English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 110182/141115 (78%)
Visitors : 46636761      Online Users : 863
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/116068


    Title: 大學圖書館館藏遺失損毀與資料安全防治政策
    Study on Collection Lost, Mutilation and Security Policy for University Libraries
    Authors: 洪欣宜
    Hung, Hsin-Yi
    Contributors: 王梅玲
    Wang, Mei-Ling
    洪欣宜
    Hung, Hsin-Yi
    Keywords: 館藏遺失
    館藏損毀
    館藏安全政策
    Collection lost
    Collection mutilation
    Collection security policy
    Date: 2018
    Issue Date: 2018-03-02 11:47:18 (UTC+8)
    Abstract: 本研究之目的為:(一)探討大學圖書館館藏遺失損毀現況。(二)探討大學圖書館館藏資料安全防護措施與政策。(三)比較大學圖書館主管與館員及使用者對館藏安全看法與態度,並據以進行分析整理,以作為圖書館館藏安全措施與政策未來發展建議。
    本研究以相關文獻為基礎,並採用深度訪談法做為研究工具,綜合研究結果與分析,整理研究結論如下:
    一、因公德心低落,大學圖書館館藏遺失損毀問題以錯架、註記居多
    二、期刊比其他館藏容易遺失,經費與驗收狀況需彈性處理
    三、制訂讀者違規處理辦法,有助於減少館藏遺失損毀的發生
    四、圖書安全系統目前仍是維護館藏安全最普遍設備
    五、偷竊館藏行為目前仍無強硬措施
    六、政策執行著重分層負責與溝通
    七、圖書館使用者在意館藏遺失問題,希望多舉辦政策推廣活動
    由研究結論歸納建議如下,期能供大學圖書館及未來之研究者做進一步研究之參考。
    一、館藏安全管理層面
    (一)圖書館需重視館藏遺失與損毀事前預防工作(二)加裝多層防護裝置(三)多元化的人力運用(四)善用科技減少人力成本(五)建立政策溝通管道。
    二、行政執行層面:
    (一)成立館藏安全維護工作小組並制訂政策(二)訂定館藏安全工作手冊(三)政策修訂與時俱進(四)政策執行著重分層負責與溝通(五)期刊建議以經常門編列或以系統驗收(六)處理違規行為應以教育為目的(七)保留館藏安全事件完整紀錄(八)透過實質合作加強圖書館與其他單位之互動關係(九)運用社群媒體與推廣活動宣導政策與服務(十)推廣公德心教育與使用者建立良善互動。
    The purposes of this research are: 1) Study the current situation of collections loss and mutilation in University Libraries. 2) Study the collections security policy for University Libraries. 3) Analyze, collate and come up with suggestions for library collections security policy which are based on the comparison of the views and attitudes of University Librarians with users about the library security.
    On the basis of the relevant literature, we used in-depth interview as the experimental tool to draw the conclusions according to the analysis and results. The study gets results in six aspects:
    1.Because low public morality, the majority problem of the collection lost, mutilation for the university library are wrong frames and notes.
    2.Periodicals are less likely to be lost than other collections, so budgetary and acceptance methods need flexibility.
    3.Formulating rules for readers` violation help to reduce library collection lost and mutilation.
    4.Library Security System is still the most common equipment for maintaining library security.
    5.There are still no tough measures to steal the collection and without any deterrent effect of punishment.
    6.Library policy implementation should focus on stratified responsibility and good communication.
    7.Library users care about the loss of the collection, and hope library to hold more policy promotion activities.
    The conclusion obtained from this research has led to the suggestions below that we hope to provide the University Library and later researchers a reference.
    1.The Aspect of Collections Security Management
    1) Library shall attach importance to the pre prevention work for the loss and mutilation of library collection. 2) Add an extra protective device for special collection. 3) Human resource utilization diversification. 4) Making good use of science and technology to reduce human cost. 5) Establishing a policy communication pipeline.
    2.The Aspect of Administration and Execution
    1) The library should set up the group for security maintenance working amd draw up a policy for collection security. 2) Set up the collection security handbook, 3) Revise the policy regularly to keep up with the times. 4) Policy implementation should emphasize that stratified librarians communicate and take responsibilities. 5) Periodical budget suggest for using current account fund, and check and accept by library OPAC, 6) Handling of irregularities should be used for the purpose of education, 7) Keep a complete record of the collection security events, 8) Strengthening the interaction between Library and other units through substantive cooperation, 9) promotion policies and services by social media and library promotion activities, 10) Promoting public moral education and establish the good interaction with library users.
    Reference: 中文
    王梅玲(2016)。館藏發展與管理概論。載於館藏發展與管理。(頁1-23)。新北市:華藝學術出版社。
    王雲東(2007)。社會研究方法。臺北縣:威仕曼。
    杜京生(1997)。公共圖書館安全政策之探討。臺北市立圖書館館訊,15(2),頁42-48。
    周澍來(2005)。大學圖書館館藏安全之探討-以圖書安全系統使用評估為例。1-133。未出版碩士論文,臺灣大學圖書資訊學研究所,台北市。
    邱淑蘋(1995)。犯罪學理論與圖書館違規行為之研究。臺北市立圖書館館訊,12(3),47-56.
    邱淑蘋(1996)。圖書館偷書,撕書相關因素與防制之研究。台北市:文華圖書管理。
    邱淑蘋(1996)。學校圖書館館藏安全上的問題及其防制之道。國立中央圖書館臺灣分館館刊,3(1),頁26-31。
    政治大學(2011)。國立政治大學圖書館年度報告。
    洪王徽恢(1995)。圖書保存與維護。擷取自圖書館學與資訊科學大辭典:http://terms.naer.edu.tw/detail/1680265/
    真理大學(2011)。真理大學台北校區99學年度圖書盤點報告。
    國立彰化師範大學(2005)。國立彰化師範大學圖書館圖書資料盤點報告。
    張郁蔚(2016)。館藏保存與維護。載於館藏發展與管理。(頁277-293)。新北市:華藝學術出版。
    教育部(1995)。 國民中小學公共安全管理手冊。台北市:教育部國教司。
    盛美雲(1991)。圖書維護之紙質酸化及保存環境問題之研究。台北市:漢美圖書有限公司。
    陳向明(2002)。社會科學質的研究。台北:五南。
    彭慰(1995)。圖書館安全系統Library Security System。擷取自http://terms.naer.edu.tw/detail/1680232/
    廖秀滿(1989),圖書館安全系統在圖書館之應用,書府,10,頁71-72。
    盧美延(2001)。數位化資料保存之研究。教育資料與圖書館學,38(3),頁309-333。
    戴國瑜(1994)。期刊管理及利用。台北市:台灣學生。


