Cyber security and management of digital collections in academic libraries in Cross River State
Abstract
Background: This study investigated the contribution of cybersecurity measures to the management of digital collections in academic libraries within Cross River State, Nigeria. With the increasing digitization of library resources, understanding how cybersecurity components such as data integrity, access control, user authentication, and encryption support digital collection management has become essential.
Methodology: A cross-sectional survey research design was adopted, involving 42 library staff from the University of Calabar and the University of Cross River State. Data were collected using the Cybersecurity and Digital Collections in Academic Libraries Scale (CSDCALS), a researcher-developed instrument validated through Item-Content Validity Index (I-CVI) and Scale Content Validity Index (S-CVI), and found reliable using Cronbach’s alpha. Simple regression analysis was used to test the hypotheses and analyze responses to the research questions.
Findings/Results: The results revealed that data integrity, access control, user authentication, and encryption significantly influence the effective management of digital collections in academic libraries. These cybersecurity components were found to enhance the accuracy, security, and reliability of digital resources.
Implications: The findings underscore the importance of integrating cybersecurity strategies into digital library practices to safeguard information assets and ensure consistent access to high-quality digital content. Failure to address these components may compromise the integrity and availability of digital collections.
Conclusion: Cybersecurity plays a pivotal role in the management of digital collections in academic libraries. Its components contribute meaningfully to preserving the integrity and accessibility of digital resources.
Recommendations: Academic libraries should adopt robust data integrity protocols, including regular data audits, the use of checksums, and implementation of version control systems. Additionally, strengthening access control, user authentication, and encryption mechanisms will further protect digital collections and enhance user trust in digital library services