{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T04:53:14Z","timestamp":1767588794908,"version":"3.41.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319781044"},{"type":"electronic","value":"9783319781051"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78105-1_80","type":"book-chapter","created":{"date-parts":[[2018,3,14]],"date-time":"2018-03-14T10:03:15Z","timestamp":1521021795000},"page":"693-702","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Librarians as Information Intermediaries: Navigating Tensions Between Being Helpful and Being Liable"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9362-9032","authenticated-orcid":false,"given":"Jessica","family":"Vitak","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5008-2097","authenticated-orcid":false,"given":"Yuting","family":"Liao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9244-7915","authenticated-orcid":false,"given":"Priya","family":"Kumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9086-4221","authenticated-orcid":false,"given":"Mega","family":"Subramaniam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,15]]},"reference":[{"key":"80_CR1","unstructured":"American Library Association: Privacy, surveillance, and cybersecurity fact sheet (2017). http:\/\/www.ala.org\/advocacy\/advleg\/federallegislation\/privacy"},{"key":"80_CR2","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1086\/292745","volume":"96","author":"A Baier","year":"1986","unstructured":"Baier, A.: Trust and antitrust. Ethics 96, 231\u2013260 (1986). https:\/\/doi.org\/10.1086\/292745","journal-title":"Ethics"},{"key":"80_CR3","unstructured":"Becker, S., et al.: Opportunity for all: how the American public benefits from internet access at U.S. libraries (IMLS-2010-RES-01). Institute of Museum and Library Services, Washington, DC (2010)"},{"key":"80_CR4","unstructured":"Blank, R.M., Strickling, L.E.: Exploring the digital nation: home broadband internet adoption in the United States. US Department of Commerce, Washington, DC (2010)"},{"key":"80_CR5","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1016\/j.acalib.2006.03.005","volume":"32","author":"SL Bowers","year":"2006","unstructured":"Bowers, S.L.: Privacy and library records. J Acad. Librariansh. 32, 377\u2013383 (2006). https:\/\/doi.org\/10.1016\/j.acalib.2006.03.005","journal-title":"J Acad. Librariansh."},{"key":"80_CR6","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1111\/j.1467-985X.2009.00591.x","volume":"172","author":"J Ermisch","year":"2009","unstructured":"Ermisch, J., et al.: Measuring people\u2019s trust. J. Roy. Stat. Soc.: Ser. A 172, 749\u2013769 (2009). https:\/\/doi.org\/10.1111\/j.1467-985X.2009.00591.x","journal-title":"J. Roy. Stat. Soc.: Ser. A"},{"key":"80_CR7","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1108\/09593841011069158","volume":"23","author":"R Gomez","year":"2010","unstructured":"Gomez, R., Gould, E.: The \u201ccool factor\u201d of public access to ICT: users\u2019 perceptions of trust in libraries, telecentres and cybercaf\u00e9s in developing countries. Inf. Technol. People 23, 247\u2013264 (2010). https:\/\/doi.org\/10.1108\/09593841011069158","journal-title":"Inf. Technol. People"},{"key":"80_CR8","volume-title":"Professional Liability Issues for Librarians and Information Professionals","author":"PD Healey","year":"2008","unstructured":"Healey, P.D.: Professional Liability Issues for Librarians and Information Professionals. Neal-Schuman, New York (2008)"},{"key":"80_CR9","unstructured":"Horrigan, J.: Libraries 2016. Pew Internet Project, Washington, DC (2016). http:\/\/www.pewinternet.org\/2016\/09\/09\/libraries-2016\/"},{"key":"80_CR10","doi-asserted-by":"publisher","first-page":"34","DOI":"10.6017\/ital.v26i4.3268","volume":"26","author":"PT Jaeger","year":"2007","unstructured":"Jaeger, P.T., Fleischmann, K.R.: Public libraries, values, trust, and e-government. Inf. Technol. Libr. 26, 34 (2007). https:\/\/doi.org\/10.6017\/ital.v26i4.3268","journal-title":"Inf. Technol. Libr."},{"key":"80_CR11","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.lisr.2011.07.009","volume":"34","author":"CA Johnson","year":"2012","unstructured":"Johnson, C.A.: How do public libraries create social capital? An analysis of interactions between library staff and patrons. Libr. Inf. Sci. Res. 34, 52\u201362 (2012). https:\/\/doi.org\/10.1016\/j.lisr.2011.07.009","journal-title":"Libr. Inf. Sci. Res."},{"key":"80_CR12","first-page":"20","volume":"4","author":"S Kang","year":"2003","unstructured":"Kang, S.: A study on ethic of librarians and information services job. Libr. People 4, 20\u201359 (2003)","journal-title":"Libr. People"},{"key":"80_CR13","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1080\/17482798.2010.486136","volume":"4","author":"VS Katz","year":"2010","unstructured":"Katz, V.S.: How children of immigrants use media to connect their families to the community: the case of Latinos in South Los Angeles. J. Child. Med. 4, 298\u2013315 (2010). https:\/\/doi.org\/10.1080\/17482798.2010.486136","journal-title":"J. Child. Med."