Security Measures to be taken to Reduce Theft, Mutilation and Misplacement of Karnataka State University Library Resources: A Study

Similar documents
CHAPTER V SUMMARY OF FINDINGS, SUGGESTIONS AND CONCLUSION

Building Your DLP Strategy & Process. Whitepaper

THE ANGMERING SCHOOL CCTV POLICY. The Angmering School CCTV Code of Practice Version 1, 15/02/12, Created by Marc Ginnaw.

CUBITT TOWN JUNIOR SCHOOL CCTV POLICY 2017

What You Need to Know About Addressing GDPR Data Subject Rights in Primo

A STUDY ON PRESERVATION AND CONSERVATION PRACTICE AND TECHNIQUES AT GFGC S COLLEGE LIBRARIES IN KARNATAKA

Collection management policy

CYRIL JACKSON PRIMARY SCHOOL CCTV POLICY

WALES. National Library of Wales

Big Brother is Watching You!

J.D. BIRLA INSTITUTE DEPARTMENTS OF SCIENCE & COMMERCE

G4S ACADEMY BODYCAMS GUIDE VERSION

Chapter 6. University Library

Disaster management in university libraries: Perceptions, problems and strategies

Integrated library service application platform based on the smart book shelf

Genomics Institute of the Novartis Research Foundation ( GNF )

Theft and mutilation of print collection in university libraries: A critical review of literature and proposed framework for action

Catherine Ogbodo The Library, University of Uyo, Uyo, Akwa Ibom State, Nigeria

Date Effected May 20, May 20, 2015

The Telecommunications Act Chap. 47:31

UNISA S CENTRE FOR APPLIED INFORMATION AND COMMUNICATION

Application of Bradford s Law on journal citations: A study of Ph.D. theses in social sciences of University of Delhi

Collection Development Duckworth Library

APPLICATION FOR TEEN ART EXHIBITS

Escorting / Supervision of service providers and contractors

RFID BASED LIBRARY MANAGEMENT SECURITY SYSTEM Shushant Kumar Singh, Avinow Raj, ShahinaFirdoush, and ShrutiKriti

Media and Data Converging Media and Content

Library Systems and Resource Management

ICOMOS Charter for the Interpretation and Presentation of Cultural Heritage Sites

Abuse of Information Materials in Academic Libraries by Students of Tertiary Institutions in Ekiti-State, Nigeria.

UA Libraries; UW-Madison Libraries; IMLS: Advisory Committee; Program Manager; Support Staff

1. Introduction. 1.1 History

EUROPEAN COMMISSION Directorate-General for Communications Networks, Content and Technology

CITATION ANALYSES OF DOCTORAL DISSERTATION OF PUBLIC ADMINISTRATION: A STUDY OF PANJAB UNIVERSITY, CHANDIGARH

International Journal of Library and Information Studies. An User Satisfaction about Library Resources and Services: A Study

SAMPLE DOCUMENT. Date: 2003

Preserving Digital Memory at the National Archives and Records Administration of the U.S.

UPPINGHAM SCHOOL JOB DESCRIPTION

Authors attitudes to, and awareness and use of, a university institutional repository

AN OVERVIEW ON CITATION ANALYSIS TOOLS. Shivanand F. Mulimani Research Scholar, Visvesvaraya Technological University, Belagavi, Karnataka, India.

LIBRARY GUIDE 2016 KOFI ANNAN INTERNATIONAL PEACEKEEPING TRAINING CENTRE (KAIPTC) LIBRARY

How to Categorize Risk in IoT

ICOMOS ENAME CHARTER

Code of Conduct. July 2016

APPLICATION AND EFFECTIVENESS OF THE SEA DIRECTIVE (DIRECTIVE 2001/42/EC) 1. Legal framework CZECH REPUBLIC LEGAL AND ORGANISATIONAL ARRANGEMENTS 1

KAIPTC LIBRARY LIBRARY GUIDE KAIPTC LIBRARY LIBRARY GUIDE

Preservation and Conservation of Library Resources in Bingham University Library, Karu, Nasarawa State, Nigeria

WELLS BRANCH COMMUNITY LIBRARY COLLECTION DEVELOPMENT PLAN JANUARY DECEMBER 2020

I. Introduction Assessment Plan for Ph.D. in Musicology & Ethnomusicology School of Music, College of Fine Arts

redbox INFORMATION PACK VERSION 1.0 solutions uk

Memorandum of Understanding. between. The Ministry of Civil Defence & Emergency Management. and

Western library practices: a few ways to build connections with library users, and why!

