{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T01:58:21Z","timestamp":1725415101393},"reference-count":31,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T00:00:00Z","timestamp":1297728000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,2,15]]},"abstract":"Purpose<\/jats:title>This paper aims to propose the idea of developing an automatic Radio Frequency Identification (RFID)\u2010based system for library search and to examine the existing literature to determine whether current technology and developed RFID\u2010based systems are helpful for building that. To fully understand its key points, adoptions, risks, and benefits, the fundamentals of radio frequency are to be identified and reviewed. Some applications of radio frequency identification in library systems and various industries are to be briefly discussed and four related cases reviewed.<\/jats:p><\/jats:sec>Design\/methodology\/approach<\/jats:title>The paper identifies key benefits and risks of radio frequency identification through review of library literature and case studies. For this purpose, four cases are reviewed from the entire industry and then key features of those cases are matched with the requirements of the big pictures' RFID\u2010based system to determine the current level of the RFID\u2010based system development.<\/jats:p><\/jats:sec>Findings<\/jats:title>To make library systems functional and successfully operational RFID solutions can be used to reduce operating costs through decreasing the labor costs, enhancing automation, improving tracking and tracing, and preventing the loss of materials under any circumstances.<\/jats:p><\/jats:sec>Originality\/value<\/jats:title>The proposed automated RFID\u2010based system is a novel idea by itself. Owing to the fact that better management of books and materials becomes possible, materials are not lost, theft is avoided, and patrons are served on time and correctly.<\/jats:p><\/jats:sec>","DOI":"10.1108\/02640471111111424","type":"journal-article","created":{"date-parts":[[2011,2,12]],"date-time":"2011-02-12T16:55:55Z","timestamp":1297529755000},"page":"36-51","source":"Crossref","is-referenced-by-count":19,"title":["RFID: the big player in the libraries of the future"],"prefix":"10.1108","volume":"29","author":[{"given":"Yahia","family":"Zare Mehrjerdi","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022021019441547100_b2","unstructured":"Bhuptani, M. and Moradpour, S. (2005), RFID Field Guide: Deploying Radio Frequency Identification Systems, Sun Microsystems\/Prentice\u2010Hall, Upper Saddle River, NJ."},{"key":"key2022021019441547100_b4","unstructured":"Boulard, G. (2005), \u201cRFID: promise or perils?\u201d, State Legislatures Magazine, December, pp. 22\u20104."},{"key":"key2022021019441547100_b5","doi-asserted-by":"crossref","unstructured":"Butters, A. (2007), \u201cRFID systems, standards and privacy within libraries\u201d, The Electronic Library, Vol. 25, pp. 430\u20109.","DOI":"10.1108\/02640470710779844"},{"key":"key2022021019441547100_b1","doi-asserted-by":"crossref","unstructured":"Card Technology Today (2004), \u201cAnother link in the chain\u201d, Card Technology Today, Vol. 16 No. 4, pp. 11\u201012.","DOI":"10.1016\/S0965-2590(04)00083-0"},{"key":"key2022021019441547100_b6","unstructured":"Chachra, V. (2003), \u201cExperiences in implementing the VTLS RFID solution in a multi\u2010vendor environment\u201d, paper presented at World Library and Information Congress: 69th IFLA General Conference and Council, available at: www.ifla.org\/IV\/ifla69\/papers\/132e\u2010Chachra.pdf (accessed 21 March 2005)."},{"key":"key2022021019441547100_b7","unstructured":"Chachra, V. and McPherson, D. (2003), Personal Privacy and Use of RFID Technology in Libraries, VTLS, Blacksburgh, VA, pp. 1\u20107."},{"key":"key2022021019441547100_b8","doi-asserted-by":"crossref","unstructured":"Chao, C.\u2010C., Yang, J.M. and Jen, W. (2007), \u201cDetermining technology trends and forecasts of RFID by a historical review and bibliometric analysis from 1991 to 2005\u201d, Technovation, Vol. 27 No. 5, pp. 268\u201079.","DOI":"10.1016\/j.technovation.2006.09.003"},{"key":"key2022021019441547100_b9","doi-asserted-by":"crossref","unstructured":"Chow, H.K.H., Choy, K.L. and Lee, W.B. (2007), \u201cA dynamic logistics process knowledge\u2010based system \u2013 an RFID multi\u2010agent approach\u201d, Knowledge Based Systems, Vol. 20, pp. 357\u201072.","DOI":"10.1016\/j.knosys.2006.08.004"},{"key":"key2022021019441547100_b10","unstructured":"Collins, J. (2004), \u201cAlien cuts tag price\u201d, RFID Journal, available at: www.rfidjournal.com\/article\/."},{"key":"key2022021019441547100_b12","doi-asserted-by":"crossref","unstructured":"Curran, K. and Porter, M. (2007), \u201cA primer on radio frequency identification for libraries\u201d, Library Hi Tech, Vol. 25 No. 4, pp. 595\u2010611.","DOI":"10.1108\/07378830710840536"},{"key":"key2022021019441547100_b13","unstructured":"Dorman, D. (2003), \u201cRFID poses no problem for patron privacy\u201d, American Libraries, Vol. 36 No. 11, pp. 86\u20107."},{"key":"key2022021019441547100_b14","unstructured":"Ferguson, R.B. (2006), \u201cRFID loses reception: high tag costs are still putting the kibosh on returns on investment\u201d, e\u2010Week, Vol. 23 No. 10, pp. 11\u201012."