Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Bar Code Scanning + Databases = Asset Tracking

By Bill Zalud
September 20, 2001
Asset tracking and identification, among the hottest applications wanted by corporate and commercial security directors, are also among the most technologically complex. Often the design must include two databases - one representing people and another representing objects such as laptop computers, a method of scanning or identifying the people and objects and ways to deny access or alarm.

In many ways, projects driven by North American libraries are pioneering asset tracking and identification approaches.

SelfCheck Security

The firm 3M Library Systems of St. Paul, Minn., is working with numerous libraries to bring what it calls a materials flow management system to those facilities. The system - what 3M calls SelfCheck - also provides security for a library's biggest asset, its books.

There is an installation of 24 3M SelfCheck systems in the Tulsa City-County Library System.

"The installations demonstrate the library's confidence in 3M technology," says Don Leslie of 3M Library Systems. "We are confident the SelfCheck systems will benefit staff and help the library provide a higher level of customer service to the Tulsa community."

A method of asset tracking and inventory control for libraries uses bar codes and multi-dimensional databases to match checked-out books with patrons. The outcome: more security while allowing self-checkout.

Millions of Books

The Tulsa City-County Library System is the primary information and resource center for the Tulsa, Okla. metropolitan area. The Central Library, four regional libraries, and 18 branch libraries in Tulsa County serve more than 308,000 library cardholders who check out more than 3.7 million books and materials every year. Recently, the library followed an aggressive plan to install three SelfCheck systems a day in 16 of its branches.

"We targeted our busiest facilities for the SelfCheck system application," says Linda Saferite, executive director of the Tulsa City-County Library, who believes the new technology offers enhanced patron service. "We chose the 3M SelfCheck system to save time, especially customers' time. We are hopeful that about one-third of all checkouts at these libraries will be done on the SelfCheck systems."

Bar Code Scanning

The 3M SelfCheck system guides the first-time user through the checkout process quickly and efficiently, without the intervention of library personnel. Checkout begins when a patron places a library card under the system's scanner. The system then reads the card's bar code, accesses the library's circulation database and confirms borrowing privileges. If the patron is an approved borrower, on-screen messages explain how to position materials for processing. The system then verifies the items, charges them out, performs the security function and prints out a date-due slip - all in a matter of seconds.

Encouraging Use

3M SelfCheck systems are operational in multitudes of libraries around the world. The systems play an integral role in optimizing the handling, processing and security of library materials. Through a streamlined flow of materials, library staff can spend less time on time-consuming, routine tasks and focus more of their time on the varied needs of patrons.

At the spring during National Library Week, 3M encourages more libraries to consider SelfCheck by sponsoring a Check-it-out Yourself Day. This year, thousands of library patrons visited their local libraries to check out materials on their own with the help of the 3M SelfCheck system. A total of 350 participating libraries qualified to win cash prizes from 3M Library Systems because they had more than 100 patrons use the 3M SelfCheck System that day.

The Orem Public Library, Orem, Utah and The Austin Public Library, Austin, Minn. each was awarded with grand prizes. Other libraries honored: East Palo Alto Library, East Palo Alt, Calif.; Clayton Community Library, Clayton, Calif.; Sunnyvale Public Library, Sunnyvale, Calif.; Lee County Library System, Cape Coral, Fla; Council Bluffs Public Library, Council Bluffs, Iowa; Niles Public Library, Niles, Ill.; Hutchinson Public Library, Hutchinson, Kan.; Anoka County Public Library, Blaine, Minn.; Cleveland Heights Public Library, Cleveland Heights, Ohio; Westerville Public Library, Westerville, Ohio; Tulsa City County Library, Tulsa, Okla.; Ganser Library, Millersville University, Millersville, Pa.; L.E.R. Schimelpfenig Library, Plano, Texas; Newport News Public Library System, Newport News, Va.

Educating Patrons

In addition, the Yuma County District Library, Yuma, Ariz. was recognized as the most creative in their promotion of Check-it-out Yourself Day. The Yuma County Library capitalized on the event poster, which pictured a young boy in a referee's uniform. The library hung baseball-like pennants with library specific teams, such as "Team Circulation" and "Team Reference" and displayed decorated baseballs throughout the library to pre-promote the event. The day of the event, the mascot of the Yuma minor league baseball team, the Bullfrogs made an appearance. The Library also partnered with area businesses, which hung event posters and gave gift certificates to the library for a day of event drawings.

Security and Convenience

Self check out concepts, which blend together convenience, security and asset identification, also are underway at a number of retail chains using electronic article surveillance systems from companies including Sensormatic Electronics Corp. and Checkpoint Systems, the two leader of EAS technology to the retail sector.

However, according to some, the library applications will be better received in the short-run.

"Technology is helping people manage their time more efficiently - at work, at home and at the library," said Susan Evans from the Yuma County District Library. "Promotions such as Check-it-out Yourself Day give us another reason to promote such technology at our facility, and show people how they can enhance their visit by making it more productive. The fact that they help us earn additional resources gives them added incentive to take a few minutes to learn about a process that can save them potentially hours of time in the future."

SIDEBAR:

Asset identification and tracking systems are a hot application for many organizations. While there are developments tying together people and laptops, for example, in office buildings and corporate organizations, among the leading edge apps are those for libraries and retail chains.

In these applications, bar code technology and electronic article surveillance, using magnetic and radio frequency technologies, are most often the drivers.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!