Skip to main content
Log in

Securing the information systems of libraries and the influence of tech-skills of librarians and users

  • Published:
Education and Information Technologies Aims and scope Submit manuscript

Abstract

Advances in Information and Communication Technology have significantly affected the way information is acquired, processed, stored, retrieved, communicated as well as secured. This has changed the way Librarians handle and secure information systems while users are expected to have some level of information and communication technology skills to access and utilize information systems to their full benefits. This study investigated the influence of tech-skills of librarians and users in securing the information systems of selected Nigerian University libraries, employing multiple regression as well as mean and standard deviation involving a survey of 48 librarians and 44,508 registered users of purposively selected university libraries in South-west Nigeria. The study established that most librarians have basic information technology skills but are poor at advanced skills, furthermore, library users also have basic IT knowledge and skills but most users are fairly skillful at advanced information technology.Basic information technology skills of librarians did not significantly influence information systems security, whereas advanced information technology skills does.On users basic information technology skills, there is significant inverse influence on information systems securitywhile advanced information technology skills of users had significant positive influence on information systems security.The result also revealed that there was significant joint influence of basic and advanced information technology skills of librarians and users on information systems security. The study concludes that it is pertinent that librarians have advance skills in order to ensure secure information systems. The paper recommends structured training and capacity building initiatives to re-tool and up skill librarians.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Abelein, U., & Paech, B. (2015). Understanding the influence of user participation and involvement on system success–a systematic mapping study. Empirical Software Engineering, 20(1), 28–81.

    Article  Google Scholar 

  • Adedoyin, S. O. (2005). Information and communication technology (ICT) literacy among the staff of Nigeria university librarians. Library Review, 54(4), 257–266.

    Article  Google Scholar 

  • Adedoyin, S. O. (2006). ICT literacy among the staff of West African University Libraries.A comparative study of Anglophone and francophone countries. The Electronic Library, 24(5), 694–705.

    Article  Google Scholar 

  • Adewole-Odeshi, E. (2014). Attitude of students towards e-learning in south-west Nigerian universities: An application of technology acceptance Model. Library Philosophy and Practice (e-journal), 1035. Retrieved from http://digitalcommons.unl.edu/libphilprac/1035. Accessed 6 Feb 2018.

  • Ajidahun, C. O. (2007). The training, development and education of library manpower in information technology in university libraries in Nigeria. World libraries, 17(1). Retrieved from http://ojsserv.dom.edu/ojs/index.php/worldlib/issue/view/5. Accessed 4 Feb 2018.

  • Ansari, M. N. (2013). ICT skills proficiency of library professionals: A case study of universities in Karachi, Pakistan. Chinese Librarianship: An International Electronic Journal, 36. Retrieved from http://www.iclc.us/cliej/cl36ansari.pdf. Accessed 28 Jan 2018.

  • Asogwa, B. E. (2013). Electronic government as a paradigm shift for efficient public services: Opportunities and challenges for Nigerian government. Library Hi Tech, 31(1), 141–159.

    Article  Google Scholar 

  • Bansode, S. Y., & Viswe, R. R. (2015). Exploring ICT literacy among library professionals working in University Libraries in Marathwada region. International Journal of Digital Library Services. Retrieved from www.ijodls.in. Accessed 4 Feb 2018.

  • Educational Testing Service (ETS) (2007). Digital transformation: A framework for ICT literacy: A report of the international ICT literacy panel. Retrieved from http://www.ets.org/Media/Tests/Information_and_Communication_Technology_Literacy/ictreport.pdf. Accessed 4 Feb 2018.

  • Fox, R. (2006). Vandals at the gates.OCLC Systems & Services: International digital library. perspectives, 22(4), 249–255.

    Google Scholar 

  • Gerolimos, M., & Konsta, R. (2008). Librarians’ skills and qualifications in a modern informational environment. Library Management, 29(8/9), 691–699. Retrieved from https://www.emeraldinsight.com/doi/full/10.1108/01435120810917305. Accessed 6 Feb 2018.

