hollysue & Porch Geese writes “Ben Ostrowsky writes on (slashdot) “On the heels of the possibility of requiring fingerprinting to use library resources, librarians don’t like hoarding personally identifiable information; many are keenly aware of privacy concerns. Now it appears that anonymous library cards may be a possibility on the horizon. Tell your librarian you want to be anonymous!” From the article: ” You’ve seen anonymous cash cards already; you may even have received them before. They’re better known as gift cards. Using the same principle, libraries can issue a borrower card that uses cash, rather than personal ID information, as collateral. Here’s an example: If a privacy-minded user deposits $20 to get an anonymous library card, she can check out The Terror State without identifying herself. Her account balance is temporarily reduced by $15, and when the library checks the CD back in (in good condition), her balance is restored to its original value.””
Recent Posts
- Seattle Public Library recovers from ransomware attack, makes moves to strengthen tech security September 6, 2024
- Cybersecurity Pilot Program Launched by FCC to Defend Schools, Libraries September 6, 2024
- The Internet Archive just lost its appeal over ebook lending September 4, 2024
- Record labels forgot these songs existed. One man rescued them August 29, 2024
- Woman makes it her mission to visit RI’s 70 public libraries August 26, 2024
- What Books Last and (Mostly) Don’t Last August 26, 2024
- British Library reveals £400,000 plan to rebuild after “catastrophic” ransomware attack August 23, 2024
Recent Comments
- Examining Arab and Muslim librarians in fiction – Pop Culture Library Review on Librarian Combats Muslim Stereotypes
- St. Paul libraries face moment of reckoning – LISNews – News For Librarians on Secret and mysterious libraries
- Ellie on Just How Gross Are Library Books, Exactly?
- Prodigious1one on The Teaching Librarian Versus The Teacher
- Jason on Ten Stories That Shaped 2019
- centaurea on Libraries using Internet Trust Tools
LISNews Archives
- September 2024 (3)
- August 2024 (6)
- March 2024 (1)
- December 2023 (1)
- November 2023 (5)
- October 2023 (1)
- September 2023 (1)
- August 2023 (22)
- February 2023 (3)
- January 2023 (20)
- December 2022 (6)
- February 2022 (3)
- December 2021 (1)
- December 2020 (1)
- July 2020 (11)
- June 2020 (11)
- January 2020 (1)
- December 2019 (2)
- November 2019 (4)
- October 2019 (1)
- June 2019 (1)
- May 2019 (4)
- April 2019 (3)
- March 2019 (11)
- February 2019 (41)
- January 2019 (31)
- December 2018 (6)
- November 2018 (11)
- October 2018 (15)
- September 2018 (9)
- August 2018 (22)
- July 2018 (1)
- June 2018 (1)
- May 2018 (7)
- April 2018 (8)
- March 2018 (5)
- February 2018 (17)
- January 2018 (13)
- December 2017 (8)
- November 2017 (16)
- October 2017 (18)
- September 2017 (11)
- August 2017 (8)
- July 2017 (8)
- June 2017 (21)
- May 2017 (39)
- April 2017 (22)
- March 2017 (15)
- February 2017 (21)
- January 2017 (40)
- December 2016 (20)
- November 2016 (9)
- October 2016 (20)
- September 2016 (48)
- August 2016 (48)
- July 2016 (55)
- June 2016 (61)
- May 2016 (39)
- April 2016 (67)
- March 2016 (81)
- February 2016 (85)
- January 2016 (69)
- December 2015 (90)
- November 2015 (126)
- October 2015 (107)
- September 2015 (85)
- August 2015 (42)
- July 2015 (32)
- June 2015 (35)
- May 2015 (39)
- April 2015 (14)
- March 2015 (60)
- February 2015 (75)
- January 2015 (44)
- December 2014 (30)
- November 2014 (39)
- October 2014 (43)
- September 2014 (30)
- August 2014 (36)
- July 2014 (59)
- June 2014 (46)
- May 2014 (62)
- April 2014 (58)
- March 2014 (52)
- February 2014 (37)
- January 2014 (42)
- December 2013 (41)
- November 2013 (25)
- October 2013 (43)
- September 2013 (28)
- August 2013 (32)
- July 2013 (61)
- June 2013 (51)
- May 2013 (50)
- April 2013 (52)
- March 2013 (68)
- February 2013 (62)
- January 2013 (62)
- December 2012 (53)
- November 2012 (64)
- October 2012 (111)
- September 2012 (109)
- August 2012 (128)
- July 2012 (57)
- June 2012 (75)
- May 2012 (163)
- April 2012 (158)
- March 2012 (109)
- February 2012 (125)
- January 2012 (136)
- December 2011 (109)
- November 2011 (74)
- October 2011 (82)
- September 2011 (95)
- August 2011 (106)
- July 2011 (93)
- June 2011 (102)
- May 2011 (94)
- April 2011 (105)
- March 2011 (100)
- February 2011 (92)
- January 2011 (110)
- December 2010 (124)
- November 2010 (83)
- October 2010 (118)
- September 2010 (115)
- August 2010 (110)
- July 2010 (108)
- June 2010 (113)
- May 2010 (78)
- April 2010 (121)
- March 2010 (191)
- February 2010 (182)
- January 2010 (168)
- December 2009 (129)
- November 2009 (116)
- October 2009 (131)
- September 2009 (149)
- August 2009 (162)
- July 2009 (166)
- June 2009 (189)
- May 2009 (112)
- April 2009 (164)
- March 2009 (185)
- February 2009 (151)
- January 2009 (173)
- December 2008 (200)
- November 2008 (155)
- October 2008 (252)
- September 2008 (267)
- August 2008 (193)
- July 2008 (208)
- June 2008 (161)
- May 2008 (208)
- April 2008 (253)
- March 2008 (201)
- February 2008 (246)
- January 2008 (185)
- December 2007 (200)
- November 2007 (208)
- October 2007 (241)
- September 2007 (227)
- August 2007 (269)
- July 2007 (201)
- June 2007 (205)
- May 2007 (157)
- April 2007 (217)
- March 2007 (250)
- February 2007 (183)
- January 2007 (181)
- December 2006 (163)
- November 2006 (180)
- October 2006 (170)
- September 2006 (215)
- August 2006 (210)
- July 2006 (202)
- June 2006 (257)
- May 2006 (280)
- April 2006 (271)
- March 2006 (347)
- February 2006 (284)
- January 2006 (300)
- December 2005 (267)
- November 2005 (238)
- October 2005 (364)
- September 2005 (349)
- August 2005 (377)
- July 2005 (382)
- June 2005 (403)
- May 2005 (371)
- April 2005 (420)
- March 2005 (367)
- February 2005 (368)
- January 2005 (346)
- December 2004 (311)
- November 2004 (260)
- October 2004 (308)
- September 2004 (228)
- August 2004 (319)
- July 2004 (395)
- June 2004 (338)
- May 2004 (288)
- April 2004 (364)
- March 2004 (348)
- February 2004 (438)
- January 2004 (266)
- December 2003 (222)
- November 2003 (226)
- October 2003 (281)
- September 2003 (317)
- August 2003 (315)
- July 2003 (278)
- June 2003 (282)
- May 2003 (265)
- April 2003 (271)
- March 2003 (249)
- February 2003 (283)
- January 2003 (210)
- December 2002 (186)
- November 2002 (184)
- October 2002 (222)
- September 2002 (210)
- August 2002 (207)
- July 2002 (184)
- June 2002 (166)
- May 2002 (160)
- April 2002 (195)
- March 2002 (183)
- February 2002 (195)
- January 2002 (203)
- December 2001 (203)
- November 2001 (238)
- October 2001 (183)
- September 2001 (153)
- August 2001 (204)
- July 2001 (243)
- June 2001 (176)
- May 2001 (92)
- April 2001 (116)
- March 2001 (153)
- February 2001 (142)
- January 2001 (131)
- December 2000 (110)
- November 2000 (124)
- October 2000 (128)
- September 2000 (132)
- August 2000 (138)
- July 2000 (166)
- June 2000 (135)
- May 2000 (120)
- April 2000 (121)
- March 2000 (181)
- February 2000 (163)
- January 2000 (54)
- November 1999 (37)
From the bottom of the infotoday link
Dynix is already working on such an option. What I really wonder is how well this would be adopted?