},{"key":"key2022021019441547100_b15","unstructured":"Gazette (2006), \u201cMore bookstores using RFID\u201d, Gazette, October, available at: www.rfidgazette.org \/libraries (accessed 7 August 2007)."},{"key":"key2022021019441547100_b16","unstructured":"Gilbert, A. (2004), \u201cPatent problems plague RFID\u201d, available at: www.zdnet.com.au\/insight\/."},{"key":"key2022021019441547100_b17","unstructured":"IDTechEx (2006a), \u201cRFID forecasts, players and opportunities 2006\u20102016\u201d, IDTechEx market research, URL."},{"key":"key2022021019441547100_b18","unstructured":"IDTechEx (2006b), \u201cRFID retail case studies\u201d, IDTechEx Case Studies, (URL\/.infrastructure, December 2000)."},{"key":"key2022021019441547100_b19","doi-asserted-by":"crossref","unstructured":"Jones, P., Clarke\u2010Hill, C., Hillier, D., Shears, P. and Comfort, D. (2004), \u201cRadio frequency identification in retailing and privacy and public policy issues\u201d, Management Research News, Vol. 27 Nos 8\/9, pp. 46\u201056.","DOI":"10.1108\/01409170410784563"},{"key":"key2022021019441547100_b20","doi-asserted-by":"crossref","unstructured":"Kern, C. (2004), \u201cRadio\u2010frequency\u2010identification in libraries\u201d, The Electronic Library, Vol. 22 No. 4, pp. 317\u201024.","DOI":"10.1108\/02640470410552947"},{"key":"key2022021019441547100_b21","doi-asserted-by":"crossref","unstructured":"Lee, D. and Park, J. (2008), \u201cRFID\u2010based traceability in the supply chain\u201d, Industrial Management & Data Systems, Vol. 108 No. 6, pp. 713\u201025.","DOI":"10.1108\/02635570810883978"},{"key":"key2022021019441547100_b22","doi-asserted-by":"crossref","unstructured":"Molnar, D. and Wagner, D. (2004), \u201cPrivacy and security in library RFID issues, practices, and architectures\u201d, Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 210\u201019.","DOI":"10.1145\/1030083.1030112"},{"key":"key2022021019441547100_b23","doi-asserted-by":"crossref","unstructured":"Ngai, E.W.T., Suk, F.F.C. and Lo, S.Y.Y. (2007), \u201cDevelopment of an RFID\u2010based Sushi management system: the case of a conveyor belt sushi restaurant\u201d, International Journal of Production Control.","DOI":"10.1016\/j.ijpe.2007.05.011"},{"key":"key2022021019441547100_b24","doi-asserted-by":"crossref","unstructured":"Patil, A., Munson, J., Wood, D. and Cole, A. (2008), \u201cBluebot: asset tracking via robotic location crawling\u201d, Computer Communications, Vol. 31, pp. 1067\u201077.","DOI":"10.1016\/j.comcom.2008.01.041"},{"key":"key2022021019441547100_b25","doi-asserted-by":"crossref","unstructured":"Potter, B. (2005), \u201cRFID: misunderstood or untrustworthy?\u201d, Network Security, April, pp. 17\u201018.","DOI":"10.1016\/S1353-4858(05)70227-0"},{"key":"key2022021019441547100_b26","doi-asserted-by":"crossref","unstructured":"Smith, A. (2005), \u201cExploring radio frequency identification technology and its impact on business\u201d, Information Management & Computer Security, Vol. 13 No. 1, pp. 16\u201028.","DOI":"10.1108\/09685220510582647"},{"key":"key2022021019441547100_b27","doi-asserted-by":"crossref","unstructured":"Spekman, R. and Sweeny, P. (2006), \u201cRFID: from concept to implementation\u201d, International Journal of Physical Distribution & Logistics Management, Vol. 36 No. 10, pp. 736\u201054.","DOI":"10.1108\/09600030610714571"},{"key":"key2022021019441547100_b28","unstructured":"Tien, L. (2005), \u201cT08 \u2026 RFID and privacy: potential and perils\u201d, program presented at: Michigan Library Association Annual Conference, Grand Rapids, MI, 25\u201028 October."},{"key":"key2022021019441547100_b29","unstructured":"Wray, G. (2006), \u201cTurning into radio frequency identification (RFID)\u201d, Cognotes, Midwinter Meeting Highlights, p. 10."},{"key":"key2022021019441547100_b30","doi-asserted-by":"crossref","unstructured":"Wyld, D. (2006), \u201cRFID 101: the next big thing for management\u201d, Management Research News, Vol. 29 No. 4, pp. 154\u201073.","DOI":"10.1108\/01409170610665022"},{"key":"key2022021019441547100_b31","doi-asserted-by":"crossref","unstructured":"Yu, S.\u2010C. (2007), \u201cRFID implementation and benefits in libraries\u201d, The Electronic Library, Vol. 25 No. 1, pp. 54\u201064.","DOI":"10.1108\/02640470710729119"},{"key":"key2022021019441547100_frg1","unstructured":"Boss, R. (2004), \u201cRFID technology for libraries\u201d, Tech Notes, available at: www.ala.org\/ala\/pla\/plapubs\/technotes\/rfidtechnology.cfm (accessed 7 August 2007)."},{"key":"key2022021019441547100_frg2","unstructured":"Collins, J. (2006), \u201cReading books reduces out\u2010of\u2010stocks\u201d, RFID Journal, available at: www.rfidjournal.com\/article\/ articleview\/2696\/."}],"container-title":["The Electronic Library"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02640471111111424","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02640471111111424\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02640471111111424\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T19:46:13Z","timestamp":1644522373000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02640471111111424\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2,15]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,2,15]]}},"alternative-id":["10.1108\/02640471111111424"],"URL":"https:\/\/doi.org\/10.1108\/02640471111111424","relation":{},"ISSN":["0264-0473"],"issn-type":[{"value":"0264-0473","type":"print"}],"subject":[],"published":{"date-parts":[[2011,2,15]]}}}