff service station is placed at the lending desk. It is connected to the library
database which is used for book check-outs and returns.This station is used by visi-
tors of the library who are not yet familiar with the new system. In the long-term it
will be considered whether this workplace should be used only for these purposes,
or whether the staff member will have to take on additional duties. Such a staff
service station is also extensively used when applying RFID tags to books.
3. There is also a self-check-out station for visitors who would prefer to use the new
system.This consists of a computer terminal with a touchscreen and an RFID read-
er which can read the visitors' ID cards and check their books out. A facility to
print receipts is also included.
4. Finally, the staff service station is used for the initial tagging.
The library management also have to decide on procedures for work in the new envi-
ronment. For example, a procedure for placing RFID tag on a library book which
already has a barcode might be organised as follows:
1. Put tag in tag programmer machine;
2. Read barcode label with scanner;
3. Verify correct barcode using the computer system;
4. Remove backing from tag and put tag in book;
5. Put cover label over tag.
Smart Labels
and Smart Tags
87