Who are the Culprits? Evaluation of Theft and Mutilation of Academic Library Materials: Experience from the Walton Whaley Library
PDF

How to Cite

Ameyaw, S., Nana Eleduh Amoah, C., & Frempong-Kore, A. (2024). Who are the Culprits? Evaluation of Theft and Mutilation of Academic Library Materials: Experience from the Walton Whaley Library. International Journal of Librarianship, 9(3), 47–74. https://doi.org/10.23974/ijol.2024.vol9.3.378

Abstract

This study assesses the theft and mutilation of library resources at Walton Whaley Library (WWL) at Valley View University, in Ghana. The study adopted a mixed-method approach; thus, copies of questionnaire and interviews were used to gather data for the study.

The quantitative and qualitative data were analyzed with the help of Nvivo version 11 and IBM Statistical Package for the Social Sciences (IBM-SPSS version 21.0). The study found that most of the users were aware of the security policies in the library. The prominent factors influencing theft and mutilation are a weak security system, the absence of closed-circuit television (CCTV) cameras, inadequate staff, the selfish interests of the perpetrators, and a lack of security personnel at the main entrance. To curb this phenomenon, certain security measures, such as the installation of electronic security devices, security personnel at the main entrance, physical body checks on users entering and exiting the Library, as well as staff surveillance are needed. The study recommended an effective and efficient security system, the vigilance of library staff, the acquisition of multiple books in high demand, availability and accessibility of photocopying services. The study suggested harsh punishment for perpetrators who breach library rules.

https://doi.org/10.23974/ijol.2024.vol9.3.378
PDF

References

Abinaya, I.G.K, Rajkumar, D. (2021). Analysis of ergonomic risk factors in construction industry. Materials Today: Proceedings,37, 2415–2418. https://doi.org/10.1016 /j.matpr.2020.08.269.

Abubakar, B. A., Abdullahi, S., Dewa, A. & Barkindo, A. (2020). Security challenges and control measure in four academic libraries in North East Nigeria University Libraries. Journal of Science Technology and Education, 8(1), 100-108.

Abubakar, F. & Aduku, B. S. (2016). Approaches to the security of information resources in academic libraries in Niger State, Nigeria. Samaru Journal of Information Studies, 16 (1), 12-24. https://www.ajol.info/index.php/sjis/article/view/174811.

Adekunle, F.A., Adekunjo, O.A., & Unuabor, S.O. (2018). Theft and Vandalism: Effect and Control Mechanism on Information Resources in Academic Libraries in Osun State, Nigeria. IOSR Journal of Humanities and Social Science (IOSR-JHSS), 23 (7), Version. 9. 71-78. www.iosrjournals.org

Adeyemi, I. O., & Omopupa, K.T. (2020). Moving from OPAC to discovery systems: Nigerian Librarians’ knowledge and readiness. Cataloging& Classification Quarterly, 58 (2), 149-168. doi: 10.1080/01639374.2020.1715520.

Agboola, B., & Aduku, B. S. (2019). Managing security issues in Federal University Gashua Library Yobe State, North East of Nigeria. Being a paper presented at the 1st International Conference on personal security and community policing held between 3 -5 May 2017 at Alqalam University Katsina, Katsina State, Nigeria. 40-41.

Akussah, H. (2006). The state of document deterioration in the National Archives of Ghana. African Journal of Library, Archives and Information Science, 16(1), 1-8. https://www.ajol.info/index.php/ajlais/cart/view/26122/21430

Ali, M.Y. (2016). Library book theft and audits in university libraries of Pakistan. Journal of Library Administration, 57(1), 87-98. https://doi.org/ 10.1080/01930826 .2016.1251252

Almindeel, R., & Martins, J. T. (2020). Information security awareness in a developing country context: insights from the government sector in Saudi Arabia. Information Technology and People, 34 (2), 770-788. https://doi.org/10.1108/ITP-06-2019-0269

American Library Association. (2016). Loss rate. http://www.ala.org/tools/loss-rate

Azerikatoa, D. A. Christopher, S. B., & Sadat, B. (2014). How Secure Are Library Collections? An Evaluation of Polytechnic Libraries in Ghana. Information and Knowledge Management, 4(3), 56-66. file://C:/Users/Hp/Downloads/Paper3% 20(1).pdf

Bansode, S.Y., & Desale, S. K. (2009). Implementation of RFID technology in the University of Pune Library. Electronic library and information systems. 43(2), 202-214. doi:10.1108/00330330910954406.

Basaka, A. A., Abdullahi, S., Dewa, A., & Barkindo, A. (2020). Security Challenges and Control Measure in Four Academic Libraries in North East Nigeria University Libraries. Journal of Science Technology and Education, 8(1), 100-108. www.atbuftejoste.com.

Benedict, A., Onyeke, O. E., & Niyi, A. M. (2020). Strategies and Policies for Disaster Management in Academic Libraries: A Case Study of Kaduna State College of Education Library, Gidan-Waya. Library Philosophy and Practice (e-journal). 4595. https://digitalcommons.unl.edu/libphilprac/4595, 3, 14-2020.

Carrell, S. (2019). Man jailed for stealing 7,000 books from Scottish universities. The Guardian News. https://www.theguardian.com/

Chinwendu, N. A. (2019). Effect of theft and mutilation on the use of library collection in an academic library in Lagos State. Library Philosophy and Practice (e-journal).

Elizabeth, E.E., & Ogunjimi, E.O.(2019). Overview of Security Measures in Nigerian University Libraries. Journal of Advances in Library and Information Science, 8 (1). 13-20. https://jalis.in/pdf/8-1/Ekong.pdf

Eruvwe, U., Akpojotor, O. L. & Okonoko, V. N. (2015). The defiant attitude among library users in Federal University of Petroleum Resources Library Effurun (FUPRE) Nigeria. Information and Knowledge Management, 5 (3), 131-141. https://www.iiste.org/Journals/index.php/IKM/article/view/20593/21013.

Fasae, J.K., & Adedokun, F.O. (2016). Abuse of Information Materials in Academic Libraries by Students of Tertiary Institutions in Ekiti-State, Nigeria. Library Philosophy and Practice (ejournal). http://digitalcommons.unl.edu/libphilprac/1426

Guimaraes, J. (2021). Information Security Awareness: Learning for Effectiveness (Doctoral dissertation, St. Thomas University. https://www.proquest. com/openview/ d2a8de 705479ad3be176483b13881c00/1?pq-origsite=gscholar&cbl=18750&diss=y

Gupta, P., & Madhusudhan, M. (2021). RFID Technology as a Potential Electronic Security System: An Assessment from Twenty-four Academic Libraries of India. Journal of Knowledge & Communication Management, 11(2), 87-115. http://dx.doi.org/10.5 958/2277-7946.2021.00007.3

Halubanza, B., Kunda, D., & Musonda, Y. (2021). An assessment of Information Security Awareness among Employees in Higher Education Sector in Zambia: A Case of Zambia’s public Universities. 1-14. https:// space.mu. ac.zm/ xmlui/handle/ 123 456789/186.

Harris, M. A., & Martin, R. (2019). Promoting cybersecurity compliance. Cybersecurity education for awareness and compliance, (54 -71). https://doi.org/10.4018/978-1-5225-7847-5.ch004

Hendal, B.A. (2019). Kuwait University faculty usage and perspectives of reference management software, Open Access Library Journal, 6, 1-11. doi:10.4236/oalib.1105685.

Higgins. (2015). Theft and Vandalism of books, Manuscripts, and Related Materials in Public and Academic Libraries, Archives and Special Collections. Library Philosophy and Practice (e-Journal).

Humaidi, N., & Balakrishnan, V. (2015). Leadership styles and information security compliance behavior: The mediator effect of information security awareness. International Journal of Information and Education Technology, 5(4), 311. doi: 10.7763/IJIET.2015.V5.522.

Jagadish, M. V., & Sarasvathy, P. (2016). What Librarian's Think of Theft, Mutilation and Misplacement of Library Resources? A Study of Karnataka University Libraries. International Research: Journal of Library and Information Science, 6(4),711-724.

Khurshid, A. (2015). Adoption of electronic surveillance and security systems installed. In Hec recognised university libraries of Punjab and Federal Area Thesis. doi:10.13140/RG.2.2.35433.70245.

Liu, C., Liang, H., Wang, N., & Xue, Y. (2022). Ensuring employees' information security policy compliance by carrot and stick: the moderating roles of organizational commitment and gender. Information Technology and People, 35 (2), 802-834. https://doi.org/10.1108/ITP-09-2019-0452.

Matoskova, J. (2016). Measuring Knowledge. Journal of Competitiveness, 8 (4), 5-29. https:// doi.org /10. 7441/ joc. 2016.04.01.

Mugenda, O.M. & Mugenda, A.G. (2003). Research Methods: Quantitative and Qualitative Approaches:Nairobi.

