{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T19:14:26Z","timestamp":1773947666358,"version":"3.50.1"},"reference-count":70,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2014,5,6]],"date-time":"2014-05-06T00:00:00Z","timestamp":1399334400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5,6]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>\u2013 The purpose of this paper is to review current knowledge, research and thinking about the difficulties facing public libraries offering internet access to their users in ensuring legally compliant and non-offensive use of this facility whilst still adhering to the professional value of freedom of access to information.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>\u2013 A range of recently published sources (1997-2013) relating to the technical and organisational measures used to manage public internet access primarily in public libraries in the UK with some limited international examples were reviewed and analysed. This work was undertaken as the underpinning research for an AHRC-funded project, MAIPLE (Managing Access to the internet in Public Libraries).<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>\u2013 The provision of public internet access is a well-established component of the role of public libraries, but is seen as a potential problem due to the possibility of misuse, and it appears that simplistic technical solutions have disappointed. Legislation increases the need for more effective solutions that can provide a balance between the need for legal compliance, a welcoming environment for users, and the protection of key freedoms. A range of measures are being adopted worldwide in response to this dilemma.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>\u2013 Research exploring internet access in public libraries and its management in the UK is numerically small and much of it dates back to the start of the twenty-first century. This review presents a comprehensive analysis of the available literature and is of relevance to practitioners and academics in the fields of public librarianship.<\/jats:p><\/jats:sec>","DOI":"10.1108\/jd-02-2013-0021","type":"journal-article","created":{"date-parts":[[2014,6,17]],"date-time":"2014-06-17T12:50:08Z","timestamp":1403009408000},"page":"478-497","source":"Crossref","is-referenced-by-count":9,"title":["Regulating use of the internet in public libraries: a review"],"prefix":"10.1108","volume":"70","author":[{"given":"Rachel","family":"Spacey","sequence":"first","affiliation":[]},{"given":"Louise","family":"Cooke","sequence":"additional","affiliation":[]},{"given":"Adrienne","family":"Muir","sequence":"additional","affiliation":[]},{"given":"Claire","family":"Creaser","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020061111404218700_b1","unstructured":"American Library Association (ALA) (2003), \u201cLibraries and the internet toolkit. Tips and guidance for managing and communicating about the internet\u201d, available at: www.ala.org\/offices\/sites\/ala.org.offices\/files\/content\/oif\/iftoolkits\/litoolkit\/2003internettoolkit.pdf (accessed 22 January 2013)."},{"key":"key2020061111404218700_b2","unstructured":"Australian Library and Information Association (ALIA) (2007), \u201cInternet filtering in public libraries 2007 survey report\u201d, available at: www.alia.org.au\/advocacy\/internet.access\/internet.filtering.public.libraries.2007.survey.report.pdf (accessed 22 January 2013)."},{"key":"key2020061111404218700_b3","unstructured":"Australian Library and Information Association (ALIA) (2011), \u201cALIA internet access in public libraries survey 2011\u201d, available at: www.alia.org.au\/advocacy\/internet.access\/internet.Access.Survey.2011.pdf (accessed 22 January 2013)."},{"key":"key2020061111404218700_b4","unstructured":"Batt, C. (2009), \u201cWiFi in the UK's Public Libraries Survey 2009: from punched tape to WiFi and beyond\u201d, available at: http:\/\/ebookbrowse.com\/gdoc.php?id=106129795&url=740af855763c9fbbd979035603919b2a (accessed 22 January 2013)."