Radio-frequency identification technology in academic libraries: literature review

Date03 September 2018
Pages1-4
DOIhttps://doi.org/10.1108/LHTN-04-2018-0026
Published date03 September 2018
AuthorChynna J. Boyd
Subject MatterLibrary & information science,Librarianship/library management,Library technology,Library & information services
Radio-frequency identification technology in
academic libraries: literature review
Chynna J. Boyd
RFID defined and literature review
The definition of emerging technology
is developed by combining the term and
the concept of “emergence” with the
innovative studies involving the definitional
issue of technical emergence. The
definition has five attributes, and those
attributes are a radical novelty, relatively
fast growing, coherence, prominent impact
and uncertainty and ambiguity (Rotolo
et al., 2015). Radio-frequency identification
(RFID) is considered as a new emerging
technology (Barenji et al., 2014). Although
in some developing countries, it is not
considered emerging (Halaweh, 2013).
RFID uses radio waves to transfer
data. It is also an automotive
identification technology that identifies
people and objects. Libraries use RFID
technology to increase the speed and
convenience of its procedures and to
increase the quality of its services. The
processes and devices include, but are not
limited to, charging, discharging,
materials handling and inventory. There
are microchips in the tags that are sealed
onto the materials. The information stored
on the microchips are read using radio
frequency-based technology.
The RFID system has three
components: a reader, tags and a host
computer. There are two types of RFID
tags. The first tag is the active tag, which is
powered by a battery source. The second
tag is the passive tag, which relies on the
reader to transmit power to the tag. The
reader combined with an antenna can read
the information stored on a tag, update its
information and pass the data to the host
computer. The tag combined with a tag
antenna that has a chip or integrated circuit
transmits the identification data to the
reader. The reader takes the data, converts
it and sends it to the host computer (Roy
and Basak, 2011).
Scientific theories about RFID started
formulating from the 1600s to 1800s,
beginning with the study of
electromagnetic energy. By the twentieth
century, Ernst F.W. Alexanderson
demonstrated the first transmission and
generation of radio waves. The
achievement of Alexanderson’s work
produced emergence of a radar. Radar
was significant during the Second World
War. RFID was developed from the
combination of radio broadcast
technology and radar.
During the 1940s and 1950s, the focus
was on the vision from Harry Stockman’s
paper “Communication by Means of
Reflected Power” published in 1948.
Many RFID-related technologies were
explored during this period, but it was not
until the 1970s when organizations,
developers and laboratories started
actively working to advance the
technology. In the 1970s, Los Alamos
Scientific Laboratory started using RFID
for animal and vehicle tracking and
factory automation. However, in the
1980s, RFID technology came into full
implementation, and the largest interest
was in the transportation industry
including toll roads and railroads. The
technology continued to grow from the
1990s until the twenty-first century; with
RFID advancement, people across many
countries have become interested in the
technology and its tracking abilities
(Landt, 2005). Today, its new uses
include, but are not limited to, access
control, human traffic, libraries and
hospitals (Singh and Mahajan, 2014).
Literature review
Libraries are embracing and adapting
to advanced technologies. RFID is one of
the tools being used to improve the
management and governance of libraries
(Nisha, 2018). In the recent past, bar
coding and electromechanical (EM)
technology was used for security of
information materials (Ondieki Makori,
2013). Some institutions still have EM or
EM/RFID (Rabari, 2015).
Rabari (2015) provided an overview of
the Gujarat National Law University’s
(GNLU) library RFID/EM implementation
process. Before implementation, a
review was conducted with institutions
that implemented RFID and/or EM
technology. GNLU use a hybrid RFID/
EM solution because of the drawback of
the RFID tags; the tags were visible and
could be removed, thus breaking the
security system.
The main concern for GNLU was
economic factors, which were the
selection of the RFID/EM product
integration and hardware integration.
They hired five companies along with
Libsys Ltd, Delhi for the project. Libsys
offered their LMS software and
migrated the data. They also assisted
with RFID/EM tagging the products.
The company implemented four types
of hardware and two types of software.
The implemented hardware was RFID
tags, EM strips, EM detection gate and
RFID portable handset. The software
used was SIP2/NCIP interface system
and LS smart software (Rabari, 2015).
According to Rabari (2015),the
advantages of the GNLU’s RFID
implementation process were faster
circulation process; 100 per cent secure
circulation work; proper recording of
books, users and materials; security
detection of materials; stock verification;
locating/searching for books; and a good
image of the library. The disadvantages
were very costly to implement,
maintenance cost, monopoly of supplier
company and activation of RFID/EM in all
books and materials. The author concluded
that evaluation for new systems was
essential to the library.
Nisha (2018) provided an overview of
the implementation process in the defense
science library of the Defence Scientific
Information and Documentation Centre
(DESIDOC), Delhi. Before implementing
RFID technology, DESICO formed a group
of informal experts to conduct a viability
LIBRARY HITECH NEWS Number 7 2018, pp. 1-4, V
CEmerald Publishing Limited, 0741-9058, DOI 10.1108/LHTN-04-2018-0026 1

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT