Creating a safe haven for university students

advertisement
Creating a safe haven for university students: How are we doing?
Too frequently and often too late, academic librarians learn of patron experiences involving
problem patrons, misdemeanor criminal activity, or poorly secured areas. Regrettably, these
experiences can irrevocably diminish perceptions of access to the vibrant learning spaces and
services offered by our institutions. This article assesses the current state of security personnel
staffing and patron security issues at 25 public, four-year universities in two southeastern states.
KEYWORDS: academic libraries, access services, circulation services, library as place,
organizational models, security, staffing, problem patrons
Mark Sanders
Assistant Director for Public Services
Joyner Library-Mail Stop 516
East Carolina University
sandersm@ecu.edu
The author would like to than Justin Kingery, graduate assistant at East Carolina University, for
his research aid.
1
INTRODUCTION
The role of access services is constantly shifting along with our patrons’ evolving
expectations regarding learning spaces, technology and services. Too frequently and often too
late, academic librarians learn of user experiences involving problem patrons, misdemeanor
criminal activity, or poorly secured areas. Regrettably, these experiences can irrevocably
diminish the perception of access to the vibrant learning spaces and services offered by our
institutions. Most libraries already work hard at outreach to bring in users. Once inside,
establishing a haven of safety for patrons must be of paramount importance to libraries.
Although no library is completely free of security concerns, serious crime in academic
libraries in the United States is rare overall. Given the millions of visits they receive annually,
academic libraries are very safe spaces. The extent of criminal activity in academic libraries
tends to be primarily misdemeanor in nature -- larceny, vandalism, disturbance of the peace,
and various forms of misdemeanor indecency. However, these incidents can combine to create
an atmosphere of insecurity. As Shuman noted, people have a basic need to feel safe and
secure. If they do not, they will go elsewhere to satisfy their information needs (1999). Libraries
are already experiencing students’ exclusive reliance on free, online information of dubious
quality. Taking proper inventory of security and proactive care can help libraries avoid further
erosion of their user base.
This article presents the results of a survey of the current state of library patron security
at the 25 public, four-year universities in North Carolina and South Carolina. How are the
libraries served by security personnel? How are patrons made aware of potential dangers and
ways to protect their persons and property? How do patrons report security issues when they
encounter them? What are the common patron security incidents which have been reported
recently in our university libraries? Lastly, what changes have recently been made or should be
made in the future?
2
LITERATURE REVIEW
In his article, “The Correct Mindset,” Charles Reed points out that libraries are no longer
“simply quiet places to study and to read” (2008). Changes include 24/7 access, cafes, exhibits,
and a proliferation of collaborative and individual learning spaces. These changes present
challenges for those who must secure the facilities and their users. Reed’s article suggests
solutions based in architectural design, access control, and video surveillance, suggesting that
library administrators take full advantage of developments that have occurred in the security
systems field since 2001.
Betty Braaksma describes the ways in which the Thunder Bay Public Library in Ontario
handled increasing security concerns by forming the Thunder Bay Public Library's Security Task
Force (1998). Although the impetus for this was an increase in serious and frightening
encounters with patrons in a public library, the article was important to all types of libraries
because, prior to this, most writings on library security concentrated largely on the security of
the collections rather than staff and user safety. Herbert McGuin’s case study of security at
Sims Memorial Library at Southeastern Louisiana University emphasizes the helpfulness of a
visible, uniformed, full-time security officer. He also discusses the importance of administrative
support and engagement of library staff in improving security (2010). Senyah and Lamptey’s
case study of personal security and safety in Ghana’s Kwame Nkrumah University of Science
and Technology Library echoes McGuin and emphasizes the need to deploy security personnel
to patrol both inside the library and outside the building, not merely guard the library’s entrance
and exit (2011).
Raffensperger explores whether urban academic libraries are more dangerous than their
less urban counterparts (2010). The author uses data gathered under the Jeanne Clery
Disclosure of Campus Security Policy and Campus Crime Statistics Act or “Clery Act”, as well
as Federal Bureau of Investigation data on crime reported on college and university campuses.
As he notes libraries do not consistently collect or report incident data. Nevertheless, the
3
campus-level data can provide a foundation for a broad framework for risk assessment.
Raffensperger concludes that “local conditions vary significantly.”
