{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T07:28:42Z","timestamp":1759390122519,"version":"3.41.2"},"reference-count":68,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2016,3,14]],"date-time":"2016-03-14T00:00:00Z","timestamp":1457913600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3,14]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>\u2013 This paper aims to consider selected results from the Arts and Humanities Research Council (AHRC)-funded \u201cManaging Access to the internet in Public Libraries\u201d (MAIPLE) project, from 2012-2014. MAIPLE has explored the ways in which public library services manage use of the internet connections that they provide for the public. This included the how public library services balance their legal obligations and the needs of their communities in a public space and the ethical dilemmas that arise.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>\u2013 The researchers used a mixed-method approach involving a review of the literature, legal analysis, a questionnaire survey and case studies in five public library authorities.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>\u2013 UK public library services use a range of methods to regulate internet access. The research also confirms previous findings that filtering software is an ubiquitous tool for controlling access to and protecting library users from \u201cinappropriate\u201d, illegal and harmful internet content. There is a general, if sometimes reluctant, acceptance of filtering software as a practical tool by library staff, which seems to contrast with professional codes of ethics and attitudes in other countries. The research indicates that public library internet access will be a valued service for some time to come, but that some aspects of how public library services regulate internet access is currently managed can have socially undesirable consequences, including blocking legitimate sites and preventing users from accessing government services. Education could play a greater part in helping the general population to exercise judgement in selection of materials to view and use. This does not preclude implementing stricter controls to protect children, whilst allowing public libraries to continue providing a social good to those who are unable to otherwise participate in the digital age.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>\u2013 The response to the survey was 39 per cent meaning that findings may not apply across the whole of the UK. The findings of this study are compared with and supplemented by other quantitative sources, but a strength of this study is the depth of understanding afforded by the use of case studies.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>\u2013 This paper provides both a quantitative and qualitative analysis of how internet access is managed in UK public libraries, including how library services fulfil their legal obligations and the ethical implications of how they balance their role in facilitating access to information with their perceived role as a safe and trusted environment for all members of their communities. The findings add to the international discussion on this issue and stimulate debate and policy making in the UK.<\/jats:p><\/jats:sec>","DOI":"10.1108\/jices-02-2015-0005","type":"journal-article","created":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T09:30:05Z","timestamp":1457083805000},"page":"87-104","source":"Crossref","is-referenced-by-count":5,"title":["Regulating internet access in UK public libraries: legal compliance and ethical dilemmas"],"prefix":"10.1108","volume":"14","author":[{"given":"Adrienne","family":"Muir","sequence":"first","affiliation":[]},{"given":"Rachel","family":"Spacey","sequence":"additional","affiliation":[]},{"given":"Louise","family":"Cooke","sequence":"additional","affiliation":[]},{"given":"Claire","family":"Creaser","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020121704291158800_b1","unstructured":"American Library Association (2003), \u201cLibraries and the internet toolkit: tips and guidance for managing and communicating about the internet\u201d, available at: www.ala.org\/offices\/sites\/ala.org.offices\/files\/content\/oif\/iftoolkits\/litoolkit\/2003internettoolkit.pdf (accessed 10 February 2015)."},{"key":"key2020121704291158800_b66","unstructured":"Auld, H. (2003), \u201cFilters work: get over it\u201d, American Libraries , February, pp. 38-42."},{"key":"key2020121704291158800_b2","unstructured":"Australian Library and Information Association (2007), \u201cInternet filtering in public libraries 2007 survey report\u201d, available at: www.alia.org.au\/advocacy\/internet.access\/internet.filtering.public.libraries.2007.survey.report.pdf (accessed 10 February 2015)."},{"key":"key2020121704291158800_b3","unstructured":"Australian Library and Information Association (2011), \u201cALIA internet access in public libraries survey 2011\u201d, available at: www.alia.org.au\/advocacy\/internet.access\/Internet.Access.Survey.2011.pdf (accessed 10 February 2015)."},{"key":"key2020121704291158800_b4","unstructured":"Bertot, J.C. , Jaeger, P.T. and McClure, C.R. (Eds) (2010), Public Libraries and the Internet: Roles, Perspectives and Implications , Libraries Unlimited, Santa Barbara, CA."},{"key":"key2020121704291158800_b67","unstructured":"Burt, D. (1997), \u201cIn defense of filtering\u201d, American Libraries , Vol. 28 No. 7, pp. 46-47."},{"key":"key2020121704291158800_b5","unstructured":"Byron, T. (2008), \u201cSafer children in a digital world, the report of the Byron Review\u201d, available at: http:\/\/media.education.gov.uk\/assets\/files\/pdf\/s\/safer%20children%20in%20a%20digital%20world%20the%202008%20byron%20review.pdf (accessed 10 February 2015)."},{"key":"key2020121704291158800_b6","unstructured":"Chartered Institute of Library and Information Professionals (CILIP) (2005), \u201cStatement on intellectual freedom, access to information and censorship\u201d, available at: www.cilip.org.uk\/sites\/default\/files\/documents\/2005_foistatement0705.pdf (accessed 10 February 2015)."