Library Resources And Security Challenges

(A Case Study Of The Library Of Federal Polytechnic Nekede, Owerri)

5 Chapters
|
63 Pages
|
9,767 Words

The management of library resources presents a complex array of challenges, encompassing both physical and digital domains. In the physical realm, ensuring the security of collections against theft, vandalism, and damage requires robust surveillance systems, controlled access measures, and staff vigilance. Meanwhile, in the digital sphere, safeguarding electronic resources from unauthorized access, data breaches, and cyber-attacks demands stringent authentication protocols, encryption technologies, and proactive threat detection mechanisms. Moreover, the proliferation of online platforms and remote access services introduces additional vulnerabilities, necessitating continual updates to security protocols and user education initiatives to mitigate risks effectively. Addressing these multifaceted security challenges requires a holistic approach that integrates technological solutions with comprehensive policies, staff training, and community engagement efforts to uphold the integrity and accessibility of library resources in an ever-evolving landscape.

ABSTRACT

This research project is on Library Resources and Security Challenges in the Library of Federal Polytechnic Nekede, Owerri. Data was collected using questionnaire designed and distributed to the staff of the library used as case study. In analyzing and presenting of the data collected, tables, frequencies and simple percentage (%) were used. The findings showed that the library is faced with different types of security challenges which are book theft, non-return of library materials, book mutilation, keeping books beyond due dates, purposeful mis-shelving of books, writing on or in books etc. Recommendations made in this study includes that there should be increased security in the library premises and library hall through supervision, patrolling and surveillance, libraries should be designed in such a way that collection security is taken into account, libraries should install goods and working electronic security gadgets in the library and its environs. The researcher suggested that further study should be carried out on; the need to observe library rules and regulations, preservation and conservation of library resources, securing the digital libraries against security breaches as these suggestions will further help to prevent the library and its resources against any form of security challenge.

TABLE OF CONTENT

Title page
Certification
Dedication
Acknowledgement
Abstract
List of Tables
Table of Content

CHAPTER ONE:
1.0 INTRODUCTION

1.1 Background to the Study
1.2 Statement of the Problem
1.3 Objectives of the Study
1.4 Research Questions
1.5 Scope of the Study
1.6 Significance of the Study
1.7 Historical Background of Federal Polytechnic Nekede, Owerri
1.8 The Polytechnic Library of Federal Polytechnic Nekede, Owerri
1.9 Definition of Operational Terms
References

CHAPTER TWO
2.0 LITERATURE REVIEW

2.1 Introduction
2.2 Concept of Library Resources
2.3 Types of Security Challenges faced by the Library
2.4 The Effect of Security Challenges to the Library
2.5 Causes of Security Challenges in the Library
2.6 Ways to Secure the Library against Security Breaches
2.7 Summary of Literature Review
References

CHAPTER THREE
3.0 RESEARCH METHODOLOGY

3.1 Introduction
3.2 Research Design
3.3 Population of Study
3.4 Sample Size and Sampling Techniques
3.5 Instrument for Data Collection
3.6 Procedure for Data Collection
3.7 Method of Data Analysis

CHAPTER FOUR
4.0 DATA PRESENTATION AND ANALYSIS

4.1 Introduction
4.2 Distribution and Return of Questionnaire
4.3 Distribution of Respondents by Gender
4.4 Educational Qualification of Respondents
4.5 Existence of Security Policy in the Library
4.6 Necessity of Securing Library Resources against Breaches
4.7 Type of Library Security Breaches Perceived in the Library
4.8 Type of Library Materials Vulnerable to Security Breaches
4.9 Measures Used by the Library to Reduce/Address Security Breaches

CHAPTER FIVE
5.0 SUMMARY OF FINDINGS, CONCLUSION AND RECOMMENDATION

5.1 Introduction
5.2 Summary of Findings
5.3 Conclusion
5.4 Recommendations
5.5 Suggested Areas for Further Studies
Bibliography
Appendices
Appendix I – Letter of Introduction
Appendix II – The Questionnaire

CHAPTER ONE

INTRODUCTION
1.1 Background to the Study

Libraries as a store house of knowledge and information must be safe from security threats and vulnerability.
Academic library collections are broad and varied. Academic libraries support the educational community through access to its collections. Borrowing privileges is an important means of giving access to the library’s collections for personal, educational and socio-economic advancement.
Gelfand (2005) posit that the library is the only centralized location where new and emerging information technologies can be combined with knowledge resources in a user-focused, service, rich environment that support today’s social and educational patterns of learning, teaching and research. Library services can only be achieved through the availability of library collections. Anuobi and Okoye (2008) state that “academic libraries are faced with hybrid challenges of managing resources and are challenged to acquired the necessary skills needed for the adequate security of the library’s collection or resources both in print and non-print format.
Chaney and MacDougail (2004) states that collections are vulnerable to abuse of one sort or another and library managers need to keep this characteristic well to the forefront of the library. Ensuring effective use, longevity and accessibility of library resources makes an effective programme of collection security necessary.
Antiwi (2009) state that book theft (stealing of books) was already a great challenge to the library. Book theft started when the Persians went to Egypt and with one word drew papyrus from the Library of Ramses II without stopping for any formalities at the charging desk. They thus began this illegal practice which has continued to torment libraries ever since (Antiwi, 2009). Oyewusi and Oyeboade (2009) discuss the importance of access to collections in supporting the mission of the university. Their research view the importance of good collections as they point to the need for safety and security for those collections.
Collection security refers to a process designed to protect library collections against un-authorized removal or loss. This involves protecting resources against disasters as well as thieves or intruders (Ajegbomogun, 2004). Information security governance is the manner in which information security is deployed, Da Veiga and Eloff (2007). Collection security management in libraries can be conceptualized to mean the overall manner in which collection security policies, programmes, procedures, or measures are deployed to mitigate risk and ensure access.
Crime is increasing in a spectacular and frightening rate in academic libraries, vandalism, mutilation, defacement, theft, hiding of books, verbal and physical abuse, harassment and other criminal activities are some of the challenges regularly encountered by the library resources and the library staff. It is therefore vital that today’s academic libraries be positioned to be able to confront these challenges in an objective, analytical and professional manner without displeasing the library users. The act of stealing, mutilation and vandalization of library resources is no doubt spreading among library users. These negative acts not only cause some immediate damage but also have longer effect on those who witness them and the library’s collection at large.

1.2 Statement of the Problem
Library resources are usually mutilated, stolen and vandalized by some delinquent users. The extent of these challenges varies from one library to the other but seems to be a universal problem. Libraries should therefore ensure that there is high rate of security of their resources. Academic librarians and information managers must have a clear focus and vision on the reality of these security breaches in academic libraries in other to successfully manage a flourishing and efficient library and resources/research centre.

1.3 Objectives of the Study
The following are the researcher’s objectives of the study:
i. To determine the existence of security policy in the academic libraries.
ii. To find out if adequate security of library resources is necessary in an academic library.
iii. To find out the type of library resources security breaches perceived by the respondents.
iv. To identify in general the types of collections which are more vulnerable to security breaches.
v. To find out the measures the library used to reduce and address security breaches in academic libraries.
vi. To identify the challenges to library resources security management.

1.4 Research Questions
The following research questions were presented for the study:
i. Does the library have an existing security policy that defines what a security challenge is and how to handle it?
ii. Is adequate security of library resources necessary in an academic library?
iii. What type of library resources security breaches does the respondents perceive in the library?
iv. What type of library materials are more vulnerable to security breaches?
v. What are the measures used by the library to reduce and address these security breaches?
vi. What are the challenges to collection security management?

1.5 Scope of Study
The study is on library resources and security challenges in the polytechnic library of Federal Polytechnic Nekede, Owerri. The study focuses particularly on identifying the various types of library resources and their security challenges and ways of reducing these identified challenges.

1.6 Significance of the Study
The researcher intends to contribute significantly to the importance of high rate of security on library resources as these resources contains useful information for human and nation development. Security challenges faced by the library resources militates against the provision of adequate information materials to library users. This work will also serve as a reference material to future researchers and library professionals who wish to write on library resources and security challenges in the libraries.

1.7 Historical Background of Federal Polytechnic Nekede, Owerri
The Federal Polytechnic Nekede Owerri was established in 1978 by the Imo State Government through Edict No. 16 of April 1978 as the College of Technology, Owerri. It took off at its temporary site at the premises of Government Technical College (GTC) Owerri along Egbu Road in the same year. The school in November 1981 was moved to its present and permanent location at Nekede in Owerri. By the Imo State Government Edict No. 6 of 1987, the name of the institution was changed to “The Polytechnic Nekede, Owerri”. Six years after and precisely on 7th April 1993 the school was formerly taken over by the federal government and was renamed by the federal government to “The Federal Polytechnic Nekede, Owerri” which is the institution’s present name.

1.8 The Polytechnic Library of Federal Polytechnic Nekede, Owerri
At the inception of the school in 1978 at its temporary site at Government Technical College (GTC) Owerri, the Chief Librarian of the then College of Technology was appointed on March 1978 and the school open for its classes on 15th December, 1978. The collection of the library in 1981 at the inception of the institution at its permanent site was housed in one of the apartment of the School of Engineering block and was later moved to a new classroom complex on January 1993 by then the permanent site of the library has not been built until 1988 when the foundation stone was laid by the then chairman of the National Board for Technical Education (NBTE) Dr. Abdullahi. The library building was completed in 2000 and commenced users services in 2001. Dr. C. I Osuoji was the then acting rector of the institution in 1993 and later assumed office as the rector in 1996 which lasted till 2000. Mr. Chukwuma Chukwu was appointed the acting registrar while Mr. J. U. Obasi was the acting librarian. Chief Sir Uduma took over from Dr. Osuoji in 2000 as the acting rector and handed over the mantle of leadership to Engr. O. I. Nwankwo who emerged as the 6th substantive digital rector from June 2010. Mr. C. A Omenka acted as the acting rector from July 2010 to September 2010 and handed over to Dr. (Mrs.) Celestina Njoku as the rector from September 2010 till date. Mr. Ifeanyichukwu Oti was the chief librarian from 2010 to 2014, while Chief Christian Enyia is currently the chief librarian of Federal Polytechnic Nekede, Owerri.
The Federal Polytechnic Nekede library has many departments which includes: the administrative department, the technical service department made up of the cataloguing and classification section, collection development section and the bindery and reprographic section, the readers service department made up of the circulation section, reference section, serials section, reserved books section, special collections section and the audio-visual or media unit and currently the library has the E-library or digital library department.
Today the Federal Polytechnic Nekede Owerri Library has about 32,196 (thirty two thousand one hundred and ninety six) volumes of books in its collection according to the school’s curriculum and 3228 (three thousand two hundred and twenty eight) periodical and journal titles. It also has its collections in digital format called audio visuals. The library is also linked to the libraries of other academic institutions both foreign and within the country through its wireless internet connections.

1.9 Definition of Operational Terms
Academic Libraries: These are libraries established in institutions of higher learning such as universities, polytechnics, mono-technics and colleges of education to meet the educational and research objectives of their parent institutions.
Challenges: A new or difficult task that tests ones ability and skills.
Crime: Activities that involves breaking the law. An unlawful act or default which renders the offender guilty of a legal punishment.
Library: This is an institution specifically established for the acquisition, processing, organization, preservation, storage, retrieval and dissemination of information stored in prints and non-prints formats.
Mutilation: This means to damage something or somebody very severely, especially by cutting or tearing off part of it.
Library resources: These are resources stocked in the library to satisfy the reading and research needs of users. They come in either prints or non-print format.
Security: The act or activities involved in protecting something or a person against attack, danger or bad that might happen in the future.
Vandalism: A crime of destroying or damaging something especially public property, deliberately and for no good reason.

SHARE PROJECT MATERIALS ON:

MORE DESCRIPTION:

Library Resources And Security Challenges:

Library resources refer to the materials, facilities, and services offered by a library to meet the informational and educational needs of its users. These resources can include books, periodicals, multimedia materials, digital resources, computer labs, study spaces, and more.

However, offering such diverse resources also poses certain security challenges for libraries. Some of these challenges include:

  1. Theft: Libraries face the risk of theft of their resources. Books, DVDs, and other materials can be stolen or check out without proper authorization. Libraries need to have effective security systems in place, such as security gates, surveillance cameras, and proper staff training to prevent theft.

  2. Vandalism: Library resources are vulnerable to vandalism. This can include defacement of books, tearing out pages, or damaging digital resources. Libraries must prioritize the security of their resources, ensuring they are protected from any intentional damage.

  3. Cybersecurity: With the increasing digitization of library resources, libraries face the challenge of protecting their digital collections from cyber threats. This includes safeguarding against hacking attempts, malware, or unauthorized access to sensitive user data. Libraries must invest in robust cybersecurity measures to protect their digital resources.

  4. Intellectual property rights: Libraries have to navigate the complex landscape of intellectual property rights when providing access to certain resources. They must ensure compliance with copyright laws and licensing agreements to avoid legal challenges related to copyright infringement.

  5. Privacy concerns: Libraries handle sensitive user data, such as personal information, borrowing history, or research inquiries. Protecting user privacy and maintaining confidentiality is critical. Libraries must have policies and procedures in place to safeguard user information from unauthorized access or disclosure.

  6. User safety: Libraries have a responsibility to ensure the safety and well-being of their users. This includes physical safety within the library premises, emergency preparedness, and addressing any potential threats or issues that may arise.

To address these challenges, libraries can implement various security measures, including:

  • Access control systems: Implementing systems such as library card authentication or biometric access can help control access to resources and prevent unauthorized use.

  • Security personnel: Having trained security personnel can help deter theft, monitor the library premises, and respond quickly to any security incidents.

  • Video surveillance: Installing surveillance cameras can help monitor library spaces and deter potential security threats.

  • Security awareness and training: Library staff should receive training on security protocols, emergency response procedures, and the proper handling of sensitive information.

  • Collaboration with law enforcement: Establishing strong partnerships with local law enforcement agencies can help address security concerns and facilitate prompt response to any incidents.

Overall, managing library resources and addressing security challenges requires a proactive and comprehensive approach that combines physical security measures, cybersecurity strategies, staff training, and policy implementation.