Dr. Vinod Chachra Chairman, NISO Working Group on Library Applications of RFID CEO, VTLS Inc. A Report on NISOs work on RFID Standards in Libraries ALA.

Slides:



Advertisements
Similar presentations
John Espley and Robert Pillow ALA New Orleans 26 June 2011 The RDA Sandbox and RDA Implementation Scenario One.
Advertisements

An Overview of the ISO RFID Data Protocol & Library Applications
© 2008 EBSCO Information Services SUSHI, COUNTER and ERM Systems An Update on Usage Standards Ressources électroniques dans les bibliothèques électroniques.
The Business Case for RFID in Retail: It Works! BookExpo America June 2, 2007.
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
The creation of "Yaolan.com" A Site for Pre-natal and Parenting Education in Chinese by James Caldwell DAE Interactive Marketing a Web Connection Company.
Servicekoncept LM Information Delivery and EBL co-operation LM and EBL co-operation since April 2011 Local awareness Local support LibNet- integration.
RFID IN UNIVERSITY OF JAMMU RFID is used in libraries primarily to automate the book handling process including checkout, inventory maintenance, and check-in.
The following 10 questions test your knowledge of desired configuration management in Configuration Manager Configuration Manager Desired Configuration.
Lectures on File Management
Auditing Computer Systems
02/12/00 E-Business Architecture
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Challenges for the DL and the Standards to solve them Alan Hopkinson Technical Manager (Library Systems) Learning Resources Middlesex University.
IMS1805 Systems Analysis Topic 1(c): Analysis and Information Systems.
Tuesday 13 November The QEII Conference Centre, Westminster, London SPONSORED BY SUPPORTED BYMEDIA SPONSORS PRESENTED BY Standards and Interoperability.
1 HTML’s Transition to XHTML. 2 XHTML is the next evolution of HTML Extensible HTML eXtensible based on XML (extensible markup language) XML like HTML.
CORE 2: Information systems and Databases HYPERTEXT/ HYPERMEDIA.
ASPEC Internal Auditor Training Version
Release 4 of the COUNTER Code of Practice for e- Resources and new usage- based measures of impact Peter Shepherd COUNTER May 2014.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
RFID What is RFID? The Georgetown Experience Technical Considerations
LMS/RFID (Dis)integration Why Standards Matter Mick Fortune.
RFID and LMS: improving interoperability Mick Fortune, 2CQR.
Chapter 10: Authentication Guide to Computer Network Security.
Be careful, a spy is following you!. 2 Outline – Overview Introduction - What is RFID ? Radio frequency spectrum How does RFID work ? Technical contraints.
Business-to-Business Markets: How and Why Organizations Buy.
Database Design - Lecture 1
The physical parts of a computer are called hardware.
1 ANSI Conference on U.S. Leadership in ISO and IEC Presented by Mr. Steven P. Cornish Director, International Policy American National Standards Institute.
Functions of a Database Management System
Automation and Related Standards; Metadata Dr. Bilal IS 582 Spring 2006.
Radio Frequency Identification The next thing…. Some definitions Self service –Patrons checking material in and / or out themselves either using barcode.
A C JOSHI LIBRARY A C Joshi Library is considered to be one of the best libraries of India: Annual budget approx 5 Crores Annual budget approx 5 Crores.
Vinod Chachra, PhD Chairman, NISO Working Group on RFID in Libraries CEO, VTLS Inc. A Progress Report on NISO’s Working Group on RFID ALA Washington DC,
ETICS2 All Hands Meeting VEGA GmbH INFSOM-RI Uwe Mueller-Wilm Palermo, Oct ETICS Service Management Framework Business Objectives and “Best.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Concepts and phrases From ODLIS (Online Dictionary of Library and Information Science)
Transparent to the User: User-Initiated and Mediated Resource Sharing Services Mary E. Jackson Product Manager, Resource Sharing Northwest ILL & Resource.
1 What’s Next for Financial Management Line of Business (FMLoB)? AGA/GWSCPA 6 th Annual Conference Dianne Copeland, Director, FSIO May 8, 2007.
Robert Pillow, VTLS Inc. How Will RDA Impact Your System? A Forum of Vendors Discussing Implementation Plans Association for Library Collections & Technical.
1 CS 502: Computing Methods for Digital Libraries Lecture 19 Interoperability Z39.50.
CBSOR,Indian Statistical Institute 30th March 07, ISI,Kokata 1 Digital Repository support for Consortium Dr. Devika P. Madalli Documentation Research &
Ajh January 2007 CCSDS “Books” Adrian J. Hooke CMC Meeting, Colorado Springs 26 January 2007.
Database Environment Chapter 2. Data Independence Sometimes the way data are physically organized depends on the requirements of the application. Result:
The physical parts of a computer are called hardware.
Chapter 1 An Introduction to Information Systems
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
4.18 Preliminary demonstration of circulation-related enhancements and bug fixes Sponsored by the Pioneer Consortium with features sponsored by SCLS.
What’s New in Destiny 11.0 April 9, Follett’s Destiny Team Don Rokusek Program Director Julie Krater Product Manager Julie Krater Product Manager.
A SSOCIATION OF R ESEARCH L IBRARIES Intra-Consortium Patron Online Borrowing (ICBOP) An Overview of Options and the Standards that Will Make.
HIPAA Summit Practical Approaches to Sticky Payer Issues April 26, 2002 Bob Perlitz, AVP, HIPAA Compliance Officer.
Integrated ISO ILL for staff users Borrowing requests – part one Yoel Kortick 2007.
The ___ is a global network of computer networks Internet.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Integrated ISO ILL for staff users Borrowing requests – part two Yoel Kortick 2007.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Doc.: IEEE Submission March 2009 George Cavage, iControl Inc.Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Selection (cont’d) Relevant Standards Dr. Dania Bilal IS 582 Spring 2008.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Database Principles: Fundamentals of Design, Implementation, and Management Chapter 1 The Database Approach.
Device Security in Cognitive Radio
ISO Global Relevance Case ISO/TC 23/SC 3 & ISO
SIC & NAICS Codes Finding the Codes
Radio Frequency Identification (RFID)
New Features in Fulfillment
Database Management System (DBMS)
Presentation transcript:

