[go: up one dir, main page]

Academia.eduAcademia.edu
PREVENTION OF THEFT AND MUTILATION OF LIBRARY MATERIALS AT THE UNIVERSITY OF DAR ES SALAAM LIBRARY Ibrahim Nuhu Athuman B.A (Library and Information Studies) Dissertation University Of Dar es Salaam July, 2019 PREVENTION OF THEFT AND MUTILATION OF LIBRARY MATERIALS ATUNIVERSITY OF DAR ES SALAAM LIBRARY By Ibrahim Nuhu Athuman A dissertation submitted to the Information Studies Programme, University of Dar es Salaam in partial fulfillment of requirements for the degree of Bachelor of Library and Information Studies CERTIFICATION The undersigned certify that the supervisor has read and hereby recommends for acceptance by the University of Dar es Salaam a dissertation entitled: prevention in theft and mutilation of library materials at university of Dar es salaam libraryin partial fulfillment of the requirements for the degree of Bachelor of Library and Information Studies. …………………………………………………. Mr. Matiyas (Supervisor) Date…………………….. DECLARATIONAND COPYRIGHT I, Ibrahim Nuhu Athuman, declare that this dissertation is my own original work and that it has not been presented to any other University for similar or any other degree award. Signature………………………………. This dissertation is copyright material protected under the Berne Convention, the copyright Act 1966 (the copyright is available to works of authors who are nationals of or have their habitual residence in Tanzania) and other international and national enactment, in that behalf, on intellectual property. It may not be reproduced by any means, in full or in part, except for short extracts in fair dealings, for research or private study, critical scholarly review or discourse with acknowledgement, without the written permission of director of undergraduate studies, on behalf of both author and University of Dar es Salaam. DEDICATION This work is dedicated to my lord, Jesus Christ, He has been my strength and my guardian, and his favors enabled me to complete this study successfully. AKNOWLEDGEMENT “Always talks are lighter than actually doing and single stone cannot stand with a pot on it”. This is reflected in this work of collecting different materials from different places and people until I arrived at the end product, where many people have contributed to help me in different stages of this work, it is hard to mention them all, but I wish to thank them all. However, I would like to pay special thanks to the following: First, Special thanks go to my supervisor who is also my instructor Mr. Matiyas, who has been my guidance and use a lot of his time helping me to complete my research. Second, Madam Mizza Alex Fungo from Institute of finance management (IFM) library, the librarian of Institute of Finance Management (IFM) for giving me giving me her time and efforts in making sure I complete this work. Third is my mother, Atwaje Twihuvila Kigahe for encouraging me throughout my studies. Thanks are due to my brother Said Idrisa, my sister Zulfa Nuhu and my friend Airin Kimuya who have encouraged me to work hard during the whole period of my studies at the University of Dar es Salaam. My thanks also should go to my classmates who turned out to be close friends and held very useful discussions. I also extend my sincere appreciations to the Library Staff at UDSM library I visited several times for my research, for their assistance and consultations. Finally, but not least, many thanks to individual respondents with whom I have conducted interviews and who completed questionnaires and gave their views, which were also instrumental in the success of this report. ABSTRACT The objective of this study was to find out the preventions of library materials from theft and mutilation. The main objective of the research was to find out ways to prevent library materials from theft and mutilation at Dr. Wilbert Chagula at university of Dar es Salaam library. The researcher chose Dr. Wilbert Chagula library at university of Dar es Salaam library as a case study. To protect the library materials from theft and mutilations the library security system and the help of library security camera is very important. Library security systems are very useful in Libraries because they reduce the problem of theft and mutilation. Chapter one presents background to the problem, statement of the problem, then the objectives of the study, Research questions, significance of the study, and limitation of the study and definition of key terms. Chapter two presents literature review. Chapter three presents research methodology, study area, data collection methods, population of the study and Sampling techniques used. Chapter four presents data analysis and Chapter five provides summary of findings, conclusion and recommendations. TABLE OF CONTENTS CERTIFICATION i DECLARATIONAND COPYRIGHT ii DEDICATION iii AKNOWLEDGEMENT iv ABSTRACT v LIST OF TABLES viii LIST OF FIGURES ix ABBREVIATION x CHAPTER ONE: INTRODUCTION 1 1.1 BACKGROUND OF THE STUDY 1 1.2 STATEMENT OF THE PROBLEM 1 1.3 Main Objective of the study 2 1.4 Specific objectives 2 1.5 Significance of study 2 1.6 Research question 2 1.7 Scope and Limitation of the study 2 1.8 Definition of terms 3 1.8.1 Library 3 1.8.3 Mutilation 3 1.84 Theft 3 1.85 Security system 3 1.8.6 Electromagnetic library security system 3 CHAPTER TWO: LITERATURE REVIEW 4 2.1 Introduction 4 2.2 Historical background 4 2.3 Literature gap 6 2.4 Summary 6 CHAPTER THREE: RESEARCH METHODOLOGY 7 3.1 Introduction 7 3.2 Research design 7 3.3 Target Population 7 3.4 Methods of data collection 7 3.5 Source of data 8 3.51 Primary data 8 3.5.2 Secondary data 8 3.6 Instruments 8 3.6.1 Observation guide 8 3.6.2 Interview guide 8 3.7 Area of study 9 3.8 Sample size & sampling Techniques 9 3.9 Data quality control 9 3.9.1 Triangulation 9 3.9.2 Data analysis 9 3.9.3 Ethical issues 9 3.10 Scope and limitation 10 3.11 Summary 10 CHAPTER FOUR: DATA PRESENTATION AND INTERPRETATION OF FINDINGS 11 4.1. INTRODUCTION 11 4.2. QUESTIONNAIRE 11 4.3 Demographic information 12 4.4: the usage of the library 14 4.5 Theft and Mutilation of library materials 16 4.6 Causes of theft and Mutilation of library materials 21 4.7 Impact of theft and mutilation of library materials 22 4.8 Suggested Preventive Method to reduce Theft and Mutilation of Library Materials 24 4.8 DATA COLLECTED FROM: OBSERVATION METHOD 26 4.9 DATA COLLECTED FROM: INTERVIEW METHOD 27 4.10 Conclusion 28 CHAPTER FIVE: SUMMARY, CONCLUSSION AND RECOMMENDATIONS 29 5.1 Introduction. 29 5.2 Summary of the findings. 29 5.4 Recommendations 30 REFERENCES 31 APPENDICES 34 LIST OF TABLES Table 1: Questionnaires distributed and responses Table 2: Gender of respondents Table 3: Age distribution Table 4: Years of Experience Table 5: Years of study to students Table 6 : the usage of the library Table 7: Library stock Table 8: photocopy facilities Table 9:is it free or do users have to pay Table 10: students and library staffs experiencing theft and mutilation Table 11: how do you know library materials has been mutilated or stolen Table 12: the ways used by users to steal library materials Table 13:causes of theft and mutilation in your library Table 14: Does mutilation and theft of library materials affects the quality of teaching, learning and research. Table 15: problem when using mutilated materials Table 16: role of photocopying service in reducing theft and mutilation Table 17 the good library system of controlling theft and mutilation Table 18: prevention of theft and mutilation of library materials Table 19: What should be done to the user who has mutilated or steal library material LIST OF FIGURES Figure 4.4.1 the most used library service Figure 4.5.2 how long did it take you to notice that material has been mutilated Figure 4.5.3vulnerable library section Figure 4.5.4: forms of library mutilation Figure 4.5.5, most mutilated or stolen in your library Figure 4.6.1: reasons for someone to steal or mutilate library materials Figure 4.7.2 effect of theft and library mutilation ABBREVIATION CCTV : Closed circuit Television. EM: Electromagnetic. ICT Information Communication Technology RFDI: Radio frequency identification. OPAC: Online public catalogue SPSS: Statistical Package for Social Scientist UDSM: University of Dar es Salaam CHAPTER ONE: INTRODUCTION 1.1 BACKGROUND OF THE STUDY Mutilation and theft of library materials is one of the major problems which affect the provision of services in many libraries, this problem started to exist since users have been able to access the materials, the report of such actions date back to the beginning of library history (Shuman, 1999). All types of libraries are facing the problem of theft and mutilation of library materials, but academic libraries, seem to suffer more than other libraries, which is caused by the popularity and intensive usage of academic libraries by patrons for different purposes (Crayery, 2001). Most of the times theft and mutilation of library materials have been done by library patrons and staff also. The acts are mostly influenced by scarcity of materials, also because some users don’t have enough money to buy books since most of those books are very expensive, poor security system in these libraries is also a reason that contributes to the problem of mutilation and theft of library materials (Ajala, 2008). Prevention of library materials is one of the library’s basic functions, to prevent the library materials from theft and mutilation so that they can be available for use by all users (Udoudoh, 2013). 