{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T00:27:30Z","timestamp":1773102450020,"version":"3.50.1"},"reference-count":65,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2007,3,13]],"date-time":"2007-03-13T00:00:00Z","timestamp":1173744000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,3,13]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>To provide an introduction to concepts and resources that will be useful to library professionals learning about information ethics.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>This paper argues for the importance of information ethics to twenty\u2010first century library professionals. It describes what various authors have said about how information ethics can be applied to the ethical dilemmas faced by library professionals.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>In order to deal effectively with their ethical dilemmas, library professionals must have a good working knowledge of information ethics. Codes of professional ethics can help to provide such knowledge, but they are not sufficient. Courses on information ethics must be part of the education of information professionals. Such courses should provide library professionals with an understanding of ethical theories and how they apply to concrete practical cases. Such courses should also make explicit the connection between information ethics and the mission of the library professional.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>This paper is not intended to provide an exhaustive list of publications on the topic of information ethics and library professionals.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This paper provides library professionals with a concise introduction to information ethics.<\/jats:p><\/jats:sec>","DOI":"10.1108\/07378830710735830","type":"journal-article","created":{"date-parts":[[2007,3,15]],"date-time":"2007-03-15T10:46:54Z","timestamp":1173955614000},"page":"23-36","source":"Crossref","is-referenced-by-count":57,"title":["Information ethics for twenty\u2010first century library professionals"],"prefix":"10.1108","volume":"25","author":[{"given":"Don","family":"Fallis","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022031520233946000_b1","unstructured":"Alfino, M. and Pierce, L. (1997), Information Ethics for Librarians, McFarland, Jefferson, NC."},{"key":"key2022031520233946000_b2","unstructured":"American Association of Law Libraries (AALL) (1999), \u201cEthical principles\u201d, available at: www.aallnet.org\/about\/policy_ethics.asp."},{"key":"key2022031520233946000_b3","unstructured":"American Library Association (ALA) (1995), \u201cCode of ethics\u201d, available at: www.ala.org\/ala\/oif\/statementspols\/codeofethics\/codeethics.htm."},{"key":"key2022031520233946000_b4","unstructured":"American Library Association (ALA) (1996), \u201cLibrary bill of rights\u201d, available at: www.ala.org\/ala\/oif\/statementspols\/statementsif\/librarybillrights.htm."},{"key":"key2022031520233946000_b5","unstructured":"American Library Association (ALA) (2002), \u201cIntellectual freedom and censorship Q & A\u201d, available at: www.ala.org\/ala\/oif\/basics\/intellectual.htm."},{"key":"key2022031520233946000_b6","unstructured":"American Society for Information Science and Technology (ASIST) (1992), \u201cProfessional guidelines\u201d, available at: www.asis.org\/AboutASIS\/professional\u2010guidelines.html."},{"key":"key2022031520233946000_b7","unstructured":"Aristotle (350BC\/2000), Nichomachean Ethics, Cambridge University Press, Cambridge."},{"key":"key2022031520233946000_b8","unstructured":"Baldwin, G.B. (1996), \u201cThe library bill of rights \u2013 a critique\u201d, Library Trends, Vol. 45 No. 1, pp. 7\u201027."},{"key":"key2022031520233946000_b9","unstructured":"Branin, J.J. and Case, M. (1998), \u201cReforming scholarly publishing in the sciences: a librarian perspective\u201d, Notices of the American Mathematical Society, Vol. 45 No. 4, pp. 475\u201086."},{"key":"key2022031520233946000_b10","doi-asserted-by":"crossref","unstructured":"Buchanan, E.A. (2004), \u201cEthics in library and information science: what are we teaching?\u201d, Journal of Information Ethics, Vol. 13 No. 1, pp. 51\u201060.","DOI":"10.3172\/JIE.13.1.51"},{"key":"key2022031520233946000_b11","unstructured":"Carbo, T. (2005), \u201cInformation ethics education: a brief overview of current issues\u201d, Computer Society of India Communications, Vol. 28 No. 12, pp. 25\u20106."},{"key":"key2022031520233946000_b12","unstructured":"Carbo, T. and Almagno, S. (2001), \u201cInformation ethics: the duty, privilege and challenge of educating information professionals\u201d, Library Trends, Vol. 49 No. 3, pp. 510\u20108."},{"key":"key2022031520233946000_b13","doi-asserted-by":"crossref","unstructured":"De George, R.T. (2003), The Ethics of Information Technology and Business, Blackwell, Malden, MA.","DOI":"10.1002\/9780470774144"},{"key":"key2022031520233946000_b14","doi-asserted-by":"crossref","unstructured":"Doyle, T. (2001), \u201cA utilitarian case for intellectual freedom in libraries\u201d, Library Quarterly, Vol. 71 No. 1, pp. 44\u201071.","DOI":"10.1086\/603240"},{"key":"key2022031520233946000_b15","doi-asserted-by":"crossref","unstructured":"Doyle, T. (2002), \u201cA critical discussion of \u2018The ethical presuppositions behind the Library Bill of Rights\u2019\u201d, Library Quarterly, Vol. 72 No. 3, pp. 275\u201093.","DOI":"10.1086\/lq.72.3.40039760"},{"key":"key2022031520233946000_b16","unstructured":"Drabenstott, K.M. (2000), \u201cCurrent educational trends in library and information science curricula\u201d, Proceedings of the Czech and Slovak Library Information Network, available at: www.ics.muni.cz\/caslin2000\/drabenstott\u2010e.html."},{"key":"key2022031520233946000_b17","doi-asserted-by":"crossref","unstructured":"Fallis, D. (2006), \u201cSocial epistemology and information science\u201d, Annual Review of Information Science and Technology, No. 40.","DOI":"10.1002\/aris.1440400119"},{"key":"key2022031520233946000_b18","unstructured":"Fallis, D. and Frick\u00e9, M. (1999), \u201cNot by library school alone\u201d, Library Journal, Vol. 124 No. 17, pp. 44\u20105."},{"key":"key2022031520233946000_b19","doi-asserted-by":"crossref","unstructured":"Fallis, D. and Mathiesen, K. (2001), \u201cResponse to \u2018A utilitarian case for intellectual freedom in libraries\u2019\u201d, Library Quarterly, Vol. 71 No. 3, pp. 437\u20108.","DOI":"10.1086\/603309"},{"key":"key2022031520233946000_b20","doi-asserted-by":"crossref","unstructured":"Floridi, L. (2001), \u201cInformation ethics: an environmental approach to the digital divide\u201d, Philosophy in the Contemporary World, Vol. 9 No. 1, pp. 1\u20107.","DOI":"10.5840\/pcw2002915"},{"key":"key2022031520233946000_b21","unstructured":"Foot, P. (1978), Virtues and Vices, Blackwell, Oxford."},{"key":"key2022031520233946000_b22","doi-asserted-by":"crossref","unstructured":"Frick\u00e9, M., Mathiesen, K. and Fallis, D. (2000), \u201cThe ethical presuppositions behind the Library Bill of Rights\u201d, Library Quarterly, Vol. 70 No. 4, pp. 468\u201091.","DOI":"10.1086\/603218"},{"key":"key2022031520233946000_b24","doi-asserted-by":"crossref","unstructured":"Froehlich, T. (2005), \u201cA brief history of information ethics\u201d, Computer Society of India Communications, Vol. 28 No. 12, pp. 11\u201013.","DOI":"10.1109\/MC.2005.373"},{"key":"key2022031520233946000_b23","unstructured":"Froehlich, T.J. (1992), \u201cEthical considerations of information professionals\u201d, Annual Review of Information Science and Technology, No. 27, pp. 291\u2010324."},{"key":"key2022031520233946000_b25","unstructured":"Garoogian, R. (1991), \u201cLibrarian\/patron confidentiality: an ethical challenge\u201d, Library Trends, Vol. 40 No. 2, pp. 216\u201033."},{"key":"key2022031520233946000_b26","doi-asserted-by":"crossref","unstructured":"Hannabuss, S. (1996), \u201cTeaching library and information ethics\u201d, Library Management, Vol. 17 No. 2, pp. 24\u201035.","DOI":"10.1108\/01435129610108243"},{"key":"key2022031520233946000_b27","unstructured":"Hauptman, R. (1988), Ethical Challenges in Librarianship, Oryx, Phoenix, AZ."