SlideShare a Scribd company logo
1 of 19
SECURITY AND INFORMATION ACCESS
IN UNIVERSITY LIBRARIES IN KENYA
A RESEARCH PAPER TO BE PRESENTED AT THE
13TH CALA ANNUAL CONFERENCE AT THE MILELE
BEACH HOTEL-MOMBASA, KENYA
BY
JOTHAM MILIMO WASIKE
LIBRARIAN –CATHOLIC UNIVERSITY OF EASTERN
AFRICA
DATE: 22-26 JUNE, 2013
Abstract
This study aims at investigating the security of
information materials and how it affects use in
university libraries in Kenya, with a view of proposing
ways and means of maximizing information use. The
objectives of the study were to ascertain the security
loopholes that exist, causes of information security
lapses, measures that have been put in place and
security challenges facing libraries .The study has
generated new knowledge on security of information
and its social implications point towards key security
policy formulation.
Introduction and Background
 The term ‘information security’ means protecting
information materials and systems from unauthorized
access, use, disclosure, disruption, modification, or
destruction for effective access(Ajegbomogun,2004).
 Conceptually, it means the overall manner in which library
policies, programmes, procedures, or measures are
deployed to mitigate risk and ensure access to information.
 Verton (2004) state that, “information resources are very
vulnerable to abuse of one sort or another.
 These issues include but are not limited to; physical,
architectural, electronic, managerial, technical, and
operational controls
Cont’d
 Striking a balance between access and security in university
libraries.
 Lowry and Goetsch(2001) and Holt (2007) identified several
insecurity breaches such as theft of materials and equipments,
alteration of information, non-return of items by borrowers,
vandalism, stock destruction and mutilation, all of which can
directly or indirectly affects the provision of library services.
 Both electronic and non electronic materials.
 Unprocessed, Rare& Special materials and manuscripts
vulnerable
 Anunobi & Okoye (2008) Access necessary for scholarship and
intellectual freedom.
Cont’d
 Purtell (2007) identified physical weaknesses in libraries in
terms of unsecured windows, faulty emergency exits, unstaffed
computer rooms, poor policies and procedures, lack of security
plans, poor security points (exits, loading areas, windows, special
collections) inadequate loans and renewal periods, lack of
security manuals and poor signage as some of the determinants
of in security breaches.
 Maidabino (2010) reported an estimated an average of loss rate
of 2.6% in university libraries
• Nkiki and Yusuf (2008) argued that the importance of
considering the physical and infrastructural aspects of the
library building and facilities ensures materials ‘security.
Classification of Security Awareness
Conceptually a good security system should as be as shown in figure I below:
Figure 1: Classification of security Awareness
Evaluation
Approaches
Conditions
intervening
to success
Distinction of Security
awareness, training
and Education
Desirable
Outcome
Process
Aspects
Role of IS
stakeholders
Security Awareness
Literature
Contd
 Holt(2007) suggests several methods to deal with
insecurity that include installation of high security
lock systems, tightening of material movements and
procedures, marking resources to indicate ownership,
good record keeping and undertaking periodic
inventories. cultivate professional culture and
behaviour with regard to safeguarding the materials.
 Brown and Patkus (2007) proposed a security plan that
comprises these components: a written security policy;
appointment of a security manager and a security
survey and inventory.
Research Methodology
A research survey was used to elicit relevant information for the study
.The instrument adopted for this study was an interview guide
consisting of twenty-four (24) items of research questions related to
the study. The research was conducted in three (3) universities in
Kenya: one (1) public (named UX) and two (2) private (named UY and
UZ) for anonymity purposes. Library users (N=30), 10 from each
university and Librarians (N=3) from 1 public and 2 private universities
were selected to participate in the study using stratified simple random
and purposive sampling. Therefore the total of 33 respondents
participated in the study. The study objectives were to ascertain the
security loopholes that exist, causes of information security lapses,
measures that have been put in place, security challenges facing
libraries and recommendations for improving security of information
materials for effective access
Study Findings
Categories of Insecurity
Category University
Item UX% F UY% F UZ % F
Theft 78 9 67 7 71 8
Vandalism& Mutilation 43 5 31 3 28 3
Disasters
10 1 21 2 16 2
Loss of Materials
56 6 47 5 67 7
Unethical Behavior 19 2 28 3 11 1
Non return of library materials
on time
23 3 25 3 18 2
Failed Identification and
authentication of users 45 5 51 6 34 4
Mis-shelving 16 2 23 3 14 2
Others 23 3 10 1 14 2
Key
F-Frequency
Cont’d
 Further to insecurity responses, it was noted by some
respondents, (4%) argued that some library facilities were
left with too many unsupervised areas, others, (7.5%)
raised the issue of computer virus, vandalism or tinkering.
 The researcher also observed that it was difficult to judge
whether or not information material losses are increasing,
as regular and accurate stock checks were lacking. The
parameters of what constitutes material loss were not clear
as non-returns were difficult to prove. Other insecurities
included theft of property, vandalism/destruction and
offensive user behaviour (9%). Some respondents, (13%)
viewed one or two security men to many library users at
any given time as inadequate.
Cont’d
Library Security Measures
Measures University
Item UX % F UY% F UY% F
Electronic security gates 78 9 81 9 96 10
Alarm systems 67 7 76 8 71 8
Surveillance cameras 42 5 35 4 16 2
