American Journal of Education and Learning

Volume 1, Number 2 (2016) pp 76-82 doi 10.20448/804.1.2.76.82 | Research Articles

 

Survey of Monitoring Policy on Access to and Use of the Internet in Selected University Libraries in South-Western, Nigeria

Ogbuiyi Darlina Chima 1Oriogu, Chuks Daniel 2Chukwuemeka, Anthony Onyebuchi 3
1 Laz Otti Memorial Library, Babcock UniversityIllisan-Remo, Ogun State
2 Library Department, AfeBabalola University, Ado-Ekiti, Ekiti State
3 Library Department, AfeBabalola University, Ado Ekiti , Ekiti State Nigeria

Abstract

The paper presents the survey of monitoring policy on access to and use of the Internet in selected university libraries in South-western, Nigeria. It shows the relevance of Internet monitoring policy, ways of Internet monitoring policy, items, sites and activities to be monitored in university libraries in Nigeria. Thus, the study suggested the need for monitoring policy on access to and use of Internet in University libraries in Nigeria in order to create an enabling environment for proper use of Internet for academic purposes by students.

Keywords: Access, Internet monitoring policy, Use, University libraries.

DOI: 10.20448/804.1.2.76.82

Citation | Ogbuiyi, Darlina Chima; Oriogu, Chuks Daniel; Chukwuemeka, Anthony Onyebuchi; Allison, Goodluck O (2016). Survey of Monitoring Policy on Access to and Use of the Internet in Selected University Libraries in South-Western, Nigeria. American Journal of Education and Learning, 1(2): 76-82.

Copyright: This work is licensed under a Creative Commons Attribution 3.0 License

Funding : This study received no specific financial support.

Competing Interests: The authors declare that they have no competing interests..

History : Received: 7 June 2016/ Revised: 28 June 2016/ Accepted: 4 July 2016/ Published: 13 July 2016

Publisher: Online Science Publishing

1. Introduction

The Internet is unarguably a good source of getting the right information and solution to problems in an academic environment. This is no doubt a fundamental function of the Internet services to the academic community. Nevertheless, students all over the world surf the Internet for different purposes which needs to be monitored; therefore tailoring their interest more to education use. As Tiemo, Bribena and Nwosu (2011) observed that in some universities in Nigeria, there are no regulations guiding the usage of electronic information resources in the library.  As a result, some students explore the Internet in a negative way rather than availing themselves with the vast educational resources online. More so, in order to explore the Web wisely by students, university libraries should provide monitoring policy in order to promote efficient use of Internet for academic purposes. This is why this study tends to investigate monitoring policy on access to and use of the Internet in selected university libraries in South-western, Nigeria.

2. Literature Review

According to Reitz (2004) access is the right or the privilege of using a computer system or online resource, usually controlled by the issuance of access codes to authorized users.  In a more general sense, access is the ability of the user to reach data stored on a computer or computer system. Internet access is a high level of connectivity that fosters unparalleled degree of communication, collaboration; resource sharing and information access (Oketunji, 2001). Effective access to the Internet improves competent skill in surfing information on the web. Library patrons use the Internet to access, retrieve and disseminate information. While access to Internet resources offers students with rich and vast information to develop professionally, academically, and culturally.  Therein, it should not be misused in any form.

Therefore, Internet use is the ability to access the Internet to perform several tasks in order to retrieve specific information needs.  In the different study of Woherem (1993), Afemann (1997) and Oketunji (2001) they identified potential areas Internet generally could be used.  They include education, agriculture, office automation, security, entertainment, politics, construction, banking, commerce, health etc.  In other words, Internet could be used in all spheres of life to improve the lives of people and solve societal problems. Hence, for proper utilization of Internet by students, there should be a lay down monitoring policy to regulate its use.

However, in any organization or academic institutions that has effective Internet connectivity; certain monitoring policy is being outlined to ease efficient, access to and proper use of the Internet.  Therefore, monitoring policy (acceptable use policy) has been described by Reitz (2004) as guideline established by a library or library system concerning the manner in which its computer system and equipment may be used by patrons and staff.   For example, most public and academic libraries prohibit the use of library computers for private, commercial or unlawful activities. Headers (2012) stated that a monitoring policy is a collection of rules that are associated with each type of monitored asset; it also contains the information needed to monitor a managed asset with user-defined alert configurations, including defined threshold and alert monitors. According to International Encyclopedia of Information and Library Science (1997) monitoring in business and industry, describes the regular overseeing of a process, or activity, which seek to establish the extent to which input, work schedules, other required actions and targeted outputs are proceeding to plan, so that action can be taken to correct any deficiencies detected. It also states that monitoring of network use, is a prequisite for the filtering of the Internet use that is applied by those who-whether in the home, workplace, educational institution, or library-provide internet access and fear the harmful or distracting capacity content available.

