You are on page 1of 6

IML 551: RESEARCH METHODS FOR LIBRARY AND INFORMATION CENTER

Bibliographic reference
A.A, Maidabino., & A.N Zainab (2011). Collection security management at university libraries: assessment of its implementation status. Malaysian Journal of Library& Information Science, 16(1), 15-33. Retrieved from http://hwwilsonweb.com

Introduction
Objective:
a) Identify the factors that should be considered when assessing the status of collection security implementation in university libraries; b) Map the factors and the items into a collection security management assessment instrument; and c) Test the reliability and validity of the collection security assessment instrument.

Article domain:
This article is mainly telling us about the problems that most university libraries faced which are the security challenges with their collections. It will also discuss about several factors that contributing to the problems such as people factor, physical and technology factor and any other factors that had been identified in contributing to the problems.

Level of difficulties:
Moderate

Audience:
University libraries staff

Journal and conceptual/empirical classification:


This article is considered as an empirical classification because the authors have tested their house model idea on 61 samples comprising chief librarians, deputy librarians, departmental and other staff in 4 university libraries in Nigeria. There are data gathered and result of their survey in the article to prove their idea regarding the problems.

IML 551: RESEARCH METHODS FOR LIBRARY AND INFORMATION CENTER

Foundations
A number of studies have described how crimes and security violation incidences can affect the provision of library services to users. Lorenzen (1996) and Holt (2007) identified several such incidents, (i) theft of physical materials; (ii) theft or alteration of data; and (iii) theft of money as major security crime in libraries. The main reason why this article exists is to test and use the house model that had been proposed by Da Veiga and Eloff (2007) to the target audience. The house model consists of five factors which are the collection security governance, operation and processes, people issues, physical and technical issues and the security culture in libraries. Besides the article is the authors attempt to provide an assessment instrument that can be used by university library managers to access collection security implementation on their libraries.

Brief summary
This article is basically about university library collection security management. Collection security implies the need for libraries to provide, maintain and secure its collection to ensure longetivity, accessibility and effective provision of services to users. In order to achieve this objective, library need an effective and efficient strategy to access the degree of collection security, violation and problems they facing and establish a good level of collection security implementation. The authors try to help library managers by providing an assessment instrument that can be used by the library managers to access the collection security implementation on their libraries. Based on the house model or known as collection security management model (CSMM), the author have made the instrument which is a questionnaire and distributed it to the university library professional staff working in the selected 4 university libraries which are Usman Danfodiyo University Sokoto, Bayero University Kano, Ahmadu Bello University and University of Maiduguri. The instrument consists of six sections in line with the CSMM. The first section contained 14 items that assess the governance aspect of collection security in university libraries. Governance in this context refers to the provision of a set of roles, policies and responsibilities and practices exercised by members of a security team responsible for formulating objectives and policies, ensuring that objectives and policies are achieved, ascertaining that risks are identified and managed appropriately (Omoniyi 2001; Allen and Westby 2007). The second section covers the general processes aspect of collection security 2

IML 551: RESEARCH METHODS FOR LIBRARY AND INFORMATION CENTER such as acquisition and circulation, technical cataloguing, and special collection. All these departments play their own vital responsibilities toward the library collections. The third section focuses on the human or staff training issues. This factor involves the human or people aspects of the model, particularly programs involving staff being trained, retrained and made aware of policies and procedures on collection security management processes. The fourth covers the physical and technological factors and the fifth section focuses on security culture which encompasses awareness of collection incidences, attitudes towards collection protection, and awareness of obstacles and problems for collection protection. All the five components of this tool are equally represent in the House Model. The last part of the instrument seeks demographic details about the university libraries and the respondents. Out of 87 questionnaires distributed, 61 returned questionnaires were found usable.

Analysis
In this article it stated that one of the sections in the house model is physical and technology factor. Physical and technical mechanisms are important in implementing a secure collection development. It refers to electronic security system and devices to handle collection security processes, control security violation, and installation at strategic entry points of the library. This statement is support by another article Use of RFID Technology in Libraries: a New Approach to Circulation, Tracking, Inventorying, and Security of Library Materials which created by Syed Md. Shahid, Assistant Librarian in University of Jammu, India. He says in his article that RFID can be used as library circulation operations and theft detection systems. RFID is a combination of radio - frequency-based technology and microchip technology. The information contained on microchips in the tags attach to library materials is read using radio frequency technology. The main aim for todays libraries in adopting RFID is the need to increase efficiency and reduce cost. RFID has the added advantage that it can also provide security for the range of different media offered in libraries. The technology can also improve circulation and inventory control, which helps allocate human and financial resources. Gregory B.Newby said in his article Information security for libraries said that an effective information security in libraries should include staff assigned to information security tasks, training all personnel in information security issues and procedures, specific policies dealing with information privacy, physical security of equipment, and computer security procedures, physical security plans, data integrity measures, levels of access to data or equipment, and monitoring for different types of access. All these aspects is inclusive in the house model. Other than that is Scott E.Muir in his writing Security 3

