Security Measures to be taken to Reduce Theft, Mutilation and Misplacement of Karnataka State University Library Resources: A Study
|
|
- Warren Jordan
- 5 years ago
- Views:
Transcription
1 Security Measures to be taken to Reduce Theft, Mutilation and Misplacement of Karnataka State University Library Resources: A Study Dr. Jagadish M.V Librarian Sri, D.Devaraja Urs Government First Grade College Hunsur, Mysore (Dist) Karnatka (State) India. jagga.rituparna@gmail.com Abstract - Libraries are pillar of society; no nation can function effectively without the use a library. The libraries of the institution of higher learning such as colleges of education, Libraries play a vital role in the world s system of communication and education. The function of any library is to collect, organize, make available and conserve resources for future use. The aim of any library is to provide access to information resources. Library crime is at an alarming and irritating rate in every part of society nowadays mutilation and book theft as become a common phenomenon in libraries. Crime prevention and security management in libraries is not limited to any particular type of libraries. Anti- social and unlawful activities significantly affects every type of library and information service, whereas theft and mutilation are the major evils encountered at the movement. The present study as attempted to Security Measures in University libraries in Karnataka: a study. Key words: Security Measures, Theft, Mutilation and Misplacement, University libraries Introduction: Libraries and archives are mainstay for nation development and no nation can function effectively without the use of library. Prevention is always better than cure. Libraries and archives prevent damages, stealing of books and safeguard them there by acting as pillars of civilization. Libraries and Archives need to have safety and security measures plans to ensure that staffs are prepared to respond to fire, water emergencies, and other large-scale threats to collections. Protecting the collection should include ensuring good security to prevent theft, mutilation and misplacement. In this context the researcher placed the query to the students: what the measures are of reduce theft, mutilation and misplacement of library resources? Proposed Frame Work for Action Library is amalgamation of three tiers: (library customers), resources, (books, journals etc), and library staff (library administrators). The main and basic function of any library is to provide physical access to books. On the other hand, if it is out of the order on the shelf of the library, the likelihood that a user will find a desired book is reduced. Here the issue of theft, mutilation and misplacement arises. A framework of action for collection protection is proposed in this segment. 43 P a g e
2 Library Security Management Teams Library Resource Collections collections Library Users (Customers) ) Library Services Resource Collections Collection Security Management Plan Library Security Management Team Policy Formulation & Implementation Building Protection Library Operation Process Traning of Staff on Collection Development Reviews Updates Risk Assessment Figure -1 Library Security Management Teams It is necessary to recruit well trained senior security staff with capability to lead a responsible security team and building a team in which is capable of collaborative efforts in handling security threats and ensuring the protection of library resources. Review of Literature Arndt Jr., D. A. (2001) says that library staff often encounters problem patrons and this indeed puts fears on other patrons and leads to physical insecurity. This study identifies the risks and also suggests some precautions to be taken including diffusing anger at the service point through improved interpersonal communication techniques and staff training, drafting policies and procedures to help guide staff as they deal with incidents, and improving the security of library buildings. The study concentrates on legal issues of library security. Gautam, V., Behera, P. K., & Singh, M. (2011) outline the importance of digital collections in every organization and say that it has become a major source of information and a preferred mode of acquisition for collection development in a library. The study says that there are risks of unauthorized use of digital material and that it is not secure by its nature. The paper highlights that the more the effort is made to create digital contents the less attention is given to its security, and threats come in many forms. The study concentrates on the importance of digital data security and also security of library collection. Choudhary, S.K. (2011) contends that libraries and archives need to have safety and security plans to ensure that staff are prepared to respond to fire, water emergencies, and other largescale threats to collections. The study concentrates on risk patrons, resources and equipment, and library employees library for library assessment. The goal of a security system should 44 P a g e
3 provide safe and secure facility. The study recommends that there should be CCTV system and security guards to enforce appropriate library access to the assets of the library. Use of electronic security equipment with alarm notification to the appropriate authority, entry control, and site surveillance will avoid theft and mutilation of library material. Martin, A. L. (2000) studies on archival security and discusses that archivist protect and provide access to archival documents, the study also states that the archivist safeguards the archival materials safely in custody and its integrity is well maintained. The study suggests that documentation as another important preventive measure in terms of patrons. Further the study also concentrates on incunabulum documents and some aspects on security literature in the 1980s as important archival materials which needs to be safeguard as archives. Vinayagamoorthy, P. (2007) discuss that bar-coding, electronic-magnetic strips, radio frequency identification are