-
1
-
-
33947360907
-
Should libraries play tag with RFIDs?
-
American Libraries (2003), “Should libraries play tag with RFIDs?”, American Libraries, Vol. 36 No. 11, pp. 69-71.
-
(2003)
American Libraries
, vol.36
, Issue.11
, pp. 69-71
-
-
-
2
-
-
33947385984
-
Ashcroft slams anti-patriot act bill, threaten Bush veto
-
American Libraries (2004), “Ashcroft slams anti-patriot act bill, threaten Bush veto”, American Libraries, Vol. 35 No. 3, p. 10.
-
(2004)
American Libraries
, vol.35
, Issue.3
, pp. 10
-
-
-
3
-
-
33947402045
-
Ashcroft hints Patriot Act used
-
American Libraries (2005), “Ashcroft hints Patriot Act used”, American Libraries, Vol. 36 No. 3, p. 10.
-
(2005)
American Libraries
, vol.36
, Issue.3
, pp. 10
-
-
-
5
-
-
33947403743
-
-
available at: www.berkeleydailyplanet.com/article.cfm?issue=02-25-05&storyID=20819 (accessed 28 February 2005).
-
Anderson, L. (2005), “The library defends its principles: privacy, freedom”, available at: www.berkeleydailyplanet.com/article.cfm?issue=02-25-05&storyID=20819 (accessed 28 February 2005).
-
(2005)
The library defends its principles: privacy, freedom
-
-
Anderson, L.1
-
7
-
-
84879847813
-
RFID cards get spin treatment
-
available at: www.wired.com/news/privacy/0,1848,67025,00.html?tw=wn_tophead_2 (accessed 29 March
-
Baard, M. (2005a), “RFID cards get spin treatment”, WiredNews, available at: www.wired.com/news/privacy/0,1848,67025,00.html?tw=wn_tophead_2 (accessed 29 March 2005).
-
(2005)
WiredNews
-
-
Baard, M.1
-
8
-
-
33947412892
-
RFID invades the capital
-
7 March, available at: www.wired.com/news/privacy/0,1848,66801,00.html?tw=wn_story_related (accessed 7 March
-
Baard, M. (2005b), “RFID invades the capital”, Wired News, 7 March, available at: www.wired.com/news/privacy/0,1848,66801,00.html?tw=wn_story_related (accessed 7 March 2005).
-
(2005)
Wired News
-
-
Baard, M.1
-
9
-
-
33947400388
-
-
available at: http://berkeleypubliclibrary.org/BESTPRAC.pdf (accessed 9 April 2005).
-
Berkeley Public Library (2004), Best practices for RFID technology, available at: http://berkeleypubliclibrary.org/BESTPRAC.pdf (accessed 9 April 2005).
-
(2004)
Best practices for RFID technology
-
-
-
10
-
-
58149098793
-
-
available at: www.ala.org/ala/pla/plapubs/technotes/rfidtechnology.htm (accessed 10 April 2005).
-
Boss, R. (2004), RFID technology for libraries, available at: www.ala.org/ala/pla/plapubs/technotes/rfidtechnology.htm (accessed 10 April 2005).
-
(2004)
RFID technology for libraries
-
-
Boss, R.1
-
11
-
-
33947423694
-
-
PC World, available at: www.pcworld.com/resource/article/0,aid,119726,pg,1,00.asp (accessed 7 April 2005).
-
Brandt (2005), Another form of encryption goes down for the count, PC World, available at: www.pcworld.com/resource/article/0,aid,119726,pg,1,00.asp (accessed 7 April 2005).
-
(2005)
Another form of encryption goes down for the count
-
-
-
12
-
-
84992926009
-
The changing faces of library privacy
-
Brown-Syed, C. (2003), “The changing faces of library privacy”, Library and Archival Security, Vol. 18 No. 1, pp. 3-8.
-
(2003)
Library and Archival Security
, vol.18
, Issue.1
, pp. 3-8
-
-
Brown-Syed, C.1
-
14
-
-
14844284486
-
-
VTLS Blacksburgh, VA
-
Chachra, V. and McPherson, D. (2003), Personal Privacy and Use of RFID Technology in Libraries, VTLS, Blacksburgh, VA, pp. 1-7.
-
(2003)
Personal Privacy and Use of RFID Technology in Libraries
, pp. 1-7
-
-
Chachra, V.1
McPherson, D.2
-
15
-
-
10444229520
-
Walking a tightrope: academic libraries and privacy
-
Coombs, K. (2004), “Walking a tightrope: academic libraries and privacy”, Journal of Academic Librarianship, Vol. 30 No. 6, pp. 493-8.
