SlideShare a Scribd company logo
1 of 12
Download to read offline
International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277
– 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication
20
AN APPRAISAL OF USERS’ ATTITUDINAL BEHAVIOUR IN
ACADEMIC LIBRARY: CASE STUDY OF TWO SELECTED
UNIVERSITY LIBRARIES
1
ARINOLA, Adeola Adesoji, 2
OYETOLA, Solomon Olusegun,
3
ODUNOLA, Oluwole Akanmu, 4
ADEKUNJO Olalekan Abraham
1, 2, 3
Olusegun Oke Library, Ladoke Akintola University of Technology, Ogbomoso,
Oyo State, Nigeria.
4
Kenneth Dike Library, University of Ibadan, Oyo State, Nigeria
ABSTRACT
Readers’ attitudinal behaviour in the library is highly worrisome, the need for libraries
to develop strategies in curbbing the menace as well as putting better security measures in
libraries is discussed. The survey research method was used for the study. The instruments
used for collecting data based on the research objectives were the questionnaire,
supplemented by unstructured interview and observations.Simple random sampling technique
was used to select 546 respondents from the two university libraries. The data was analyzed
using frequency counts, percentages and tables. The result of the study revealed different
forms of disruptive behaviour among academic library users.among which are:
Stealing/mutilation of library materials, hiding of materials on different location, using fake
library card to enter the library, eatingordrinking in the library as well astaking or making cell
phone calls in the library. Scarcities of library materials, Ignorance, unavailability of copier
machine were discovered as the major factors responsible for these attitudinal behaviours.
The paper concludes that library managements should organize systematic training and
orientation for library users and better security facilitiesshould be put in place to safeguard
library properties.
Key Words: Library User, Behaviour, Disruptive, Attitude, Academic Library.
INTERNATIONAL JOURNAL OF LIBRARY AND
INFORMATION SCIENCE RESEARCH AND DEVELOPMENT
(IJLISRD)
ISSN: 2277 – 3541 (Print),
ISSN: 2277 – 3673 (Online)
Volume 3, Issue 2, April-June (2014), pp. 20-31
© PRJ: www.prjpublication.com/ijlisrd.asp
Journal Impact Factor (2014): 5.1680
(Calculated by GISI), www.jifactor.com
IJLISRD
© PRJ PUBLICATION
International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277
– 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication
21
INTRODUCTION
In any organization, weather big or small it is pertinent to know that peoples’attitudes
and behaviours are bound to differ. While some behaviours are acceptable and conventional
others may be atypical or disruptive. Attitudes are "inclinations and feelings, prejudices or
bias, preconceived notions, ideas, fears and convictions about any specific topic" (Taiwo,
1998). According to All port (1935), attitude "is a mental and neutral state of readiness
organized through experience exerting a directive or dynamic influences upon individual's
response to all objects or situations with which it is associated."
Blodgett, Granbois, and Walters (1993) believe there is no single,comprehensive
theory of complaining behavior. Majority of the early studies were based on descriptive
studies and emphasized interpersonal influences. Demographic variables, including age,
income, occupation, and social classes, have been used for this purpose. A typical example of
this perspective is ‘‘complainers tend to earn higher incomes, have more education, have
professional jobs, and are younger’’ (Singh, 1990).
The complaining behavior was further subdivided into ‘‘exit,’’ ‘‘negative word-of-
mouth,’’ ‘‘voice (redress-seeking) complaints,’’ and ‘‘third-party complaints.’’ The
definitions of Blodgett and Granbois (1992) and Singh (1989) were applied to the library
situation as follows: ‘‘exit’’ is an intention, to never again patronise the offending library;
‘‘negative word-of-mouth’’ means informing others about one’s dissatisfaction (i.e.,
complaints about the library and/or the service to friends or relatives); ‘‘voice’’ is a complaint
directed toward the library; and ‘‘third-party complaints’’ are formal complaints directed
toward agencies not directly involved in the exchange relationship. In the public library
situation, unlike in the case of profit making organizations, it is difficult to seek redress, or
replace, refund, or compensate the goods or services through voice. Library users can use two
types of voice: voice their complaint directly to the library staff at the time of dissatisfaction
or voice their complaint indirectly using cards, e-mail, and similar means at a later time
The library according to Collier’s Encyclopedia (2000), is considered as a
‘communication centre’. The mission of libraries is to make the contents of the world’s
accumulating literacy, intellectual and cultural heritage available quickly and inexpensively.
The library fulfills its mission by collecting, organizing and preserving information and using
this information to satisfy the needs of the users through its services. However,disruptive
behaviour of library users is a problem of libraries all over the world, The most common
among are theft and mutilation of materials including books, periodicals, documents,
journals, computers and so on. The University Libraries will take responsibility for making
sure users are behaving in an appropriate manner during their attendance in the Library. A
disruptive individual is someone who is rude, uncivil, or creates a disturbance which disrupts,
distracts or otherwise hinders other individuals (staff or users) engaged in or supporting
academic pursuits and/or library operations. Examples of such disruptive behaviour include
but are not limited to: shouting, playing, running, playing music and inappropriate use of
library equipment and resources. Additionally, any criminal behaviour (e.g. indecent
exposure of the body or fighting) will be treated as disruptive behaviour. Disruptive
behaviour may also include threats (veiled or explicit) to library employees, students, faculty
staff, and public users. Behaviour like these may result in the loss of some library privileges
Scandalous behaviours such as theft and mutilation, hiding library materials, refusal to return
over due borrowed materials, drinking and eating in the library, among others have become a
common occurrence in academic library, if this is not checked, it will lead to serious drought
of information materials in the library (Jato, 2005)
International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277
– 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication
22
Just like all other organizations, academic libraries are regulated by rules and
regulations that are established to protect the rights, interests and safety of library users and
staff. Rules of conduct are normally posted in libraries, often near the circulation desk or in
places where they can be easily accessed and viewed by users. These documents typically
contain policies that address issues such as: the use of disruptive, abusive or harassing
language or behaviour; respect and care for library property and materials; consumption of
food and beverages; safety and supervision of children; use of cell phones etc.
Appropriate library conduct includes activities such as reading, studying, properly
using library materials and computers in a manner which does not interfere with other users.
According to Momodu (2002), academic libraries have been faced with varying degrees of
criminal behaviour in the use of their resources especially materials and to some extent
manpower.
Examples of disruptive or unacceptable behaviours in academic libraries include, but
are not limited to:
• Playing audio devices in manners that others can hear it
• Talking loudly, making noise, or engaging in any type of conduct which reasonably
can be expected to disturb and interfere with the use of the Library by other persons
• Interfering with another person’s use of the Library or with Library personnel’s
performance of their duties
• Disregarding posted rules regarding cell phone use
• Behaving or speaking in a way that is offensive to others
• Damaging Library property
• Stealing Library material
• Using obscene or abusive language or gestures
• Distributing and/or posting of unauthorized materials inside the library
• Failing to wear proper attire, including shoes and shirt
• Disregarding posted rules regarding food and beverages
• Disregarding posted opening and closing times
• Violating the library’s rules for acceptable use of the Internet and public computers
• Leaving an underage child unattended to
• Using alcohol or illegal drugs or coming to the library intoxicated
• Filming or photographing users within the library without the permission of the
Branch Librarian and users
• Engaging in sexual acts
Disruptive and unacceptable behaviour includes all activities, as determined by
Library management, which interferes with the rights of other users of the Library, disrupts
the normal functioning of the Library and which is in violation of Library Policies and other
laws. In any situation where the library management feels that the safety and security of
library users, staff or property are threatened, they may take every appropriate action to deal
with the situation, including, but not limited to, calling the security for assistance. Library
staff may ask a person to leave the library premises with or without prior warning, depending
on the seriousness of the violation. Further suspension of library privileges may also be
applicable. Furthermore, The Library management reserves the right to:
International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277
– 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication
23
• Inspect all Library materials, users’ handbags, briefcases, purses, luggage, and other
similar items. Library staff may also ask users to leave bags and other items at the
library desk until the library user is ready to leave.
• Require anyone who engages in disruptive behavior to leave the premises. Anyone
asked to leave the Library is not allowed to loiter in the entryway, parking lot or lawn
areas.
• Immediately notify the authority of unlawful activities of any user.
