Abstract
This study assesses the theft and mutilation of library resources at Walton Whaley Library (WWL) at Valley View University, in Ghana. The study adopted a mixed-method approach; thus, copies of questionnaire and interviews were used to gather data for the study.
The quantitative and qualitative data were analyzed with the help of Nvivo version 11 and IBM Statistical Package for the Social Sciences (IBM-SPSS version 21.0). The study found that most of the users were aware of the security policies in the library. The prominent factors influencing theft and mutilation are a weak security system, the absence of closed-circuit television (CCTV) cameras, inadequate staff, the selfish interests of the perpetrators, and a lack of security personnel at the main entrance. To curb this phenomenon, certain security measures, such as the installation of electronic security devices, security personnel at the main entrance, physical body checks on users entering and exiting the Library, as well as staff surveillance are needed. The study recommended an effective and efficient security system, the vigilance of library staff, the acquisition of multiple books in high demand, availability and accessibility of photocopying services. The study suggested harsh punishment for perpetrators who breach library rules.
References
Abinaya, I.G.K, Rajkumar, D. (2021). Analysis of ergonomic risk factors in construction industry. Materials Today: Proceedings,37, 2415–2418. https://doi.org/10.1016 /j.matpr.2020.08.269.
Abubakar, B. A., Abdullahi, S., Dewa, A. & Barkindo, A. (2020). Security challenges and control measure in four academic libraries in North East Nigeria University Libraries. Journal of Science Technology and Education, 8(1), 100-108.
Abubakar, F. & Aduku, B. S. (2016). Approaches to the security of information resources in academic libraries in Niger State, Nigeria. Samaru Journal of Information Studies, 16 (1), 12-24. https://www.ajol.info/index.php/sjis/article/view/174811.
Adekunle, F.A., Adekunjo, O.A., & Unuabor, S.O. (2018). Theft and Vandalism: Effect and Control Mechanism on Information Resources in Academic Libraries in Osun State, Nigeria. IOSR Journal of Humanities and Social Science (IOSR-JHSS), 23 (7), Version. 9. 71-78. www.iosrjournals.org
Adeyemi, I. O., & Omopupa, K.T. (2020). Moving from OPAC to discovery systems: Nigerian Librarians’ knowledge and readiness. Cataloging& Classification Quarterly, 58 (2), 149-168. doi: 10.1080/01639374.2020.1715520.
Agboola, B., & Aduku, B. S. (2019). Managing security issues in Federal University Gashua Library Yobe State, North East of Nigeria. Being a paper presented at the 1st International Conference on personal security and community policing held between 3 -5 May 2017 at Alqalam University Katsina, Katsina State, Nigeria. 40-41.
Akussah, H. (2006). The state of document deterioration in the National Archives of Ghana. African Journal of Library, Archives and Information Science, 16(1), 1-8. https://www.ajol.info/index.php/ajlais/cart/view/26122/21430
Ali, M.Y. (2016). Library book theft and audits in university libraries of Pakistan. Journal of Library Administration, 57(1), 87-98. https://doi.org/ 10.1080/01930826 .2016.1251252
Almindeel, R., & Martins, J. T. (2020). Information security awareness in a developing country context: insights from the government sector in Saudi Arabia. Information Technology and People, 34 (2), 770-788. https://doi.org/10.1108/ITP-06-2019-0269
American Library Association. (2016). Loss rate. http://www.ala.org/tools/loss-rate
Azerikatoa, D. A. Christopher, S. B., & Sadat, B. (2014). How Secure Are Library Collections? An Evaluation of Polytechnic Libraries in Ghana. Information and Knowledge Management, 4(3), 56-66. file://C:/Users/Hp/Downloads/Paper3% 20(1).pdf
Bansode, S.Y., & Desale, S. K. (2009). Implementation of RFID technology in the University of Pune Library. Electronic library and information systems. 43(2), 202-214. doi:10.1108/00330330910954406.
Basaka, A. A., Abdullahi, S., Dewa, A., & Barkindo, A. (2020). Security Challenges and Control Measure in Four Academic Libraries in North East Nigeria University Libraries. Journal of Science Technology and Education, 8(1), 100-108. www.atbuftejoste.com.
Benedict, A., Onyeke, O. E., & Niyi, A. M. (2020). Strategies and Policies for Disaster Management in Academic Libraries: A Case Study of Kaduna State College of Education Library, Gidan-Waya. Library Philosophy and Practice (e-journal). 4595. https://digitalcommons.unl.edu/libphilprac/4595, 3, 14-2020.
Carrell, S. (2019). Man jailed for stealing 7,000 books from Scottish universities. The Guardian News. https://www.theguardian.com/
Chinwendu, N. A. (2019). Effect of theft and mutilation on the use of library collection in an academic library in Lagos State. Library Philosophy and Practice (e-journal).
Elizabeth, E.E., & Ogunjimi, E.O.(2019). Overview of Security Measures in Nigerian University Libraries. Journal of Advances in Library and Information Science, 8 (1). 13-20. https://jalis.in/pdf/8-1/Ekong.pdf
Eruvwe, U., Akpojotor, O. L. & Okonoko, V. N. (2015). The defiant attitude among library users in Federal University of Petroleum Resources Library Effurun (FUPRE) Nigeria. Information and Knowledge Management, 5 (3), 131-141. https://www.iiste.org/Journals/index.php/IKM/article/view/20593/21013.
Fasae, J.K., & Adedokun, F.O. (2016). Abuse of Information Materials in Academic Libraries by Students of Tertiary Institutions in Ekiti-State, Nigeria. Library Philosophy and Practice (ejournal). http://digitalcommons.unl.edu/libphilprac/1426
Guimaraes, J. (2021). Information Security Awareness: Learning for Effectiveness (Doctoral dissertation, St. Thomas University. https://www.proquest. com/openview/ d2a8de 705479ad3be176483b13881c00/1?pq-origsite=gscholar&cbl=18750&diss=y
Gupta, P., & Madhusudhan, M. (2021). RFID Technology as a Potential Electronic Security System: An Assessment from Twenty-four Academic Libraries of India. Journal of Knowledge & Communication Management, 11(2), 87-115. http://dx.doi.org/10.5 958/2277-7946.2021.00007.3
Halubanza, B., Kunda, D., & Musonda, Y. (2021). An assessment of Information Security Awareness among Employees in Higher Education Sector in Zambia: A Case of Zambia’s public Universities. 1-14. https:// space.mu. ac.zm/ xmlui/handle/ 123 456789/186.
Harris, M. A., & Martin, R. (2019). Promoting cybersecurity compliance. Cybersecurity education for awareness and compliance, (54 -71). https://doi.org/10.4018/978-1-5225-7847-5.ch004
Hendal, B.A. (2019). Kuwait University faculty usage and perspectives of reference management software, Open Access Library Journal, 6, 1-11. doi:10.4236/oalib.1105685.
Higgins. (2015). Theft and Vandalism of books, Manuscripts, and Related Materials in Public and Academic Libraries, Archives and Special Collections. Library Philosophy and Practice (e-Journal).
Humaidi, N., & Balakrishnan, V. (2015). Leadership styles and information security compliance behavior: The mediator effect of information security awareness. International Journal of Information and Education Technology, 5(4), 311. doi: 10.7763/IJIET.2015.V5.522.
Jagadish, M. V., & Sarasvathy, P. (2016). What Librarian's Think of Theft, Mutilation and Misplacement of Library Resources? A Study of Karnataka University Libraries. International Research: Journal of Library and Information Science, 6(4),711-724.
Khurshid, A. (2015). Adoption of electronic surveillance and security systems installed. In Hec recognised university libraries of Punjab and Federal Area Thesis. doi:10.13140/RG.2.2.35433.70245.
Liu, C., Liang, H., Wang, N., & Xue, Y. (2022). Ensuring employees' information security policy compliance by carrot and stick: the moderating roles of organizational commitment and gender. Information Technology and People, 35 (2), 802-834. https://doi.org/10.1108/ITP-09-2019-0452.
Matoskova, J. (2016). Measuring Knowledge. Journal of Competitiveness, 8 (4), 5-29. https:// doi.org /10. 7441/ joc. 2016.04.01.
Mugenda, O.M. & Mugenda, A.G. (2003). Research Methods: Quantitative and Qualitative Approaches:Nairobi.
Nancy, H. K. (2016). Adoption of the surveillance system for managing theft and vandalism: A survey, library, Technology Report, 12 (6), 576.