used with the intention of improving the quality of service to the users and the security of library materials. The study recommends that RFID helps in the security aspect of library material which could be adopting for inventories of materials and which helps librarians in providing the users with optimum utilization of available resources. The study shows the importance of the use of ESG (Electronic Security Gates) for checking in and out. The study concludes that RFID over barcode systems or RFID tags can be used for security as well as for status control, thereby eliminating the need to attach security strips to library items. Need for the Study The present study also envisages representing preventive measures, new ideas to improve surveillance, and updated monitoring systems to keep a close eye on user behaviour. The study will recommend new strategies in training and communication, and the use of user sensitization programme which will increase the user awareness of the enormity of damage caused by delinquent behaviour. It is hoped that the findings of the study will provide authentic information to provide the finest academic support to genuine scholars and serious readers. The study helps both librarians and users to preserve and protect priceless academic wealth of libraries for future generations. Objectives of the Present Study The objectives of the study are: 1. To identify and discuss the major forms of theft and mutilation incidents that occur in university libraries; 2. To find out the common security measures in the university libraries 3. To find out the electronic gadgets use in security measures in university libraries Methodology The researcher conducted a survey research design was used for the study. The total number of seven questionnaires distributed to seven university librarians in Karnataka all seven university librarians have participated in the study. The questionnaire consisted of questionnaires on preventive measurements of theft, mutilation and misplacement of library resources. The researcher visited the each of the university libraries during the year of for data collection. The data obtained were analysed using simple percentages and frequencies. 45 P a g e
4 Data interpretation and Data Analysis Table 1. Designation-wise Distribution of Heads of the Libraries University Libraries Librarian Librarian I/C Bangalore University Library 0 1 Gulbarga University Library 1 0 Karnatak University Library 0 1 Kuvempu University Library 0 1 Mangalore University Library 1 0 Mysore University Library 0 1 Tumkur University Library 0 1 Total 2(28.58%) 5(71.42%) Table 1 reveals the designation-wise distribution of heads of libraries. It may be seen from the table that out of 7 university libraries, 2 (28.58%) university libraries namely Gulbarga University library and Mangalore University library, have librarians themselves as heads of their libraries. As for the remaining 5(71.42%) university libraries namely Bangalore University library, Karnatak University library Dharwada, Kuvempu University library, Mysore University library and Tumkur University library, the librarians I/C function as heads of the libraries and leading the activities. Table 2. Theft, Mutilation and Misplacement of Library Resources Problems Respondents % Frequent problem Severe problem Total Table 2 reveals the problems of theft, mutilation and misplacement of library resources. It may be seen from the table that out of seven university librarians 03(42.85%) opine that theft, mutilation and misplacement is a frequent problem and 04(57.14%) of them opine that it is a severe problem and also believe that the occurrence and re-occurrence of theft, mutilation, and misplacement of library resources and its consequence is a serious problem. Table 3 Approximate Loss of Books after Each Stock Verification Approximate Loss of Books Per Annum Respondents % No response Books Books and Above Books Total Table 3 depicts information regarding the approximate loss of books per annum after stock verification in university libraries. The table shows that out of seven university libraries, three libraries show that approximate loss of books per annum will be between 1-250, and 1001 and above respectively. The remaining 4(58%) libraries have given No response for the same 46 P a g e
5 Table-4 Electronic Security measures to adopt preventive theft, mutilation and misplacement of library resources Order of Preference Given by the Librarians Electronic Security Systems 1 st 2 nd 3 rd Total F % F % F % F % CCTV cameras RFID system m exit gate Alarm system installed Glass break sensor Fire/smoke sensor Biometrics Use of smart card Fire extinguisher security system Library Management Software Table 4 interprets the preference for the type of electronic security systems for libraries. It can be seen that out of a total, 100% of the respondents prefer using of Smart card and Library Management Software as their first option, whereas 6 (85.71%) believe that biometrics would better serve the purpose. 5(71.42%) prefer CCTV cameras and 3m exit gate and 4(57.14%) prefer first option, that installing RFID system in the library would best serve the security purposes. Besides 4(57.14%) and 2(28.57%) of them opine that glass break sensor and fire extinguisher security system as the 3 rd preference of electronic security system to be in the library. Table-5 Suggestions to be taken by Librarians for Eradication of Theft, Mutilation and Misplacement of Library Resources Order of Preference Given by Librarians Suggestions 1 st 2 nd 3 rd Total F % F % F % F % Regular training and continuing education programme particularly in information literacy (Ex:-Impact of mutilation on intellectual excellence) Providing regular proper interaction and orientation to library users Strengthening and enforcing library rules and regulation to discourage likely offenders Impose hefty penalty for ruining university property Librarians should invest on collection development of electronic resources and encourage their users to use e-resources Authorities should allocate adequate budgets to install electronic security devices and electronic surveillance video cameras, RFID to discourage theft, mutilation and misplacement Priority should be given to digitise most valuable library resources to prevent them from mutilation Table 5 furnishes the order of frequency of suggestions for eradication of theft, mutilation and misplacement of library resources given by the librarians. It can be observed that 6 (85.71%) of the respondents give first preference to regular proper interaction and orientation programme to library users and digitising most valuable library resources to prevent them from library mutilation, regular training and continuing education programme particularly in information literacy and librarians should invest on collection 47 P a g e
