LIBRARY SELF SERVICE SYSTEM USING NFC AND 2FA GOOGLE AUTHENTICATOR

  • Mychael Maoeretz Engel Universitas Ciputra Surabaya
  • Henry David Lie Universitas Ciputra Surabaya
Keywords: android, NFC, RFID, self service, website, 2FA

Abstract

The implementation of a self-service system is already used by many libraries, mainly on self-loan books. Self-service generally only uses RFID as a medium for identifying members and borrowed books, but using RFID alone as the head of the identification process may lead to many crimes such as using someone else's member card to borrow books, scam, and so on. This study aims to propose a new business process for self loan books from the library by combining NFC or RFID technology and 2FA (two-factor authentication) to minimize the crimes such as fraudulence, scams, and so on. The results showed that the system or prototype could work and function properly. The process of reading NFC tags and the use of 2F also runs quickly and safely.

Downloads

Download data is not yet available.

References

Badan Pusat Statistik (BPS), “Jumlah Mahasiswa Aktif Indonesia Tahun 2019,” 2019. https://www.bps.go.id/indikator/indikator/view_data_pub/0000/api_pub/82/da_04/1 (accessed May. 18, 2021).

Kemdikbud, “PDDikti - Pangkalan Data Pendidikan Tinggi,” 2019. https://pddikti.kemdikbud.go.id/data_pt/NjhGODA5NDItMkIzRC00MDRCLTk0QjktRDc3NjUxODJDQzlG (accessed May. 18, 2021).

N. Karna, I. Supriana, and N. Maulidevi, “Implementation of e-learning based on knowledge management system for Indonesian academic institution,” in 2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), 2016.

K. Wing, “Use of self-service holds in Maine public libraries,” Publ. Libr. Q., vol. 38, no. 1, pp. 1–18, 2018.

R. Sigwald, “Self-service customer service models in libraries,” J. Libr. Adm., vol. 56, no. 4, pp. 453–478, 2016.

M. Kasavana, “Emergent service delivery technologies,” Journal of International Management Studies, vol. 5, no. 2, pp. 159–167, 2010.

N. Karna, D. Pratama, and M. Ramzani, “Self service system for library automation : Case study at telkom university open library,” in 2019 International Conference on Information and Communications Technology (ICOIACT), 2019.

C. Hu and I. Harris, “RFID in the library: Economic, social and environmental perspectives,” in 2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC), 2016.

I. Markakis, T. Samaras, A. C. Polycarpou, and J. N. Sahalos, “An RFID-enabled library management system using low-SAR smart bookshelves,” in 2013 International Conference on Electromagnetics in Advanced Applications (ICEAA), 2013.

T. S. Huang and K. Aizawa, “Image processing: some challenging problems,” Proc. Natl. Acad. Sci. U. S. A., vol. 90, no. 21, pp. 9766–9769, 1993.

Salesforce, “What exactly is self-service?,” 2021. https://www.salesforce.com/products/service-cloud/what-is-self-service/. (accessed May. 18, 2021).

B. Lutkevich, “What is a Microcontroller and How Does it Work?,” 2019. https://internetofthingsagenda.techtarget.com/definition/microcontroller. (accessed May. 18, 2021).

J. Gautam, Y. Kumar, and A. Gupta, “Existing scenario of near field communication in transport sector,” in 2014 International Conference on Signal Processing and Integrated Networks (SPIN), 2014.

Nxp, “NFC Readers,” 2020. https://www.nxp.com/products/rfid-nfc/nfc-hf/nfc-readers:NFC-READER. (accessed May. 18, 2021).

Serialio, “Common types of NFC tags,” 2020. https://www.serialio.com/support/learn-rfid/common-types-nfc-tags. (accessed May. 18, 2021).

Trustradius, “Relational Databases,” 2019. https://www.trustradius.com/relational-databases. (accessed May. 18, 2021).

D. J. Brooks, “What is security: Definition through knowledge categorization,” Secur. J., vol. 23, no. 3, pp. 225–239, 2010.

T. Contributor, “Single-Factor Authentication (SFA),” 2015. https://searchsecurity.techtarget.com/definition/single-factor-authentication-SFA. (accessed: May. 18, 2021).

L. Rosencrance, P. Loshin, and M. Cobb, “What is two-factor authentication (2FA) and how does it work?,” 2020. https://searchsecurity.techtarget.com/definition/two-factor-authentication. (accessed May. 18, 2021).

M. E. Shacklett and T. Contributor, “Multifactor Authentication (MFA),” 2021. https://searchsecurity.techtarget.com/definition/multifactor-authentication-MFA. (accessed May. 18, 2021).

Onelogion, “OTP, TOTP, HOTP: What’s the Difference?,” 2020. https://www.onelogin.com/learn/otp-totp-hotp. (accessed May. 18, 2021).

A. S. Oktriwina, “Alpha Testing: Definisi, Cara dan Keuntungannya untuk Aplikasi,” 2019. https://glints.com/id/lowongan/alpha-testing/. (accessed May. 19, 2021).

G. N. Arviana, “White box testing: Definisi dan berbagai tekniknya,” 2020. https://glints.com/id/lowongan/white-box-testing-adalah/. (accessed May. 19, 2021).

N. Rahmalia, “Black box testing, uji software penting bagi developer,” 2020. https://glints.com/id/lowongan/black-box-testing/. (accessed May. 19, 2021).

A. S. Oktriwina, “Beta Testing: Pengertian dan Cara Melakukannya,” 2020. https://glints.com/id/lowongan/beta-testing-adalah/. (accessed May. 19, 2021).

Published
2022-06-29
How to Cite
[1]
M. Maoeretz Engel and H. David Lie, “LIBRARY SELF SERVICE SYSTEM USING NFC AND 2FA GOOGLE AUTHENTICATOR”, J. Tek. Inform. (JUTIF), vol. 3, no. 3, pp. 753-761, Jun. 2022.