Guidelines for best practices in patron security are ample and readily available. Many
handbooks have been developed and published by professional organizations such as the
American Library Association (ALA) and Association of Research Libraries (ARL). A good
starting point is the SPEC (Systems and Procedures Exchange Center) survey conducted by
ARL in which 45 institutions responded to questions about how they assure the safety and
security of their patrons and collections (1999). The kit contains the survey results and
representative documents, including general policy statements, rules, emergency manuals,
incident forms, and training aids. Somewhat surprisingly, the majority of libraries were not
happy with their current security programs and most planned future changes. One would think
that such an important campus consideration as security programs would be satisfactorily
addressed as among the most fundamental concerns.
Shuman’s previously cited “Library security and safety handbook” remains refreshingly
relevant despite being published a little more than ten years ago (1999). It provides valuable
checklists for addressing expectations of patron behavior, establishing security procedures,
training staff, and managing legal issues. Rich, practical examples of both real and hypothetical
situations are presented to highlight specific issues, as well as text boxes, sample policies, a
glossary and extensive bibliography from the 1980s and 1990s. Future issues such as
subliminal warning messages and biometric passwords have not materialized yet, but are topics
that persist in consideration (however dystopian they appear at first glance). Both of these texts
are good introductions to methods for approaching a general security framework.
A similar overview of the issues can be found in “Protecting library staff, users,
collections, and facilities”, which was published in the series “How-to-do-it manual for libraries”
(2001). Within its coverage of such a broad subject are useful chapters on environmental scans
and patron security. This work is unique in two ways. It includes a short chapter dedicated to
4
security planning during special events located adjacent to libraries such as cultural
celebrations, sporting events, VIP visits, concerts, and conventions. It also gives information
about personal safety, not just building and collections safety, during emergencies and
disasters. This is timely information given the snowstorms, tornadoes, hurricanes, floods, and
other extreme weather events experienced across the United States since 2010 (Tigay, 2011).
Solutions to patron security issues are provided according to an intensity scale ranging from low
to medium to high. At the low end are policy statements, which should anchor any security
framework, and staff training. At the other, more expensive end, are security professionals and
electronic surveillance systems. The most critical factors for framing a patron security
ecosystem are summarized as: location, budget, governance and the size/type of library.
One of the most recently published guides to ensuring patron security is “The library
security and safety guide to prevention, planning, and response” (Kahn, 2008). Divided into
three major sections, the publication examines building security, collections and equipment
security, and patron and staff safety. The recommendations for staff behavioral guidelines when
confronting problem patrons, and suggested sequence of reporting problems to the appropriate
personnel, are helpful for establishing clearly defined procedures. Equally valuable are the
layouts of recommended library security personnel qualifications and the process for cultivating
relationships with community public safety offices such as the police and fire departments. The
appendices provide a generous sample of resource organizations and checklists, with a
particular focus on insurance aspects.
Overall, the existing literature on patron security provides an abundant source of
baseline recommendations for a security framework to address the common issues confronting
libraries in the area of security personnel staffing, problem patron behavior, and procedures to
create a safe environment. The Buildings and Equipment Section of the Library Leadership and
Management Association (LLAMA) of ALA recently published a “Library Security Guidelines
Document”, which suggests industry standards and recommends best practices from experts in
5
the field of library security (2010). A distillation of considerations and questions for university
libraries are:
1. How are the surveyed university libraries served by security personnel? Are there librarybased security personnel or an exclusive reliance on campus police or law enforcement external
to the library?
2. What are the types of written documentation related to patron security?
3. What guidance is provided to students to protect their persons and property?
4. What are the most common student security issues that security personnel encounter?
5. What changes have recently been made or are desired?
METHODOLOGY
The considerations and questions distilled from the literature provide a useful approach
to survey the current state of security in our university libraries. To take a small measure of how
we are doing, the authors researched the answers to these questions at the public, four-year
university libraries of two southeastern states. Data was collected from representatives of 25
institutions in North Carolina and South Carolina (See: Appendix 1). These states contain a
total of 27 public, four year institutions; however, data was unavailable for two institutions which
did not respond to inquiries for information. For the purposes of this research, classification as
four-year, public university and total FTE is taken from the 38th edition of The College Blue Book
(2011). Security personnel are defined as employees whose duties consist solely of ensuring
security and do not perform any other service or work within the library. It does not count staff
members who are designated as security supervisors or liaisons in addition to their regular
library duties.
Surveys were conducted by phone or email with the person judged to be in the best
position to speak to the library’s security issues, which often depends upon whether the library
6
has library-based security staffing or relies exclusively on campus police or law enforcement
external to the library. In the case of library-based security staffing, the security supervisor was
usually contacted. In cases where the library relies exclusively on external security, the
appropriate contact was usually someone in Access Services/Circulation, Facilities or Library
Administration. The collected data includes: the categories of security staffing; documentation
related to patron security; guidance given to patrons (mostly students) about potential dangers
and ways to report incidents; common issues and concerns for patron safety; and recently made
or desired changes to improve security. Although some of the surveyed institutions have one or
more departmental libraries, for the purposes of this research the questions concerned the
facility considered to be the main library on campus. A list of the survey questions appears in
Appendix 2.
FINDINGS AND DISCUSSION
The first question concerning the composition and organization of personnel providing
security for the library yields answers which are strongly correlated to the university’s enrollment
(see Table 1). Student enrollment at the 25 universities can be neatly subdivided into three
ranges based upon full-time equivalent (FTE): 0 – 5,000 FTE (9 institutions); 5,000 – 10,000
FTE (6 institutions); and 10,000 – 30,000 FTE (10 institutions). Table 1 shows the composition
of library-based security personnel staffing during at least part of the regular semester operating
hours, not necessarily all of the operating hours. It is important to note that library-based
security staffing in some libraries only covers the late-shift hours.
Of the ten institutions with more than 10,000 FTE, nine report having library-based
security personnel during at least part of the regular semester operating hours. Out of the nine
libraries, six report maintaining library-based staffing during all regular semester operating
hours. Interestingly, the three largest institutions based upon FTE do not provide library-based
security during daytime hours. At first glance, it would seem that the largest institutions would
7
have the most comprehensive security coverage. Instead, they only provide library-based
security personnel during the early evening and late-shift operating hours. At all other times
these three universities rely exclusively upon campus police external to the library.
One large university library with no regular library-based security reports that it does
employ private security based within the library for the late-shift during the two weeks prior to
exams. The decision to provide late-night on-site security only during exams was made in
recent years due to budget cuts. Among these ten largest institutions, only three report having
library-employed security. Two of these libraries combined library-employed security with
private security during the late-shift. One library relies exclusively upon library-employed
security, having two guards on-duty during all operating hours.
Three of the 15 libraries with an enrollment fewer than 10,000 FTE report having librarybased security personnel during any of the operating hours. Among these libraries: one has
campus police based in the library during all operating hours; one relies upon a patrolling private
security guard from 5:00 p.m. until closing; and one relies upon a patrolling campus police
officer after service desks have closed. All other institutions rely exclusively upon campus
police or law enforcement external to the library during all operating hours.
Several libraries who have no library-based security report that staff and/or students are
charged with making periodic patrols of the building to monitor activity. This effort is most often
applied to make a library security presence known throughout the building. One library reports
that there are designated security supervisors within the circulation department who perform
scheduled rounds. The Head of Circulation at this institution noted an advantage library staff
members have over security personnel. Library staff can recognize suspicious behavior and
anomalies that would otherwise appear innocuous to a layperson. A real life example cited was
a young patron who appeared to be browsing the stacks, but was actually spying on females.
He was discovered when it was noticed his browsing included an aged set of foreign language
chemistry journals which were not indexed online.
8
Libraries report that security personnel are frequently charged with miscellaneous duties
in addition to their primary job responsibilities. Maintaining a master key to open doors as
needed is frequently mentioned, but only two of the libraries with dedicated library-employed
security report having security personnel maintain full responsibility for control and issuance of
keys to staff. More often it is the responsibility of campus police or a Facilities or Administration
unit within the library. Similarly, most lost and found procedures and inventory are maintained
by staff in Access Services. Two libraries report that they give to campus police any valuable
items turned in to lost and found. However, the security personnel assume full responsibility for
the operation of a lost and found service in two of the libraries with library-employed security.
In response to the question about the types of written documentation related to patron
security, 18 of the 25 surveyed institutions have policies proscribing behavior guidelines for
patrons. These guidelines describe permissible and impermissible conduct, noise levels,
hygiene, age requirements, and other user expectations. Security may refer to these
documented policies when incidents arise that disrupt the library environment and address the
situation appropriately.
Inappropriate computer use is another area of concern for academic
libraries since viewing obscene material can create a hostile environment for many library
patrons and is a concern for both administrators and parents. Although this issue is more acute
in public libraries, academic libraries are not immune. In fact, given the delicate balance
between academic freedom and patently offensive material, it is even more important to
precisely outline what is acceptable and unacceptable in the university library environment.
Somewhat surprisingly, even more libraries have separate policies proscribing appropriate
computer use than those with a policy of generally appropriate behavior. Of the 25 libraries
surveyed, 21 provide a specific policy which addresses appropriate computer use.