6 development of electronic resources and encourage their users to use e-resources. Whereas, second preference and third preference as suggestions were given by 4 (57.14%) librarians who opine that Imposing hefty penalty for ruining university property and strengthening and enforcing library rules and regulations enough to discourage likely offenders, will help in curbing the attitudes of disruptive users in libraries. Findings The most effective measures for eliminating theft, mutilation and misplacement of library resources are imposing hefty penalty, dismissing students from colleges, and enforce library rules and regulations that are tough enough to discourage likely offenders. The study found that the majority of Librarians respondents suggested installation of electronic security systems such as smart card, Library management Software, biometrics, FID/CCTV and that Priority should be given to digitise most valuable library resources to prevent them from library theft, mutilation and misplacement of the library resources. Conclusion This study revealed that theft, mutilation and misplacement of library resources in university libraries in particularly and libraries in general are serious problems that libraries often come across. This study looked these problems from the librarians perspective. More or less this study is in line with the previous studies conducted on the subjects. The previous study have done almost decade back, but still as this study reveals theft, mutilation and misplacement of library materials have remained as problems for university libraries which effects academic ambience of the library. There is need to adopt electronic technologies that some of them suggested by librarians such as Biometrics, Library management software, users smartcard, CCTV, RFID technologies for library. Most importantly librarians should engage with library users regularly to create awareness about how to use library. References 1. Arndt Jr., D. A. (2001). Problem patrons and library security. Legal Reference Services Quarterly, 19(1/2), Beach,A (1977). Library Book Theft: A Case Study. College & Research Libraries, 38(2), Choudhary,S.K. (2011).Library preservation and conservation. New Delhi: A.P.H. Publishing Corporation Gautam, V., Behera, P. K., & Singh, M. (2011). Issues of Digital Data Security in Library Environment. International Journal of Information Dissemination and Technology, 1(4), Martin, A. L. (2000). The Saying and the Doing: The Literature and Reality of Theft Prevention Measures in US Archives-Part 1. Library & archival security, 15(2), Vinayagamoorthy,P (2007). Application of RFID in engineering college library: an experience. Indian Journal of Library and Information Science,1(2) P a g e
CHAPTER V SUMMARY OF FINDINGS, SUGGESTIONS AND CONCLUSION
CHAPTER V SUMMARY OF FINDINGS, SUGGESTIONS AND CONCLUSION 5.1 Introduction 5.2 Issue Studied 5.3 Research Methodology 5.4 Summary of Findings 5.5 Suggestions 5.6 Suggestion for future research 5.7 Conclusion
More informationBuilding Your DLP Strategy & Process. Whitepaper
Building Your DLP Strategy & Process Whitepaper Contents Introduction 3 DLP Planning: Organize Your Project for Success 3 DLP Planning: Clarify User Profiles 4 DLP Implementation: Phases of a Successful
More informationTHE ANGMERING SCHOOL CCTV POLICY. The Angmering School CCTV Code of Practice Version 1, 15/02/12, Created by Marc Ginnaw.
THE ANGMERING SCHOOL CCTV POLICY 2012 Page 1 of 8 The Angmering School CCTV Code of Practice Introduction The purpose of this document is to define The Angmering School's CCTV policy, to determine responsibilities,
More informationCUBITT TOWN JUNIOR SCHOOL CCTV POLICY 2017
CUBITT TOWN JUNIOR SCHOOL CCTV POLICY 2017 CCTV cameras are now a familiar sight throughout the country. They are one of the many measures being introduced to help prevent crime and make communities safer
More informationWhat You Need to Know About Addressing GDPR Data Subject Rights in Primo
What You Need to Know About Addressing GDPR Data Subject Rights in Primo Not Legal Advice This document is provided for informational purposes only and must not be interpreted as legal advice or opinion.
More informationA STUDY ON PRESERVATION AND CONSERVATION PRACTICE AND TECHNIQUES AT GFGC S COLLEGE LIBRARIES IN KARNATAKA
A STUDY ON PRESERVATION AND CONSERVATION PRACTICE AND TECHNIQUES AT GFGC S COLLEGE LIBRARIES IN KARNATAKA Nirmala C. Assistant Professor, Library and information science Government First Grade College,
More informationCollection management policy
Collection management policy Version 1: October 2013 2013 The Law Society. All rights reserved. Monitor and review This policy is scheduled for review by November 2014. This review will be conducted by
More informationCYRIL JACKSON PRIMARY SCHOOL CCTV POLICY
CYRIL JACKSON PRIMARY SCHOOL CCTV POLICY VISION: Cyril Jackson is a safe and stimulating environment where children encounter challenging and creative learning experiences Each member of the school community
More informationWALES. National Library of Wales
ANNUAL REPORT TO CDNL 2012 13 WALES National Library of Wales Andrew M W Green Librarian (retired 31/03/2013) Aled Gruffydd Jones Chief Executive and Librarian (from 01/08/2013) Address: Aberystwyth, Ceredigion,
More informationBig Brother is Watching You!