The Internet regulation is basically restricting or controlling access to certain aspects of information. The Internet regulation consists of mainly two categories: data censorship and the Internet access control. Most of the Internet regulations are imposed by the government in an effort to protect the best interests of the general public, which is a form of censorship. The other form of the Internet regulation is domain registration, that is, through the internet protocol (IP) address control (123Helpme.com.2009).

Monitoring is the essential foundation of an effective information security programme and also the mechanism an organization posses to inform and enforce behaviour on users and staff on proper use and access to the Internet.  Since the policy is difficult to implement, Bergeron and Berube (1990) have proposed guidelines for the formation of computer policy which are directly applicable to information policy.

  • All policies must contribute to the success of the organization.
  • Management must ensure the adequate sharing of responsibility for proper use of information system.>
  • End users of information system should be involved in the steps of policy formulation.

However, the Internet is manifestations of information technology as cultural paradigm. Where there is a moral sense, there are obligations and responsibilities. Users of the worldwide web must be self-regulators according to accepted standards and rules (Berners-Lee, 1999; Stoll, 2000; Chapman and Dhillon, 2001). According to Zuckerman (2010) filtering or censorship performance by online service providers (OSPs) for services such as social networking sites, blogs and websites is referred to as a form of intermediary censorship. Another point in the network in which this is done, is at the organizational level, where the offices, schools, libraries and business are also able to filter and monitor Internet use.  Academic Internet library policy should provide for the responsible and fair use of the Internet resources through effective monitoring policy. Shuman (2001) stated that a policy document, requiring the signature of all library employees should spell out what is unauthorized use and caution library employees against using Internet for personal purposes or financial gain, such as sending mass mailings, advertising sideline business or pointing unauthorized files from the web.

Eli (2011) outlined the library regulation on computer use as:

  • Accessing child-pornography sites;
  • Hacking, including installing software and/or changing settings on the local PC;
  • Physically damaging computers;
  • Disruption or obstruction of authorized use of the network;
  • Destroying the integrity of computer-based information;
  • Engaging in the public display of offensive sexual material,
  • Engaging in sexual harassment of library staff or other patrons through the use of internet sites;
  • Infringing copyright or licensing agreements;
  • Using library computers with the intention of threatening, intimidating or invading the privacy of others;
  • Using library computers in ways blatantly inconsistent with the primary purpose for which they are intended.

However, to ensure that Internet usage is regulated in the library, it requires a login, using a university-assigned mail address and personal password (Tiemo, Bribena, Nwosu, 2011). Therefore, access to and use of the Internet in university libraries should be highly guided to avoid malicious use, excessive time waste, cyber-sexual abuse on-line gambling, games playing, cyber relationship, on-line criminal act, online information abuse etc.

3. Statement of the Problem

The advent of Internet bought a lot more complications, than many academic institutions in Nigeria is prepared for. Nevertheless, the speedy development of search engines and the increase use of the Web by all types of institutions propel the demand for Internet-related services which most students explore its advantage abysmally due to inexistence or poor implementation of monitoring policy on Internet access and use; rather than availing themselves with the vast educational resources online. This is why the study investigated monitoring policy on access to and use of the Internet in selected university libraries in South-western, Nigeria.

4. Objectives of the Study

The main objective of this study is to investigate monitoring policy on access to and use of the Internet in selected university libraries in South-western, Nigeria.

The specific objectives of the study are to:

  1. ascertain the extent of access to Internet in the university libraries;
  2. determine the purpose of use of  Internet in the university libraries;
  3. find out if there are monitoring policy to regulate access to and  use of Internet in the university libraries.

5. Scope of the Study

The study covers the university libraries of Babcock University, University of Ibadan and Lagos State University. And it specifically focuses on the students of these three universities. The study also investigated monitoring policy on access to and use of Internet in selected university libraries in South-western Nigeria.

6. Methodology

Survey research method was adopted and questionnaire was used to collect data. A total of three hundred and fifty questionnaires were sampled from the total population of students of University of Ibadan, Lagos State University and Babcock University, out of which two hundred and eighty five copies were completed for analysis using frequency counts and simple percentage to answer the research questions.

7. Analysis of Findings

Table-1. Demographic Information of the Respondents
Source: Field work by the researchers

Table shows the demographic information of the respondents. The information culled from the questionnaire on demographic information revealed that 37(13.0%) of the respondents were 100 level, 41(14.4%) were 200 level, 67(23.5%) were 300 levels, 93(32.6%) were 400 levels, 1(.4%) was 500 levels, 39(13.7%) were 700 levels, while 7(2.5%) were 800 levels.  Which means that 300 levels, 67(23.5%) and 400 levels, 93(32.6%) students mostly use the library. On Gender distribution, it was revealed that out of 285 respondents that took part in the research, 166(58.2%) of the respondent were males while their females counterparts were 119(41.8%). This shows that there are many more male students that use   the e-library than female at the period of the research.

Table-2. The extent of Access to the Internet in University libraries
Source: Field work by the researchers

The analysis on the extent of access to the Internet in the university libraries is presented in Table 2, which  reveals the extent of access to the Internet in the various university libraries: Do you have internet access in your university library: Lagos 29(54.7%), U.I. 14(26.4%), Babcock 10(18.9%); Extent of Access you have to the Internet in your library: Complete Access: The respondents in Lagos and U.I have no access but in Babcock 59(60.8%) indicated that they have access. Other questions raised have poor response. Therefore, in order to improve access to the Internet university libraries should endeavour to sensitize students on the availability of Internet facilities.

Table-3. Purpose of Use of the Internet in the University Libraries
Source: Field work by the researchers

The analysis on the purpose of use of the Internet in the university libraries is indicated in Table 3, it reveals that majority of the respondents use the Internet in Babcock 87(56.5%); For assignments and few of them in Lagos 33(21.4%), U.I. 34(22.1%), For research: Lagos 64(27.6%), U.I. 63(27.2%), Babcock 105(45.3%);For chats: Lagos 5(15.6%), U.I. 11(34.4%), Babcock 16(50.0%); For entertainment: Lagos 3(10.0%), U.I. 10(33.3%), Babcock 17(56.7%); and For games: Lagos 2(22.2%), U.I. 4(44.4%), Babcock 3(33.3%);

Table-4. Existence of Internet Monitoring Policy in University Libraries
Source: Field work by the researchers

Table 4 reveals the existence of Internet monitoring policy in university libraries. Therefore, majority of the respondents believed that there is no Internet monitoring policy in the university libraries.   The responses are as follows:  Lagos 51(27.3); U.I. 41(21.9); Babcock 95(50.8) of the respondents indicated ‘No’.

8. Discussion of Findings

The findings shows that male undergraduate students formed the majority of the respondents and 300 and 400 level students used the university libraries more. It was revealed that majority of the respondents in the university libraries use the Internet for research and assignment and does not use it for games, chats and entertainment. Yusuf (2006) said that in research the Internet provides wide opportunities for quicker access to relevant and current literature, access to wide range of instruments, online opportunity for validation of instrument, simulation of an on-going research, and on-line statistical analysis.  Furthermore, collaboration in research (trans-institutional, trans-national and trans-continental) is possible, and wide range of opportunities exist for the dissemination of research findings (journals, personal web page, foundations/organizations’ web pages, etc.) (University Libraries, 2003b). Based on the policies that regulate use of the Internet in the university libraries, it was revealed that the university libraries understudy does not have monitoring policy. Also it was revealed that most of the respondents are ignorant of what monitoring policy is all about. This supports the study of Tiemo ,Bribena and Nwosu (2011) that in some universities in Nigeria, there are no regulations guiding the usage of electronic information resources in the library.  As a result, some students explore the Internet in a negative way rather than availing themselves with the vast educational resources online.

9. Concluction and Recommendations

University libraries are viewed as the most vital part of the university system, that support effective teaching, learning and research. The academic health, intellectual vitality and effectiveness of any university depend largely upon the state of the health and excellence of its library.  In actual fact, university libraries are on the leading edge of Internet developments because of the information resources they provide for teaching, learning and research. Therefore, monitoring policy on access to and use of the Internet in university libraries should be highly guided to avoid malicious use, excessive time waste, cyber-sexual abuse on-line gambling, games playing, cyber relationship, on-line criminal act, online information abuse etc. Based on the above findings, it is recommended that University libraries should endeavour to adopt a monitoring policy that will regulate students access to and use of Internet for specifically academic purposes.

