Threat Analysis of Readers’ Unit in Ibrahim Babangida Library of Modibbo Adama University of Technology, Yola , Analytic Hierarchy Process (AHP) Approach

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 2

Abstract

This paper identified four human threats affecting Readers’ unit of Ibrahim Babangida Library (IBL) of Modibbo Adama University of Technology (MAUTECH), Yola. Data on threats were obtained using questionnaire and personal interview; the data obtained were analyzed using Analytic hierarchy Process (AHP). The results obtained revealed that reshuffle reshuffles is the severest threat with the weight (WSB = 0.289), stealing with the weight (WSA =0.282), mutilation (WSC = 0.263), and damage with the weight (WSD =0.143) is last. The result also shows that the most frequent threat is damage of material with the weight (WFD =0.358), next to it is reshuffle with weight (WFB = 0.337), mutilation with weight (WFC = 0.220) and lastly stealing with weight (WFA =0.085). We recommended that management should implore more strict security measures and also orient library users on threats to library materials and resources.

Authors and Affiliations

Keywords

Related Articles

Relationship between Music Preference and Personality Type

"Abstract Music is universally omnipresent and in contemporary society, music is so pervasive that it is absolutely unavoidable. The deliberate access of FM radios in cars, iPods, smart phones and speaker systems has mad...

Factors Influencing Implementation of Strategic Plans in Public Secondary Schools in Lari District, Kiambu County

Previous studies have indicated that good strategies have been written but very little has been achieved in their implementation. It has further been argued that only 10% of formulated strategies are successfully implem...

Automatic Patch Generation for Control Hijacking Attacks

"With the number of solutions proposed to provide an adequate protection against overflow attacks, integer overflow still pose a significant threat to security and availability of today’s computing environments. Most of...

Light Energy Design Influence to Caustic Effect of 3D Transparent Objects

"This research makes a software which can produce reflective and transparent object. Reflective object will modeled can reflect another object surrounding it. And transparent object will modeled can produce caustic effec...

Survey Paper on Pervasive Computing for Mobile Security

Now a day, many applications rely on the existence of small devices that can exchange information and form communication networks. And it is very challenging to provide security for such application. In a significant por...

Download PDF file
  • EP ID EP356771
  • DOI -
  • Views 51
  • Downloads 0

How To Cite

(2015). Threat Analysis of Readers’ Unit in Ibrahim Babangida Library of Modibbo Adama University of Technology, Yola , Analytic Hierarchy Process (AHP) Approach. International Journal of Science and Research (IJSR), 4(2), -. https://europub.co.uk./articles/-A-356771