1.2 STATEMENT OF THE PROBLEM Librarians in all types of libraries desired to serve their users with quality information, academic libraries aim to provide (among other things) quality information for school’s curriculum and to support research needs for students and the faculty (Isebe, 2014). But the problem of theft and mutilation of library materials hinders librarians to achieve such desired goals of providing quality service and satisfying users with their needs. Past research on the topic of mutilation of library materials did not offer the ending solution in selected academic libraries and until now theft and mutilation is still a continuing problem. Theft and mutilation of library materials reduce the quality of library services and also frustration to users as they failto get information they need. (Mwantimwa, 2007). This problem also exists at D.r Wilbert Chagula Library at the present. There is the necessity of finding a solution to this problem so as to improve library services. This study addresses this problem at Dr. Wilbert Chagula library. 1.3 Main Objective of the study The general objective of this study is to find out ways to prevent library materials from theft and mutilation with reference to Dr. Wilbert Chagula at university of Dar es Salaam library. 1.4 Specific objectives To investigate the major causes for which, users steal and mutilate the library materials. To identify various ways used to steal and mutilate library materials To find out the impact of theft and mutilation of library materials in teaching, learning and research at the University of Dar es Salaam. 1.5 Significance of study Findings of this study are expected to create awareness among management and general staff and could be the source for developing an effective library prevention policy on theft and mutilation problem 1.6 Research question What are the major causes of theft and mutilation of library materials? What are the ways used to steal and mutilate library materials? Whatis theimpact of theft and mutilation of library materials in teaching, learning and research activities at the University of Dar es Salaam? 1.7 Scope and Limitation of the study Due to financial constraints and limitation of time given, this study will be conducted at D.r Wilbert Chagula Library at the University of Dar es Salaam. It is also where this researcher is currently based. 1.8 Definition of terms Library Refers to the collection of sources of information and similar resources which is made accessible to a defined community for reference and borrowing Irwin, (1947, 96). Academic library These are libraries which are attached to academic institutions above the secondary school level, these library serves two complementary purposes which are to support the school’s curriculum and research of the students Curzon, S & Jennie Q (2009,11).  Mutilation To cut up, destroy, or alter radically or physically harm as to impair use, notably by cutting off or otherwise disabling a vital part, such as a limb. To destroy beyond recognition, (figuratively) to render imperfect (memidex,2019). 1.84 Theft Is the taking of another person's property or services without that person's permission or consent with the intent to deprive the rightful owner of the property (criminal findlaw,2019) 1.85 Security system Refers to the method by which something is secured through a system of interworking components and devices (Safewise,2018) 1.8.6 Electromagnetic library security system Is the security system that is used for protecting valuable library collections. Its security markers are made of specialized magnetic materials that respond to low-level magnetic fields generated by detection devices at the library exit. The markers are sensitized or desensitized with staff accessories or patron self-checkout devices. A properly desensitized item does not set off the alarm at the EM security gate. If the item has not been desensitized, however, an alarm will sound at the library exit (Bibliotheca,2019) CHAPTER TWO: LITERATURE REVIEW Introduction Literature reviewed in this chapter discusses the problem of theft and mutilation of library materials, causes for mutilation and theft of library materials and the impact of theft and mutilation on library materials. Historical background The library refers to the collection of sources of information and similar resources which is made accessible to a defined community for reference and borrowing Irwin, (1947, 96p). Theft and mutilation of library material have become a serious problem to many libraries, especially in third world countries. Each year the loss of books and periodicals from theft and mutilation in University libraries seriously undermines free access to library materials. theft is a crime of taking a property illegally thus causing a gap or absence of that property. While mutilation is about the damage, cutting or tearing the materials. such as marking inside the book, underlining the sentence or paragraphs, removing pages or cutting pages, removing binding, removing electronic theft devices, or in any other way damaging library materials (Mwantimwa, 2007). Accessing or changing any computer system, network computer program, or data without prior authorization from a Library or Systems official. There are literatures on theft of library materials or loss of resources through theft, different writers have discussed various reasons about loss, theft and mutilation of library materials. According to Bello (1998) who has conducted a study on theft and mutilation in technological university libraries in Nigeria, the writer says that there is a lack of security in many university libraries. Akinfolarin (1994) reports that users take advantage of tiny windows that have no barrier to hinder book passage and throw books outside. To libraries that are not automated it is even easier for students to commit such acts since there are no security systems to detect a mutilated page or a book, some libraries are automated but have the problem of poor electricity supply thus users take advantage of stealing library materials when electric power goes out since the electromagnetic system used to detect library materials would not sense the materials.Some students to remains in the library at the time library is closed for a short break whereby a student who remains inside the library can easily steal and mutilate library materials. Mwantimwa (2007) in his study of mutilation of library materials and its impact on teaching, learning and research in selected academic libraries in Tanzania, he wrote selfishness to be one of the reasons for students to mutilate library materials, he wrote “Others do it because they want to be the only ones in their class who have read that chapter before the final exam, and this is selfish behavior”. (2007,11p)When demands for library materials increases especially at the end of semester during the exams, this state influence this act of selfishness. Lorenzen, M. (1996) on Security issues of academic libraries, andissues concerned with the user dissatisfaction in the library service which can influence the act of theft and mutilation. Mentions also that some users are not familiar with all services provided in the library for example photocopying and scanning, thus they decide to mutilate books or steal them. Adefarati, E.O.