Chapter Five
Challenges and Prospects of Automation in Nigeria Libraries

5.1 Chapter Objectives
After reading this chapter readers should be able to:
1. List major challenges of automation in Nigeria libraries
2. Identify strategies to overcome challenges of automation in Nigeria libraries
3. Enumerate prospects of automation in Nigeria libraries
5.2 Chapter Introduction
In this chapter readers are introduced to:
§ Major challenges of automation in Nigeria libraries
§ Strategies to overcome challenges of automation in Nigeria libraries
§ Prospects of automation in Nigeria libraries
5.2.1 Challenges of Automation in Nigeria Libraries
*

HighLights:
« Managerial factor
« Personnel factor
« Equipment factor
« Environmental factor
« Regulatory factor
------------------*****------------------
Automation is progressively taking hold in Nigerian libraries, and this is a constant process because libraries would want to work with the most recent technology to stay current. This implies that problems with library automation would keep arising, and the only way to deal with them would be to keep coming up with solutions.
In this chapter, there are five ways to look at the issues that library automation in Nigeria is currently facing:
§ Managerial factor
§ Personnel factor
§ Equipment factor
§ Environmental factor, and
§ Regulatory factor
1. MAGERIAL FACTOR
Many libraries in Nigeria are government owned. Thus, they depend on the budgetary of fund to function. Libraries of tertiary institutions that are indirectly owned by federal government, and those directly owned by the same government (national libraries) perform averagely in the offering of online services. But some deverse commendation because they are far ahead of others. However, the libraries own by either states or local governments are far left behind because of poor budgetary of fund to the libraries except few of them own by some state tertiary institutions benefiting from the treasury of Tertiary Education Trust Fund (TETFund) are performing averagely. The governments and managements of the state and local government libraries give not the desire attention to the libraries own to them. The worst are library managements and staff of these libraries which in most cases sitting idol waiting for intervention without initiating tangible efforts to draw attention of the government to their plights.
2. personnel FACTOR
Many of the challenges emanating from the personnel (staff) have been trashed in the preceding chapters, especially in the research reports presented at the end of each chapter. Notable are nonchalant attitude of the staff to the daily routines in automated settings, lack of initiation and the zeal to use initiations of colleagues and working together in the spirit of oneness. These are serious challenges causing setbacks in library networkings and general issues in library automation. Unless and until personnel of the libraries pay cogent attention to daily routines, having zeal to initiate new ideas, working with the new ideas and togetherness, reasonable progression would be achieved in Nigeria libraries with regards to automation. Library personnel must keep to the ethics of the proffession (librarianship) to move ahead. Moreover, the personnel must imbibe the spirit of Godliness in executing tasks entrusted upon them. Just as it is said that “teachers’ rewards are in heven” librarians should also look toward to this apart of emoluments enjoyed in this world.
3. Equipment factor
Access to sufficient equipment is a case in some libraries in Nigeria. Sufficiency in number of equipment to cater for automated library routines and strength of the equipment to accomplish expected task (functionality) are major challenges in the libraries. Hardwares are either obsolete or malfunctioning. Besides hardware, security of software is threatened by malicious attacks to cripple the system. Absence of computer security leads to corruption or loss of data, misuse or theft of information/identity, unauthorised use of information, and transmission of computer viruses that can cause breakdown of the system. Many of the security threats in automated settings today, particularly library networkings are spread over the internet. The commonest threats include:
§ Vandals: Application software or applets that cause destruction and loss of information.
§ Viruses: computer programs written by racketeering progmmer(s) in such a way that replicate themselves and infect computers when triggered by specific event or action.
§ Trojan Horse Programs: What appear to be harmless or useful software programs like games but harmful and dreading; a delivery vehicle for destructive code.
