Aside from the bucket of benefits which can be obtained from RFID, owners also tend to peek on the disadvantages of using radio frequency identification technology.
Disadvantages Reduction of staff duties With the automation of many staff duties, it is possible that a reduction in staff may follow. In larger libraries, it would be necessary to have more than one of these stations.
However, the price increases considerably when it is combined with conveyor belts and sorting system. Finally, all of these components need to be able to communicate with the ILS. To do this, the communication gateway needs to get information from a number of readers, exchange it with the circulation database, the automated library system, and the transaction database.
This total cost does not include the cost of staff time to actually add the tags to the books, the rental of the programmer for the tags, or carpentry and electrical costs that arise from installation of the equipment. Top Susceptibility of tags Since the RFID tags work because of radio waves, blocking these radio waves stops the entire system from working efficiently.
Unfortunately, this is easily accomplished by wrapping the tag in aluminum foil. Metallic ink on book covers can also affect the transmission of the radio waves. Tags can also be susceptible to removal.
Since most tags are fixed to the inside of the back Rfid advantages and disadvantages, those who desire, could remove the tag.
Tags can be inserted into the spines of the books, however not all tags are so flexible, and this does not address the issue of tags on CDs or DVDs. Top Big brother and invasion of patron privacy Undoubtedly, this is the greatest disadvantage of RFID technology use in libraries — is it possible to track patrons, items, and information outside of the library?
If it is possible, will patrons stop using the library? According to Richard W. Boss, invasion of privacy at this level is not possible, although he concedes that even misconceptions have significant consequences.
In his report to the PLA he address concerns about invasion of privacy by pointing out that the tags on the books contain no patron information, and the link between the patron and the item is maintained only in the secure library system and that this link is broken as soon as the book is returned.
Boss also points out that RFID tags used in libraries can only be read at a distance of a few feet. In their October paper, Molnar and Wagner identify security gaps in the currently used RFID systems in libraries as well as identify how it would be possible for outside sources to track patrons and hotlist books.
This is the greatest security risk.
They identify four aspects of RFID tags that are vulnerable, and how an adversary may take advantage of these vulnerabilities to gain information about a person. This could be information about the library that owns the book, and so it is possible for a person with the ability to read the tag can find out this information and determine the general origin of the person carrying the book.
It is also possible for adversaries, those with RFID readers that use them for unauthorized data-collection, to create a hotlisting of a book. In this case, the actual book is the item of relevance. Molnar and Wagner This information is embedded at the time of manufacture and after learning the collision-avoidance protocol, and adversary can possibly collect more data from the tag.
It is possible that a vandal could change this bit to read not checked out, and lock the bit in this position. After locking the bit, the vandal could protect it with a password of its own.
If this object were ever to enter into a library, the bit would not be able to be modified because of the password, and the tag would have to be replaced.
The final architecture that Molnar and Wagner identified as weak from a security standpoint is the management of tag passwords.
These passwords are used in the library for the tag and reader to communicate, and can be intercepted by an eavesdropper.Radio frequency identification is an automatic ID system.
Like a barcode or the magnetic strip on a credit card, an RFID tag provides a unique identification code that can be read by a scanning device. RFID use can be a controversial topic when libraries choose to convert their collections to be able to take advantage of the technology.
There is little doubt that RFID will become more ubiquitous in the future, however, a library should weigh the advantages and disadvantages.
The Advantages & Disadvantages of Implantable RFID Tags by Milton Kazmeyer Radio-Frequency Identification is a technology that encodes data on microchips tagged to objects, so that the data can be retrieved at any time via radio waves. Choose from passive, semi-passive, or active radio frequency identification (RFID) technologies to find the best configuration for your next project.
There are 3 main types of RFID, and each comes with its own set of advantages and disadvantages. RFID is an acronym for Radio Frequency Identification.
This technology uses radio frequencies for the purpose of identification and tracking of assets, animals, and traffic. The following is a brief look at the basic architecture of this technology. Lack of standardization, high costs of execution, technology deployment hazards, and the removal of unskilled labour are all contributors currently protecting against the adoption of new RFID technologies in the engineering industry.