Emerging Technologies and Security of Library Resources at Bayelsa State Library Board
DOI:
https://doi.org/10.25159/3005-4222/14522Keywords:
emerging technologies, security , library resources, Bayelsa State Library BoardAbstract
This study investigates the application of emerging technologies in the security of library resources at Bayelsa State Library Board (BYSLB). The loss of rare intellectually stimulating and information-rich resources due to ineffective security methods at the Bayelsa State Library Board resulted in this study. Two objectives and two research questions guided the study, and two research hypotheses were formulated and tested at a 0.05 level of significance. The study was carried out using correlation research designs, with a population of 24, comprising professionals, paraprofessionals, and supporting staff. A census sampling technique was used to select all the respondents. A questionnaire was used for data collection and a total of 24 copies were administered, but only 21 copies were found valid for analysis. The data was analysed using the mean score and standard deviation for research questions and the Pearson product-moment correlation to test the hypotheses. The findings reveal that the application of emerging technologies such as radio frequency identification (RFID), barcode, and closed-circuit television (CCTV) were not fully adapted. There is a significant relationship between RFID/barcode and CCTV technologies and the security of library resources at BYSLB. The study concluded that librarians should strive to adopt technological applications for securing public library resources. They should organise orientation programmes to educate users on the importance of safeguarding library resources. The study recommended, among others, funding from the government and private sectors, training of library staff as security specialists who will conduct risk assessment, and disaster preparedness towards library resources.
References
Abubakar, F. 2016. “Preservation and Security of Information Resources in Academic Libraries in Niger State, Nigeria.” MLS diss., Ahmadu Bello University. http://hdl.handle.net/123456789/9815
Aina, A. J. 2013. “E-Library Approach for Resource Sharing in an Information Communication Technology Era: Issues, Prospects, and Challenges.” International Journal of Library and Information Science 5 (4): 77–84.
Akor, P. U. 2013. “Security Management for Prevention of Book Thefts in University Libraries. A Case Study of Benue State University Library, Nigeria.” Library Philosophy and Practice (e-journal) 995. https://digitalcommons.unl.edu/libphilprac/995/
Anunobi, C. V., and I. B. Okoye. 2008. “The Role of Academic Libraries in Universal Access to Print and Electronic Resources in the Developing Countries.” Library Philosophy and Practice (e-journal) 189. https://digitalcommons.unl.edu/libphilprac/189
Bishoff, L., and C. Smith. 2015. “Managing Digital Collections Survey Results.” D-Lib Magazine 21 (3/4): 1–11. https://doi.org/10.1045/march2015-bishoff DOI: https://doi.org/10.1045/march2015-bishoff
CMS (Center for Medicare and Medicaid Services) 2021. “Information Security Module.” Accessed October 30, 2023. https://www.hhs.gov/guidance/sites/default/files/hhs-guidance-documents/2012232553-jp-py21_information_security.pdf
EconoTimes. 2016. “Blockchain to Fundamentally Change the Society in Which We Live.” EconoTimes, November 25, 2016. https://www.econotimes.com/Blockchain-to-fundamentally-change-the-society-in-which-we-live--Gartner-419493http://www.econotimes.com/Blockchain-to-fundamentally-change-the-society-in-which-we-live--Gartner-419493
Fabunmi, B. A., M. Paris, and M. Fabunmi. 2006. “Digitization of Library Resources: Challenges and Implication for Policy and Planning.” International Journal of Africa and African American Studies 5 (2): 24–36.
Gupta, P., and M. Madhusudhan. 2018. “Security of Library Materials: Challenges and Solution.” University of Delhi. Accessed November 10, 2023. https://www.researchgate.net./publication/322962889
Igbeka, J. U. 2008. Entrepreneurship in Library and Information Services. Ibadan: Stirling Horden Publishers.
Jansen, W., and T. Grance. 2011. Guidelines on Security and Privacy in Public Cloud Computing. Gaithersburg, MD: National Institute of Standards and Technology. Accessed November 10, 2023. https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-144.pdf DOI: https://doi.org/10.6028/NIST.SP.800-144
Kishan, B., and A. S. Chakravarthy. 2021. “RFID Technology in University Libraries: A Survey.” International Journal of Library and Information Science 10 (1): 12–20. https://iaeme.com/Home/article_id/IJLIS_10_01_003
Lemieux, V. L. 2016. “Trusting Records: Is Blockchain Technology the Answer?” Records Management Journal 26 (2): 110–139. https://doi.org/10.1108/RMJ-12-2015-0042 DOI: https://doi.org/10.1108/RMJ-12-2015-0042
Masenya, T. M. 2020. “Application of Modern Technologies in the Management of Records in Public Libraries.” Journal of the South African Society of Archivists 53: 66–79. https://doi.org/10.4314/jsasa.v53i1.5 DOI: https://doi.org/10.4314/jsasa.v53i1.5
Osayande, O. 2011. “Electronic Security Systems in Academic Libraries: A Case Study of Three University Libraries in South-West Nigeria.” Chinese Librarianship: An International Electronic Journal 32: 1–10. http://icic.us/cliej/cl32osayande.pdf
Xiaodong, S. 2015. “Application of Computer Technology in Library Resources Management.” In Proceedings of the Information Science and Management Engineering III (ISME 2015), edited by Z. Du, 287–290. Setúbal: SciTePress. https://www.scitepress.org/papers/2015/60244/60244.pdf
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Victor Sanni, Emmanuel Adeniyi Oloniruha, Dorathy Braide, Joseph Atule
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Accepted 2023-11-08
Published 2023-11-21