IML 551: RESEARCH METHODS FOR LIBRARY AND INFORMATION CENTER Issues with Community Users in an Urban University Library said that the vast majority of the issues revolve around behavior that is mostly inappropriate or disruptive such as talking too loud, swearing, failure to follow staff directives, mishandling materials and other disruptive behaviors. In this cases we can see that people factor in the house model is being discussed. It is more to users issues as they not aware of a proper way of being library user. A knowledgeable and trained staff can handle the situation. Last but not least is in the article Guidelines for the security of rare books, manuscripts, and other special collections shows how to develop an adequate collection security. It is basically telling us on how to take care of the special and rare collections from being missing and mishandling. In my opinion it is maybe the same as the American Library Association in a published document about library security (Library Security 2001) encapsulated most of the five factors in the house model. ALA had emphasized the need to protect library buildings, their employees and users, suggesting preventing actions to combat collection loss, formulating disaster plan and security policy, assigning and training staff to handle security issues. The Association of College and Research Libraries (2003, 2006) has also published two guidelines for handling theft in libraries and for handling rare and special collections.

Results
It shows that: Governance related to collection security management is only partially implemented at the Ahmadu Bello University and Bayero University Kano libraries. The other two universities are however much older universities, which could be a reason for the implementation of governance aspect of collection security. Governance should be properly established as university libraries grow in size as Olorunsola (1987) discovered a significant relationship between high rates of security problems and the growth of universities in Nigeria.

In terms of making staff trained and aware, the mean ratings by all librarians at the four universities reported partial implementation. The librarians are aware of training programs. About a third (>30%,>18) perceived that signage and proper programs should be clear and widely disseminated to staff so that they can understand issues related to collection security policy and know how to handle security incidences, indicating areas that the library security team should focus upon. 4

IML 551: RESEARCH METHODS FOR LIBRARY AND INFORMATION CENTER

50% (31) of the university librarians reported close to completion status while 50% (31) also indicated that their libraries are at the partial stage of implementation. Even though some of the libraries that perceived that the physical mechanism of protecting library collections are in place there are still doubts about their librarys strength in terms of installing electronic devices to safeguard collections. This is expected as the installation of such devices are expensive and beyond the means of most academic libraries in Nigeria. The results infer that a more comprehensive strategy needs to be implemented in securing library premises and the collection effectively.

Collection security culture is partially in existence but needs improvement. Almost all the libraries have very positive attitudes and values towards collection protection but only 50% (31) are aware of the problematic situations that prevent the smooth implementation of a collection security program. Many are not aware that excessive downloads from subscribed databases is a security breach (65.5%, 40) and that rare books of value needed to be insured (52.4%, 32).

Contributions
This article is important as it can provide information to library staffs, students and academic staffs pertaining to the collection security in the university libraries. The finding is also useful for other researcher to know what is exactly is house model or known as collection security management model (CSMM). The authors explain quite details about the management model as it can give an overview of the model. Besides the article also give some recommendation in finding the solution regarding the security problem.

Issues to address
In the article, the authors had propose to close the gap (handling theft in libraries and handling rare and special collection) by introducing an assessment instrument that has been found to be reliable and usable in assessing the collection security management in libraries in a more holistic approach. They also suggest that the instrument need to be further tested and it will be carrying out in the second phase of their study.

IML 551: RESEARCH METHODS FOR LIBRARY AND INFORMATION CENTER

Bibliography
A.A, M., & Zainab, A. (2011). Collection security management at university libraries: assessment of its implementation status. Malaysian Journal of Library& Information Science, 16(1), 15-33. Retrieved from http://hwwilsonweb.com B.Newby, G. Information security for library. Retrieved from http://emeraldinsight.com E.Muir, S. (2011). Security Issues with Community Users in an Urban University Library. Library Leadership& Management, 25(2), 1-12. Retrieved from http://hwwilsonweb.com M.Shahid, S. (2005). Use of RFID Technology in Libraries: a New Approach to Circulation, Tracking, Inventorying, and Security of Library Materials.Library Philosophy and Practice, 8(1), 1-9. Retrieved from http://emeraldinsight.com RMBS Security Commitee (2006, July/August). Guidelines for the security of rare books, manuscripts, and other special collections. College & Research Libraries News. 426-433. Retrieved from http://hwwilsonweb.com

You might also like