Theft and mutilation of books are certainly not new developments of our time. Such
acts can be traced as far back as 539BC in Egypt when the Persian conquerors removed rolls
of papyri from the Library of Ramses II around 41BC(Bajpai,2013). Another major
disruptive behaviour of user recently notice is cell phone use in libraries, library staff
members are now faced with the problem of whether or not to enforce an out-right ban (Hall,
2002; Knecht, 2003).
Safety, supervision and behaviour of children in libraries have been subjected to
lengthy discussion, some school of thoughtsare of the opinion that strict discipline be
enforced to ensure that children are not put at risk and that parents should refrain from
leaving their children unsupervised,thereby turning the library to “child-storage depot”
(Robertson, 2004).The behaviour of adolescents in public libraries has also become
worrisome, diverse approaches to check disruptive behaviour have been presented(Ishizuka,
2004). However, McKechnie et al, (2004) found out that library patrons frequently violated
library rules and regulations by engaging in behaviours which disrupted the use of the library
by others. In addition, staffs were often discovered to encourage this behaviour.
Background Informationof Study Areas
The University Library of Ladoke Akintola University of Technology Ogbomoso was
established in July 1990 as one of the academic unit in the university. Up to date, it has been
performing its academic roles to support learning, teaching and research. The library has
witnessed lots of growth in term of size of building, collection of materials, equipment,
staffing and other changes. From July 1990 till February 1999, the library occupied a small
space in a building now known as Department of Statistics. At inception, all the staff always
sat in a common and open room without reading tables, books and other conveniences. The
library was later partitioned and equipped with 82 seats in 1992 and was later moved to its
present site in February 1999(Afolabi, 2003).
The library was renamed after the pioneer Vice Chancellor “Olusegun Ladimeji Oke’
on April 23, 2010. The university as well as the library has finally put its feet on the sound of
time. Presently Olusegun Oke Library consists of the main library and six Faculty Libraries
namely; Pure and Applied Sciences, Engineering, Environmental sciences, Agricultural
sciences, Basic Medicals sciences, and Management Sciences under its administration. In the
last 20 years the library collections have grown to over 76,000 volumes excluding journals,
which are over 3000. The library operates a loan policy of two books per undergraduate
students and three books for postgraduate students and lecturers for two weeks. The
university library has over 35,000 registered users offering both full and part time courses as
at the time of carrying out this study. The main library now operates extended hour services
especially during examination periods.
Kenneth Dike Library, University of Ibadan was established in 1948 at the inception
of the University College Ibadan. The Library used to be known as the University Library
International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277
– 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication
24
until 1988 when it was renamed Kenneth Dike Library (KDL) in honour of the first African
vice-chancellor, Late Professor Kenneth Onwuka Dike. It operates a library system that
comprises of Departmental and Faculty libraries. The Library was established primarily, to
serve the interest of the university community, although Staff and Students of other
universities may be permitted to use the library resources for short periods, after having
obtained the permission from the University Librarian. Presently, Kenneth Dike Library can
boast of over one million copies of books and about 6000 journal titles. The library has over
70,000 populations of registered users. As against Olusegun Oke, Kenneth Dike library
operates a loan policy of four books per undergraduate students for 2 weeks and ten (10)
books for postgraduates’ students and staff for four weeks with a fine of N5 per one day of
overdue. Oyewusi and Oyeboade (2009) discussed the importance of good collections as a
pointer to the need for safety and security for those collections. In their view, access to
quality collections reinvigorates the mission of the university. The digitization of local
content materials was in progress at Kenneth Dike library as at the time of carrying out this
research.
STATEMENT OF THE PROBLEM
Theft and mutilation of library materials is also a major problem in both Olusegun
Oke Library and Kenneth Dike Library as it is in libraries all over the world. Also worrisome
is the behaviour of users in the library, dishonest employees and persons who are willing to
purchase stolen books. Hence this study aims to investigate and find ways to stop or
minimize these problems and as a result make the library effective and essential. However, it
is the belief that the results and recommendations from this study would assist other academic
libraries in curbing this menace.
OBJECTIVE OF THE STUDY
The general aim of this study is to investigate the experiences of Olusegun-Oke
Library, and Kenneth Dike Library with regards to disruptive behaviours of readers.
The specific objectives includes
1. To find out the parts of library materials that are mostly prone to users’ disruption.
2. To find out the forms of disruptive behaviours prevalent among users of academic
libraries.
3. To examine the reasons why users exhibit such identified disruptive behaviours,
4. To suggest appropriate remedies to these problems in majority of the libraries.
RESEARCH METHODOLOGY
Survey research technique was adopted for the study. The instrument used for
collecting data based on the research objectives was the questionnaire, supplemented by
unstructured interview and observation. The observation enabled the investigators to know
the type of services given in the library, and to check these verity of the damage to library
International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277
– 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication
25
materials. 600 copies of the questionnaire were distributed to the respondents and 546 copies
were returned and found suitable for analysis at 91% response rate.
The questionnaire was divided into parts, section A to E. Section A had six (6)
questions which dealt with the biodata of respondents while section B dealt with the forms of
disruptive behaviours prevalent among users of academic libraries. Section C dealt with the
types of library materials that are mostly prone to users’ disruption. Section D examines the
reasons why users exhibit such identified disruptive behaviours and section E looked at the
best solution and remedies appropriate for the majority of libraries.Data was analyzed using
percentages and frequency. The study was carried out between September, 2013 and March,
2014.
Data Analysis and Discussion of Findings
Table 1: Size of Respondent
Name of Library Distributed Returned
Frequency Frequency Percentage%
Olusegun-Oke Library, LAUTECH 300 276 92
Kenneth Dike Library, U.I 300 270 90
Total 600 546 91
Source: Field Survey 2014
The table above shows that the questionnaire was evenly distributed between the
libraries understudy
Demographic Characteristics of Respondents(N =546)
Table 2.1: Distribution of Respondents by Gender
GENDER Frequency Percentage%
Male 244 44.6
female 302 55.3
Total 546 100
Table 2.2: Distribution of Respondents by Level
LEVEL Frequency Percentage%
100 95 17.4
200 102 18.7
300 96 17.6
400 106 19.4
500 95 17.4
Post graduate 52 9.5
Total 546 100
International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277
– 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication
26
Table 2.3: Distribution of Respondents by Age
AGE Frequency Percentage%
15-20 129 23.6
21-25 190 34.8
26-30 112 20.5
31-35 70 12.8
36 and above 45 8.2
Total 546 100%
Source: Field Survey 2014
The table above shows that out of the total number of respondents, 244 (44.6%) were
male while 302 (55.3%) were female. That is to say that the female students formed the
majority. However it is equally obvious from the findings above that the postgraduate
students are the minority in library patronage 52(9.5%). The vast majorities of respondents
are between 15 and 25 years of age 319(58.4 %.).
Table 3: Shows part of materials that are mostly prone to users’ disruptive behaviours
(N =546)
Part of materials Frequency Percentage%
Cover 67 12.3
Contents 23 4.2
Summary 249 45.6
Introduction 384 70.3
Main text 451 82.6
Bibliography/ reference 50 9.2
Source: Field Survey 2014
From the above table, reports from the two libraries under study indicate in preference
the parts of library materials that are prone to damage as follows; Main text, Introduction and
Summary are 82.6, 70.3 and 45.6% respectively. While cover is 12.3%. An insignificant
percentage of the respondents reported damage on bibliography and content which are 9.2
and 4.2% respectively.
Table 4: Distribution by forms of disruptive behaviours among users of academic libraries
(N =546)
Forms of disruptive behaviour Agree Disagree
Freq. % Freq. %
Stealing/mutilation of library materials 502 92 44 8
Hiding of materials on different location 350 64.1 196 35.8
Loud conversations, including shouting 473 86.6 73 13.3
Using fake library card to enter the library 378 69.2 168 30.7
Eating, or drinking in the library 214 39.1 332 60.8
Taking or making cell phone calls in the library 253 46.3 293 53.6
Source: Field Survey 2014
International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277
– 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication
27
The table above presents the distribution of respondents on the forms of disruptive
behaviour among users in the two cases studied. The results as shown above identifies
various forms of disruptive behaviour according to users’ perception as follows: Loud
conversations, including shouting and noise making in the library:-86.6% of the respondents
agreed with this form of disruptive behaviour while 13.3% disagreed Stealing/mutilation of