(2003) in his study of book theft and mutilation of library collection in tertiary institutions in Nigeria reveals ways users use to steal books from the library is by hiding them in their clothes. In most libraries especially those which do not have electronic security systems which could detect the scanned pages facilitate this act, as users could conceal the materials before getting through the security. Oyesiku (2004) noted borrowing to be one of the ways used by users to steal and mutilate library materials, a user can borrow the material and that is when one gets the opportunity to mutilate a book by tearing off important pages, many librarians are not checking the pages when the book is returned thus a user who has mutilated the material cannot be caught, and also some use this way to steal materials from the library. Theft and mutilation of library materials led to decline of books and other materials to serve users in the library, thus many users became frustrated since they will not find materials they need. According to Mwantimwa (2007) in his study of mutilation of library materials and its impact on teaching, learning and research in selected academic libraries in Tanzania, he noted that“Collection in most academic libraries in Ethiopia is dismally small and yet 93% of these libraries lose too many volumes every year, thus creating shortage of library materials in all type”. (2007,16p). Mutilation and theft of library materials led to cost in time and money and time of its recovery According to Mwantimwa (2007) in his study of mutilation of library materials and its impact on teaching, learning and research in selected academic libraries in Tanzania, he noted that “Replacement costs of lost or damaged material is far more expensive than the original Cost of the item since incidents of mutilations are on the increase and library budgets Cannot afford the consequences of widespread abuse”. (2007,14p) Literature gap Throughout the review of this literatures, it was found out that the main focus of the study was on causes for mutilation and theft but the prevention has not been discussed in depth especially for a library that lacks automated system, and also noted that discussion on solution to these problems have not been addressed satisfactorily in Dr. Wilbert Chagula library at the University of Dar es Salaam. Summary This researcher noted that there are few pieces of literatures in Tanzania that have addressed the issue of theft and mutilation of library materials particularly at the university of Dar es Salaam library. Thus in this chapter the researcher has used some few available literatures which have discussed the problem of theft and mutilation of library materials from other Universities, also researcher has presented the literature gap. CHAPTER THREE: RESEARCH METHODOLOGY Introduction This chapter presents research methodology used to collect data for this work. Kothari (1995) define research methodology as ¨a way to systematically solve the research problem¨. The methodology is presented in the sections below. Research design Research design refers to the set of methods and procedures used in collecting and analysing measures of the variables specified in the research problem (Creswell, 2014). The researcher has used both qualitative and quantitative research design in order to gain a more complete and comprehensive understanding of the research problem. Target Population Targeted population are specific respondents to be involved in the study under some given criteria. Be involved in the study, as respondents will be Library staff, and other users/readers, such as students and lecturers. The reasons for opting such targeted population is that; because these are the main users of the library so in this point it is going to be easier for them to assist the researcher to get the fact information concerning the particular study. Methods of data collection Data can be defined as basic individual items of numeric or other information gathered through observation. Example of data include a sequence of bits, a table of numbers, the characters on a page, the recording of sounds made by a person speaking or a moon rock specimen. Data can be observational, laboratory experimental etc. (Zins, 2007). Inferences based on imaginations cannot provide current answer to research questions. The relevance adequacy and reliability of data determine the quality of the findings of a study; therefore, under this study the researcher expect to use both primary and secondary sources of data. Interviewing method, questionnaires and observation for primary data and the organizational documents for secondary. Source of data Two types of sources of data were used to collect data, namely primary and secondary data, as follows Primary data Refers to an original data source, that is, one in which the data are collected first-hand by the researcher for a specific research purpose or project. In this study primary data was collected in a number of ways. However, the most common techniques were self-administered surveys, interviews and observation, (Salkind, 2010). Secondary data Secondary data was collected through books, journals andiinternet resources, findings were reviewed and major points summarized. Instruments The researcher has used the following instruments to collect data from this study Observation guide The researcher has used observation method, whereby in this method the information was sought through researcher’s own direct observation without asking the respondents. The method helped to observe what was currently happening, for example at the way people were using the service, or at the way staffs were operating different systems and interaction of users with library material. Interview guide The researcher has also used interview method, to interview librarians and users of the library in D.r Wilbert Chagula library at University of Dar es Salaam whereby questions were asked orally using structured questions which were asked face to face between the researcher and respondent. The necessity of this method was that, it helped to obtain more information, where the questions were asked directly by a researcher and answers were obtained from the respondents. Questionnaire guide Through this method a researcher was able get answers to questions by using a form that has questions whereby the form was answered by respondents. This method was very useful when respondents were not easily approachable in their working places, and it was a simple method because it was less expensive, also it was free from bias of the interviews because answers were written in respondents own words. Area of study The study was conducted at Dr. Wilbert Chagula library in the University of Dar es Salaam which is located in Dar es Salaam region, the library was selected because this researcher is based here. Sample size & sampling Techniques Sampling is a strategy which was used to select the small group to represent the whole large population because it is not easy to include all people. In this study convenient sampling was used in D.r Wilbert Chagula library at University of Dar es Salaam. This study selected a number of 35 respondents who are library users, of whom 15 who were library staff and the rest which are 20 were students. Data quality control Data control in this study was fulfilled through the following procedures. Triangulation Triangulation in research is the use of more than one approach to researching a question. The objective is to increase confidence in the findings through the confirmation of a proposition using two or more independent measures. The use of triangulation improves validity and reliability of data collected (Babbie, 1989). Data analysis The data collected from the field were analysed both quantitatively and qualitatively. Content analysis was used to analyse qualitative research and analysis statistical packages for social Scientists (SPSS) were used to analyse quantitative data. Ethical issues The researcher ensures confidentiality of data and the consents were informed concerning the purpose of the study before responding, the questions were structured in a way that helps to avoid embarrassing the consent, also researcher assured respondents that data collected would be used for academic purpose only. Scope and limitation The study focused on the prevention in theft and mutilation of library materials at D.r Wilbert Chagula library. The major limitation was the time given to the researcher in collecting data and financial constraints. Summary This chapter presented the research design, target population and sample size, data collection methods, area of study, sampling technique, data quality control, data analysis, ethical issues, scope and limitation. CHAPTER FOUR: DATA PRESENTATION AND INTERPRETATION OF FINDINGS 4.1. INTRODUCTION The main purpose of this study is to investigate the prevention of theft and mutilation of library materials at Dr. Wilbert Chagula library, Data from this study was collected using the combination of methods namely interview, observation and questionnaire with both open and close ended questions. The results are presented in the form of graphs, tables and description of them. 4.2. QUESTIONNAIRE. Questionnaires were distributed and responses received. The questionnaires were distributed to library staff and students who are library users of Dr. Wilbert Chagula library, as shown in Table below Table 1: Questionnaires distributed and responses. Category Frequency Percentage Response frequency College of social science 9 25.7 9 College of humanity 5 14.3 5 University of Dar es salaam school of law 2 5.7 2 College of engineering and Technology 4 11.4 4 Library staff 15 42.9 15 Total 35 100 35 Source: Field data, July 2019 As shown on the table 1, all questionnaires were returned in total of 35 questionnaires that were distributed to library users, where 20 were for library patrons who were drawn from first to fourth year from four different colleges namely ‘COSS’,’COHU’,’UDSOL’ and ‘COET’, and other 15 questionnaires to library staff from various sections in Dr. Wilbert Chagula library for such as reference, Social Sciences, Law, Science section and East Africana. 4.3 Demographic information Question 1 to Question 4 sought to find out biographical details of respondents in this study, the background information included college(patrons), gender, age, years of experience (library staff), year of study(patrons). 4.3.1 Gender of respondents Respondents who were library users, both library staff and students were asked about their genders, so as to know the gender background of the respondents, the table below illustrates the findings Table 2: Gender of respondents N=35 Category Library staffs Students frequency percentage frequency Percentage Male 7 46.7 10 50 Female 8 53.3 10 50 Total 15 100 20 100 Source, Field data source, July 2019 Table 2 indicates that the number of Female respondents were higher than the number of male respondents, both genders showed the interest in participating whereby out of 35 respondents 17 (49%) were males and the rest 18(51%) were females. 4.3.2 Age distribution Library users were asked to specify their age on questionnaires. Figure below summarizes the result on the respondent’s age, N=35 Table 3:Age distribution Category Library staffs Students frequency percentage frequency Percentage 20-24 years - - 15 75 25-39 years 12 80 5 25 40 years and above 3 20 - - Total 15 100 20 100 Source, Field data July 2019 Table 4: Years of Experience of library staffs, N=15 Category Frequency Percent 1-5 years 6 40 6-10 years 6 40 11-20 3 20 Total 15 100 Source, Field data July 2019. As shown in Table 4, the years of experience of library staff were as follows: Six (40%) of respondent’s years of experience were between 1-5, other six (40%) of respondent’s years of experience were between 6-10 years and other three (20%) were between 11-20 years, it is clear that respondents in this study had a wide range of experiences Table 5: Years of study to students (patrons), N=20 Category Frequency Percent first year 3 16 second year 7 37 third year 5 26 fourth year 4 21 Total 20 100 Source: Field data, July 2019 As shown in table 5, the years of studies of patrons were as follows: Three (16%) students were first year, seven (37%)students were second year’s students, other five (26%) students were third year’s and lastly four students (21%) were in their fourth year. High number of respondents had sufficient experience and familiarity on the issues related to this topic. 4.4: the usage of the library Question 5: to Patrons: How often do you use the library? Table 6 N=20 Category Frequency Percent Every day 16 85 once in a week 2 10 once in a month 1 5 Total 20 100 Source, Field data July 2019. As shown in Table 6, majority of students who were sixteen (85%) use library Every day, two (10 %) use library once in a week and only one (5%) use library once in a month. From these findings it is clear that most of the users use library more frequently, the availability of free network internet service is believed to attract many students to use the library. Question no 6: to patrons Which kind of library service do you use the most? In this question, respondents were asked to choose as many options as applicable by putting a tick from the list of options provided. Answers were as follows Figure 4.4.1 the most used library service N=20 Source, Field data July 2019. As shown in figure 4.4.1 above, five (25%) respondents mostly use internet services in the library, three (20%) respondents use reference services the most and 12 (55%) respondents are use borrowed materials from the library. The results show that out of 20 respondents who were patrons, none of the students use interlibrary loan services or photocopying services. Question no 16: to library staff Is the stock of your library adequate and proportional to the library users? In this question, respondents who are library staffs were asked if the stock fits the total number of users who need the service, the respondents were required to respond to a close ended question (Yes or no): answers were as follows, Table 7: N=15 Category Frequency Percent Yes 13 86.7 No 2 13.3 Total 15 100 Source, Field data July 2019. As shown in Table 7, the majority of respondents who were thirteen (86.7%) library staffs answered “NO”, and two (13.3%) answered Yes. Generally, the stock of Dr. Wilbert Chagula library is not adequate and proportional to library users. This is likely to influence habit of stealing or mutilating the pages of the few relevant material that can be found by the users. Question no: 19: is your library having photocopy facilities In this question addressed library staffs and the results were as follows, Table 8: N=15 Category Frequency percent Yes 15 100 No - - Total 15 100 Source, Field data July 2019. As shown in table 8, all respondents who are library staffs answers “YES”, this finding meant that the library has the photocopy machine, which could help to minimize loss and mutilation. Question no: 21: to library staff Is photocopying service free or do users have to pay? The question was asked to respondents so as to find out if users have to incur cost in order to use the service. Table 9: N=15 Category Frequency Percent Free - - Not free 15 100 Total 15 100 Source, Field data July 2019. As shown in table 9 above, the photocopying service is not for free, whereby the cost of the service can be a limitation for users to use such service, referring to figure 4.4.1 where out of 20 respondents it was found that none of students are using photocopying service can justify cost to be one of the factors that pause the usage of such service. 