},{"key":"80_CR14","volume-title":"Qualitative Data Analysis: An Expanded Sourcebook","author":"MB Miles","year":"1994","unstructured":"Miles, M.B., Huberman, A.M.: Qualitative Data Analysis: An Expanded Sourcebook, 2nd edn. SAGE, Thousand Oaks (1994)","edition":"2"},{"key":"80_CR15","doi-asserted-by":"crossref","first-page":"26","DOI":"10.5860\/cal.13n2.26","volume":"13","author":"JE Mills","year":"2015","unstructured":"Mills, J.E., Romeijn-Stout, E., Campbell, C., Koester, A.: Results from the young children, new media, and libraries survey. Child. Libr. 13, 26\u201335 (2015)","journal-title":"Child. Libr."},{"key":"80_CR16","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1108\/LHT-08-2013-0103","volume":"32","author":"Y Noh","year":"2014","unstructured":"Noh, Y.: Digital library user privacy: changing librarian viewpoints through education. Libr. Hi Tech 32, 300\u2013317 (2014). https:\/\/doi.org\/10.1108\/LHT-08-2013-0103","journal-title":"Libr. Hi Tech"},{"key":"80_CR17","doi-asserted-by":"publisher","first-page":"53","DOI":"10.5865\/IJKCT.2017.7.2.053","volume":"7","author":"Y Noh","year":"2017","unstructured":"Noh, Y.: A critical literature analysis of library and user privacy. Int. J. Knowl. Content Dev. Technol. 7, 53\u201383 (2017). https:\/\/doi.org\/10.5865\/IJKCT.2017.7.2.053","journal-title":"Int. J. Knowl. Content Dev. Technol."},{"key":"80_CR18","unstructured":"Pew Research Center: Internet\/Broadband Fact Sheet (2017). http:\/\/www.pewinternet.org\/fact-sheet\/internet-broadband\/"},{"key":"80_CR19","doi-asserted-by":"publisher","first-page":"161","DOI":"10.2202\/1944-2866.1058","volume":"2","author":"A Powell","year":"2010","unstructured":"Powell, A., Bryne, A., Dailey, D.: The essential internet: digital exclusion in low-income American communities. Policy Internet 2, 161\u2013192 (2010). https:\/\/doi.org\/10.2202\/1944-2866.1058","journal-title":"Policy Internet"},{"key":"80_CR20","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1080\/713698499","volume":"12","author":"J Roberts","year":"2000","unstructured":"Roberts, J.: From know-how to show-how? Questioning the role of information and communication technologies in knowledge transfer. Technol. Anal. Strateg. Manag. 12, 429\u2013443 (2000). https:\/\/doi.org\/10.1080\/713698499","journal-title":"Technol. Anal. Strateg. Manag."},{"key":"80_CR21","doi-asserted-by":"crossref","first-page":"344","DOI":"10.24908\/ss.v7i3\/4.4160","volume":"7","author":"T Rooney","year":"2010","unstructured":"Rooney, T.: Trusting children: how do surveillance technologies alter a child\u2019s experience of trust, risk and responsibility? Surveill. & Soc. 7, 344\u2013355 (2010)","journal-title":"Surveill. & Soc."},{"key":"80_CR22","unstructured":"Rozengardt, A., Finquelievich, S.: Public access to information & ICTs final report. University of Washington Center for Information & Society, Seattle, WA (2008)"},{"key":"80_CR23","doi-asserted-by":"crossref","DOI":"10.5771\/9780810892729","volume-title":"Digital Literacy and Digital Inclusion: Information Policy And the Public Library","author":"KM Thompson","year":"2014","unstructured":"Thompson, K.M., et al.: Digital Literacy and Digital Inclusion: Information Policy And the Public Library. Rowman & Littlefield, Lanham (2014)"},{"key":"80_CR24","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1177\/1461444810375293","volume":"13","author":"LM Tripp","year":"2011","unstructured":"Tripp, L.M.: \u2018The computer is not for you to be looking around, it is for schoolwork\u2019: challenges for digital inclusion as Latino immigrant families negotiate children\u2019s access to the internet. New Media Soc. 13, 552\u2013567 (2011). https:\/\/doi.org\/10.1177\/1461444810375293","journal-title":"New Media Soc."},{"key":"80_CR25","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.lisr.2010.04.005","volume":"33","author":"A V\u00e5rheim","year":"2011","unstructured":"V\u00e5rheim, A.: Gracious space: library programming strategies towards immigrants as tools in the creation of social capital. Libr. Inf. Sci. Res. 33, 12\u201318 (2011). https:\/\/doi.org\/10.1016\/j.lisr.2010.04.005","journal-title":"Libr. Inf. Sci. Res."},{"key":"80_CR26","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1016\/j.telpol.2007.04.001","volume":"31","author":"M Warren","year":"2007","unstructured":"Warren, M.: The digital vicious cycle: links between social disadvantage and digital exclusion in rural areas. Telecommun. Policy 31, 374\u2013388 (2007). https:\/\/doi.org\/10.1016\/j.telpol.2007.04.001","journal-title":"Telecommun. Policy"}],"container-title":["Lecture Notes in Computer Science","Transforming Digital Worlds"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78105-1_80","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T19:59:05Z","timestamp":1751486345000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78105-1_80"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319781044","9783319781051"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78105-1_80","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}