DEPARTMENTAL GENERAL ORDER DEPARTMENT OF PUBLIC SAFETY January 8, 2003 MERCER ISLAND POLICE

Libraries of Higher Education in Gulbarga City: An Evaluative Study Based on Five Laws of Library Science

REPORT TO CONGRESS ON STALKING AND DOMESTIC VIOLENCE, 2005 THROUGH 2006

The CYCU Chang Ching Yu Memorial Library Resource Development Policy

INFS 326: COLLECTION DEVELOPMENT. Lecturer: Mrs. Florence O. Entsua-Mensah, DIS Contact Information:

3 Year B.A./B.Sc. (Honours) in Library and Information Studies UNIVERSITY OF CALCUTTA. 1 P age

SATISFACTION OF USERS IN SNATANDHARM POST- GRADUATE (SDPG) COLLEGE LIBRARY PANIPAT, HARYANA

Memory of the World. United Nations Educational, Scientific and Cultural Organization. The Documentary Heritage of TIMOR LESTE

Cambridge University Engineering Department Library Collection Development Policy October 2000, 2012 update

COLLECTION DEVELOPMENT AND MANAGEMENT POLICY BOONE COUNTY PUBLIC LIBRARY

Frequently Asked Questions (FAQs)

University Library Collection Development Policy

Periodical Usage in an Education-Psychology Library

Code of Practice on Freedom of Speech and Expression

ICOMOS ENAME CHARTER

Digital Preservation of Rare Books & Manuscripts: A Case Study of Aligarh Muslim University

Via

Independent TV: Content Regulation and the Communications Bill 2002

ICOMOS Ename Charter for the Interpretation of Cultural Heritage Sites

Tuscaloosa Public Library Collection Development Policy

Headings: Books evaluation. Discarding of books, periodicals, etc. Law Libraries Collection development. Law Libraries Rare books

Tender Brief for Hull on Film A project supported by the Heritage Lottery Fund

ASERL s Virtual Storage/Preservation Concept

Ref.: Tel.: Fax: January 2014

Security Challenges in the Internet of Things. Dr. Sigrid Schefer-Wenzl

Citation Analysis of Doctoral Theses in the field of Sociology submitted to Panjab University, Chandigarh (India) during

JOB DESCRIPTION FOR PICTURE EDITOR VISUAL JOURNALISM ARABIC SERVICE

Ranganathans Laws of Library Science & their Implications

The Convention on Biological Diversity and its Protocols Status of Implementation. Secretariat of the Convention on Biological Diversity

Separating the wheat from the chaff: Intensive deselection to enable preservation and access

Joint submission by BBC, ITV, Channel 4, Channel 5, S4C, Arqiva 1 and SDN to Culture Media and Sport Committee inquiry into Spectrum

Collection development in academic libraries

Meeting the Challenge of a Difficult Job Speciality Contractor ACE Awards

Quarterly Crime Statistics Q (01 April 2014 to 30 June 2014)

UNIVERSITY OF NOTTINGHAM MANUSCRIPTS AND SPECIAL COLLECTIONS. Acquisitions Policy for Rare Books

Privacy Policy. April 2018

La Porte County Public Library Collection Development Policy

CROCODILE AUSTRIA VIDEOSYSTEM

CARNEGIE-STOUT PUBLIC LIBRARY MATERIALS SELECTION POLICY. City of Dubuque

St Andrew s CE Primary School Music Policy

South Carolina Standards for School Library Resource Collections

Impact of Electronic Surveillance Systems on Theft and Mutilation in Francis Suleimanu Idachaba Library, University of Agriculture Makurdi

Reading Room of The Library of the Academy of Sciences

Caring for Sacramental Records

Awareness on Plagiarism among Research Scholars of Sri Venkateswara University: A Study

The BBC s services: audiences in Northern Ireland

Cable Strike Awareness & Elimination. Mosaic Potash - Esterhazy K1 Mine

The Rare Books and Special Collections Library Access Policy Policy Statement

Transcription:

