This document summarizes a research paper on security and information access in university libraries in Kenya. The research aims to investigate security issues that affect information use and propose ways to maximize access. Security lapses identified include theft, vandalism, loss of materials, and unethical user behavior. Libraries have implemented measures like electronic gates, alarms, cameras, and ID cards, but still face challenges like system failures, lack of technical knowledge, and limited funding. Recommendations include developing clear security policies, educating users, efficient identification systems, and regular stocktaking to balance security and access.
1. SECURITY AND INFORMATION ACCESS
IN UNIVERSITY LIBRARIES IN KENYA
A RESEARCH PAPER TO BE PRESENTED AT THE
13TH CALA ANNUAL CONFERENCE AT THE MILELE
BEACH HOTEL-MOMBASA, KENYA
BY
JOTHAM MILIMO WASIKE
LIBRARIAN –CATHOLIC UNIVERSITY OF EASTERN
AFRICA
DATE: 22-26 JUNE, 2013
2. Abstract
This study aims at investigating the security of
information materials and how it affects use in
university libraries in Kenya, with a view of proposing
ways and means of maximizing information use. The
objectives of the study were to ascertain the security
loopholes that exist, causes of information security
lapses, measures that have been put in place and
security challenges facing libraries .The study has
generated new knowledge on security of information
and its social implications point towards key security
policy formulation.
3. Introduction and Background
The term ‘information security’ means protecting
information materials and systems from unauthorized
access, use, disclosure, disruption, modification, or
destruction for effective access(Ajegbomogun,2004).
Conceptually, it means the overall manner in which library
policies, programmes, procedures, or measures are
deployed to mitigate risk and ensure access to information.
Verton (2004) state that, “information resources are very
vulnerable to abuse of one sort or another.
These issues include but are not limited to; physical,
architectural, electronic, managerial, technical, and
operational controls
4. Cont’d
Striking a balance between access and security in university
libraries.
Lowry and Goetsch(2001) and Holt (2007) identified several
insecurity breaches such as theft of materials and equipments,
alteration of information, non-return of items by borrowers,
vandalism, stock destruction and mutilation, all of which can
directly or indirectly affects the provision of library services.
Both electronic and non electronic materials.
Unprocessed, Rare& Special materials and manuscripts
vulnerable
Anunobi & Okoye (2008) Access necessary for scholarship and
intellectual freedom.
5. Cont’d
Purtell (2007) identified physical weaknesses in libraries in
terms of unsecured windows, faulty emergency exits, unstaffed
computer rooms, poor policies and procedures, lack of security
plans, poor security points (exits, loading areas, windows, special
collections) inadequate loans and renewal periods, lack of
security manuals and poor signage as some of the determinants
of in security breaches.
Maidabino (2010) reported an estimated an average of loss rate
of 2.6% in university libraries
• Nkiki and Yusuf (2008) argued that the importance of
considering the physical and infrastructural aspects of the
library building and facilities ensures materials ‘security.
6. Classification of Security Awareness
Conceptually a good security system should as be as shown in figure I below:
Figure 1: Classification of security Awareness
Evaluation
Approaches
Conditions
intervening
to success
Distinction of Security
awareness, training
and Education
Desirable
Outcome
Process
Aspects
Role of IS
stakeholders
Security Awareness
Literature
7. Contd
Holt(2007) suggests several methods to deal with
insecurity that include installation of high security
lock systems, tightening of material movements and
procedures, marking resources to indicate ownership,
good record keeping and undertaking periodic
inventories. cultivate professional culture and
behaviour with regard to safeguarding the materials.
Brown and Patkus (2007) proposed a security plan that
comprises these components: a written security policy;
appointment of a security manager and a security
survey and inventory.
8. Research Methodology
A research survey was used to elicit relevant information for the study
.The instrument adopted for this study was an interview guide
consisting of twenty-four (24) items of research questions related to
the study. The research was conducted in three (3) universities in
Kenya: one (1) public (named UX) and two (2) private (named UY and
UZ) for anonymity purposes. Library users (N=30), 10 from each
university and Librarians (N=3) from 1 public and 2 private universities
were selected to participate in the study using stratified simple random
and purposive sampling. Therefore the total of 33 respondents
participated in the study. The study objectives were to ascertain the
security loopholes that exist, causes of information security lapses,
measures that have been put in place, security challenges facing
libraries and recommendations for improving security of information
materials for effective access
9. Study Findings
Categories of Insecurity
Category University
Item UX% F UY% F UZ % F
Theft 78 9 67 7 71 8
Vandalism& Mutilation 43 5 31 3 28 3
Disasters
10 1 21 2 16 2
Loss of Materials
56 6 47 5 67 7
Unethical Behavior 19 2 28 3 11 1
Non return of library materials
on time
23 3 25 3 18 2
Failed Identification and
authentication of users 45 5 51 6 34 4
Mis-shelving 16 2 23 3 14 2
Others 23 3 10 1 14 2
Key
F-Frequency
10. Cont’d
Further to insecurity responses, it was noted by some
respondents, (4%) argued that some library facilities were
left with too many unsupervised areas, others, (7.5%)
raised the issue of computer virus, vandalism or tinkering.
