Skip to main content Accessibility help
×
Hostname: page-component-8448b6f56d-c4f8m Total loading time: 0 Render date: 2024-04-23T08:21:00.485Z Has data issue: false hasContentIssue false

12 - Making the most of RFID: a case study

Published online by Cambridge University Press:  08 June 2018

Get access

Summary

This chapter presents an example of a long-running RFID-based programme, designed to modernize a large public library service in the UK.

In the beginning …

When the library service of Essex County Council in the UK first became interested in RFID in the mid 1990s, it was for a very pragmatic reason. One of its largest libraries – Colchester, in the north-east of the county – had a radio frequency (RF) by-pass security system that had been installed in 1982. Such systems commonly work on one of two frequencies – 10.5 MHz and 8.2MHz – and at the time of the installation at Colchester, there were no regulations about which one should be used by libraries. Consequently, the 8.2 MHz frequency was chosen, as this was different from the 10.5 MHz used by the University of Essex (located nearby) so as to avoid causing problems for users of the two libraries. As the ‘by-pass’ element of the name suggests, the tags used in these systems remain permanently live and so taking a tagged item into an environment where the same frequency is used causes it to trigger the system's alarm.

A few years later, however, a protocol was devised to regularize the use of these two frequencies, so as to enable differentiation between use in the library environment and in retail. Unfortunately for Essex, the frequency allocated for retail use was the 8.2 MHz used in Colchester library, and as a result many of its customers found themselves setting off security system alarms in shops, simply by having a library book with them.

This was clearly a major public relations problem, with library users understandably concerned (at the very least) about being subjected to embarrassing and unnecessary searches and interrogations by retail security staff who were simply doing their job. The fact that this situation was nobody's fault – least of all that of the library service – was of little comfort or use in responding to the many resulting complaints.

Type
Chapter
Information
Publisher: Facet
Print publication year: 2009

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×