},{"key":"key2020061111404218700_b5","doi-asserted-by":"crossref","unstructured":"Bertot, J.C. , McClure, C.R. and Jaeger, P.T. (2008), \u201cThe impacts of free public internet access on public library patrons and communities\u201d, Library Quarterly, Vol. 78 No. 3, pp. 285-301.","DOI":"10.1086\/588445"},{"key":"key2020061111404218700_b6","unstructured":"Bertot, J.C. , Jaeger, P.T. and McClure, C.R. (Eds) (2010), Public Libraries and the internet: Roles, Perspectives and Implications, Libraries Unlimited Inc., Santa Barbara."},{"key":"key2020061111404218700_b7","unstructured":"Bertot, J.C. , McDermott, A. , Lincoln, R. , Real, B. and Peterson, K. (2012), \u201c2011-2012 public library funding & technology access survey: survey findings & report\u201d, available at: www.plinternetsurvey.org\/sites\/default\/files\/publications\/2012_plftas.pdf (accessed 22 January 2013)."},{"key":"key2020061111404218700_b8","unstructured":"Bitso, C. , Fourie, I. and Bothma, T. (2012), \u201cTrends in transition from classical censorship to internet censorship: selected country overviews\u201d, available at: www.ifla.org\/files\/assets\/faife\/publications\/spotlights\/1%20Bitso_Fourie_BothmaTrendsInTransiton.pdf (accessed 22 January 2013)."},{"key":"key2020061111404218700_b9","unstructured":"Britton, P. (2011), \u201cJail for pervert caught with child porn library of 250,000 sick images\u201d, Manchester Evening News, 17 May, np, available at: www.manchestereveningnews.co.uk\/news\/local-news\/jail-for-pervert-caught-with-child-porn-860800 (accessed 30 April 2013)."},{"key":"key2020061111404218700_b10","unstructured":"Brophy, P. (2003), The People's Network: A Turning Point for Public Libraries, Resource, London."},{"key":"key2020061111404218700_b11","unstructured":"Brown, G.T. and McMenemy, D. (2012), \u201cThe implementation of internet filtering in Scottish public libraries\u201d, available at: http:\/\/strathprints.strath.ac.uk\/37396\/ (accessed 5 February 2013)."},{"key":"key2020061111404218700_b12","unstructured":"Byron, T. (2008), Safer Children in a Digital World. The Report of the Byron Review, Department for Children, Schools and Families & Department for Culture, Media and Sport, London, available at: http:\/\/media.education.gov.uk\/assets\/files\/pdf\/s\/safer%20children%20in%20a%20digital%20world%20the%202008%20byron%20review.pdf (accessed 30 January 2013)."},{"key":"key2020061111404218700_b13","unstructured":"Cavanagh, M. (2004), \u201cSensemaking a public library's internet policy crisis\u201d, Library Management, Vol. 26 Nos 6\/7, pp. 351-360."},{"key":"key2020061111404218700_b14","unstructured":"Chisenga, J. (2004), \u201cSurvey of the status and use of ICTs in public libraries in Sub-Saharan Africa\u201d, in Chisenga, J. (Ed.), The Use of ICTs in African Public Libraries. A Survey of Ten Countries in Anglophone Africa, International Network for the Availability of Scientific Publications (INASP), Oxford, pp. 3-45, available at: www.inasp.info\/uploaded\/documents\/chisenga.pdf (accessed 30 January 2013)."},{"key":"key2020061111404218700_b15","unstructured":"Chmara, T. (2012), \u201cWhy recent court decisions don\u2019t change the rules on filtering\u201d, American Libraries, available at: http:\/\/americanlibrariesmagazine.org\/news\/07242012\/why-recent-court-decisions-don-t-change-rules-filtering (accessed 30 January 2013)."},{"key":"key2020061111404218700_b16","unstructured":"CILIP (2011), \u201cUser privacy in libraries. Guidelines for the reflective practitioner\u201d, Revised May, available at: www.cilip.org.uk\/filedownloadslibrary\/policy%20and%20advocacy\/privacy_june_aw.pdf (accessed 30 January 2013)."},{"key":"key2020061111404218700_b17","unstructured":"CIPFA (2012), Public Library Statistics. 2012-2013 Estimates and 2011-2012 Actuals, The Chartered Institute of Public Finance and Accountancy, London."},{"key":"key2020061111404218700_b18","doi-asserted-by":"crossref","unstructured":"Colaric, S. (2003), \u201cChildren, public libraries, and the internet: is it censorship or good service?