Magnetic strips 78 9 65 7 66 7
Trained guards 56 6 64 7 51 6
Training on security 9 1 13 1 8 1
Access Controls 45 5 56 6 56 6
Identification cards 97 11 67 7 76 8
Environmental 23 3 15 2 11 1
Burglar doors 71 8 56 6 67 7
Shelving 91 10 91 10 87 10
Preservation and conservation 18 2 14 2 11 1
Periodic weeding 9 1 17 2 23 3
Stock taking 39 4 45 5 65 7
Others 45 5 30 3 51 6
Key
F-Frequency
Cont’d
 Other than the above security measures, two universities namely UY
and UX were reported to have secured luggage areas where library
users kept their bags and other related items before entering the library
as stated by (12.2%)of the respondents. All the three libraries were
observed to have one entrance and one exit. Library regulations were
readily available to remind library users of the punishments for
engaging in behavior that denied other users access to information or
destroying library materials as stated by 12% respondents. There were
restrictions of access to some areas as pointed out by 3.4% of the
respondents. For example in UY, users are not allowed to go to
information processing areas. UX was reported to have a CCTV cable
mounted in the main library and operates 24-hours. Respondents
(1.2%) reported that UY was noted to have alarm systems placed at
strategic places. Some libraries were observed to use turnstiles and
guards to slow down movements of users and check patrons going out
at the exit 24 hours.
Cont’d
Determinants of Library Insecurity
ITEM UX % F UY
% F
UZ
% F
Has economic situations 67 7 54 6 60 7
High cost of information resources 76 8 81 9 83 9
Ignorance of users 34 4 20 2 25 3
Unethical culture 54 6 67 7 46 5
Inadequate library resources 87 1
0
91 10 66 7
Copyright Restrictions 37 4 56 6 59 7
Week architectural designs 78 9 71 8 63
Food and drinks 54 6 59 6 49 5
Improper clearing of the library
building before closing time
15 2 07 1 03 1
Cont’d
 Fewer copies of information resources
 Own selfish gains.
 Fear of not getting what they want (2%), they tend to
deliberately hold on the material they get for a long time or
even pretend that it is lost for purposes of personalizing
the resources at the expenses of other users. High poverty
levels of some users make them to use short and
unorthodox means to use resources as noted by 1%
respondents. Some respondents (5%) pointed at laziness,
limited time and lack of morality and ethics on the part of
some students, while one librarian mentioned lack of
adequate vigilance of the part of security personnel and
organizational strategy for hotspots for information
insecurity.
Chall Challenges to Library Security
Challenges to Library Security
ITEM UX % F UY%
F
UZ%
F
System Failure 81 9 75 8 71 8
Inadequate
technical
knowledge
56 6 76 8 51 6
Lack of
Awareness
43 5 29 3 51 6
Limited Funding 55 6 61 7 51 6
Human error 12 1 09 1 13 1
Key
F- Frequency
Recommendations
 Well defined security policies- communicate both staff and users and
reviewed regularly.
 There is need to educate/create awareness librarians and information
users on the devastating effect of insecurity of information materials.
 Entrench the teaching of moral and ethical values in their curriculum
to inculcate discipline to students in using information resources.
Efficient and effective identification and authentication is necessary to
sufficiently trace any misuse/abuse of information resources by user(s)
to an individual user. Many identification and authentication systems
strongly recommend users ’university card used alongside passwords to
maintain accountability.
 The length of opening and closing the library needs to be balanced
between usability and security. Degree of accessibility should be taken
into consideration when deciding if this is an appropriate means of
authentication.
Cont’d
 Purchase requests and items on-order or in-process requested by
patrons should be linked to the library catalog system and user profiles
so that they can be notified when the items are ready to circulate. To
make progress in this field, libraries must improve their stock
inventories and importantly regularity with which these are carried
out. It is necessary to determine whether material losses are increasing,
decreasing or remaining static.
 Installation of the library card system to enhance information is
essential. The purpose of the card access system is to give entry
authorization to staff, security guards, cleaning contractors, and
maintenance contractors without having to issue keys. This is because
the card system will allow control of access to information resources
and control who can have access and at what times and tracks users’
use of resources.
Conclusion
Security should not just dwell on protecting information, but on generating
high assurance levels, for good quality information access. A security system
should therefore be attributed to interaction to direct, select, protect, and
verify the library transactions. Maximum information access relies primarily on
security of the same. Security measures should therefore be discussed openly
and made available as soon as practical. Although some libraries appear well
organized in their security programs, many lack up-to-date written security
plans, effective data gathering, and complete security inventory procedures. On
the other hand, too much emphasis on security can create a negative
atmosphere for information users. Library security personnel should be well
trained and allowed to participate in induction courses, workshops, and on-
the-job training. Libraries should also be well funded to procure and provide
multiple copies of library textbooks for users, especially for borrowing and easy
access, while limited copies of textbooks should be placed on reserves. Stock
taking of library books should also be undertaken regularly to detect mutilated
and stolen books for effective information access.
END
THANKS FOR LISTENING
QUESTIONS& ANSWERS