4.5 Theft and Mutilation of library materials Question no.4 to library staff: do you experience theft and mutilation in your library. Question no.7 to patrons: do you know that there’s theft and mutilation of library materials. These two questions were asked to respondents who are library staff and patrons whereby the questions sought to find out if both users were aware of the existence of the problem, and answers were as follows Table 10: library staffs, N=15 , students, N=20. Category Frequency Percentage Staff students Staff Students Yes 15 20 100 100 No - - - - Total 15 20 100 100 Source, Field data July 2019. As shown in table 10,majority of respondents were found to be aware for the existence of the problem under study whereby in table 10 of library staffs, all 15(100%) respondents says “YES” referring to the presence of theft and mutilation at Dr.Wilbert Chagula library, and students who are the patrons ,all 20 (85%) respondents answers “YES”, Generally from the findings obtained from the field the problem of theft and mutilation was found to exist and many library users are aware of the problem. Question no.5 to library staff: how do you know library materials has been mutilated or stolen in your library? This question was addressed to library staff so as to find out how librarians know that a certain material has been missing in the library or mutilated, the following figure below shows the result Table 11 N=15 Category Frequency Percent when a student is caught at the check point 2 13.3 some students caught by a librarian when stealing 1 6.7 after conducting shelving 3 20 when they can’t find materials needed by users 3 20 through electromagnetic library security system 4 26.7 after conducting library stocktaking 2 13.3 Total 15 100 Source, Field data July 2019. Table 11 shows, two (13.3%) of respondent said they noticed students have mutilated or had stolen a book when a student is caught at the main check point of the library with a library material. one (6.7%) of the respondents said some students were caught by a librarian when stealing, three (20%) of respondents said after conducting shelving. Other three (20%) of respondents said when they can’t find materials needed by users. Four (26.7%) of respondents said through electromagnetic library security system installed at library main checkpoint that alerts when material has not been checked out. And two (13.3%) library staff said after conducting library stocktaking. Question no.9 to library staff: how long did it take you to notice that material has been mutilated? Figure 4.5.2 N=15 Source, Field data July 2019. In response to question 8 that was addressed to library staffs, the findings were as follows as shown in figure 4.5.2. Three (15%) respondents said every two days. Seven (35%) of respondents said one week, two (10%) respondents said two weeks and three (15%) of respondents said one month. Question no.9 to patrons: N=15 In which library section you have noticed mutilation This question was addressed to respondents and it was aimed at finding out the sections in the library that users have noticed mutilated. Responses are summarized in Figure 4.5.3 below Source, Field data July 2019. As shown from figure 4.5.3, eighty (40%) respondents said social science general collection, two (10%) respondents said social science special reserve, two (10%) said science collection, two (10%) said science special reserve. one (5%) said law collection, two (10%) said east Africana and other three (15%) said reference section. Generally, from the findings social science general collection is the most affected section in Dr. Wilbert Chagula library. Question no.6: to library staff, N=15 What type of materials are most mutilated or stolen in your library? On this question, the researcher aims at finding out the library materials which are most mutilated and stolen, and the results were as follows Figure 4.5.5, N=15: Source, Field data July 2019. In response to question number 6 for library staffs as shown in figure 4.5.5, Nine (60) of respondents said books, three (20%) of respondents said Newspaper, one (6.7%) of the respondents said journals, one (6, 6%) of respondents said maps and the last one out of fifteen respondents said thesis, from this findings, it can be seen that books are the most mutilated or stolen library materials. Question no.7: to library staff, N=15 What are the forms of library mutilation? This question was addressed to library staffs and the following forms of mutilation were mentioned as shown on a finding below. Figure 4.5.4:N=15 Source, Field data July 2019. In response to question six, as shown in figure 4.5.4, eight (53.3%) of respondents said by tearing book pages, two (13.3%) respondents said cutting by razor blade, three (20%) respondents said folding page, one (6.7%) said folding pages and other one (6.7%) said staining, generally from this finding, the most used form of mutilation by users is tearing pages of the book, Question no.11: to library staff, N=15 In your opinion, what do you think are the ways used by users to steal library materials? Table 12 N=15 Category frequency percentage concealment 6 40 library personnel collaboration 1 6.7 Remaining in the library when it is closed 3 20 borrowing a book when electricity is not available 5 33.3 Total 15 100 Source, Field data July 2019. In response to Table 12, six (40%) respondents said concealment, five (33.3%) respondents said many users tends to borrow library materials when electricity power is not available so that the electromagnetic security system will not alert, three (20%) and one (6.7) respondent said a student steal by collaborating with library personal whereby a librarian could deactivate the material to escape security alarm. 4.6 Causes of theft and Mutilation of library materials Question no.8 to students (patrons): what do you think is the reason for someone to steal or mutilate library materials? The researcher provided option in a checklist where respondents could identify the reason he or she thinks is appropriate by putting the tick to all that applies in a list of options. And on question number 12 for library staffs, the researcher asked a similar, the aim of the question was to find out the causes of theft and mutilation of library materials, and the findings were as follows, Figure 4.6.1: question No.8 for Patrons, N=20: reasons for someone to steal or mutilate library materials (Source, Field data July 2019) As shown in figure 4.6.1 above, respondents who were students put a tick to multiple reasons that applies, whereby, eleven (55%) students out of 20 says the reason is lack of committed staffs, six(30%) students out of 20 says the reason is lack of good security system, seventeen(85%) respondents says the reason is selfishness, fifteen(75%) respondents propose the reason to be lack of cooperation between staffs and users, only seven(35%) respondents out of 20 thinks the reason is existence of penalty for delay to return books and eighteen(90%) respondents says the reason is shortage of books in the library. Table 13. Question no.12 to library staffs, N=15: What do you think are the mainly causes of theft and mutilation in your library? Category Frequency percent Shortage of library materials 12 80 Poor security measures 10 67 Electric outage 13 87 Selfishness 14 93 Lack of enough photocopying facilities 13 87 Source, Field data July 2019. Table 13, shows that twelve (80%) respondents recognize causes of theft and mutilations to Shortage of library materials, ten (67%) to Poor security measures, thirteen (87 %) Electric outages, fourteen (93%) to selfishness, and other thirteen (87%) to Lack of enough photocopying facilities. From the findings above it shows that the main cause of library theft and mutilations was selfishness, power outages and lack of enough photocopying facilities at Dr. Wilbert Chagula library. 4.7 Impact of theft and mutilation of library materials Question no.10 to Patrons, Mutilation and theft of library materials affects the quality of teaching, learning and research. This question was addressed to library patrons by giving options of answers to respond to, and the following were the result Table 14 N=20 Category Frequency Percent strongly agree 13 65 agree, 7 35 Total 20 100 Source, Field data July 2019. In response to question 9, as shown in Table 14, thirteen (65%) respondents strongly agree, seven (35%) respondents agree, there were no respondents who strongly disagree or disagree, generally as shown from the findings it is clear that theft and mutilation of library has a negative impact on learning, teaching and research. Question no.11 to Patrons What do you think are the effect of theft and library mutilation to Dr. Wilbert Chagula library? This question was addressed to patrons and the following were the result. Figure 4.7.2: N=20 Source, Field data July 2019. In response to question no: 11, as shown in figure 4.7.2; five respondents said delay of information, two (10%) of respondents said shortage of reference materials, five (25%) respondents said cost in terms of time and money, four (20%) respondents said low quality services and frustration, four (20%) respondents said user and library staff dissatisfaction. Question no.13 to Patrons Do you encounter any problem when using mutilated materials? Table 15, N=20 Category frequency Percentage Yes 20 100 No - - Total 20 100 Source, Field data July 2019. As shown in Table 15, all 20(100%) respondents said yes, thus it was found that users face problems when using mutilated materials. 