{"id":346965,"date":"2024-10-20T00:23:45","date_gmt":"2024-10-20T00:23:45","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-28560-12014\/"},"modified":"2024-10-25T23:52:20","modified_gmt":"2024-10-25T23:52:20","slug":"bs-iso-28560-12014","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-28560-12014\/","title":{"rendered":"BS ISO 28560-1:2014"},"content":{"rendered":"
This part of ISO 28560 specifies a model for the use of radio frequency identification (RFID) tags for items appropriate for the needs of all types of libraries, including national, academic, public, corporate, special, and school.<\/p>\n
This part of ISO 28560 provides the framework to ensure interoperability between libraries that exchange library items with RFID tags, the freedom of the library to acquire or renew equipment or library items from different vendors, and interoperability of a single RFID application from the vendor’s perspective.<\/p>\n
This part of ISO 28560 specifies a set of data elements and general guidelines for implementation, to meet the needs for:<\/p>\n
circulation of library items;<\/p>\n<\/li>\n
acquisition of library items;<\/p>\n<\/li>\n
interlibrary loan processes;<\/p>\n<\/li>\n
data requirements of publishers, printers, and other suppliers of library items;<\/p>\n<\/li>\n
inventory and stock checking of items.<\/p>\n<\/li>\n<\/ul>\n
This part of ISO 28560 gives guidelines for item security, profiles, privacy, implementation, migration, label design, and location of the RFID label.<\/p>\n
This part of ISO 28560 specifies the data model, system data elements, and user data elements to be used in conjunction with ISO 28560-2, ISO 28560-3, and any future parts of ISO 28560.<\/p>\n
A source of additional information about implementation issues is provided in Annex A.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Section sec_1 Section sec_2 Section sec_3 1\tScope 2\tNormative references 3\tTerms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Section sec_3.1 Section sec_3.2 Section sec_3.3 Section sec_3.4 Section sec_3.5 Section sec_3.6 Section sec_3.7 Section sec_3.8 Section sec_4 Section sec_4.1 4\tUser data elements 4.1\tOverview of user data elements <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Table tab_1 <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | Table tab_1___1 Section sec_4.2 Section sec_4.2.1 4.2\tUse of user data elements <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | Section sec_4.2.2 Section sec_4.2.3 Section sec_4.2.4 Section sec_4.2.4.1 Section sec_4.2.4.2 Section sec_4.2.4.3 <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | Section sec_4.2.4.4 Section sec_4.2.5 Section sec_4.2.5.1 Section sec_4.2.5.2 <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | Section sec_4.2.6 Section sec_4.2.7 Section sec_4.2.8 Section sec_4.2.9 <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | Section sec_4.2.10 Section sec_4.2.11 Section sec_4.2.12 Section sec_4.2.13 Section sec_4.2.14 <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | Section sec_4.2.15 Section sec_4.2.16 Section sec_4.2.17 Section sec_4.2.18 Section sec_4.2.19 Table tab_2 Section sec_4.2.20 <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | Table tab_3 Section sec_4.2.21 Section sec_4.2.22 Section sec_4.2.23 Section sec_4.2.24 Section sec_4.2.25 Section sec_4.2.26 <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Section sec_4.2.27 Section sec_4.2.28 Section sec_4.2.29 Section sec_4.2.30 Section sec_4.2.31 Section sec_4.3 Section sec_5 Section sec_5.1 Section sec_5.2 Section sec_5.2.1 Section sec_5.2.2 4.3\tMaintenance of the list of data elements used 5\tSystem data elements 5.1\tSystem data versus user data 5.2\tSystem data elements for identification and item security in libraries <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | Section sec_5.2.3 Section sec_5.2.4 Section sec_5.2.5 <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Section sec_6 Section sec_7 Section sec_7.1 Section sec_7.2 Section sec_7.3 6\tTools for data security and integrity 7\tRegional and business profiling 7.1\tElements for profiles 7.2\tRegional profiles 7.3\tBusiness profiles <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | Section sec_8 8\tPrivacy issues <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Section sec_9 Section sec_9.1 Section sec_9.2 Section sec_9.3 Section sec_9.4 9\tImplementation and migration 9.1\tNew RFID implementations 9.2\tMigration for regional models 9.3\tUse of the correct AFI value 9.4\tDiscrimination between ISO\u00a028560-compliant and non-compliant tags <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Table tab_4 Section sec_9.5 Section sec_9.6 Section sec_9.7 9.5\tMigrations of ISO\/IEC\u00a018000-3 Mode\u00a01 RFID tags 9.6\tMigrations of other RFID tag technologies 9.7\tConversion methodologies <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Section sec_9.8 Section sec_10 Section sec_10.1 Section sec_10.2 9.8\tPreservation of business profiles during migration 10\tLabel design and location of the label 10.1\tLabel design 10.2\tLocation of the RFID label <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Annex sec_A Annex sec_A.1 Annex sec_A.2 Annex\u00a0A \n(informative)<\/p>\n Information about ISO\u00a028560 RFID in libraries <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Annex sec_B Table tab_b Figure fig_B.1 Annex\u00a0B \n(informative)<\/p>\n Uniqueness of RFID tags <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Annex sec_C Table tab_C.1 Annex\u00a0C \n(normative)<\/p>\n Type of usage code values (hexadecimal) <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Table tab_C.1___1 <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Annex sec_D Annex\u00a0D \n(informative)<\/p>\n Country prefixes for supplier identifier <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Annex sec_E Annex sec_E.1 Annex sec_E.1.1 Annex sec_E.1.2 Annex sec_E.1.3 Annex sec_E.1.4 Annex\u00a0E \n(informative)<\/p>\n Interoperability characteristics of security systems <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Annex sec_E.2 Annex sec_E.2.1 Table tab_E.1 Annex sec_E.2.2 <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Table tab_E.2 Annex sec_E.2.3 Table tab_E.3 Annex sec_E.2.4 <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Table tab_E.4 Annex sec_E.2.5 Table tab_E.5 Annex sec_E.2.6 <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Table tab_E.6 <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Reference ref_1 Reference ref_2 Reference ref_3 Reference ref_4 Reference ref_5 Reference ref_6 Reference ref_7 Reference ref_8 Reference ref_9 Reference ref_10 Reference ref_11 Reference ref_12 Reference ref_13 Bibliography Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information and documentation. RFID in libraries – Data elements and general guidelines for implementation<\/b><\/p>\n |