More Related Content

Viewers also liked

You are the controller. Analisi di usabilità dell'interfaccia utente di tre v...
You are the controller. Analisi di usabilità dell'interfaccia utente di tre v...You are the controller. Analisi di usabilità dell'interfaccia utente di tre v...
You are the controller. Analisi di usabilità dell'interfaccia utente di tre v...Alberto Sapignoli
 
Using strategic entry points- West Usambara Highlands Tanzania
Using strategic entry points- West Usambara Highlands TanzaniaUsing strategic entry points- West Usambara Highlands Tanzania
Using strategic entry points- West Usambara Highlands Tanzaniawickama
 
Batman.407.ano.um.04.de.04.hq.br.28 ago2005.gibihq
Batman.407.ano.um.04.de.04.hq.br.28 ago2005.gibihqBatman.407.ano.um.04.de.04.hq.br.28 ago2005.gibihq
Batman.407.ano.um.04.de.04.hq.br.28 ago2005.gibihqMarcos Donato
 
Session 2 game language
Session 2 game languageSession 2 game language
Session 2 game languageNick Verney
 
Cardiomiopatia hipetrofica felina prevencion criadores hcm cmh amvac asfe 201...
Cardiomiopatia hipetrofica felina prevencion criadores hcm cmh amvac asfe 201...Cardiomiopatia hipetrofica felina prevencion criadores hcm cmh amvac asfe 201...
Cardiomiopatia hipetrofica felina prevencion criadores hcm cmh amvac asfe 201...Tarsicio Marco
 
Csr marketing nexus
Csr marketing nexusCsr marketing nexus
Csr marketing nexussannan29
 
Policy brief fiddler v1
Policy brief   fiddler v1Policy brief   fiddler v1
Policy brief fiddler v1Kathy Fiddler
 
Spaying and neutering your pets
Spaying and neutering your petsSpaying and neutering your pets
Spaying and neutering your petsSerena Bruce
 

Viewers also liked (20)

El piano alba
El piano albaEl piano alba
El piano alba
 
Actividad no.2
Actividad no.2Actividad no.2
Actividad no.2
 
You are the controller. Analisi di usabilità dell'interfaccia utente di tre v...
You are the controller. Analisi di usabilità dell'interfaccia utente di tre v...You are the controller. Analisi di usabilità dell'interfaccia utente di tre v...
You are the controller. Analisi di usabilità dell'interfaccia utente di tre v...
 