That’s funny…
I mentioned this very idea here, a year or two ago. I’m glad someone finally got off their ass….
— Ender, Duke_of_URL
Re:That’s funny…
That is funny, I thought of that when I read this one Slashdot, and then completely forgot to go hunting for that. You should’ve registered that idea!
Skeptical
At least in Illinois, I think that this would require legislation, based on my reading of the Illinois Compliled Statutes, since library districts are set up for taxpayers and residents of library municipalities and districts.
Mary at LibraryLaw Blog has already commented on it, but doesn’t address my concerns.
2001… at least…6 53428 294-2,00.html
http://www.lisnews.com/article.php3?sid=200112041
http://wired-vig.wired.com/news/politics/0,1283,4
I was thinking about it at least as early as 2001, when I submitted this story.
However, my long comment doesn’t appear in google searches, and it appears that some comments have been lost… 🙂
That stuff may or may not be backed up in local files somewhere, but chances are very low.
Some things I wrote up just today:
http://www.infotoday.com/cilmag/jun05/Ostrowsky.sh tml
Some things that aren’t addressed:
———————————
* Float money as revenue source.
* Cost for issuing the card.
* Security issues – some cash cards, phone cards have been scammed in the past.
Things I liked that I hadn’t thought of:
—————————————
* $1 cash card good for requesting items to be held, put on loan from other libraries, etc.
Things I would do:
—————–
Make cards valid for 1 year. You can bring them in after 1 year, and before 2 years is up, and get a new card (or the same card, if there’s no problems) reissued at that point (allowing you to get new security in place, etc) for the same value.
This would also allow someone to claim a lost card: they submit the card number, and the current cash value, and then wait for the 2 year expiry date.
If you are going to track checkout history, then you can also make a person detail the checkout history of the card to negate it, etc… But I find that to be liable to scamming other people, if you allow private sales (see below). If you disallow private sales, then you can maintain control over stolen cards: someone cannot sell a card to another person. It says no private sales on the card – because the person doing the selling can come in and get the card canceled by reciting the history on the card, or password or whatever, after collecting the cash from the victim.
If you do this, then you can cancel cards when people present them for use, if the card is reported as stolen, etc.
Legal disclaimers, need to be done. Not responsible for loss, theft, etc.
Money does not come back out of cards – ever, which makes it less likely that they’ll become the target of theft – and guarantees that the library will never lose that money. However, if you do this, then you are guaranteeing that people will privately sell their cards, since there’s no way that you can require the library to be the only person selling cards (which was one way, above to limit theft).
Book costs need to include not only the *replacement* cost of materials (different for out-of-print books), but the cost of putting them into catalogs, etc
You need at least two additional codes within check-out stuff: value of item, and whether or not it can be checked out (rare, out-of-pring, reference, etc. cannot be checked out)
You probably will also need an automated, preferably 24hr way to determine how much money is currently available on a specific card.
You also need a verified return area, since there’s no way for a card person to find out stuff, that you can with the ID system. Sometimes books get lost/stolen out of return bins.
You also run into issues with damaged materials, etc.
Material’s prices must be recorded locally, and not on the materials themselves, where they are susceptable to alteration.
— Ender, Duke_of_URL