Electronic Security: A case study of IIT Bombay Central Library ABSTRACT

Similar documents
Automation of Acquisition Section of Sonubhau Baswant College Library with the help of SOUL 2.0: A Study

a l A a l l i e v r l o r t a l l i e v r G e t a r a l g r u d i V e v i s s a l a u t r i V s s c c d i V e v i t c A l a u t r i V

CHALLENGES IN SETTING UP AN INSURANCE LIBRARY: INDIAN SCENARIO

Web OPAC: An Effective Tool for Management of Reprints of ARI Scientists

Use and User s Satisfaction on Library Resources and Services in Tezpur University (India): a study

Claverack Free Library CIRCULATION POLICY

MANAGING A LIBRARY S M DHAWAN

How To Buy Books At Harvard Library

LIBRARIES STOCK SELECTION POLICY (Revised February 2012)

Title of the Policy: Surveillance Policy

CCTV on IP Network. How Cisco IT Deploys Closed- Circuit TV Cameras over the Secure IP Network. A Cisco on Cisco Case Study: Inside Cisco IT

NORMS AND STANDARDS FOR LIBRARY PRESCRIBED BY REGULATORY BODIES OF PROFESSIONAL EDUCATION IN INDIA: A STUDY

Library Security System Model 2301/2302, 3501/3502, 3801/3802, 3803/3804 and Accessories. Operator s Manual

Kalamazoo College Library Reference Collection Development Policy

A Study of the Usefulness of Pakistan Library Automation Group's (PakLAG) Services

Solutions that captivate and connect

INTRODUCTION Indiana Public Library Technology Plan Template

Security Technology. Virtual

SERIES ͲΝΒΣΞ ΒΟΘΖ Swann 2013

Contra Costa Community College District Business Procedure SECURITY CAMERA OPERATING PROCEDURE

Remote Guarding. The traditional guarding functions that you depend on can now be performed remotely.

Detection Systems Model 3500 Series and Model 3800 Series. Operator s Manual

Security Systems Surveillance Policy

Improving the Healthcare Experience

Security in the smart grid

A Survey of Engineering College Libraries in Sri Venkateswara University Area, Andhra Pradesh, India

REGULATIONS FOR RESEARCH & DEVELOPMENT (R&D) UNIT INDIAN INSTITUTE OF TECHNOLOGY BHUBANESWAR

Statement of objective MALLS & MULTIPLEXES

AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI

Software for University Libraries 2.0 (SOUL 2.0)

Inquiry into Microeconomic Reform in Western Australia. by the Economic Regulation Authority. Submission by the. State Library of Western Australia

Torbay Libraries. Stock Policy

LibRFID: Automation Software for Library Management System Using RFID Technology

Global Supply Chain Security Recommendations

International business and strategy

5/7/2013-LBUSD-3M BOOK DETECTION SYSTEM

Librarian, Shahapur, Dist. Thane (MS)

Android Phone Controlled Robot Using Bluetooth

Think Remote Monitoring Think Concept Pro Think VXM4B

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE

Librarian/Resource Centre Manager

Security Criteria for C-TPAT Foreign Manufacturers in English

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

Business Process Services. White Paper. Leveraging the Internet of Things and Analytics for Smart Energy Management

International Journal of Advancements in Research & Technology, Volume 3, Issue 5, May ISSN THROUGH MOBILE

PG CERTIFICATE COURSE : POLYURETHANE FOAM CHEMISTRY AND TECHNOLOGY FOR: EXECUTIVES, ENGINEERS AND MANAGERS LEVEL

Envera Security Solution for Via Sol CDD Community.

CREATION AND MANAGEMENT OF DIGITAL RESOURCES AND SERVICES AT REC, TRICHY LIBRARY

Remote Monitoring offers a comprehensive range of services, which are continually

State of Florida RECORDS MANAGEMENT SELF-EVALUATION GUIDE. Published September Division of Library and Information Services

Video surveillance policy (PUBLIC)

SCHOOL SECURITY POLICY & PROCEDURES

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers

Conference Papers of 5th MANLIBNET Convention, XLRI Jamshedpur. March 6-8, 2003,

Information resources and services of national science library India, New Delhi: A user study

ProLibis Solutions for Libraries in the Digital Age. Automation of Core Library Business Processes

Back Office User Guide

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

Security, Access Management and Key Control Policy and Procedures

GIS Web Services. Acknowledgement: Thanks to Principal & Dr. (Mrs.) G.V. Rao, CRS-GIS, K.J.

