403
Views
1
CrossRef citations to date
0
Altmetric
Articles

Bibliometric analysis of studies on library security issues in academic institutions

, & ORCID Icon

References

  • Ademola, O., Osaze, F. I., Ojeme, P., & Nneka, T. (2015). Library and information resources’ security: Traditional and electronic security measures. International Journal of Academic Research and Reflection, 3(3), 45–56. www.idpublications.org
  • Ajegbomogun, F. O. (2004). Users’ assessment of library security: A Nigerian university case study. Library Management, 25(8/9), 386–390. doi:10.1108/01435120410562880
  • Alansari, H. A. (2011). Career choice, satisfaction, and perceptions about their professional image: A study of Kuwaiti librarians. Library Review, 60(7), 575–587. doi:10.1108/00242531111153597
  • Al-Bastaki, Y., Baqer, M., Herath, A., Herath, S., Al-Mutawah, K., & Goonatilake, R. (2012). E-learning of security and information assurance with sequence diagrams. ACM International Conference Proceeding Series (pp. 19–22). doi:10.1145/2160749.2160754
  • Aria, M., & Cuccurullo, C. (2017). Bibliometrix: An R-tool for comprehensive science mapping analysis. Journal of Informetrics, 11(4), 959–975. doi:10.1016/j.joi.2017.08.007
  • Ben Bassey, A., Sunday Enidiok, M., & Musbau Olalekan, O. (2019). Vandalism and security problems in academic library: A case study of Lagos State Polytechnic Library, Lagos, Nigeria. IP Indian Journal of Library Science and Information Technology, 4(1), 31–36. doi:10.18231/j.ijlsit.2019.009
  • Chen, S. S., Choo, C. Y., & Chow, R. Y. (2006). Internet security: A novel role/object-based access control for digital libraries. Journal of Organizational Computing and Electronic Commerce, 16(2), 87–103. doi:10.1207/s15327744joce1602_1
  • Dai, K. (2011). Secure digital library technology research based on VPN. Proceedings – 2011 International Symposium on Intelligence Information Processing and Trusted Computing, IPTC 2011 (Vol. 3, pp. 165–168). doi:10.1109/IPTC.2011.49
  • Ewing, D. (1994). Library security in the UK. Library Management, 15(2), 18–26. doi:10.1108/01435129410052409
  • Fox, E., & ElSherbiny, N. (2011). Security and digital libraries. In Digital libraries – Methods and applications. Rijeka, Croatia: IntechOpen. doi:10.5772/15762
  • Fuchs, C., & Sandoval, M. (2013). The diamond model of open access publishing: Why policy makers, scholars, universities, libraries, labour unions and the publishing world need to take non-commercial, non-profit open access serious. tripleC: Communication, Capitalism & Critique, 11(2), 428–443. doi:10.31269/triplec.v11i2.502
  • Gomez, R., & Gould, E. (2010). The “cool factor” of public access to ICT: Users’ perceptions of trust in libraries, telecentres and cybercafés in developing countries. Information Technology & People, 23(3), 247–264. doi:10.1108/09593841011069158
  • Gupta, P., & Madhusudhan, M. (2016). RFID technology in libraries: A review of literature of Indian perspective. DESIDOC Journal of Library & Information Technology, 37(1), 58–63. doi:10.14429/djlit.37.1.10772
  • Hamdi, M., & Boudriga, N. (2006). Towards a relational calculus for security library management. GLOBECOM – IEEE Global Telecommunications Conference. doi:10.1109/GLOCOM.2006.298
  • Hirsch, J. E. (2005). An index to quantify an individual’s scientific research output. Proceedings of the National Academy of Sciences of the United States of America, 102(46), 16569–16572. doi:10.1073/pnas.0507655102
  • Hunter, J. (2006). The importance of citation (pp. 1–5). http://web.grinnell.edu/dean/tutorial/EUS/IC.pdf
  • Ifijeh, G. (2014). Adoption of digital preservation methods for theses in Nigerian Academic Libraries: Applications and implications. The Journal of Academic Librarianship, 40(3–4), 399–404. doi:10.1016/j.acalib.2014.06.008
  • Jin, Y. (2004). The development of the China Networked Digital Library of theses and dissertations. Online Information Review, 28(5), 367–370. doi:10.1108/14684520410564299
  • Karunanayaka, K. G. D. A. (2003). Library architecture: Interior security measures as a protective coverage for a library: A study of three university libraries. Journal of the University Librarians’ Association of Sri Lanka, 7, 32–43. http://archive.cmb.ac.lk:8080/research/bitstream/70130/2212/1/DrK003.pdf
  • Kern, C. (2004). Radio-frequency-identification for security and media circulation in libraries. The Electronic Library, 22(4), 317–324. doi:10.1108/02640470410552947
  • Khan, S. A., & Bhatti, R. (2017). Digital competencies for developing and managing digital libraries: An investigation from university librarians in Pakistan. The Electronic Library, 35(3), 573–597. doi:10.1108/EL-06-2016-0133
  • Lwoga, E. T. (2014). Integrating Web 2.0 into an academic library in Tanzania. Electronic Library, 32(2), 183–202. doi:10.1108/EL-06-2012-0058
  • Maidabino, A., & Zainab, A. N. (2011). Collection security management at university libraries: Assessment of its implementation status. Malaysian Journal of Library & Information Science, 16, 15–33.
  • Mamta , & Kumar, V. (2019). Library security tools and techniques: An overview. In Relevance of Ranganathan's philosophy in the 21st century (pp. 155–161). New Delhi: The Bookline. https://www.researchgate.net/publication/333402553_Library_security_tools_and_techniques_an_overview