-
(2004)
Journal of Academic Librarianship
, vol.30
, Issue.6
, pp. 493-498
-
-
Coombs, K.1
-
16
-
-
33947425379
-
-
US Government Printing Office Washington, DC, available at: http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=108_house_hearings&docid=f:95455.pdf (accessed 2 April 2005).
-
Committee on Energy and Commerce (2004), RFID Technology: What the Future Holds for Commerce, Security and the Consumer, US Government Printing Office, Washington, DC, available at: http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=108_house_hearings&docid=f:95455.pdf, pp. 1-74 (accessed 2 April 2005).
-
(2004)
RFID Technology: What the Future Holds for Commerce, Security and the Consumer
, pp. 1-74
-
-
-
17
-
-
33947357956
-
Perspective looking back 2: trends and perspectives, 2001-2004
-
Crawford, W. (2005), “Perspective looking back 2: trends and perspectives, 2001-2004”, Cites & Insights, Vol. 5 No. 2, pp. 9-22.
-
(2005)
Cites & Insights
, vol.5
, Issue.2
, pp. 9-22
-
-
Crawford, W.1
-
18
-
-
33947370070
-
RFID poses no problem for patron privacy
-
Dorman, D. (2003), “RFID poses no problem for patron privacy”, American Libraries, Vol. 36 No. 11, pp. 86-7.
-
(2003)
American Libraries
, vol.36
, Issue.11
, pp. 86-87
-
-
Dorman, D.1
-
19
-
-
21844484936
-
Sacred trust or competitive opportunity: using patron records
-
Estabrook, L. (1996), “Sacred trust or competitive opportunity: using patron records”, Library Journal, Vol. 121 No. 2, pp. 48-49.
-
(1996)
Library Journal
, vol.121
, Issue.2
, pp. 48-49
-
-
Estabrook, L.1
-
21
-
-
33947392320
-
Organization that received Patriot Act letter may identify itself in public
-
available at: http://chronicle.com/2005/09/2005091201t.htm (accessed 12 September 2005).
-
Foster, A. (2005), “Organization that received Patriot Act letter may identify itself in public, Judge Rules, available at: http://chronicle.com/2005/09/2005091201t.htm (accessed 12 September 2005).
-
(2005)
Judge Rules
-
-
Foster, A.1
-
22
-
-
33947383886
-
REFI in libraries: are we ready
-
Hodgson, C. (2004), “REFI in libraries: are we ready”, Information Standards Quarterly, Vol. 16 No. 4, pp. 1-4.
-
(2004)
Information Standards Quarterly
, vol.16
, Issue.4
, pp. 1-4
-
-
Hodgson, C.1
-
23
-
-
4544295493
-
New encroachments recall old ones
-
Kaufman, P. (2002), “New encroachments recall old ones”, Library Journal, Vol. 127 No. 16, p. 57.
-
(2002)
Library Journal
, vol.127
, Issue.16
, pp. 57
-
-
Kaufman, P.1
-
24
-
-
22244443719
-
Radio-frequency identification for security and media circulation in libraries
-
Kern, C. (2004), “Radio-frequency identification for security and media circulation in libraries”, The Electronic Library, Vol. 22 No. 4, pp. 317-24.
-
(2004)
The Electronic Library
, vol.22
, Issue.4
, pp. 317-324
-
-
Kern, C.1
-
25
-
-
84992928792
-
Libraries uphold privacy
-
available at: www.detnews.com/2004/metro/0407/06/b01-204018.htm (accessed 2 April 2005).
-
Lee, A. (2004), “Libraries uphold privacy”, Detroit News, available at: www.detnews.com/2004/metro/0407/06/b01-204018.htm (accessed 2 April 2005).
-
(2004)
Detroit News
-
-
Lee, A.1
-
26
-
-
33947378097
-
Systems security in the networked library
-
Library Hi Tech (1997), “Systems security in the networked library”, Library Hi Tech, Vol. 12 Nos 1-2, pp. 9-102.
-
(1997)
Library Hi Tech
, vol.12
, Issue.1
, pp. 9-102
-
-
-
27
-
-
84992928829
-
Patriot Act Criticism Launched by Conservative Groups, ACLU
-
available at: http://www.libraryjournal.com/article/CA513295?display=NewsNews&industry=News&industryid=1986&verticalid=151 (accessed 28 March 2005).
