Library Resources and Security Challenges

Library Resources and Security Challenges

Library Resources and Security Challenges

 

Abstract of Library Resources and Security Challenges

This research project is on Library Resources and Security Challenges in the Library of Federal Polytechnic Nekede, Owerri. Data was collected using questionnaire designed and distributed to the staff of the library used as case study. In analyzing and presenting of the data collected, tables, frequencies and simple percentage (%) were used. The findings showed that the library is faced with different types of security challenges which are book theft, non-return of library materials, book mutilation, keeping books beyond due dates, purposeful mis-shelving of books, writing on or in books etc. Recommendations made in this study includes that there should be increased security in the library premises and library hall through supervision, patrolling and surveillance, libraries should be designed in such a way that collection security is taken into account, libraries should install goods and working electronic security gadgets in the library and its environs. The researcher suggested that further study should be carried out on; the need to observe library rules and regulations, preservation and conservation of library resources, securing the digital libraries against security breaches as these suggestions will further help to prevent the library and its resources against any form of security challenge.

                          

Chapter One of Library Resources and Security Challenges

INTRODUCTION

Background to the Study

Libraries as a store house of knowledge and information must be safe from security threats and vulnerability.
Academic library collections are broad and varied. Academic libraries support the educational community through access to its collections. Borrowing privileges is an important means of giving access to the library’s collections for personal, educational and socio-economic advancement.
Gelfand (2005) posit that the library is the only centralized location where new and emerging information technologies can be combined with knowledge resources in a user-focused, service, rich environment that support today’s social and educational patterns of learning, teaching and research. Library services can only be achieved through the availability of library collections. Anuobi and Okoye (2008) state that “academic libraries are faced with hybrid challenges of managing resources and are challenged to acquired the necessary skills needed for the adequate security of the library’s collection or resources both in print and non-print format.
Chaney and MacDougail (2004) states that collections are vulnerable to abuse of one sort or another and library managers need to keep this characteristic well to the forefront of the library. Ensuring effective use, longevity and accessibility of library resources makes an effective programme of collection security necessary.
Antiwi (2009) state that book theft (stealing of books) was already a great challenge to the library. Book theft started when the Persians went to Egypt and with one word drew papyrus from the Library of Ramses II without stopping for any formalities at the charging desk. They thus began this illegal practice which has continued to torment libraries ever since (Antiwi, 2009). Oyewusi and Oyeboade (2009) discuss the importance of access to collections in supporting the mission of the university. Their research view the importance of good collections as they point to the need for safety and security for those collections.
Collection security refers to a process designed to protect library collections against un-authorized removal or loss. This involves protecting resources against disasters as well as thieves or intruders (Ajegbomogun, 2004). Information security governance is the manner in which information security is deployed, Da Veiga and Eloff (2007). Collection security management in libraries can be conceptualized to mean the overall manner in which collection security policies, programmes, procedures, or measures are deployed to mitigate risk and ensure access.
Crime is increasing in a spectacular and frightening rate in academic libraries, vandalism, mutilation, defacement, theft, hiding of books, verbal and physical abuse, harassment and other criminal activities are some of the challenges regularly encountered by the library resources and the library staff. It is therefore vital that today’s academic libraries be positioned to be able to confront these challenges in an objective, analytical and professional manner without displeasing the library users. The act of stealing, mutilation and vandalization of library resources is no doubt spreading among library users. These negative acts not only cause some immediate damage but also have longer effect on those who witness them and the library’s collection at large.

Statement of the Problem

Library resources are usually mutilated, stolen and vandalized by some delinquent users. The extent of these challenges varies from one library to the other but seems to be a universal problem. Libraries should therefore ensure that there is high rate of security of their resources. Academic librarians and information managers must have a clear focus and vision on the reality of these security breaches in academic libraries in other to successfully manage a flourishing and efficient library and resources/research centre.

Objectives of the Study

The following are the researcher’s objectives of the study:
i. To determine the existence of security policy in the academic libraries.
ii. To find out if adequate security of library resources is necessary in an academic library.
iii. To find out the type of library resources security breaches perceived by the respondents.
iv. To identify in general the types of collections which are more vulnerable to security breaches.
v. To find out the measures the library used to reduce and address security breaches in academic libraries.
vi. To identify the challenges to library resources security management.

Similar Posts