Big Brother is Watching You! CCTV and Access Control in the Transit Industry Transit Safety and Security Clint Hunter MARTA Enterprise Architect chunter@itsmarta.com 404-848-5364 office 404-697-7024 mobile
More informationJ.D. BIRLA INSTITUTE DEPARTMENTS OF SCIENCE & COMMERCE
J.D. BIRLA INSTITUTE DEPARTMENTS OF SCIENCE & COMMERCE LEARNING RESOURCE CENTRE (LRC) LEARNING RESOURCES The LRC has a total collection of more than 17,000 printed volumes including books, textbooks and
More informationG4S ACADEMY BODYCAMS GUIDE VERSION
G4S ACADEMY BODYCAMS GUIDE VERSION 170811 BODYCAMS INFORMATION Bodycams are video cameras worn on people s bodies. They can be worn on the torso, head or as glasses. They are called body worn video (BWV)
More informationChapter 6. University Library
Authority: Approved by the Dean of the Faculty Affairs 6.1 Policy Statement Chapter 6. University Library OIST Graduate University Policies, Rules, & Procedures The Library of the Okinawa Institute of
More informationDisaster management in university libraries: Perceptions, problems and strategies
56 Disaster management in university libraries: Perceptions, problems and strategies Echezona, R. I (Ph.D) ifeomaechzona@yahoo.com University of Nigeria, Nsukka. Nigeria Ugwu, C.I ifeanyi.ugwu@unn.edu.ng
More informationIntegrated library service application platform based on the smart book shelf
Malaysian Journal of Library & Information Science, Vol. 16, no. 3, December 2011: 103-119 Integrated library service application platform based on the smart book shelf Teng-Yen Wu 1, Kun-Chieh Yeh 2,
More informationGenomics Institute of the Novartis Research Foundation ( GNF )
Genomics Institute of the Novartis Research Foundation ( GNF ) Challenges To protect its sensitive research technology and critical intellectual assets, the Genomics Institute of the Novartis Research
More informationTheft and mutilation of print collection in university libraries: A critical review of literature and proposed framework for action
Annals of Library and Information Studies Vol. 59, December 2012, pp. 240-246 Theft and mutilation of print collection in university libraries: A critical review of literature and proposed framework for
More informationCatherine Ogbodo The Library, University of Uyo, Uyo, Akwa Ibom State, Nigeria
PRESERVATION OF INFORMATION SOURCES IN POLYTECHNIC LIBRARIES IN SOUTH EAST STATES OF NIGERIA Catherine Ogbodo The Library, University of Uyo, Uyo, Akwa Ibom State, Nigeria E-mail: kateogbodo@yahoo.com
More informationDate Effected May 20, May 20, 2015
1. Purpose of the The Niagara Falls Board (hereinafter the Board ) has approved the to support its mission to be an informational, educational, cultural and recreational resource valued by the Niagara
More informationThe Telecommunications Act Chap. 47:31
The Telecommunications Act Chap. 47:31 4 th September 2013 Presentation Overview Legislative Mandate Limitations of Telecommunications Act Proposed Amendments to Telecommunications Act New Technological
More informationUNISA S CENTRE FOR APPLIED INFORMATION AND COMMUNICATION
1 CENTRE FOR APPLIED INFORMATION AND COMMUNICATION P O BOX 392 UNISA 0003 TEL: 012 429 6709 / 6997 / 3285/2043/3376 FAX: 012 429 3199 UNISA S CENTRE FOR APPLIED INFORMATION AND COMMUNICATION NQF LEVEL
More informationApplication of Bradford s Law on journal citations: A study of Ph.D. theses in social sciences of University of Delhi
Annals of Library and Information Studies Vol. 61, June 2014, pp. 112-120 Application of Bradford s Law on journal citations: A study of Ph.D. theses in social sciences of University of Delhi K P Singh
More informationCollection Development Duckworth Library
Collection Development 1--8/4/2008 Collection Development Duckworth Library The Library collection policy is developed to establish guidelines for the acquisition and maintenance of an outstanding collection
More informationAPPLICATION FOR TEEN ART EXHIBITS
Emma. S. Clark Memorial Library APPLICATION FOR TEEN ART EXHIBITS Contact Information: Date Name Address Age/Grade School Phone Number Email Address Describe the items to be included in the proposed exhibit
More informationEscorting / Supervision of service providers and contractors
Escorting / Supervision of service providers and contractors PIN020 Operations Directorate 8 The Director of Operations 29/01/14 See Section 5 of this document - - 29/01/2016 29/01/2014 IPS Policy for
More informationRFID BASED LIBRARY MANAGEMENT SECURITY SYSTEM Shushant Kumar Singh, Avinow Raj, ShahinaFirdoush, and ShrutiKriti
International Journal of Computer Engineering and Applications, Volume X, Special Issue, ICRTCST -2016 www.ijcea.com, ISSN 2321-3469 RFID BASED LIBRARY MANAGEMENT SECURITY SYSTEM Shushant Kumar Singh,
More informationMedia and Data Converging Media and Content
EUROPEAN COMMISSION Directorate-General for Communications Networks, Content and Technology Media and Data Converging Media and Content Questionnaire on the implementation of the Recommendation 1 of the
More informationLibrary Systems and Resource Management
Library Systems and Resource Management CLASS- XII Student Handbook CENTRAL BOARD OF SECONDARY EDUCATION Shiksha Kendra, 2, Community Centre, Preet Vihar, Delhi-110301 i Library Systems and Resource Management
More informationICOMOS Charter for the Interpretation and Presentation of Cultural Heritage Sites
University of Massachusetts Amherst ScholarWorks@UMass Amherst Selected Publications of EFS Faculty, Students, and Alumni Anthropology Department Field Program in European Studies October 2008 ICOMOS Charter
More informationAbuse of Information Materials in Academic Libraries by Students of Tertiary Institutions in Ekiti-State, Nigeria.
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Library Philosophy and Practice (e-journal) Libraries at University of Nebraska-Lincoln 6-10-2016 Abuse of Information Materials
More informationUA Libraries; UW-Madison Libraries; IMLS: Advisory Committee; Program Manager; Support Staff
Outcomes Logic Model Project Name: Publishers Bindings Online, 1815-1930: The Art of Books IMLS Grant: National Leadership Grant, Award No. LG-03-03-0044-03 Date Created March 2004 Date Reviewed Program
More information1. Introduction. 1.1 History
The John Rylands University Library, The University of Manchester: Special Collections Division Printed Books Collection Development Policy February 2002; revised January 2005 1. Introduction 1.1 History
More informationEUROPEAN COMMISSION Directorate-General for Communications Networks, Content and Technology
EUROPEAN COMMISSION Directorate-General for Communications Networks, Content and Technology Media and Data Converging Media and Content Questionnaire on the implementation of the Recommendation 1 of the
More informationCITATION ANALYSES OF DOCTORAL DISSERTATION OF PUBLIC ADMINISTRATION: A STUDY OF PANJAB UNIVERSITY, CHANDIGARH
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Library Philosophy and Practice (e-journal) Libraries at University of Nebraska-Lincoln November 2016 CITATION ANALYSES
More informationInternational Journal of Library and Information Studies. An User Satisfaction about Library Resources and Services: A Study
An User Satisfaction about Library Resources and Services: A Study Dr. S. Ravi Professor Library and Information Science Wing Directorate of Distance Education Annamalai University Annamalainagar - 608002
More informationSAMPLE DOCUMENT. Date: 2003
SAMPLE DOCUMENT Type of Document: Archive & Library Management Policies Name of Institution: Hillwood Museum and Gardens Date: 2003 Type: Historic House Budget Size: $10 million to $24.9 million Budget
More informationPreserving Digital Memory at the National Archives and Records Administration of the U.S.
Preserving Digital Memory at the National Archives and Records Administration of the U.S. Kenneth Thibodeau Workshop on Conservation of Digital Memories Second National Conference on Archives, Bologna,
More informationUPPINGHAM SCHOOL JOB DESCRIPTION
UPPINGHAM SCHOOL JOB DESCRIPTION Job Title Head of Strings Reports to Director of Music Job context Uppingham School is a co-educational, full boarding school serving 800 pupils aged 13-18. The teaching
More informationAuthors attitudes to, and awareness and use of, a university institutional repository
Original article published in Serials - 20(3), November 2007, 225-230. Authors attitudes to, and awareness and use of, a university institutional repository SARAH WATSON Information Specialist Kings Norton
More informationAN OVERVIEW ON CITATION ANALYSIS TOOLS. Shivanand F. Mulimani Research Scholar, Visvesvaraya Technological University, Belagavi, Karnataka, India.
Abstract: AN OVERVIEW ON CITATION ANALYSIS TOOLS 1 Shivanand F. Mulimani Research Scholar, Visvesvaraya Technological University, Belagavi, Karnataka, India. 2 Dr. Shreekant G. Karkun Librarian, Basaveshwar
More informationLIBRARY GUIDE 2016 KOFI ANNAN INTERNATIONAL PEACEKEEPING TRAINING CENTRE (KAIPTC) LIBRARY
KOFI ANNAN INTERNATIONAL PEACEKEEPING TRAINING CENTRE (KAIPTC) LIBRARY LIBRARY The Head Libarian Phone: 0302718200, EXT. 1131 Mob: +233(0)244813603 Email: mary.arkorful@kaiptc.org Info.library@kaiptc.org
More informationHow to Categorize Risk in IoT
How to Categorize Risk in IoT Defining use cases for IoT deployments lays the foundation for an end-to-end cybersecurity strategy that cuts across a broad and ever-changing threat landscape 2 Overview
More informationICOMOS ENAME CHARTER
ICOMOS ENAME CHARTER For the Interpretation of Cultural Heritage Sites FOURTH DRAFT Revised under the Auspices of the ICOMOS International Scientific Committee on Interpretation and Presentation 31 July
More informationCode of Conduct. July 2016
Code of Conduct July 2016 Contents 1 Introduction 2 2 Purpose of the Code 2 3 Conflicts of interest and related party transactions 2 4 Corporate opportunities 3 5 Confidentiality 3 6 Fair dealing 3 7 Protection
More informationAPPLICATION AND EFFECTIVENESS OF THE SEA DIRECTIVE (DIRECTIVE 2001/42/EC) 1. Legal framework CZECH REPUBLIC LEGAL AND ORGANISATIONAL ARRANGEMENTS 1
APPLICATION AND EFFECTIVENESS OF THE SEA DIRECTIVE (DIRECTIVE 2001/42/EC) CZECH REPUBLIC LEGAL AND ORGANISATIONAL ARRANGEMENTS 1 This summary provides basic information on the legal, administrative and
More informationKAIPTC LIBRARY LIBRARY GUIDE KAIPTC LIBRARY LIBRARY GUIDE
INTRODUCTION T he Kofi Annan International Peacekeeping Training Centre (KAIPTC) Library's vital role is effective knowledge management through acquisition, processing, storage and dissemination of resources
More informationPreservation and Conservation of Library Resources in Bingham University Library, Karu, Nasarawa State, Nigeria
International Journal of Applied Technologies in Library and Information Management 3 (1) 11-92 - 101 ISSN: (online) 2467-8120 2017 CREW - Colleagues of Researchers, Educators & Writers Manuscript Number:
More informationWELLS BRANCH COMMUNITY LIBRARY COLLECTION DEVELOPMENT PLAN JANUARY DECEMBER 2020
Description and Objectives: WELLS BRANCH COMMUNITY LIBRARY COLLECTION DEVELOPMENT PLAN JANUARY 2016- DECEMBER 2020 This document outlines the principles and criteria for the selection of library materials.