-
Library Journal (2005), “Patriot Act Criticism Launched by Conservative Groups, ACLU”, Library Journal, available at: http://www.libraryjournal.com/article/CA513295?display=NewsNews&industry=News&industryid=1986&verticalid=151 (accessed 28 March 2005).
-
(2005)
Library Journal
-
-
-
28
-
-
18944395197
-
Securing passive objects in mobile ad-hoc peer-to-peer networks
-
Mayrhofer, R., Ortner, F., Ferscha, A. and Hechinger, M. (2003), “Securing passive objects in mobile ad-hoc peer-to-peer networks”, Electronic Notes in Theoretical Computer Science, Vol. 85 No. 3, pp. 1-17.
-
(2003)
Electronic Notes in Theoretical Computer Science
, vol.85
, Issue.3
, pp. 1-17
-
-
Mayrhofer, R.1
Ortner, F.2
Ferscha, A.3
Hechinger, M.4
-
29
-
-
84992928703
-
Radio detection system for information handling
-
Mehta, V., Goswami, S., Kumar, A. and Singh, M. (2004), “Radio detection system for information handling”, DESIDOC Bulletin of Technology, Vol. 24 No. 4, pp. 19-23.
-
(2004)
DESIDOC Bulletin of Technology
, vol.24
, Issue.4
, pp. 19-23
-
-
Mehta, V.1
Goswami, S.2
Kumar, A.3
Singh, M.4
-
30
-
-
14844294769
-
Privacy and security in library RFID issues, practices, and architectures
-
Molnar, D. and Wagner, D. (2004), “Privacy and security in library RFID issues, practices, and architectures”, Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 210-219.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
31
-
-
84992928540
-
RFID raises questions
-
available at: https://members.ala.org/nif/v53n3/rfid.html (reported in: San Francisco Chronicle, 4 March; Information Week, 25 March).
-
Newsletter on Intellectual Freedom (2004), “RFID raises questions”, Newsletter on Intellectual Freedom, Vol. 53 No. 3, available at: https://members.ala.org/nif/v53n3/rfid.html (reported in: San Francisco Chronicle, 4 March; Information Week, 25 March).
-
(2004)
Newsletter on Intellectual Freedom
, vol.53
, Issue.3
-
-
-
32
-
-
70449787931
-
Resisting surveillance: identity and implantable microchips
-
Nisbet, N. (2004), “Resisting surveillance: identity and implantable microchips”, Leonardo, Vol. 37 No. 3, pp. 211-5.
-
(2004)
Leonardo
, vol.37
, Issue.3
, pp. 211-215
-
-
Nisbet, N.1
-
33
-
-
4243143991
-
Privacy in the global e-village: embed responsibility for privacy into radio-frequency identification tags and other information technology designed to network the physical world
-
Pottie, G. (2004), “Privacy in the global e-village: embed responsibility for privacy into radio-frequency identification tags and other information technology designed to network the physical world”, Communications of the ACM, Vol. 47 No. 2, pp. 21-3.
-
(2004)
Communications of the ACM
, vol.47
, Issue.2
, pp. 21-23
-
-
Pottie, G.1
-
34
-
-
12344293418
-
How a spark on innovation in Fayetteville changed the RFID and self-check paradigm
-
53-56.
-
Schaper, L. (2005), “How a spark on innovation in Fayetteville changed the RFID and self-check paradigm”, Computers in Libraries, Vol. 25 No. 1, pp. 6-8, 53-56.
-
(2005)
Computers in Libraries
, vol.25
, Issue.1
, pp. 6-8
-
-
Schaper, L.1
-
35
-
-
0346373507
-
RFID: helpmate or conspiracy?
-
Schuyler, M. (2004), “RFID: helpmate or conspiracy?”, Computers in Libraries, Vol. 24 No. 1, pp. 22-4.
-
(2004)
Computers in Libraries
, Issue.1
, pp. 22-24
-
-
Schuyler, M.1
-
36
-
-
84992929803
-
What's next for the radio frequency library?
-
Scire, T. (2003), “What's next for the radio frequency library?”, Library and Archival Security, Vol. 18 No. 2, pp. 51-8.
-
(2003)
Library and Archival Security
, vol.18
, Issue.2
, pp. 51-58
-
-
Scire, T.1
-
37
-
-
8744238425
-
Making sense of RFID.Net Connect
-
(supplement).
-
Smart, L. (2004), “Making sense of RFID.Net Connect”, Library Journal, pp. 4-14 (supplement).
