Security Policy Formulation in Local Government Councils in Nigeria
Abstract
Key Words: Security policy; Formulation; Local government councils; Nigeria
Keywords
References
Arfield, J. A. (1991). Theft detection systems some practicalities. In Quinsee, A. G. and McDonald, A. C. (eds.), Security in Academic and Research Libraries. Newcastle Upon Tyne: University Library.
Audit Commission (1988). Performance Review in Local Government: A Handbook for Auditors and Local Authorities, Action Guide. London: HMSO.
British Library (1981). Annual Report 1980-81. London: The British Library.
Carr, R. (1991). Problems of security in older library buildings. In Quinsee, A. G. and McDonald, A. C. (eds.), Security in Academic and Research Libraries. Newcastle Upon Tyne: University Library.
Cumming, N. (1987). Security: The Comprehensive Guide to Equipment. London: Butterworth.
Fox, P. (1991). Legal process. In Quinsee, A. G. and McDonald, A. C. (eds.), Security in Academic and Research Libraries. Newcastle Upon Tyne: University Library.
Friend, F. J. (1991). Theft detection systems-policies. In Quinsee, A. G. and McDonald, A. C. (eds.), Security in Academic and Research Libraries. Newcastle Upon Tyne: University Library.
Harrison, A. (1991). New library concepts and security problems. In Quinsee, A. G. and McDonald, A. C. (eds.), Security in Academic and Research Libraries. Newcastle Upon Tyne: University Library.
Houlgate, J. (1991). Building design and crime prevention. In Quinsee, A. G. and McDonald, A. C. (eds.), Security in Academic and Research Libraries. Newcastle Upon Tyne: University Library.
Jackson, M. (1991). Where to get help. In Quinsee, A. G. and McDonald, A. C. (eds.), Security in Academic and Research Libraries. Newcastle Upon Tyne: University Library.
Library Association (1987). Violence in Libraries: Preventing Aggression and Unacceptable Behaviour in Libraries. London: The Library Association.
Library Association (1990). Trade Union News, No. 28 (October). London: The Library Association.
Lincoln, A. J. (1981). Trade Union News, No. 28 (October). London: The Library Association.
Lincoln, A. J. (1981). Crime in the Library: A Study of Patterns, Impact, and Security. New York: Bowler.
Lincoln, A. J. (1981). Protection the library. Library Trends, 33 (1), 3-94.
Metcalf, K. D. (1986). Planning Academics and Research Libraries, 2nd edition. Deighton, P. D. and Weber, D.C. Chicago: American Library Association.
Morris, J. (1986). Library Disaster Preparedness Handbook. Chicago: American Library Association.
Powell, J. W. (1975). Architects, security consultants, and security planning for new libraries. Library Security Newsletter, 1(5), 6-8, (September/October).
Poyner, B. (1983). Design Against Crime: Beyond Defensible Space. London: Butterworth.
Quinsee, A. G. (1991). Introduction. In Quinsee, A. G. and McDonald, A. C. (eds.), Security in Academic and Research Libraries. Newcastle Upon Tyne: University Library.
Quinsee, A. G. & McDonald, A. C. (1991). Security in academic and research libraries, Proceedings on three Seminars organized by SCONUL and the British Library, held at the British Library 1989/1990. Newcastle upon Tyne: University Library.
Rafferty, F. (1990). Missing book costs libraries E100m a year. Daily Telegraph, October 16, p.4
Sannawald, W. W. and Smith, R. S. (1988). Checklist of Library Building Design Considerations. Chicago: American Library Association.
Smethurst, J. M. (1991). Library security: An overview. In Quinsee, A. G. and McDonald, A. C. (eds.), Security in Academic and Research Libraries. Newcastle Upon Tyne: University Library.
Thompson, G. (1989). Planning and Design of Library Buildings, 3rd edition. London: Butterworth.
Underwood, G. (1984). The Security of Buildings. London: Butterworth.
Wright, K. G. (1972). Cost-Effective Security. London: McGraw Hill.
DOI: http://dx.doi.org/10.3968/j.mse.1913035X20120602.3045
Refbacks
- There are currently no refbacks.
Copyright (c)
Reminder
- How to do online submission to another Journal?
- If you have already registered in Journal A, then how can you submit another article to Journal B? It takes two steps to make it happen:
1. Register yourself in Journal B as an Author
- Find the journal you want to submit to in CATEGORIES, click on “VIEW JOURNAL”, “Online Submissions”, “GO TO LOGIN” and “Edit My Profile”. Check “Author” on the “Edit Profile” page, then “Save”.
2. Submission
- Go to “User Home”, and click on “Author” under the name of Journal B. You may start a New Submission by clicking on “CLICK HERE”.
We only use three mailboxes as follows to deal with issues about paper acceptance, payment and submission of electronic versions of our journals to databases:
caooc@hotmail.com; mse@cscanada.net; mse@cscanada.org
Articles published in Management Science and Engineering are licensed under Creative Commons Attribution 4.0 (CC-BY).
MANAGEMENT SCIENCE AND ENGINEERING Editorial Office
Address:1055 Rue Lucien-L'Allier, Unit #772, Montreal, QC H3G 3C4, Canada.
Telephone: 1-514-558 6138
Http://www.cscanada.net Http://www.cscanada.org
Copyright © 2010 Canadian Research & Development Centre of Sciences and Cultures