  • Merete Hagen, J., Albrechtsen, E., & Hovden, J. (2008). Implementation and effectiveness of organizational information security measures. Information Management & Computer Security, 16(4), 377–397. doi:10.1108/09685220810908796
  • Mirghafoori, S. H., Izadi, M. R., & Daei, A. (2018). Analysis of the barriers affecting the quality of electronic services of libraries by VIKOR, FMEA and entropy combined approach in an intuitionistic-fuzzy environment. Journal of Intelligent & Fuzzy Systems, 34(4), 2441–2451. doi:10.3233/JIFS-171695
  • Narang, A. (2011). Securing the future of digital sources. In H. S. Chopra (Ed.), Librarianship in digital era (pp. 488–492). India: Uttam Publishers.
  • Nichols Hess, A., LaPorte-Fiori, R., & Engwall, K. (2015). Preserving patron privacy in the 21st century academic library. The Journal of Academic Librarianship, 41(1), 105–114. doi:10.1016/j.acalib.2014.10.010
  • Nielsen, E. K. (2008). Sharing information: Report on the LIBER library security network (LSN) since 2002. LIBER Quarterly: The Journal of the Association of European Research Libraries, 18(2), 90–100. doi:10.18352/lq.7910
  • Ogbonyomi, A. L. (2011). Security and Crime Prevention in Academic Libraries: A Case Study of the Kano State College of Education, Kano, Nigeria. Library Philosophy and Practice 496, 560–566. https://digitalcommons.unl.edu/libphilprac/496/
  • Osareh, F. (1996). Bibliometrics, citation analysis and co-citation analysis: A review of literature I. Libri, 46(3), 149–158. doi:10.1515/libr.1996.46.3.149
  • Patel, P. (2011). Security of electronic resources: A study of private engineering colleges of Indore city. International Research: Journal of Library & Information Science, 1(Dec), 182–192. https://irjlis.com/security-electronic-resources-study-of-private-engineering-colleges-indore-city/
  • Patil, S. B. (2020). Global library & information science research seen through prism of biblioshiny. Studies in Indian Place Names, 40(49), 157–170. https://www.researchgate.net/profile/Sb-Patil-2/publication/339973834_Global_Library_Information_Science_Research_seen_through_Prism_of_Biblioshiny/links/5e7090a392851c1a689a7dc9/Global-Library-Information-Science-Research-seen-through-Prism-of-Biblioshiny.pdf
  • Rao, P. N. (2012). Design and development of subject gateway for information security. In S. M. Z. A. Achim (Ed.), Dynamics of Librarianship in the Knowledge Society (pp. 425–429). India: BR Publishing Corporation.
  • Rubel, A. (2014). Libraries, electronic resources, and privacy: The case for positive intellectual freedom. The Library Quarterly, 84(2), 183–208. doi:10.1086/675331
  • Shahid, S. M. (2005). Use of RFID technology in libraries: A new approach to circulation, tracking, inventorying, and security of library materials. Library Philosophy and Practice, 8(1), 1–9. https://digitalcommons.unl.edu/libphilprac/62/
  • Singh, J., Brar, N., & Fong, C. (2006). The state of RFID applications in libraries. Information Technology and Libraries, 25(1), 24–32. doi:10.6017/ital.v25i1.3326
  • Small, H. (1973). Co-citation in the scientific literature: A new measure of the relationship between two documents. Journal of the American Society for Information Science, 24(4), 265–269. doi:10.1002/asi.4630240406
  • Srinivasan, M. P., Gnanasekaran, D., & Sasireka, G. (2012). Fox. In Dynamics of librarianship in the knowledge society (pp. 440–453). New Delhi: B.R. Publishing Corporation.
  • Steinhart, G. (2006). Libraries as distributors of geospatial data: Data management policies as tools for managing partnerships. Library Trends, 55(2), 264–284. doi:10.1353/lib.2006.0063
  • Sturges, P., Davies, E., Dearnley, J., Iliffe, U., Iliffe, U., Oppenheim, C., & Hardy, R. (2003). User privacy in the digital library environment: An investigation of policies and preparedness. Library Management, 24(1/2), 44–50. doi:10.1108/01435120310454502
  • Thakre, P. K., Khatarkar, R., & Karaiya, P. (2016). RFID technology in Indian libraries. Indian Journal of Applied Research, 6(4), 155–157.
  • van Eck, N. J., & Waltman, L. (2010). Software survey: VOSviewer, a computer program for bibliometric mapping. Scientometrics, 84(2), 523–538. doi:10.1007/s11192-009-0146-3
  • Wang, J., & Liu, X. (2011). Computer network security of university and preventive strategy. 2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011 (pp. 143–145). doi:10.1109/ICCSN.2011.6014237
  • Yu, S.-C. (2008). Implementation of an innovative RFID application in libraries. Library Hi Tech, 26(3), 398–410. doi:10.1108/07378830810903328
  • Yuvaraj, M. (2016a). Determining factors for the adoption of cloud computing in developing countries: A case study of Indian academic libraries. The Bottom Line, 29(4), 259–272. doi:10.1108/BL-02-2016-0009
  • Yuvaraj, M. (2016b). Perception of cloud computing in developing countries: A case study of Indian academic libraries. Library Review, 65(1/2), 33–51. doi:10.1108/LR-02-2015-0015
  • Zhao, Y. L. (2007). Blue prints for solving the security of the digital library network. Journal of Chengdu University of Technology, 3, 364–368. http://caod.oriprobe.com/articles/20370894/Blue_prints_for_solving_the_security_of_the_digital_library_network.htm
  • Zhao, S. H. (2010). Information resources security of library knowledge transfer under network environment paper. 2010 International Conference on E-Product E-Service and E-Entertainment, ICEEE 2010. doi:10.1109/ICEEE.2010.5660412

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.