Using strategic entry points- West Usambara Highlands Tanzania
Using strategic entry points- West Usambara Highlands TanzaniaUsing strategic entry points- West Usambara Highlands Tanzania
Using strategic entry points- West Usambara Highlands Tanzania
 
Batman.407.ano.um.04.de.04.hq.br.28 ago2005.gibihq
Batman.407.ano.um.04.de.04.hq.br.28 ago2005.gibihqBatman.407.ano.um.04.de.04.hq.br.28 ago2005.gibihq
Batman.407.ano.um.04.de.04.hq.br.28 ago2005.gibihq
 
Session 2 game language
Session 2 game languageSession 2 game language
Session 2 game language
 
Clase23marzo
Clase23marzoClase23marzo
Clase23marzo
 
Memoria descriptiva 6
Memoria descriptiva 6Memoria descriptiva 6
Memoria descriptiva 6
 
Chaves para transformar o mundo
Chaves para transformar o mundoChaves para transformar o mundo
Chaves para transformar o mundo
 
οαεε
οαεε οαεε
οαεε
 
Esto es marea naranja
Esto es marea naranjaEsto es marea naranja
Esto es marea naranja
 
Cardiomiopatia hipetrofica felina prevencion criadores hcm cmh amvac asfe 201...
Cardiomiopatia hipetrofica felina prevencion criadores hcm cmh amvac asfe 201...Cardiomiopatia hipetrofica felina prevencion criadores hcm cmh amvac asfe 201...
Cardiomiopatia hipetrofica felina prevencion criadores hcm cmh amvac asfe 201...
 
Csr marketing nexus
Csr marketing nexusCsr marketing nexus
Csr marketing nexus
 
Policy brief fiddler v1
Policy brief   fiddler v1Policy brief   fiddler v1
Policy brief fiddler v1
 
Spaying and neutering your pets
Spaying and neutering your petsSpaying and neutering your pets
Spaying and neutering your pets
 
Papel do cristão no meio do mundo
Papel do cristão no meio do mundoPapel do cristão no meio do mundo
Papel do cristão no meio do mundo
 
El piano alba
El piano albaEl piano alba
El piano alba
 
Можайский
МожайскийМожайский
Можайский
 
Cloud Computing - Economics
Cloud Computing - EconomicsCloud Computing - Economics
Cloud Computing - Economics
 
Ppt project management sesión 4
Ppt project management sesión 4Ppt project management sesión 4
Ppt project management sesión 4
 

Similar to University library security issues in Kenya

Challenges and prospects of using information communication technologies (ict...
Challenges and prospects of using information communication technologies (ict...Challenges and prospects of using information communication technologies (ict...
Challenges and prospects of using information communication technologies (ict...Alexander Decker
 
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...Nat Rice
 
The effect of computer literacy on university of maiduguri students’ attitude...
The effect of computer literacy on university of maiduguri students’ attitude...The effect of computer literacy on university of maiduguri students’ attitude...
The effect of computer literacy on university of maiduguri students’ attitude...Alexander Decker
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...idsecconf
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...ijcsit
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...AIRCC Publishing Corporation
 
Availability and accessibility of ict in the provision of information resourc...
Availability and accessibility of ict in the provision of information resourc...Availability and accessibility of ict in the provision of information resourc...
Availability and accessibility of ict in the provision of information resourc...Alexander Decker
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityCSCJournals
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExEADTU
 
Wearable Technologies: Possibilities in Bringing Innovative Learning Experien...
Wearable Technologies: Possibilities in Bringing Innovative Learning Experien...Wearable Technologies: Possibilities in Bringing Innovative Learning Experien...
Wearable Technologies: Possibilities in Bringing Innovative Learning Experien...Amy Weiss
 
Beyond the first steps: Sustaining Health OER Initiatives in Ghana
 Beyond the first steps: Sustaining Health OER Initiatives in Ghana Beyond the first steps: Sustaining Health OER Initiatives in Ghana
Beyond the first steps: Sustaining Health OER Initiatives in GhanaSaide OER Africa
 