\u201d, Vol. 61 No. 1, pp. 6-12 available at: www.ncl.ecu.edu\/index.php\/NCL\/article\/viewFile\/196\/225 (accessed 30 January 2013).","DOI":"10.3776\/ncl.v61i1.196"},{"key":"key2020061111404218700_b19","unstructured":"Comer, A.D. (2005), \u201cStudying Indiana public libraries\u2019 usage of internet filters\u201d, Computers in Libraries, Vol. 25 No. 6, pp. 10-15."},{"key":"key2020061111404218700_b20","doi-asserted-by":"crossref","unstructured":"Cooke, L. (2007), \u201cControlling the net: European approaches to content and access regulation\u201d, Journal of Information Science, Vol. 33 No. 3, pp. 360-376.","DOI":"10.1177\/0165551506072163"},{"key":"key2020061111404218700_b21","unstructured":"Curry, A. (2000), \u201cWhat are public library customers viewing on the internet? An analysis of burnaby transaction logs\u201d, School of Library and Archival Studies, University of British Columbia, Vancouver, available at: http:\/\/web.archive.org\/web\/20060207171737\/;www.bpl.burnaby.bc.ca\/weblog.pdf (accessed 30 January 2013)."},{"key":"key2020061111404218700_b23","unstructured":"Department of Justice, Equality and Law Reform (1998), Illegal and Harmful use of the internet. First Report of the Working Group, The Stationery Office, Dublin, available at: http:\/\/ec.europa.eu\/avpolicy\/docs\/reg\/minors\/useinternet1streport_ie.pdf (accessed 30 January 2013)."},{"key":"key2020061111404218700_b24","unstructured":"Diaz, K. (1999), \u201cFiltering, selection, and guided access\u201d, Reference and User Services Quarterly, Vol. 38 No. 2, pp. 147-150."},{"key":"key2020061111404218700_b101","unstructured":"Dupelle, R. (2007), Internet Censorship in Public Libraries, Samuelson-Glushko Canadian Internet Policy and Public Interest Clinic, Ottawa, available at: www.cippic.ca\/en\/internet-censorship-in-public-libraries (accessed 4 June 2014)."},{"key":"key2020061111404218700_b25","unstructured":"Dutton, W.H. and Blank, G. (2011), Next Generation Users: The Internet in Britain. Oxford Internet Survey 2011 Report, Oxford Internet Institute, Oxford, available at: www.worldinternetproject.net\/_files\/_Published\/23\/820_oxis2011_report.pdf (accessed 30 January 2013)."},{"key":"key2020061111404218700_b26","doi-asserted-by":"crossref","unstructured":"Ellis, D. (1989), \u201cA behavioural approach to information retrieval system design\u201d, Journal of Documentation, Vol. 45 No. 3, pp. 171-212.","DOI":"10.1108\/eb026843"},{"key":"key2020061111404218700_b27","unstructured":"European Court of Human Rights, Council of Europe (2010), European Convention on Human Rights, European Court of Human Rights, Council of Europe, Strasbourg, available at: www.echr.coe.int\/NR\/rdonlyres\/D5CC24A7-DC13-4318-B457-5C9014916D7A\/0\/Convention_ENG.pdf (accessed 12 February 2013)."},{"key":"key2020061111404218700_b28","unstructured":"Federal Bureau of Investigation (2012), \u201cConvicted sex offender sentenced to 40 years in federal prison for distributing child pornography\u201d, available at: www.fbi.gov\/portland\/press-releases\/2012\/convicted-sex-offender-sentenced-to-40-years-in-federal-prison-for-distributing-child-pornography (accessed 30 April 2013)."},{"key":"key2020061111404218700_b29","unstructured":"Goulding, A. (2006), Public Libraries in the 21st Century. Defining Services and Debating the Future, Ashgate Publishing Limited, Hampshire."},{"key":"key2020061111404218700_b30","unstructured":"Hamilton, S. (2004), \u201cTo what extent can libraries ensure free, equal and unhampered access to internet-accessible information resources from a global perspective?\u201d, Department of Library and Information Management, Royal School of Library and Information Science\/FAIFE, Copenhagen, available at: www.ifla.org\/files\/faife\/publications\/StuartHamiltonPhD.pdf (accessed 30 January 2013)."},{"key":"key2020061111404218700_b31","unstructured":"Heins, M. , Cho, C. and Feldman, A. (2006), Internet Filters: A Public Policy Report, 2nd ed., Brennan Center for Justice at NYU School of Law, New York, NY, available at: www.fepproject.org\/policyreports\/filters2.pdf (accessed 30 January 2013)."