},{"key":"key2022031520233946000_b28","unstructured":"Hauptman, R. (2002), Ethics and Librarianship, McFarland, Jefferson, NC."},{"key":"key2022031520233946000_b29","unstructured":"Hettinger, E.C. (1989), \u201cJustifying intellectual property\u201d, Philosophy and Public Affairs, Vol. 18 No. 1, pp. 31\u201052."},{"key":"key2022031520233946000_b30","unstructured":"Jefferson, T. (1813\/1944), The Life and Selected Writings of Thomas Jefferson, Modern Library, New York, NY."},{"key":"key2022031520233946000_b31","unstructured":"Johnson, D.G. (1999), \u201cSorting out the uniqueness of computer\u2010ethical issues\u201d, Etica e Politica, Vol. 1 No. 2, available at: www.univ.trieste.it\/\u223cetica\/1999_2\/johnson.html."},{"key":"key2022031520233946000_b32","doi-asserted-by":"crossref","unstructured":"Johnson, W.G. (1994), \u201cThe need for a value\u2010based reference policy: John Rawls at the reference desk\u201d, Reference Librarian, No. 47, pp. 201\u201011.","DOI":"10.1300\/J120v22n47_16"},{"key":"key2022031520233946000_b33","unstructured":"Kant, I. (1785\/2002), Groundwork for the Metaphysics of Morals, Yale, New Haven, CT."},{"key":"key2022031520233946000_b34","unstructured":"Kingma, B.R. (1996), The Economics of Information, Libraries Unlimited, Englewood, CO."},{"key":"key2022031520233946000_b35","unstructured":"Kirkwood, C.W. (1997), Strategic Decision Making, Duxbury Press, Belmont, CA."},{"key":"key2022031520233946000_b36","doi-asserted-by":"crossref","unstructured":"Koehler, W., Hurych, J.M., Dole, W.V. and Wall, J. (2000), \u201cEthical values of information and library professionals \u2013 an expanded analysis\u201d, International Information and Library Review, Vol. 32 Nos 3\u20104, pp. 485\u2010507.","DOI":"10.1080\/10572317.2000.10762533"},{"key":"key2022031520233946000_b37","unstructured":"Lancaster, F.W. (Ed.) (1991), Ethics and the Librarian, University of Illinois, Graduate School of Library and Information Science, Urbana\u2010Champaign, IL."},{"key":"key2022031520233946000_b38","unstructured":"Locke, J. (1689\/1976), The Second Treatise of Government, Basil Blackwell, Oxford."},{"key":"key2022031520233946000_b39","doi-asserted-by":"crossref","unstructured":"McCain, R.A. (1988), \u201cInformation as property and as a public good: perspectives from the economic theory of property rights\u201d, Library Quarterly, Vol. 58 No. 3, pp. 265\u201082.","DOI":"10.1086\/602015"},{"key":"key2022031520233946000_b40","doi-asserted-by":"crossref","unstructured":"McDowell, A. (2002), \u201cTrust and information: the role of trust in the social epistemology of information science\u201d, Social Epistemology, Vol. 16 No. 1, pp. 51\u201063.","DOI":"10.1080\/210132798"},{"key":"key2022031520233946000_b41","unstructured":"MacIntyre, A.C. (1981), After Virtue, Duckworth, London."},{"key":"key2022031520233946000_b42","unstructured":"Mathiesen, K. (2004), \u201cWhat is information ethics?\u201d, Computers and Society, Vol. 32 No. 8, available at: www.computersandsociety.org."},{"key":"key2022031520233946000_b43","unstructured":"Medical Library Association (MLA) (1994), \u201cCode of ethics for health sciences librarianship\u201d, available at: www.mlanet.org\/about\/ethics.html."},{"key":"key2022031520233946000_b44","unstructured":"Mill, J.S. (1859\/1978), On Liberty, Hackett, Indianapolis, IN."},{"key":"key2022031520233946000_b45","unstructured":"Mill, J.S. (1863\/1979), Utilitarianism, Hackett, Indianapolis, IN."},{"key":"key2022031520233946000_b46","unstructured":"Mintz, A.P. (Ed.) (1990), Information Ethics: Concerns for Librarianship and the Information Industry, McFarland & Company, Jefferson, NC."},{"key":"key2022031520233946000_b48","unstructured":"Moore, A.D. (2001), Intellectual Property and Information Control, Transaction, New Brunswick, NJ."},{"key":"key2022031520233946000_b47","doi-asserted-by":"crossref","unstructured":"Moran, G. (2001), \u201cEthics, strengths and values: a review article\u201d, Journal of Librarianship and Information Science, Vol. 33 No. 2, pp. 98\u2010101.","DOI":"10.1177\/0961000014244937"},{"key":"key2022031520233946000_b49","unstructured":"Nesta, F. and Blanke, H. (1991), \u201cWarning: propaganda!