Strategies for Combating Book Theft and Vandalism in Academic Libraries
CHAPTER ONE
OBJECTIVE OF THE STUDY
In this research it is assumed
- That there are delinquent users in academic libraries in institutions of higher learning including the two under study
- Actions of these delinquents tend to vandalize library materials.
- That is the duty of the academic libraries to find means of curbing vandalism which constitute a magnitude of book theft, book mutilation and destruction to library property such as window furniture etc.
CHAPTER TWO
REVIEW OF RELATED LITERATURE
Policies for Strategies for combating vandalism in Academic Libraries
Before any security measures could be put in place, it is important to assess the security needs of the institution and determine the possible effects of security procedures on staff, users, and information resources. A security policy should address the physical security, such as building and perimeter security; security access for example, access by staff and users to storage areas, security during lending and transport; exhibition security; security of computer systems including authorised to and authorised manipulation of data. The need to safeguard the information resources will influence the way in which it is housed. High security areas are often needed, but security that is too strict can defeat itself in the case of a sudden emergency. A sensible policy of controlled access should be in place whenever any secure storage plan is planned. A security policy must include the users, and state for example, limitation of access to original information resources in favour of surrogates. It should also state clearly the responsibility for security of the information resources, both those of the staff and of the users. Procedures to be followed in case of a breach of security should be clearly set out, as should procedures for preventing, and coping with disasters. Traditional library collections contain a wide range of organic materials, including paper, cloth, animal skins and adhesives. Such organic substances undergo a continual and inevitable natural ageing process. While major steps can be taken to slow this deterioration by careful handling and providing a sympathetic environment, once a security assessment has been completed, the next task is to implement specific security measures, in order to reduce risk. The main risks to information resources are fire, flood, or other physical damage, as well as theft or vandalism. All information resources require a basic standard of care, but some require more attention and protection because they are difficult or impossible to replace. Information resources irrespective of medium and format require protection throughout their life, but issues of storage and handling are most urgent in the archival environment. Marisol (2004) observed that academic libraries in particular, assume a focal point where users‟ interests have to converge to utilise all the available resources that are relevant to their individual needs. As a result of this diverse use of the materials, these libraries stand to be vulnerable to all forms of crime and security risks from not only the users, but library staff as well.
The preservation policy lays down the criteria for the academic libraries to achieve optimum preservation standard. The policy should be flexible, subject to change to take account of future preservation demands and development.
CHAPTER THREE
RESEARCH METHODOLOGY
Research Design Adopted for the Study
The qualitative research method using a case study design was adopted for this study. Green and Thorogood (2009) referred to qualitative research as being characterized by its aims, which relate to understanding of social life, and its methods which (in general) generate words, rather than numbers, as data for analysis.
Population of the Study
The population of this study consisted of 297 Library staff, comprising Professional and Para-professional those were directly or indirectly involved in the preservation and security of information resources in twelve academic libraries in FUTO and NEKEDEPOLY, A preliminary survey of the libraries found that there were 86 professionals and 211 paraprofessionals in the library.
In this case study, the researcher‟s choice of purposive selection of the sample of one hundred and thirty library staff was done systematically and rationally in such a way as to ensure that the sample included participants in all the units of the libraries such as technical services unit, system unit, and reader services unit, in order to guarantee credibility.
Sample Size and Sampling Procedure
All the academic libraries in FUTO and NEKEDEPOLY were studied, and 130 library staff out of 297 were purposively selected for interview in a systematic and rational way. This means participants were selected from units or sections of the libraries which were responsible for strategies for combating vandalism, and because they were likely to generate useful data for the research work.
CHAPTER FOUR
DATA PRESENTATION, ANALYSIS AND DISCUSSION
Table 4.1 reveals that among the items categorized under the types of collection security breaches in the library, 98.5% of the respondents agreed that noise making in the library is usually high and 96.1 % of them indicated that mis-shelving of library resources is always observed. Over ninety percent (92.3%) of the respondents disclosed that book mutilation usually occur in the libraries studied. Over seventy percent (76.9%) of them stated that the rate of book theft is high in the libraries studied, while 69.2% of them reported that non- returning of borrowed books is commonly observed.
Also, 65.4% of the respondents revealed that eating in the library by the users is one of the security breaches observed in the libraries, while 46.2% stated that using fake identity cards to borrow books is also a security breach observed in the libraries. The picture drawn from Table 1 shows that majority of the respondents agreed that noise making in the library, mis-shelving of library books, mutilation of library resources and book theft are high in both F.U.T. and C.O.E libraries studied. This finding is similar to Broadhead’s (2002) who observed that delinquencies are actions that are illegal or immoral that users carry out during the process of consulting library books and other materials.
CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATIONS
Conclusion
One can therefore conclude that since the level of security and crime challenges in FUTO and NEKEDEPOLY libraries is not encouraging there is need for all hands to be on deck in order to eradicate these vices. This effort would help to strengthen the life span of the information resources in these libraries. The information resources would no longer be de-faced, mutilated, mis-shelved or completely stolen from the library. The eradication of these vices would in turn encourage students to effectively use their academic library in order to achieve their educational objectives.
Recommendation
(1) Written security policy should be placed on notice boards of FUTO and NEKEDEPOLY libraries for users’ benefits.
(2) Proper shelving and shelve- reading should be encouraged in FUTO and NEKEDEPOLY libraries to ease users’ information search and discourage stealing habit.
(3) Photocopying machines should be provided at affordable prices in and around FUTO and NEKEDEPOLY libraries.
(4) Users should be thoroughly searched before entering and leaving the premises of FUTO and NEKEDEPOLY libraries.
(5) Orientation of users and staff should be done regularly in the two academic libraries in order to impart user education into library users.
(6) Staff training on how to prevent the culprits from perpetuating the act within and outside the academic libraries.
(7) Electronic security system should be introduced in these libraries especially in C.O.E. library.
Based on the findings of this case study, it can be concluded that academic libraries in FUTO and NEKEDEPOLY have good methods for preserving and securing information resources for research and learning. However, they paid more emphasis on printed materials, with less use of digital preservation methods and electronic security systems. It was therefore obvious that the libraries were yet to embrace the opportunities offered by technological advancement for strategies for combating of their information resources. Suffice to say that the need to mitigate various threats using current technological innovations such as digitization, migration, and electronic security systems in order to stop any possible loss of materials can never be overemphasized. This will obviously enhance access by users to quality information resources for research and learning in the tertiary institutions of FUTO and NEKEDEPOLY.
REFERENCES
- Abioye, A. (2008). Education and Training in Preservation and Conservation. Paper Presented at the 1st National Heritage Preservation Conference Held in Abuja, Nigeria from 19th-22 February, 2008.
- Adebowale, T. O., Okiki, O. C. and Yakubu, E. D. (2013) Circulation Activities In Tertiary Institutions In Nigeria: A Discourse On Circulation Transactions Of Yaba College Of Technology Library Information and Knowledge Management Vol.3, No.4, 2013 www.iiste.org
- AES-11id-(2006): AES Information Document for Preservation of Audio Recordings – Extended Term Storage Environment for Multiple Media Archives
- Aina, A. J. (2013) E-Library Approach for Resource Sharing in an Information Communication Technology Era: Issues, Prospects And Challenges International Journal of Library and Information Science Vol. 5(4), pp. 77- 84, Available DOI: 10.5897/IJLIS11.029 http://www.academicjournals.org/IJLIS
- Ajegbomogun, F.O. (2007). Users‟ Assessment of Library Security: A Nigerian University Case Study. Library Management, Vol.25, no.8/9: 386-390.
- Akande, S. O. (2009). Knowledge, Perception and Attitudes Of Library Personnel Towards Preservation Of Information Resources In Nigerian Federal University Libraries. Library Philosophy and Practice. http://www.vidaho.edu/mbolin.htm on 21st January, 2014 (pdf.).
- Akor, P. U. (2013) Security Management for Prevention Of Book Thefts In University Libraries. A Case Study of Benue State University Library, Nigeria”. Library Philosophy and Practice (e-journal). Paper 995. http://digitalcommons.unl.edu/libphilprac/995.
- Akussah, H. (2008). The Preservation of Traditional Library Materials in the Harsh Ghanaian Environment. African Journal of Archives, Library and Information Science, 1 (1), 19-28.
- Alegbeleye, B. (2008). Past Imperfect, Present Continuous, Future Perfect: The Challenges Of Preserving Recorded Information In Nigeria. An Inaugural Lecture Delivered at The University of Ibadan on Thursday, 24th January 2008. Ibadan: Ibadan University Press.
- Alhassan, J. A. and Abdulsalam, R. M. (2013). Acquisition And Management of Government Documents in the National Library of Nigeria African Educational Research Journal Vol. 1(3), pp. 191-197, November 2013, ISSN: 2354-2160