Beyond the first steps: Sustaining Health OER Initiatives in Ghana
Beyond the first steps: Sustaining Health OER Initiatives in GhanaBeyond the first steps: Sustaining Health OER Initiatives in Ghana
Beyond the first steps: Sustaining Health OER Initiatives in GhanaPiLNAfrica
 
Technological Factors Affecting Computer Aided Learning Among Students Attend...
Technological Factors Affecting Computer Aided Learning Among Students Attend...Technological Factors Affecting Computer Aided Learning Among Students Attend...
Technological Factors Affecting Computer Aided Learning Among Students Attend...AJHSSR Journal
 
security and usable.ppt
security and usable.pptsecurity and usable.ppt
security and usable.pptSaba651353
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Alexander Decker
 
Vol 1 No 1 - January 2014
Vol 1 No 1 - January 2014Vol 1 No 1 - January 2014
Vol 1 No 1 - January 2014ijlterorg
 
Analysing Electronic Theses And Dissertations (ETDs) In South Africa
Analysing Electronic Theses And Dissertations (ETDs) In South AfricaAnalysing Electronic Theses And Dissertations (ETDs) In South Africa
Analysing Electronic Theses And Dissertations (ETDs) In South AfricaRenee Lewis
 
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination EnvironmentA Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination Environmentijma
 
P I C O T ASSIGNMENTQUESTION What Is the effectiveness of restr.docx
P I C O T ASSIGNMENTQUESTION What Is the effectiveness of restr.docxP I C O T ASSIGNMENTQUESTION What Is the effectiveness of restr.docx
P I C O T ASSIGNMENTQUESTION What Is the effectiveness of restr.docxgerardkortney
 
Comm Research Paper FINAL
Comm Research Paper FINALComm Research Paper FINAL
Comm Research Paper FINALRobert Moore II
 

Similar to University library security issues in Kenya (20)

Challenges and prospects of using information communication technologies (ict...
Challenges and prospects of using information communication technologies (ict...Challenges and prospects of using information communication technologies (ict...
Challenges and prospects of using information communication technologies (ict...
 
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
 
The effect of computer literacy on university of maiduguri students’ attitude...
The effect of computer literacy on university of maiduguri students’ attitude...The effect of computer literacy on university of maiduguri students’ attitude...
The effect of computer literacy on university of maiduguri students’ attitude...
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
 
Availability and accessibility of ict in the provision of information resourc...
Availability and accessibility of ict in the provision of information resourc...Availability and accessibility of ict in the provision of information resourc...
Availability and accessibility of ict in the provision of information resourc...
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
 
Wearable Technologies: Possibilities in Bringing Innovative Learning Experien...
Wearable Technologies: Possibilities in Bringing Innovative Learning Experien...Wearable Technologies: Possibilities in Bringing Innovative Learning Experien...
Wearable Technologies: Possibilities in Bringing Innovative Learning Experien...
 
Beyond the first steps: Sustaining Health OER Initiatives in Ghana
 Beyond the first steps: Sustaining Health OER Initiatives in Ghana Beyond the first steps: Sustaining Health OER Initiatives in Ghana
Beyond the first steps: Sustaining Health OER Initiatives in Ghana
 
Beyond the first steps: Sustaining Health OER Initiatives in Ghana
Beyond the first steps: Sustaining Health OER Initiatives in GhanaBeyond the first steps: Sustaining Health OER Initiatives in Ghana
Beyond the first steps: Sustaining Health OER Initiatives in Ghana
 
Technological Factors Affecting Computer Aided Learning Among Students Attend...
Technological Factors Affecting Computer Aided Learning Among Students Attend...Technological Factors Affecting Computer Aided Learning Among Students Attend...
Technological Factors Affecting Computer Aided Learning Among Students Attend...
 
security and usable.ppt
security and usable.pptsecurity and usable.ppt
security and usable.ppt
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...
 
