A STUDY OF THE MANAGEMENT OF SECURITY PROBLEMS IN ACADEMIC LIBRARIES IN EDO STATE.

  • Type: Project
  • Department: Library Science
  • Project ID: LIS0100
  • Access Fee: ₦5,000 ($14)
  • Pages: 50 Pages
  • Format: Microsoft Word
  • Views: 688
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

The main objective of the study was to determine possible ways or solutions to the management of security problems in academic libraries in Edo State. Survey research design was adopted for the study. The study population comprises of professionals and paraprofessional librarians from Ambrose Alli University, University of Benin, Auchi Polytechnic and College of Education libraries. The sample size drawn from the population was 92 staff. A purposive sampling technique was adopted for the study. Data collection instrument was the questionnaire and data were analyzed using simple percentages and frequency tables. The main findings from this study includes the problem of theft, mutilation, defacement and faking of date due slip. The effects of security problems are loss of expensive resources which are irreplaceable and the extra cost of acquiring security gadgets such as CCTV. The researcher, from these findings, recommends that competent staff and security personnel should be made available in libraries, tough punishment should be given to perpetrators who violate library rules and regulation and provision of multiple copies of library materials to reduce vulnerability and pressure on few copies of information resources that are available. For future reference, the work will give an insight into how libraries can manage and make use of the recommendations to help reduce security challenges.

 

Word Count: 225                                                                           

Keywords:  Management, Security of library materials, Problems, Academic Library.


TABLE OF CONTENT

Title Page....................................................................................................................ii

Certification...............................................................................................................iii

Declaration.................................................................................................................iv

Dedication...................................................................................................................v

Abstract......................................................................................................................vi

Acknowledgements....................................................................................................vii

Table of content.........................................................................................................viii

CHAPTER ONE: INTRODUCTION

1.1              Background of the Study.........................................................................................1

1.2              State of the Problem.................................................................................................4

1.3              Objective of the Study.............................................................................................5

1.4              Research Questions..................................................................................................6

1.5              Scope of the Study...................................................................................................6

1.6              Significance of the Study.........................................................................................6

1.7              Limitation of the Study............................................................................................7

1.8              Operational Definition of Terms...............................................................................7

CHAPTER TWO: LITERATURE REVIEW

2.1       Introduction ………………………………………………………………………8

2.2       Collection Security Management Problems in Academic Libraries.........................9

2.3       Nature of Book Theft and Mutilation in Academic Libraries..................................10

2.4       Causes of Book Theft and Mutilation of Library Materials ....................................11

2.5       Types of Insecurity in the Library............................................................................13

2.6       Examination of Library Security Problems..............................................................13

2.7       Security Measures to Curb Theft and Mutilation in Libraries.................................15

2.8      Prevention of Theft as Insecurity.............................................................................16

2.9      Appraisal of the Literature.......................................................................................17

CHAPTER THREE: RESEARCH METHOD

3.1       Introduction………………………………………………………………………19

3.2       Research Design…………………………………………………………………..19

3.3       Population of Study …………………….………………………………………...19

3.4       Sampling Techniques and sample size …………………………………………...21

3.5       Research Instrument ……………………………………………………………...21

3.6       Validity of Instrument…………………...………….…………………………….21

3.7       Procedure of Data Collection……………………………………………………..22

3.8       Method of Data Analysis…………………………………………………………22

CHAPTER FOUR: DATA PRESENTATION ANALYSIS AND INTERPRETATION

4.1       Introduction……………………………………………………………………….23

4.2       Questionnaire Administered and Response Rate …………………..……………..23

4.3       Demographic Variables of the Respondent………..……………………………...24

4.4       Results and Analysis of Research Questions……….…………………………......25

4.5        Discussion of Findings……………………………………………………………28

CHAPTER FIVE: SUMMARY, CONCLUSION AND RECOMMENDATIONS

5.1       Summary of findings……………………………………………………………..31

5.2       Finding from research work……………………………………………………...31

5.3       Conclusion……………………………………………………………………….32

5.4       Recommendations…………………………………………………….................32

5.5       Suggestion for further Work ……………………………....................................33

REFERENCES…………………………………………………………………….......34

APPENDIX……………………………………………………………………………..38

A STUDY OF THE MANAGEMENT OF SECURITY PROBLEMS IN ACADEMIC LIBRARIES IN EDO STATE.
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Library Science
  • Project ID: LIS0100
  • Access Fee: ₦5,000 ($14)
  • Pages: 50 Pages
  • Format: Microsoft Word
  • Views: 688
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Library Science
    Project ID LIS0100
    Fee ₦5,000 ($14)
    No of Pages 50 Pages
    Format Microsoft Word

    Related Works

    T he main objective of the study was to determine possible ways or solutions to the management of security problems in academic libraries in Edo State . Survey research design was adopted for the study. The study population comprises of professionals and paraprofessional librarians from Ambrose Alli University, University of Benin, Auchi... Continue Reading
    T he main objective of the study was to determine possible ways or solutions to the management of security problems in academic libraries in Edo State . Survey research design was adopted for the study. The study population comprises of professionals and paraprofessional librarians from Ambrose Alli University, University of Benin, Auchi... Continue Reading
    ABSTRACT This study concerned the security problems that confronted academic libraries in Imo state University library, research questions for the study were constructed. The description survey method was used on the total of 50 staff, this 50 staff were made up from the Imo state University libraries. The sample and sampling techniques was done... Continue Reading
    ABSTRACT This study concerned the security problems that confronted academic libraries in Imo state University library, research questions for the study were constructed. The description survey method was used on the total of 50 staff, this 50 staff were made up from the Imo state University libraries. The sample and sampling techniques was done... Continue Reading
    ABSTRACT This study was based on the Problems of Books Acquisition in Academic Library. A case study of Imo State University Owerri (IMSU). The study was also made to find out what roles money play in the acquisition of book in the academic libraries. It also determined the level to which students and lecturers are consulted during selection of... Continue Reading
    ABSTRACT This study was based on the Problems of Books Acquisition in Academic Library. A case study of Imo State University Owerri (IMSU).  The study was also made to find out what roles money play in the acquisition of book in the academic libraries. It also determined the level to which students and lecturers are consulted during selection of... Continue Reading
    . A CASE STUDY OF ANAMBRA STATE UNIVERSITY, ULI. CHAPTER ONE INTRODUCTION 1.1     Background to the study Reference service is one of the essential services of the library. Meaning reference service is the activities, roles, functions and services rendered by... Continue Reading
    ABSTRACT This work is on acquisition and management of serials in Imo state university library Owerri. The research was centered on the acquisition, storage, utilization and management of serials and their attendant problems involved in the Imo state academic library. The research employed the survey method of research, using questionnaires,... Continue Reading
    ABSTRACT This work is on acquisition and management of serials in Imo state university library Owerri. The research was centered on the acquisition, storage, utilization and management of serials and their attendant problems involved in the Imo state academic library. The research employed the survey method of research, using questionnaires,... Continue Reading
    Abstract, background of study and table of contents... Continue Reading
    Call Us
    Get this work
    whatsappWhatsApp Us