Collection security management at university libraries : assessment of its implementation status

Maidabino, A.A. and Zainab, A.N. Collection security management at university libraries : assessment of its implementation status. Malaysian Journal of Library & Information Science, 2011, vol. 16, n. 1, pp. 15-33. [Journal article (Paginated)]

Collection security management at university libraries assessment of its implementation status.pdf

Download (272kB) | Preview

English abstract

This study examines the literature on library security and collection security to identify factors to be considered to develop a collection security management assessment instrument for university libraries. A "house" model was proposed consisting of five factors; collection security governance, operations and processes, people issues, physical and technical issues and the security culture in libraries. An assessment instrument listing items covering the five factors was pilot tested on 61 samples comprising chief librarians, deputy librarians, departmental, sectional heads and professional staff working in four university libraries in Nigeria. The level of security implementation is assessed on a scale of 1=not-implemented, 2=planning stage, 3=partial implementation, 4=close to completion, and 5=full implementation. The instrument was also tested for reliability. Reliability tests indicate that all five factors are reliable with Cronbach's alpha values between 0.7 and 0.9, indicating that the instrument can be used for wider distribution to explore and assess the level of collection security implementation in university libraries from a holistic perspective.

Item type: Journal article (Paginated)
Additional information: Maidabino, A. A. Zainab, A. N.
Keywords: University libraries, Collection security, Assessment instrument, Nigeria, Africa
Subjects: D. Libraries as physical collections. > DD. Academic libraries.
L. Information technology and library technology
Depositing user: Miss Nur Jannatul Adnin Ahmad Shafawi
Date deposited: 21 Jan 2013 11:20
Last modified: 02 Oct 2014 12:24


Abifarin, A. 1997. Library stock security: The experience of the University of Agriculture Abeokuta, Nigeria. Library and Archival Security, Vol.14, no.1: 11-19.

Ajayi, N.A & Omotayo, B.O. 2004. Mutilation and theft of library materials: Perception and reactions of Nigerian students. Information Development, Vol.20, no. 1: 61-66

Ajegbomogun, F.O. 2004. Users’ assessment of library security: A Nigerian university case study. Library Management, Vol.25, no.8/9: 386-390.

Alao, I.A., Folorunso, A.L and Saka, H.T. 2007. Book availability in the University of Ilorin College of Health Sciences Library. World Libraries, Vol.17, no.2. Also available at

Allen, J. and Westby, J.R. 2007. Characteristics of effective security governance. Governing for Enterprise Security (GES) Implementation Guide (CMU/SEI-2007-TN-020). Software Engineering.

Allen, S.M. 1997. Preventing theft in academic libraries and special collections, Library Archives & Security, Vol.14, no.1: 29-43.

Ameen, K. & Haider, S.J. 2007. Evolving paradigm and challenges of collection management in university libraries of Pakistan, Collection Building, Vol.26, no.2: 54-58.

Ardndt, D.A. 1997. Problem patrons and library security, Legal Reference Services Quarterly, Vol.19, no.1 & 2: 19-40.

Association of College & Research Libraries. 2003. Guidelines regarding thefts in libraries. Available at regarding thefts.cfm.

Association of College & Research Libraries. RBMS Security Committee. 2006. Guidelines for the security of rare books, manuscripts and other special collections. C & RL News, Jul/Aug: 426-433. Available at

Atkins, S.S. and Weible, C.L. 2003. Needles in a haystack: Using interlibrary loan data to identify materials missing from a library’s collection. Library Collections, Acquisitions, & Technical Services, Vol.27: 187-202.

Aziagba, P.C. and Edet, G.T. 2008. Disaster control planning for academic libraries in West Africa. The Journal of Academic Librarianship, Vol.34, no.3: 265-268.

Bartlett, J.E., Kotrlik, J.W.and Higgins, C.C. 2001. Organizational research: Determining appropriate sample size in survey research. Information Technology Learning and Performance Journal. Vol.19, no.1: 43-50.

Bello, M.A. 1998. Library security, material theft and mutilation in technological university libraries in Nigeria. Library Management, Vol.19, no.6: 379-383.

Boss, R. 1984. Collection security. Library Trends, Vol.18, no.1: 39-48.