Vol 1 No 1 - January 2014
Vol 1 No 1 - January 2014Vol 1 No 1 - January 2014
Vol 1 No 1 - January 2014
 
Analysing Electronic Theses And Dissertations (ETDs) In South Africa
Analysing Electronic Theses And Dissertations (ETDs) In South AfricaAnalysing Electronic Theses And Dissertations (ETDs) In South Africa
Analysing Electronic Theses And Dissertations (ETDs) In South Africa
 
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination EnvironmentA Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
 
P I C O T ASSIGNMENTQUESTION What Is the effectiveness of restr.docx
P I C O T ASSIGNMENTQUESTION What Is the effectiveness of restr.docxP I C O T ASSIGNMENTQUESTION What Is the effectiveness of restr.docx
P I C O T ASSIGNMENTQUESTION What Is the effectiveness of restr.docx
 
Comm Research Paper FINAL
Comm Research Paper FINALComm Research Paper FINAL
Comm Research Paper FINAL
 

More from Francis Mwangi

Reference services augustine gitonga
Reference services   augustine gitongaReference services   augustine gitonga
Reference services augustine gitongaFrancis Mwangi
 
Libraries and student assistants ephraim mudave
Libraries and student assistants   ephraim mudaveLibraries and student assistants   ephraim mudave
Libraries and student assistants ephraim mudaveFrancis Mwangi
 
Managing technological change amos gichuki
Managing technological change   amos gichukiManaging technological change   amos gichuki
Managing technological change amos gichukiFrancis Mwangi
 
Technological trends in libraries lilian okello
Technological trends in libraries   lilian okelloTechnological trends in libraries   lilian okello
Technological trends in libraries lilian okelloFrancis Mwangi
 
Social media ethical issues jotham wasike
Social media ethical issues   jotham wasikeSocial media ethical issues   jotham wasike
Social media ethical issues jotham wasikeFrancis Mwangi
 
Keynote address dr. chilimo-muoki
Keynote address   dr. chilimo-muokiKeynote address   dr. chilimo-muoki
Keynote address dr. chilimo-muokiFrancis Mwangi
 

More from Francis Mwangi (6)

Reference services augustine gitonga
Reference services   augustine gitongaReference services   augustine gitonga
Reference services augustine gitonga
 
Libraries and student assistants ephraim mudave
Libraries and student assistants   ephraim mudaveLibraries and student assistants   ephraim mudave
Libraries and student assistants ephraim mudave
 
Managing technological change amos gichuki
Managing technological change   amos gichukiManaging technological change   amos gichuki
Managing technological change amos gichuki
 
Technological trends in libraries lilian okello
Technological trends in libraries   lilian okelloTechnological trends in libraries   lilian okello
Technological trends in libraries lilian okello
 
Social media ethical issues jotham wasike
Social media ethical issues   jotham wasikeSocial media ethical issues   jotham wasike
Social media ethical issues jotham wasike
 
Keynote address dr. chilimo-muoki
Keynote address   dr. chilimo-muokiKeynote address   dr. chilimo-muoki
Keynote address dr. chilimo-muoki
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