-
(2004)
Library Journal
, pp. 4-14
-
-
Smart, L.1
-
38
-
-
13844272147
-
Technology, security, and individual privacy: new tools, new threats, and new public perceptions
-
Strickland, L. and Hunt, L. (2005), “Technology, security, and individual privacy: new tools, new threats, and new public perceptions”, Journal of the American Society for Information Science and Technology, Vol. 56 No. 3, pp. 221-34.
-
(2005)
Journal of the American Society for Information Science and Technology
, vol.56
, Issue.3
, pp. 221-234
-
-
Strickland, L.1
Hunt, L.2
-
39
-
-
84986104562
-
User privacy in the digital library environment: an investigation of policies and preparedness
-
Sturges, P., Davies, E., Dearnley, J., Iliffe, U., Oppenheim, C. and Hardy, R. (2003), “User privacy in the digital library environment: an investigation of policies and preparedness”, Library Management, Vol. 24 Nos 1/2, pp. 44-50.
-
(2003)
Library Management
, vol.24
, Issue.1/2
, pp. 44-50
-
-
Sturges, P.1
Davies, E.2
Dearnley, J.3
Iliffe, U.4
Oppenheim, C.5
Hardy, R.6
-
40
-
-
33947419496
-
T08 … RFID and privacy: potential and perils
-
(Panellist), program presented at:
-
Tien, L. (Panellist) (2005), “T08 … RFID and privacy: potential and perils”, program presented at: Michigan Library Association Annual Conference, Grand Rapids, MI, 25-28 October.
-
(2005)
Michigan Library Association Annual Conference, Grand Rapids, MI, 25-28 October.
-
-
Tien, L.1
-
41
-
-
84992926809
-
Radio frequency identification systems for libraries and archives: an introduction
-
Ward, D. (2003), “Radio frequency identification systems for libraries and archives: an introduction”, Library and Archival Security, Vol. 18 No. 2, pp. 7-21.
-
(2003)
Library and Archival Security
, vol.18
, Issue.2
, pp. 7-21
-
-
Ward, D.1
-
42
-
-
84992925672
-
Hackers nab US citizens' data
-
available at: www.wired.com/news/privacy/0,1848,66842,00.html (accessed 10 March 2005).
-
WiredNews (2005), “Hackers nab US citizens' data”, WiredNews, available at: www.wired.com/news/privacy/0,1848,66842,00.html (accessed 10 March 2005).
-
(2005)
WiredNews
-
-
-
43
-
-
33947428118
-
Turning into radio frequency identification (RFID)
-
Wray, G. (2006), “Turning into radio frequency identification (RFID)”, Cognotes, Midwinter Meeting Highlights, p. 10.
-
(2006)
Cognotes, Midwinter Meeting Highlights
, pp. 10
-
-
Wray, G.1
-
44
-
-
84992929787
-
Brave new era for privacy fight
-
available at: www.wired.com/news/privacy/0,1848,66242,00.html (accessed 13 January
-
“Brave new era for privacy fight”, WiredNews, available at: www.wired.com/news/privacy/0,1848,66242,00.html (accessed 13 January 2005).
-
(2005)
WiredNews
-
-
-
45
-
-
85010962321
-
School RFID plan gets an F
-
available at: www.wired.com/news/privacy/0,1848,66554,00.html (accessed 10 February
-
Zetter, K. (2005b), “School RFID plan gets an F”, WiredNews, available at: www.wired.com/news/privacy/0,1848,66554,00.html (accessed 10 February 2005).
-
(2005)
WiredNews
-
-
Zetter, K.1
-
46
-
-
77955074776
-
Feds rethinking RFID passport
-
available at: www.wired.com/news/privacy/0,1848,67333,00.html (accessed 26 April
-
Zetter, K. (2005c), “Feds rethinking RFID passport”, WiredNews, available at: www.wired.com/news/privacy/0,1848,67333,00.html (accessed 26 April 2005).
-
(2005)
WiredNews
-
-
Zetter, K.1
-
47
-
-
84992925841
-
Fatal flaw weakens RFID passports
-
available at: www.wired.com/news/privacy/0,1848,69453,00.html?tw=rss.TOP, (accessed 3 November 2005).
-
Schneier, B. (2005), “Fatal flaw weakens RFID passports”, WiredNews, available at: www.wired.com/news/privacy/0,1848,69453,00.html?tw=rss.TOP, (accessed 3 November 2005).
-
(2005)
WiredNews
-
-
Schneier, B.1
|