Information services such as the library, under normal international standards should consider safety and security of its infrastructure and resources (human resources inclusive) as part of its workflow. Information is expanding and covering untold grounds every day and information bearing facilities are equally being transformed with the help of Information and Communication Technologies (ICTs) whose evolution seem to know no bounds. This trend is not only changing the role of the Library and Information Professional but urging this professional to ensure the security of access to the information resources platform. Thus it is not only worthwhile to collect, organize and make accessible information resources but it is equally important to secure these resources to last long and prevent unauthorized and unethical access. This therefore calls for a carefully developed security policy for every information service that can be updated as knowledge expands and the ICT platform continue to expand and evolve. Such a policy should be well thought out to cover all the forms information takes and include, print, electronic and graphics. It should equally include securing the human resources implicated in the running and using of the Library services. This paper is an investigation of the challenges faced in securing information resources in public university libraries in Anglophone Cameroon. The research design used for the study is a survey with data collecting instruments made of a questionnaire and an interview guide from library staff and library administrators respectively. Three main research questions were coined for the study having as thrust the following: security challenges faced, security policies put in place to secure library resources and difficulties libraries face in providing appropriate security and how these difficulties could be solved. The analysis of the data collected was done by a simple calculation of the percentages of the responses of the respondents to determine the threats and the extent of each threat. Academic libraries have been plagued with security issues for a long time. It is difficult to replace materials that are under security threats in libraries. Theft, mutilation and unauthorised access to libraries and their resources constitute serious problems which affect users. It is important that libraries with physical security systems reinforce these systems with electronic security systems. More effort is needed to properly train and encourage staff to be security conscious and to take the necessary precautionary measures. It is anticipated that if the right measures are put in place to resolve library security issues, libraries would be able to better protect their resources and render better services.
Alegbeleye, B. (1993). Disaster Control Planning for Libraries, Archives and Electronic Data Processing Centres in Africa. Ibadan: Option Books and Information Services.
Barker, W. C. (2003). Guidelines for Identifying an Information System as a National Security System. Retrieved October 2020, from nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800_59
Brown, K. E. (2007). Collection Security: Planning and Preservation for Libraries and Archives. Retrieved October 2019, from Technical Leaflet Emergency Management. Section 3 Leaflet 12: http://www.nedee.org
Cherdanseva, Y., & Hilton, J. (2013). A Reference model of information assurance and security. workshop in conjunction with the 8th International conference on availability, reliability and security (ARS). University of Regensburg, Germany: IEEE Proceedings.
Cronin, M. J. (1980). A Workshop Approach to Library Security. Library and Archival Security, 3, 30-38.
Crowe, T. D. (2000). Crime prevention through environmental design: Applications of architectural design and space management concepts (2 ed.). Butterworth: Stoneham, MA and National Crime Prevention Institute.
Dean, W. (2004). Library and Information Resources Security. Retrieved July 2020, from www.idpublications.org
Kwaanpong, A. (2009, October). Disaster Control measures in academic libraries in Nasarawa State. Retrieved 2019, from www.unn.edu
Lynn, M. (2001). The Design and evaluation of physical protection system. Butterworth: Stonharm, NA guidelines for the security of rare books, manuscripts.
Marcus, N. (2007). Library and Information Resources Security. Retrieved July 2020, from www.idpublications.org
Mccahill, M. N., & Norris, P. (2002). Electronic Security: A Case Study of IIT, Bombay Central Library, Proceedings of the CALIBER 3. Retrieved November 2019, from www.library.iitb.ac.in/-mnj/
Omosekejimi, A. E., Ijiekhuamhen, O. P., & Ojeme, T. N. (2015, September 17). Library & Information resources’ security: Traditional and electronic security measures. International Journal of Academic Research and Reflection, 3(3).
Parkus, B. L. (2003). Collection security: Planning and prevention of libraries and archives. Retrieved October 2019, from Parkus, B. L. (2003). Collection security:http://www.nedec.org/plam.3/heat312htm
Pipkin, D. (2000). Information security: Protecting the global enterprise. New York: Hewlett Packard Company.
Radhakrishnan, S. (2016). Retrieved September 17, 2019, from htths://hpssmartlibrary.wordpress.com
Schelienger, T., & Teiyel, S. (2003). Information Security culture – from analysis to change. South African Computer Journal, 31, 46 – 52.
Shafack, R. M. (2007). Managing problems of University Libraries in Cameroon. Unpublished.
Shuman , B. A. (2002). Personal Safety in Library: Levels, Problems and Solutions. The Reference Librarian, 36(75 and 76).
Spagnoletti, P., & Resca, A. (2008). The duality of information security management: Fighting against predictable and unpredictable threats. Journal of Information Security, 4(3), 46 - 62.
Venter, H. S., & Eloff , J. H. (2003). A Taxonomy for information security technologies computers and security, 22(4), 299-307. 22(4), 299-307.
Voters, B. (2007). Best Answers Chosen by Voters: Prospect and Problems of the Use of Telecommunication Facilities: The Way Forward. Retrieved July 2020, from https://digitalcommons.uni.edu
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.