This research project is on Library Resources and Security Challenges in the Library of Federal Polytechnic Nekede, Owerri. Data was collected using questionnaire designed and distributed to the staff of the library used as case study. In analyzing and presenting of the data collected, tables, frequencies and simple percentage (%) were used. The findings showed that the library is faced with different types of security challenges which are book theft, non-return of library materials, book mutilation, keeping books beyond due dates, purposeful mis-shelving of books, writing on or in books etc. Recommendations made in this study includes that there should be increased security in the library premises and library hall through supervision, patrolling and surveillance, libraries should be designed in such a way that collection security is taken into account, libraries should install goods and working electronic security gadgets in the library and its environs. The researcher suggested that further study should be carried out on; the need to observe library rules and regulations, preservation and conservation of library resources, securing the digital libraries against security breaches as these suggestions will further help to prevent the library and its resources against any form of security challenge.
Title page
Certification
Dedication
Acknowledgement
Abstract
List of Tables
Table of Content
CHAPTER ONE:
1.0 INTRODUCTION
1.1 Background to the Study
1.2 Statement of the Problem
1.3 Objectives of the Study
1.4 Research Questions
1.5 Scope of the Study
1.6 Significance of the Study
1.7 Historical Background of Federal Polytechnic Nekede, Owerri
1.8 The Polytechnic Library of Federal Polytechnic Nekede, Owerri
1.9 Definition of Operational Terms
References
CHAPTER TWO
2.0 LITERATURE REVIEW
2.1 Introduction
2.2 Concept of Library Resources
2.3 Types of Security Challenges faced by the Library
2.4 The Effect of Security Challenges to the Library
2.5 Causes of Security Challenges in the Library
2.6 Ways to Secure the Library against Security Breaches
2.7 Summary of Literature Review
References
CHAPTER THREE
3.0 RESEARCH METHODOLOGY
3.1 Introduction
3.2 Research Design
3.3 Population of Study
3.4 Sample Size and Sampling Techniques
3.5 Instrument for Data Collection
3.6 Procedure for Data Collection
3.7 Method of Data Analysis
CHAPTER FOUR
4.0 DATA PRESENTATION AND ANALYSIS
4.1 Introduction
4.2 Distribution and Return of Questionnaire
4.3 Distribution of Respondents by Gender
4.4 Educational Qualification of Respondents
4.5 Existence of Security Policy in the Library
4.6 Necessity of Securing Library Resources against Breaches
4.7 Type of Library Security Breaches Perceived in the Library
4.8 Type of Library Materials Vulnerable to Security Breaches
4.9 Measures Used by the Library to Reduce/Address Security Breaches
CHAPTER FIVE
5.0 SUMMARY OF FINDINGS, CONCLUSION AND RECOMMENDATION
5.1 Introduction
5.2 Summary of Findings
5.3 Conclusion
5.4 Recommendations
5.5 Suggested Areas for Further Studies
Bibliography
Appendices
Appendix I – Letter of Introduction
Appendix II – The Questionnaire
Library Resources And Security Challenges. (n.d.). UniTopics. https://www.unitopics.com/project/material/library-resources-and-security-challenges/
“Library Resources And Security Challenges.” UniTopics, https://www.unitopics.com/project/material/library-resources-and-security-challenges/. Accessed 23 November 2024.
“Library Resources And Security Challenges.” UniTopics, Accessed November 23, 2024. https://www.unitopics.com/project/material/library-resources-and-security-challenges/
Here’s a typical structure for Library Resources And Security Challenges research projects:
- The title page of Library Resources And Security Challenges should include the project title, your name, institution, and date.
- The abstract of Library Resources And Security Challenges should be a summary of around 150-250 words and should highlight the main objectives, methods, results, and conclusions.
- The introduction of Library Resources And Security Challenges should provide the background information, outline the research problem, and state the objectives and significance of the study.
- Review existing research related to Library Resources And Security Challenges, identifying gaps the study aims to fill.
- The methodology section of Library Resources And Security Challenges should describe the research design, data collection methods, and analytical techniques used.
- Present the findings of the Library Resources And Security Challenges research study using tables, charts, and graphs to illustrate key points.
- Interpret Library Resources And Security Challenges results, discussing their implications, limitations, and potential areas for future research.
- Summarize the main findings of the Library Resources And Security Challenges study and restate its significance.
- List all the sources you cited in Library Resources And Security Challenges project, following a specific citation style (e.g., APA, MLA, Chicago).