Brown, K.E. and Patkus, B.L. 2007. Collection security: Planning and prevention for libraries and archives. Northeast Document Conservation Centre. Available at:

Corporate governance task force report. 2004. Information security governance: a call for action. Available at 04.pdf.

Cowan, J. 2003. Risk management, records and gaming report. Clinical Governance: an International Journal, Vol.8, no.3: 275-277.

Evans, G.E., Amodeo, A.J. and Carter, T.L. 1999. Introduction to Library Public Services. 6th ed. Libraries Unlimited, Inc. Englewood: Colorado.

Ewing, D. 1994. Library security in the UK: are our libraries of today used or abused? Library Management, Vol.15, no.2: 18-26.

Garson, G.D. 1998. Reliability analysis. Available at

George, D. and Mallery. 2000. SPSS for windows step by step: a simple guide and reference. 3rd edition. Allyn & Bacon.

Gliem, A.J. and Gliem R.R. 2003. Calculating, interpreting, and reporting Cronbach’s Alpha reliability coefficient for likert-type scales. Midwest Research to Practice Conference in Adult, Continuing, and Community Education: The Ohio State University, Columbus, October 8-10, 2003, 82-88.

Hill, D. A. and Rockley, L. E. 1981. Security: its management and control. Business Book: London.

Holt, G.E. 2007. Theft by library staff. The bottom line: managing library finances, Vol.20, no.2: 85-92.

Houlgate, J. and Chaney, M. 1992. Planning and management of a crime prevention strategy, in: Security and Crime Prevention in Libraries Edited by Michael Channey and Alan F. MacDougall. Gower Publishing, Gower House: 46-49. ISBN 1857420144.

Lorenzen, M. 1996. Security issues of academic libraries. ERIC Document. No. ED396765.

Lowry, C.B. and Goetsch, L. 2001. Creating a culture of security in the university of Maryland libraries. portal: Libraries and Academy, Vol.1, no.4: 455-464.

Luurtsema, D. 1997. Dealing with book loss in an academic library. Library Archives & Security, Vol.14, no.1: 21-27.

Maidabino, A. A. 2010. Collection security issues in Malaysian academic libraries: An Exploratory Survey. Library Philosophy and Practices, Available at

Momodu, M.A. 2002. Delinquent readership in selected urban libraries in Nigeria. Library Review. Vol.51, no.9: 469-473.

Nunnally, J.C. 1998. Psychometric theory. 2nd. Ed. New York: McGraw-Hill.

Omoniyi, J.O. 2001. The security of computer and other electronic installations in Nigerian university libraries. Library Management, Vol.22, no.6/7: 272-277.

Purtell, T. 2007. A new view on IT risk. Risk Management, Vol.54, no.10: 28.

Saffady, W. 2005. Risk analysis and control: Vital to records protection. Information Management Journal, Vol.39, no.5: 62-64.

Rude R. and Robert, H. 1993. Theft, dissemination and trespass: Some observations on security. Library and Archival Security. Vol. 12, no.1: 18-21.

Salaam, M.O. 2004. The treatment of other libraries’ books by Nigerian university libraries. Library & Archival Security, Vol. 19, no.1: 47-51

Shuman, A.B. 1999. Library security and safety handbook: Prevention, policies and procedures. Chicago : American Library Association.

Suhazimah, D. 2007. The antecedents of information security maturity in Malaysian public services organizations. Ph.D. thesis, Faculty of Business and Administration, University of Malaya, Malaysia.

Swartzburg, G.S., Bussey, H. and Garretson, F. 1991. Libraries and archives: Design and renovation with a preservation perspective. In Safety, Security, Emergency Planning, and Insurance. London: Scarecrow Press: 147-169.

Wu, Y.D. and Liu, M. 2001. Content management and the future of academic libraries. The Electronic Library, Vol.19, no.6:432-439.

Verton, D. 2000. Companies aim to build security awareness. Computerworld, Vol.34, no.48: 24.

Zhao, N. 2009. The minimum sample size in factor analysis. Available at, powered by Atlassian Confluence, the Enterprise Wiki.


Downloads per month over past year

Actions (login required)

View Item View Item