Libraries at University of Nebraska-Lincoln

 

Date of this Version

Winter 12-5-2019

Citation

Reference

Abdullah, H. (2011). User’s deliquency and its effect on their performance. Delhi: Ruska Publishing House Pvt. Ltd.

Ajayi, G. O. (2000). Challenge to Nigeria of globalization and the information age. A keynote address at the Workshop on National Information Communication Infrastructure (NICI) Policy Plans and Strategies for Implementation, Maitama, Abuja.

Ajidahun, C.O. (2010). Theft of Law Books in Nigerian University Law Libraries: An Investigative Study. Library Philosophy and Practice. Paper 411: p 2. http://digitalcommons.unl.edu/libphilprac/411.

Akussah, H and Bentil, W. (2010). Abuse of library materials in academic libraries: a study of the University of Cape Coast Main Library. African Journal of Library and Information Science Vol 20, no 2: p103-112.

Dictionary of Library and Information Science. (2011). A.P.H. Publishing Corporation,4435-36/7, Ansari Road, Darya Ganj New Delhi-110-002

Edoka, B.E. (2000). Introduction to library science. Onitsha: Palma Publishing

Emmanuel, G and Sife, A. S (2008). Challenges of Managing Information and Communication Technologies for Education: Experiences from Sokoine National Agricultural Library. International Journal of Education and Development using Information and Communication Technology 4 (3): 137- 142.

Eruvwe, U., Akpojotor, O. L., and Okonoko, V. N. (2015). Defiant attitude among library users in Federal University of Petroleum Resources Library Effurun (FUPRE) Nigeria. Information and Knowledge Management (Online), 5 (3), 131-141.

Ewing, D. (1994). Library security in the UK: Are our libraries of today used or abused? Library Management 15 (2): 18-26.

Goldstein, P.J. (2006), The Future of Higher Education: A View from CHEMA, Council of Higher Education Management Associations, Washington, DC., 21 www.appa.org/fi les/pdfs/appa39a_screenopt.pdf. Accessed 10 November, 2012

Holt, G.E. (2007). Theft by Library Staff. The Bottom Line of Managing Library Finances 20 (2): 85-92.

Jato, M. (2005). Causes and effects of delinquent behaviour in academic libraries (Kenneth Dike Library as a case study). Owena Journal of Library and Information Science 2(1): 25-34

Lorenzen, M. (1996). Security in the public libraries of Illinois. Illinois Libraries 79.1: 21-22.

Lorenzen, M. (1996). Security Issues of Academic Libraries. ERIC Document. No. ED396765.

Mehay, S.T (2001). New Users Orientation and Training. Dakota: Danib Roschier

Nwalo, K. (2000), Managing Information for Development in the 21st Century: Prospects for African Libraries, Challenges to the World. Proceedings of the 66th IFLA Council and General Conference Jerusalem, Israel, 13-18 August 2000.

Ogunsola, L. .A. (2004). Nigerian University Libraries and the Challenges of Globalization: The Way Forward. Electronic Journal of Academic and Special Librarianship 5: .2-6.

Oyesiku, F. A., Buraimo O., and Olusanya, O. F. (2012). Disruptive readers in academic libraries: A study of Olabisi Onabanjo University Library. Library philosophy and practice (Online). Retrieved June 1, 2016 from http://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1840&context=libphilprac

Ratcliffe F.W. (1992). Changing times? Crime and Security as a Major Issue in Libraries. In Chaney, M., & MacDougall, A.F. (Ed.). Security and Crime Prevention in Libraries. Hants: Gower: 1-12.

Ugah, A.D. (2007). Obstacles to information access and use in developing countries. Library Philosophy and Practice. Available: http://unllib.unl.edu/LPP/ugah3.htm .

Whitaker, K. (2009). The Basics of Library-based User Services.Michigan; Library Association, 133.

Abstract

Abstract:

This study was carried out to assess the deviant behaviours of library users and potential strategies for the control of these behaviours. The study covers Delta State University, Abraka and Federal University of Petroleum Resources, Effurun. A descriptive survey research design was adopted for the study with a population of 1216 library users which comprises both staff and students. 365 respondents were selected via the random sampling technique which is 30% of the total population. Four research questions were posed to guide the study. The instrument adopted for data collection was a structured questionnaire. Out of the 365 questionnaires distributed to the respondents, 314 questionnaires were retrieved and found usable for the study. In analyzing the data obtained, percentage, frequency, pyramid and bar charts were used. The results obtained from the findings revealed that the major deviant behaviour engaged by users of the library are answering calls in the reading hall, smuggling food and drinks into the library, mutilation/ defacing library books. Majority of the respondents indicated they engage in such acts because they are ignorant of the library rules and behaviour, ignorant of the gravity of the offense. The study also revealed that the extent to which users engage in such behaviours is very low. The strategies that could be employed to control the persistence of these behaviours as indicated in the study are proper orientation of new library users especially on library rules and regulations, during instruction classes more emphasis should be put on library rules and regulations, and the implication of engaging in such behaviours should be properly spelt to users during the registration stage to mention but a few. The study recommends the following: Proper orientation of library users during registration and instruction classes; Sanction of deviant users should be implemented to checkmate deviant users; Disciplinary procedure such as fine, penalty etc should also be implemented and Security measures should be employed.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.