References
- Commings , J. L. 1973 . “A year of electronic security” . Australian Library Journal , 22 ( 4 ) : 142 – 148 .
- Gouke , M. N and Murfin , M. 1980 . “Periodical mutilation: the insidious disease” . Library Journal , 105 : 1795 – 97 .
- Gregson , Mick and Hocking , Allison . 1995 . “Theft and damage in an academic library: the student experience” . Journal of Librarianship and Information Science , 27 ( 4 ) : 191 – 192 . 197
- Knight , N. H. 1979 . “Theft detection systems for libraries revisited; an updated survey” . Library Technology Reports , 15 : 234
- Scott , B. A. 1980 . “Waging the war against crime in Florida's public libraries” . Library & Archival Security , 3 : 27 – 30 .
- Strassberg , R. 1997 . “The final barrier; Security consideration in restricted access reading rooms” . Reference Librarian , 56 : 95 – 105 .