Dr. Vinod Chachra Chairman, NISO Working Group on Library Applications of RFID CEO, VTLS Inc. A Report on NISOs work on RFID Standards in Libraries ALA Meeting, San Antonio, Jan 2006

Visionary Technology in Library Solutions VTLS Products MainVTLSOther New Product ProductsVTLS Products Related to Virtua: 1. FRBR 2. URL Checker 3. SRU/SRW 4. Union Catalogs and Consortium Databases 5. Aqua Browser and other partner products ERM System

Visionary Technology in Library Solutions VTLS is the first spin-off corporation from Virginia Tech VTLS does business in 36 countries VTLS has been working with RFID solutions for libraries for over eight years with many customers VTLS RFID library management software is now RFID hardware and tag supplier independent.

Visionary Technology in Library Solutions Goals of NISO Working Group Identify specific NISO activities or standards that would make the application of RFID technology most effective for its community Identify related standards work where NISO might partner Identify points where RFID issues could be integrated within other NISO standards work

Visionary Technology in Library Solutions NISO Working Group Following types of organizations are participating in the working group: 1. RFID hardware manufacturers 2. RFID solution providers (software and integration) 3. RFID Library users 4. Book jobbers/ book processors 5. Other related organizations

Visionary Technology in Library Solutions Focus of NISO Working Group RFID solutions run at several frequencies – Low – from 125KHz to 134KHz High – 13.56MHz Ultra High – MHz Micro Wave – 2.45 GHz NISOs work is limited to Tags used in libraries – that is, tags operating at MHz

Visionary Technology in Library Solutions Focus of NISO Working Group Four issues of importance were identified: 1. Privacy Issues and concerns 2. Support of functional capabilities 3. Performance efficiency 4. Cost considerations (total cost of ownership) Items 2, 3 and 4 are linked and interdependent.

Visionary Technology in Library Solutions First of Two Objectives Interoperability (from Whatis.com) Interoperability (pronounced IHN-tuhr-AHP-uhr-uh-BIHL-ih-tee) is the ability of a system or a product to work with other systems or products without special effort on the part of the customer. Interoperability becomes a quality of increasing importance for information technology products as the concept that "The network is the computer" becomes a reality. For this reason, the term is widely used in product marketing descriptions.

Visionary Technology in Library Solutions First of Two Objectives How is interoperability achieved? (whatis.com) Products achieve interoperability with other products using either or both of two approaches: By adhering to published interface standardsinterface By making use of a "broker" of services that can convert one product's interface into another product's interface "on the fly. The first option is preferred.

Visionary Technology in Library Solutions First of Two Objectives Interoperability 1.For RFID tags: a.A tag from one library used in another (ILL) b.Tags from different suppliers used in same library c.Tags placed in materials by book vendors usable by library 2.For RFID Hardware: a.Hardware from one vendor reads tags from another. b.Security gates from one vendor reads tags from another c.Sortation systems can handle tags from multiple sources d.Secure data from one library not modified by another 3.Interoperability over time from same supplier

Visionary Technology in Library Solutions Second of Two Objectives Isolation More specifically, Vertical Application Isolation We do not want CDs purchased at a store to trigger library security gates and library books to set off alarms at grocery stores. Application Family Identifiers (AFI) may be useful here

Visionary Technology in Library Solutions Approach taken by WG Examine existing standards; Adopt what can be adopted Examine existing data models Address the four issues previously mentioned keeping the objectives in mind Decide next step(s) if any.

Visionary Technology in Library Solutions Applicable Standards ISO/IEC 15511: 2003 Information and Documentation – International Standard Identifier for Libraries and Related Organisations (ISIL). ISO/IEC 15961: 2004 Information Technology – Radio Frequency Identification (RFID) for Item Management – Data Protocol: Application Interface. ISO/IEC 15962: 2004 Information Technology – Radio Frequency Identification (RFID) for Item Management – Data Protocol: Data Encoding Rules and Logical Memory Functions. ISO/IEC 18000: 2004 Information Technology AIDC Techniques – RFID for Item Management – Air Interface: Part 3 – Parameters for Air Interface Communications at 13.56MHz. ANSI/NISO Z39.83 – 2002 Circulation Interchange. Part 1: Protocol (NCIP) Part 2: Protocol Implementation

Visionary Technology in Library Solutions ISO Standards Part 1 – Generic Parameters for the Air Interface for Globally Accepted Frequencies Part 2 – Parameters for Air Interface Communications below 135 kHz Part 3 – Parameters for Air Interface Communications at MHz Part 4 – Parameters for Air Interface Communications at 2.45 GHz Part 5 – Parameters for Air Interface Communications at 5.8 GHz (Withdrawn) Part 6 – Parameters for Air Interface Communications at 860 to 930 MHz Part 7 – Parameters for Air Interface Communications at 433 MHz

Visionary Technology in Library Solutions Scope of ISO The scope of the ISO standard is to provide Physical Layer, Collision management System and Protocol Values for RFID Systems for Item Identification operating at MHz in accordance with the requirements of ISO The scope of the ISO standard is to provide Physical Layer, Collision management System and Protocol Values for RFID Systems for Item Identification operating at MHz in accordance with the requirements of ISO Some library vendors say they are ISO or ISO compliant instead of the more specific ISO compliant, but they mean the same thing.

Visionary Technology in Library Solutions ISO The ISO specification has three main parts: Physical characteristics Signal Interface and Transmission Protocol It holds the promise of interoperability (at the technical level as mentioned by Alastair McArthur, TagSys) among different suppliers of RFID solutions ISO is not to be confused with ISO which is used for RFID for Item Management - Unique Identification of RF Tag

Visionary Technology in Library Solutions Privacy Concerns Proper caution and concern raised by some privacy advocates Proper caution and concern raised by some privacy advocates Exaggerated concerns raised by some librarians Exaggerated concerns raised by some librarians Issue is very sensitive for it can Issue is very sensitive for it can -- potentially cause privacy problems and/or -- possibly derail or slow down RFID implementations and/or -- add to the implementation costs Organizations like BISG, EFF and American Library Association are providing leadership in this area. Organizations like BISG, EFF and American Library Association are providing leadership in this area.

Visionary Technology in Library Solutions Book Industry Study Group (BISG) RFID Privacy Principles (This is a direct quote from the BISG web site) All businesses, organizations, libraries, educational institutions and non- profits that buy, sell, loan, or otherwise make available books and other content to the public utilizing RFID technologies shall: 1) Implement and enforce an up-to-date organizational privacy policy that gives notice and full disclosure as to the use, terms of use, and any change in the terms of use for data collected via new technologies and processes, including RFID. 2) Ensure that no personal information is recorded on RFID tags which, however, may contain a variety of transactional data.

Visionary Technology in Library Solutions Book Industry Study Group (BISG) 3) Protect data by reasonable security safeguards against interpretation by any unauthorized third party. 4) Comply with relevant federal, state, and local laws as well as industry best practices and policies. 5) Ensure that the four principles outlined above must be verifiable by an independent audit. This policy has been developed and released by the Book Industry Study Group in cooperation with the American Library Association (ALA) Office of Information Technology and the Office for Intellectual Freedom, as well as the National Information Standards Organization (NISO)

Visionary Technology in Library Solutions Potential exposure from ILS In my opinion there is potentially greater exposure from ILS systems than from RFID systems (see white paper Personal Privacy and Use of RFID Technology in Libraries at This exposure comes when circulation links between book and patron are not erased in order to a. gather library statistics b. record unpaid fines c. provide value added services c. provide value added services d. support recovery functions

Visionary Technology in Library Solutions RFID function related concerns Functions supported by RFID systems in libraries Self Checkouts including bulk checkoutsSelf Checkouts including bulk checkouts Checkins and book dropsCheckins and book drops Security functions (EAS Gates)Security functions (EAS Gates) Sortation functionsSortation functions Inventory functionsInventory functions So what data should be placed on the tag?

Visionary Technology in Library Solutions Other concerns How much data should be placed on the RFID tags? There are two schools of thought As little as possible (just an ID) 2. More in support of efficiency & performance - security data - sorting and shelving data - last use data for weeding and inventory - book title for finding lost books or for checkouts 3. The more the data the slower the tag read!

Visionary Technology in Library Solutions The Danish Data Model It is an RFID data model for libraries. It deals only with materials and not with patron identification. The data model has four parts: 1. Data elements 2. Values and range 3. Encoding and 4. Physical mapping. Click here to read the model

Visionary Technology in Library Solutions Danish Model - Encoding Original Recommendation: The encoding of RFID tags is a delicate job. The space available in a tag is still rather limited for the cost conscious buyer and vendor. …. Coding will with a few exceptions be 8 bit coding using ISO (latin 1) Final Recommendation: The working group has had long discussions on whether to choose ISO or UTF-8. The conclusion … UTF-8

Visionary Technology in Library Solutions Danish Model – Data Elements 1.Metadata elements 2.Item data elements 3.Library data elements 4.Application data elements 5.Supplier data elements A. Mandatory Data Block Example: Version, Type of usage, Number of parts in item, part number, primary ID, CRC, Country, Owning library code B. Structured Extension Data Block C. Unstructured Extension Data Block

Visionary Technology in Library Solutions Danish Model – Security 1.Using Application Family Identifier (AFI) a.Need two identifiers b.One for checked in items and another for checked out. c.This method is common to ISO tags. 2.Using non-AFI based methods a.EAS bit method 1.Records a single bit on tag 2.Detection system checks code 3.If code indicates checked in alarm goes off b.Other methods 3.Using either/both methods automatically means no interoperability

Visionary Technology in Library Solutions NISO WG and the Danish Model Copy of the data model is available on the internet NISO working group is now studying the data model to see if –The model meets the needs of USA RFID applications –The models meets the needs of USA applications with some modifications –A new model will have to be developed to meet our needs. Based on the outcome of the study a course of action for the future will be defined. The timetable for this is approximately six months – ending in April 2006.

Visionary Technology in Library Solutions Thanks Happy to take questions