library materials:-92% agreed while 8% disagreed, Using of fake library card to enter the
library:- 69.2% agreed while 30.7% disagreed. Hiding of materials in different locations:-
64.1% agreed while 35.8% disagreed, Minority of the users (46.3%)perceived Taking or
making cell phone calls in the library as disruptive behaviour while 39.2% saw eating or
drinking in the libraryas disruptive behaviour.
Table 5: Distribution by reason for Stealing/Mutilation of library materials (N=546)
Reasons Agree Disagree
Freq. % Freq. %
Scarcity of the material 230 42.1 316 58.8
Ignorance 58 10.6 488 89.3
unavailability of copier machine 287 52.5 259 47.4
Financial constraint 442 80.9 104 19
Lack of privilege to borrow 436 79.8 110 20.1
Source: Field Survey 2014
As highlighted above, the following were the reasons users gave for
Stealing/mutilating library materials. 80.9% for financial constraint and 79.8% for lack of
privilege to borrow. 52.5% for unavailability of copier machines while 42.1% and10.6% for
scarcity of materials and ignorance respectively.
Table 6: Distribution by reasons for hiding library materials (N =546)
Reasons Agree Disagree
Freq. % Freq. %
Scarcity of the material 242 44.1 304 55.6
Ignorance 68 12.5 478 87.5
unavailability of copier machine 270 49.5 242 44.3
selfishness 430 78.7 116 21.2
Lack of privilege to borrow 428 78.3 118 21.6
Source: Field Survey 2014
The above table presents the respondents’ reasons for hiding library materials away
from its proper places. The results indicate that 78.7% respondents agreed with the fact that
some users were selfish, 78.3% agreed that lack of privilege to borrow accounts for hiding
library materials. About half of the respondents (49.5%) believed it is due to unavailability of
copier machines, an insignificant 12.5% think it is due to ignorance while 44.1% believed
limited copies of library materials is responsible.
International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277
– 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication
28
Table 7: Distribution by reasons for Loud conversations, including shouting in the library
(N =546)
Reasons Agree Disagree
Freq. % Freq. %
Lack/poor orientation 356 65.2 190 55.6
Ignorance 420 76.9 126 34.7
Indiscipline 456 83.5 90 16.5
Group discussion 521 95.4 25 4.5
Hard of hearing 110 20.1 436 79.8
Source: Field Survey 2014
The table above presents distribution of respondents on why users make noise or shout
in the library ; group discussion 95.4% , indiscipline 83.5%, ignorance 76.9%, lack/poor
orientation 65.2%,
Table 8: Distribution by reasons for Using fake library card to enter the library(N =546)
Reasons Agree Disagree
Freq. % Freq. %
loss of original library card 465 85.1 81 14.8
Financial constraint 345 63.1 201 36.8
Ignorance 97 17.7 449 82.2
Source: Field Survey 2014
From the table above, the following are the reasons why users indulge in the use of
fake library cards to enter the library: Loss of original library card 85.1% and Financial
constraint 63.1%. However, only a minority of the respondents (17.7%) saw ignorance as a
factor.
Table 9: Distribution by reasons for eating and drinking in the library (N =546)
Reasons Agree Disagree
Freq. % Freq. %
Ignorance 259 47.4 287 52.5
Indiscipline 76 13.9 470 16.5
To keep awake 521 95.4 25 4.5
Source: Field Survey 2014
The above table highlights the reasons why library users eat or drink in the library.
The results indicate that a whopping majority precisely 95.4%are of the opinion that users eat
to keep awake, close to half of the respondents (47.4%) agreed that users eat or drink because
they are ignorant of the hazard while just 13.9% think it is due to indiscipline.
International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277
– 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication
29
Table 10: Distribution by reasons for Taking or making cell phone calls in the library
(N =546)
Reasons Agree Disagree
Freq. % Freq. %
Lack of orientation 436 79.8 110 20.1
Ignorance 411 75.2 135 24.7
Indiscipline 122 22.3 424 77.6
Source: Field Survey 2014
Table 10 above presents the reasons why library users take or make cell phone calls in
the library. 79.8% agreed that it is lack of orientation, 75.2% ignorance while minorities
(22.3%) of the respondents think it is an act of indiscipline.
SUMMARY OF FINDINGS
Certain findings were observed from the data analysis and unstructured interviews
and are summarized as follows;
• Almost all the respondents reported that they have come across mutilated materials at
one time or the other
• Reserved materials were highly mutilated because they were most generally used,
especially the main text followed by summary and introduction parts
• Prevalent among the various forms of disruptive behaviour identified were:
Stealing/mutilation of books, Loud conversations, fake library card usage and hiding
of library materials
• Financial constraint, lack of privilege to borrow and unavailability of copier machine
aided stealing and mutilation of library materials
• Selfishness, lack of privilege to borrow and unavailability of copier machine
propelled users to hide library materials
• Group discussion, indiscipline and ignorance, were discovered to be the main causes
of excessive noise in the library.
• It was discovered that users indulge in using fake library card because of financial
constraints in buying a new card after losing the original one.
• Mainly, users take to eating and drinking in the library to avoid dosing off while
reading.
• Ignorance and lack of orientation were discovered to be responsible for users making
and receiving phone calls in the library.
CONCLUSION AND RECOMMENDATIONS
Certain conclusions can be drawn from a careful analysis of the findings of this study.
Disruptive behaviour in academic libraries had been identified to have negative impact on the
users and the library. Therefore, a well organized orientation programmes should be
frequently put in place for library staff and users to curb this menace. In addition, act of
disruption should be entirely frown at in the library if all stake holders will not be failing in
their responsibilities. Also standing policies and punishments for culprits should be stated
while adequate security measure should be put in place to forestall future occurrences.
International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277
– 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication
30
Hence, to minimize the problem of disruptive behaviour of users in the library, the
researchers recommend as follows:
• Hard cover binding and regular cleaning of library materials is necessary to prevent
damage and over usage, thereby enhancing durability of library materials.
• Users’ education and staff orientation programmes should be regularly organized to
reduce ignorance.
• Exit control should be strengthened with detective barcode machine while porters
should be authorized to carry out body search on users.
• Copier machines should be provided within the library
• News bulletin with the warning that theft and mutilation are a punishable crime
should be pasted at conspicuous places in the library
• Regular and proper shelving and shelve reading should be encouraged to discover
hidden materials
• Applying stick rule to punish guilty users will prevent further occurrences.
• It is important for staff in the reading room to move round regularly so as to
monitor/supervise the overall activities of users.
• Annual inventory taking of library collection is advisable.
• Costs of repair or replacement of library property should be assessed and placed on
individuals and/or groups responsible for damaging or defacing such property.
REFERENCE
1. Blodgett, J. G., Granbois, D. H., & Walters, R. G. (1993). The effects of perceived
justice on complaints’ negative word-of-mouth behavior and repatronage intentions.
Journal of Retailing, 69: 399–428.
2. Blodgett, J. G., & Granbois, D. H. (1992). Toward an integrated conceptual model of
consumercomplaining behavior. Journal of Consumer Satisfaction, Dissatisfaction and
Complaining Behavior, 5: 93–103.
3. Hall, Christopher M. (2002). Managing the use of cellular phones in a small college
learning resource centre. The Reference Librarian 75/76: 173-180.
4. Ishizuka, Kathy. 2004. Rowdy teens get carded at library. School Library Journal
50(1): 16.
5. Jato, M. (2005). Causes and effects of delinquent behaviour in academic libraries
(Kenneth Dike Library as a case study). Owena Journal of Library and Information
Science 2(1): 25-34
6. McKechnie, Lynne (E.F.), French, Peggy K., Goodall, George R., Kipp, Margaret,
Lajoie, Darian, & Pecoskie, Jennifer M. (2004). Covered beverages now allowed:
Public libraries and book superstores. Canadian Journal of Information and Library
Science 28(3): 39-51.
7. Momodu, M.A. (2002). Delinquent readership in selected urban libraries in Nigeria.
Library Review 51 (9): 469-473.
8. Oyesiku F.A, Buraimo O, and Olusanya O.F. (2012) Disruptive Readers in Academic
Libraries: A Study of Olabisi Onabanjo University Library. Library Philosophy and
Practice. Available at http://unllib.unl.edu/LPP/oyesiku.htm
International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277
– 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication
31
9. Oyewusi, F.O., & Oyeboade, S.A. (2009). An empirical study of accessibility and use
of library resources by undergraduates in a Nigerian state university of technology.
Library Philosophy and Practice. http://unllib.unl.edu/LPP/oyewusi-oyeboade.htm
10. Robertson, Guy (2004). Risks, rules and enforcement: Enhancing child safety in the
library. Feliciter 50(3): 109-111.
11. Robertson, Guy(2003). Life at the cellular level: Dealing with wireless conversations in
libraries. Feliciter 49(2): 76-78.
12. Singh, J. (1990). A typology of consumer dissatisfaction response style. Journal of
Retailing, 66, 57–99
13. Taiwo, A.S. (1998).Some psycho-social and linguistic variables as determinants of
performance in English language in selected secondary schools in Kwara State,
Nigeria. An Med thesis. University of Ibadan.
14. Yogesh Bajpai (2013) Disruptive Behaviour of the Readers: A Study of Mekelle
University Main Campus Libraries: International Journal of Science and Research
(IJSR) 2:(11) 20-25 available at www.ijsr.net.

More Related Content

Viewers also liked

A study of corporatization of civic management (1)
A study of corporatization of civic management (1)A study of corporatization of civic management (1)
A study of corporatization of civic management (1)prj_publication
 
Failure of tube reduced in split air conditioner (2)
Failure of tube reduced in split air conditioner (2)Failure of tube reduced in split air conditioner (2)
Failure of tube reduced in split air conditioner (2)prj_publication
 
Management of working capital in national aluminium company 3 (1)
Management of working capital in national aluminium company 3 (1)Management of working capital in national aluminium company 3 (1)
Management of working capital in national aluminium company 3 (1)prj_publication
 
Cement industry in chennai
Cement industry in chennaiCement industry in chennai
Cement industry in chennaiprj_publication
 
Modern furniture classic
Modern furniture classicModern furniture classic
Modern furniture classicNur Firdaus
 
Inquiry on womens entrepreneurship in arar city saudi
Inquiry on womens entrepreneurship in arar city saudiInquiry on womens entrepreneurship in arar city saudi
Inquiry on womens entrepreneurship in arar city saudiprj_publication
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationBro Jayaram
 
Carbohydrate metabolism
Carbohydrate metabolismCarbohydrate metabolism
Carbohydrate metabolismSachith Gamage
 
Innovative lesson plan
Innovative  lesson planInnovative  lesson plan
Innovative lesson planajitha mukesh
 

Viewers also liked (14)

A study of corporatization of civic management (1)
A study of corporatization of civic management (1)A study of corporatization of civic management (1)
A study of corporatization of civic management (1)
 
Failure of tube reduced in split air conditioner (2)
Failure of tube reduced in split air conditioner (2)Failure of tube reduced in split air conditioner (2)
Failure of tube reduced in split air conditioner (2)
 
Management of working capital in national aluminium company 3 (1)
Management of working capital in national aluminium company 3 (1)Management of working capital in national aluminium company 3 (1)
Management of working capital in national aluminium company 3 (1)
 
Cement industry in chennai
Cement industry in chennaiCement industry in chennai
Cement industry in chennai
 
Modern furniture classic
Modern furniture classicModern furniture classic
Modern furniture classic
 
Merged document 148
Merged document 148Merged document 148
Merged document 148
 
Practica 2
Practica 2Practica 2
Practica 2
 
Inquiry on womens entrepreneurship in arar city saudi
Inquiry on womens entrepreneurship in arar city saudiInquiry on womens entrepreneurship in arar city saudi
Inquiry on womens entrepreneurship in arar city saudi
 
Three Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based AunthenticationThree Level Security System Using Image Based Aunthentication
Three Level Security System Using Image Based Aunthentication
 
Carbohydrate metabolism
Carbohydrate metabolismCarbohydrate metabolism
Carbohydrate metabolism
 
Tag traffic lite
Tag traffic liteTag traffic lite
Tag traffic lite
 
Innovative lesson plan
Innovative  lesson planInnovative  lesson plan
Innovative lesson plan
 
ашық сабақ 6 сынып
ашық сабақ  6 сыныпашық сабақ  6 сынып
ашық сабақ 6 сынып
 
FunBash!
FunBash!FunBash!
FunBash!
 

Similar to An appraisal of users’ attitudinal behaviour in

A Survey Of Reading And Internet Use Habits Among Undergraduate Students In S...
A Survey Of Reading And Internet Use Habits Among Undergraduate Students In S...A Survey Of Reading And Internet Use Habits Among Undergraduate Students In S...
A Survey Of Reading And Internet Use Habits Among Undergraduate Students In S...Brittany Allen
 
A survey of reading and internet use habits among undergraduate students in s...
A survey of reading and internet use habits among undergraduate students in s...A survey of reading and internet use habits among undergraduate students in s...
A survey of reading and internet use habits among undergraduate students in s...Alexander Decker
 
Question and enquire: taking a critical pathway to understand our users
Question and enquire: taking a critical pathway to understand our usersQuestion and enquire: taking a critical pathway to understand our users
Question and enquire: taking a critical pathway to understand our usersSheila Webber
 
Security and Crime Management in University Libraries in Nigeria
Security and Crime Management in University Libraries in NigeriaSecurity and Crime Management in University Libraries in Nigeria
Security and Crime Management in University Libraries in NigeriaIJRTEMJOURNAL
 
Issues and options in selected secondary school libraries in akure south loca...
Issues and options in selected secondary school libraries in akure south loca...Issues and options in selected secondary school libraries in akure south loca...
Issues and options in selected secondary school libraries in akure south loca...Alexander Decker
 
Ethics and legal issues 2003
Ethics and legal issues 2003Ethics and legal issues 2003
Ethics and legal issues 2003Johan Koren
 
Ethics and legal issues in school librarianship
Ethics and legal issues in school librarianshipEthics and legal issues in school librarianship
Ethics and legal issues in school librarianshipJohan Koren
 
Ethics & legal issues in school librarianship
Ethics & legal issues in school librarianshipEthics & legal issues in school librarianship
Ethics & legal issues in school librarianshipJohan Koren
 
Ethics and legal issues in school librarianship
Ethics and legal issues in school librarianshipEthics and legal issues in school librarianship
Ethics and legal issues in school librarianshipJohan Koren
 
Library Orientation 3 and its important in our
Library Orientation 3 and its important in ourLibrary Orientation 3 and its important in our
Library Orientation 3 and its important in ourDhariLynMacanasPaghu
 
A study on the information environment of national youth service corps member...
A study on the information environment of national youth service corps member...A study on the information environment of national youth service corps member...
A study on the information environment of national youth service corps member...Alexander Decker
 
Ethics and legal issues in school librarianship
Ethics and legal issues in school librarianshipEthics and legal issues in school librarianship
Ethics and legal issues in school librarianshipJohan Koren
 
User’s attitude to imposition of overdue fines by the library of catholic uni...
User’s attitude to imposition of overdue fines by the library of catholic uni...User’s attitude to imposition of overdue fines by the library of catholic uni...
User’s attitude to imposition of overdue fines by the library of catholic uni...Alexander Decker
 
Causes and effects of theft and mutilation of information
Causes and effects of theft and mutilation of informationCauses and effects of theft and mutilation of information
Causes and effects of theft and mutilation of informationAlexander Decker
 
Causes and effects of theft and mutilation of information
Causes and effects of theft and mutilation of informationCauses and effects of theft and mutilation of information
Causes and effects of theft and mutilation of informationAlexander Decker
 
Ethical and Legal Issues in School Media Librarianship
Ethical and Legal Issues in School Media LibrarianshipEthical and Legal Issues in School Media Librarianship
Ethical and Legal Issues in School Media LibrarianshipJohan Koren
 
A Study Of Photocopying Practice And Copyright Law In Nigeria Libraries Libr...
A Study Of Photocopying Practice And Copyright Law In Nigeria Libraries  Libr...A Study Of Photocopying Practice And Copyright Law In Nigeria Libraries  Libr...
A Study Of Photocopying Practice And Copyright Law In Nigeria Libraries Libr...James Heller
 
Mod9 censorship summary_gonzalesd
Mod9 censorship summary_gonzalesdMod9 censorship summary_gonzalesd
Mod9 censorship summary_gonzalesdDyan Gonzales
 
Marketing of library products and services in university power point for pre...
Marketing of library products and services in university  power point for pre...Marketing of library products and services in university  power point for pre...
Marketing of library products and services in university power point for pre...Ishola Clifford
 
Marketing of library products and services in university power point for pre...
Marketing of library products and services in university  power point for pre...Marketing of library products and services in university  power point for pre...
Marketing of library products and services in university power point for pre...Ishola Clifford
 

Similar to An appraisal of users’ attitudinal behaviour in (20)

A Survey Of Reading And Internet Use Habits Among Undergraduate Students In S...
A Survey Of Reading And Internet Use Habits Among Undergraduate Students In S...A Survey Of Reading And Internet Use Habits Among Undergraduate Students In S...
A Survey Of Reading And Internet Use Habits Among Undergraduate Students In S...
 
A survey of reading and internet use habits among undergraduate students in s...
A survey of reading and internet use habits among undergraduate students in s...A survey of reading and internet use habits among undergraduate students in s...
A survey of reading and internet use habits among undergraduate students in s...
 
Question and enquire: taking a critical pathway to understand our users
Question and enquire: taking a critical pathway to understand our usersQuestion and enquire: taking a critical pathway to understand our users
Question and enquire: taking a critical pathway to understand our users
 
Security and Crime Management in University Libraries in Nigeria
Security and Crime Management in University Libraries in NigeriaSecurity and Crime Management in University Libraries in Nigeria
Security and Crime Management in University Libraries in Nigeria
 
Issues and options in selected secondary school libraries in akure south loca...
Issues and options in selected secondary school libraries in akure south loca...Issues and options in selected secondary school libraries in akure south loca...
Issues and options in selected secondary school libraries in akure south loca...
 
Ethics and legal issues 2003
Ethics and legal issues 2003Ethics and legal issues 2003
Ethics and legal issues 2003
 
Ethics and legal issues in school librarianship
Ethics and legal issues in school librarianshipEthics and legal issues in school librarianship
Ethics and legal issues in school librarianship
 
Ethics & legal issues in school librarianship
Ethics & legal issues in school librarianshipEthics & legal issues in school librarianship
Ethics & legal issues in school librarianship
 
Ethics and legal issues in school librarianship
Ethics and legal issues in school librarianshipEthics and legal issues in school librarianship
Ethics and legal issues in school librarianship
 
Library Orientation 3 and its important in our
Library Orientation 3 and its important in ourLibrary Orientation 3 and its important in our
Library Orientation 3 and its important in our
 
A study on the information environment of national youth service corps member...
A study on the information environment of national youth service corps member...A study on the information environment of national youth service corps member...
A study on the information environment of national youth service corps member...
 
Ethics and legal issues in school librarianship
Ethics and legal issues in school librarianshipEthics and legal issues in school librarianship
Ethics and legal issues in school librarianship
 
User’s attitude to imposition of overdue fines by the library of catholic uni...
User’s attitude to imposition of overdue fines by the library of catholic uni...User’s attitude to imposition of overdue fines by the library of catholic uni...
User’s attitude to imposition of overdue fines by the library of catholic uni...
 
Causes and effects of theft and mutilation of information
Causes and effects of theft and mutilation of informationCauses and effects of theft and mutilation of information
Causes and effects of theft and mutilation of information
 
Causes and effects of theft and mutilation of information
Causes and effects of theft and mutilation of informationCauses and effects of theft and mutilation of information
Causes and effects of theft and mutilation of information
 
Ethical and Legal Issues in School Media Librarianship
Ethical and Legal Issues in School Media LibrarianshipEthical and Legal Issues in School Media Librarianship
Ethical and Legal Issues in School Media Librarianship
 
A Study Of Photocopying Practice And Copyright Law In Nigeria Libraries Libr...
A Study Of Photocopying Practice And Copyright Law In Nigeria Libraries  Libr...A Study Of Photocopying Practice And Copyright Law In Nigeria Libraries  Libr...
A Study Of Photocopying Practice And Copyright Law In Nigeria Libraries Libr...
 
Mod9 censorship summary_gonzalesd
Mod9 censorship summary_gonzalesdMod9 censorship summary_gonzalesd
Mod9 censorship summary_gonzalesd
 
Marketing of library products and services in university power point for pre...
Marketing of library products and services in university  power point for pre...Marketing of library products and services in university  power point for pre...
Marketing of library products and services in university power point for pre...
 
Marketing of library products and services in university power point for pre...
Marketing of library products and services in university  power point for pre...Marketing of library products and services in university  power point for pre...
Marketing of library products and services in university power point for pre...
 

More from prj_publication

International library management systems
International library management systemsInternational library management systems
International library management systemsprj_publication
 
Smes role in reduction of the unemployment problem in the area located in sa...
Smes  role in reduction of the unemployment problem in the area located in sa...Smes  role in reduction of the unemployment problem in the area located in sa...
Smes role in reduction of the unemployment problem in the area located in sa...prj_publication
 
Diabetes and allied diseases research in india – a
Diabetes and allied diseases research in india – aDiabetes and allied diseases research in india – a
Diabetes and allied diseases research in india – aprj_publication
 
Influences of child endorsers on the consumers
Influences of child endorsers on the consumersInfluences of child endorsers on the consumers
Influences of child endorsers on the consumersprj_publication
 
Connecting the ‘long tails’ of content and users
Connecting the ‘long tails’ of content and usersConnecting the ‘long tails’ of content and users
Connecting the ‘long tails’ of content and usersprj_publication
 
The role of green intellectual capital management in acquiring green competit...
The role of green intellectual capital management in acquiring green competit...The role of green intellectual capital management in acquiring green competit...
The role of green intellectual capital management in acquiring green competit...prj_publication
 
Awareness of digital library among library professional
Awareness of digital library among library professionalAwareness of digital library among library professional
Awareness of digital library among library professionalprj_publication
 
The study of scope and implementation of lean aspects
The study of scope and implementation of lean aspectsThe study of scope and implementation of lean aspects
The study of scope and implementation of lean aspectsprj_publication
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2prj_publication
 
Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...prj_publication
 
Prevalence and factors of smoking among the saudi youth in the northern borde...
Prevalence and factors of smoking among the saudi youth in the northern borde...Prevalence and factors of smoking among the saudi youth in the northern borde...
Prevalence and factors of smoking among the saudi youth in the northern borde...prj_publication
 
Impact of job attitude towards srf limited, trichy
Impact of job attitude towards srf limited, trichyImpact of job attitude towards srf limited, trichy
Impact of job attitude towards srf limited, trichyprj_publication
 
Impact of shg bank linkage programme on women shgs empowerment with reference...
Impact of shg bank linkage programme on women shgs empowerment with reference...Impact of shg bank linkage programme on women shgs empowerment with reference...
Impact of shg bank linkage programme on women shgs empowerment with reference...prj_publication
 
Service gap analysis of footwear retail outlets a study 2
Service gap analysis of footwear retail outlets  a study 2Service gap analysis of footwear retail outlets  a study 2
Service gap analysis of footwear retail outlets a study 2prj_publication
 
Emotional intelligence in teachers a tool to transform educational institutes...
Emotional intelligence in teachers a tool to transform educational institutes...Emotional intelligence in teachers a tool to transform educational institutes...
Emotional intelligence in teachers a tool to transform educational institutes...prj_publication
 
‘E aushadhi’ a drug warehouse management system
‘E aushadhi’ a drug warehouse management system‘E aushadhi’ a drug warehouse management system
‘E aushadhi’ a drug warehouse management systemprj_publication
 
Is the higher quality financial reporting improves csr investment efficiency ...
Is the higher quality financial reporting improves csr investment efficiency ...Is the higher quality financial reporting improves csr investment efficiency ...
Is the higher quality financial reporting improves csr investment efficiency ...prj_publication
 
Conjoint analysis a perfect link between
Conjoint analysis  a perfect link betweenConjoint analysis  a perfect link between
Conjoint analysis a perfect link betweenprj_publication
 
Conjoint analysis a perfect link between
Conjoint analysis  a perfect link betweenConjoint analysis  a perfect link between
Conjoint analysis a perfect link betweenprj_publication
 
Customs documentation for exim trade 3
Customs documentation for exim trade 3Customs documentation for exim trade 3
Customs documentation for exim trade 3prj_publication
 

More from prj_publication (20)

International library management systems
International library management systemsInternational library management systems
International library management systems
 
Smes role in reduction of the unemployment problem in the area located in sa...
Smes  role in reduction of the unemployment problem in the area located in sa...Smes  role in reduction of the unemployment problem in the area located in sa...
Smes role in reduction of the unemployment problem in the area located in sa...
 
Diabetes and allied diseases research in india – a
Diabetes and allied diseases research in india – aDiabetes and allied diseases research in india – a
Diabetes and allied diseases research in india – a
 
Influences of child endorsers on the consumers
Influences of child endorsers on the consumersInfluences of child endorsers on the consumers
Influences of child endorsers on the consumers
 
Connecting the ‘long tails’ of content and users
Connecting the ‘long tails’ of content and usersConnecting the ‘long tails’ of content and users
Connecting the ‘long tails’ of content and users
 
The role of green intellectual capital management in acquiring green competit...
The role of green intellectual capital management in acquiring green competit...The role of green intellectual capital management in acquiring green competit...
The role of green intellectual capital management in acquiring green competit...
 
Awareness of digital library among library professional
Awareness of digital library among library professionalAwareness of digital library among library professional
Awareness of digital library among library professional
 
The study of scope and implementation of lean aspects
The study of scope and implementation of lean aspectsThe study of scope and implementation of lean aspects
The study of scope and implementation of lean aspects
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...
 
Prevalence and factors of smoking among the saudi youth in the northern borde...
Prevalence and factors of smoking among the saudi youth in the northern borde...Prevalence and factors of smoking among the saudi youth in the northern borde...
Prevalence and factors of smoking among the saudi youth in the northern borde...
 
Impact of job attitude towards srf limited, trichy
Impact of job attitude towards srf limited, trichyImpact of job attitude towards srf limited, trichy
Impact of job attitude towards srf limited, trichy
 
Impact of shg bank linkage programme on women shgs empowerment with reference...
Impact of shg bank linkage programme on women shgs empowerment with reference...Impact of shg bank linkage programme on women shgs empowerment with reference...
Impact of shg bank linkage programme on women shgs empowerment with reference...
 
Service gap analysis of footwear retail outlets a study 2
Service gap analysis of footwear retail outlets  a study 2Service gap analysis of footwear retail outlets  a study 2
Service gap analysis of footwear retail outlets a study 2
 
Emotional intelligence in teachers a tool to transform educational institutes...
Emotional intelligence in teachers a tool to transform educational institutes...Emotional intelligence in teachers a tool to transform educational institutes...
Emotional intelligence in teachers a tool to transform educational institutes...
 
