Abstract

This study was carried out to investigate information resource security threat in university libraries in Katsina State. The objectives of the paper were to identify the types of information resources threat available and the measures taken to solve the issue of information resource security threat in university libraries in Katsina state. The paper employed a qualitative methodological approach using a narrative-based design. The population of the study comprises nine (9) participants selected from the libraries under study. A narrative-based analysis was adopted to analyze the data collected. The study established that theft of library collections, mutilations of the library collection, disruptive patrons’ behavior,natural disaster and artificial disaster, poorly secured premises, library staff attitude and ignorance of security issues were types of information resources threat in the university libraries in Katsina State. The study also established that windows and doors protection, a mark of ownership, checking in and checking out, recruitment of more library staff and security personnel, and use of telecommunication system e.g.,electronic access control, CCTV, RFID were the measures taken to solve the issue of information resources threat in the university libraries in Katsina State. Based on the findings of the study, the paper therefore recommends that university libraries should have a written collection development policy that covers security measures that will help other new staff and the academic community to know what is on the ground for them to follow strictly. The study further concludes that, the libraries should provide a perimeter alarm system, electro-magnetic control system, firewall installation, radio frequency identification system, and electronic access control in the university libraries, and security entrance of every university library should be managed by well-trained and qualified professionals to save resources from any act of mismanagement or security threat of information resources

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.