Traditional and Electronic Library and Information Resources Security Regulations
Main Article Content
Abstract
The security of information/knowledge is essential to its effective exploitation or use. As knowledge expands, the need to organize it and to provide adequate security becomes more pressing. This study describes how the information bearing materials of the library can be secured using traditional and electronic measures. Literatures were reviewed on the concept of information resources security, features of a good security measures (traditional and electronic), Securing the library resources traditionally, securing the library using telecommunication, benefits of securing the library resources, problems associated with the use of electronic security system in the library, and ways of solving problems with the use of electronic security system in the library.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
References
Adomi, E.E (2008), Foundation of Reference and Information Science.
Aino L.O (2004) Library and Information Science Text for Africa: Third World information services limited Ibadan, Nigeria.
Banister, J Mackenzien, A. and Norris, P. (2009), Public Space CCTV in Scotland: Scottish Centre for Crime and Justice Research (Research Report).
Bannister et al (2009), The Technology and content analysis of security techniques
Baram Marcus (2007), “Eye on the City” Do Cameras Reduce Crime? ABC News.
Braw Parker E. (2002), Library and Safety: Handbook of Prevention, Policies and Procedures Chicago American Library Association.
Boritz, J. Efrim. "IS Practitioners' Views on Core Concepts of Information Integrity". International Journal of Accounting Information Systems. Elsevier. Retrieved 12 August 2011.
Cherdantseva Y. and Hilton J. "A Reference Model of Information Assurance & Security," Second 2013 workshop in conjunction with the 8th
International Conference on Availability, Reliability and Security (ARES) 2013, University of Regensburg, Germany. September 2–6, 2013. IEEE Proceedings.
Committee on National Security Systems: National Information Assurance (IA) Glossary, CNSS Instruction No. 4009, 26 April 2010.
Crowe, Timothy D. (2000) Crime Prevention through Environmental Design: Applications of Architectural Design and Space Management Concepts, Second Edition, Butterworth: Stoneham, MA and National Crime Prevention Institute.
Edward Dean (2004), Theft and Loss from Uk Libraries: A National Survey. Home Office Research Group, Crime prevention Unit Paper no 37. Home Office Police Research Group.
Guidelines for the Security of Rare Books, Manuscripts, and Other Special Collections (Final version approved July 1999), Prepared by the ACRL Rare Books and Manuscripts Section’s Security Committee.
ISACA, (2008).Glossary of terms, 2008. Retrieved from http://www.isaca.org/KnowledgeCenter/ Documents/Glossary/glossary.pdf.
ISO/IEC 27000:2009 (E). (2009). Information technology - Security techniques - Information security management systems - Overview and vocabulary. ISO/IEC.
Ives, Rao D. (2005), Security Management Strategy for protecting your Libraries Network and library Computers.
Jadhara and Kulkani (2000), CCTV method of security check: experts and the experienced
James F. Kurose, Keith W. Ross (2010) Computer networking: a top-down approach.
Kiountouzis, E.A.; Kokolakis, S.A. Information systems security: facing the information society of the 21st century. London: Chapman & Hall, Ltd. ISBN 0-412-78120-4
Levis, Paul (2009), every step you take: Uk underground Centre, the spy capital of the world. Nigerian Guardian March 2, 2009.
Librarians Glossary and reference book (1999)
Lim, Joo S., et al. "Exploring the Relationship between Organizational Culture and Information Security Culture." Australian Information Security Management Conference
Mary Lynn (2001), The Design and evaluation of Physical protection systems, butter worth; Stone harm, NA guidelines for the security of rare books, manuscripts, and other special collection
Mccahill, M.N and Norris P. (2002) Electronic Security: A case study of IIT, Bombay Central Library, Proceedings of the CALIBER 3, available at www.library.iitb.ac.in/mnj/caliber3.pdf
Patkus, B.L (2003), Collection Security: Planning and Prevention for libraries and archives. Available at http://www.nedec.org/plam.3/heat312.htm.
Pipkin, D. (2000). Information security: Protecting the global enterprise. New York: Hewlett- Packard Company.
Schlienger, Thomas, and Stephanie Teufel. "Information security culture-from analysis to change." South African Computer Journal 31 (2003): 46-52.
Spagnoletti, Paolo; Resca A. (2008). "The duality of Information Security Management: fighting against predictable and unpredictable threats". Journal of Information System Security 4 (3): 46–62.
Venter, H. S., & Eloff, J. H. P. (2003). A taxonomy for information security technologies. Computers & Security, 22(4), 299–307. Doi: 10.1016/S0167- 4048(03)00406-
Voters B. (2007), Best answers chosen by Voters: Prospect and Problems of the use of telecommunication facilities: the way forward.
 
								