More informationI. Introduction Assessment Plan for Ph.D. in Musicology & Ethnomusicology School of Music, College of Fine Arts
I. Introduction Assessment Plan for Ph.D. in Musicology & Ethnomusicology School of Music, College of Fine Arts Unit Mission Statement: First, the Division of Musicology and Ethnomusicology seeks to foster
More informationredbox INFORMATION PACK VERSION 1.0 solutions uk
INFORMATION PACK VERSION 1.0 contents Overview... 01 Service Overview... 02 Managed Services... 03 Telecoms Services... 04 Photomontage samples Technical Illustration samples Security Services... 08 Access
More informationMemorandum of Understanding. between. The Ministry of Civil Defence & Emergency Management. and
Memorandum of Understanding between The Ministry of Civil Defence & Emergency Management and Television New Zealand Limited and MediaWorks TV Limited for the provision of television broadcast support before
More informationWestern library practices: a few ways to build connections with library users, and why!
Western library practices: a few ways to build connections with library users, and why! Jim Agee Library General Manager Nazarbayev University Astana, Kazakhstan ADA University Exploring Best Practices
More informationDEPARTMENTAL GENERAL ORDER DEPARTMENT OF PUBLIC SAFETY January 8, 2003 MERCER ISLAND POLICE
DEPARTMENTAL GENERAL ORDER 91-2 R-9 (Revised) DEPARTMENT OF PUBLIC SAFETY January 8, 2003 MERCER ISLAND POLICE Index as: Audio and Video Recording Camera, Video Equipment Use Photography, Audio/Video Use
More informationLibraries of Higher Education in Gulbarga City: An Evaluative Study Based on Five Laws of Library Science
Libraries of Higher Education in Gulbarga City: An Evaluative Study Based on Five Laws of Library Science Kaneez Fatima Research Scholar, Dept. of Library and Information Science, Gulbarga University,
More informationREPORT TO CONGRESS ON STALKING AND DOMESTIC VIOLENCE, 2005 THROUGH 2006
REPORT TO CONGRESS ON STALKING AND DOMESTIC VIOLENCE, 2005 THROUGH 2006 U.S. Department of Justice Office on Violence Against Women Introduction The Violence Against Women Act of 1994 (VAWA), Pub. L. No.106-386,
More informationThe CYCU Chang Ching Yu Memorial Library Resource Development Policy
The CYCU Chang Ching Yu Memorial Library Resource Development Policy passed by 3 rd Library Committee Meeting(2005 school year) on Jun. 28, 2006 revised by 1 st Library Committee Meeting(2015 school year)
More informationINFS 326: COLLECTION DEVELOPMENT. Lecturer: Mrs. Florence O. Entsua-Mensah, DIS Contact Information:
INFS 326: COLLECTION DEVELOPMENT Lecturer: Mrs. Florence O. Entsua-Mensah, DIS Contact Information: fentsua-mensah@ug.edu.gh Lecture Overview Library Security involves procedures in human behaviour, material
More information3 Year B.A./B.Sc. (Honours) in Library and Information Studies UNIVERSITY OF CALCUTTA. 1 P age
3 Year B.A./B.Sc. (Honours) in Library and Information Studies UNIVERSITY OF CALCUTTA 1 P age CBCS Syllabus and Course Structure for 3 Year B.A./B.Sc. (Honours) in Library and Information Studies A. Core
More informationSATISFACTION OF USERS IN SNATANDHARM POST- GRADUATE (SDPG) COLLEGE LIBRARY PANIPAT, HARYANA
SATISFACTION OF USERS IN SNATANDHARM POST- GRADUATE (SDPG) COLLEGE LIBRARY PANIPAT, HARYANA Abstract Kusum Lata Librarian, Tau Devi Lal Memorial College of Education Email: 9999kusum@gmail.com College
More informationMemory of the World. United Nations Educational, Scientific and Cultural Organization. The Documentary Heritage of TIMOR LESTE
JAK/2018/PI/H/11 United Nations Educational, Scientific and Cultural Organization Memory of the World The Documentary Heritage of TIMOR LESTE Survey of Selected Memory Institutions ENGLISH TABLE OF CONTENTS
More informationCambridge University Engineering Department Library Collection Development Policy October 2000, 2012 update
Cambridge University Engineering Department Library Collection Development Policy October 2000, 2012 update Contents: 1. Introduction 2. Aim 3. Scope 4. Readership and administration 5. Subject coverage
More informationCOLLECTION DEVELOPMENT AND MANAGEMENT POLICY BOONE COUNTY PUBLIC LIBRARY
COLLECTION DEVELOPMENT AND MANAGEMENT POLICY BOONE COUNTY PUBLIC LIBRARY APPROVED BY THE BOARD OF TRUSTEES, FEBRUARY 2015; NOVEMBER 2017 REVIEWED NOVEMBER 20, 2017 CONTENTS Introduction... 3 Library Mission...