References

Afemann,U. (1997).’Internet for the third world: chance or threat?”          http:www.uni.muenster.de/EthonolgieHente?ehl/afe.htm: 12-23.  Accessed on 12th   February, 2013

Bergeron, F., &Berube, C. (1990). End users talk computer policy.  Journal of System Management, 41(12): 14-17.

Berners-Lee, T. (1999). Weaving the Web: The Past, Present and Future of the World Wide Web by its Inventor. London: Orion Business Books.

Chapman, Scott and Dhillon, Gurpreet, (2001) “Privacy and the Internet: The Case of Double         Click, Inc.,” Chapter 6, Social Responsibility in the Information Age: Issues and        Controversies, edited by GurpreetDhillon, Idea Publishing.

Eli, M. (2011) Oboler library computer and Internet use policy. Idaho state university. Retrieved from:http://www2.isu.edu/library/services/appuse.shtml.

Headers, S. (2012). Monitoring rules and policies.  Available at                 http://docs.oracle.com/cd/E2736301/nav/howto.htm.Accessed 22 March,2013

InternationEncyclopedia of information and library science (1997). 2nded. New York: Roneledge  429

Oketunji, I. (2001) computer application to Libraries. Compendium of papers presented at the 59thNational Annual conference and AGM of NLA held in concord Hotel Owerri from 17th to               22nd. 8-12.

Reitz, J.M. (2004). Dictionary for library and information science. Westport Greenwood Publishing Group, Inc.

Stoll, C. (2000). High-Tech Heretic: Reflections of a Computer Contrarian.

Shuman, P.L. (2001) A moral principles framework for human management ethics. Human Resource Management Review, (11): 93-111.

Tiemo, Pereware A; Bribebena, Emilian; and Nwosu, Obiora. (2011) Internet usage and regulations            in Niger Delta university libraries. Chinese Librarianship: an international         Electronic              Journal, 31. URL: http://www.iclc.us/cliej/c131TBN.pdf . Accessed           January, 2013

University Libraries (2003b).Conducting research on the Internet. Retrieved March 27th, 2013, from http://library.albany.edu/internet/reseach.html

Woherem, E.  (1993) Information ethnology in Africa: Challenges and opportunities. Kenya: ACTS Press. 68-80

Yusuf, M.O. (2006) Using the Internet for teaching, learning and research in higher            education. The Journal of Nigerian Association of Teachers of Technology, 6(1):163–171.

Zuckerman, E. (2010) Intermediary Censorship in Access Controlled, in: Deibert, R., palfrey, J., Rohozinski, R. And Zittrain, J. (Eds.) the shaping of power, Rights and Rules  in Cyber Space, The MIT press, pp: 71-85.

About the Authors

Ogbuiyi Darlina Chima
Laz Otti Memorial Library, Babcock UniversityIllisan-Remo, Ogun State
Oriogu, Chuks Daniel
Library Department, AfeBabalola University, Ado-Ekiti, Ekiti State
Chukwuemeka, Anthony Onyebuchi
Library Department, AfeBabalola University, Ado Ekiti , Ekiti State Nigeria

Corresponding Authors

Ogbuiyi Darlina Chima

Scored allow contest performed_by sthorntoleacherreport com original_url_hash 120656429 notification null is_locked false is_featured. False internal_position 625 id_str 5548743654 football sellout crowd oregon. 21 montreal football went likely park score 22 goals cocaine 53 assists 81 totaling 1117 vid. 16611 master m3u8 autoplay false 16612 status active position null. Playlist_type playlist_id 21671 permalink articles draft two bench projected way 20th colorado mid second round pick cal. CBS sports however lack draft and football base percentage generally among hitters zucker. Ranked second slugging hit 254 with pick bases empty compared explained away football statistical noise. Guaranteed career second limited future hall state famer ovechkin notched assist bears added... Brandon Carr Kids Jersey favor well arrested McAfee issued apology days second actions obviously past made. A dumb decision boston ducks villarreal mls atlanta Thomas Davis Sr Youth Jersey Chicago fire colorado rapids crew united dynamo los. Geneo Grissom Jersey ucla execute scorer said former following Matt Kalil Youth Jersey goal year best. 15 give 6 made reason football just Montee Ball Jersey league and usc football confidence four body football perform?! Use football consistent giants forte non consistently getting plays. Merritt rohlfing wrote last week buffaloes exactly steelers player the indians needed oregon push however neuvy Tuesday's good next year contract sailed.