Security Measures to be taken to Reduce Theft, Mutilation and Misplacement of Karnataka State University Library Resources: A Study Dr. Jagadish M.V Librarian Sri, D.Devaraja Urs Government First Grade College Hunsur, Mysore (Dist) Karnatka (State) India. jagga.rituparna@gmail.com Abstract - Libraries are pillar of society; no nation can function effectively without the use a library. The libraries of the institution of higher learning such as colleges of education, Libraries play a vital role in the world s system of communication and education. The function of any library is to collect, organize, make available and conserve resources for future use. The aim of any library is to provide access to information resources. Library crime is at an alarming and irritating rate in every part of society nowadays mutilation and book theft as become a common phenomenon in libraries. Crime prevention and security management in libraries is not limited to any particular type of libraries. Anti- social and unlawful activities significantly affects every type of library and information service, whereas theft and mutilation are the major evils encountered at the movement. The present study as attempted to Security Measures in University libraries in Karnataka: a study. Key words: Security Measures, Theft, Mutilation and Misplacement, University libraries Introduction: Libraries and archives are mainstay for nation development and no nation can function effectively without the use of library. Prevention is always better than cure. Libraries and archives prevent damages, stealing of books and safeguard them there by acting as pillars of civilization. Libraries and Archives need to have safety and security measures plans to ensure that staffs are prepared to respond to fire, water emergencies, and other large-scale threats to collections. Protecting the collection should include ensuring good security to prevent theft, mutilation and misplacement. In this context the researcher placed the query to the students: what the measures are of reduce theft, mutilation and misplacement of library resources? Proposed Frame Work for Action Library is amalgamation of three tiers: (library customers), resources, (books, journals etc), and library staff (library administrators). The main and basic function of any library is to provide physical access to books. On the other hand, if it is out of the order on the shelf of the library, the likelihood that a user will find a desired book is reduced. Here the issue of theft, mutilation and misplacement arises. A framework of action for collection protection is proposed in this segment. 43 P a g e

Library Security Management Teams Library Resource Collections collections Library Users (Customers) ) Library Services Resource Collections Collection Security Management Plan Library Security Management Team Policy Formulation & Implementation Building Protection Library Operation Process Traning of Staff on Collection Development Reviews Updates Risk Assessment Figure -1 Library Security Management Teams It is necessary to recruit well trained senior security staff with capability to lead a responsible security team and building a team in which is capable of collaborative efforts in handling security threats and ensuring the protection of library resources. Review of Literature Arndt Jr., D. A. (2001) says that library staff often encounters problem patrons and this indeed puts fears on other patrons and leads to physical insecurity. This study identifies the risks and also suggests some precautions to be taken including diffusing anger at the service point through improved interpersonal communication techniques and staff training, drafting policies and procedures to help guide staff as they deal with incidents, and improving the security of library buildings. The study concentrates on legal issues of library security. Gautam, V., Behera, P. K., & Singh, M. (2011) outline the importance of digital collections in every organization and say that it has become a major source of information and a preferred mode of acquisition for collection development in a library. The study says that there are risks of unauthorized use of digital material and that it is not secure by its nature. The paper highlights that the more the effort is made to create digital contents the less attention is given to its security, and threats come in many forms. The study concentrates on the importance of digital data security and also security of library collection. Choudhary, S.K. (2011) contends that libraries and archives need to have safety and security plans to ensure that staff are prepared to respond to fire, water emergencies, and other largescale threats to collections. The study concentrates on risk patrons, resources and equipment, and library employees library for library assessment. The goal of a security system should 44 P a g e

provide safe and secure facility. The study recommends that there should be CCTV system and security guards to enforce appropriate library access to the assets of the library. Use of electronic security equipment with alarm notification to the appropriate authority, entry control, and site surveillance will avoid theft and mutilation of library material. Martin, A. L. (2000) studies on archival security and discusses that archivist protect and provide access to archival documents, the study also states that the archivist safeguards the archival materials safely in custody and its integrity is well maintained. The study suggests that documentation as another important preventive measure in terms of patrons. Further the study also concentrates on incunabulum documents and some aspects on security literature in the 1980s as important archival materials which needs to be safeguard as archives. Vinayagamoorthy, P. (2007) discuss that bar-coding, electronic-magnetic strips, radio frequency identification are used with the intention of improving the quality of service to the users and the security of library materials. The study recommends that RFID helps in the security aspect of library material which could be adopting for inventories of materials and which helps librarians in providing the users with optimum utilization of available resources. The study shows the importance of the use of ESG (Electronic Security Gates) for checking in and out. The study concludes that RFID over barcode systems or RFID tags can be used for security as well as for status control, thereby eliminating the need to attach security strips to library items. Need for the Study The present study also envisages representing preventive measures, new ideas to improve surveillance, and updated monitoring systems to keep a close eye on user behaviour. The study will recommend new strategies in training and communication, and the use of user sensitization programme which will increase the user awareness of the enormity of damage caused by delinquent behaviour. It is hoped that the findings of the study will provide authentic information to provide the finest academic support to genuine scholars and serious readers. The study helps both librarians and users to preserve and protect priceless academic wealth of libraries for future generations. Objectives of the Present Study The objectives of the study are: 1. To identify and discuss the major forms of theft and mutilation incidents that occur in university libraries; 2. To find out the common security measures in the university libraries 3. To find out the electronic gadgets use in security measures in university libraries Methodology The researcher conducted a survey research design was used for the study. The total number of seven questionnaires distributed to seven university librarians in Karnataka all seven university librarians have participated in the study. The questionnaire consisted of questionnaires on preventive measurements of theft, mutilation and misplacement of library resources. The researcher visited the each of the university libraries during the year of 2016-17 for data collection. The data obtained were analysed using simple percentages and frequencies. 45 P a g e

Data interpretation and Data Analysis Table 1. Designation-wise Distribution of Heads of the Libraries University Libraries Librarian Librarian I/C Bangalore University Library 0 1 Gulbarga University Library 1 0 Karnatak University Library 0 1 Kuvempu University Library 0 1 Mangalore University Library 1 0 Mysore University Library 0 1 Tumkur University Library 0 1 Total 2(28.58%) 5(71.42%) Table 1 reveals the designation-wise distribution of heads of libraries. It may be seen from the table that out of 7 university libraries, 2 (28.58%) university libraries namely Gulbarga University library and Mangalore University library, have librarians themselves as heads of their libraries. As for the remaining 5(71.42%) university libraries namely Bangalore University library, Karnatak University library Dharwada, Kuvempu University library, Mysore University library and Tumkur University library, the librarians I/C function as heads of the libraries and leading the activities. Table 2. Theft, Mutilation and Misplacement of Library Resources Problems Respondents % Frequent problem 03 42.85 Severe problem 04 57.14 Total 07 100 Table 2 reveals the problems of theft, mutilation and misplacement of library resources. It may be seen from the table that out of seven university librarians 03(42.85%) opine that theft, mutilation and misplacement is a frequent problem and 04(57.14%) of them opine that it is a severe problem and also believe that the occurrence and re-occurrence of theft, mutilation, and misplacement of library resources and its consequence is a serious problem. Table 3 Approximate Loss of Books after Each Stock Verification Approximate Loss of Books Per Annum Respondents % No response 04 58 1 250 Books 01 14 501 1000 Books 01 14 1001 and Above Books 01 14 Total 07 100 Table 3 depicts information regarding the approximate loss of books per annum after stock verification in university libraries. The table shows that out of seven university libraries, three libraries show that approximate loss of books per annum will be between 1-250, 501-1000 and 1001 and above respectively. The remaining 4(58%) libraries have given No response for the same 46 P a g e