More informationFrequently Asked Questions (FAQs)
Frequently Asked Questions (FAQs) 1. What is CCTV? Why is there a need for CCTV? ABOUT CCTV CAMERA CCTV is the abbreviation for Closed Circuit Television. It is a visual surveillance technology system
More informationUniversity Library Collection Development Policy
University Library Collection Development Policy Franciscan Missionaries of Our Lady University (FRANU) in Baton Rouge, Louisiana is an independent, private Catholic College founded by the Franciscan Missionaries
More informationPeriodical Usage in an Education-Psychology Library
LAWRENCE J. PERK and NOELLE VAN PULIS Periodical Usage in an Education-Psychology Library A study was conducted of periodical usage at the Education-Psychology Library, Ohio State University. The library's
More informationCode of Practice on Freedom of Speech and Expression
Code of Practice on Freedom of Speech and Expression Document Status Author Head pf Governance Date of Origin Based on Eversheds Model and Guidance dated September 2015 Version Final Review requirements
More informationICOMOS ENAME CHARTER
THIRD DRAFT 23 August 2004 ICOMOS ENAME CHARTER FOR THE INTERPRETATION OF CULTURAL HERITAGE SITES Preamble Objectives Principles PREAMBLE Just as the Venice Charter established the principle that the protection
More informationDigital Preservation of Rare Books & Manuscripts: A Case Study of Aligarh Muslim University
Digital Preservation of Rare Books & Manuscripts: A Case Study of Aligarh Muslim University Dr. Nabi Hasan University Librarian, Maulana Azad Library Aligarh Muslim University (AMU), Aligarh, India nabihasan@gmail.com
More informationVia
Howard Slawner 350 Bloor Street East, 6th Floor Toronto, ON M4W 0A1 howard.slawner@rci.rogers.com o 416.935.7009 m 416.371.6708 Via email: ic.spectrumengineering-genieduspectre.ic@canada.ca Senior Director
More informationIndependent TV: Content Regulation and the Communications Bill 2002
Franco-British Lawyers Society, 13 th Colloquium, Oxford, 20-21 September 2002 Independent TV: Content Regulation and the Communications Bill 2002 1. The Communications Bill will re-structure the statutory
More informationICOMOS Ename Charter for the Interpretation of Cultural Heritage Sites
ICOMOS Ename Charter for the Interpretation of Cultural Heritage Sites Revised Third Draft, 5 July 2005 Preamble Just as the Venice Charter established the principle that the protection of the extant fabric
More informationTuscaloosa Public Library Collection Development Policy
Tuscaloosa Public Library Collection Development Policy Policy Statement The Tuscaloosa Public Library acquires and makes available materials that support its mission to provide recreational and cultural
More informationHeadings: Books evaluation. Discarding of books, periodicals, etc. Law Libraries Collection development. Law Libraries Rare books
Tamia G. Taylor. What s in there anyway? A collection assessment of the UNC Law Library Rare Book Room. A Master's paper for the M.S. in L.S. degree. April, 2013. 36 pages. Advisor: Jacqueline Dean. This
More informationTender Brief for Hull on Film A project supported by the Heritage Lottery Fund
Tender Brief for Hull on Film A project supported by the Heritage Lottery Fund About the Yorkshire Film Archive Yorkshire Film Archive (YFA) is a registered charity, established in 1988; over the past
More informationASERL s Virtual Storage/Preservation Concept
ASERL s Virtual Storage/Preservation Concept John Burger, Paul M. Gherman, and Flo Wilson One strength of research libraries current print collections is in the redundancy built into the system whereby
More informationRef.: Tel.: Fax: January 2014
REPUBLIC OF CYPRUS MINISTRY OF EDUCATION AND CULTURE CULTURAL SERVICE Ref.: 4.02.006.03 Tel.: 00357-22809811 Fax: 00357-22809873 21 January 2014 SUBJECT: Answers to the questionnaire on the implementation
More informationSecurity Challenges in the Internet of Things. Dr. Sigrid Schefer-Wenzl
Security Challenges in the Internet of Things Dr. Sigrid Schefer-Wenzl Agenda Introduction Problem statement Open Internet of Things (IoT) Architecture Use Cases for Smart Cities Security Challenges Conclusions
More informationCitation Analysis of Doctoral Theses in the field of Sociology submitted to Panjab University, Chandigarh (India) during
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Library Philosophy and Practice (e-journal) Libraries at University of Nebraska-Lincoln November 2017 Citation Analysis
More informationJOB DESCRIPTION FOR PICTURE EDITOR VISUAL JOURNALISM ARABIC SERVICE
JOB DESCRIPTION FOR PICTURE EDITOR VISUAL JOURNALISM ARABIC SERVICE Job Title: Picture Editor, Arabic Service. Reports to: Production Editor, Visual Journalism Department: Visual Journalism, BBC News,
More informationRanganathans Laws of Library Science & their Implications
Ranganathans Laws of Library Science & their Implications Ms Masarat Ali Chief librarian, Amar Singh College Srinagar Kashmir (India) ABSTRACT This paper describes in detail the Five Laws of Library Science
More informationThe Convention on Biological Diversity and its Protocols Status of Implementation. Secretariat of the Convention on Biological Diversity
The Convention on Biological Diversity and its Protocols Status of Implementation Secretariat of the Convention on Biological Diversity Outline COP12/MOP7/MOP1 and Pyongchang Roadmap Aichi Biodiversity