All libraries report that an incident report is created when serious security incidents arise
which require a response. However, the way in which incident reports are disseminated varies.
Incidents documented by library-employed security or private security are always sent to the
9
library’s administration and may be forwarded to campus police. Conversely, incident reports
documented by campus police always become part of the department’s records, and may be
forwarded to library administration. There appears to be no common best practice among the
libraries surveyed, but instead the dissemination of incident reports varies depending upon the
security staffing framework of the institution and institutional guidelines. Consistency is noted
among all libraries that employ private security. These libraries report that they provide
documentation which falls under the umbrella of “post orders”. In other words, the library
provides a checklist of expectations for the security firm’s execution of job responsibilities and
response to security incidents.
Guidance provided to students includes ways to protect their persons and property, as
well as how to report security concerns. Warning signage such as flyers and table tents are
widespread in libraries. These physical items are among the cheapest and easiest to
implement. However, in this age of over-signage and signage pollution, their meaningful impact
is debatable. Several libraries surveyed report additional innovative ways in which to warn
students to not leave their belongings unattended and raise awareness of their surroundings.
These include images of unsecured laptops on screensavers and plasma screens, as well as
friendly reminder notes left on unattended belongings. Similarly, patrons most often report
security concerns in person. Yet another innovative way which takes advantage of popular
technology is Instant Message (IM). Nearly a quarter of libraries surveyed report that students
have used IM to notify library staff of concerns, either directly to security personnel or via an IM
to a reference librarian. A noted advantage is not only the ease and anonymity of this
communication method, but also the avoidance of having to physically leave an area and/or
personal belongings to notify security in person.
Libraries were asked to list the most common student security issues that security
personnel encounter (see Table 2). Predictably, theft and simple larceny is cited most often. It
is mentioned by 16 of the 25 libraries surveyed. The issues immediately following theft are
10
perennial concerns for libraries: graffiti, suspicious persons/trespass, and noise. Interestingly,
although 21 libraries confirm having a computer use policy, only three libraries mentioned
inappropriate computer use as a common security issue. However, several noted that it had
been a past problem that was successfully addressed by reconfiguration of computer seating
arrangements and access permissions for non-university affiliates. Perhaps these strategies,
coupled with the widespread establishment of computer policy documentation, have
successfully prevented greater frequency of the problem. Another surprising finding was the
mention of medical issues by three libraries as a common security concern. Security personnel
are often first responders to libraries when there is a medical emergency. Although security is
often classified in the category of enforcement, it nevertheless also deals with health related
issues. American Heart Association certification of proficiency in performing cardiopulmonary
resuscitation (CPR) and automated external defibrillator (AED) application is practically a
necessity for security personnel. Credentialing as an emergency medical technician (EMT) at
the basic level is highly desirable.
The final question posed to libraries asked what changes have recently been made or
are desired in the area of security. The most popular response was the installation of video
surveillance cameras. Eight libraries reported that effective deployment of cameras had
recently been successfully implemented or is highly desired. Cameras are noted to be not only
a deterrent to crime, but also a great help in recovery of stolen items and conviction of
perpetrators. The proliferation of video surveillance in university public areas, not just in
libraries, appears to be a trend that will only increase in the near future. Cultivating a stronger
relationship with security personnel was cited by seven libraries as a desired change. Stronger
relationships are judged likely to foster greater connections and engagement between security
personnel and library stakeholders. Specific areas mentioned are clarifying security duties,
library involvement in the selection and hiring of security personnel, and requesting increased
11
patrols and security presence within the libraries. Only two libraries report that no changes
have been recently made or are desired.
CONCLUSION
As Braaksma notes, “the public retains a vision of the library as the kind of genteel
Victorian institution that Sherlock Holmes would have enjoyed” (1998). While this is a quaint
sentiment, it is not entirely accurate. Unfortunately, libraries must face very real and serious
issues regarding the provision of security at their institutions. This article has provided an
general overview of the current environment at libraries in 25 public, four-year universities in two
southeastern states and found that security issues are indeed being competently addressed.
Only relatively minor infractions were cited as common security concerns. All surveyed libraries
report formal coordination with security divisions at their institutions and procedures for incident
documentation. Nearly 75% of libraries report having formal guidelines for patron behavior and
appropriate computer use. Efforts are made at all libraries to provide patron guidance to protect
their persons and property. While a stronger relationship with security personnel is desired at
more than a quarter of surveyed libraries, none report serious shortcomings in security efforts.
Some directions for future research are to measure four year public university patrons’
perception of safety and security and/or apply the survey to community colleges, which have a
different patron group than universities and therefore likely need different security frameworks.
Another is to examine university crime log statistics required by the Clery Act to discover any
correlation between reported criminal activity within and adjacent to university libraries and
whether or not the library has library-based security personnel.
12
REFERENCES
American Library Association, LLAMA BES Safety & Security of Library Buildings Committee:.
(2010). Library security guidelines document. Retrieved from website:
http://www.ala.org/llama/sites/ala.org.llama/files/content/publications/LibrarySecurityGuide.pdf
Braaksma, E. B. (1998). Zero tolerance at the library: The work of the Thunder Bay public
library's security task force. Library & Archival Security, 14(2), 43-49.
College blue book (2011). (38th ed.). Detroit: Gale/Cengage Learning.
Cravey, P. J. (2001). Protecting library staff, users, collections, and facilities : A how-to-do-it
manual. New York: Neal-Schuman Publishers.
Intner, S. S., Johnson, P., Morrison, A. M., & Kahn, M. (2009). Studies in library and information
science. New Delhi: Pentagon Press.
Kahn, M. B. (2008). The library security and safety guide to prevention, planning, and response.
Chicago: American Library Association.
McGuin, H. (2010). The evolution of security at Sims Memorial Library: A case study. Library &
Archival Security, 23(2), 105-115. doi:10.1080/01960075.2010.495328
Raffensperger, T. E. (2010). Safety and security in urban academic libraries: A risk assessment
approach to emergency preparedness. Urban Library Journal, 16(1). Retrieved from
http://ojs.cunylibraries.org/index.php/ulj/article/view/16
Reed, C. (2008). The correct mindset. Library & Archival Security, 21(2), 59-67.
doi:10.1080/01960070802201334
Senyah, Y., & Lamptey, R. B. (2011). Personal security and safety in academic libraries: A case
study of the Kwame Nkrumah University of science and technology library, Kumasi,
Ghana. Library & Archival Security, 24(2), 83-102. doi:10.1080/01960075.2011.604642
Shuman, B. A. (1999). Library security and safety handbook : Prevention, policies, and
procedures. Chicago: American Library Association.
13
Soete, G. J., Zimmerman, G., Association of Research Libraries, & Office of Leadership and
Management Services. (1999). Management of library security : A SPEC kit.
Washington, DC: Systems and Procedures Exchange Center, Office of Leadership and
Management Services, Association of Research Libraries.
Tigay, C. (2011, September 9). Extreme weather. CQ Researcher, 21, 733-756. Retrieved from
http://library.cqpress.com/cqresearcher/
14
APPENDIX 1: INSTITUTIONS SURVEYED
More than 10,000 FTE
Appalachian State University
Clemson University
College of Charleston
East Carolina University
North Carolina State University
University of North Carolina at Chapel Hill
University of North Carolina at Charlotte
University of North Carolina at Greensboro
University of North Carolina at Wilmington
University of South Carolina
5,000 to 10,000 FTE
North Carolina Agricultural and Technical State University
Western Carolina University
North Carolina Central University
Winthrop University
University of South Carolina Upstate
University of North Carolina at Pembroke
5,000 to 10,000 FTE
The Citadel
Elizabeth City State University
Fayetteville State University
Francis Marion University
Lander University
University of North Carolina at Asheville
University of South Carolina Aiken
University of South Carolina Beaufort
Winston Salem State University
15
APPENDIX 2: SURVEY QUESTIONS
1. How are the surveyed university libraries served by security personnel? Are there librarybased security personnel or an exclusive reliance on campus police or law enforcement external
to the library?
2. What are the types of written documentation related to patron security?
3. What guidance is provided to students to protect their persons and property?
4. What are the most common student security issues that security personnel encounter?
5. What changes have recently been made or are desired?
16
Table 1: Library security staffing at university libraries (n=25)
Both libraryemployed and
private security
based in the
library
University enrollment
in FTE
No security
based in the
library
Campus police
based in the
library only
Library-employed
security based in
the library only
Private security
based in the
library only
10,000 - 30,000
5,000 - 10,000
0 - 5,000
1
4
8
4
2
0
1
0
0
2
0
1
2
0
0
Total
13
6
1
3
2
Table 2: Most frequently cited security issues at university libraries
Larceny/Theft
Graffiti
Suspicious person/trespass
Noise/Loud behavior
Vandalism
Inappropriate computer viewing
Medical
16
7
6
5
3
3
3
Download