Libraries at University of Nebraska-Lincoln


Date of this Version

Winter 1-1-2019


  1. Ajegbomogun, FO. (2004).Users assessment of library security: A Nigerian university case study. Library Management, 25(8/9), 386-390.
  1. Ajala, I. O. and Oyeboade, S. A. (2008).Theft and Mutilation of Library Materials in Nigerian Academic Libraries.Library and Archival Security. 21(1), 21-32.
  1. Association of College & Research Libraries. RBMS Security Committee, Guidelines for the security of rare books, manuscripts and other special collections. C & RL News,Jul/Aug (2006) 426-433.
  1. Bello, M. A. (1998). Library security, materials theft and mutilation in technological university libraries in Nigeria.Library Management. 19(6),379 – 383.
  1. Boss, R. (1984)Collection security.Library Trends. 18 (1),39-48.
  1. Griffiths, R and Krol, A. (2009). Insider Theft Reviews and Recommendations from the Archive and Library Professional Literature. .Library and Archival Security.22 (1), 5-18.
  1. Holt, G. E. (2007).Theft by library staff.The bottom line: Managing library finances. 20 (2), 85-92.
  1. Jackson, M. (1992).The National Framework: The role of National Preservation Office. Security and Crime Prevention in Libraries.217-230.
  1. Jaiwantrao, G. (2013).Library crime & vandalism in engineering college libraries in Marathwada region: A case study.Rajasthan,Shri Jagdish Prasad JhabarmalTibrewala University Vidyanagari, Jhunjhunu,.
  1. Lopez, K. E. (2003).People, buildings, and collections: Innovations in security and preservation.Journal of Library Administration. 38(3/4), 169-173.
  1. Lorenzen, M. (1996).Security issues of academic libraries.ERIC Document. No. ED396765
  1. Maidabino,AA. (2011).Collection security management at university libraries: assessment of its implementation status.Malaysian Journal of Library & Information Science. 16(1),15-33.
  1. Maidabino, AA. (2012).Theft and mutilation of print collection in university libraries: A critical review of literature and proposed framework for action. Annals of Library and Information Studies. 59,(2) 240-246
  1. Martell, C. (2010).Theft and Its Effects on Our Neighborhood Libraries. Public Library Quarterly.20,30-38.
  1. National Assesment and Accreditation Council, Bangalore: Guidelines on Quality Indicators in Library and Information Services, (Accessed on 19 January 2017).
  1. Rude, R. and Hauptman, R. (1993).Theft, dissemination and trespass:Some observations on security.Library and ArchivalSecurity. 12 (1), 18-21.
  1. SCOTT(Sarah H). The Problem of Theft in Libraries and Strategies for Prevention and Response.San José State University. 2008;


(Accessed on 7 February, 2017).

  1. THANUSKODI (S). The environment of higher education libraries in India. Library Philosophy and Practice. 2009;

Available: on 25 January, 2017).

  1. Trapskin, B. A. (2008).Changing of the guard: Emerging trends in public library security. Library and Archival Security.21 (2), 69-76.
  1. Ugah, A D. (2007)Obstacle to information access and use indeveloping Countries.Library Philosophy and Practice.

Available: on 28 January, 2017).


Academic libraries are the “heart” of the learning community, providing a place for Users and advance their knowledge. Simmonds, (2001). Libraries must be safe from security threats and physical weakness. To secure and protectthe collections will facilitate to libraries give an efficient service in response to theinformation required of the university community



To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.