},{"key":"key2020061111404218700_b32","doi-asserted-by":"crossref","unstructured":"Heok, A.K.H. and Luyt, B. (2010), \u201cImagining the internet: learning and access to information in Singapore's public libraries\u201d, Journal of Documentation, Vol. 66 No. 4, pp. 475-490.","DOI":"10.1108\/00220411011052911"},{"key":"key2020061111404218700_b33","unstructured":"IFLA (2005), \u201cIFLA position on internet governance\u201d, available at: www.ifla.org\/publications\/ifla-position-on-internet-governance (accessed 30 January 2013)."},{"key":"key2020061111404218700_b34","unstructured":"IFLA (2009), \u201cInternet and children's library services\u201d, available at: www.ifla.org\/en\/publications\/internet-and-children-s-library-services (accessed 30 January 2013)."},{"key":"key2020061111404218700_b35","unstructured":"Insight Media Internet Limited (2009), A Review and Evaluation of Wi-Fi Services in United Kingdom Public Libraries, Insight Media Internet Limited, Cheshire, available at: www.insight-media.co.uk\/wifisurvey\/Wi-Fi%20Services%20in%20UK%20Public%20Libraries%20April%202009.pdf (accessed 30 January 2013)."},{"key":"key2020061111404218700_b36","doi-asserted-by":"crossref","unstructured":"Jaeger, P.T. , Bertot, J.C. , McClure, C.R. and Langa, L.A. (2006), \u201cThe policy implications of internet connectivity in public libraries\u201d, Government Information Quarterly, Vol. 23 No. 1, pp. 123-141.","DOI":"10.1016\/j.giq.2005.10.002"},{"key":"key2020061111404218700_b37","doi-asserted-by":"crossref","unstructured":"Jaeger, P.T. and Yan, Z. (2009), \u201cOne law with two outcomes: comparing the implementation of CIPA in public libraries and schools\u201d, Information Technology and Libraries, Vol. 28 No. 1, pp. 8-16.","DOI":"10.6017\/ital.v28i1.3168"},{"key":"key2020061111404218700_b38","doi-asserted-by":"crossref","unstructured":"Kann-Christensen, N. and Pors, N.O. (2004), \u201cThe legitimacy of public libraries: cross-pressures and change processes\u201d, New Library World, Vol. 105 No. 9, pp 330-336.","DOI":"10.1108\/03074800410557286"},{"key":"key2020061111404218700_b39","doi-asserted-by":"crossref","unstructured":"Kinney, B. (2010), \u201cThe internet, public libraries, and the digital divide\u201d, Public Library Quarterly, Vol. 29 No. 2, pp. 104-161.","DOI":"10.1080\/01616841003779718"},{"key":"key2020061111404218700_b40","unstructured":"Kranich, N. (2004), \u201cWhy filters won\u2019t protect children or adults\u201d, Library Administration and Management, Vol. 18 No. 1, pp. 14-18."},{"key":"key2020061111404218700_b41","unstructured":"Library and Information Commission (1997), New Library: The People's Network, DCMS, London."},{"key":"key2020061111404218700_b42","unstructured":"Library and Information Commission (LIC) (1998), Building the New Library Network, DCMS, London."},{"key":"key2020061111404218700_b43","doi-asserted-by":"crossref","unstructured":"McClure, C. , Jaeger, P. and Bertot, J. (2007), \u201cThe looming infrastructure Plateau? Space, funding, connection speed, and the ability of public libraries to meet the demand for free internet access\u201d, First Monday, Vol. 12 No. 12, available at: http:\/\/firstmonday.org\/htbin\/cgiwrap\/bin\/ojs\/index.php\/fm\/article\/view\/2017 (accessed 30 January 2013).","DOI":"10.5210\/fm.v12i12.2017"},{"key":"key2020061111404218700_b46","doi-asserted-by":"crossref","unstructured":"McMenemy, D. (2008), \u201cInternet access in UK public libraries: notes and queries from a small scale study: EDITORIAL\u201d, Library Review, Vol. 57 No. 7, pp. 485-489.","DOI":"10.1108\/00242530810894004"},{"key":"key2020061111404218700_b47","doi-asserted-by":"crossref","unstructured":"McMenemy, D. (2009), The Public Library, Facet Publishing, London.","DOI":"10.29085\/9781856047951"},{"key":"key2020061111404218700_b45","unstructured":"McMenemy, D. and Burton, P.F. (2005), \u201cManaging access: legal and policy issues of ICT use\u201d, in McMenemy, D. and Poulter, A. (Eds), Delivering Digital Services. A Handbook for Public Libraries and Learning Centres, Facet Publishing, London, pp. 19-34."