Nancy, H. K. (2016). Adoption of the surveillance system for managing theft and vandalism: A survey, library, Technology Report, 12 (6), 576.

Nath, R., & Deka, D. (2020). The practice of Security Systems in University Libraries of Assam. Library Philosophy and Practice (e-journal). 4807. https://digitalcommons. unl. edu/libphilprac/4807.

Nweke, A. C. (2019). Effect of Theft and Mutilation on The Use of Library Collection in an Academic Library in Lagos State. Library Philosophy and Practice, 0_1-15.

Ofori, K. S., Anyigba, H., Ampong, G. O. A., Omoregie, O. K., Nyamadi, M., &Fianu, E. (2022). Factors influencing information security policy compliance behaviour. In book: Research Anthology on Business Aspects of Cybersecurity, 213-232. http://dx.doi.org/10.4018/978-1-6684-3698-1.ch010.

Ohayagha, S. C. (2014). The use of technology in curbing library loses in research and innovation for sustainable future. Journal of Qualitative Education, 10 (1), 1-6.

Olajide, O. (2017). Theft and Mutilation Challenges and Management in Academic Libraries: A Case Study of Federal University Oye-Ekiti, Nigeria. Journal of Applied Information Science and Technology,10 (1). https://www.jaistonline .org/10vol1/ JAIST%.20PAPER%2010%20Theft%20and%20Mutilation%20Challenges%20recent.pdf.

Omoike. A., & Alabi. R. (2020). Theft, Mutilation and Abuse of Library and Information Materials by Undergraduates of the University of Ibadan, Nigeria. Information Impact: Journal of Information and Knowledge Management, 11(2), 1-12. doi:dx.doi.org/10.4314/iijikm.v11i2.1.

Oyesiku, F. A, Buraimo, O., & Olusanya, O.F. (2012). Disruptive Readers in Academic Libraries: A Study of Olabisi Onabanjo University Library Onabanj. Library Philosophy and Practice (e-journal). https://digitalcommons.unl.edu/cgi/ view content.cgi? article= 1840& context=libphilpra.

Polit, D.F. & Beck, C.T. (2010). Generalisation in quantitative and qualitative research: myths and strategies. International Journal of Nursing Studies, 47 (11), 1451-1458. https://doi.org/10.1016/j.ijnurstu.2010.06.004

Poth, C., & Munce, S. E. P. (2020). Commentary-preparing today’s researchers for a yet unknown tomorrow: Promising practices for a synergistic and sustainable mentoring approach to mixed methods research learning. International Journal of Multiple Research Approaches, 12 (1), 56-64. doi: 10.29034/ijmra.v12n1commentary.

Salman, A. A., Mugwisi, T., & Mostert, B. J. (2017). Access to and use of public library services in Nigeria. South African Journal of Libraries and Information Science, 83 (1). https://doi.org/10.7553/83-1-1639.

Shuttleworth, M. (2008). Case study research design: Experiment resources. http://www. experiment-resources.com/case-study-research-design.html

Simukali, M.C. (2019). Multi factor authentication access control for student and staff based on RFID, BARCODE and GIS. http://dspace.unza.zm/handle/123456789/6623.

http://dspace.unza.zm/handle/123456789/6623.

Song, H. H. (2020). Testing and evaluation system for cloud computing information security products. Procedia Computer Science, 166, 84-87. https://doi.org/10.1016 /j.procs. 2020.02.023.

Weeb, J., Ahmad, A., Maynard, S. B., & Shanks, G. (2014). A situation awareness model for information security risk management. Computers & Security, 44, 1-15. http://dx.doi.org/10.1016/j.cose.2014.04.005.

Wilson, D., Frazier, C., & Harter, D. (2015). Circulation policies in major academic libraries. The Journal of Academic Librarianship, 41, 798–803. doi: 10.1016/j.acalib.2015. 08.019.

Yamson, G. C. & Cobblah, M. (2016). Assessments of collection security management in academic libraries: A case study of Central University library. European Scientific Journal, (3), 392-405. https://scholar.google.com/citations? view_op=view_ citation&hl=en&user=qRsqpAoAAAAJ&citation _for_view=qRsqpAoAAA AJ:5nxA0vEk-isC.

Yerby, J., & Floyd, K. (2018). Faculty and staff information security awareness and behaviors. Journal of the Colloquium for Information Systems Security Education,6(1)23-23.

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright (c) 2024 International Journal of Librarianship

Downloads

Download data is not yet available.