INFS 326: COLLECTION DEVELOPMENT. Lecturer: Mrs. Florence O. Entsua-Mensah, DIS Contact Information:

Similar documents
JKUAT MOBASA CBD LIBRARY RULES AND REGULATIONS

INFS 427: AUTOMATED INFORMATION RETRIEVAL (1 st Semester, 2018/2019)

KNOW YOUR LIBRARY: A USER GUIDE MANUAL

Southern University College Library

Berkeley Theatres Policy and Procedures. It is Berkeley Theatres' policy to support the MPAA rating system to the fullest extent possible.

PICOMS INTERNATIONAL UNIVERSITY COLLEGE LIBRARY LIBRARY GUIDES

J.D. BIRLA INSTITUTE DEPARTMENTS OF SCIENCE & COMMERCE

Theft and mutilation of print collection in university libraries: A critical review of literature and proposed framework for action

CENTRAL LIBRARY OF THE EUROPEAN COMMISSION (CLB) BRUSSELS READING ROOM RULES. Article 1 Availability of services

LIBRARY RULES AND REGULATIONS The Jan Michalski Foundation for Writing and Literature February 2018

THE "HEAVENS OF COPERNICUS" PLANETARIUM VISITOR REGULATIONS

Security Challenges in the Internet of Things. Dr. Sigrid Schefer-Wenzl

How to use the Library

GUIDE TO THE KWARA STATE UNIVERSITY LIBRARY. CONTENTS Introduction Opening Hours Membership Resources... 3

FAQ for Tropicana Field:

Abuse of Information Materials in Academic Libraries by Students of Tertiary Institutions in Ekiti-State, Nigeria.

SECURITY MANAGEMENT FOR PREVENTION OF BOOK THEFTS IN UNIVERSITY LIBRARIES. A CASE STUDY OF BENUE STATE UNIVERSITY LIBRARY, NIGERIA

Library User Guide. Southern University College Library. Main Library. Malaysian Chinese Literature Centre. Traditional Chinese Medicine Library

POLICIES FOR THE USE OF BEACH/SCHMIDT PERFORMING ARTS CENTER AT FORT HAYS STATE UNIVERSITY (Effective Updated March, 2010)

CYRIL JACKSON PRIMARY SCHOOL CCTV POLICY

INFS 326: COLLECTION DEVELOPMENT 2nd Sem. 2015/2016. Topic: SELECTION OF LIBRARY MATERIALS. Lecturer: F. O. Entsua-Mensah (Mrs)

Theft And Vandalism: Effect And Control Mechanism On Information Resources In Academic Libraries In Osun State, Nigeria.

Security Measures to be taken to Reduce Theft, Mutilation and Misplacement of Karnataka State University Library Resources: A Study

CUBITT TOWN JUNIOR SCHOOL CCTV POLICY 2017

Elbert Theatre Rental Application

Flamenco Latino FLAMENCO LATINO STUDIO THEATER EVENT RENTAL AGREEMENT

CINEMA SIX Emergency and Safety Procedures

Guarding the Map Room: Understanding Theft and Increasing Security in Archives

Relaxed Performance Thursday 12 July 7pm Notes for Parents/Carers

Library Terminology. Acquisitions--Department of the Library which orders new material. This term is used in the Online Catalog.

Bodleian Libraries U N I V E R S I T Y O F OX F O R D.

KAIPTC LIBRARY LIBRARY GUIDE KAIPTC LIBRARY LIBRARY GUIDE

6C2R University Library. (1) The Mission of the Florida State University Library. The mission of the Florida State Library is to satisfy the

Sample only Oxford University Press ANZ

2019 Ford Theatres Artists Partnership Program. Day of Show Guidelines. Day of Show Guidelines. Arrival. Departure. Know Before You Go.

NEW YORK CHIROPRACTIC COLLEGE LIBRARY HANDBOOK AND POLICIES

Supplemental Information

- 1 - LICENSEE S INFORMATION: (Please complete all for processing) Licensee s Name: Licensee s Address: City, State, Zip Code:

Theft and Vandalism of Books, Manuscripts, and Related Materials in Public and Academic Libraries, Archives, and Special Collections

ACTEA Librarians enews #12, September 2005

Impact of Electronic Surveillance Systems on Theft and Mutilation in Francis Suleimanu Idachaba Library, University of Agriculture Makurdi

Know Your Library. Handbook of

LIBRARY AS LEARNING RESOURCE CENTER

CENTRAL LIBRARY TRIPURA UNIVERSITY (A CENTRAL UNIVERSITY) LIBRARY RULES AND REGULATIONS

Strule Arts Centre Visual Guide

Introduction to the Library UNIVERSITY LIBRARY KOBLENZ

Guide to Komaba Library, the University of Tokyo

SAMPLE DOCUMENT. Date: 2003

Welcome to the Bodleian History Faculty Library induction

Chapter 6. University Library

2017 Ford Theatres. Day of Show Guidelines. Artist & Producer. Day of Show Guidelines. Arrival. Departure. Know Before You Go.

Studies have been conducted over the years that confirm time and again the link between student achievements and quality of school libraries.

Prince of Wales Theatre Visual Story

facebook.com/lincolnsinnlibrary twitter.com/lilibrary instagram.com/lincolns_inn_library/ July 2018

Kelly & Library Kelly Library Information & Information Technology. Kelly Library. Technology Services. Services

Catholic Archives Society Publications

Welcome to the UBC Law Library Virtual Tour. Photo: Tom Arban

APPLICATION FOR TEEN ART EXHIBITS

LIBRARY ORIENTATION. Office of Library and Information Technology

TERMS AND CONDITIONS FOR USE OF MTN PROTECT SERVICE

July 31, 2013 * * * * * * * * * * * * * * TABLE OF CONTENTS * * * * * * * * * * * * * *

CHAPTER - 2 LIBRARY CRIME & VANDALISM IN ENGINEERING COLLEGE LIBRARIES: A REVIEW

THE MINACK THEATRE. Notes for Playing Companies. Please note 2016 amendment to Section 5 - Public Liability & Employer Liability Insurance

APPENDIX I. MARKETING OF LIBRARY AND INFORMATION PRODUCTS AND SERVICES IN ACADEMIC LIBRARIES OF UTTARAKHAND: A STUDY (Questionnaire for Librarian)

Unit 10: rules and regulation

Stroh Center A-Z Guide

Why Is It Important Today to Show and Look at Images of Destroyed Human Bodies?

Stalking in Supervised Visitation

This website (the Site) is operated by The HOYTS Corporation Pty Ltd ABN (HOYTS).

Welcome to Waseda University. Science & Engineering Library Waseda University

Library Handbook. Website: Phone number: Library Hours. See Library webpage for current hours of operation

INFS 423 Preservation of Information Resources

Liverpool Empire Theatre Visual Story A visual resource for people with Autism Spectrum Condition visiting the theatre.

CAMBRIDGE ENGLISH EMPOWER A2 Elementary Video Extra Teacher s notes

Rental Information Packet

We hope that you will find the following information helpful to you in your capacity as a volunteer usher.

Visual Story. Esplanade Theatres on the Bay

August Library User Guide

Stalking in Supervised Visitation

Image Acquisition Technology

Library Working Hours:

I am going to see Snow White and the Seven Dwarfs

Collection Development Policy. Bishop Library. Lebanon Valley College. November, 2003

Library Guide. New College Library and Archives

THE IRON MAN VISUAL STORY

LICENSEE S INFORMATION: (Please complete all for processing)

EASTERN MEDITERRANEAN UNIVERSITY ÖZAY ORAL LIBRARY

DRINKING UP HOT. By Jerry Rabushka

A QUANTITATIVE STUDY OF CATALOG USE

Submitted on:

the CenterStage Policies & Procedures

Trinity College Library

About Library. VMMC & Safdarjung Hospital

University of Malta Library Reference Collection

Fountain-New Library. Policies and Procedures Manual

What to expect when you come to see

WHO WE ARE DOHA FILM INSTITUTE. Mission: About the Institute

by Jennifer Ann Stewart

User Guide. Nanzan University Full-time instructors and Nanzan University students (including non-degree students,

Using KPIs to Improve Profitability White Paper

Transcription:

INFS 326: COLLECTION DEVELOPMENT Lecturer: Mrs. Florence O. Entsua-Mensah, DIS Contact Information: fentsua-mensah@ug.edu.gh

Lecture Overview Library Security involves procedures in human behaviour, material mutilation and material loses. Whiles building the collection of the library, it is also important to make plans for its maintenance. Security plays a key role in maintaining the collections of the library. The lecture session discourses on some of the persistent and trendy security issues that libraries face, especially in developing countries. 2

Lecture Outline This session will cover the following topics: Topic 1: Library Security Topic 2: Threats to Information Resources in a Library Topic 3: Mitigating against threats to information resources 3

Reading List Omosekejimi, A. F., Ijiekhuamhen, O. P., & Ojeme, T. N. (2015). Library and information resources security: traditional and electronic security measures. International Journal of Academic Research and Reflection. 3(3). pp. 45-56. Usman, P. (2013). Security Management for Prevention of Book Thefts in University Libraries. a Case Study of Benue State University Library, Nigeria. 4

Library Security Topic One Lecturer: Florence O. Entsua- Mensah (Mrs.) 5

Library Security 6 Library Security involves procedures in human behaviour, material mutilation and material loses. Securing library materials may be in the form of protection of the library and its collections from theft, vandalism and delinquent behaviour.