    西文
    Association of College & Research Libraries. (2009). ACRL/RBMS Guidelines Regarding Security and Theft in Special Collections. Retrieved from: Association of College & Research Libraries (ACRL): http://www.ala.org/acrl/standards/security_theft
    Allen, S. M. (1997). Preventing theft in academic libraries and special collections. Library & archival security, 14(1), 29-43.
    Bahr, A. H. (1981). Book theft and library security systems, 1981-82. White Plains, NY: Knowledge Industry Publications.
    Boss, R. W. (1980). The library security myth. Library Journal, 107, 638-638.
    Cravey, P. J. (2001). Protecting library staff, users, collections, and facilities. Neal-Schuman Publishers.
    Cuddy, T. M., & Marchok, C. (2003). Controlling hospital library theft. Journal of the Medical Library Association, 91(2), 241-244.
    Currie, S., Raskin, H., Demas, S., Kreilick, K., & McNamara, C. (1986). Cornell University libraries` security checklist. Library & archival security, 7(2), 3-13.
    Gregson, M., & Hocking, A. (1995). Theft and damage in an academic library: the student experience. Journal of librarianship and information science, 27(4), 191-197.
    Johansson, D. (1996). Library material theft, mutilation, and preventive security measures. Public library quarterly, 15(4), 51-66.
    Knox, Helen. (1994). How Are We Doing: A Security System in a School Library. School Librarian, 42(4), 142-143.
    Ladenson, A. (1977). Library Security and the Law. College & Research Libraries, 38(2), 109-117.
    St Lifer, E. (1994). How Safe Are Our Libraries?. Library Journal, 119(13), 35-39.
    Lincoln, A. J., & Lincoln, C. Z. (1987). Library crime and security:an international perspective. New York:Psychology Press.
    Lincoln, A. J. (1984). Crime in the Libraries: A Study of Patterns, Impact, and Security. New York: R. R. Bowker.
    Lincoln, A. J. (1991). Library legislation related to crime and security. Library & Archival Security, 10(2), 77-101.
    Luke, J. M. (1991). The mutilation of periodicals in a mid-size university library. The Serials Librarian, 20(4), 95-110.
    McDonald, A. (1992). Book detection systems. Security and Crime Prevention in Libraries, 289-297.
    Mott, S. (1978). An Edmonton High School Reduces Book Losses. Canadian Library Journal, 35(1), 45-49.
    Patkus, B. L. (1998). Collections security: the preservation perspective. Journal of library administration, 25(1), 67-89.
    Pedersen, T. L. (1990). Theft and mutilation of library materials. College & Research Libraries, 51(2), 120-128.
    Phillips, F. (1984). Developing collecting policies for manuscript collections. The American Archivist, 47(1), 30-42.
    Scherdin, M. J. (1986). The halo effect: Psychological deterrence of electronic security systems. Information technology and libraries, 5(3), 232-235.
    Shuman, B. A. (1999). Library security and safety handbook: prevention, policies, and procedures. American Library Association.
    Smith, F. E. (1984). Supplementary deterrents in library security. Library & archival security, 6(1), 49-56.
    Stewart, J. A. (1999). A case study to determine whether the cost of book loss at the geology library at the university of north carolina at chapel hill is greater than the cost of an electronic security system (Doctoral dissertation, University of North Carolina at Chapel Hill).
    Uzuegbu, C. P., & Okoro, C. A. (2013). Security Practices in Nigerian University Libraries. The Official Journal of the Pacific Northwest Library Association, 77(2), 18-27.
    Description: 碩士
    國立政治大學
    圖書資訊學數位碩士在職專班
    104913017
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0104913017
    Data Type: thesis
    Appears in Collections:[圖書資訊與檔案學研究所] 學位論文

    Files in This Item:

    File SizeFormat
    301701.pdf1757KbAdobe PDF2372View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback