331
Views
0
CrossRef citations to date
0
Altmetric
Articles

How a “fine regime” of an unacceptable user behaviour policy affects library use: nudging or shoving?

ORCID Icon

References

  • Adekunle, F. A., Adekunjo, O. A., & Unuabor, S. O. (2018). Theft and vandalism: Effect and control mechanism on information resources in Academic Libraries in Osun State, Nigeria. IOSR Journal of Humanities and Social Science, 23(7), 71–78.
  • Akor, P. U. (2013). Security management for prevention of book thefts in university libraries: Case study of Benue State University Library, Nigeria. Library Philosophy and Practice (e-Journal), 9(5), 23–28. Retrieved from http://www.digitalcommons.unl.edu/libphilprac/995.
  • Alao, I. A. (2002). Students and overdue books in a medical library. Journal of Medical Library Association, 90 (3), 294–297.
  • Anleu, S. R. (2020). Sociology of deviance and criminal law. In M. Hirsch & A. Lang (Eds.), Research handbook on the sociology of law. Cheltenham: Edward Elgar Publishing.
  • Arndt, D. A. Jr. (2001). Problem patrons and library security. Legal Reference Services Quarterly, 19(1–2), 19–40. doi:10.1300/J113v19n01_03
  • Balcom, B. (2010). Problem patrons in the library: A review of library code of conduct policies (Doctoral dissertation). State University of New York Empire State College.
  • Boss, R. W. (1984). Collection security. Library Trends, 33 (1), 39–48.
  • Brunner, R. D. (2005). Adaptive governance: Integrating science, policy, and decision making. New York: Columbia University Press.
  • Burrows, J., & Cooper, D. (1992). Theft and loss in UK libraries: A national survey (pp. 47–63). London: Home Office Police Research Group.
  • Cavadino, M., & Dignan, J. (2007). The penal system: An introduction (4th ed.). London: SAGE.
  • Chattoo, C. (2002). The problem patron: Is there one in your library? The Reference Librarian, 36(75–76), 11–22. doi:10.1300/J120v36n75_03
  • Clark, D. N. (1997). Strategic management tool usage: A comparative study. Strategic Change, 6(7), 417–427. doi:10.1002/(SICI)1099-1697(199711)6:7<417::AID-JSC281>3.0.CO;2-9
  • Clark, R. (1980). Crime prevention situations. Chicago, IL: University of Chicago.
  • Clinton, M. (1972). Study of the effects of fines upon circulation. Canadian Library Journal, 29, 248–252.
  • CMAL. (2003). Security in museums, archives and libraries – A practical guide. London: The Council for Museums, Archives and Libraries.
  • Colorado College. (2003). New! No fines, Tult library newsletter: Special student service edition. Retrieved from http://www.coloradocollege.edu/library/About/Newsletter/News/003St.Ed.html.
  • Denzin, N. K. (1970). Rules of conduct and the study of deviant behavior. In J. D. Douglas (Ed.), Deviance and respectability (pp. 120–159). New York: Basic Books.
  • Devine, J. (1996). Maximum security: The culture of violence in inner-city schools. Chicago, IL: University of Chicago Press.
  • Ekere, J. N., & Akor, P. U. (2019). The use of ICT for security and theft prevention in two university libraries in Nigeria. Library Philosophy and Practice, 1–40. Retrieved from https://core.ac.uk/download/pdf/215162249.pdf.
  • Fasae, J. K., & Adedokun, F. O. (2016). Abuse of information materials in academic libraries by students of tertiary institutions in Ekiti-State, Nigeria. Library Philosophy and Practice (e-journal). Retrieved from http://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=3952&context=libphilpra.
  • Flood, A. (2008). For and against library fines. Guardian, 18 August. Retrieved from http://www.guardian.co.uk/books/booksblog/2008/aug/18/forandagainstlibraryfines?INTCMP=SRCH.
  • Gass, S. (2004). Library fines to increase in July 2004. Massachusetts Institute of Technology. Retrieved from http://Web.mit.edu/newsoffice/2004/library-0512.html.
  • Hacker, K. L., Goss, B., Townley, C., & Horton, V. J. (1998). Employee attitudes regarding electronic mail policies: A case study. Management Communication Quarterly, 11(3), 422–452. doi:10.1177/0893318998113004
  • Harrison, K. C. (1973). First steps in librarianship: Student guide (pp. 99–100). London: Andre Deutsch.
  • Harte, K. (2006). The case for a written collection development policy: The community legal centre library. Australian Law Librarian, 14, 31.
  • Helper, K. R. (1993). Kreimer v. Bureau of Police for Morristown: The sterilization of the local library. Stetson Law Review, 23, 521.
  • Hudson, B. (2003). Justice in the risk society. London, England: SAGE.
  • Ifidon, S. E., & Ifidon, E. (2007). Basic principles of research methods. Benin City: Good news Express Communications.
  • Isebe, L. M. (2014). Cause and effects of theft and mutilation of information materials in academic library services in delta state. Information and Knowledge Management, 4(10), 76–82.
  • Jackson, M. (1991). Library security: Facts and figures. Library Association Record, 93, 380–384.
  • Jayaram, R. (1988). An investigation into the needs and attitudes of student library users with special reference to the University of Durban-Westville. Durban: University of Durban-Westville.
  • Kayne, R. A. (2009). Aspergers and behaviours. Retrieved from www.Questia.com/child.psychology.
  • Lieu, J., Virla, D. A., Abel, R., & Fitzpatrick, C. (2019). Consensus Building in Engagement Processes for reducing risks in developing sustainable pathways: Indigenous interests as core elements of engagement. In H. Doukas, A. Flamos, & J. Lieu (Eds.), Understanding risks and uncertainties in energy and climate policy: Multidisciplinary methods and tools towards a low carbon society. London: Springer.
  • Lieu, A., Allard, D., & Oliphant, T. (2019). The “customer” is not always right: Third-party sexual harassment in libraries. Proceedings of the Annual Conference of CAIS/Actes du congrès annuel de l'ACSI.
  • Lim, V., Teo, T., & Loo, G. L. (2002). How do I loaf here? Let me count the ways. Communications of the ACM, 45(1), 66–70. doi:10.1145/502269.502300
  • Loch, K. D., Conger, S., & Oz, E. (1998). Ownership, privacy and monitoring in the workplace: A debate on technology and ethics. Journal of Business Ethics, 17(6), 653–663. doi:10.1023/A:1005720606763
  • McGrath, H., & Goulding, A. (1996). Part of the job: Violence in public libraries. New Library World, 97(3), 4–13. doi:10.1108/03074809610115663
  • McKechnie, L. E. F., French, P., Goodall, G. R., Kipp, M., Paquette, D. L., & Pecoskie, J. L. (2004). Covered beverages now allowed: Public libraries and book superstores. Canadian Journal of Information and Library Science, 28 (3), 39–51. doi:10.29173/cais331
  • McNeil, B., & Johnson, D. (1996). Patron behaviour in libraries: A handbook of positive approaches to negative situations. Chicago, IL: American Library Association.
  • Mirchandani, D., & Motwani, J. (2003). Reducing internet abuse in the workplace. SAM Advanced Management Journal, 68(1), 22–26.
  • Mitchell, W. B., & Smith, F. W. (2005). Using rewards to minimize overdue book rates. Journal of Access Services, 3(1), 47–52. doi:10.1300/J204v03n01_04
  • Nahak, S. (2020). The liability of criminal law towards a notary official in the crime of embezzlement at the Denpasar District Court. NOTARIIL Jurnal Kenotariatan, 5(2), 107–117. doi:10.22225/jn.v5i2.2572
  • Obiagwu, M. C. (1992). Library abuse in academic institutions: A comparative study. International Information & Library Review, 24(4), 291–305. doi:10.1080/10572317.1992.10762301
  • Office of Juvenile Justice and Delinquency Prevention. (1999). Juvenile offenders in residential placement 1997. Fact Sheet #96. Washington, DC: Author.
  • Ogbodo, J. C. (2002). Problematic language communication as an index to retardation in national development. In E. Otagburuagu & P. A. Anyanwu (Eds.), Concepts and issues in language studies. Owerri: Springfield Publishers Ltd.
  • Okotore, K. (1991). Misuse of library materials at the Oyo State College of Education Library. Nigerian Library and Information Science Review, 9(1), 16.
  • Pease, B. (1995). Workplace violence in libraries. Library Management, 16(7), 30–39. doi:10.1108/01435129510093764
  • Pedersen, T. L. (1990). Theft and mutilation of library materials. College & Research Libraries, 5(2), 120–128.
  • Perez, C., Cuadrado, M., & Cervera, A. (2009). Understanding university library users' mistreatment of books. The Journal of Academic Librarianship, 35(2), 177–183. doi:10.1016/j.acalib.2009.01.007
  • Pierce, M. A., & Henry, J. W. (2000). Judgements about computer ethics: Do individual, co-worker, and company judgements differ? Journal of Business Ethics, 28(4), 307–322. doi:10.1023/A:1006324404561
  • Pillay, S., Ramphul, N., Dorasamy, N., & Meyer, D. (2018). Predictors of whistle-blowing intentions: An analysis of multi-level variables. Management & Society, 50(2), 186–216.
  • Poll, B. (1959). The motivation of library fines. Wilson Library Bulletin, 34, 422.
  • PUAUB. (2014). Policy on unacceptable behaviour and unacceptable use of library facilities. Retrieved from https://www.fnu.ac.fj/wp-content/uploads/2020/03/Policy-on-Unacceptable-Behaviour-and-Unacceptable-Use-of-Library-Facilities.pdf.
  • Quinsee, A. G., & McDonald, A. C. (Eds.). (1991). Security in academic and research libraries. Proceedings of Three Seminars Organised by SCONUL and the National Preservation Office, British Library, London, December 1989 and February 1990. University Library.
  • Raji, R. E., Oyedum, G. U., Akor, P. U., & Abu, A. A. (2017). Book theft as a factor affecting lending services to students in two states university libraries in north-central Nigeria. Journal of Applied Information Science and Technology, 10(3), 41–47.
  • Rodhain, F., & Agarwal, R. (2001). Le message électronique: Une propriété privée? Perception des salariés quant à la propriété de leurs courriels et au respect de leur vie privée sur le lieu de travail. SystèMes D’Information et Management, 6(4), 49–72. Retrieved from https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1389&context=sim.
  • Rubin, R. J. (2011). Defusing the angry patron (citing Guidelines for the Development of Policies and Procedures Regarding User Behavior and Library Usage, Am. Library Ass’n (1993, rev. 2005). Retrieved from http://www.ala.org/advocacy/intfreedom/statementspols/otherpolicies/guidelines/development
  • SCONUL. (2003). New guidelines to safeguard collections in UK museums, archives and libraries. SCONUL Newsletter, 29, 101.
  • Seteras, I. (1999). Fines for overdue books at the library of the Norwegian School of Economics and Business Management: Experience after the first year. Synopsis, 28(5), 292.
  • Sewdass, P., & Kaniki, A. M. (1995). Analysis of book theft at the University of Durban-Westville library. South African Journal of Library & Information Science, 63(4), 206–212.
  • Shontz, D. (1999). Effect of fines on length of checkout and overdues in a medical library. Bulletin of the Medical Library Association, 87(1), 82.
  • Skinner, Q. (2005). On intellectual history and the history of books. Contributions to the History of Concepts, 1(1), 29–36.
  • Smith, J. M. (1968). A chronology of librarianship. Metuchan, NJ: Scarecrow Press.
  • Smith, J. C. (1979). The law of theft. 4th ed. London: Butterworths.
  • The Council for Museums, Archives and Libraries. (2003). Security in museums, archives and libraries – A practical guide. London: The Council for Museums, archives and Libraries.
  • Tioco, N. F. (1969). Financing Libraries. Philippine Library Association Bulletin, 34 (1&2), 59.
  • Towner, L. W. (1983). An end to innocence: [Wide-spread book theft by staff and scholars]. American Libraries, 19(3), 210–213.
  • Turner, A. M. (2004). It comes with the territory: Handling problem situations in libraries (Rev. ed.). Jefferson, NC: McFarland.
  • Udoudoh, S. J. (2012). Assessment of Theft and Mutilation of Information Resources in Selected Academic Libraries in Niger State. International Information & Library Review, 44(3), 155–163. doi:10.1080/10572317.2012.10762926
  • Utah Code Title. (2004). Offenses against property pertaining library. Library Philosophy and Practice. Retrieved from http://unllib.unl.edu/LPP/utahcode.htm.
  • Walker, Colvin Ramsey,(1995). Addressing antisocial behaviour in the schools: A call for action. Retrieved from https://kuscholarworks.ku.edu/bitstream/handle/1808/10883/addressingantisocialbehavior.pdf;sequence=1.
  • Walker, H. M., Colvin, G., & Ramsey, E. (1995). Antisocial behaviour in school: Strategies and best practices. Pacific Grove, CA: Brookes/Cole.
  • Watstein, S. (1983). Book mutilation: An unwelcome by product of electronic security systems. Library & Archival Security, 5(1), 11–33. doi:10.1300/J114v05n01_02
  • Wellinger, P. (1997). Workplace violence: Is your library at risk? Colorado Libraries, 23(1), 16–18.
  • Zedner, L. (2004). Criminal justice. Oxford, England: Oxford University Press.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.