In medicine, prevention is better than cure, and also in libraries good
Preventive measures, particularly of storage and security should be on alert so as to prevent damage and missing books. The art of prevention is as old as human civilization. Since the innovation of writing, mankind has been faced with the problem of prevention. Documents have been existed in one form or the other and it is natural for man to attempt to securing, managing and preventing them from deterioration. Edoka (2000), say that “library emerged when the need arose to safeguard, exploit and utilize records of civilization”.
Library books are stolen and mutilated due to inadequate library
Security, financial constraint and selfishness on the part of library users.
It was also discovered that various methods were adopted for stealing and
Mutilating of the library books which include: tearing of book page(s) off, removing of the book jacket cover, hiding of books under their clothes and their pockets. Some recommendations were proffered to eradicate theft and mutilation in public libraries.
Our project is an application of Radio Frequency Identification (RFID) technology, which consists of RFID readers and smart tags stuck in the books, then the reader sends radio waves to smart tags and receives it and each tag has a specific code connected with a specific book. Our project aims to facilitate the management of libraries, saves time and reduces effort for both of the librarian and the user. We did a self-check in/out system provided by database of the books in the library, and then we made a security system to prevent stealing books. RFID technology has
Many applications and can be used for automation of many systems. Also, ...
... middle of paper ...
... to work. You can even make friends for a lifetime as everyone is emotionally bonded to each other. While working in a team you will never be alone, you will always have some or the other person to suggest you good things. Suggestions and advice can help you in generating new ideas and bring out the creativity in you. With many people handling a single project and doing the assigned work properly, the overall work speed increases and your team can complete the project well within the given time frame.
Resources:-
-Usman, P. (2013). SECURITY MANAGEMENT FOR PREVENTION OF BOOK THEFTS IN UNIVERSITY LIBRARIES. A CASE STUDY OF BENUE STATE UNIVERSITY LIBRARY, NIGERIA (Ed.). Minna, Niger State, Nigeria: federal university of technology.
- MWAKIDEU, C. (2010). T.E.A.M. - TOGETHER EVERYONE ACHIEVES MORE (Ed.). Columbus: ANDREA SCHMIDT ANDREA SCHMIDT ANDREA SCHMIDT .
Although there are many technologies in tracking, for this research I will be discussing Radio Frequency Identification (RFID) and Universal Product Code. There are major differences and comparisons between these two technologies which define both. Though both of these technologies are widely used within numerous industries, they are used differently since they are so different. For example, the government (United States Postal System), military, private companies (such as Wal-Mart, Target and other companies), the healthcare system, and other industries all use these types of tracking technologies. Though some industries specifically use just one technology or though many use both. In my research, I will define both technologies, discuss the history, how they are used and what the future is of both products.
On 5 October 2009, computer equipment from a network data closet was stolen from BCBST. The items stolen were 57 unencrypted hard drives which contained over 300,000 video recording and over one million audio recordings. According to Whitman & Mattord (2010), confidentiality, integrity, and availability makes up the C.I.A triangle which is the basis of Committee on National Security model for information security, an industrial standard, (Whitman & Mattord, 2010). Confidentiality can be a synonym for encryption but also means only the people with the correct permission can access the information. One of the major security issue is the hard drives were not encrypted. The hard drives should be encrypted to prevent people from reading the information the computer. Software can be purchased which will encrypt files on hard drive with such as Folder Lock, SensiGuard, Secure IT, and more. There are open source encrypting software which are free for use which could have been used. If the hard drives were not needed, the data should hav...
In her article “Censorship”, author Bobbi Swiderek, raises awareness of the issue of censorship in schools or to be more specific the banning of books in school libraries without proper reason and dealing with the irrational fears that seem to plague parents and officials when it comes to certain books. Using quotes from other authors, Swiderek makes a number of conclusions to why the banning of books actually happens and gives am in depth analysis of the subject given.
Books are worthless in there society and it is taking up to much space and it is wasting to much resources to make them. If you are caught with, a book they would go to your house
Working in a team has obviously loads of advantages but it also has some disadvantages. The main one could be time consumption. If people can work better in a team, they can also be more easily distracted and can lead to a waste of time. We all have different personalities and we have more or less affinity with other people and strong personalities might lead to a conflict. Also, team work requires more organisation, structure and monitoring. Some individuals might feel unimportant in a team and in a different scenario some people might take advantage such as working less.
The complexity of teamwork is more than what Merriam-Webster defines teamwork as “the work done by people who work together to do something”. Teamwork involves good practices and strategies utilized in a cohesive manner to get to a common goal. Therefore a clear definition of a team must first be established in order to further understand the complexity of the teamwork process. A team is a collection of two or more people with either similar or different disciplines dedicated to the pursuit of a specific goal (Gilbert, 2004). Hence, the determinant in the level of participation from team members for a functioning team is a joint commitment (Gilbert, 2004).
4. Baldassarro, Wolf R. "Banned Books Awareness." Banned Books Awareness. N.p., 2011. Web. 23 Jan. 2014. .
Radio frequency identification (RFID) is a computerized ID innovation that uses radio recurrence waves to exchange information between an onlooker and things that have RFID gadgets, or tags, joined. The tags hold a microchip and receiving wire, and work at universally distinguished standard frequencies. Barcodes are much smaller, lighter and easier than RFID but RFID offers significant advantages. One major advantage of RFID is that the innovation doesn't oblige any observable pathway the tags could be perused as long as they are inside the range of the spectator, whereas in barcodes in order to read the barcode the barcode scanner should close around 10-15 fts. In RFID data, for example, part and serial numbers, assembling dates and support history is put away on the tags and catches which help in maintenance of equipments. RFID technology as high value for asset management and inventory systems
Working in teams provides an opportunity for individuals to come together and establish a rapport towards others within a group. Teamwork is classified as people with different strengths and skills who work together to achieve a common goal. When a team works well, specific objectives are fulfilled and satisfied. Teamwork plays a crucial role in implementing and fulfilling a common goal in a team project. Each member plays a role and takes on different responsibilities combined together. In different stages of teamwork, conflicts and arguments may occur for as members have different standpoints which need to be harmonized within the team. The key to having an effective teamwork is to explore each member's unique abilities to motivate them.
Teams have been around for many years. It is vital for members who are a part of any team to work together so that their labor is not in vain. A major advantage for working cohesively as teams is greater output and interpersonal skills. The drawback of not working in uniformity can lead to project delays and time constraints. Organizations create teams with the purpose of fulfilling certain obligations and acquiring business success. Roming (1996) states that togetherness and dependability means that members within the team assist each other and the team. Which in turn, yields a better-quality product.
Ding (1993) mentioned that, an increasing number of Malay manuscripts in libraries, especially those in private collections, are disintegrating. This problem has been with the Malay World since the very beginning. Deterioration may be due to acid embrittlement of the paper, unsuitable storage environment, biological attacks or human negligence and mishandling. A number of these manuscripts are already brittle to a point of being unusable. As mentioned by Aytac (2002), flooding, terrorism, bomb threats, explosions, transportation accidents, earthquakes, fire and war also prove dangerous threats to the written cultural heritage. And because of this, the author also stated that the world cultural heritage is continually at risk because of natural and unnatural disasters. Thus, the development of a digital library of Malay manuscripts would provide significant insurance against the loss of these valuable materials for use in the learning community. According to Mohd Hilmi Md Rifin and A. N. Zainab, Many digital library initiatives focus on preserving various cultural heritages. Often, the initiatives comprise of various materials such as pictures, maps and paintings, and manuscripts are one of the materials included. Shafi (2004) listed some
RFID is in use all around us. If you have ever chipped your pet with an ID tag, used EZPass through a toll booth, or paid for gas using SpeedPass, you've used RFID. In addition, RFID is increasingly used with biometric technologies for security.
"The hype around open-loop, supply chain applications four or five years ago created an awareness of RFID," says Chris Schaefer, director of RFID product marketing at Motorola Enterprise Mobility. "This awareness, over time, has led companies to consider what RFID can do within their own four walls, with a closed-loop RFID application." According to Schaefer, IT asset management is one way in which companies are using closed-loop RFID. "Items such as company laptops and storage tapes are not only expensive, but can contain sensitive information the company needs to protect," says Schaefer. Rather than using spreadsheets or user logs to track this equipment, a company can deploy RFID to do so. Using RFID in this instance is a more secure way of tracing where equipment is and who has been using it, which can save money on lost equipment and keep sensitive data more secure.
In order for teamwork to be successful in the workplace it involves building a relationship and working with other people. The ability to work as part of a team is one of the most important skills in today’s job market. Working cooperatively and contributing to groups with ideas, and suggestions benefits everyone. A key to team effectiveness
As you are well aware by now the world has become increasingly technology oriented. Every day we use technology in one way or another. Whether it be simply checking email or being able to turn our entire house on from the simple push of a button on our smart phone. Whether we like it or not, technology is there. One piece of technology that seems to be gaining attention and garnering more research is Radio Frequency Identification or RFID. Radio Frequency Identification is a form of wireless media where messaging and data are broadcast through the air. It is radio transmission that uses an RFID tag, RFID reader, and back-end system in order to communicate back and forth and requires no line of sight. As simple as it may sound, this technology has its fair share of complications and the security issues that have presented themselves are at the forefront of this expanding technology.