Intelligent Home Automation and Security System

We are one of the distinguished suppliers of a Wide range of Access Controllers. These are procured from the reliable vendors and are available in

SECURITY SOLUTIONS BANKING AND FINANCE

EXECUTIVE SUMMARY 0.1 PROCESSES AND TYPES OF ROLLING MILLS FOR FLAT PRODUCTS 02. HISTORY OF DEVELOPMENT OF FLAT ROLLING

BRANCH SECURITY REVIEW CHECKLIST

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

P J RAO, Systems Engineering Division, and M N SEETHARAMAN, Library, National Aeronautical Laboratory, Bangalore-17.

HIPAA Security. assistance with implementation of the. security standards. This series aims to

Intermec Security Letter of Agreement

Technology Plan FY through FY

CHILD CARE CENTERS SELF-ASSESSMENT GUIDE HOW TO MAKE YOUR CHILD CARE CENTER A SAFER PLACE FOR CHILDREN

Collection Development Policy of the Government Documents Program at Greenlease Library Rockhurst University

THAKUR COLLEGE OF ENGINEERING & TECHNOLOGY (TCET)

Electronic Security. For Financial Institutions

HIPAA Security Alert

Seeing by Degrees: Programming Visualization From Sensor Networks

Strategic Human Resource Management

Integrated Security System

10 Hidden IT Risks That Might Threaten Your Law Firm

Camera Use. Policy Statement and Purpose. Table of Contents

The remote CCTV monitoring specialists CCTV Monitoring

UBC Technical Guidelines Section Edition Secure Access: General Standards Page 1 of 7

We suppy surveillance equipment, wireless security systems, CCTV surveillance camera, access control security systems, service provider of system

International business and strategy

Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings

admission control ticket validation software and scanning devices turnstiles/gates customisation and support

M O B I L E E A M E Q U I P M E N T M A I N T E N A N C E

DPS APPROVED INSTALLER

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators

Video Analytics and Security

Transcription:

By Mahendra N. Jadhav Assistant Librarian Central Library IIT Bombay, Mumbai- 400 076 Shobha Kulkarni Assistant Librarian Central Library IIT Bombay, Mumbai- 400 076 Email: jadhav@admin.iitb.ac.in Email: kulkarni@admin.iitb.ac.in ABSTRACT IIT Bombay Central library has varied collection in physical as well electronic/digital form. The access and maintenance of physical collection has become a great challenge as far as economic and ethical problems are concerned. The digital collection can easily be preserve on system and accessible to users on web without being tampered, but the rare and classic collection in physical form need to be preserved for future generation by overcoming the unethical means of losses. The MODROB / MHRD sponsored project helped to initiate the issue of security by installing the electronic security system to secure the esteemed collection and augment circulation activity. The present paper discusses the methodology for followed phase 1 in securing the reference collection of the library. KEYWORDS: Electronic Security System, Reference Books - Security, Academic library file:///c /CALIBER_Files/Caliber_2003_CD/LA/12.htm (1 of 8) [3/3/2004 3:45:18 PM]

0. INTRODUCTION IIT Bombay ranks amongst the top three Technological Institutions in India as well as the Asia Pacific region. Today, the Institute is recognized as one of the centres of academic excellence in the country and growing with time and change with national aspirations, national perspectives, and trends world - wide. The Central Library (CL) plays a vital role in fulfilling the vision of the institute. It has completed nearly 45 years and has built a large collection of books, journals and non-book materials. It also has a rich collection of resources in electronic media available locally on the Institute Intranet and accessible on the Web. It caters to the needs of large groups of users including more than 400 faculty, 5000 students (U.G., P.G. and Research Scholars) and equally large number of supporting staff. It has computerized all it s housekeeping activities using software developed in-house that is being maintained and updated regularly. The Bar-code technology is used to enhance the circulation transactions. It uses state-of-the-art technology in its functioning and services. The demand for library service as information provider has increased substantially. There has been a significant rise in demand for literature resources for research in terms of journals, databases, research monographs and patents - both in electronic and print versions, as well as the book resources. Total collection of the CL as: Books 2,07,010 Periodicals Current Back volumes 1,190 95,650 65,514 Standards/ Reports/ Pamp-hlets Patents Depository Center for Indian patents * Collection of nearly 600 foreign patents demand based 1. NEED OF A SECURITY SYSTEM Central Library is serving more than 10000 users (IITB students, faculty, staff, research scholars, corporate and educational institutional members and daily visitors etc.) The library is open from at 9:00 am. to 11:00 pm. on all working days and 10:00 am. to 5:00 pm on all Saturdays, Sundays and holidays throughout the year, except three national holidays i.e. Independence day, Gandhi Jayanti and Republic day. The daily circulation transactions are more that 1000. file:///c /CALIBER_Files/Caliber_2003_CD/LA/12.htm (2 of 8) [3/3/2004 3:45:18 PM]

