#15883 Technology-Based Security Systems and Security of Information Resources in the University Library
DOI:
https://doi.org/10.25159/3005-4222/15883Keywords:
technology, security, security system, electronic security system, information resourcesAbstract
Securing information resources in a university library is crucial to protect sensitive data, academic materials, and the privacy of library users. As academic institutions increasingly rely on digital platforms for storing and disseminating information, the need for robust security measures becomes paramount. The paper examines technology-based security systems and the security of information resources in university libraries. The literature review was conducted to examine existing studies, academic papers, and articles related to Technology-Based Security Systems in library environments. Databases consulted in search of relevant literature include Google Scholar, Academia, and ResearchGate. Content analysis was used to determine the concepts and themes. The study discovered the types of information resources vulnerable to security threats in the university library, including book and non-book materials. It also determined the technology-based security systems for safeguarding information resources in university libraries, including RFID Technology for Asset Tracking, Access Control Systems, CCTV Surveillance in Libraries, Digital Rights Management, Cybersecurity Measures, Cloud-Based Library Services, and Artificial Intelligence for Anomaly Detection. In analysing the threat landscape, the study comprehensively examines both physical and digital risks posed to information resources. This includes cybersecurity threats, physical security risks, insider threats, and third-party risks. Recognising these threats, the study offers strategic insights through proposed strategies such as risk assessment and planning, user training and awareness, regular system updates and patch management, data encryption and privacy and continuous monitoring. The study concludes that libraries can maximise the effectiveness of their technology-based security systems, fostering a resilient defence against potential security breaches in the dynamic landscape of information management
References
Akam, R. 2023. "MDM Security Best Practices." https://alamrabiul.medium.com/mobile-device-management-mdm-cybersecurity-securing-mobile-workforces-ea8f5e21bced
Aregbesola, A., and Nwaolise, E.L. 2023. "Securing Digital Collections: Cyber Security Best Practices for Academic Libraries in Developing Countries." Library Philosophy and Practice (ejournal). 7822. https://digitalcommons.unl.edu/libphilprac/7822
Atlam, H.F., Alenezi, A., Hussein, R.K., and Wills, G.B. 2018. "Validation of An Adaptive Risk-based Access Control Model for the Internet of Things." International Journal of Computer Network and Information Security 12(1):26.
https://doi.org/10.5815/ijcnis.2018.01.04 DOI: https://doi.org/10.5815/ijcnis.2018.01.04
Borky, J.M., Bradley, T.H., Borky, J.M., and Bradley, T.H. 2019. "Protecting Information with Cybersecurity." Effective Model-Based Systems Engineering 345-404. https://doi.org/10.1007/978-3-319-95669-5_10 DOI: https://doi.org/10.1007/978-3-319-95669-5_10
Coole, M., Evan, D., and Medbury, J. 2021. "Artificial Intelligence and Security Technologies Adoption Guidance Document: Opportunities and Implications of Using Artificial Intelligence in the Establishment of Secure Physical Environments." https://www.asisonline.org/globalassets/foundation/documents/digital-transformation-series/ai-guidance-document-final.pdf
Daniels, G. N., Wiche, H., and Nsirim, O. 2023. "Librarians' ICT Skills and Effective Library Service Delivery in University Libraries in Rivers State, Nigeria." https://digitalcommons.unl.edu/libphilprac/7501
Echem, M.E., and Okwu, E. 2023. "Library Security and Sustainable Service Delivery in Donald Ekong Library, University of Port Harcourt, Rivers State, Nigeria." Communicate: Journal of Library and Information Science 25(1):89-101.
Elejene, A. O., H. David, and O. Nsirim. 2023. "Information and Communication Technology and Knowledge Sharing: The Role of the Library." In Library, ICT and Information Management, edited by Mmejim, I. C., H. Wiche, I. Idoniboye-Obu, O. Nsirim, and B. O. Umahi, 25-31. Port Harcourt: Super Print Concept.