},{"key":"key2020061111404218700_b102","doi-asserted-by":"crossref","unstructured":"Marchionini, G. (1995), Information Seeking in Electronic Environments, Cambridge University Press, New York, NY.","DOI":"10.1017\/CBO9780511626388"},{"key":"key2020061111404218700_b48","doi-asserted-by":"crossref","unstructured":"Minow, M. (2004), \u201cLawfully surfing the net: disabling public library internet filters to avoid more lawsuits in the United States\u201d, First Monday, Vol. 9 No. 4, available at: http:\/\/firstmonday.org\/htbin\/cgiwrap\/bin\/ojs\/index.php\/fm\/article\/view\/1132\/1052 (accessed 30 January 2013).","DOI":"10.5210\/fm.v9i4.1132"},{"key":"key2020061111404218700_b49","unstructured":"Ofcom (2010), Online Infringement of Copyright and the Digital Economy Act 2010: Draft Initial Obligations Code, Ofcom, London, available at: http:\/\/stakeholders.ofcom.org.uk\/binaries\/consultations\/copyright-infringement\/summary\/condoc.pdf (accessed 30 January 2013)."},{"key":"key2020061111404218700_b50","unstructured":"Office for National Statistics (2010a), \u201cInternet access \u2013 households and individuals, historical internet access\u201d, available at: www.ons.gov.uk\/ons\/publications\/re-reference-tables.html?edition=tcm%3A77-48688 (accessed 30 January 2013)."},{"key":"key2020061111404218700_b51","unstructured":"Office for National Statistics (2010b), \u201cInternet access \u2013 households and individuals, 2010\u201d, available at: www.ons.gov.uk\/ons\/rel\/rdit2\/internet-access---households-and-individuals\/2010\/index.html (accessed 30 January 2013)."},{"key":"key2020061111404218700_b52","doi-asserted-by":"crossref","unstructured":"Pors, N.O. (2001), \u201cMisbehaviour in the public library: internet use, filters and difficult people\u201d, New Library World, Vol. 102 No. 9, pp. 309-313.","DOI":"10.1108\/EUM0000000005899"},{"key":"key2020061111404218700_b53","doi-asserted-by":"crossref","unstructured":"Poulter, A. , Ferguson, I. , McMenemy, D. and Glassey, R.J. (2009), \u201cQuestion: where would you go to escape detection if you wanted to do something illegal on the internet? Hint: shush!\u201d, in Jahankhani, H. Hessami, A. G. and Hsu F. (Eds), Global Security, Safety and Sustainability: 5th International Conference, ICGS3. Communications in Computer and Information Science (1st), Springer-Verlag, New York, NY, pp. 1-8, available at: http:\/\/strathprints.strath.ac.uk\/29302\/1\/FRILLSisc02.pdf (accessed 30 January 2013).","DOI":"10.1007\/978-3-642-04062-7_1"},{"key":"key2020061111404218700_b103","unstructured":"Purdie, J. , Williams, N. and Tyler, A. (2010), Welsh Libraries and Web 2.0: A Survey of Access and Views in 2010, CyMAL: Museums Archives and Libraries Wales, Aberystwyth, available at: http:\/\/wales.gov.uk\/topics\/cultureandsport\/museumsarchiveslibraries\/cymal\/researchandevidence\/librariesandweb2\/?lang=en (accessed 4 June 2014)."},{"key":"key2020061111404218700_b54","unstructured":"Radom, R. (2007), \u201cInternet filtering companies with religious affiliations in the context of Indiana public libraries\u201d, Libres, Vol. 17 No. 2, pp. 1-19."},{"key":"key2020061111404218700_b55","unstructured":"Reading Agency (2011), Libraries and Digital: Research into the Use of Digital Media in Libraries to Develop Audiences for Reading, Reading Agency, London, available at: http:\/\/readingagency.org.uk\/new-thinking\/Libraries%20and%20Digital%20-%20Research%20into%20the%20use%20of%20digital%20media%20in%20libraries%20to%20develop%20audiences%20for%20reading.pdf (accessed 30 January 2013)."},{"key":"key2020061111404218700_b56","unstructured":"Sobel, D.L. (2003), \u201cInternet filters and public libraries\u201d, First Reports, First Amendment Center, Nashville, TN, available at: www.firstamendmentcenter.org\/madison\/wp-content\/uploads\/2011\/03\/internetfilters.pdf (accessed 30 January 2013)."