Traditional and Electronic Library and Information Resources Security Regulations

Main Article Content

Kudu Dogara
Mailadi Sarauta Yakubu
https://orcid.org/0000-0001-5458-5604
Denis D. Yakubu
https://orcid.org/0000-0002-4626-7646

Abstract

The security of information/knowledge is essential to its effective exploitation or use. As knowledge expands, the need to organize it and to provide adequate security becomes more pressing. This study describes how the information bearing materials of the library can be secured using traditional and electronic measures. Literatures were reviewed on the concept of information resources security, features of a good security measures (traditional and electronic), Securing the library resources traditionally, securing the library using telecommunication, benefits of securing the library resources, problems associated with the use of electronic security system in the library, and ways of solving problems with the use of electronic security system in the library.

Downloads

Download data is not yet available.

Article Details

How to Cite
Dogara, K., Yakubu, M. S., & Yakubu, D. D. (2022). Traditional and Electronic Library and Information Resources Security Regulations. African Journal of Humanities and Contemporary Education Research, 4(2), 16–25. Retrieved from https://publications.afropolitanjournals.com/index.php/ajhcer/article/view/124
Section
Articles
Author Biographies

Kudu Dogara, Isa Mustapha Agwai 1 Polytechnic, Lafia, Nasarawa State, Nigeria.

Isa Mustapha Agwai 1 Polytechnic, P.M.B 109,

Lafia, Nasarawa State, Nigeria.

Mailadi Sarauta Yakubu, Isa Mustapha Agwai 1 Polytechnic, Lafia, Nasarawa State, Nigeria.

Isa Mustapha Agwai I Polytechnic, P.M.B 109,

Lafia, Nasarawa State, Nigeria.

Denis D. Yakubu, Isa Mustapha Agwai 1 Polytechnic, Lafia, Nasarawa State, Nigeria.

Isa Mustapha Agwai I Polytechnic, P.M.B 109,

Lafia, Nasarawa State, Nigeria.

References

Adomi, E.E (2008), Foundation of Reference and Information Science.

Aino L.O (2004) Library and Information Science Text for Africa: Third World information services limited Ibadan, Nigeria.

Banister, J Mackenzien, A. and Norris, P. (2009), Public Space CCTV in Scotland: Scottish Centre for Crime and Justice Research (Research Report).

Bannister et al (2009), The Technology and content analysis of security techniques

Baram Marcus (2007), “Eye on the City” Do Cameras Reduce Crime? ABC News.

Braw Parker E. (2002), Library and Safety: Handbook of Prevention, Policies and Procedures Chicago American Library Association.

Boritz, J. Efrim. "IS Practitioners' Views on Core Concepts of Information Integrity". International Journal of Accounting Information Systems. Elsevier. Retrieved 12 August 2011.

Cherdantseva Y. and Hilton J. "A Reference Model of Information Assurance & Security," Second 2013 workshop in conjunction with the 8th

International Conference on Availability, Reliability and Security (ARES) 2013, University of Regensburg, Germany. September 2–6, 2013. IEEE Proceedings.

Committee on National Security Systems: National Information Assurance (IA) Glossary, CNSS Instruction No. 4009, 26 April 2010.

Crowe, Timothy D. (2000) Crime Prevention through Environmental Design: Applications of Architectural Design and Space Management Concepts, Second Edition, Butterworth: Stoneham, MA and National Crime Prevention Institute.

Edward Dean (2004), Theft and Loss from Uk Libraries: A National Survey. Home Office Research Group, Crime prevention Unit Paper no 37. Home Office Police Research Group.

Guidelines for the Security of Rare Books, Manuscripts, and Other Special Collections (Final version approved July 1999), Prepared by the ACRL Rare Books and Manuscripts Section’s Security Committee.

ISACA, (2008).Glossary of terms, 2008. Retrieved from http://www.isaca.org/KnowledgeCenter/ Documents/Glossary/glossary.pdf.

ISO/IEC 27000:2009 (E). (2009). Information technology - Security techniques - Information security management systems - Overview and vocabulary. ISO/IEC.

Ives, Rao D. (2005), Security Management Strategy for protecting your Libraries Network and library Computers.

Jadhara and Kulkani (2000), CCTV method of security check: experts and the experienced

James F. Kurose, Keith W. Ross (2010) Computer networking: a top-down approach.

Kiountouzis, E.A.; Kokolakis, S.A. Information systems security: facing the information society of the 21st century. London: Chapman & Hall, Ltd. ISBN 0-412-78120-4

Levis, Paul (2009), every step you take: Uk underground Centre, the spy capital of the world. Nigerian Guardian March 2, 2009.

Librarians Glossary and reference book (1999)

Lim, Joo S., et al. "Exploring the Relationship between Organizational Culture and Information Security Culture." Australian Information Security Management Conference

Mary Lynn (2001), The Design and evaluation of Physical protection systems, butter worth; Stone harm, NA guidelines for the security of rare books, manuscripts, and other special collection

Mccahill, M.N and Norris P. (2002) Electronic Security: A case study of IIT, Bombay Central Library, Proceedings of the CALIBER 3, available at www.library.iitb.ac.in/mnj/caliber3.pdf

Patkus, B.L (2003), Collection Security: Planning and Prevention for libraries and archives. Available at http://www.nedec.org/plam.3/heat312.htm.

Pipkin, D. (2000). Information security: Protecting the global enterprise. New York: Hewlett- Packard Company.

Schlienger, Thomas, and Stephanie Teufel. "Information security culture-from analysis to change." South African Computer Journal 31 (2003): 46-52.

Spagnoletti, Paolo; Resca A. (2008). "The duality of Information Security Management: fighting against predictable and unpredictable threats". Journal of Information System Security 4 (3): 46–62.

Venter, H. S., & Eloff, J. H. P. (2003). A taxonomy for information security technologies. Computers & Security, 22(4), 299–307. Doi: 10.1016/S0167- 4048(03)00406-

Voters B. (2007), Best answers chosen by Voters: Prospect and Problems of the use of telecommunication facilities: the way forward.