The multifold increase in library collection as well as users need, library needs to be equipped with modern IT gadgets to safeguard the collection. The vigilance and maintenance of library collection is basically a responsibility of library personal. The library staff strength is reduced due to retirement (presently total staff in CL is 50, whereas till 1990 it was 75). The difficulty in recruiting the new manpower due to financial constraints and government policies, managing the security of library material with existing staff has become a great concern to library authorities. Books are often found on the library shelves with all their pages torn from the spine. Library thieves mistakenly believe they can avoid being caught by ripping or the pages cut out of an entire book and leaving the cover behind. Sometimes book has been damaged beyond repair and has to be replaced. Unfortunately, some books cannot be replaced because they are out of print. During the stock verification reports (1990-99) total books found missing are 4821 (worth Rs. 9,42,318/-) and almost equal number of books found either mutilated/damaged due to heavy usage or by way of cutting pages. Library collection is a real wealth to the academic community and one cannot afford to loose this wealth. This alarming situation has initiated the authority to find out the means for safeguarding the library collection. The survey was undertaken to find out the proper security measures for minimizing such a heavy loss of library materials. The survey has pointed out the following security measures used globally for library security. 2. TYPES OF SECURITY SYSTEM CC T.V Video Cameras and Electronic Security Systems (ESS) Out of these three, CC.TV and Video cameras as a security system is found unsuitable for CL as far as the architectural design of library building is concerned. The library material stacked in many floors and monitoring the readers movements from one of the central location is a difficult task to library. The authorities, therefore took the decision to procure 3M Electronic Security System to safeguard the physical materials of the library under the MODROB/MHRD sponsored project. It has an electro-magnetic-based surveillance system to check pilferage of books and its components are as follows. Electromagnetic gate: It is installed at the entrance of the Library. The gate has sensors for file:///c /CALIBER_Files/Caliber_2003_CD/LA/12.htm (3 of 8) [3/3/2004 3:45:18 PM]

magnetic strip inserted in each book of the Library. Any unauthorized exit of library material will produce alarm to alert the library staff. Fig. 1 Electromagnetic Gate Sensitizer / de-sensitizer unit: 3M - 995 workstation de-sensitizes each book that is issued out and re-sensitizes each book that is returned to the Library. Fig. 2 Sensitizer/ Desensitizer Unit Desensitizes or sensitizes non magnetic materials at the flip of switch Movable Optical trigger eliminates buttons Verifier light identification protected materials Audio signal Tattle tapes (Magnetic strips) that required to be inserted in each book. file:///c /CALIBER_Files/Caliber_2003_CD/LA/12.htm (4 of 8) [3/3/2004 3:45:18 PM]

Fig. 3: 3M Tattle-Tape B1 Security Strips (adhesive one side) Strip is easily applied in spine of book Strip is completely concealed Fig. 4: 3M Tattle-Tape B2 Security Strips (adhesive both sides) Extra-long liner for application between pages of books and periodicals. Strips fit deeply into gutter, making them virtually undetectable. 3. METHODOLOGY The installation of ESS in the library is not only enhanced the security of library material, but it encourages the library staff for high vigilance. The ESS system is procured under the Modernization of Library Automation Project sponsored by MHRD. The infrastructure includes Tattle Table, manpower to insert the tape and the most important is the necessary fund to procure Tattle Table as well as for labor charges. While considering the amount of work and money involved in securing the huge collection of CL, the decision for phase wise completion of work was taken. This study is therefore restricted to phase-1. In phase-1 the complete Reference collection was selected for insertion of Tattle Table. Before inserting the Tattle Table, the books were physically checked and if any book found damaged/minor repairing then those books were sent out for binding/repair to outside binders/in-house bindery. Similarly the decision was taken to separate the following types of reference collection and kept it in the inactive collection area, so that it will be easy to apply weeding out criteria in future. a) Old editions of encyclopedias and other reference sources e.g. yearbook, handbook etc. file:///c /CALIBER_Files/Caliber_2003_CD/LA/12.htm (5 of 8) [3/3/2004 3:45:18 PM]

b) Books in foreign languages i.e. French, German and Russian, if not used in past ten years The actual work of insertion of TT is now limited only to the latest as well as heavily use reference collection. Two casual skilled laborers were selected and Indian agent of 3M Company gave training for insertion of TT in books. The permanent library attendants were also involved while giving training along with the casual labors. After sticking tattle tapes with books, two Assistant librarians have physically checked the book and put the date stamp and initials on the backside of title page for identifications. The Tattle Tapes are two types B1 (shown in fig.3) and B2 (shown in fig.4). The B1 TT is single sided sticking that was used for hardbound cover in spine and The B2 is both sided sticking which were used for paperback edition. The total work was finished within 85 man days for 11,208 Reference Books. The casual laborers were paid @ 123 Rs. per day. The actual statistics of work done is as follows. Expenditure Heads Cost per Unit No. of Units No. of Days Charges Paid Labor Charges Rs. 123 2 85 Rs. 20,910 (Casual Laborers) Material Charges (Tattle Tapes) Rs. 12 11,208 -- Rs. 1,34,496 Total Charges Rs. 1,55,406 Total Books Processed 11,208 Expenditure per Book Rs. 13.86 Expenditure details for processing 11,208 Reference Books file:///c /CALIBER_Files/Caliber_2003_CD/LA/12.htm (6 of 8) [3/3/2004 3:45:18 PM]

Progress of work 4. CONCLUSION AND RECOMMENDATIONS Most of our libraries which have open access facility have a problem with security and material theft. Library security is a complex but important issue. The safety of library staff, patrons, and the library collection are all at stake. ESS is widespread and effective in deterring and catching thieves. Unfortunately, security problems will probably not disappear in the future and libraries will need to continue to be aware of what is occurring in the library and new ideas in dealing with different security problems. In second phase, the Library plans an installation of self-charge security equipment. The final phase calls for the self-operated equipment that will integrate the circulation function and the security function together which will make the efficient lending out operation. 5. ACKNOWLEDGEMENT The authors are thankful to Librarian/ Dy. Librarian for encouragement in undertaking the case study and also would like to acknowledge the efforts of professional colleagues of IIT Bombay Central Library. REFERENCES file:///c /CALIBER_Files/Caliber_2003_CD/LA/12.htm (7 of 8) [3/3/2004 3:45:18 PM]

http://www.3m.com/market/security/library/prod_lit.jhtml BRIEF BIOGRAPHY OF AUTHORS Mr. Mahendra N. Jadhav is looking at Central Library IIT-Bombay as an Assistant Librarian since April 1998. Prior to joing IIT Bombay he served in Indian Institute of Remote Sensing (DoS), Dehardaun(1990-91) and National Research Center for Weed Science (ICAR), Jabalpur (1991-98). His current research interests include digital libraries, ETD, building in-house databases, Web-based learning & education and creation of library Websites. He has a good number of publications to his credit in journals and conference proceedings. Ms. Shobha Kulkarni B.Sc., M.A., M.Lib.Sci has been serving in the Central Library, IIT B since 1976 in various capacity. She is currently working as head of the Technical Processing Division and Bindery. In addition, she is also working on standardization and validation of bibliographic records in the Library database according to AACR-II. She was instrumental in implementing AACR-II rules for cataloguing practice and initiated retrospective conversion project for book database. Ms. Kulkarni is Life member of IASLIC, ILA and BOSLA. She has published several articles in conference proceedings and periodicals. Ms. Kulkarni is recipient of ILA / Dr. C.D. Sharma award for the best paper presented in 44th All India Library conference, Hyderabad, 1999. file:///c /CALIBER_Files/Caliber_2003_CD/LA/12.htm (8 of 8) [3/3/2004 3:45:18 PM]