Nath, R., & Deka, D. (2020). The practice of Security Systems in University Libraries of Assam. Library Philosophy and Practice (e-journal). 4807. https://digitalcommons. unl. edu/libphilprac/4807.
Nweke, A. C. (2019). Effect of Theft and Mutilation on The Use of Library Collection in an Academic Library in Lagos State. Library Philosophy and Practice, 0_1-15.
Ofori, K. S., Anyigba, H., Ampong, G. O. A., Omoregie, O. K., Nyamadi, M., &Fianu, E. (2022). Factors influencing information security policy compliance behaviour. In book: Research Anthology on Business Aspects of Cybersecurity, 213-232. http://dx.doi.org/10.4018/978-1-6684-3698-1.ch010.
Ohayagha, S. C. (2014). The use of technology in curbing library loses in research and innovation for sustainable future. Journal of Qualitative Education, 10 (1), 1-6.
Olajide, O. (2017). Theft and Mutilation Challenges and Management in Academic Libraries: A Case Study of Federal University Oye-Ekiti, Nigeria. Journal of Applied Information Science and Technology,10 (1). https://www.jaistonline .org/10vol1/ JAIST%.20PAPER%2010%20Theft%20and%20Mutilation%20Challenges%20recent.pdf.
Omoike. A., & Alabi. R. (2020). Theft, Mutilation and Abuse of Library and Information Materials by Undergraduates of the University of Ibadan, Nigeria. Information Impact: Journal of Information and Knowledge Management, 11(2), 1-12. doi:dx.doi.org/10.4314/iijikm.v11i2.1.
Oyesiku, F. A, Buraimo, O., & Olusanya, O.F. (2012). Disruptive Readers in Academic Libraries: A Study of Olabisi Onabanjo University Library Onabanj. Library Philosophy and Practice (e-journal). https://digitalcommons.unl.edu/cgi/ view content.cgi? article= 1840& context=libphilpra.
Polit, D.F. & Beck, C.T. (2010). Generalisation in quantitative and qualitative research: myths and strategies. International Journal of Nursing Studies, 47 (11), 1451-1458. https://doi.org/10.1016/j.ijnurstu.2010.06.004
Poth, C., & Munce, S. E. P. (2020). Commentary-preparing today’s researchers for a yet unknown tomorrow: Promising practices for a synergistic and sustainable mentoring approach to mixed methods research learning. International Journal of Multiple Research Approaches, 12 (1), 56-64. doi: 10.29034/ijmra.v12n1commentary.
Salman, A. A., Mugwisi, T., & Mostert, B. J. (2017). Access to and use of public library services in Nigeria. South African Journal of Libraries and Information Science, 83 (1). https://doi.org/10.7553/83-1-1639.
Shuttleworth, M. (2008). Case study research design: Experiment resources. http://www. experiment-resources.com/case-study-research-design.html
Simukali, M.C. (2019). Multi factor authentication access control for student and staff based on RFID, BARCODE and GIS. http://dspace.unza.zm/handle/123456789/6623.
http://dspace.unza.zm/handle/123456789/6623.
Song, H. H. (2020). Testing and evaluation system for cloud computing information security products. Procedia Computer Science, 166, 84-87. https://doi.org/10.1016 /j.procs. 2020.02.023.
Weeb, J., Ahmad, A., Maynard, S. B., & Shanks, G. (2014). A situation awareness model for information security risk management. Computers & Security, 44, 1-15. http://dx.doi.org/10.1016/j.cose.2014.04.005.
Wilson, D., Frazier, C., & Harter, D. (2015). Circulation policies in major academic libraries. The Journal of Academic Librarianship, 41, 798–803. doi: 10.1016/j.acalib.2015. 08.019.
Yamson, G. C. & Cobblah, M. (2016). Assessments of collection security management in academic libraries: A case study of Central University library. European Scientific Journal, (3), 392-405. https://scholar.google.com/citations? view_op=view_ citation&hl=en&user=qRsqpAoAAAAJ&citation _for_view=qRsqpAoAAA AJ:5nxA0vEk-isC.
Yerby, J., & Floyd, K. (2018). Faculty and staff information security awareness and behaviors. Journal of the Colloquium for Information Systems Security Education,6(1)23-23.
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright (c) 2024 International Journal of Librarianship