},{"key":"key2020061111404218700_b57","unstructured":"Sommerlad, E. , Child, C. , Ramsden, C. and Kelleher, J. (2004), Books and Bytes: New Service Paradigms for the 21st Century Library. An Evaluation of the People's Network and ICT Training for Public Library Staff Programme, Big Lottery Fund, London."},{"key":"key2020061111404218700_b58","unstructured":"Spacey, R.E. (2003), \u201cThe attitudes of public library staff to the internet and evaluations of internet training\u201d, PhD thesis, Loughborough University, Loughborough."},{"key":"key2020061111404218700_b59","unstructured":"Spacey, R. and Goulding, A. (2004), \u201cAn evaluation of internet training for public library staff\u201d, Library & Information Research, Vol. 28 No. 89, pp. 13-24."},{"key":"key2020061111404218700_b60","unstructured":"Spacey, R. , Goulding, A. and Murray, I. (2004), \u201cStaff with attitude\u201d, Public Library Journal, Vol. 19 No. 2, pp. 5-7."},{"key":"key2020061111404218700_b61","doi-asserted-by":"crossref","unstructured":"Still, J. and Kassabian, V. (1999), \u201cThe mole's dilemma: ethical aspects of public internet access in academic libraries\u201d, Internet Reference Services Quarterly, Vol. 4 No. 3, pp. 7-23.","DOI":"10.1300\/J136v04n03_03"},{"key":"key2020061111404218700_b62","unstructured":"Sturges, P. (2002), Public internet Access in Libraries and Information Services, Facet Publishing, London."},{"key":"key2020061111404218700_b63","doi-asserted-by":"crossref","unstructured":"Trushina, I. (2004), \u201cFreedom of access: ethical dilemmas for internet librarians\u201d, The Electronic Library, Vol. 22 No. 5, pp. 416-421.","DOI":"10.1108\/02640470410561938"},{"key":"key2020061111404218700_b104","unstructured":"Willard, N. (2010), \u201cTeach them to swim, Knowledge Quest\u201d, Journal of the American Association of School Librarians, Vol. 39 No. 1, pp. 54-61, available at: www.ala.org\/aasl\/sites\/ala.org.aasl\/files\/content\/aaslpubsandjournals\/knowledgequest\/docs\/KQ_39_1_SeptOct10.pdf (accessed 4 June 2014)."},{"key":"key2020061111404218700_b65","doi-asserted-by":"crossref","unstructured":"Willson, J. and Oulton, T. (2000), \u201cControlling access to the internet in UK public libraries\u201d, OCLC Systems and Services, Vol. 16 No. 4, pp. 194-201.","DOI":"10.1108\/10650750010354166"},{"key":"key2020061111404218700_b66","doi-asserted-by":"crossref","unstructured":"Young, S. (1997), \u201cSexually-explicit materials via the internet: ethical concerns for the library profession\u201d, Journal of Academic Librarianship, Vol. 23 No. 1, pp. 49-50.","DOI":"10.1016\/S0099-1333(97)90073-2"},{"key":"key2020061111404218700_frd1","unstructured":"Department for Culture Media and Sport (1998), \u201c\u2018New library: the people's network\u2019 the government's response\u201d, Cm 3887, DCMS, London."},{"key":"key2020061111404218700_frd2","unstructured":"McMenemy, D. and Poulter, A. (2005), Delivering Digital Services. A Handbook for Public Libraries and Learning Centres, Facet Publishing, London."},{"key":"key2020061111404218700_frd3","unstructured":"Willard, N. (2002), \u201cFiltering software: the religious connection\u201d, Center for Advanced Technology in Education, University of Oregon, Eugene, OR, available at: www.ntia.doc.gov\/legacy\/ntiahome\/ntiageneral\/cipacomments\/pre\/willard\/FSRCreport.htm (accessed 30 January 2013)."}],"container-title":["Journal of Documentation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/JD-02-2013-0021","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JD-02-2013-0021\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JD-02-2013-0021\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:33:15Z","timestamp":1753396395000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jd\/article\/70\/3\/478-497\/202395"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,6]]},"references-count":70,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,5,6]]}},"alternative-id":["10.1108\/JD-02-2013-0021"],"URL":"https:\/\/doi.org\/10.1108\/jd-02-2013-0021","relation":{},"ISSN":["0022-0418"],"issn-type":[{"value":"0022-0418","type":"print"}],"subject":[],"published":{"date-parts":[[2014,5,6]]}}}