University library security issues in Kenya

  • 1. SECURITY AND INFORMATION ACCESS IN UNIVERSITY LIBRARIES IN KENYA A RESEARCH PAPER TO BE PRESENTED AT THE 13TH CALA ANNUAL CONFERENCE AT THE MILELE BEACH HOTEL-MOMBASA, KENYA BY JOTHAM MILIMO WASIKE LIBRARIAN –CATHOLIC UNIVERSITY OF EASTERN AFRICA DATE: 22-26 JUNE, 2013
  • 2. Abstract This study aims at investigating the security of information materials and how it affects use in university libraries in Kenya, with a view of proposing ways and means of maximizing information use. The objectives of the study were to ascertain the security loopholes that exist, causes of information security lapses, measures that have been put in place and security challenges facing libraries .The study has generated new knowledge on security of information and its social implications point towards key security policy formulation.
  • 3. Introduction and Background  The term ‘information security’ means protecting information materials and systems from unauthorized access, use, disclosure, disruption, modification, or destruction for effective access(Ajegbomogun,2004).  Conceptually, it means the overall manner in which library policies, programmes, procedures, or measures are deployed to mitigate risk and ensure access to information.  Verton (2004) state that, “information resources are very vulnerable to abuse of one sort or another.  These issues include but are not limited to; physical, architectural, electronic, managerial, technical, and operational controls
  • 4. Cont’d  Striking a balance between access and security in university libraries.  Lowry and Goetsch(2001) and Holt (2007) identified several insecurity breaches such as theft of materials and equipments, alteration of information, non-return of items by borrowers, vandalism, stock destruction and mutilation, all of which can directly or indirectly affects the provision of library services.  Both electronic and non electronic materials.  Unprocessed, Rare& Special materials and manuscripts vulnerable  Anunobi & Okoye (2008) Access necessary for scholarship and intellectual freedom.
  • 5. Cont’d  Purtell (2007) identified physical weaknesses in libraries in terms of unsecured windows, faulty emergency exits, unstaffed computer rooms, poor policies and procedures, lack of security plans, poor security points (exits, loading areas, windows, special collections) inadequate loans and renewal periods, lack of security manuals and poor signage as some of the determinants of in security breaches.  Maidabino (2010) reported an estimated an average of loss rate of 2.6% in university libraries • Nkiki and Yusuf (2008) argued that the importance of considering the physical and infrastructural aspects of the library building and facilities ensures materials ‘security.
  • 6. Classification of Security Awareness Conceptually a good security system should as be as shown in figure I below: Figure 1: Classification of security Awareness Evaluation Approaches Conditions intervening to success Distinction of Security awareness, training and Education Desirable Outcome Process Aspects Role of IS stakeholders Security Awareness Literature
  • 7. Contd  Holt(2007) suggests several methods to deal with insecurity that include installation of high security lock systems, tightening of material movements and procedures, marking resources to indicate ownership, good record keeping and undertaking periodic inventories. cultivate professional culture and behaviour with regard to safeguarding the materials.  Brown and Patkus (2007) proposed a security plan that comprises these components: a written security policy; appointment of a security manager and a security survey and inventory.
  • 8. Research Methodology A research survey was used to elicit relevant information for the study .The instrument adopted for this study was an interview guide consisting of twenty-four (24) items of research questions related to the study. The research was conducted in three (3) universities in Kenya: one (1) public (named UX) and two (2) private (named UY and UZ) for anonymity purposes. Library users (N=30), 10 from each university and Librarians (N=3) from 1 public and 2 private universities were selected to participate in the study using stratified simple random and purposive sampling. Therefore the total of 33 respondents participated in the study. The study objectives were to ascertain the security loopholes that exist, causes of information security lapses, measures that have been put in place, security challenges facing libraries and recommendations for improving security of information materials for effective access
  • 9. Study Findings Categories of Insecurity Category University Item UX% F UY% F UZ % F Theft 78 9 67 7 71 8 Vandalism& Mutilation 43 5 31 3 28 3 Disasters 10 1 21 2 16 2 Loss of Materials 56 6 47 5 67 7 Unethical Behavior 19 2 28 3 11 1 Non return of library materials on time 23 3 25 3 18 2 Failed Identification and authentication of users 45 5 51 6 34 4 Mis-shelving 16 2 23 3 14 2 Others 23 3 10 1 14 2 Key F-Frequency
  • 10. Cont’d  Further to insecurity responses, it was noted by some respondents, (4%) argued that some library facilities were left with too many unsupervised areas, others, (7.5%) raised the issue of computer virus, vandalism or tinkering.  The researcher also observed that it was difficult to judge whether or not information material losses are increasing, as regular and accurate stock checks were lacking. The parameters of what constitutes material loss were not clear as non-returns were difficult to prove. Other insecurities included theft of property, vandalism/destruction and offensive user behaviour (9%). Some respondents, (13%) viewed one or two security men to many library users at any given time as inadequate.