Endouware, B.E., and Okwu, E. 2023. "Librarians' Perceptions of the Security of Library Resources in University Libraries in Bayelsa State, Nigeria." Southern African Journal of Security 1: 1-18. https://doi.org/10.25159/2663-659X/11612 DOI: https://doi.org/10.25159/2663-659X/11612
Evans, S. 2023. "Strengthening Security: The Importance of Access Control." https://www.linkedin.com/pulse/strengthening-security-importance-access-control-shervin-evans/
Ezeabasili, C.A. 2018. "Impact of Electronic Security Systems in the Security of Information Resources in Federal University Libraries in Southern Nigeria." Library Philosophy and Practice (e-journal) 2110.
Ferreira, A., Cruz-Correia, R., Chadwick, D., and Antunes, L. 2008. "Improving the Implementation of Access Control in EMR." In 2008 42nd Annual IEEE International Carnahan Conference on Security Technology (pp. 47-50). IEEE.
https://doi.org/10.1109/CCST.2008.4751275 DOI: https://doi.org/10.1109/CCST.2008.4751275
Ghosh, A. 2023. "Understanding the Role of MDM in Education 4.0. Scalefusion." https://blog.scalefusion.com/mdm-in-education-4-0/
Hayes, A. 2023. "Risk Analysis: Definition, Types, Limitations, and Examples." Investopedia. https://www.investopedia.com/terms/r/risk-analysis.asp
Ibenne, S. K. 2018. Information Resources Development and Management. Okigwe: Justman Publishers.
Igwela, J.N.B., and Nsirim, O. 2018. “Library and Information Services for
National Security and Fight against Insurgency.” Paper presentation. National Conference/Annual General Meeting of the Nigerian Library Association, Olusegun Obasanjo Presidential Library, Abeokuta, Ogun State. Compendium of NLA 2018 Conferences papers. 124–240
Kimpel, H. 2023. "Mitigate the Hidden Security Risks of Open Source Software Libraries." https://newrelic.com/blog/how-to-relic/mitigate-open-source-library-security-risks
Larrimore, N.P. 2018. "Risk Management Strategies to Prevent and Mitigate Emerging Operational Security Threats." Doctoral dissertation, Walden University.
Lavrov, E.A., Zolkin, A.L., Aygumov, T.G., Chistyakov, M.S., and Akhmetov, I.V. 2021. "Analysis of Information Security Issues in Corporate Computer Networks." In IOP Conference Series: Materials Science and Engineering 1047(1): 012-117. IOP Publishing.
https://doi.org/10.1088/1757-899X/1047/1/012117 DOI: https://doi.org/10.1088/1757-899X/1047/1/012117
Lee, D., and Park, J.H. 2019. "Future Trends of AI-based Smart Systems and Services: Challenges, Opportunities, and Solutions." Journal of Information Processing Systems 15(4):717-723.
Marvin, M. 2023. "Securing Your Digital Eco-System: The Role of Access Control in Network Security." https://www.portnox.com/blog/network-access-control/securing-your-digital-eco-system-the-role-of-access-control-in-network-security/
Mildenberger, T. 2023. "The Importance of Patching and Patching Best Practices." https://contabo.com/blog/the-importance-of-patching-and-patching-best-practices-linux-windows/
Mmejim, I.C., and Nsirim, O. 2023. “Managing the University Library System: Assessmemt
of Management Principles, Functions and Integrated Library Management System.” In Library, ICT and Information Management, edited by Mmejim, I. C., H. Wiche, I. Idoniboye-Obu, O. Nsirim, and B. O. Umahi, 25–31. Port Harcourt: Super Print Concept.
National Security and Fight against Insurgency." Paper presentation. National Conference/Annual General Meeting of the Nigerian Library Association, Olusegun Obasanjo Presidential Library, Abeokuta, Ogun State. Compendium of NLA 2018 Conferences Papers. 124-240
Nsirim, O., Agina-Obu, R., and Braid, D. 2023. "Information Resources Development: The Heart of Library Existence." In Library, ICT and Information Management, edited by Mmejim, I. C., H. Wiche, I. Idoniboye-Obu, O. Nsirim, and B. O. Umahi, 25-31. Port Harcourt: Super Print Concept.
