Cost-Benefit Analysis of Security Gates and Collection Shrink in the Academic Library
DOI:
https://doi.org/10.18438/eblip30814Abstract
Objective – Two academic libraries serving public universities in the United States faced a similar choice of whether to keep magnetic security gates in place and pay for their upkeep. To make informed decisions, researchers at Chicago State University (CSU) and Western Kentucky University Libraries (WKUL) ran concurrent studies with different models of cost-benefit analysis to determine whether magnetic security gates were worth the expense. Security gates were physically present but not functional at both institutions during the study. Exploring different methods of analysis provided opportunities to discuss whether security gates are effective at preventing collection shrink, identify issues in measuring the costs of theft, and explain why WKUL chose to remove magnetic security gates altogether.
Methods – At CSU, we measured loss over a six-month period on a sample set of 110 monographs. The cost of replacing missing books, including labor and incidentals, was used to approximate the cost of shrink in an equivalent percentage of materials from the main collection housed in open stacks. We compared the expected cost of replacing the security gates to the estimated cost of shrink to determine how much loss security gates would need to prevent to justify the cost of maintaining security gates. While the sample was neither randomized nor large enough to draw conclusions, trialing this model of cost comparison presented an opportunity for discussion.
WKUL had a practice of running a near continuous inventory prior to this study. In 2024, staff inventoried the entire collection held in open stacks. This provided a precise number of how many items went missing during that timeframe. We compared the number of missing items to the quoted cost of annual service and maintenance fees to determine whether maintaining security gates would justify the cost. Simply dividing the annual service fees by the number of missing items provided a dollar value per missing item that security gates would have had to save in order to justify their expense.
Results – The calculated annual cost of collection shrink at CSU is $136,335, much more than the estimated $85,121 to replace the magnetic security gates. Inferring a similar rate of shrink to the sample set, despite the problems with the method, suggests that new security gates would have to prevent 62.44% of total loss to pay for themselves in the first year, 33.66% in two years, and 24.07% over three years. While we did not draw firm conclusions from this trial analysis, it is evident that security gates would likely save money over the span of a few years.
WKUL found that 99 individual items went missing from all collections housed in open stacks over 2024. The quoted annual subscription fee for the four sets of security gates at WKUL is $8,894. These data suggest that security gates at WKUL must prevent an average of $89.83 in lost value per missing item to justify the annual fees alone. Another way of describing this is that if each item that went missing cost $89.83, security gates would have to stop 100% of collection shrink to make up for their annual subscription fees. A more likely scenario is that security gates would have prevented 50% of the collection shrink, and materials would have had to carry an average value of $179.66 for security gates to pay for themselves.
Conclusion – At first glance, the data from CSU suggests that magnetic security gates have the potential to prevent enough collection loss that they pay for themselves. The library at CSU has an annual operating budget of just over $2 million, and an annual loss of nearly $140,000 in value would be unsustainable. However, the data from WKUL suggest it would be difficult to justify the annual subscription fees, let alone the cost of replacing defunct hardware. Further inquiry and discussion are needed to explore variables not covered in this study, including employee theft, security gate efficacy, the lifecycle of library materials, and how security gates may affect students’ feelings of belonging and inclusion.
Downloads
References
Aiken, L. (2017). Clemson University Libraries SC. Library Journal, 142(1), 44.
Alnaim, M. (2018). The impact of zero tolerance policy on children with disabilities. World Journal of Education, 8(1), 1. https://doi.org/10.5430/wje.v8n1p1
Anderson, A. J. (1985). After the security system, what? Library Journal, 110(19), 59.
Aulisio, G. (2022). Prices of U.S. and foreign published materials. In ALA Core Library Materials Price Index Editorial Board (Eds.), Book trade research and statistics (pp. 331-386). http://hdl.handle.net/11213/20443
Chander, R., Dhar, M., & Bhatt, K. (2022). Bibliometric analysis of studies on library security issues in academic institutions. Journal of Access Services, 19(2/3), 86-104. https://doi.org/10.1080/15367967.2022.2118058
Charles, P. (2017). Book thief. AALL Spectrum, 21(4), 47-50.
Eye, J. (2023). Improving contract negotiations for library collections through open records requests. College & Research Libraries, 84(6), 954. https://doi.org/10.5860/crl.84.6.954
Foster, C. (1996). Determining losses in academic libraries and the benefits of theft detection systems. Journal of Librarianship and Information Science, 28(2), 93-103. https://doi.org/10.1177/096100069602800204
Gawley, M. P., Cuellar, M. J., & Coyle, S. (2021). A theoretical and empirical assessment of authoritarianism’s effects on behavior, attendance, and performance in urban school systems. Contemporary Justice Review, 24(2), 197-217. https://doi.org/10.1080/10282580.2021.1881894
Gelernter, J. (2005). Loss prevention strategies for the 21st century library: Why theft prevention should be high priority. Information Outlook, 9(12), 12-22.
Griffiths, R., & Krol, A. (2009). Insider theft: Reviews and recommendations from the archive and library professional literature. Library & Archival Security, 22(1), 5-18. https://doi.org/10.1080/01960070802562834
Harper, K., & Seok, D. (2019). Five questions to ask about school safety. Education Digest 84(5), 38-40.
Harwell, J. (2014). Library security gates: Effectiveness and current practice. Journal of Access Services, 11(2), 53-65. https://doi.org/10.1080/15367967.2014.884876
Holt, G. (2007). Theft by library staff. The Bottom Line, 20(2): 85-93. https://doi.org/10.1108/08880450710773020
Lipinski, B. & Saunders, N. (2021). Welcoming spaces, welcoming environments: Addressing bias and over-policing in libraries. Journal of Library Administration, 61(8), 1017-1022. https://doi.org/10.1080/01930826.2021.1984147
Michalko, J., & Heidtmann, T. (1978). Evaluating the effectiveness of an electronic security system. College & Research Libraries, 39(4), 263-267. https://doi.org/10.5860/crl_39_04_263
O’Connor, M., & Reid, B. (2007). Insider financial crime in U.S. public libraries: An analysis of incidents with policy suggestions for prevention. Public Library Quarterly, 26(1-2), 1-19. https://doi.org/10.1300/J118v26n01_01
OhioNet. (2025). OhioNet 2025 Bibliotheca pricing. https://web.archive.org/web/20250325220025/https://www.ohionet.org/wp-content/uploads/2025/02/OhioNet-2025-Bibliotheca-Discounts.pdf
Smith, F. E. (1985). Questionable strategies in library security studies. Library & Archival Security, 6(4), 43-53. https://doi.org/10.1300/J114v06n04_05
Snyder, H. (2006). Small change, big problems: Detecting and preventing financial misconduct in your library. American Library Association.
Van Nort, S. C. (1994). Archival and library theft: The problem that will not go away. Library & Archival Security, 12(2), 25-49. https://doi.org/10.1300/J114v12n02_03
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Loren Mindell, Gabrielle Toth, Joshua Vossler, Amanda Hardin

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The Creative Commons-Attribution-Noncommercial-Share Alike License 4.0 International applies to all works published by Evidence Based Library and Information Practice. Authors will retain copyright of the work.