4.8 Suggested Preventive Method to reduce Theft and Mutilation of Library Materials Question no: 20: To library staff How does photocopying service help to reduce theft or mutilation within the library? Table: role of photocopying service in reducing theft and mutilation at Dr. Wilbert Chagula library Table 16: N=15 Category Frequency Percentage it reduce theft and mutilation by providing copy of information needed 3 20 it does not help since there is only one photocopy machine available 10 66.7 it does not help since it is not used at night shift 2 13.3 Total 15 100 Source, Field data July 2019. As shown in Table 16, Ten (70%) respondents out of fifteen who are library staffs answered that the photocopying machine at Dr. Wilbert Chagula does not help to reduce the problem of theft and mutilation because there is only one machine that is available, two (12%) library staffs answered that the machine was not used during night shifts as this can also explain why most of students are not using photocopying service as it was found on figure 4.3.6. Three (18%) library staffs answered that the photocopying services reduce theft and mutilation by providing copy of information needed. From these findings, photocopying service at Dr. Wilbert Chagula does not help to reduce theft and mutilation. Question no.14 to library staff In your opinion, what is the good library system of controlling theft and mutilation of library materials? Table 17, N=15 Category Frequency Percentage Checking in and out at check point 1 6.7 Both electronic and physical security system 7 46.7 Electromagnetic library security system 2 13.3 CCTV camera 5 33.3 Total 15 100 Source, Field data July 2019 In response to question 14, as shown in Table 17, one (6.7%) respondent said checking in and out at check point, seven (46.7%) of respondent said both electronic and physical security system, two(13.3%) said electromagnetic library security system, five(33.3%) said CCTV camera. Question no.16 to Patrons In your opinion what do you think is the solution for prevention of theft and mutilation of library materials? Table 18, N=20 Category frequency Percent Establishment of prevention policy 15 75 More photocopies machine 20 100 More multiple copies of books and other materials 18 90 Provision of electronic security system 16 80 Extension of loan period for student 10 50 Installation of security camera 20 100 Staff should more cautious 15 75 Source, Field data July 2019 As shown in Table 18, fifteen (75%) patrons suggested establishment of prevention policy, twenty (100%) patrons suggested more photocopies machine, eighteen (90%) suggested more multiple copies of books and other materials, sixteen (80%) suggested provision of electronic security system, ten (50%) suggested extension of loan period for student, twenty (100%) suggested installation of security camera and fifteen (75%) suggested staff should be more cautious. Question no.22 to library staff What should be done to the user who has mutilated or steal library material? This question was asked with an aim to find out punishment that could be appropriate to Offenders. And the following were the results Table 19, N=20 Category Frequency Percent paying for replacement 7 35 withdraw from borrowing privileges 3 15 suspended from the library 5 25 facing disciplinary actions. 5 25 Total 20 100 Source, Field data July 2019 From Table 19, seven respondents (35%) suggested paying for replacement, three (15%) suggested withdraw from borrowing privileges, five (25%) suggested suspended from the library and five (25%) suggested facing disciplinary actions. 4.8 DATA COLLECTED FROM: OBSERVATION METHOD The researcher also got various data from observing the situation in the library; I was observing different activities conducted at Dr. Wilbert Chagula library. The following were among the things that I have observed during my research. Library security system In Dr. Wilbert Chagula Library the electromagnetic security system could sometimes alert even to some of users who may not be having any library material, this indicate that the system is not efficient and could even not sense other materials which are taken out illegally. Secondly there CCTV camera near check points but there were no security cameras near shelves where mutilation and theft are taken place as this could tempt someone to steal without fear of not being seen, also the security guards and librarians at the checkpoints are not all cautious to all users as they only check the students but not lectures, staffs or foreigners whereby they could also be involved in mutilation and theft ,In generally the security system at Dr.Wilbert Chagula is not effective. Access to computer In Dr. Wilbert Chagula library I have observed that there very few computers, which are mainly used for searching materials in the library through the use of OPAC (online public access catalog) and there no computers which helps users to use electronic resources, such situation attracts theft and mutilation of library materials The use of Photocopy machine, I observe that there is only one photocopy machine at Dr. Wilbert Chagula library and the service is not offered at all during night shifts but only during day, existence of only one photocopy machine discourage users to use the service, also during the night shift users cannot use the service at all, these situation may tempt a user to steal or mutilate library materials, also the existence of charges for using the service led some of users who wants many copies to steal the books rather than spending the money due to financial constraint. User’s behavior (user’s remaining inside the library when it is closed) I was able to observe user’s behavior and find out how users interact with library system, in Dr. Wilbert Chagula library, many users have the behavior of remaining inside the library when the library it is closed for a while, some librarians are aware of the situation but decide to be ignorant of the situation, such act facilitate user’s to steal and mutilate library materials. Electricity supply I also observe at Dr. Wilbert Chagula library, there is no reliable electric supply or other alternative such as use of generators, whereby poor electric supply is a threat to security of library materials whereby the electric security system depends on electricity supply, thus poor availability of electricity at Dr. Wilbert Chagula attracts some users to use it as advantage to steal library materials by being aware that the electromagnetic system will not be alerting. 