Omehia, A. E., Okwu, E., and Nsirim, O. 2021. "Librarians' ICT Competencies and Utilisation of Emerging Technologies in Academic Libraries in Rivers State." Library Philosophy and Practice. https://digitalcommons.unl.edu/libphilprac/5410
Omoike, A., and Alabi, R. 2020. "Theft, Mutilation and Abuse of Library and Information Materials by Undergraduates of University of Ibadan, Nigeria." Information Impact: Journal of Information and Knowledge Management 11(2): 1-12. .doi.org/10.4314/iijikm.v11i2
https://doi.org/10.4314/iijikm.v11i2.1 DOI: https://doi.org/10.4314/iijikm.v11i2.1
Opara, O.O. Nsirim, O, and Irokah. P. L. 2023. "Technological Methods and Security of Information Resources in Dame Patience Goodluck Jonathan Automated Library, Ignatius Ajuru University of Education." Southern African Journal of Security 1:1-17. https://doi.org/10.25159/3005-4222/14506 DOI: https://doi.org/10.25159/3005-4222/14506
Oyetola, S.O., Oladokun, B.D., Maxwell, C.E., and Akor, S.O., 2023. "Artificial Intelligence in the Library: Gauging the Potential Application and Implications for Contemporary Library Services in Nigeria." Data and Metadata 2:36-36. https://doi.org/10.56294/dm202336 DOI: https://doi.org/10.56294/dm202336
Rana, S., and Mishra, D. 2021. "An Authenticated Access Control Framework for Digital Right Management System." Multimedia Tools and Applications 80: 25255-25270. https://doi.org/10.1007/s11042-021-10813-3 DOI: https://doi.org/10.1007/s11042-021-10813-3
Sahoo, N. 2023. "The Advantages of Continuous Cybersecurity Monitoring." LinkedIn. https://www.linkedin.com/pulse/advantages-continuous-cybersecurity-monitoring-narendra-sahoo/
Samochadin, A., Raychuk, D., Voinov, N., Ivanchenko, D., and Khmelkov, I. 2014. "MDM Based Mobile Services in Universities." International Journal of Information Technology and Computer Science (IJITCS) 13(2):35-41.
Seth, B., Dalal, S., Jaglan, V., Le, D.N., Mohan, S., and Srivastava, G. 2022. Integrating Encryption Techniques for Secure Data Storage in the Cloud." Transactions on Emerging Telecommunications Technologies 33(4): p.e4108. https://doi.org/10.1002/ett.4108 DOI: https://doi.org/10.1002/ett.4108
Taneja, D., and Tyagi, S.S. 2017. "Information Security in Cloud Computing: A Systematic Literature Review and Analysis." International Journal of Scientific Engineering and Technology 6(1): 50-55.
Terra, J. 2023. "The Importance of Security Awareness Training." Simplilearn. https://www.simplilearn.com/importance-of-security-awareness-training-article
Trilles, S., Hammad, S.S., and Iskandaryan, D. 2024. "Anomaly Detection Based on Artificial Intelligence of Things: A Systematic Literature Mapping." Internet of Things 101063. https://doi.org/10.1016/j.iot.2024.101063 DOI: https://doi.org/10.1016/j.iot.2024.101063
Van Daalen, O.L. 2023. "The Right to Encryption: Privacy as Preventing Unlawful Access." Computer Law and Security Review 49: 1-19. https://doi.org/10.1016/j.clsr.2023.105804 DOI: https://doi.org/10.1016/j.clsr.2023.105804
Voss, E. 2023. "Insider Threat: A Case Study, Recognizing the Early Warnings Signs by Humans." Doctoral dissertation, Northcentral University.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Rita Dumbiri, Oluchi Okeke, Ejiro Sandra Ukubeyinje , Onyema Nsirim

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.