Threats to Information Resources in a Library Topic Two Lecturer: Florence O. Entsua- Mensah (Mrs.) 7

Threats & Vulnerabilities The main categories of threats in a library include: Theft Delinquent behaviours Vandalism 8

Theft Reasons for theft of information resources: Selfishness Laziness Forgetfulness. Compulsion (e.g. bibliokleptomaniac) The compact and attract nature of some books 9

Book Theft 10 Biblioklept A thief who steals books (ODLIS, 2004). When library collections are targeted, biblioklepts are considered problem patrons (Reitz, 2002). NB: An overdue book is considered lost until it is returned to the library.

Reasons for Book Theft contd. 11 Audio-visuals and electronic materials in libraries are often not well supervised. Libraries do not often send thieves to court. They just caution them, suspend or sack them from the use of the services of the library. (non-prosecution on the part of Librarians)

Types of Book Thieves 12 Generally, libraries encounter the following types of book thieves: The thief who steals books for his own use. The thief who steals in anger to destroy. The thief who steals to sell for profit. The casual thief who steals when an opportunity presents itself.

Delinquent behaviour in libraries - 1 13 Delinquent behaviour is common in all types of libraries. However, the extent of occurrence of each behaviour may differ by type of library. Some of the common behaviours are: Mutilation of library materials. Making excessive noise in the library.

Delinquent behaviour in libraries - 2 Hiding books in the library. Keeping overdue materials. Refusal to pay fines. Eating in the library. Reserving seats unjustifiably. Disorderly conduct. Indecent dressing.

Delinquent behaviour in libraries - 3 Drunkenness in the library. Smoking in the library. Sleeping in the library. Writing in books. Using other patrons library tickets. Use of prohibited materials like mobile phones in the library.

Areas prone to delinquent behaviour Stack area Serial section Toilet Carrels

Vandalism in Library Vandalism is an intentional act of destruction or defacement of property not one s own.

Some Common acts of Vandalism in libraries: Acquisitive vandalism Tactical vandalism Ideological Vandalism Play Vandalism Malicious vandalism

Acquisitive vandalism Destroying library property to acquire some money.

Tactical vandalism Destroying library property to prevent other people from using them. Example; tearing pages off books.

Ideological Vandalism Destroying library materials because of religious, social or political reasons destroying books written about a particular religion. 21

Play Vandalism Destroying of library materials for fun. Example; writing or drawing funny things in library books. 22

Malicious vandalism Destroying library materials out of anger or frustration. Example; during demonstrations. 23

Securing information resources in a library Topic Three Lecturer: Florence O. Entsua- Mensah (Mrs.) 24

Security Measures in Libraries It is common to have security staff at the entrance and exits of libraries to check users. Some libraries do not allow users to carry bags, parcels, and outside books inside the library.

In some libraries, clothing such as overcoats and gowns are not allowed in them. Some libraries secure the very important books under close supervision.

Some libraries undertake close personal search on suspected users. Cheaper facilities for photocopying can also be provided in libraries. More copies of popular books should be provided for users. It may also be necessary to extend the period for borrowing library materials. 27

28 There is the need for an alert and efficient staff in the library. Some libraries are now using security cameras to prevent theft. It may also be necessary to search library staff to avoid insider theft. There are electronic book detectors now used to detect stolen books.

To Conclude Due to the continuing emergence of security exploits, tools and techniques and ongoing diligence is required to keep informed of security developments. As well as the constant upgrade of software and hardware especially in a digital library environment.

Activity 10.1 How secured is the University s library? Discussed the aforestatement within the context of collection development, highlighting relevant threats and vulnerabilities that the collections (i.e. both electronic and print) may be exposed to. 30

References Bello, M. A. (1998) "Library security, materials theft and mutilation in technological university libraries in Nigeria", Library Management, Vol. 19 Issue: 6, pp.379-383, https://doi.org/10.1108/01435129810221001 Omosekejimi, A. F., Ijiekhuamhen, O. P., & Ojeme, T. N. (2015). Library and information resources security: traditional and electronic security measures. International Journal of Academic Research and Reflection. 3(3). pp. 45-56. Reitz, J. M. (2002). ODLIS: Online Dictionary of Library and Information Science. Usman, P. (2013). Security Management for Prevention of Book Thefts in University Libraries. a Case Study of Benue State University Library, Nigeria. 31