4.9 DATA COLLECTED FROM: INTERVIEW METHOD The researcher conducted face to face interview with respondents at Dr. Wilbert Chagula library. Researcher conducted interview with librarians, these questions were asked through the few listed questions concerning the topic. Through interviewing, the answers of the research questions were as follow. Research question no. 1 What are the major causes of theft and mutilation of library materials? The major causes of theft and mutilation of library materials is selfishness, as some people mutilate books because they want to be the only one in their class to read that chapter, poverty is one of the major reasons as many stolen books and mutilated ones are those that are expensive and many users cannot afford them. Also some are stealing so as to avoid coming into the library as these type of users prefer to read in their hostels, also others stole books as a result of inadequate library materials and there are those who steal books due to the short period of loaning by the library. Research question no. 2 What are the ways used to steal and mutilate library materials? in this question, I interview the librarians and the answers was as follows The librarian says that by hiding them under the cloths and laboratory coats, followed by wrapping them up with their notebooks, lack of attention on the part of library staffs and collaboration with librarians to steal library materials is one of the ways used to steal. Research question no. 3 What is the impact of theft and mutilation of library materials in teaching, learning and research activities at the University of Dar es Salaam? The librarians answered the question that Mutilation and theft of library materials is costly to the library as replacement costs of lost or damaged material is far more expensive than the original, also theft and mutilation of library materials reduces the quality of library services thus led to User and library staff dissatisfaction Research question no. 4 Which security system could be useful for Dr. Wilbert Chagula library? This was the research question that this researcher had to ask for the librarians and the answers were as follows: Security cameras in the library is useful as it can be used to record movements and making user afraid to steal or mutilate because they know they are going to be noticed. But electromagnetic security system is also a good system as it can sense library materials when people illegally pass with a material through check point. But also the physical security systems are useful and affordable thus in summary librarians recommended that both security systems could be useful for Dr. Wilbert Chagula library. 4.10 Conclusion In summary different responses of research questions from questionnaire method were presented in figures and tables, data from observation method was also presented and lastly there was interview methods that also presents the answers from research questions that were asked by the researcher. CHAPTER FIVE: SUMMARY, CONCLUSSION AND RECOMMENDATIONS 5.1 Introduction. This is the last chapter that presents summary of the findings, conclusion and recommendations of the research findings. 5.2 Summary of the findings. The study has revealed the effective use of both physical and electronic library security systems as a way of preventing the library materials from theft and mutilation. In order to make the library remain with good quality of services to their user’s efforts should be made to protect the library materials from theft and Mutilations. Based on the presentation and data analysis, theft and mutilation of library materials by users exist in Dr. Wilbert Chagula library, from findings a lot of factors are responsible for theft and mutilation of library materials by users, such as financial constraints that led users to fail purchasing their needed books, secondly is poor security system, short time provided for books borrowed from the library, also inadequate photocopy services. It was noted that the way users use to steal or mutilate library materials are through tearing of relevant pages of books, hiding them under their laboratory cloth, wrap them with their notebooks, collaboration with library staff, folding pages of books so as to prevent the page from closing. Underlining sentences on a book with a pen. The users suggested measures to be put in place to reduce the act of theft and mutilation of library materials such as the provision of more photocopying machines, acquisition of multiple copies of library materials such as books, an extension of loan periods and provision of security cameras. 5.3 Conclusion The results of this study show that the problem of theft and mutilation is costly and destructive to the library materials. Therefore, library management should maintain the security system and buy enough materials so as to discourage theft and mutilation of library materials. 5.4 Recommendations Based on the findings of the study, the following are key recommendations aimed at preventing theft and mutilation of library materials, Creating awareness through user’s education, Users should be given education relating to the problem of theft and mutilation, they should know about the cost and difficulties of replacement of stolen or mutilated materials, also they should be warned that theft and mutilation is a crime. 5.4.2 Install the electronic library security systems, security camera and physical security system, these security systems will help to reduce the problem of theft and Mutilation of Library materials when they are all used in a library. According to my short survey of other libraries I found the libraries which have these security systems do not experience much of this problem. 5.4.3 Photocopy It is recommended that library should buy more photocopy machines. electricity supply It is recommended that library should find an alternative source of power for example use of generators so as to ensure availability of electricity at all time during working hours. Access to computers It is recommended that library should buy more computers in the library so as to improve access to electronic resources. . Establishment of library prevention policy Library should introduce safety and security policy and all librarians should abide by it . REFERENCES Adefarati, E. O. (2003). The effect of pilfering, book theft and mutilation of library collection in tertiary institutions in Nigeria. Nigerian Journal of Library. Adeoye M.O, Oladapo Y.O & Abimbola, M.O (2018). Theft and mutilation of library Materials in special libraries; a case study of lautech medical library,college of Health sciences osogbo, IASET, Edo State Nigeria. Afolabi, M. (1993). Factors influencing book theft and mutilation among library, Users and Staff In Nigeria. Leading Libraries and Information Centre. Vol. 1(3 x 4) p 2-3. Ajayi, N. A and B. O. Omotayo (2004), Mutilation and Theft of Library Materials: Perceptions and Reactions of Nigerian Students SAGE Publications. Retrieved on 'July 2019 from http://idv.sagepub.com/cgi/content/abstract/20/1/61. Akinfolarin, W. (1994). Towards improved security measures in Nigerian University Libraries. African Journal of Library, Archieve and Information Science, 2 (1), 52 – 58. American Reference Books Annual (1970): ARBA. Littleton, Col.: Libraries Unlimited Babbie, E.R (1992), The Practice of Social Research. (ihedn) Belmont, CA: Wodswort Publishing Co. Baker. (1994), Doing Social Science Research, (2nd ed) New York: Mc Graw Hill INC. Bello, M.A (1998), Library Security, Materials Theft and Mutilation in Technological University Libraries in Nigeria: Abubakar Tafawa Balewa University. Library Management, Vol. 19, no. 6. Bennison, N & Leslie, D (2001) “Library security: protecting valuable school resources”, vol.37 Issue &, pg.13. Bibliotheca(2019), Electromagnetic library system ,retrieved from https://www.bibliotheca.com/library-electromagnetic-technology/ on August 7, 2019. Byne-Cope, A. D.( 1989)“Caring books and documents”, 2nd Ed. pg. 30 Chaturvedi, D. D. (1994). Academic libraries. New Delhi: VilcasPublication (Part VII). Collins, Robert L. (1963) “library assistance to readers: west pot”, ,pg 1. Cope, B (1981) ,Caring for Books and Documents, New Amsterdam,Newyork. Crayery B. (2001). The Problem of Library Theft, Why do People Steal from Libraries (pp. 27-28) 2001. http/www.libraryuced.ac.uk. Curzon, S & Jennie Q ( 2009). Academic Libraries. Encyclopedia of Library and Information Sciences.pp. 11–22. doi:10.1081/E-ELIS3-120044525. ISBN 978-0-8493-9712-7. Retrieved August8 ,2019. Criminal FindLaw,(2019) retrieved fron https://criminal.findlaw.com/criminal-charges/theft-overview.html on August 7, 2019. Feather, J (1991) “Preservation and Management of library collections”, pg. Irwin (1947) The national library service of the United Kingdom. London: Grafton& Co.X,96p.Retrievedfromhttps://www.academia.edu/17842143/A_library_is_a_collection_of_sources_of_information_and_similar_resources on August 7, 2019. Isebe, L. E. M. (2014) Causes and effects of theft and mutilation of information materials in academic library services in Delta State. Information and Knowledge Management. Vol. 4, Jama’a, T. J. (1984). Security Threat and Deterrent measure, Bayero University Library, Kothari, C.R (1999), Research Methodology: methods and techniques. New Delhi Wiley Eastern Krishnaswami, R (2003), Methodology of Research in Social Sciences. Bangalore, Himalaya Publishing House. Line, A.J. Book theft and Mutilation International Movement, Vol. 1 No. 3 Lorenzen, M. (1996). Security issues of academic libraries: A seminar paper presented to the faculty of the College of Education, Ohio University. ERIC: IR055938. Memidex (2019) mutilation of library materials, retrieved from http://www.memidex.com/mutilate on August 7, 2019. Mwantimwa, K (2007) mutilation of library materials and its impact on teaching, learning and Research in selected academic libraries in Tanzania. Nwalo K.I. (2003) Fundamentals of library practices: A manual on library routines pp 72-79. Obikoya A. (2004). Theft and Mutilation in special Libraries Nigeria Libraries Vol. 27 and 28 Oyesiku, F. A. (2004). An overview of library security. Nigerian Journal of Library, of Library, Archives and Information Science, 1(1&2), 95e97. Salkind, N(2010), Primary Data Source ,retrieved on July 13, 2019 From https://dx.doi.org/10.4135/9781412961288.n333. Safewise (2018|) what is security system, retrieved from https://www.safewise.com/home-security-faq/how-do-security-systems-work/ on August 7, 2019.Online Publication Date: December 27, 2012Disciplines: Anthropology, Business and Management, Communication and Media Studies, Counseling and Psychotherapy, Criminology and Criminal Justice, Economics, Education, Geography, Health, History, Marketing, Medicine, Nursing, Political Science and International Relations, Psychology, Social Policy and Public Policy, Social Work, Sociology, Technology Print ISBN: 9781412961271 |Online ISBN: 9781412961288 Buy in print Scott, S.H. (2019) the Problem of Theft in Libraries and Strategies for Prevention and Response, San José State University, prevention in theft and mutilation of library pdf. Shuman, A.B. (1999). Library security and safety handbook: Prevention, policies, and Procedures. Chicago: American Library Association. Terfera, J.K. (1996). Standards for Nigerian libraries. Nigerian Libraries 45 2(1):115 Udoudoh,S (2013) Assessment of theft and mutilation of information resources in selected academic libraries in Niger State The International Information & Library review, 44:3, 155- 163, DOI: 10.1080/10572317.2012.10762926. APPENDICES APPENDIX I Questionnaire for Library Staff Dear sir/Madam Iam student persuading Bachelor of Arts in library and information studies at University of Dar es Salaam. Iam conducting a research on prevention of theft and mutilation of library materials at D.r Wilbert Chagula library in order to fulfil requirement for being awarded a degree. The questionnaires will assist a researcher to write the report on solution/suggestion or recommendations on prevention in theft and mutilation of library materials Data collected will be used for academic purpose only, and all responses provided will be treated as confidential. Questionnaire can be completed in few minutes, you’re co-operation is highly encouraged. The researcher would like to thank you in advance for time you will take in assisting him in this regard Instruction: Please fill in the blanks or tick where applicable. Gender Male ( ) Female ( ) Age 20-24 years ( ) 25-39 years ( ) 40 years and above ( ) Years of experience in office 1-5 year ( ) 6-10yrs ( ) 11-20yrs( ) 20years-above( ) Do you experience theft or loss of library materials in your library? Yes ( ) No ( ) How do you know that library material has been stolen in your library? ………………………………………………………………………….. PUT A TICK TO ALL THAT APPLIES What type of materials that are mostly stolen...? Books ( ) Newspaper ( ) Journals ( ) Periodicals ( ) Maps ( ) Thesis ( ) What are the forms of library mutilation? Is there any security system to prevent materials in your library? Yes ( ) No ( ) In your opinion, what do you think are the ways used by users to steal library materials? …………………………… What do you think are the mainly causes of theft and mutilation in your library? What measures do you take or your library takes for the stolen books or mutilated o library materials? ………….. In your opinion what is the good security system of controlling theft of library materials? checking in and out at check point ( ) Both electronic and physical security system ( ) security guards ( ) Electromagnetic library security system( ) cctv camera ( ) Other…… Is the stock of your library adequate and proportional to the library user? • Yes ( ) • No ( ) Who is responsible at the check points in your Library? library assistant principle library assistant Academic staff Security guards Both categories Other…………….. Is your library having photocopy facilities? • Yes ( ) • No ( ) If yes how does it help to reduce theft or mutilation within the library? Is photocopying service free or users have to pay? What should be done to the user who has mutilated or steal library material? ………………………………………………………………………………… Questionnaire for Students Dear Respondents Iam student persuading Bachelor of Arts in library and information studies at UDSM. Iam conducting a research on prevention of theft and mutilation of library materials at D.r Wilbert Chagula library in order to fulfil requirement for being awarded a degree. The questionnaires will assist a researcher to write the report on solution/suggestion or recommendations on prevention in theft and mutilation of library materials.Data collected will be used for academic purpose only, and all responses provided will be treated as confidential. Questionnaire can be completed in few minutes. The researcher would like to thank you in advance for time you will take in assisting him in this regard. Instruction: Please fill in the blanks or tick where applicable. Name of college ………………… Gender …… Age 20-24 years { } 25-29 years { } 30-34 years { } 35-39 { } Year of study First year { } Second year { } Third year { } Fourth year { } How often do you use library? a) Every day. { } b) Every week { } c) Every month { } d) Never { } Which kind of library service do you use the most internet service { } lend materials { } use reference service { } interlibrary loan service photocopying service { } Do you know that there is theft and mutilation of library materials? a) Yes { } b) No { } What do you think is the reason for someone to steal or mutilate library materials? a) Lack of committed staff { } b) Lack of good security system { } c) Lack of photocopy facilities { } d) Lack of cooperation between library staff and users { } e) Existence of penalty for delay to return the book { } h) Other (specify)……………………………………………………………………... …………………………………………………………… In which library section you have noticed mutilation Social Science General Collection Social Science Special Reserve Science Collection Other (specify 10 .Mutilation and theft of library materials affects the quality of teaching, learning and research. Strongly agree Agree Strongly disagree Disagree Don’t know 11. What do you think are the effect of library mutilation and theft on teaching, learning and research? Delay of information Shortage of reference materials Other (specify) 12 .What should be done to the students caught mutilating or stealing library materials? Suspended Expelled Withdraw from using the library Others (specify)…………. 13 Do you encounter any problem when using mutilated material? a) Yes { } b) No { } 14 Have you ever remained in the library when it has been closed? a) Yes { } b) No { } 15 In your opinion what do you think is the solution for prevention of theft and mutilation library materials? APPENDIXII OBSERVATION GUIDELINES ACTIVITIES AND FACILITIES AMOUNT LOCATION Electronic security system Use of library service Library materials Access to computers Photocopy Machines User behavior APPENDIX III Interview guide for key library staff informants INTERVIEW GUIDE FOR UNIVERSITY OF DAR-ES-SALAAM LIBRARY MANAGEMENT STAFF What are the major causes of theft and mutilation of library materials? What are the ways used to steal and mutilate library materials? Whatis theimpact of theft and mutilation of library materials in teaching, learning and research activities at the University of Dar es Salaam? Which security system could be useful for Dr. Wilbert Chagula library? 2