Table-4 Electronic Security measures to adopt preventive theft, mutilation and misplacement of library resources Order of Preference Given by the Librarians Electronic Security Systems 1 st 2 nd 3 rd Total F % F % F % F % CCTV cameras 5 71.42 1 14.28 1 14.28 7 100 RFID system 4 57.14 2 28.57 1 14.28 7 100 3m exit gate 5 71.42 2 28.57 --- --- 7 100 Alarm system installed 5 71.42 2 28.57 --- --- 7 100 Glass break sensor 2 28.57 1 14.28 4 57.14 7 100 Fire/smoke sensor 3 42.85 2 28.57 2 28.57 7 100 Biometrics 6 85.71 1 14.28 --- --- 7 100 Use of smart card 7 100 --- --- --- --- 7 100 Fire extinguisher security system 2 28.57 2 28.57 3 42.85 7 100 Library Management Software 7 100 --- ---- --- --- 7 100 Table 4 interprets the preference for the type of electronic security systems for libraries. It can be seen that out of a total, 100% of the respondents prefer using of Smart card and Library Management Software as their first option, whereas 6 (85.71%) believe that biometrics would better serve the purpose. 5(71.42%) prefer CCTV cameras and 3m exit gate and 4(57.14%) prefer first option, that installing RFID system in the library would best serve the security purposes. Besides 4(57.14%) and 2(28.57%) of them opine that glass break sensor and fire extinguisher security system as the 3 rd preference of electronic security system to be in the library. Table-5 Suggestions to be taken by Librarians for Eradication of Theft, Mutilation and Misplacement of Library Resources Order of Preference Given by Librarians Suggestions 1 st 2 nd 3 rd Total F % F % F % F % Regular training and continuing education programme particularly in information literacy (Ex:-Impact of 2 28.57 4 57.14 1 14.28 7 100 mutilation on intellectual excellence) Providing regular proper interaction and orientation to library users 6 85.71 1 14.28 1 14.28 7 100 Strengthening and enforcing library rules and regulation to discourage likely offenders 1 14.28 2 28.57 4 57.14 7 100 Impose hefty penalty for ruining university property 2 28.57 4 57.14 1 14.28 7 100 Librarians should invest on collection development of electronic resources and encourage their users to use 2 28.57 2 28.57 3 42.85 7 100 e-resources Authorities should allocate adequate budgets to install electronic security devices and electronic surveillance video cameras, RFID to discourage theft, mutilation 2 28.57 2 28.57 3 42.85 7 100 and misplacement Priority should be given to digitise most valuable library resources to prevent them from mutilation 6 85.71 1 14.28 --- --- 7 100 Table 5 furnishes the order of frequency of suggestions for eradication of theft, mutilation and misplacement of library resources given by the librarians. It can be observed that 6 (85.71%) of the respondents give first preference to regular proper interaction and orientation programme to library users and digitising most valuable library resources to prevent them from library mutilation, regular training and continuing education programme particularly in information literacy and librarians should invest on collection 47 P a g e

development of electronic resources and encourage their users to use e-resources. Whereas, second preference and third preference as suggestions were given by 4 (57.14%) librarians who opine that Imposing hefty penalty for ruining university property and strengthening and enforcing library rules and regulations enough to discourage likely offenders, will help in curbing the attitudes of disruptive users in libraries. Findings The most effective measures for eliminating theft, mutilation and misplacement of library resources are imposing hefty penalty, dismissing students from colleges, and enforce library rules and regulations that are tough enough to discourage likely offenders. The study found that the majority of Librarians respondents suggested installation of electronic security systems such as smart card, Library management Software, biometrics, FID/CCTV and that Priority should be given to digitise most valuable library resources to prevent them from library theft, mutilation and misplacement of the library resources. Conclusion This study revealed that theft, mutilation and misplacement of library resources in university libraries in particularly and libraries in general are serious problems that libraries often come across. This study looked these problems from the librarians perspective. More or less this study is in line with the previous studies conducted on the subjects. The previous study have done almost decade back, but still as this study reveals theft, mutilation and misplacement of library materials have remained as problems for university libraries which effects academic ambience of the library. There is need to adopt electronic technologies that some of them suggested by librarians such as Biometrics, Library management software, users smartcard, CCTV, RFID technologies for library. Most importantly librarians should engage with library users regularly to create awareness about how to use library. References 1. Arndt Jr., D. A. (2001). Problem patrons and library security. Legal Reference Services Quarterly, 19(1/2), 19-40. Beach,A (1977). Library Book Theft: A Case Study. College & Research Libraries, 38(2),118-128. 2. Choudhary,S.K. (2011).Library preservation and conservation. New Delhi: A.P.H. Publishing Corporation. 188-213. 3. Gautam, V., Behera, P. K., & Singh, M. (2011). Issues of Digital Data Security in Library Environment. International Journal of Information Dissemination and Technology, 1(4), 244-247 4. Martin, A. L. (2000). The Saying and the Doing: The Literature and Reality of Theft Prevention Measures in US Archives-Part 1. Library & archival security, 15(2), 27-75. 5. Vinayagamoorthy,P (2007). Application of RFID in engineering college library: an experience. Indian Journal of Library and Information Science,1(2).35-45. 48 P a g e