\u201d, Library Journal, 15 May, pp. 41\u20103."},{"key":"key2022031520233946000_b50","doi-asserted-by":"crossref","unstructured":"Ortega y Gasset, J. (1934\/1961), \u201cThe mission of the librarian\u201d, Antioch Review, Vol. 21 No. 2, pp. 133\u201054.","DOI":"10.2307\/4610323"},{"key":"key2022031520233946000_b51","unstructured":"Pendergrast, M. (1988), \u201cIn praise of labeling; or, when shalt thou break commandments?\u201d, Library Journal, 1 June, pp. 83\u20105."},{"key":"key2022031520233946000_b52","doi-asserted-by":"crossref","unstructured":"Rawls, J. (1971), A Theory of Justice, Harvard, Cambridge.","DOI":"10.4159\/9780674042605"},{"key":"key2022031520233946000_b53","unstructured":"Ross, W.D. (1930), The Right and the Good, Oxford University Press, Oxford."},{"key":"key2022031520233946000_b54","doi-asserted-by":"crossref","unstructured":"Schoeman, F.D. (Ed.) (1984), Philosophical Dimensions of Privacy, Cambridge University Press, Cambridge.","DOI":"10.1017\/CBO9780511625138"},{"key":"key2022031520233946000_b55","unstructured":"Sheerin, W.E. (1991), \u201cAbsolutism on access and confidentiality: principled or irresponsible?\u201d, American Libraries, Vol. 22 No. 5, pp. 440\u20104."},{"key":"key2022031520233946000_b56","unstructured":"Smith, M.M. (1997), \u201cInformation ethics\u201d, Annual Review of Information Science and Technology, Vol. 32, pp. 339\u201066."},{"key":"key2022031520233946000_b57","unstructured":"Society of American Archivists (SAA) (1992), \u201cA code of ethics for archivists\u201d, available at: www.archivists.org\/governance\/handbook\/app_ethics.asp."},{"key":"key2022031520233946000_b58","doi-asserted-by":"crossref","unstructured":"Sosa, J.F. and Harris, M.H. (1991), \u201cJos\u00e9 Ortega y Gasset and the role of the librarian in post\u2010industrial America\u201d, Libri, Vol. 41 No. 1, pp. 3\u201021.","DOI":"10.1515\/libr.1991.41.1.3"},{"key":"key2022031520233946000_b59","unstructured":"Spinello, R.A. (1995), Ethical Aspects of Information Technology, Prentice Hall, Upper Saddle River, NJ."},{"key":"key2022031520233946000_b60","unstructured":"Spinello, R.A. (1997), Case Studies in Information and Computer Ethics, Prentice Hall, Upper Saddle River, NJ."},{"key":"key2022031520233946000_b61","unstructured":"van den Hoven, M.J. (1995), \u201cEqual access and social justice: information as a primary good\u201d, ETHICOMP95, pp. 1\u201017."},{"key":"key2022031520233946000_b62","unstructured":"Wengert, R. (2001), \u201cSome ethical aspects of being an information professional\u201d, Library Trends, Vol. 49 No. 3, pp. 486\u2010509."},{"key":"key2022031520233946000_b63","unstructured":"Wolkoff, K.N. (1996), \u201cThe problem of holocaust denial literature in libraries\u201d, Library Trends, Vol. 45 No. 1, pp. 87\u201096."},{"key":"key2022031520233946000_b64","unstructured":"Woodward, D. (1990), \u201cA framework for deciding issues in ethics\u201d, Library Trends, Vol. 39 No. 1&2, pp. 8\u201017."},{"key":"key2022031520233946000_b65","unstructured":"Yasuoka, K. (2004), \u201cThe case study of the information ethics education by the Media Center\u201d, Online Kensaku, Vol. 25 Nos 3\u20104, pp. 159\u201066."}],"container-title":["Library Hi Tech"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/07378830710735830","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/07378830710735830\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/07378830710735830\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:33:11Z","timestamp":1753399991000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/lht\/article\/25\/1\/23-36\/265150"}},"subtitle":[],"editor":[{"given":"Kenneth","family":"Einar Himma","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2007,3,13]]},"references-count":65,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,3,13]]}},"alternative-id":["10.1108\/07378830710735830"],"URL":"https:\/\/doi.org\/10.1108\/07378830710735830","relation":{},"ISSN":["0737-8831"],"issn-type":[{"value":"0737-8831","type":"print"}],"subject":[],"published":{"date-parts":[[2007,3,13]]}}}