  • 11. Cont’d Library Security Measures Measures University Item UX % F UY% F UY% F Electronic security gates 78 9 81 9 96 10 Alarm systems 67 7 76 8 71 8 Surveillance cameras 42 5 35 4 16 2 Magnetic strips 78 9 65 7 66 7 Trained guards 56 6 64 7 51 6 Training on security 9 1 13 1 8 1 Access Controls 45 5 56 6 56 6 Identification cards 97 11 67 7 76 8 Environmental 23 3 15 2 11 1 Burglar doors 71 8 56 6 67 7 Shelving 91 10 91 10 87 10 Preservation and conservation 18 2 14 2 11 1 Periodic weeding 9 1 17 2 23 3 Stock taking 39 4 45 5 65 7 Others 45 5 30 3 51 6 Key F-Frequency
  • 12. Cont’d  Other than the above security measures, two universities namely UY and UX were reported to have secured luggage areas where library users kept their bags and other related items before entering the library as stated by (12.2%)of the respondents. All the three libraries were observed to have one entrance and one exit. Library regulations were readily available to remind library users of the punishments for engaging in behavior that denied other users access to information or destroying library materials as stated by 12% respondents. There were restrictions of access to some areas as pointed out by 3.4% of the respondents. For example in UY, users are not allowed to go to information processing areas. UX was reported to have a CCTV cable mounted in the main library and operates 24-hours. Respondents (1.2%) reported that UY was noted to have alarm systems placed at strategic places. Some libraries were observed to use turnstiles and guards to slow down movements of users and check patrons going out at the exit 24 hours.
  • 13. Cont’d Determinants of Library Insecurity ITEM UX % F UY % F UZ % F Has economic situations 67 7 54 6 60 7 High cost of information resources 76 8 81 9 83 9 Ignorance of users 34 4 20 2 25 3 Unethical culture 54 6 67 7 46 5 Inadequate library resources 87 1 0 91 10 66 7 Copyright Restrictions 37 4 56 6 59 7 Week architectural designs 78 9 71 8 63 Food and drinks 54 6 59 6 49 5 Improper clearing of the library building before closing time 15 2 07 1 03 1
  • 14. Cont’d  Fewer copies of information resources  Own selfish gains.  Fear of not getting what they want (2%), they tend to deliberately hold on the material they get for a long time or even pretend that it is lost for purposes of personalizing the resources at the expenses of other users. High poverty levels of some users make them to use short and unorthodox means to use resources as noted by 1% respondents. Some respondents (5%) pointed at laziness, limited time and lack of morality and ethics on the part of some students, while one librarian mentioned lack of adequate vigilance of the part of security personnel and organizational strategy for hotspots for information insecurity.
  • 15. Chall Challenges to Library Security Challenges to Library Security ITEM UX % F UY% F UZ% F System Failure 81 9 75 8 71 8 Inadequate technical knowledge 56 6 76 8 51 6 Lack of Awareness 43 5 29 3 51 6 Limited Funding 55 6 61 7 51 6 Human error 12 1 09 1 13 1 Key F- Frequency
  • 16. Recommendations  Well defined security policies- communicate both staff and users and reviewed regularly.  There is need to educate/create awareness librarians and information users on the devastating effect of insecurity of information materials.  Entrench the teaching of moral and ethical values in their curriculum to inculcate discipline to students in using information resources. Efficient and effective identification and authentication is necessary to sufficiently trace any misuse/abuse of information resources by user(s) to an individual user. Many identification and authentication systems strongly recommend users ’university card used alongside passwords to maintain accountability.  The length of opening and closing the library needs to be balanced between usability and security. Degree of accessibility should be taken into consideration when deciding if this is an appropriate means of authentication.
  • 17. Cont’d  Purchase requests and items on-order or in-process requested by patrons should be linked to the library catalog system and user profiles so that they can be notified when the items are ready to circulate. To make progress in this field, libraries must improve their stock inventories and importantly regularity with which these are carried out. It is necessary to determine whether material losses are increasing, decreasing or remaining static.  Installation of the library card system to enhance information is essential. The purpose of the card access system is to give entry authorization to staff, security guards, cleaning contractors, and maintenance contractors without having to issue keys. This is because the card system will allow control of access to information resources and control who can have access and at what times and tracks users’ use of resources.
  • 18. Conclusion Security should not just dwell on protecting information, but on generating high assurance levels, for good quality information access. A security system should therefore be attributed to interaction to direct, select, protect, and verify the library transactions. Maximum information access relies primarily on security of the same. Security measures should therefore be discussed openly and made available as soon as practical. Although some libraries appear well organized in their security programs, many lack up-to-date written security plans, effective data gathering, and complete security inventory procedures. On the other hand, too much emphasis on security can create a negative atmosphere for information users. Library security personnel should be well trained and allowed to participate in induction courses, workshops, and on- the-job training. Libraries should also be well funded to procure and provide multiple copies of library textbooks for users, especially for borrowing and easy access, while limited copies of textbooks should be placed on reserves. Stock taking of library books should also be undertaken regularly to detect mutilated and stolen books for effective information access.