MANAGEMENT OF LIBRARY AND INFORMATION CENTRES IN THE ERA OF GLOBAL INSECURITY A FESTSCHRIFT IN HONOUR OF PROF. (SIR) MATTHEWIDOWU AJIBERO (KSM) UNIVERSITY OF IBADAN LIBRARY MANAGEMENT OF LIBRARY AND INFORMATION CENTRES IN THE ERA OF GLOBAL INSECURITY A Festschrift in Honour o f PROFESSOR MATTHEW IDOWU AJIBERO Editors Professor Abdulwahab Olanrewaju Issa Dr. Abdulsalam Abiodun Salman Dr. Tunde Kamal Omopupa Dr. Lambs Kayode Mustapha UNIVERSITY OF IBADAN LIBRARY Management of Library and Information Centres in the Era of Global Insecurity ii Department of Library and Information Science, Faculty of Communication and Information Sciences, University of llorin, llorin, Nigeria. Copyright © 2020 Management of Library and Information Centres in the Era of Global Insecurity A Festschrift in Honour o f PROFESSOR MATTHEW IDOWU AJIBERO First Published in 2020 By Tim-Sal & Bim Publishing Ltd. All rights reserved. No part o f this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission o f the authors: ISBN: 97 8-978-57021 - 9 - 4 Printed in Nigeria b y TIM-SAL & BIM PUB LTD. llorin Tel : 08077787630 UNIVERSITY OF IBADAN LIBRARY Management of Library and Information Centres in the Era of Global Insecurity iii TABLE OF CONTENT Page Table of Contents................................................................................................................................... iii Editorial Advisory Committee Membership..................................................................................... v Notes on Contributors........................................................................................................................... vi Preface............................................................. ix Foreword................................................................................................................................................. xi CONTENTS Deploying ICT to Curb Vandalisation of Library Resources in Nigerian Libraries — Dr. Taofuf M. SALISU, & Esther Oluwaseyi JOSEPHS.................................................. 1 Library and Information Services for Conflict Management in Nigeria — Professor Kenneth Ivo Ngozi NWALO............................................................................... 12 Use of ICT for Securing Library and its Resources Against Vandalism in the Era of Global Insecurity — Dr. Juliana O. AKIDI & Dr. Ugochukwu D. 1MEREMBA................ 24 Motivational Factors and Perception as Determinants of Students' Interest in Modern Cataloguing and Classification Practical Sessions in Tertiary Institutions in Kwara State — Dr. Abdulsalam Abiodun SALMAN, Dr. Abdulmumin ISAH, Rasheed Olansile RAHEEM &Atanda Saliu SAMBO................................................................ ....................... 44 Towards Utilization of ICT for Securing Library Resources Against Vandalism in the Era of Global Insecurity - Dr. A. L. MBASHIR, Comfort O. ALABI, Sani Job ONEKUTU & Fatima Momoh JIMOH................................................................................. ........................ ........ 71 Sustainability of Library and Information Resources Through Information and Communication Technology Application in the Era of Global Insecurity — Dr. Abdulganiy Okanla AHMED & Mohammed Musa SABA..~.................................... 86 Use of ICT for Securing Libraries and Information Resources Against Vandalism in University Libraries in the Era of Global Insecurity — Adenike Damilola OMOIKE & Daniel Olusegun IKEGUNE......................................... 103 Now and Future of Libraries: The Necessity to Equip Librarians with Cybersecurity Skills — Murtala Ismail ADAKAWA, Zam'a Muhammad AL-HASSAN & Dr. Musa A. AUYO............................................................................................................. 118 Vandalism in Academic Libraries: Technologies to the Rescue — Dr. Celina Jumtnai NONGO, Dr. Rebecca Chidinma OJOBOR, & Securing Library Books Against Theft and Mutilation in University of Uyo through Electronic Detection Systems — Kathryn J. PHILIP & IDOGBE I. M........ ............................ 151 UNIVERSITY OF IBADAN LIBRARY Management of Library and Information Centies in the Era of Global Insecurity i v Roles of Libraries and Information Centres in Curbing Global Insecurity in the 21s1 Century: Nigeria Experience — Dr. Musediq Tunji BASHORUN, Dr. Kubir Abubakar MUHAMMAD, R afiat Buko la BASHORUN & Comfort Olushola ADEN I RAN............................................................... 163 Implementation of Crowd Sourcing Technologies: A Catalyst for Transforming Library Operations in the Era of Digital Collaboration Auwalu Dansalc YAHAYA & Muntaka MUHAMMAD.............................................. 178 Strengthening Global Peace and Security through Information and Communication Technologies: The Nigerian Perspective — Professor S O. UWAIFO........................................................................................................ 191 Adoption and Use of Radio Frequency Identification Technology for Securing Information Resources Against Theft and Vandalism in Nigerian University' Libraries — Dr. Shuaib Agboola OI.ARONGBE, Ismail Olatunji ADEYEMI & Abiodun Charles ADEOYE......... :......................................................................................................................... 202 Digital Scholarship Practices in Nigerian University Libraries — Dr. Ezra Shiloba GBAJE, Dr. Sarah Dauda YANI & Im oisili Ojeime ODIGIE.......... 215 Information Security Awareness Policy on Compliant Behaviour of Information Users in Academic Libraries — Dr. Joshua Onaade OJO, Augustine Adeoye BAMGBOSE & Sarah GBENU................ 227 * Public Library and Social Media as Tools for the Promotion of National Unity and Security — Comfort Olushola ADENIRAN, & Yusuf Ayodeji AJANI................................................ 238 Threats to Knowledge Management System in Nigerian Academic Libraries Dr. Joseph O. OMONIYI........ ........................................................................................ ...... 255 Library Information Resources in the Era of Global Insecurity — Jacob Oloruntoba KUTU & Dr. Simon Ayo ADEKUNLE.................................. 265 The Roles of Library and Information Centres towards Global Security and Peace Professor R. I. ECHEZONA.................................................................................................. 279 Issues of the Convergence of Information Professions in Library and Information Science — Dr. Olumide Johnson AKANMIDU...................................................................................... 288 Aesthetic Factors and User Patronage in Nigerian Academic Libraries Kathryn J. PHILIP & Clement SAMUEL................................. .......................................... 296 UNIVERSITY OF IBADAN LIBRARY Management of Library and Information Centres in the Era of Global Insecurity 103 USE OF ICT FOR SECURING LIBRARIES AND INFORMATION RESOURCES AGAINST VANDALISM IN UNIVERSITY LIBRARIES IN THE ERA OF GLOBAL INSECURITY By ADENIKE DAMILOLA OMOIKE Kenneth-Dike Library, University o f Ibadan, Ibadan, Oyo State, Nigeria, n ikeomoike@yahoo. com & DANIEL OLUSEGUN IKEGUNE Department o f Library, Archival and Information Studies, University o f Ibadan, Ibadan, Oyo State, Nigeria, ikegu nedaniel@yahoo. com ABSTRACT Vandalism o f library and information resources is an international problem as well as a historical one that affects all type o f libraries. Therefore, the use o f ICT for securing libraries and information resources is inevitable. ICT is the only means o f securing library resources in the era o f global insecurity. Security o f libraries and information resources becomes a concern for the modem well equipped libraries. The application o f ICT in the library will help in providing quality services by the librarians through the Internet to users as information will be processed and communicated to users to meet their information needs without delay. The methods for securing libraries and information resources against vandalism in the era o f global insecurity are through digitization o f information resources, electromagnetic and Radio Frequency Identification (RFID), video surveillance and closed- circuit television (CCTV) systems in the library as means to deter crime and ensure safety o f information resources in the library. Meanwhile, Lack o f fund, poor policies and procedures, natural disasters such as earthquake, flood, fire, storm among others serve are causes o f vandalism o f library materials. It was therefore, recommended that government should assist the University in providing sufficient funds to install modem security systems to prevent vandalism in the library. Keywords: Library, ICT, Information, Resources, Vandalism, Insecurity INTRODUCTION The word 'vandalism' in the library can be used interchangeably with the word 'mutilation'. This means the deliberate cutting off or vandalism of an item in the library collection. It could also mean the act of removing or cutting part of library material from the library collection so that others may not use the material or the defacing of such material for self-interest. Vandalism of library and information resources is an international problem as well as a historical one that affects all type of libraries. Book mutilation stands out in this crime of vandalism by library patrons. They engage in this by cutting some pages, parts of a page, pictures, colour plates, with the intent to steal them. Vandalism of library and information resources is uncontrollable in the era of global insecurity This is because the library and the environment where the library is located are prone to disasters such as fire, flood, earthquake, and hurricane Therefore, the academic UNIVERSITY OF IBADAN LIBRARY Use ofICT for Securing Libraries and Information Resources Against Vandalism... 104 campus is not always a safe and secured place. Also, violence and property crime can and do occur. Academic libraries are no exception and they are subject to a wide variety of security concerns. Idris, Hassan and Abdul-Qadir (2013) agreed that the more the control, safeguard and security levels there are, the less it resembles a library that is traditionally expected to serve the users. Libraries and other information centres spent so much money on acquiring information materials or resources. It is imperative therefore that the materials are preserved adequately for safety, security and protection. These resources are in both print and electronic forms including journals, textbooks, almanacs, encyclopedias, dictionaries, abstract and indexes. Securing these resources with the use of Information and Communication Technology (ICT) is their protection and transformation from physical to electronic forms. The idea behind this is to prevent the library and its collections from vandalism and delinquent behaviours. Academic libraries are vulnerable to security risks from the public population. Furthermore, members of the academic community, both students and faculty/staff, can also pose security problems. According to Idris, et al. (2013), academic libraries stand to be vulnerable to all forms of crime and security risks from not only the users, but the library staff as well. They further reported that not everybody that walks into the academic library does so for the single purpose of patronizing the immense educational and cultural resources. In other words, not every visitor to the library respects and adheres to its, as some go there as risks to its resources; thereby causing damage to the resources by way of theft and mutilation. This occurs through vandalism and improper handling of the materials. Security issues in academic libraries are numerous and include the theft of library materials, the mutilation or vandalism of library materials, dealing with deranged and/or disruptive patrons, and assaults on library patrons and staff. In this information age, the application of ICT has curbed the act of vandalism of library and information resources to a minimal level. This was as a result of the development in the library with the use of ICT. ICT in the library has brought about digitization of information resources, virtual library, and use of Online Public Access Catalogue (OPAQ. Therefore, many developed academic libraries in recent times subscribed and made available information resources electronically to library users. ICT facilities that are used in providing the online resources to users are: Internet, CD-Writer, Printer, Scanner, Web 2.0 technologies. Computers, and Online Databases. Today, the Internet has affected the way librarians provide reference and library services generally with the use of ICT. A digital reference service happens when a user communicates through the Internet with a librarian to ask for library materials and/or services, with answers delivered electronically. Another means for securing the resources against vandalism is to have telecommunication or electronic security systems, which will help to provide safe and secured facilities for library resources and equipment. To provide adequate security using telecommunications, electronic systems, such as building alarm systems, access control systems, video surveillance, and tele-surveillance can be adopted in the library (Akor, Ekere & Akor, 2019). Olajide (2017) is of the concern that security of library and its resources is UNIVERSITY OF IBADAN LIBRARY Use of 1C T for Securing Libraries and Information Resources Against Vandalism 105 important, stressing that libraries are 'systems' and security is a vital part of maintaining a balance in the system. It aids adoptable strategies of librarians and other library staff to prevent or ameliorate the negative consequences of real threats in libraries. Therefore, library security management is a professional effort to deal practically with knotty problems of library safety and security. ICT in a library is a catalyst used for securing libraries and their resources against vandalism in the era of global insecurity. With this, according to Adamou and Ntoka (2017), digital libraries, institutional repositories and open archives are the new trend in the present era, satisfying users' needs for precise information since they have become more information conscious for accessing electronic information compared to different purposes such as academic or research needs. Also, as a result library digitization, resources are provided online other than the physical materials needed for academic purpose to curb the act of vandalism of information materials in the library. According to Fabunmi, Paris and Febunmi (2006), library digitization has become part of the work of librarians, and most libraries are involved in digitization projects. United Nations Educational, Scientific and Cultural Organization (UNESCO, 2002) defined ICT as the range of technologies that are applied in the process of collecting, storing, editing, retrieving and transferring of information in various forms. The interest of academic libraries in this information age is to secure information resources, as a result of the imbalance between occurrence of vandalism by library users and the application of ICT in Nigerian libraries constituting threats to information resources. Vandalism of information resources has long persisted by unsatisfied users; the major causes of which are identified to include limited library collections, restriction in the use of some materials, number and duration of loans, insufficient number of copies of recommended textbooks, unaffordable cost of personal textbooks, high cost of photocopying as well as peer influence. More so, the adopted ICT needed to secure the information resources in the library are not adequate leading to poor service delivery to users and complaints about poor Internet connectivity, limited number of computers and unreliable power supply. Meanwhile, in this era of global insecurity, ICT is best used for securing libraries and information resources against vandalism from library users. This paper intends to investigate various types of ICT that can be used by university library managers for securing libraries and information resources against vandalism in the era of global insecurity. Therefore, the paper discussed types of ICT used for securing libraries and information resources against vandalism in the era of global insecurity: i. types of libraries and information resources prone to vandalism; ii. vandalism of libraries and information resources in the era of global insecurity; and iii. challenges of securing libraries and information resources against vandalism in the era of global insecurity. LITERATURE REVIEW The introduction of ICT in libraries has changed the way librarians work, provide library services, and meet users information needs. This is because we are living in an UNIVERSITY OF IBADAN LIBRARY Use of ICT for Securing Libraries and Information Resources Against Vandalism... 106 information society and ICT is ever an increasing phenomenon. According to Fagbanmi and Ogunjobi (2009), ICT is an umbrella term that includes all technologies encompassing medium for recording information such as Magnetic disk, tape, optical disks (CD/DVD) flash and paper record, technology for the broadcasting, information, radio, television and technology for communicating through voice and sound or image microphone camera, loudspeaker, telephone to cellular phones. ICTs therefore can be defined as technology or electronic devices that encompass computer hardware and software, CD, CD-ROM, Internet, radio, television, and disk that libraries and information centers used for ordering, acquisition, recording, organizing, cataloguing and dissemination of information within and outside the library. The adoption of ICT in the library brought about digitization, e- resources sharing, online cataloguing, virtual library and online book ordering (Ikegune & Omoike, 2018). The idea is to protect library resources form human threats. According to Akor, et al. (2019, p.9), ICTs not only give the opportunity to have easy access to information from various sources, but also facilitate resource sharing between and among various organizations apart from improving the status of the Library and Information Science profession. The father of librarianship, Ranganathan (1975), cited in Adamou and Ntoka (2017) in his five laws states that "Library is a growing organism" so the adoption of ICT has a great impact on libraries as well as on librarianship which could not avoid being affected by such a societal change and has been adapted to Library and Information Science (LIS). During the last decade, the use of technology has become an essential part of the institutional objective of libraries promised to transform the dissemination of know-ledge and to change how libraries work for the better. According to Bradley (2010, p.184) "ICT is increasingly being used in almost every activity and embedded in more and more things". Bradley (2010, p.184) reported that now, in the 21st century, with the emergence of ICT and Web 2.0 technologies, libraries have a new, more dynamic role in knowledge society and as the individual is affected by ICT, in the same way, the individual can also influence the technology. In the past, traditional libraries wfere physical buildings where users could visit them and find printed books. Traditionally, the librarians were responsible for the collection development, for the material processing and the provision of services without using computers. Also, the introduction of ICTs in libraries dates as far back as 1950's and 60's in America and Europe (Adeyomoye, 2008). It started in form of automation projects where libraries tried to involve machines to help perform some tasks that are hitherto handled by humans alone. It however made its entry into Nigeria in the 1970's in form of automated projects. According to Nok cited in Adeyomoye (2008) though information and communication technologies have been in the pipeline since 1970 in Nigeria, concerted efforts towards its application began in the late 1990's mostly in academic libraries where it made its first debut. Libraries were sensitized through lectures of the need to computerize their operations. The new developments in the field of librarianship became so popular among academic libraries to this moment. This is because of its countless benefits to the libraries in every academic community. Nowadays, academic libraries make use of technology. They UNIVERSITY OF IBADAN LIBRARY Use o f ICT for Securing Libraries and Information Resources Against Vandalism. 107 provide not only printed material but also digital material that is born digital and material that is digitized; converted from analog to digital (Adamou & Ntoka, 2017). According to Slovney (2004), a digital library is a collection of digital representations of numerous types of media, such as documents, images and sounds that are stored in an information repository and are available through a local computer network or anywhere via the internet. Also, with the use of ICT, libraries are not piles of books anymore; the general library environment has been changed from analogue to digital. Library automation systems have helped libraries to provide easy access to their collections through the use of computerised library catalogues-OPAC, which more recently led to digital libraries (IFLA, 2013).The introduction to the digital era in libraries was one of the way out for securing libraries and information resources against vandalism. This created the need to computerise most of the operations in the library. This method could also be referred to information security management (ISM) in the library. Information security management (ISM) in the context of library management describes controls that a library needs to implement to protect its information assets from all potential threats to ensure the confidentiality, integrity and availability of its information resources. Pipkin (2000) in Ismail (2012) mentioned that there are various factors why libraries need Information Systems (IS) and Information Security. Firstly, the explosive growth of the Internet and its demands for connectivity require the additional external connections which has led to the creation of a large number of remote users. These users include employees who need remote access and direct network connections to remote office. Therefore, more libraries utilise the IS to assist them in providing digitally delivered services and collections to local and remote patrons. Secondly, to manage a library as an information centre requires a system which can process all forms of information materials in order to provide the right and accurate information to the right patron at the right time. Akintunde (2004), indicated that the library uses ICT in several ways including for managing the library administration; processing of library materials; developing and accessing online resources; developing and accessing offline. Nowadays, librarians use ICT technologies to acquire, processed, catalogue, preserve, provide reference services and so on. This doesn't mean that traditional libraries will stop existing. According to Adamou and Ntoka (2017), traditional libraries as buildings will continue to exist for many years and support the digital libraries. Thus, traditional libraries co-exist with digital libraries. According to Akor, et al. (2019, p .ll) apart from using the new tool to fulfil the traditional roles of the library, it evolved some new practices in the profession. Therefore, the new era librarians that can operate in the digital or ICT environment are indispensable. Librarians are compelled to be content creators of information, web page planners and designers and Internet navigators. Roy and Basak (2011) contend that there are a series of modern technology measures such as bar-coding, electronic-magnetic strips, etc. that have been used in the library and information centres and these improve the quality of services to the users. The study highlights the fact that of modern technology has offered many benefits in performing library tasks such as stocktaking, circulation and book searches. Their study UNIVERSITY OF IBADAN LIBRARY Use of ICT for Securing Libraries and Information Resources Against Vandalism.. 108 states that the RFID technology in libraries can thus significantly eliminate manual labour by optimizing the handling, processing, and security of material. In Nigeria, many university libraries have created digital ones so as to provide new information services to the users such as preserving digital information, providing 24/7 access to library resources, improving research and sharing knowledge. According to International Encyclopedia of Information and Library Science (2003, p.138), “Digitization of information materials is the process of converting analogue information to a digital format". Conway (2010) in Adamou and Ntoka (2017), mentioned that there are many reasons for libraries to go for digitization but the main profit is to preserve the rare and fragile objects; especially these items of high quality' such as old manuscripts. As the material digitized can be easily accessed by anyone; libraries, institutions, individuals; from anywhere at any time without hindrances. Nowadays, students make extensive use of the web so as to find the information they need. The internet provides them the latest digital material for usage. According to Chen and Lin (2011, p.399) “digital technologies enable ultra-rapid access to the richest sources, wherever they are located in the world's collection.“Vandalism of library materials will call for the replacement of such materials. Therefore, according to Pandey and Mishra (2014, p.137) "Academic libraries are digitizing materials because they know the continuing value of library resources for learning, teaching, research, scholarship, documentation, and public accountability." Lwoga, Site, Busagala and Chilimo (2009) noted that ICT covers many products that stores, retrieves, manipulates, transmits or receives information electronically in digital form. This encompasses computers, the rapidly changing technologies (radio, television, mobile phones and internet), networking and data processing capabilities, and the software for using the technologies. According to Maidabino (2010), the "issue of collection security is of growing concern to university libraries and librarians. There are many methods of ensuring that no material leaves the library without being checked out. These systems always contain a security device that is placed on the materials (including books, magazines, video cassettes, audio cassettes, CDs and DVD) as well as a detection device that is typically located at a library's exist. The detection device must be safe for magnetic media, usually have audible/or visible alarms, if desired, the audible alarm can be voice alarm. According to Brown and Patkus, (2007), "there are two major methods currently used for detection; electromagnetic and Radio Frequency Identification (RFID) solutions, being designed to improve library operation/efficiency. This enhanced capability is provided by RFID tags which do not require line of sight to be read, so that books are actually handled less. The tag combines book identification and book security into one label, minimizing labeling time and cost. Patron self-checkout systems are also available to libraries that incorporate RFID technology. Study by Vinayagamoorthy (2007) discussed that bar-coding, electronic- magnetic strips, radio frequency identification are used with the intention of improving the quality of service to the users and the security of library materials. The study recommends that RFID helps in the security aspect of library material which could be adopting for inventories of materials and which helps librarians in providing the users with optimum utilization of available resources. UNIVERSITY OF IBADAN LIBRARY Use of ICT for Securing Libranes and Information Resources Against Vandalism... 109 There are many advantages users can derive from the use of ICT facilities in the library. With the use of ICT technologies and facilities in the library such as computer, Internet, television and telephone, users can derive easy access to information, answers to online query, provision of remote access to users, access to unlimited information from different sources and adequate and current information. Librarians also benefit from the immense use of the ICT facilities in the library. ICT help in information acquisition, organization of information, information storage, library marketing, online advocacy, information awareness, information retrieval and dissemination functions to the community. Librarians must be information literate since the key role of library is to provide structured access to information with the increasing reliance on ICT. Literature has revealed that video surveillance and closed-circuit television (CCTV) systems serve as a way to monitor and record security, deter crime and ensure safety of information resources in the library. Advances in CCTV technology and reduction in cost have also made video surveillance a cost effective management tool for library facilities (Akor, et al., 2019). McCahill and Norris (2002) noted that "libraries can use closed-circuit television (CCTV) to identify visitors and employees, monitor work areas, deter theft and ensure the security can also use to monitor and record evidence on clientele and staff misconduct in the library. CCTV systems are quickly becoming one of the most important and economic security and safety tools available to libraries. Another means for securing library resources is the use of surveillance camera. CCTV cameras use small high definition color cameras, but by linking the control of the cameras to a computer objects can be tracked semi-automatically. According to Bannister et al. (2009), the technology that enable this is often referred to as VCA (video content analysis) and is currently being developed by a large number of technology company around the world and can be adopted by the library for the purpose of securing their resources. These current technologies enable the system to recognize if a moving object is a moving person or a crawling person. It can also deter mine the movement of people i.e. staff and users within the storage area of the library as to how they are moving and whether they are assessing library resources or just reading. Based on this information, the system developers implement features such as blurring faces of "virtually wall" that block the sight of a camera where it is not allowed to film. It is also possible to provide the system with rules, such as for example "sound the alarm whenever a person is walking close to the shelf area of the library without authorizes access (Akor, et al., 2019). McComb (2007) stated that video surveillance and closed-circuit television (CCTV) systems serve as a way to monitor and record security, deter crime, and ensure safety. The author suggests that libraries can use CCTV to identify visitors and employees, monitor work areas, deter theft, and ensure the security of the premises and other facilities. The system can also be used to monitor and record evidence on clientele and employee misconduct. TYPES OF INFORMATION RESOURCES PRONE TO VANDALISM Vandalism or mutilation is the act of destroying or removal of an essential part of library materials as to render it useless. These could be as a result of bending of the spine of a book or inserting pencil, ink or biro into pages. It could also be an attempt of opening of books back to back, tearing of relevant pages etc. Utah (2004) defines mutilation and theft of UNIVERSITY OF IBADAN LIBRARY Use of ICT for Securing Libraries and information Resources Against Vandalism .. 110 library materials as "deliberate removal or attempted removal of library materials from the library without their being checked out". Also, successful unauthorised removal of library materials from the library. Studies conducted by Ajegbomogun (2004), Bello (1998), and Holt (2007) identified rare books, manuscripts and special collections as frequent target of theft and mutilation because of the special demand for in depth studies of such materials. Their studies further indicated that the processes that handle access to collection such as acquisition, technical processes, circulation, shelving and storage of items in libraries need to be considered from the security perspectives and assessed by a collection security measurement instrument. Library material resources are classified into tangible and intangible resources. Tangible resources are visual aids, aural aids and audio-visual aids. Dike (1999) in Chimah and Nwokocha (2013) gives examples of visual aids such as books, journals, pamphlets, newsletters and reference sources that are in printed format. They also include projected aids, pictorial aids, three-dimensional aids, laboratory equipment, chemicals and apparatuses and non-projected aids. Aural aids include records and record players, tapes and tape recorders, language laboratories, and radio. While, audio-visual aids include sound film, filmstrip projector, television, video tape recorder and tapes, VCD, and DVD. Intangible resources consist of methods and technique of research. It includes methodologies, strategies or manipulations which the researcher uses in the laboratory or at field work to effect or facilitate research and development (R&D); such as: questioning, explanation, experimentation, exemplifying, sampling, modeling, designing, construction, field trips, illustration, characterization, measurement, analysis of data, monitoring, installation, computation, systems optimization, metallization, fabrication, testing, blending, additive property studying, distillation, dissemination demonstration and exhibition. These library resources are prone to vandalism aside the intangible resources because they are not material things. Moreso, library resources like books, periodicals, theses and dissertations, dictionaries, encyclopedias, yearbooks, gazetteers, reports, handbooks, seminar/conference volumes are maps/atlas are object of vandalism to users in the library. Isaac and Samuel (2008), carried out an investigation on the prevalent rate of book theft in academic society especially academic libraries, he evaluated the rate at which book theft and mutilation are plaguing academic libraries in Nigeria and to proffer some measures for curbing the menace. In his research, a total o f 120 copies of questionnaire were distributed to professional librarians, library officers and library porters (security staff) in four (4) different academic institutions in Ibadan, Ogbomoso and Oyo state, in Nigeria. Seventy- eight (78) 16 copies were returned and found useful (a response rate of 65%). He reported that reference materials, periodicals such as journals, newspapers and magazines are mostly affected. VANDALISM OF LIBRARIES RESOURCES IN THE ERA OF GLOBAL INSECURITY Users of information resources in the library including academic staff and librarians themselves are unpredictable in terms of character disposition in the use of the available information resources in the library. Vandalism is always carried by unsatisfied users of a particular information material. Hence, it could result to theft or mutilation of such material UNIVERSITY OF IBADAN LIBRARY Use ofICT for Securing Libraries and Information Resources Against Vandalism... 111 to meet desired information needs. According to Akor, et al. (2019, p.14) students do not consider mutilation as a severe offence. The great majorities, who are unconcerned about getting caught, feel mutilation is either not a crime or a minor misdemeanor and stated that a fine paid to the library should serve as a penalty. This assessment of students' perception yields an image of students as relatively unconcerned about mutilation; they assume it is relatively trivial and easily repaired and in general they are unaware of the great costs and efforts involved in this problem. Gadekar and Golwal (2013) contends that a library is a social institution preserving and disseminating knowledge. So any act which defiles the sanctity, decorum, discipline, and beauty of a library is called as vandalism in library. The study reveals that users from urban area are more prone to vandal activities, and that male users are more inclined to vandal activities. Salaam and Onifade (2010) examine students' perception and attitudes to vandalism in the libraries. The study shows that vandalism of library materials are largely occurs in the form of theft, mutilation and hiding of books and journals. It is regarded as a form of academic self-survival strategy that is hardly frowned on by a majority of the students. Rao and Babu (2008) contend that libraries and information resources are vulnerable to variety of threats. The quiet but insidious mutilation of their periodical collections not only drains badly needed financial resources but also frustrates and frequently infuriates their patrons. Thus the magnitude of the problem is such that any insight leading to a reduced rate of mutilation would lead to substantial monetary loss, not to mention reduced frustration and anger on part of library staff and innocent patrons. Vandalism of library resources is the most frustrating and irritating in all types of libraries. This problem became epidemic in most of the university libraries. It is surprising that instead of availability of photocopying facilities in low cost, some thoughtless users cut articles from reference books, frequently removing entire pages. Study by Aina (2004), investigated the factors responsible for the vandalization of books in Sokoto state of Nigeria. He surveyed five hundred (500) university students using social survey research; the method of collection in used was a questionnaire. The finding revealed that only expensive books were stolen or mutilated. Afolabi (1993) also added that "damages are caused by library users, insects and other animals and also by climatic conditions including hazards, she emphasized that recent studies have indicated that the greatest agent that deface books and cause wear and tear on library materials are human beings which are library users/ patrons". Goldstein (1996), Cohen (1973), and Entsua-Mensah (2016) mentioned some common acts of vandalism in libraries such as acquisitive vandalism, tactical vandalism, ideological vandalism, play vandalism, malicious vandalism and vindictive vandalism. Acquisitive vandalism means destroying library property to acquire some money. Example of acquisitive vandalism that may occur in libraries includes damage to parking meters, public telephones, vending machines, and photocopiers. Tactical vandalism is the act of destroying library property to prevent other people from using them by tearing off pages of the book. Ideological vandalism can be define as destroying library materials because of religious, social or political reasons - that is, destroying books written about a particular religion (Entsua-Mensah, 2016). Play vandalism means destroying of library materials for fun such UNIVERSITY OF IBADAN LIBRARY Use ofICT for Securing Libraries and Information Resources Against Vandalism... 112 as writing or drawing funny things in library books. Entsua-Mensah (2016) define malicious vandalism as destroying library materials out of anger or frustration. These acts express rage or frustration. This is a situation when library encounter problem like clogging of toilets or sinks, setting off fire alarms or sprinkler systems, or urinating in public places While, vindictive vandalism involves the acts to gain revenge as a result of what took place in the library between users and library staff. CHALLENGES OF ICT USE IN SECURING THE RESOURCES AGAINST VANDALISM There are many potential problems in security that an academic library face. Adamou and Ntoka (2017) observed that the introduction of new' technologies in libraries creates technostress to some employees. The fact that some librarians suffer from technostress is related to the rapid development of technology and the implementation in libraries. There are a number of factors that may affect librarians and lead to technostress. According to Laspinas (2015, p. 206) cited in Adamou and Ntoka (2017) mentioned that some of the factors that procure technostress are: the rate of change of technology; lack of standardization; lack of training individuals on the equipment; reliability of the technology; increased workload placed on each individual; and the changing roles of librarians. Lack of fund to transform library from its traditional state to e-Iibrary could serve as a barrier in securing libraries and information resources against vandalism. According to Fabunmi, et al. (2006), budgets for digitization projects should include: salaries; staff training; digitization equipment; legal fees; overhead and indirect costs; communication fees; and contingency. Also, the initial cost depends on the material to be included in the digital library. The conversion of paper (printed material) into a digital form is surely expensive and time-consuming. With the challenge of fund many Nigeria academic libraries cannot subscribe to the required journals and databases. Digital library has been viewed as an expensive project and creating a digital library means creating a complete organization of machines and people (Adamou & Ntoka, 2017). Ajegbomogun (2004) cited in Maidabino and Zainab (2011) identified the types of security breaches in university libraries, which included theft and book mutilation and reasoned the cause to security lapses, insufficient or limited number of essential materials, and user's financial constraints. Boss (1984) also identified physical weaknesses in libraries in terms of unsecured windows, faulty emergency exits, unstaffed computer rooms, poor policies and procedures, lack of security plans, poor.security points (exits, loading areas, windows, special collections) inadequate loans and renewal periods, lack of security' manuals and poor signage as some of the causes of security breaches. Vandalism, mutilation, theft, defacement, and other incessant behaviour in the library are problems regularly encountered by the materials of these libraries. These valuable resources housed by the library such as books and other information materials are targets for criminal activities by deviant users. The expected roles of the academic library tend to lead it to criminal activities. Reason alluded to this, in the word of Oder (2004) maintained that security measures such as supervision, patrolling, and surveillance are lacking in libraries and keys are kept unsecured, if not in plain sight of the users. Natural agents known as disasters can also serve as vandalism of library materials or UNIVERSITY OF IBADAN LIBRARY Use o f ICT for Securing Libraries and Information Resources Against Vandalism... 113 cause loss of all or part of the library's collection: earthquake, flood, fire, storm, cyclone or hurricane, humidity, landslides, rodents, insects, and many others. All of these have been experienced by universities in different countries. Flood and water damage are particularly threatening to library collections. According to Akor, et al. (2019) none of these however, has caused as much loss to many libraries as theft and mutilation by the very patrons these libraries see to serve. Other damages done to library materials include those affected through shelving books or jamming them to either tightly on the stacks, bending books backward or pressing their backs for the purpose of photocopying. Udoumoh and Okoro (2007) suggested that libraries should create policies to ensure library resources are used effectively. Disasters are a security issue that threatens library collections. Disasters, as natural and man-made. Flooding roar of abnormally high water flow, and it is generally conceded to be the most destructive and costly natural disaster libraries can experience. Disasters on the other hand can destroy thousands of volumes of books within a short time. Insect infestation, environmental factors, and human causes constitute a serious security threat and may have devastating consequences. Therefore, there is a need for constant security measures in the library, such as vigilant staff and user education, to handle security threats cause by this type of disaster. Anunobi and Okoye (2008) contributed that academic libraries are faced with crossbreed challenges in order to acquire the necessary skills". One challenge is the issue of security management for prevention of theft of print and non-print resources in the academic libraries. There is a need for academic libraries to ensure accessibility and effective use to make an effective program of collection security necessary. This programme must include assessment of collection security management for prevention of incessant book thefts and the measures use in curbing security infringement. Maidabino (2010) on the other hand contributed that these problems indicate the need to determine the current state of collection security management in academic libraries. Library and information managers must have a clear vision and focus on the contemporary reality of security breaches in university libraries, especially those targeting the collections. This is one of the many things librarians should concern themselves with; if they are to successfully manage a flourishing and efficient library. Bello (1998) conducted a study on theft and mutilation in technological university libraries in Nigeria, revealing that there is a lack of security in university libraries. Nwalo (2003) asserted that a major problem encountered in library security is that the security department of the parent body (in the case of academic and special libraries) insists on providing security personnel for the library. These security men are loyal to the security department and not to the library authority. This situation makes it difficult for the librarian to control security matters in his library as his orders may be flouted" Moreover, the security personnel posted to the library are often not literate enough to identify library materials and prevent them from being stolen. Abubakar (2016) opined that before any security measures could be put in place, it is important to assess the security needs of the institution and determine the possible effects of security procedures on staff, users, and information resources. Also, there should a security policy that should address the physical security, such as building and perimeter security; UNIVERSITY OF IBADAN LIBRARY Use ofICT for Securing Libraries and Information Resources Against Vandalism... 114 security access for example, access by staff and users to storage areas, security during lending and transport; exhibition security; security of computer systems including authorised to and authorised manipulation of data. Abubakar (2016) further recommended that a sensible policy of controlled access should be in place whenever any secure storage plan is planned. A security policy must include the users, and state for example, limitation of access to original information resources in favour of surrogates. It should also state clearly the responsibility for security of the information resources, both those of the staff and of the users. Procedures to be followed in case of a breach of security should be clearly set out, as should procedures for preventing, and coping with disasters. A study conducted by Oyesiku, Buraimo, and Olusanya (2012) on academic library security discovered a relationship between high rates of security problems and^the growth of the university. Also study by Oyesiku, et al. (2012) on disruptive-readers in academic libraries study in Olabisi Onabanjo University library, revealing that there is a lack of security in university libraries. Users resorted to delinquent behaviour because demand outstripped the supply of library material. This result in competition for resources, which invariably tempts users to steal, mutilates, or engages in illegal borrowing. The threat for digital materials because of their short-term lifecycle; has led to a general awareness of how to manage them effectively in such a way so as future generations have the prospect of widespread access to them (Adamou & Ntoka, 2017). CONCLUSION ICT is the only means in securing library resources in the era of global insecurity; as it will help in providing quality services by the librarians to users as information will be process and communicated to users to meet their information needs without delay. With the application of ICT in the library, the Internet has become an inseparable part of today's educational system due to rapid advancement in technology used in providing library services. ICT in library known as the digital era in libraries is one of the way out for securing libraries and information resources against vandalism. This method is known as information security management (ISM) in the library through digitization of information resources, electromagnetic and Radio Frequency Identification (RFID), video surveillance and closed-circuit television (CCTV) systems in the library to deter crime and ensure safety of information resources in the library. However, lack of fund to transform library from its traditional state to e-library, poor policies and procedures, natural agents known as disasters earthquake, flood, fire, storm, cyclone or hurricane, humidity, landslides, rodents, insects, and many others serve are causes of vandalism of library materials. RECOMMENDATIONS (1) Government should assist the University in providing sufficient funds to install modern security systems to prevent vandalism in the library. (2) Government should also assist the University in providing regular fund to purchase multiple copies of books in the library to avoid short of books which can cause theft and mutilation of the information materials in the library. (3) The university library should organise library orientation service to users and user UNIVERSITY OF IBADAN LIBRARY Use of ICT for Securing Libraries and Information Resources Against Vandalism.. 115 education service to deter delinquency behaviour by the users in the library. (4) There should be well-researched practical strategies libraries may implement to curb vandalism and prevent its occurrence. (5) The Library authorities should invest in electronic resources through automation which will reduce to a large extent the incidence of users physically handling documentary materials and this in turn enhances multiple accesses to library material with little damage. (6) Academic librarians should undergo technology training in order to have the adequate skills to manage, organize and provide services to library users. This is because nowadays, librarians have to work with both printed and digital material. REFERENCES Abubakar, F. (2016). Preservation and security of information resources in academic libraries in Niger State, Nigeria. A dissertation submitted to the Postgraduate School, Ahmadu Bello University, Zaria, Nigeria in partial fulfilment of the requirements for the award of the Degree of Master of Library and Information Science, Faculty of Education. Adamou, S., & Ntoka, L. ^2017). The impact of digital technologies on academic libraries. A study in Greece, Sweden. Adeyomoye, J. I. (2008). Library automation projects in Nigeria private universities: The case of Igbinedion University, Okada. Information Technologist, 5(2); 19-23. Afolabi, M. (1993). Security problems and methods of six special libraries in Zaria. Library Focus, 9 (182); 25-42. Aina, L. O. (2004) Library and information science text for Africa. Ibadan: Third world Information Services Limited, Pp 263-270 Ajegbomogun, F. O. (2004). Users' assessment of library security: A Nigerian university case study. Library Management, 25, (8/9); 386-390. Akintunde S. A. (2004). Libraries as tools for ICT development. Nigerian Library Association 42'u,National Conference and AGM at Akure, Nigeria June 20-25, 2004. P.10. Akor, U. P., Ekere, J. N., & Akor, S. O. (2019). The use of ICT for security and theft prevention in two university libraries in Nigeria. Library Philosophy and Practice (e-joumal). 2366. Available at https://digitalcommons. unl.edu/Iibphilprac/2366 Anunobi, C. B., & Okoye, I. B. (2008). The role of academic libraries in universal access to print and electronic resources in developing countries. Library Philosophy and Practice. Available: http://unllib.unl.edu/LPP/anunobi- okoye.htm. Accessed 23-04-2012. Banister, J., Mackenzien, A., & Norris, P. (2009). Public Space CCTV in Scotland: Scottish Centre for Crime and Justice Research (Research Report). Bello, M. A. (1998). Library security: Material theft and mutilation in technological university libraries in Nigeria. Library Management, 19 (6); 378-383. Boss, R. (1984). Collection security. Library Trends, 18(1); 39-48. Bradley, G. (2010). The Convergence Theory on ICT, Society and Human Beings-towards the Good ICT society. Triple C, 8(2); 182-192. UNIVERSITY OF IBADAN LIBRARY Use of ICT for Securing Libraries and Information Resources Against Vandalism .. 116 Brown, K. E., & Patkus, B. L. (2003). Collection security: Planning and prevention for libraries and archives. Northeast Document Consewation Centre. Available at: http://www.nedcc.org/ Chatterjee, A., & Maity, A. (n.d). Security Challenges in University Libraries Chen, K., & Lin, P, (2011). Information literacy in university library user education. Aslib Proceedings, 63(4). Available at: Linnaeus University Library website. Chimah, J. N., & Nwokocha, U. (2013). Information Resources, Retrieval and Utilization for Effective Research in Tertiary and Research Institutions. Asian Journal o f Humanities and Social Sciences (AJHSS), 1(3). Cohen, S. (1973). Property destruction: Motives and meanings. In: Vandalism, ed. Colin Ward, 23 -53. London: H.E. Warne. Conway, P. (2010). Preservation in the age of Google: digitization, digital preservation, and dilemmas. Library Quarterly, 80(1), 61-79. Dike, V. W. (1999). More than computers: Information technology in library and information science education in Nigeria. Papers presented at the 10 Biennial conferences of the National Association of Library and Information Science Educators. Entsua-Mensah, F. O. (2016). Security of Library materials. School of Information and Communication. University of Ghana: Department of Information Studies. Fabunmi, B. A., Paris, M. & Febunni, M. (2006). Digitization of library resources: Challenges and implications for policy and planning. International Journal o f Africa & African American Studies, 5(2), 23-36. Fagbami, O. O., & Ogunjobi, T. E. (2009). Availability and use of information and communication technology (ICT) facilities in agricultural research institution and information centres in Ibadan Nigeria: problems and prospects. International Journal o f Information and Communication Technology, 6(1), 17 - 24. Gadekar, M. J., & Golwal. (2013). Illegal practices in engineering college libraries. Online International Interdisciplinary Research Journal, 3(6), 461-470. Goldstein, A. P. (1996). The psychology of vandalism. New York: Plenum Press. Holt, G. E. (2007). Theft by library staff. The bottom line: Managing library finances, 20(2), 85-92 Idris, M., Hassan, U., & Abdul-Qadir, F. (2013). Theft and Mutilation of Library Materials in Academic Libraries: The Case Study of Kano University of Science and Technology, Wudil, Kano State, Nigeria. Journal o f Research in Education and Society, 4(3). Ikegune, D. O., & Omoike, A. D. (2018). ICTs Use and Library information resources in Enhancing a Sustainable Educational Development: A case study of University of Ibadan, Ibadan, Nigeria. Journal o f Capital Dei’elopment in Behavioural Sciences. A Bi-annual Publication of the Faculty of Arts & Education Lead City University Ibadan, Oyo State Nigeria. 6(1), 67-84. International Federation of Library Associations and Institutions-IFLA. (2013). Bridging the Digital Divide: making the world's cultural and scientific heritage accessible to all, [online] IFLA/UNESCO Manifesto for Digital Libraries. Available at: http://ifla.org Isaac, O. A., & Samuel, A. O (2008). Library and Archival Security, 22; 2-32. Ismail, R. B. (2012).-Assessing information security management in Malaysian academic libraries. Thesis submitted in fulfilment of the requirements for the Ph.D. Faculty of Computer Science & Information Technology, University of Malaya Kuala Lumpur. UNIVERSITY OF IBADAN LIBRARY Use of ICT for Securing Libraries and Information Resources Against Vandalism.. 117 Laspinas, M. (2015). Technostress: Trends and challenges in the 21st century knowledge management. European Scientific Journal, 11(2). Lwoga, E. T., Site, A. S., Busagala, L. S. P., & Chilimo, W. (2009). The role of universities creating ICT awareness, literacy and expertise: Experience from Tanzanian public universities. Maidabino, A. A. (2010). Collection security issues in Malaysian academic libraries: An Exploratory Survey. Library Philosophy and Practices. Maidabino, A. A., & Zainab, A.N. (2011). Collection security management at university libraries: assessment of its implementation status. Malaysian Journal of Library & Information Science, 16(1),15-33. Mccahill, M. N., & Norris, P. (2002). Electronic Security: A case Study of NT, Bombay Central Library, Proceedings of the CALIBER 3.Available at:www.Iibrary.iitb.ac.in/- McComb, B. C. (2007). Wildlife habitat management: Concepts and applications in forestry. Taylor and Francis Publishers, CRC Press, Boca Raton, FL. 319pp. Nwalo, K. 1. N. (2003). Fundamentals of library practices: A manual on library routines. Pp. 72-79. Oder, N. (2004). Fallout from Philadelphia attack: More security. Library journal, 129(9). Olajide, O. (2017). Theft and mutilation challenges and management in academic libraries: A case study of Federal University Oye-Ekiti, Nigeria. journal o f Applied Information Science and Technology, 10(1); 78-84. Oyesiku, F. A., Buraimo, O., & Olusanya, O. F. (2012). Disruptive readers in academic libraries: A study of Olabisi Onabanjo University Library. Library Philosophy and Practice (e-joumal). Paper 766. Available at:http://digitalcommons.unl.edu/libphiIprac/766. Pandey, P., & Misra, R. (2014). Digitization of library materials in academic libraries: Issues and challenges, journal o f Industrial and Intelligent Information, 2(2). Pipkin, D. L. (2000). Information Security: Protecting the Global Enterprise. Prentice Hall PTR: Upper Saddle River, New Jersey. Rao, C., & Babu, O. (2008). Library information security strategies in the IT environment: certain guidelines. Kelpro Bulletin, 12(1), 45-55. Roy, C., & Basak, K. (2011). RFID technology in libraries and information centres: Beginning of a new era. International journal o f Information Dissemination and Technology, 1(4), 249-252. Salaam, O., & Onifade, F. (2010). Perception and attitude of students to vandalism in university libraries. Annals o f Library and Information Studies, 57, 146-149. Available at: http:// nopr.niscair, accessed on 15/03.2012 Slovney, S. M. (2004). Usage trends in a digital library: A case study of Iupac.org. Master's thesis. University of North Carolina, Chapel Hill. Available at: http://etd.ils .unc.edu/dspace/bit Udoumoh, C. N., & Okoro, C. C. (2007). The effect of library policies on overdue materials in university libraries in the South-South Zone, Nigeria. Library Philosophy and Practice. Available at: http:// unllib.unl.edu/LPP/udoum oh-okoro.htm Accessed 23-04- 2012. UNESCO, IFLA, & ICA. (2002). Guidelines fcr Digitization Projects for Collections and Holdings in the Public Domain, particularly those held in Libraries and Archiivs. Available at: http://portal.unesco.org Utah, C. T (2004). Offenses against property pertaining library. Library Philosophy and Practice. Available at: http://unllib.unI.edu/LPP/utah code.htm. Accessed 23-04-2012,__ Vinayagamoorthy, P. (2007). Application of radio frequency identification (RFID) in engineering college library: An experience. Indian Journal of ] ibrani and Information Science. 7(2); 35-45 UNIVERSITY OF IBADAN LIBRARY