The researcher also observed that it was difficult to judge
whether or not information material losses are increasing,
as regular and accurate stock checks were lacking. The
parameters of what constitutes material loss were not clear
as non-returns were difficult to prove. Other insecurities
included theft of property, vandalism/destruction and
offensive user behaviour (9%). Some respondents, (13%)
viewed one or two security men to many library users at
any given time as inadequate.
12. Cont’d
Other than the above security measures, two universities namely UY
and UX were reported to have secured luggage areas where library
users kept their bags and other related items before entering the library
as stated by (12.2%)of the respondents. All the three libraries were
observed to have one entrance and one exit. Library regulations were
readily available to remind library users of the punishments for
engaging in behavior that denied other users access to information or
destroying library materials as stated by 12% respondents. There were
restrictions of access to some areas as pointed out by 3.4% of the
respondents. For example in UY, users are not allowed to go to
information processing areas. UX was reported to have a CCTV cable
mounted in the main library and operates 24-hours. Respondents
(1.2%) reported that UY was noted to have alarm systems placed at
strategic places. Some libraries were observed to use turnstiles and
guards to slow down movements of users and check patrons going out
at the exit 24 hours.
13. Cont’d
Determinants of Library Insecurity
ITEM UX % F UY
% F
UZ
% F
Has economic situations 67 7 54 6 60 7
High cost of information resources 76 8 81 9 83 9
Ignorance of users 34 4 20 2 25 3
Unethical culture 54 6 67 7 46 5
Inadequate library resources 87 1
0
91 10 66 7
Copyright Restrictions 37 4 56 6 59 7
Week architectural designs 78 9 71 8 63
Food and drinks 54 6 59 6 49 5
Improper clearing of the library
building before closing time
15 2 07 1 03 1
14. Cont’d
Fewer copies of information resources
Own selfish gains.
Fear of not getting what they want (2%), they tend to
deliberately hold on the material they get for a long time or
even pretend that it is lost for purposes of personalizing
the resources at the expenses of other users. High poverty
levels of some users make them to use short and
unorthodox means to use resources as noted by 1%
respondents. Some respondents (5%) pointed at laziness,
limited time and lack of morality and ethics on the part of
some students, while one librarian mentioned lack of
adequate vigilance of the part of security personnel and
organizational strategy for hotspots for information
insecurity.
15. Chall Challenges to Library Security
Challenges to Library Security
ITEM UX % F UY%
F
UZ%
F
System Failure 81 9 75 8 71 8
Inadequate
technical
knowledge
56 6 76 8 51 6
Lack of
Awareness
43 5 29 3 51 6
Limited Funding 55 6 61 7 51 6
Human error 12 1 09 1 13 1
Key
F- Frequency
16. Recommendations
Well defined security policies- communicate both staff and users and
reviewed regularly.
There is need to educate/create awareness librarians and information
users on the devastating effect of insecurity of information materials.
Entrench the teaching of moral and ethical values in their curriculum
to inculcate discipline to students in using information resources.
Efficient and effective identification and authentication is necessary to
sufficiently trace any misuse/abuse of information resources by user(s)
to an individual user. Many identification and authentication systems
strongly recommend users ’university card used alongside passwords to
maintain accountability.
The length of opening and closing the library needs to be balanced
between usability and security. Degree of accessibility should be taken
into consideration when deciding if this is an appropriate means of
authentication.
17. Cont’d
Purchase requests and items on-order or in-process requested by
patrons should be linked to the library catalog system and user profiles
so that they can be notified when the items are ready to circulate. To
make progress in this field, libraries must improve their stock
inventories and importantly regularity with which these are carried
out. It is necessary to determine whether material losses are increasing,
decreasing or remaining static.
Installation of the library card system to enhance information is
essential. The purpose of the card access system is to give entry
authorization to staff, security guards, cleaning contractors, and
maintenance contractors without having to issue keys. This is because
the card system will allow control of access to information resources
and control who can have access and at what times and tracks users’
use of resources.
18. Conclusion
Security should not just dwell on protecting information, but on generating
high assurance levels, for good quality information access. A security system
should therefore be attributed to interaction to direct, select, protect, and
verify the library transactions. Maximum information access relies primarily on
security of the same. Security measures should therefore be discussed openly
and made available as soon as practical. Although some libraries appear well
organized in their security programs, many lack up-to-date written security
plans, effective data gathering, and complete security inventory procedures. On
the other hand, too much emphasis on security can create a negative
atmosphere for information users. Library security personnel should be well
trained and allowed to participate in induction courses, workshops, and on-
the-job training. Libraries should also be well funded to procure and provide
multiple copies of library textbooks for users, especially for borrowing and easy
access, while limited copies of textbooks should be placed on reserves. Stock
taking of library books should also be undertaken regularly to detect mutilated
and stolen books for effective information access.