Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Bar Code Scanning + Databases = Asset Tracking

By Bill Zalud
September 20, 2001
Asset tracking and identification, among the hottest applications wanted by corporate and commercial security directors, are also among the most technologically complex. Often the design must include two databases - one representing people and another representing objects such as laptop computers, a method of scanning or identifying the people and objects and ways to deny access or alarm.

In many ways, projects driven by North American libraries are pioneering asset tracking and identification approaches.

SelfCheck Security

The firm 3M Library Systems of St. Paul, Minn., is working with numerous libraries to bring what it calls a materials flow management system to those facilities. The system - what 3M calls SelfCheck - also provides security for a library's biggest asset, its books.

There is an installation of 24 3M SelfCheck systems in the Tulsa City-County Library System.

"The installations demonstrate the library's confidence in 3M technology," says Don Leslie of 3M Library Systems. "We are confident the SelfCheck systems will benefit staff and help the library provide a higher level of customer service to the Tulsa community."

A method of asset tracking and inventory control for libraries uses bar codes and multi-dimensional databases to match checked-out books with patrons. The outcome: more security while allowing self-checkout.

Millions of Books

The Tulsa City-County Library System is the primary information and resource center for the Tulsa, Okla. metropolitan area. The Central Library, four regional libraries, and 18 branch libraries in Tulsa County serve more than 308,000 library cardholders who check out more than 3.7 million books and materials every year. Recently, the library followed an aggressive plan to install three SelfCheck systems a day in 16 of its branches.

"We targeted our busiest facilities for the SelfCheck system application," says Linda Saferite, executive director of the Tulsa City-County Library, who believes the new technology offers enhanced patron service. "We chose the 3M SelfCheck system to save time, especially customers' time. We are hopeful that about one-third of all checkouts at these libraries will be done on the SelfCheck systems."

Bar Code Scanning

The 3M SelfCheck system guides the first-time user through the checkout process quickly and efficiently, without the intervention of library personnel. Checkout begins when a patron places a library card under the system's scanner. The system then reads the card's bar code, accesses the library's circulation database and confirms borrowing privileges. If the patron is an approved borrower, on-screen messages explain how to position materials for processing. The system then verifies the items, charges them out, performs the security function and prints out a date-due slip - all in a matter of seconds.

Encouraging Use

3M SelfCheck systems are operational in multitudes of libraries around the world. The systems play an integral role in optimizing the handling, processing and security of library materials. Through a streamlined flow of materials, library staff can spend less time on time-consuming, routine tasks and focus more of their time on the varied needs of patrons.

At the spring during National Library Week, 3M encourages more libraries to consider SelfCheck by sponsoring a Check-it-out Yourself Day. This year, thousands of library patrons visited their local libraries to check out materials on their own with the help of the 3M SelfCheck system. A total of 350 participating libraries qualified to win cash prizes from 3M Library Systems because they had more than 100 patrons use the 3M SelfCheck System that day.

The Orem Public Library, Orem, Utah and The Austin Public Library, Austin, Minn. each was awarded with grand prizes. Other libraries honored: East Palo Alto Library, East Palo Alt, Calif.; Clayton Community Library, Clayton, Calif.; Sunnyvale Public Library, Sunnyvale, Calif.; Lee County Library System, Cape Coral, Fla; Council Bluffs Public Library, Council Bluffs, Iowa; Niles Public Library, Niles, Ill.; Hutchinson Public Library, Hutchinson, Kan.; Anoka County Public Library, Blaine, Minn.; Cleveland Heights Public Library, Cleveland Heights, Ohio; Westerville Public Library, Westerville, Ohio; Tulsa City County Library, Tulsa, Okla.; Ganser Library, Millersville University, Millersville, Pa.; L.E.R. Schimelpfenig Library, Plano, Texas; Newport News Public Library System, Newport News, Va.

Educating Patrons

In addition, the Yuma County District Library, Yuma, Ariz. was recognized as the most creative in their promotion of Check-it-out Yourself Day. The Yuma County Library capitalized on the event poster, which pictured a young boy in a referee's uniform. The library hung baseball-like pennants with library specific teams, such as "Team Circulation" and "Team Reference" and displayed decorated baseballs throughout the library to pre-promote the event. The day of the event, the mascot of the Yuma minor league baseball team, the Bullfrogs made an appearance. The Library also partnered with area businesses, which hung event posters and gave gift certificates to the library for a day of event drawings.

Security and Convenience

Self check out concepts, which blend together convenience, security and asset identification, also are underway at a number of retail chains using electronic article surveillance systems from companies including Sensormatic Electronics Corp. and Checkpoint Systems, the two leader of EAS technology to the retail sector.

However, according to some, the library applications will be better received in the short-run.

"Technology is helping people manage their time more efficiently - at work, at home and at the library," said Susan Evans from the Yuma County District Library. "Promotions such as Check-it-out Yourself Day give us another reason to promote such technology at our facility, and show people how they can enhance their visit by making it more productive. The fact that they help us earn additional resources gives them added incentive to take a few minutes to learn about a process that can save them potentially hours of time in the future."

SIDEBAR:

Asset identification and tracking systems are a hot application for many organizations. While there are developments tying together people and laptops, for example, in office buildings and corporate organizations, among the leading edge apps are those for libraries and retail chains.

In these applications, bar code technology and electronic article surveillance, using magnetic and radio frequency technologies, are most often the drivers.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • code on blue screen

    Secure code training ruled better investment than code scanning tools

    See More
  • Tracking device

    Enables Covert Tracking for Asset Protection

    See More
  • Asset Tracking

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

See More Products

Events

View AllSubmit An Event
  • September 19, 2012

    Oil & Gas Critical Infrastructure & Asset Security Forum 2012

    The Forum will cover security issues related to both offshore and onshore oil and gas arising out of civil unrest, terrorist activities, and a competitive global market.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing