Library Network Security Measures As Determinants of Archives Preservation in Public Libraries in Rivers State, Nigeria
DOI:
https://doi.org/10.51983/ajist-2023.13.1.3487Keywords:
Library Network Security, Archives Preservation, Library Security Devices, Staff TrainingsAbstract
This study examined available library network security measures as determinants of archives preservation in public libraries in Rivers state. The descriptive survey design was adopted for this study. The target population of the study comprised 514 library staff drawn from Rivers State library board and staff from Jubilee library Port Harcourt. The sample size for this study was 399 library staff comprising 227 staff from Rivers state library board and 172 library staff from Jubilee library Port Harcourt. An instrument titled library network security measures for archives preservation questionnaire was used for data collection. Face validity of the instrument was ensured by three experts. The instrument consists of 10 items of 2 sections. The instrument yielded reliability coefficients of 0.79 with the use of Cronbach Alpha reliability method. The findings indicated that, among other things, encryption technologies such as firewall protection and secure logins are part of the library’s network security measures that are employed to preserve archives in public libraries in Rivers state, Nigeria. Based on the findings, it can be concluded that public libraries in Rivers state are not lacking security features that would help preserve archives via a networked security system. However, the security measures were not effectively employed because staff members’ security training was not sufficiently available. As a result, it was recommended that more training in security should be provided to staff in all of the public libraries in Rivers state.
References
Abduldayan, F. J., Abifarin, F. P., Oyedum, G. U., & Alhassan, J. A. (2018). Research data management and information security: Role of library and information technology service (ITS) units in federal universities of technology in Nigeria. i-Manager’s Journal on Information Technology, 8(1), 20.
Adetunla, G. B. O., & Osunride, A. A. (2016). Preservation and conservation of library materials in university libraries in south-west, Nigeria. International Journal of Online and Distance Learning, 1(1), 12-25.
Aljumah, A., & Ahanger, T. A. (2020). Cybersecurity threats, challenges and defense mechanisms in cloud computing. IET Communications, 14(7), 1185-1191.
Al-Sharidah, A., Syed, A., Alsannat, E., & Gaddourah, A. (2020, January). How cybersecurity policies enable IR 4.0 emerging technologies. In International Petroleum Technology Conference. OnePetro.
Antony, S. M., & Vijayakumar, A. (2016). Status of technological competencies of library professionals in colleges of Kerala: An analytical study. International Journal of Library & Information Science, 5(3), 133-140.
Asogwa, B. E. (2011). Digitization of archival collections in Africa for scholarly communication: Issues, strategies, and challenges. Library Philosophy and Practice, 1.
Baudino, F., Johnson, C., Jones, S., Meneely, B., & Young, N. (2021). 2021 brick & click: An academic library conference (21st, Maryville, Missouri, November 5, 2021). Online Submission.
Borgman, C. L., Scharnhorst, A., & Golshan, M. S. (2019). Digital data archives as knowledge infrastructures: Mediating data sharing and reuse. Journal of the Association for Information Science and Technology, 70(8), 888-904.
Burke, J. J. (2013). The Neal-Schuman library technology companion: A basic guide for library staff. American Library Association.
Dunham, E. (2016). Implementing archivesspace at Arizona state university. Journal of Digital Media Management, 4(3), 280-292.
Ekwelem, V. O., Okafor, V. N., & Ukwoma, S. C. (2011). Preservation of cultural heritage: The strategic role of the library and information science professionals in south-east, Nigeria. Library Philosophy and Practice, 1.
Frank, H. (2013). Augmenting the cataloger’s bag of tricks: Using MarcEdit, Python, and PyMARC for batch-processing MARC records generated from the archivists’ toolkit. Code4Lib Journal, (20). [https://journal.code4lib.org/articles/8336?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+c4lj+.]
Gill, R. (2016). Changing role of library professionals in ICT environment. International Journal of Information Movement, 1(1), 31-35.
Hemsoth, C. M. (2002). Security policies: The foundation for information protection. In Healthcare information systems, 115-132. Auerbach Publications.
Hu, Q., Dinev, T., Hart, P., & Cooke, D. (2012). Managing employee compliance with information security policies: The critical role of top management and organizational culture. Decision Sciences, 43(4), 615-660.
Hussein, M. L. (2015). Endangered cultural heritage: A survey of disaster management planning in Middle East libraries and archives. Library Management, 36(6/7), 476-494.
Ismail, R., & Zainab, A. N. (2013). Information systems security in special and public libraries: an assessment of status. arXiv preprint arXiv:1301.5386.
Kaur, P., & Kaur, P. (2015). Collection development and management within public libraries in Delhi: A study on government-owned public libraries in the changing digital environment. Library Management, 36(1), 99-114.
Kolle, S. R., & Parmeshwar, S. (2014). Competencies and soft skills for library professionals in the information era. International Journal of Library and Information Studies, 4(4), 86-97.
Kwo-Shing, H., Yen-Ping, C., Louis, R. C., & Jih-Hsing, T. (2003). An integrated system theory of information security management. Information Management & Computer Security, 11(5), 243-248.
Laskowska, J. (2011). Personal controlling as a management tool for library staff in the example of selected Polish libraries. Library Management, 32(6-7), 457-468.
Liu, Y. (2019). Risk and preventive strategy of network security in university digital library. In 9th International Conference on Management, Education and Information (MEICI 2019). DOI:10.25236/meici.2019.026
Mahmood, Z., & Khan, H. R. (2017). Digital preservation of rare manuscripts in Khuda Bakhsh Oriental public library, Patna. Pearl: A Journal of Library and Information Science, 11(1), 55-62.
Martina, D. (2017). EU-USA cooperation on information sharing in the fight against terrorism: the roles of privacy and security, and the cases of the TFTP and PNR agreements (Master’s thesis).
Montanari, F., Matthaios, S., & Rengakos, A. (Eds.). (2015). Brill’s companion to ancient Greek scholarship (2 Vols.). Brill.
Muir, J. (2008). Life and letters in the ancient Greek world. Routledge.
Muir, R. S. L. C. A., & Creaser, C. (2014). Regulating use of the internet in public libraries: A review. Journal of Documentation, 70(3), 478-497.
Obi, H. E. (2023). Availability of disaster preparedness and digitization in archives preservation in public libraries in Rivers state. Partners Universal International Innovation Journal, 1(1), 24-33.
Pautz, H. (2013). Managing access to the internet in public libraries. New Library World, 114(7-8), 308-318.
Petek, M. (2018). Stress among reference library staff in academic and public libraries. Reference Services Review, 46(1), 128-145.
Pinfield, S., Cox, A. M., & Smith, J. (2014). Research data management and libraries: Relationships, activities, drivers and influences. PLoS One, 9(12), e114734.
Riley, J. (2017). Understanding metadata. Washington DC, United States: National Information Standards Organization (http://www.niso.org/publications/press/UnderstandingMetadata.pdf), 23.
Rodrigues, J., de la Torre, I., Fernández, G., & López-Coronado, M. (2013). Analysis of the security and privacy requirements of cloud-based electronic health records systems. Journal of Medical Internet Research, 15(8), e186.
Schaefer, S. K., McGovern, N. Y., Zierau, E. M., Goethals, A. L., & Wu, C. C. (2022). Deciding how to decide: Using the digital preservation storage criteria. IFLA Journal, 48(2), 318-331.
Si, L., Xing, W., Zhuang, X., Hua, X., & Zhou, L. (2015). Investigation and analysis of research data services in university libraries. The Electronic Library, 33(3), 417-449.
Spacey, R., Cooke, L., Creaser, C., & Muir, A. (2015). Regulating internet access and content in UK public libraries: Findings from the MAIPLE project. Journal of Librarianship and Information Science, 47(1), 71-84.
Tansey, E. (2015). Archival adaptation to climate change. Sustainability: Science, Practice and Policy, 11(2), 45-56.
Tobias, E. N. (2019). An assessment of library collection security systems in Namibian public libraries: A case of Ohangwena and Oshana regional library (Master dissertation, National University of Science and Technology).
Touhid, T. (2019, August). Types of data security measures and importance. https://cyberthreatportal.com/types-of-data-security-measures.
Triskele, L. (2022). Cybersecurity consulting: The most important elements of network security. Retrieved from https://www.triskelelabs.com/blog/the-most-important-elements-of-network-security.
Tyagi, S. (2022). Preservation and conservation of indigenous manuscripts. IFLA Journal, 03400352221103899.
Upadhyay, D., & Sampalli, S. (2020). SCADA (supervisory control and data acquisition) systems: Vulnerability assessment and security recommendations. Computers & Security, 89, 101666.
Vacca, J. (Ed.). (2012). Computer and information security handbook. Newnes.
Vaish, A., & Varma, S. (2010). Parameter extraction for measurement of the effective information security management–statistical analysis. International Journal of Computer and Electrical Engineering, 2(4), 654-659.
Van Kleeck, D., Langford, G., Lundgren, J., Nakano, H., O’Dell, A. J., & Shelton, T. (2016). Managing bibliographic data quality in a consortial academic library: A case study. Cataloging & Classification Quarterly, 54(7), 452-467.
Wang, R. (2017). Research on data security technology based on cloud storage. Procedia Engineering, 174, 1340-1355.
Whitman, M. E., & Mattord, H. J. (2013). Management of information security. Cengage Learning.
Whitman, M. E., & Mattord, H. J. (2021). Principles of information security. Cengage Learning.
Xiao, Q., Xu, X. & Liu, P. (2021). Security status of electronic records preservation in central China: The survey results of 34 archives in Wuhan City. Library Hi Tech, 39(1), 22-36. DOI: https://doi.org/10.1108/LHT-04-2019-0088
Yap, J. M., Barat, A. H., & Kiszl, P. (2022). Readiness of public libraries in developing a financial literate individual. Journal of Library Administration, 62(8), 1045-1069.
Yusuf, R. A., & Awoyemi, O. O. (2022). Cybersecurity and its implication on library users’ privacy. Owena Journal of Library and Information Science, 9(1), 1-13.
Zajdel, S., Costa, D. E., & Mili, H. (2022, September). Open-source software: an approach to controlling usage and risk in application ecosystems. In Proceedings of the 26th ACM International Systems and Software Product Line Conference-Volume A, 154-163.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.