More informationSeparating the wheat from the chaff: Intensive deselection to enable preservation and access
Submitted on: 02.09.2016 Separating the wheat from the chaff: Intensive deselection to enable preservation and access Colleen Hoelscher Marian Library, University of Dayton, Dayton, Ohio, USA. choelscher1@udayton.edu
More informationJoint submission by BBC, ITV, Channel 4, Channel 5, S4C, Arqiva 1 and SDN to Culture Media and Sport Committee inquiry into Spectrum
Joint submission by BBC, ITV, Channel 4, Channel 5, S4C, Arqiva 1 and SDN to Culture Media and Sport Committee inquiry into Spectrum 1. Introduction and summary The above-named organisations welcome the
More informationCollection development in academic libraries
Vol. 8(7), pp. 62-67, November 2016 DOI: 10.5897/IJLIS2015.0601 Article Number: FC733EB61220 ISSN 2141-2537 Copyright 2016 Author(s) retain the copyright of this article http://www.academicjournals.org/ijlis
More informationMeeting the Challenge of a Difficult Job Speciality Contractor ACE Awards
1 Category 2: Meeting the Challenge of a Contractor: Kenny Electric Project Name: Comcast Denver Facility Upgrade No Commercial Breaks Comcast of Denver is the national hub for television and Internet
More informationQuarterly Crime Statistics Q (01 April 2014 to 30 June 2014)
Quarterly Crime Statistics Q2 2014 (01 April 2014 to 30 June 2014) INDEX INDEX 1. INTRODUCTION Page 2 2. ALL CRIME Page 4 3. CRIMES AGAINST THE PERSON Page 5 4. FIREARM INCIDENTS Page 6 5. CRIMES AGAINST
More informationUNIVERSITY OF NOTTINGHAM MANUSCRIPTS AND SPECIAL COLLECTIONS. Acquisitions Policy for Rare Books
UNIVERSITY OF NOTTINGHAM MANUSCRIPTS AND SPECIAL COLLECTIONS Acquisitions Policy for Rare Books 2016 1. Introduction This policy concerns the rare book collections which form the majority of the published
More informationPrivacy Policy. April 2018
Privacy Policy April 2018 Contents 1 Purpose of this policy 2 2 Overview 2 3 Privacy Policy 2 3.1 Rights to Privacy 2 3.2 What kinds of personal information does APN Group collect? 2 3.3 Collection of
More informationLa Porte County Public Library Collection Development Policy
La Porte County Public Library Collection Development Policy Statement of Purpose The purpose of this policy is to inform the public and guide professional staff regarding the criteria for the library
More informationCROCODILE AUSTRIA VIDEOSYSTEM
Project Reference: A3 Project Name: Videosystem ITS Corridor: CROCODILE Project Location: Western part of Austria 1. DESCRIPTION OF THE PROBLEM ADDRESSED BY THE PROJECT 1.1 Nature of the Site The Austrian
More informationCARNEGIE-STOUT PUBLIC LIBRARY MATERIALS SELECTION POLICY. City of Dubuque
CARNEGIE-STOUT PUBLIC LIBRARY MATERIALS SELECTION POLICY City of Dubuque TABLE OF CONTENTS Section Page I. Purpose..... 3 II. Definitions... 3 III. Library Bill of Rights..... 3 IV. Responsibility and
More informationSt Andrew s CE Primary School Music Policy
St Andrew s CE Primary School Music Policy St Andrew s CE Primary School Music Policy The New Curriculum (2016 and beyond) Summer 2018 1) Aims and objectives Music is a unique way of communicating that
More informationSouth Carolina Standards for School Library Resource Collections
South Carolina Standards for School Library Resource Collections South Carolina Department of Education Columbia, South Carolina 2016 Standards Overview All schools regardless of enrollment or grades served
More informationImpact of Electronic Surveillance Systems on Theft and Mutilation in Francis Suleimanu Idachaba Library, University of Agriculture Makurdi
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Library Philosophy and Practice (e-journal) Libraries at University of Nebraska-Lincoln 6-17-2016 Impact of Electronic Surveillance
More informationReading Room of The Library of the Academy of Sciences
Public Libraries There are over 6,000 public libraries operated by local authorities. They form the basic infrastructure for providing accessible library and information services to all the inhabitants
More informationCaring for Sacramental Records
Caring for Sacramental Records Diocese of Pittsburgh Caring for Sacramental Records Introduction Sacramental records form an important religious function. They document an individual s spiritual journey
More informationAwareness on Plagiarism among Research Scholars of Sri Venkateswara University: A Study
IOSR Journal Of Humanities And Social Science (IOSR-JHSS) Volume 20, Issue 3, Ver. II (Mar. 2015), PP 55-59 e-issn: 2279-0837, p-issn: 2279-0845. www.iosrjournals.org Awareness on Plagiarism among Research
More informationThe BBC s services: audiences in Northern Ireland
The BBC s services: audiences in Northern Ireland Publication Date: 13 October 2017 The BBC s services: audiences in Northern Ireland About this document The operating licence for the BBC s UK public services
More informationCable Strike Awareness & Elimination. Mosaic Potash - Esterhazy K1 Mine
Cable Strike Awareness & Elimination Mosaic Potash - Esterhazy K1 Mine PBU Cable Strike Team Cable Strike Team was formed October 2016 The cable strike team reviewed the existing policies and procedures
More informationThe Rare Books and Special Collections Library Access Policy Policy Statement
The Rare Books and Special Collections Library Access Policy Policy Statement The Rare Books and Special Collections Library s core mission is to support teaching and scholarship at AUC, but also welcomes
More information