    Article  Google Scholar 

  • Ismail, R., & Zainab, A. N. (2011). Information systems security in special and public libraries: An assessment of status. Malaysian Journal of Library & Information Science, 16(2), 45–62.

    Google Scholar 

  • Kari, H. K. (2006). The academic librarian and the internet: A survey, attitude and impact in Nigerian universities. Asian Journal of Information Technology, 5, 1076–1081. Retrieved from http://medwelljournals.com/abstract/?doi=ajit.2006.1076.1081. Accessed 6 Feb 2018.

    Google Scholar 

  • Lamont, M. (2009). Gender, technology & libraries. Information Technology & Libraries, 28, 137–142.

    Article  Google Scholar 

  • Liu, W &Cai, H. (2013). Embracing the shift to cloud computing: Knowledge & skills for systems librarians. OCLC Systems & Services: International Digital Library Perspectives 29 (1), 22–29.

  • Lwoga, E. T., Sife, A. S., Busagala, L. S. P., &Chilimo, W. (2016). The role of universities in creating ICT awareness, literacy and expertise: Experiences from Tanzanian public universities.

    Google Scholar 

  • Mathew, K. S., & Baby, M. D. (2012). Developing technology skills for academic librarians: A study based on the universities in Kerala, India. Library Philosophy and Practice. Retrieved from http://unllib.unl.edu/LPP/. Accessed 28 Jan 2018.

  • Nkamnebe, E. C., Okeke, I. E., Udem, O. K., & Nkamnebe, C. B. (2015). Extent of information and communication technology skills possessed by librarians in university libraries in Anambra state, Nigeria. Information and Knowledge Management, 5(9) Retrieved from http://www.iiste.org/journals/.

  • Nonthacumjane, P. (2011). Key skills and competencies of a new generation of LIS professionals. IFLA Journal, 37(4), 280–288. Retrieved from. https://doi.org/10.1177/0340035211430475.

    Article  Google Scholar 

  • Ramesh, B., Vinayagamoorthy, P., & Gopalakrishnan, S. (2007). ICT skills among librarians in engineering educational institutions in Tamil Nadu. DESIDOC Bulletin of Information Technology, 27(6), 55–64.

    Article  Google Scholar 

  • Ramim, M., & Levy, Y. (2006). Securing e-learning systems: A case of insider cyber-attacks and novice IT management in a small university. Journal of Cases onInformationTechnology, 8(4), 24–34.

    Article  Google Scholar 

  • Reilly, S. (2012). The role of libraries in supporting data exchange. In World library and information Congress: 78th IFLA General Conference and Assembly, Helsinki. Retrieved from http://conference.ifla.org/past-wlic/2012/116-reilly-en.pdf. Accessed 6 Feb 2018.

  • Sabzwari, M. N., Bhatti, R., & Ahmed, B. (2012). ICT skills and computer self-efficacy of research students: The case of institute of pure & applied biology and biotechnology, Bahauddin Zakariya University, Multan, Pakistan. Library Philosophy and Practice. Retrieved from http://digitalcommons.unl.edu/libphilprac/. Accessed 4 Feb 2018.

  • Schneckenberg, D. (2010). Overcoming barriers for eLearning in universities—Portfolio models for eCompetence development of faculty. British Journal of Educational Technology, 41(6), 979–991.

    Article  Google Scholar 

  • Selwyn, N. (2009). The digital native–myth and reality.In Aslib proceedings (Vol. 61, No. 4, pp. 364–379). Emerald Group Publishing Limited.

  • Skulmoski, G. J., & Hartman, F. T. (2010). Information systems project manager soft competencies: A project-phase investigation. Project Management Journal, 41(1), 61–80.

    Article  Google Scholar 

  • Spears, J. L., & Barki, H. (2010). User participation in information systems security risk management. MIS Quarterly, 34(3), 503–522 Retrieved from http://aisel.aisnet.org/misq/vol34/iss3/8/.