‘E aushadhi’ a drug warehouse management system
‘E aushadhi’ a drug warehouse management system‘E aushadhi’ a drug warehouse management system
‘E aushadhi’ a drug warehouse management system
 
Is the higher quality financial reporting improves csr investment efficiency ...
Is the higher quality financial reporting improves csr investment efficiency ...Is the higher quality financial reporting improves csr investment efficiency ...
Is the higher quality financial reporting improves csr investment efficiency ...
 
Conjoint analysis a perfect link between
Conjoint analysis  a perfect link betweenConjoint analysis  a perfect link between
Conjoint analysis a perfect link between
 
Conjoint analysis a perfect link between
Conjoint analysis  a perfect link betweenConjoint analysis  a perfect link between
Conjoint analysis a perfect link between
 
Customs documentation for exim trade 3
Customs documentation for exim trade 3Customs documentation for exim trade 3
Customs documentation for exim trade 3
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

An appraisal of users’ attitudinal behaviour in

  • 1. International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277 – 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication 20 AN APPRAISAL OF USERS’ ATTITUDINAL BEHAVIOUR IN ACADEMIC LIBRARY: CASE STUDY OF TWO SELECTED UNIVERSITY LIBRARIES 1 ARINOLA, Adeola Adesoji, 2 OYETOLA, Solomon Olusegun, 3 ODUNOLA, Oluwole Akanmu, 4 ADEKUNJO Olalekan Abraham 1, 2, 3 Olusegun Oke Library, Ladoke Akintola University of Technology, Ogbomoso, Oyo State, Nigeria. 4 Kenneth Dike Library, University of Ibadan, Oyo State, Nigeria ABSTRACT Readers’ attitudinal behaviour in the library is highly worrisome, the need for libraries to develop strategies in curbbing the menace as well as putting better security measures in libraries is discussed. The survey research method was used for the study. The instruments used for collecting data based on the research objectives were the questionnaire, supplemented by unstructured interview and observations.Simple random sampling technique was used to select 546 respondents from the two university libraries. The data was analyzed using frequency counts, percentages and tables. The result of the study revealed different forms of disruptive behaviour among academic library users.among which are: Stealing/mutilation of library materials, hiding of materials on different location, using fake library card to enter the library, eatingordrinking in the library as well astaking or making cell phone calls in the library. Scarcities of library materials, Ignorance, unavailability of copier machine were discovered as the major factors responsible for these attitudinal behaviours. The paper concludes that library managements should organize systematic training and orientation for library users and better security facilitiesshould be put in place to safeguard library properties. Key Words: Library User, Behaviour, Disruptive, Attitude, Academic Library. INTERNATIONAL JOURNAL OF LIBRARY AND INFORMATION SCIENCE RESEARCH AND DEVELOPMENT (IJLISRD) ISSN: 2277 – 3541 (Print), ISSN: 2277 – 3673 (Online) Volume 3, Issue 2, April-June (2014), pp. 20-31 © PRJ: www.prjpublication.com/ijlisrd.asp Journal Impact Factor (2014): 5.1680 (Calculated by GISI), www.jifactor.com IJLISRD © PRJ PUBLICATION
  • 2. International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277 – 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication 21 INTRODUCTION In any organization, weather big or small it is pertinent to know that peoples’attitudes and behaviours are bound to differ. While some behaviours are acceptable and conventional others may be atypical or disruptive. Attitudes are "inclinations and feelings, prejudices or bias, preconceived notions, ideas, fears and convictions about any specific topic" (Taiwo, 1998). According to All port (1935), attitude "is a mental and neutral state of readiness organized through experience exerting a directive or dynamic influences upon individual's response to all objects or situations with which it is associated." Blodgett, Granbois, and Walters (1993) believe there is no single,comprehensive theory of complaining behavior. Majority of the early studies were based on descriptive studies and emphasized interpersonal influences. Demographic variables, including age, income, occupation, and social classes, have been used for this purpose. A typical example of this perspective is ‘‘complainers tend to earn higher incomes, have more education, have professional jobs, and are younger’’ (Singh, 1990). The complaining behavior was further subdivided into ‘‘exit,’’ ‘‘negative word-of- mouth,’’ ‘‘voice (redress-seeking) complaints,’’ and ‘‘third-party complaints.’’ The definitions of Blodgett and Granbois (1992) and Singh (1989) were applied to the library situation as follows: ‘‘exit’’ is an intention, to never again patronise the offending library; ‘‘negative word-of-mouth’’ means informing others about one’s dissatisfaction (i.e., complaints about the library and/or the service to friends or relatives); ‘‘voice’’ is a complaint directed toward the library; and ‘‘third-party complaints’’ are formal complaints directed toward agencies not directly involved in the exchange relationship. In the public library situation, unlike in the case of profit making organizations, it is difficult to seek redress, or replace, refund, or compensate the goods or services through voice. Library users can use two types of voice: voice their complaint directly to the library staff at the time of dissatisfaction or voice their complaint indirectly using cards, e-mail, and similar means at a later time The library according to Collier’s Encyclopedia (2000), is considered as a ‘communication centre’. The mission of libraries is to make the contents of the world’s accumulating literacy, intellectual and cultural heritage available quickly and inexpensively. The library fulfills its mission by collecting, organizing and preserving information and using this information to satisfy the needs of the users through its services. However,disruptive behaviour of library users is a problem of libraries all over the world, The most common among are theft and mutilation of materials including books, periodicals, documents, journals, computers and so on. The University Libraries will take responsibility for making sure users are behaving in an appropriate manner during their attendance in the Library. A disruptive individual is someone who is rude, uncivil, or creates a disturbance which disrupts, distracts or otherwise hinders other individuals (staff or users) engaged in or supporting academic pursuits and/or library operations. Examples of such disruptive behaviour include but are not limited to: shouting, playing, running, playing music and inappropriate use of library equipment and resources. Additionally, any criminal behaviour (e.g. indecent exposure of the body or fighting) will be treated as disruptive behaviour. Disruptive behaviour may also include threats (veiled or explicit) to library employees, students, faculty staff, and public users. Behaviour like these may result in the loss of some library privileges Scandalous behaviours such as theft and mutilation, hiding library materials, refusal to return over due borrowed materials, drinking and eating in the library, among others have become a common occurrence in academic library, if this is not checked, it will lead to serious drought of information materials in the library (Jato, 2005)
  • 3. International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277 – 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication 22 Just like all other organizations, academic libraries are regulated by rules and regulations that are established to protect the rights, interests and safety of library users and staff. Rules of conduct are normally posted in libraries, often near the circulation desk or in places where they can be easily accessed and viewed by users. These documents typically contain policies that address issues such as: the use of disruptive, abusive or harassing language or behaviour; respect and care for library property and materials; consumption of food and beverages; safety and supervision of children; use of cell phones etc. Appropriate library conduct includes activities such as reading, studying, properly using library materials and computers in a manner which does not interfere with other users. According to Momodu (2002), academic libraries have been faced with varying degrees of criminal behaviour in the use of their resources especially materials and to some extent manpower. Examples of disruptive or unacceptable behaviours in academic libraries include, but are not limited to: • Playing audio devices in manners that others can hear it • Talking loudly, making noise, or engaging in any type of conduct which reasonably can be expected to disturb and interfere with the use of the Library by other persons • Interfering with another person’s use of the Library or with Library personnel’s performance of their duties • Disregarding posted rules regarding cell phone use • Behaving or speaking in a way that is offensive to others • Damaging Library property • Stealing Library material • Using obscene or abusive language or gestures • Distributing and/or posting of unauthorized materials inside the library • Failing to wear proper attire, including shoes and shirt • Disregarding posted rules regarding food and beverages • Disregarding posted opening and closing times • Violating the library’s rules for acceptable use of the Internet and public computers • Leaving an underage child unattended to • Using alcohol or illegal drugs or coming to the library intoxicated • Filming or photographing users within the library without the permission of the Branch Librarian and users • Engaging in sexual acts Disruptive and unacceptable behaviour includes all activities, as determined by Library management, which interferes with the rights of other users of the Library, disrupts the normal functioning of the Library and which is in violation of Library Policies and other laws. In any situation where the library management feels that the safety and security of library users, staff or property are threatened, they may take every appropriate action to deal with the situation, including, but not limited to, calling the security for assistance. Library staff may ask a person to leave the library premises with or without prior warning, depending on the seriousness of the violation. Further suspension of library privileges may also be applicable. Furthermore, The Library management reserves the right to:
