Archives Library Information Center (ALIC)

Archives and Security


Nicole Gordon
Office of Regional Records Services (NR)
6/27/02
General Security
Antwi, I. K.
"The Problem of Library Security: The Bauchi Experience." International Library Review 21 (1989): 363-72.

Bass, Richard W.
"Collections Security." Library Trends 33 (1984): 39-48.

Belanger, Terry.
"Oberlin Conference on Theft Calls for Action." Library Journal 108 (November 1983): 2118.

Bello, M. A.
"Library Security, Materials Theft and Mutilation in Technological University Libraries in Nigeria." Library Management 19:6 (1998): 379-83.

Bergerson, Jeanette.
Manual for South Carolina Religious Archives and Recordkeeping. Columbia, South Carolina: South Carolina State Historical Records Advisory Board, 1999.

Billington, James A.
"Here Today, Here Tomorrow: The Imperative of Collections Security" American Libraries 27 (August 1996): 40-41.

Brand, Marvine, ed.
Security for Libraries: People, Buildings, Collections. Chicago: American Library Association, 1984.

Burke, Robert S., and Sam A. Adeloye.
A Manual of Basic Security. Leicester, England: ICOM, 1986.

Canal, B.A.
"Libraries Attract More Readers: Investing in Library Safety". Indiana Libraries 17:1 (1998): 15-17.

Christian, John F. and Shonnie Finnegan.
"On Planning an Archives." American Archivist 2:4 (October 1974): 573-578.

Cox, Richard J.
"Collectors and Archival, Manuscript, Rare Book Security." Focus on Security 26 (April 1995): 19-27.

Cummin, Wilbur B.
"Institutional, Personal Collection & Building Security Concerns." Security for Libraries: People, Buildings, and Collections. Edited by Marvine Brand, 24-50. Chicago: The American Library Association, 1984.

Daniels, Maygene F. and Timothy Welch.
A Modern Archives Reader: Basic Reading on Archival Theory and Practice. Washington D.C.: National Archives Trust Fund Board, 1984.

Dow, C.
"Library Rules, Policies, and Library Security." Nebraska Library Association Quarterly 30:1 (1999): 16-26.

Duggar, D. C.
"Security and Crime in Health Sciences Libraries in the Southern United States." Medical Reference Services Quarterly 18:1 (1999): 37-48.

Ellis, Judith Ed.
Keeping Archives. Brunswick, Australia: D.W. Thorpe in Association with The Australian Society of Archivists Inc. Impact Printing, 1993.

Fennelly, Lawrence J.
Museum, Archive and Library Security. Boston: Butterworth Publishers, 1983.

Garnet, Slade Richard.
Protecting Your Collection: A Handbook, Survey, and Guide for the Security of Rare Books, Manuscripts, Archives, and Works of Art. New York: Haworth Press, 1982.

Goldberg, M.
"The Never-ending Saga of Library Theft." Library & Archival Security 12:1 (1993): 87-100.

Jackson, Marie.
"Library Security: Facts and Figures," Library Association Record 93 (June 1991): 384.

Jenkins, John H.
Rare Books and Manuscripts Thefts: A Security System for Librarians, Booksellers, and Collectors. New York: Antiquarian Booksellers' Association of America, 1982.

Keller, Steven R.
The Most Common Security Mistakes that Most Museums Make. Deltona, FL: Steven R. Keller and Associates, 1988.

Kinney, John M.
"Archival Security and Insecurity." American Archivist 38 (1975): 493-497.

Lincoln, A. J.
Crime in the Library: A Study of Patterns, Impact, and Security. New York: Bowker, 1984.

Lincoln, A. J., and C. Z. Lincoln.
"Library Crime and Security: An International Perspective." Library & Archival Security 8:1/2 (June 1987): 14-7.

Lorenzen, M.
Security Problems of Ohio Academic Libraries. ERIC Document Reproduction Service, ED 367341, 1993.

Lorenzen, M.
"Security in the Public Libraries of Missouri." Missouri Library World 1:3/ 4 (1996): 15-7.

Lorenzen, M.
Security Issues of Academic Libraries. ERIC Document Reproduction Service, ED 396765, 1996.

Lorenzen, M.
"Security in the Public Libraries of Illinois." Illinois Libraries 79:1 (1997): 21- 22.

Lorenzen, M.
"Security Issues in the Public Libraries of Three Midwestern States." Public Libraries 37:2 (1998): 2-4.

Lorenzen, M.
Security Issues of Ohio Public Libraries. ERIC Document Reproduction Service, ED 416907, 1998.

Mason, Philip P.
"Library and Archival Security: New Solutions to an Old Problem." American Archivist 38:4 (October 1975): 477-492.

Patkus, Beth L.
"Collection Security: The Preservation Perspective." Journal of Library Administration (1998): 67-89.

Rude, Renee, and Robert Hauptman.
"Theft, Dissimulation and Trespass: Some Observations on Security" Library and Archival Security 12:1 (1989): 17-22.

Rendell, K.W.
"Problems of Archival Security." AB Bookman's Weekly 59 (June 1977): 3719-3723.

Smith, F. E.
"Questionable Strategies in Library Security Studies." Library & Archival Security 6:3 (1984): 43-53.

Stielow, Frederick J.
"Archival Security." Managing Archives and Archival Institutions, James Gregory Bradsher, ed. (Chicago: University of Chicago Press, 1989), 207-217.

Storey, Richard, A.M. Wherry, and J.F. Wilson.
"Three Views on Security" Journal of the Society of Archivists 10 (July 1989) 108-14.

Taylor, D.
"Enemies of Books." College & Research Libraries News 42:9 (1981): 317-9.

Thomas, D.L.
Study on Control of Security and Storage of Holdings: A RAMP Study with Guidelines. Paris: General Information Program and UNISIST, United Nations Education, Scientific, and Cultural Organization, Feb. 1987. PGI-86/WS/23.

Trinkaus-Randall, G.
"Preserving Special Collections through Internal Security. College & Research Libraries 50:7 (1989): 448-54.

Trinkaus-Randall, G.
Protecting Your Collections: A Manual of Archival Security. Chicago: Society of American Archivists, 1995.

Van Nort, S.
"Archival and Library Theft: The Problem That Will Not Go Away." Library & Archival Security 12:2 (1994): 25-49.

Walch, Timothy.
Archives and Manuscript: Security. Chicago: Society of American Archivists, 1977.

Welch, Edwin.
"Security in an English Archive." Archivaria 1:2 (Summer 1976): 49-54.

Wyly, Mary.
"Special Collections Security: Problems, Trends, and Consciousness." Library Trends 36 (1987): 241-256.

Zeidberg, David.
Collection Security in ARL Libraries. Washington, D.C.: Association of Research Libraries, 1984.

Zika, J.
"Library Security = Eyes Wide Open." North Carolina Libraries 57:3 (1999): 118.

Security Bibliographies
Brady, Eileen E.
Library/Archive/Museum Security: A Bibliography. 5th Edition. Moscow, ID: Catula Pringuis Press, 1995.

Sable, Martin H., Ed.
The Protection of the Library and Archives: An International Bibliography. New York, Haworth Press, 1983.

Researcher Monitoring Procedures
Allen, Susan M.
"Preventing Theft in Academic Libraries and Special Collections" Library and Archival Security 14:1 (1997): 29-43.

Allen, Susan M.
"Theft in Libraries or Archives." College & Research Libraries 50:10 (1990): 939-43.

Anderson, A. J.
"The Trouble with Larry." Library Journal 111:11 (1986): 45-7.

Berkley, Edmund Jr.
"Archival Security: A Personal and Circumstantial View" Georgia Archive 4:1 (Winter 1976): 3-9.

Brashear, J. K., J.J. Malone, and J. Thorton-Jaringe.
"Problem Patrons: The Other Kind of Library Security." Illinois Libraries 63:4 (1981): 343-51.

Brown, Marion.
Problem Patron Manual. Schenectady, New York: Schenectady Public Library, 1981.

DeRosa, F. J.
"The Disruptive Patron." Library & Archival Security 3:3/ 4 (1980): 29-37.

Dizard, R.
"Safe and Sound: Protecting the Collections of the Library of Congress." Library of Congress Information Bulletin, 57:6 (1998): 144-5.

Dunlap, Ellen S. and Kathleen Reed.
"Borrowing of Special Collections Materials for Exhibition: a Draft." Rare Books and Manuscripts Librarianship 2:1 (May 1984): 17-23.

Elliott, J.
"Disturbed Clients." Unabashed Librarian 44 (1982): 16-7.

Fennelly, Lawrence J., ed.
Handbook of Lose Prevention and Crime Prevention. 2nd ed. Boston: Butterworths, 1988.

Gothberg, H. M.
"Managing Difficult People: Patrons (and Others)." The Reference Librarian 19 (1987): 269-84.

Keating O'Neil, Robert, ed.
Management of Library and Archival Security: From the Outside Looking In. Hayworth Press, n.d.

Lincoln, Alan Jay.
"Reducing Personal Crimes" Library & Archival Security 10:1 (1990).

Sampson, K. J.
"Disturbed and Disturbing Patrons: Handling the Problem Patron." Nebraska Library Association Quarterly 13:1 (1982): 9-11.

Totka, Vincent A., Jr.
"Preventing Patron Theft in the Archives: Legal Perspectives and Problems." The American Archivist 56 (1983): 664-672.

Winter, K.
"Entrance/Exit Design of Australian Academic Libraries Since 1959." Australian College Libraries 3:4 (1985): 167-75.

Security Incident Management Procedures
Allan, Susan M.
"Theft in Libraries and Archives: What to Do during the Aftermath of a Theft." Journal of Library Administration 25: 1 (November 1998): 3-13.

Bahr, A.H.
"The Thief in Our Midst" Library & Archival Security 9:3/ 4 (1989): 77-81.

Barton, John P., and Joanna G. Wellheiser, eds.
An Ounce of Prevention: A Handbook on Disaster Contingency Planning for Archives, Libraries and Record Centers. Toronto, ON: Toronto Area Archivists Group Education Foundation, 1985.

Bello, M. A.
"Library Security, Materials Theft and Mutilation in Technological University Libraries in Nigeria." Library Management 19:6 (1998): 379-83.

Brown-Syed, C.
"Some Observations on Systematic Book Theft." Library ∓ Archival Security 15:1 (1999): 83-9.

Bryan, Alice.
"Loss Control: The Museum and Its Collection." Insurance and Risk Management for Museums and Historical Societies. Hamilton, NY: Gallery Association of New York State In Cooperation with the Division of Educational Services of the Metropolitan Museum of Art, 1985.

Dienstein, William.
Techniques for the Crime Investigation. Springfield, IL: Charles C. Thomas, 1952.

Galvin, Theresa.
"The Boston Case of Charles Merrill Mount: The Archivist's Arch Enemy." The American Archivist 53 (1990): 442-450.

Greenwood, L., and H. McKean.
"Effective Measurement and Reduction of Book Loss in an Academic Library." Journal of Academic Librarianship 11:5 (1985): 275-83.

Jackanicz, Donald.
"Theft at the National Archives: The Murphy Case, 1962-1975." Library & Archival Security 10: 2 (1990): 23-50.

Land, Robert H.
"Defense of Archives against Human Foes." American Archivist 19 (1956): 121-138.

Lazo, Douglas T.
"Videotaping for Security Investigation." Security Management 22:5 (May 1978): 20-22.

O'Neil, James E.
"Replevin: A Public Archivist's Perspective." College and Research Libraries 40 (January 1979): 26-30.

Purcell, A. D.
"Abstractions of Justice: The Library of Congress's Great Manuscripts Robbery 1896-1897." American Archivist 62:2 (1999): 325-45.

Rhodes, James B.
"Alienation and Thievery: Archival Problems." American Archivist 29:2 (April 1966): 197-208.

Richards, J. H.
"Missing in Action." Journal of Academic Librarianship 5:5 (1979): 266-9.

Samuel, E.
"Protection of Library and Archival Materials: A Case Study-New York Institute of Fine Arts." Library & Archival Security 2:3/4 (1978): 1.

Scham, A.M.
"Appraisals, Insurance, And Security." In Managing Archives and Archival Institution. New York: Neal Schuman, 1987.

Sennewald, Charles A.
The Process of Investigation: Concepts and Strategies for the Security Professional. Woburn, MA: Butterwoth Publishers. 1981.

Smith, F. E.
"Supplementary Deterrents in Library Security." Library & Archival Security 6:1 (1984): 49-57.

Varner, C.
The Causes, Measurements, and Prevention of Journal Mutilation in an Academic Library. ERIC Document Reproduction Service, ED 234817, 1983.

Holdings, Maintenance, Security Procedures
Wall, C.
"Inventory What You Might Expect to Be Missing" Library & Archival Security 7:2 (1985): 27.

Staff Security Training Procedures
Bennis, Warren.
Leaders: The Strategies of Taking Charge. New York: Harper & Row, 1985.

Bornhofen, Frederick A.
"Where Security Firs In: Behavioral Guideline on What Is- and Is Not- Expected From a Security Department." Security World 15:8 (August 1978): 92-93.

Braaksma, Betty.
"Zero Tolerance at the Library: The Work of the Thunder Bay Public Library's Security Task Force." Library & Archival Security 14:2 (1998): 43-49.

Campbell, A.M.
"Archival Security Program of the Society of American Archivists." American Archivists 38 (October 1975): 499-500.

Keller, Steven R.
Security Training-Why We Have Failed. Deltona, FL: Steven R. Keller and Associates, 1990.

Post, Richard.
Security Manager's Desk Reference. London: Butterworths, 1986.

Sheridan, L. W.
"People in Libraries as Security Agents." Library & Archival Security 3:1 (1980): 57-61.

Trinkaus-Randall, G.
"Library and Archival Security: Policies and Procedures to Protect Holdings from Theft and Damage." Journal of Library Administration 25:1 (1989): 91-112.

Trinkus-Randall, Gregor.
"Preserving Special Collections through Internal Security." College & Research Libraries 50 (1989): 448-454.

Wurzburger, M.
"Current Security Practices in College and University Special Collections." Rare Books & Manuscript Librarianship 3 (1988): 43-57.

Building Physical Security Procedures
Bahr, Alice Harrison.
Book Theft and Library Security Systems 1981-1982. White Plains, NJ: Knowledge Industry Publications, 1981.

Boss R. W.
"Security Technologies for Libraries: Policy Concerns and a Survey of Available Products." Library Technology Reports 35:3 (1999): 271-356.

Brand, M.
"Security of Academic Library Buildings." Library & Archival Security 3:1 (1980): 39-47.

Harris, Carolyn.
"The Preservation Considerations in Electronic Security Systems" Library & Archival Security 11:1 (1991): 35-42.

Hopf, Peter S.
Handbook of Building Security Planning and Design. New York: McGraw-Hill, 1979.

Keller, Steven R.
An Architect's Prize Building May Be Security's Nightmare. Deltona, FL: Steven R. Keller and Associates, 1988.

Ling, Ted.
Solid, Safe, Secure: Building Archives Repositories in Australia. Australia: Australian Archives, 1998.

Mandelbaum, Albert J.
Fundamentals of Protective Systems: Planning, Evaluation, Selection. Springfield, IL: Charles C. Thomas, 1973.

Olsen, R. J. and L.J. Ostler.
"Get Tough on Theft: Electronic Theft Detection." Library & Archival Security 7:3/4 (1985): 67-77.

Post, Deborah Cromer.
"Specifying a Security System." Security World 18:2 (February 1981): 29-31.

Roberts, M.
"Guards, Turnstiles, Electronic Devices and the Illusion of Security." College & Research Libraries 29:4 (July 1968): 259-275.

Schneider, K. G.
"Safe from Prying Eyes: Protecting Library Systems." American Libraries 30:1 (1999): 98.

Stack, M. J.
"Library Theft Detection Systems--Future Trends and Present Strategies." Library & Archival Security 14:2 (1998): 25-37.

Stack, Michael J.
"Frequently Asked Questions (FAQ's) About Electronic Security Systems." Library & Archival Security 14:2 (1998): 39-41.

Stack, Michael J.
"Library Theft Detection Systems-Future Trends and Present Strategies" Library & Archival Security 14:2 (1998): 25-37.

Strassberg, Richard.
Conservation, Safety, Security and Disaster Considerations in Design. Ithica, New York: Cornell University Press, 1984.

Walsh, R.R.
"Rare Book and Security System Confidentiality." Library & Archival Security 2:23 (1978): 71-73.

Watstein, S. B.
Book Mutilation: An Unwelcome By-product of Electronic Security Systems. Library & Archival Security 5:1 (1983): 11-33.

Security Assessment Procedures
Bahr, A.H.
"The Thief in Our Midst" Library & Archival Security 9:3/4 (1989): 77-81.

Bradsher, James Gregory ed.
Managing Archives and Archival Institutions. Chicago: University of Chicago Press Chicago, 1989.

Chadwick, William E.
"Special Collections Library Security: An Internal Audit Perspective." Journal of Library Administration. 25:1 (November 1998): 15-31.

Hoff-Wilson, Joan.
"Access to Restricted Collections: The Responsibility of Professional Historical Organizations." American Archivist 46:4 (Fall 1983): 441-447.

Keller, Steven R.
Conducting the Physical Security Survey. Deltona, FL: Steven R. Keller and Associates, n.d.

Lincoln, Alan Jay.
"Low Cost Security Options: Background Checks" Library & Archival Security 9:3/4 (1989): 107-113.

Newman. John and Chris Wolf.
"The Security Audit". Colorado Libraries. (Spring 1997): 19-21.

Rosenbaum, Richard W.
"Can We Predict Employee Theft?" Security World (October 1975): 26-27, 106-108.

Top