§ Attacks: exploitation of a flow in a computing system without the consent of system operator, and normally harmful. Attacks include gathering of data used to compromise networks (reconnaissance attacks), exploiting of network vulnerabilities to gain entry to e-mail, databases, and corporate networks (access attacks), and preventing access to computer system partly or entirely (denial focused vice attacks). Attack may occur through many ways. It may be through physical access (vandalism or theft of hardware, network monitoring of traffic), communication interception (identity spoofing, session hijacking, rerouting or alteration of messages), denials of services (interference with TCP/IP protocol, server software), intrusions (port scanning, buffer overflow, maliciousness), trapdoors (hidden in software programs), and social engineering (operator/user disclosure of confidential information out of ignorance or crock act). In some cases the operators or users when tipped deliberately disclose to hackers confidential security information to have access to organisation's lines and basses, especially if not working in the organisation anymore.
§ Data Interception: intercepting or altering of data packets being transmitted.
§ Harking: modifying computer hardware or software to accomplish a goal outside of the creator's original purpose. Harkers do this normally for financial benefits.
§ Social Engineering: to get hold of confidential network security information by crock or nontechnical means such as claiming to be officials for business or inquiry. Fraudsters often pose as officials and inquire confidential information to defraud network operators or users.
Effective security measures to guide against these threats are necessary to keep alive automated libraries. Some of the network security measures apart of physical protection of hardware and software include:
§ Effective management of network structure where routers, bridges and other devices used. Further more, network layout can be used to increase network security.
§ Firewalls implementation, configuration, management and monitoring.
§ Use of Intrusion Detection to determining when an intruder penetrated or attempted penetrating network.
§ Use of traps to delay intruders and prevent damage.
§ Use of passwords and different methods of storing and transmitting passwords, because variation of these methods can affect the security of the passwords and network. Further more, effective password policy should be adhered.
§ Various security tools should be used to check the security strength of the network and computers.
§ Effective use of virus protection to identify and remove viruses from computer systems and should be actively running on all computer systems on the network.
§ Cogent security policy that outline ways of using network and software, password policies, external connection policies, and other issues connected to this.
§ Versatility in security protocols; knowing various encryption protocols, their strength and weaknesses, and how they are best used help in making networks more secure and stable.
4. Environmental factor
Environmental factor is one of the major challenges of automation in Nigeria. Nigeria experience variation in weather - the short term state of the atmosphere at a specific time and place including temperature, relative humidity, cloud cover, precipitation, and wind that sometimes affect functionality of computers and networks. Hardware are prone to weather conditions especially when it is high. High temperature sometimes experienced in Nigeria affects functionality and durability of hardware. Network obstruction and fluctuation is a case during harsh weather condition. However, libraries where air-conditioning systems are put in place and properly functioning, effect of harsh weather condition is less or absolutely control. Efforts should be intensify in making available ACs in libraries to curtail threat pose by harsh weather condition. Proper erection, illumination, and ventilation of library structures to prevent inflow of dust particles during wind, and water vapours (mist, steam or fumes) during relative humidity, cloud cover, and precipitation, to avoid computer systems ( hardware & software) from malfunctioning. More so, prevention of the library from all sorts of linkages during rains to avoids penetration of water to computer systems and damages.
5. Regulatory factor
Effective regulatory policy formation and implementation to library automation and Networkings is prelequisite in making meaningful progression in library automation. Effective regulatory policy formation and implementation to library automation and Networkings that covers all libraries in Nigeria is not put in place. And this makes many libraries doing what they likes. No unanimous platform for discharge of activities which is an hindrance to library networking and general issues of ICT utilisation. Learn more of this in preceding chapters specifically chapter.
5.2.2 Prospects of automation in Nigeria librarieslibraries

Certainly, there is less reliance on conventional library techniques of information collecting, storage, processing, retrieval, and dissemination due to the emergency of automation in Nigerian libraries. In Nigeria, the majority of libraries struggle to remain relevant in the digital age. Academic libraries in particular are releasing digital services and goods that are designed for the institutional community and make it simpler to access essential information. Many academic libraries in Nigeria have advanced in terms of time and place convenience, allowing users from various locations to do searches directly inside the library's text rather than physically examining catalogue cards to find library contents. Thorough solution to the challenges previously itemised is what would guarantee continuation and improvement in service provision in these libraries in the furture. With timeline solutions to various challenges of network connectivities, automated libraries may disseminate and share information both locally and globally.