  • 4. International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277 – 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication 23 • Inspect all Library materials, users’ handbags, briefcases, purses, luggage, and other similar items. Library staff may also ask users to leave bags and other items at the library desk until the library user is ready to leave. • Require anyone who engages in disruptive behavior to leave the premises. Anyone asked to leave the Library is not allowed to loiter in the entryway, parking lot or lawn areas. • Immediately notify the authority of unlawful activities of any user. Theft and mutilation of books are certainly not new developments of our time. Such acts can be traced as far back as 539BC in Egypt when the Persian conquerors removed rolls of papyri from the Library of Ramses II around 41BC(Bajpai,2013). Another major disruptive behaviour of user recently notice is cell phone use in libraries, library staff members are now faced with the problem of whether or not to enforce an out-right ban (Hall, 2002; Knecht, 2003). Safety, supervision and behaviour of children in libraries have been subjected to lengthy discussion, some school of thoughtsare of the opinion that strict discipline be enforced to ensure that children are not put at risk and that parents should refrain from leaving their children unsupervised,thereby turning the library to “child-storage depot” (Robertson, 2004).The behaviour of adolescents in public libraries has also become worrisome, diverse approaches to check disruptive behaviour have been presented(Ishizuka, 2004). However, McKechnie et al, (2004) found out that library patrons frequently violated library rules and regulations by engaging in behaviours which disrupted the use of the library by others. In addition, staffs were often discovered to encourage this behaviour. Background Informationof Study Areas The University Library of Ladoke Akintola University of Technology Ogbomoso was established in July 1990 as one of the academic unit in the university. Up to date, it has been performing its academic roles to support learning, teaching and research. The library has witnessed lots of growth in term of size of building, collection of materials, equipment, staffing and other changes. From July 1990 till February 1999, the library occupied a small space in a building now known as Department of Statistics. At inception, all the staff always sat in a common and open room without reading tables, books and other conveniences. The library was later partitioned and equipped with 82 seats in 1992 and was later moved to its present site in February 1999(Afolabi, 2003). The library was renamed after the pioneer Vice Chancellor “Olusegun Ladimeji Oke’ on April 23, 2010. The university as well as the library has finally put its feet on the sound of time. Presently Olusegun Oke Library consists of the main library and six Faculty Libraries namely; Pure and Applied Sciences, Engineering, Environmental sciences, Agricultural sciences, Basic Medicals sciences, and Management Sciences under its administration. In the last 20 years the library collections have grown to over 76,000 volumes excluding journals, which are over 3000. The library operates a loan policy of two books per undergraduate students and three books for postgraduate students and lecturers for two weeks. The university library has over 35,000 registered users offering both full and part time courses as at the time of carrying out this study. The main library now operates extended hour services especially during examination periods. Kenneth Dike Library, University of Ibadan was established in 1948 at the inception of the University College Ibadan. The Library used to be known as the University Library
  • 5. International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277 – 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication 24 until 1988 when it was renamed Kenneth Dike Library (KDL) in honour of the first African vice-chancellor, Late Professor Kenneth Onwuka Dike. It operates a library system that comprises of Departmental and Faculty libraries. The Library was established primarily, to serve the interest of the university community, although Staff and Students of other universities may be permitted to use the library resources for short periods, after having obtained the permission from the University Librarian. Presently, Kenneth Dike Library can boast of over one million copies of books and about 6000 journal titles. The library has over 70,000 populations of registered users. As against Olusegun Oke, Kenneth Dike library operates a loan policy of four books per undergraduate students for 2 weeks and ten (10) books for postgraduates’ students and staff for four weeks with a fine of N5 per one day of overdue. Oyewusi and Oyeboade (2009) discussed the importance of good collections as a pointer to the need for safety and security for those collections. In their view, access to quality collections reinvigorates the mission of the university. The digitization of local content materials was in progress at Kenneth Dike library as at the time of carrying out this research. STATEMENT OF THE PROBLEM Theft and mutilation of library materials is also a major problem in both Olusegun Oke Library and Kenneth Dike Library as it is in libraries all over the world. Also worrisome is the behaviour of users in the library, dishonest employees and persons who are willing to purchase stolen books. Hence this study aims to investigate and find ways to stop or minimize these problems and as a result make the library effective and essential. However, it is the belief that the results and recommendations from this study would assist other academic libraries in curbing this menace. OBJECTIVE OF THE STUDY The general aim of this study is to investigate the experiences of Olusegun-Oke Library, and Kenneth Dike Library with regards to disruptive behaviours of readers. The specific objectives includes 1. To find out the parts of library materials that are mostly prone to users’ disruption. 2. To find out the forms of disruptive behaviours prevalent among users of academic libraries. 3. To examine the reasons why users exhibit such identified disruptive behaviours, 4. To suggest appropriate remedies to these problems in majority of the libraries. RESEARCH METHODOLOGY Survey research technique was adopted for the study. The instrument used for collecting data based on the research objectives was the questionnaire, supplemented by unstructured interview and observation. The observation enabled the investigators to know the type of services given in the library, and to check these verity of the damage to library
  • 6. International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277 – 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication 25 materials. 600 copies of the questionnaire were distributed to the respondents and 546 copies were returned and found suitable for analysis at 91% response rate. The questionnaire was divided into parts, section A to E. Section A had six (6) questions which dealt with the biodata of respondents while section B dealt with the forms of disruptive behaviours prevalent among users of academic libraries. Section C dealt with the types of library materials that are mostly prone to users’ disruption. Section D examines the reasons why users exhibit such identified disruptive behaviours and section E looked at the best solution and remedies appropriate for the majority of libraries.Data was analyzed using percentages and frequency. The study was carried out between September, 2013 and March, 2014. Data Analysis and Discussion of Findings Table 1: Size of Respondent Name of Library Distributed Returned Frequency Frequency Percentage% Olusegun-Oke Library, LAUTECH 300 276 92 Kenneth Dike Library, U.I 300 270 90 Total 600 546 91 Source: Field Survey 2014 The table above shows that the questionnaire was evenly distributed between the libraries understudy Demographic Characteristics of Respondents(N =546) Table 2.1: Distribution of Respondents by Gender GENDER Frequency Percentage% Male 244 44.6 female 302 55.3 Total 546 100 Table 2.2: Distribution of Respondents by Level LEVEL Frequency Percentage% 100 95 17.4 200 102 18.7 300 96 17.6 400 106 19.4 500 95 17.4 Post graduate 52 9.5 Total 546 100
  • 7. International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277 – 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication 26 Table 2.3: Distribution of Respondents by Age AGE Frequency Percentage% 15-20 129 23.6 21-25 190 34.8 26-30 112 20.5 31-35 70 12.8 36 and above 45 8.2 Total 546 100% Source: Field Survey 2014 The table above shows that out of the total number of respondents, 244 (44.6%) were male while 302 (55.3%) were female. That is to say that the female students formed the majority. However it is equally obvious from the findings above that the postgraduate students are the minority in library patronage 52(9.5%). The vast majorities of respondents are between 15 and 25 years of age 319(58.4 %.). Table 3: Shows part of materials that are mostly prone to users’ disruptive behaviours (N =546) Part of materials Frequency Percentage% Cover 67 12.3 Contents 23 4.2 Summary 249 45.6 Introduction 384 70.3 Main text 451 82.6 Bibliography/ reference 50 9.2 Source: Field Survey 2014 From the above table, reports from the two libraries under study indicate in preference the parts of library materials that are prone to damage as follows; Main text, Introduction and Summary are 82.6, 70.3 and 45.6% respectively. While cover is 12.3%. An insignificant percentage of the respondents reported damage on bibliography and content which are 9.2 and 4.2% respectively. Table 4: Distribution by forms of disruptive behaviours among users of academic libraries (N =546) Forms of disruptive behaviour Agree Disagree Freq. % Freq. % Stealing/mutilation of library materials 502 92 44 8 Hiding of materials on different location 350 64.1 196 35.8 Loud conversations, including shouting 473 86.6 73 13.3 Using fake library card to enter the library 378 69.2 168 30.7 Eating, or drinking in the library 214 39.1 332 60.8 Taking or making cell phone calls in the library 253 46.3 293 53.6 Source: Field Survey 2014
  • 8. International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277 – 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication 27 The table above presents the distribution of respondents on the forms of disruptive behaviour among users in the two cases studied. The results as shown above identifies various forms of disruptive behaviour according to users’ perception as follows: Loud conversations, including shouting and noise making in the library:-86.6% of the respondents agreed with this form of disruptive behaviour while 13.3% disagreed Stealing/mutilation of library materials:-92% agreed while 8% disagreed, Using of fake library card to enter the library:- 69.2% agreed while 30.7% disagreed. Hiding of materials in different locations:- 64.1% agreed while 35.8% disagreed, Minority of the users (46.3%)perceived Taking or making cell phone calls in the library as disruptive behaviour while 39.2% saw eating or drinking in the libraryas disruptive behaviour. Table 5: Distribution by reason for Stealing/Mutilation of library materials (N=546) Reasons Agree Disagree Freq. % Freq. % Scarcity of the material 230 42.1 316 58.8 Ignorance 58 10.6 488 89.3 unavailability of copier machine 287 52.5 259 47.4 Financial constraint 442 80.9 104 19 Lack of privilege to borrow 436 79.8 110 20.1 Source: Field Survey 2014 As highlighted above, the following were the reasons users gave for Stealing/mutilating library materials. 80.9% for financial constraint and 79.8% for lack of privilege to borrow. 52.5% for unavailability of copier machines while 42.1% and10.6% for scarcity of materials and ignorance respectively. Table 6: Distribution by reasons for hiding library materials (N =546) Reasons Agree Disagree Freq. % Freq. % Scarcity of the material 242 44.1 304 55.6 Ignorance 68 12.5 478 87.5 unavailability of copier machine 270 49.5 242 44.3 selfishness 430 78.7 116 21.2 Lack of privilege to borrow 428 78.3 118 21.6 Source: Field Survey 2014 The above table presents the respondents’ reasons for hiding library materials away from its proper places. The results indicate that 78.7% respondents agreed with the fact that some users were selfish, 78.3% agreed that lack of privilege to borrow accounts for hiding library materials. About half of the respondents (49.5%) believed it is due to unavailability of copier machines, an insignificant 12.5% think it is due to ignorance while 44.1% believed limited copies of library materials is responsible.
  • 9. International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277 – 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication 28 Table 7: Distribution by reasons for Loud conversations, including shouting in the library (N =546) Reasons Agree Disagree Freq. % Freq. % Lack/poor orientation 356 65.2 190 55.6 Ignorance 420 76.9 126 34.7 Indiscipline 456 83.5 90 16.5 Group discussion 521 95.4 25 4.5 Hard of hearing 110 20.1 436 79.8 Source: Field Survey 2014 The table above presents distribution of respondents on why users make noise or shout in the library ; group discussion 95.4% , indiscipline 83.5%, ignorance 76.9%, lack/poor orientation 65.2%, Table 8: Distribution by reasons for Using fake library card to enter the library(N =546) Reasons Agree Disagree Freq. % Freq. % loss of original library card 465 85.1 81 14.8 Financial constraint 345 63.1 201 36.8 Ignorance 97 17.7 449 82.2 Source: Field Survey 2014 From the table above, the following are the reasons why users indulge in the use of fake library cards to enter the library: Loss of original library card 85.1% and Financial constraint 63.1%. However, only a minority of the respondents (17.7%) saw ignorance as a factor. Table 9: Distribution by reasons for eating and drinking in the library (N =546) Reasons Agree Disagree Freq. % Freq. % Ignorance 259 47.4 287 52.5 Indiscipline 76 13.9 470 16.5 To keep awake 521 95.4 25 4.5 Source: Field Survey 2014 The above table highlights the reasons why library users eat or drink in the library. The results indicate that a whopping majority precisely 95.4%are of the opinion that users eat to keep awake, close to half of the respondents (47.4%) agreed that users eat or drink because they are ignorant of the hazard while just 13.9% think it is due to indiscipline.
  • 10. International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277 – 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication 29 Table 10: Distribution by reasons for Taking or making cell phone calls in the library (N =546) Reasons Agree Disagree Freq. % Freq. % Lack of orientation 436 79.8 110 20.1 Ignorance 411 75.2 135 24.7 Indiscipline 122 22.3 424 77.6 Source: Field Survey 2014 Table 10 above presents the reasons why library users take or make cell phone calls in the library. 79.8% agreed that it is lack of orientation, 75.2% ignorance while minorities (22.3%) of the respondents think it is an act of indiscipline. SUMMARY OF FINDINGS Certain findings were observed from the data analysis and unstructured interviews and are summarized as follows; • Almost all the respondents reported that they have come across mutilated materials at one time or the other • Reserved materials were highly mutilated because they were most generally used, especially the main text followed by summary and introduction parts • Prevalent among the various forms of disruptive behaviour identified were: Stealing/mutilation of books, Loud conversations, fake library card usage and hiding of library materials • Financial constraint, lack of privilege to borrow and unavailability of copier machine aided stealing and mutilation of library materials • Selfishness, lack of privilege to borrow and unavailability of copier machine propelled users to hide library materials • Group discussion, indiscipline and ignorance, were discovered to be the main causes of excessive noise in the library. • It was discovered that users indulge in using fake library card because of financial constraints in buying a new card after losing the original one. • Mainly, users take to eating and drinking in the library to avoid dosing off while reading. • Ignorance and lack of orientation were discovered to be responsible for users making and receiving phone calls in the library. CONCLUSION AND RECOMMENDATIONS Certain conclusions can be drawn from a careful analysis of the findings of this study. Disruptive behaviour in academic libraries had been identified to have negative impact on the users and the library. Therefore, a well organized orientation programmes should be frequently put in place for library staff and users to curb this menace. In addition, act of disruption should be entirely frown at in the library if all stake holders will not be failing in their responsibilities. Also standing policies and punishments for culprits should be stated while adequate security measure should be put in place to forestall future occurrences.
  • 11. International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277 – 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication 30 Hence, to minimize the problem of disruptive behaviour of users in the library, the researchers recommend as follows: • Hard cover binding and regular cleaning of library materials is necessary to prevent damage and over usage, thereby enhancing durability of library materials. • Users’ education and staff orientation programmes should be regularly organized to reduce ignorance. • Exit control should be strengthened with detective barcode machine while porters should be authorized to carry out body search on users. • Copier machines should be provided within the library • News bulletin with the warning that theft and mutilation are a punishable crime should be pasted at conspicuous places in the library • Regular and proper shelving and shelve reading should be encouraged to discover hidden materials • Applying stick rule to punish guilty users will prevent further occurrences. • It is important for staff in the reading room to move round regularly so as to monitor/supervise the overall activities of users. • Annual inventory taking of library collection is advisable. • Costs of repair or replacement of library property should be assessed and placed on individuals and/or groups responsible for damaging or defacing such property. REFERENCE 1. Blodgett, J. G., Granbois, D. H., & Walters, R. G. (1993). The effects of perceived justice on complaints’ negative word-of-mouth behavior and repatronage intentions. Journal of Retailing, 69: 399–428. 2. Blodgett, J. G., & Granbois, D. H. (1992). Toward an integrated conceptual model of consumercomplaining behavior. Journal of Consumer Satisfaction, Dissatisfaction and Complaining Behavior, 5: 93–103. 3. Hall, Christopher M. (2002). Managing the use of cellular phones in a small college learning resource centre. The Reference Librarian 75/76: 173-180. 4. Ishizuka, Kathy. 2004. Rowdy teens get carded at library. School Library Journal 50(1): 16. 5. Jato, M. (2005). Causes and effects of delinquent behaviour in academic libraries (Kenneth Dike Library as a case study). Owena Journal of Library and Information Science 2(1): 25-34 6. McKechnie, Lynne (E.F.), French, Peggy K., Goodall, George R., Kipp, Margaret, Lajoie, Darian, & Pecoskie, Jennifer M. (2004). Covered beverages now allowed: Public libraries and book superstores. Canadian Journal of Information and Library Science 28(3): 39-51. 7. Momodu, M.A. (2002). Delinquent readership in selected urban libraries in Nigeria. Library Review 51 (9): 469-473. 8. Oyesiku F.A, Buraimo O, and Olusanya O.F. (2012) Disruptive Readers in Academic Libraries: A Study of Olabisi Onabanjo University Library. Library Philosophy and Practice. Available at http://unllib.unl.edu/LPP/oyesiku.htm
  • 12. International Journal of Library and Information Science Research and Development (IJLISRD), ISSN: 2277 – 3541 (Print), ISSN: 2277 – 3673 (Online) April-June (2014), pp. 20-31, © PRJ Publication 31 9. Oyewusi, F.O., & Oyeboade, S.A. (2009). An empirical study of accessibility and use of library resources by undergraduates in a Nigerian state university of technology. Library Philosophy and Practice. http://unllib.unl.edu/LPP/oyewusi-oyeboade.htm 10. Robertson, Guy (2004). Risks, rules and enforcement: Enhancing child safety in the library. Feliciter 50(3): 109-111. 11. Robertson, Guy(2003). Life at the cellular level: Dealing with wireless conversations in libraries. Feliciter 49(2): 76-78. 12. Singh, J. (1990). A typology of consumer dissatisfaction response style. Journal of Retailing, 66, 57–99 13. Taiwo, A.S. (1998).Some psycho-social and linguistic variables as determinants of performance in English language in selected secondary schools in Kwara State, Nigeria. An Med thesis. University of Ibadan. 14. Yogesh Bajpai (2013) Disruptive Behaviour of the Readers: A Study of Mekelle University Main Campus Libraries: International Journal of Science and Research (IJSR) 2:(11) 20-25 available at www.ijsr.net.