    Article  Google Scholar 

  • Togia, A. & Tsigilis, N. (2010). Awareness and use of electronic information resources by education graduate students: preliminary results from the Aristotle University of Thessaloniki. Retrieved from http://eproceedings.worldscinet.com/9789814299701/9789814299701_0058.html. Accessed 6 Feb 2018.

  • Wilson, M., Scalise, K., & Gochyyev, P. (2015). Rethinking ICT literacy: From computer skills to social network settings. Thinking Skills and Creativity, 18, 65–80.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Benedict O. I. Okike.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix 1

1.1 Questionnaire on influence of information technology skills of librarians on information systems security

Dear Respondent,

Thank you for your willingness to answer this survey, which focuses on librarians information technology skills as if affects the information systems security. The information you will provide is specifically for the purpose of research and, will be treated confidentially.

Kind Regards

1.2 Section A: Demographic data

  1. 1.

    University:___________________________________________________

  2. 2.

    Section /Division: ______________________________________

  3. 3.

    Gender: Male {} Female {}

  4. 4.

    Age(in years): 20–29{} 30–39{}40–49{} 50 and above {}

  5. 5.

    Religion: Christianity {} Islam {} African Traditional Religion {}

  6. 6.

    Marital Status Single () Married() Divorced() Separated()

  7. 7.

    Academic qualification. BSc/BA/LLB/MBBS () MSc/MA() PhD ()

  8. 8.

    Years of Work Experience: <5() 5–10 () 11–15() 16–20 () > 20 ()

1.3 Section B: Information technology skills

  1. 9.

    Please indicate how adequately you can performany of the following tasks for each of the identified areas of technology skills. Please tick as appropriate: (). 1 Strongly Disagree; 2 Disagree; 3 Agree; 4 Strongly Agree

Items

SD

D

A

SA

I understand the basic functions of computer hardware components such as the CPU, monitor, keyboard, and file storage.

    

I can find and start a program.

    

I can navigate between programs.

    

I can save files to the hard drive or removable storage, such as a CD or flash drive.

    

I can exit or quit an application.

    

I can shut down a computer properly.

    

I can locate a website given the address.

    

I can download and save files, such as graphics, documents, or PDFs, from the Internet.

    

I can download and install software from the Internet.

    

I can install and update antivirus software.

    

I can search the electronic catalogue(OPAC) through the author, title and shelf searches.

    

I can use client/server database design tool.

    

1.4 Information technology skills scale

  1. 10.

    Please rate your information technology skills: 5 Very good; 4 Good; 3 Average; 2 Poor; 1 Very Poor

Skills set

Very good

Good

Average

Poor

Very poor

I am good in locating and starting a program in a computer.

     

I am good in saving files to the hard drive or removable storage, such as a CD or flash drive

     

I am good in navigating between computer programs

     

I am good in downloading and saving files, such as graphics, documents, or PDFs, from the Internet

     

I am good in downloading and installing software from the Internet

     

I am good in different Programming Languages (Visual Basic, Java, C#, C, C++, SQL, etc)

.

    

I am good in installing and updating antivirus software

     

I am good in networking (LAN Administration, Network Design, Network Security, and Network Management)

     

I am good in Searching the electronic catalogue(OPAC) through the author, title and shelf searches

     

I am good in using an open source codes and troubleshooting of codes

     

I am good in using Boolean operators in searching for information

     

I am good in computer hardware/software installation, maintenance and problem determination, deliver training.

     

I am good in using advanced programming and knowledge of hardware/software architecture to design and build software.

     

1.5 Section C: Threats of information system security

  1. 11.

    Please tick as appropriate: ().1 Strongly Disagree; 2 Disagree; 3 Agree; 4 Strongly Agree

Item

SD

D

A

SA

I have witnessed a threat in our information system in the past.

    
  1. 12.

    I have witnessed these threats as regards to various information systems in my library. Please tick as appropriate: (√).1 strongly disagree; 2 disagree; 3 agree; 4 strongly agree

Threats

SD

D

A

SA

Database/OPAC system

Privilege abuse/ breach of confidentiality

    

Malware

    

Weak audit trail

    

SQL input injection

    

Denial of service

    

Network system

 

Packet sniffing

    

Stack and buffer overflow

    

External hacking

    

Theft of service

    

Disgruntled employees

    

Operating system

 

Impersonation

    

Password cracking

    

Breach of integrity

    

Malware (Virus and worms)

    

Hardware or software error

    

Physical security system

 

Neutralizing alerts

    

Intrusion

    

Theft

    

Vandalism

    

Fire and electrical interruption

    

Appendix II

1.1 Questionnaire on influence of information technology skills of users on information systems security

Dear Respondent,

Thank you for your willingness to answer this survey, which focuses on users information technology skills as if affects the information systems security. The information you will provide is specifically for the purpose of research and will be treated confidentially.

Kind Regards

1.2 Section A: Demographic data

  1. 1.

    School /Department:___________________________________________________

  2. 2.

    Programme: BSc/BA/LLB/MBBS () MSc/MA () Ph.D. ()

  3. 3.

    Mode of Study: Full time () Part time ()

  4. 4.

    Level of Study: (Year) 1() 2() 3 () 4 () 5 () 6 () PG ()

  5. 5.

    Age(in years):less than 20{} 20–29{} 30–39{}40–49{} 50 and above {}

  6. 6.

    Gender: Male {} Female {}

  7. 7.

    Religion: Christianity {} Islam {} African Traditional Religion {}

  8. 8.

    Marital Status Single () Married () Divorced() Separated ()

1.3 Section B:Information technology skills

  1. 9.

    Please indicate how adequately you can perform any of the following tasks for each of the identified areas of technology skills. Please tick as appropriate: (). 1 Strongly Disagree; 2 Disagree; 3 Agree; 4 Strongly Agree

Items

SD

D

A

SA

I understand the basic function of computer hardware components such as the CPU, monitor, keyboard, and file storage.

    

I can find and start a program.

    

I can navigate between programs.

    

I can save files to the hard drive or removable storage, such as a CD or flash drive.

    

I can exit or quit an application.

    

I can shut down a computer properly.

    

I can locate a website given the address

    

I can download and save files, such as graphics, documents, or PDFs, from the Internet.

    

I can download and install software from the Internet.

    

I can install and update antivirus software.

    

I use Boolean operators(OR, AND, NOT)

    

I access and download files from On-line databases

    

I search the electronic catalogue(OPAC) through the author, title and shelf searches

    

I use search engines like Google Scholar, Yahoo, mamma, etc

    

1.4 Information technology skills scale for users

  1. 10.

    Please rate your information technology skills: 5 Very good; 4 Good; 3 Average; 2 Poor; 1 Very Poor

Skills set

Very good

Good

Average

Poor

Very poor

I am good in locating and starting a program in a computer.

     

I am good in saving files to the hard drive or removable storage, such as a CD or flash drive

     

I am good in downloading and saving files, such as graphics, documents, or PDFs, from the Internet

     

I am good in navigating between computer programs

     

I am good in different Programming Languages (Visual Basic, Java, C#, C, C++, SQL, etc)

.

    

I am good in developing a system or mobile applications

     

I am good in networking (LAN Administration, Network Design, Network Security, and Network Management)

     

I am good in Web Development (HTML/XML, FrontPage, Dreamweaver, authoring Web pages, maintaining Web sites, Web 2.0)

     

I am good in using an open source codes and troubleshooting of programs

     

I am good using keywords to do Internet searches.

     

I am good in conducting subject-related Web quests.

     

I am good using a desktop publishing program to create a simple media work.

     

I am good in using web authoring software to create a website.

     

I am good in structured system analysis and design principles

     

I am good in transferring text, graphic, audio, and video files using local and wide area networks.

     

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Okike, B.O.I., Adetoro, ‘. Securing the information systems of libraries and the influence of tech-skills of librarians and users. Educ Inf Technol 24, 1583–1602 (2019). https://doi.org/10.1007/s10639-018-9842-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10639-018-9842-z

Keywords

Navigation