Libraries at University of Nebraska-Lincoln

 

Date of this Version

7-11-2016

Citation

Ademola, A. E. (2011). Insurance coverage in Nigerian academic libraries. Library Philosophy and Practice. 523. Retrieved fromhttp://digitalcommons.unl.edu/libphilprac/523

Akor, P. U. (2013). Security management for prevention of book thefts in university libraries: A case study of Benue state university library, Nigeria. Library Philosophy and Practice (e-journal). Paper 995. Retrieved from: http://digitalcommons.unl.edu/libphilprac/995

Shahid, S.M. (2005). Use of RFID technology in libraries: A new approach to circulation, tracking, inventorying, and security of library materials. Library Philosophy and Practice 8 (1). Retrieved from: http://unllib.unl.edu/LPP/shahid.htm

Holt, G.E. (2007). Theft by library staff.The bottom line: Managing Library Finances 20 (2), 85-93.

Broadhead, R.M. (2002). Theft in Academic libraries. New York: New LibraryWorld.

Brown, K.E. (2007). Collection security: Planning and prevention for libraries and archives. Technical Leaflet Emergency Management. Section 3 Leaflet 12: 1-13. Retrieved from: http://www.nedee.org.

Ebunuwele, G. E.,Yaya, J. & Krubu, D. E. (2011). User delinquency in Nigerian academic libraries: An empirical perspective. Library Philosophy and Practice (e-journal).Paper 558. Retrieved from: http://digitalcommons.unl.edu/libphilprac/558

Mccomb, M (2004). Library Security. Libris Design Project supported by the U.S. Institute of Museum and Library California. Retrieved from: http://www.librisdesign.org.

Momodu, M.A. (2002). Delinquent readership in selected urban libraries in Nigeria.Library Review 51 (9): 469-473.

Thomas, M.A. (2000). Redefining library space: Managing the co-existence of books, computers, and readers. Journal of Academic Librarianship 26 (6): 408-415.

Oder, N. (2004). Fallout from Philadelphia attack: More security. Library Journal 129. 9.

Ramana, Y.V. (2007). Security in libraries need surveillance and Biometrics, 5th International Caliber, Panjab University, Chandigarh.

Shuman, B. A. (2002). Personal Safety in library buildings: Levels, problems and solution. The Reference Librarian 36(76) 67.

Senyah, Y. & Lamptey, R. B. (2011). Personal security and safety in academic libraries: A case study of the Kwame Nkrumah University of Science and Technology library, Kumasi, Ghana, Library & Archival Security 24 (2), 83-102.

Abstract

The aim of the study was to assess the security measures put in place to protect patrons of Sam Jonah Library of University of Cape Coast. The descriptive survey design was used in collecting and analyzing data. A questionnaire and interview guide was used to solicit information from respondents. The study adopted the convenient sampling technique for drawing respondents for the study. Data collected were analyzed using descriptive statistics which involved frequencies, tables and percentages. Content analysis was used to analyze the qualitative data. The findings of the study showed that the security breaches that could happen in the library environment include; property theft, verbal abuse, pickpockets, nuisance phone calls and harassment by staff. It was also found out that the major breaches that patrons had actually experienced were; property theft (laptops, mobile phones, calculators and pen drives), nuisance phone calls from fellow users and harassment by staff. It was again discovered that there was no policy on securing the patrons of the library. It was further revealed by management that there were not enough measures put in place to ensure the safety of users even though a conscious effort is being made. In relation to the challenges to securing the safety of users, it was found out that inadequate funds to purchase ICT based security equipment, inadequate security personnel at the entry and exit of the library and inadequate attention placed on the security of users. Also, a patron not being able to differentiate between a library staff and a patron was another challenge. Based on the findings and conclusions of the study, it is recommended among other things that management should install functional closed circuit television cameras, enough staff to patrol in and around the library and proper identification to differentiate library staff from patrons.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.