There are several advantages to library automation in Nigerian libraries. The largest advantage is instant access to library materials, and users may always choose from a wide range of formats, such as PDF, Word, and HTML. Reading using automated library resources won't ever make readers sneeze or leave ink stains on their hands since they are clean and devoid of the dust and mildew that are occasionally connected with books on the shelves of traditional Nigerian libraries. These conditions exist in Nigerian libraries as a consequence of attempts to automate, and given the current circumstances, additional advances are anticipated.
There is no doubting that Nigeria's library industry has improved through time, moving from a manual, outmoded manner of over-the-counter information searches to a more modern, digitally driven means of information delivery. Nigerian libraries have remained averagely successful in their efforts to remain relevant in an increasingly digital environment, particularly as more and more libraries began integrating information technology into their daily operations. The majority of libraries in Nigeria, particularly academic libraries, are making efforts to increase the use of the internet and digital library systems to connect with users. Most academic libraries in Nigeria are projected to face intense competition from alternative sources of information due to the rapid advancements in digital technology and user expectations and a search for new ways to improve service delivery strategies in tune with fourth industrial revolution (4IR). These practices would make academic libraries and other libraries in Nigeria face new challenges but prospects lies on fast solution to emerging challenges. In the fast changing world and fast changing libraries, digital technologies will replace many entry-level roles in the libraries and shall change the mode of delivery for some traditonal services in Nigeria libraries.
5.3 Chapter Summary
This chapter covers:
§ Challenges of automation in Nigeria libraries
§ Strategies to overcome challenges of automation in Nigeria libraries
§ Prospects of automation in Nigeria libraries
5.4 Evaluation
1. List five major challenges of automation in Nigeria libraries
2. Identify five strategies to overcome challenges of automation in Nigeria libraries
3. Briefly discuss the prospects of automation in Nigeria libraries under five headings.
References
Aina, L.O. (2004). Library and information Science text for African: Ibadan: Third world information services.
Balakrishnan, S. (2000). Information Science. Encyclopedia of Library and Information Technology for 21st Century, Volume 7, (p.15). India: Anmol Publication.
Bozimo, D.O. (2006). Note on Information Management: Zaria: Ahmadu Bello University.
Joosten, Tanya. 2012. Social Media for Educators Strategies and Best Practices. San Francisco: Jossey-Bass, Higher and Adult Education Series.
Lynch, C. (2000). From automation to transformation: Forty years of libraries and information technology in higher education.
Mcgrath, H.K. (2012). Maximization of World Wide Web Resources. Hlwiki. http://hlwiki.slais.ubc.ca/index.php/grey literature. (Accessed May, 2012).
Michael C, (2005) ‘‘The blog Library Crunch” New Review of Hypermedia & Multimedia 15 (3).
Muhammad, H. Etal (2019). Knowledge Integration: Key to Rejuvenation of Islamic Value System in our Society. GUJON [Gurara Journal of Humanity Studies] – A Multi-Disciplinary Edition, 11 (1)
Nassarawa, S. A. (2014). Access to Free Resources. Paper presented at the first Librarians Registration Council of Nigeria (LRCN) Conference, May 20th
Ndagi, A. B. (2019). Literacy and the Growth of Nigeria’s digital economy. Digital Economy Searchlight 3 (2)
Pandey, A. K. (2010). Network Security & Administration. New-Delhi: S.K. Kataria & sons.
Reitz, J. M. (2005). Dictionary for Library and Information Science. Chennai: Libraries.
Saeed, M. (2019). New version libraries and services revolving technology. Abidjan: Greenpsystems
Stair, R.M. and Reynolds, G.W. (2006). Fundamentals of Information Systems. 3rd ed. Australia: Thomson.
Ward, P. And Dafoulas, G. (2006). Database Management Systems. Australia: Thomson