},{"key":"key2020121704291158800_b7","unstructured":"Chartered Institute of Library and Information Professionals (CILIP) (2011), \u201cUser privacy in libraries: guidelines for the reflective practitioner\u201d, available at: www.cilip.org.uk\/cilip\/archived-policy-statements\/user-privacy-libraries-guidelines-reflective-practitioner (accessed 10 February 2015)."},{"key":"key2020121704291158800_b8","unstructured":"Chartered Institute of Library and Information Professionals (CILIP) (2012), \u201cCode of professional practice\u201d, available at: www.cilip.org.uk\/cilip\/about\/ethics\/code-professional-practice (accessed 10 February 2015)."},{"key":"key2020121704291158800_b9","unstructured":"Chartered Institute of Library and Information Professionals (CILIP) (2014), \u201cEthical principles\u201d, available at: www.cilip.org.uk\/cilip\/about\/ethics\/ethical-principles (accessed 10 February 2015)."},{"key":"key2020121704291158800_b11","unstructured":"Chartered Institute of Public Finance and Accountancy (CIPFA) (2013), \u201cPublic library statistics: 2013-2014 estimates and 2012-2013 actuals\u201d, available at: www.cipfa.org\/policy-and-guidance\/publications\/p\/public-library-statistics-201314-estimates-and-201213-actuals-pdf (accessed 10 February 2015)."},{"key":"key2020121704291158800_b12","unstructured":"Children Act 1989."},{"key":"key2020121704291158800_b13","unstructured":"Children Act 2004."},{"key":"key2020121704291158800_b14","unstructured":"Children (Northern Ireland) Order 1995."},{"key":"key2020121704291158800_b15","unstructured":"Children (Scotland) Act 1995."},{"key":"key2020121704291158800_b16","unstructured":"Children\u2019s Internet Protection Act Title XVII."},{"key":"key2020121704291158800_b17","unstructured":"Code of Practice on Parental Controls (2011), \u201cCode of practice on parental controls\u201d, available at: www.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/251454\/code_of_practice.pdf (accessed 10 February 2015)."},{"key":"key2020121704291158800_b18","doi-asserted-by":"crossref","unstructured":"Colaric, S. (2003), \u201cChildren, public libraries, and the internet: is it censorship or good service?\u201d, North Carolina Libraries , Vol. 61 No. 1, pp. 6-12.","DOI":"10.3776\/ncl.v61i1.196"},{"key":"key2020121704291158800_b19","unstructured":"Comer, A.D. (2005), \u201cStudying Indiana public libraries\u2019 usage of internet filters\u201d, Computers in Libraries , Vol. 25 No. 6, pp. 10-15."},{"key":"key2020121704291158800_b20","unstructured":"Communications Act 2003."},{"key":"key2020121704291158800_b21","unstructured":"Cooke, L. (2004), \u201cRegulating the internet: policy and practice with reference to the control of internet access and content\u201d, PhD thesis, Loughborough University, Loughborough."},{"key":"key2020121704291158800_b22","unstructured":"Copyright, Designs and Patents Act 1998."},{"key":"key2020121704291158800_b23","unstructured":"Crook, E. (1999), \u201cPublic libraries and political ideologies\u201d, Australasian Public Libraries and Information , Vol. 12 No. 4, pp. 178-182."},{"key":"key2020121704291158800_b24","doi-asserted-by":"crossref","unstructured":"Data Protection Act 1998.","DOI":"10.1016\/S1361-3723(98)90167-1"},{"key":"key2020121704291158800_b25","unstructured":"Department for Business, Innovation and Skills (2014), \u201cNew education programme launched to combat online piracy\u201d, available at: www.gov.uk\/government\/news\/new-education-programme-launched-to-combat-online-piracy (accessed 16 April 2015)."},{"key":"key2020121704291158800_b26","unstructured":"Department for Culture Media and Sport (1998), New Library: The People\u2019s Network The Government\u2019s Response , DCMS, London."},{"key":"key2020121704291158800_b27","unstructured":"Digital Economy Act 2010."},{"key":"key2020121704291158800_b28","unstructured":"ECHR (European Convention on Human Rights) (1950), \u201cConvention for the protection of human rights and fundamental freedoms\u201d, available at: http:\/\/conventions.coe.int\/treaty\/en\/treaties\/html\/005.htm (accessed 10 February 2015)."},{"key":"key2020121704291158800_b68","unstructured":"Farrington, J. (2015), \u201cAll libraries in England to get wi-fi funding\u201d, The Bookseller , available at: www.thebookseller.com\/news\/all-libraries-england-get-wi-fi-funding (accessed 9 February 2016)."},{"key":"key2020121704291158800_b29","unstructured":"Gottschalk, L. (2006), \u201cInternet filters in public libraries: do they belong?\u201d, Library Student Journal , available at: www.oalib.com\/paper\/2200719#.VNooeMtybDA (accessed 10 February 2015)."},{"key":"key2020121704291158800_b30","unstructured":"Heins, M. , Cho, C. and Feldman, A. (2006), Internet Filters: A Public Policy Report , 2nd ed., Brennan Center for Justice at NYU School of Law, New York, NY."},{"key":"key2020121704291158800_b31","doi-asserted-by":"crossref","unstructured":"Heok, A.K.H. and Luyt, B. (2010), \u201cImagining the Internet: learning and access to information in Singapore\u2019s public libraries\u201d, Journal of Documentation , Vol. 66 No. 4, pp. 475-490.","DOI":"10.1108\/00220411011052911"},{"key":"key2020121704291158800_b32","unstructured":"International Federation of Library Associations and Institutions (2005), \u201cIFLA position on internet governance\u201d, available at: www.ifla.org\/publications\/ifla-position-on-internet-governance (accessed 15 April 2015)."},{"key":"key2020121704291158800_b69","unstructured":"International Federation of Library Associations and Institutions (2009), \u201cInternet and children ' s library services\u201d, available at: www.ifla.org\/en\/publications\/internet-and-children-s-library-services (accessed 9 February 2015)."},{"key":"key2020121704291158800_b33","unstructured":"International Federation of Library Associations and Institutions (2012), \u201cInternet and children\u2019s library services\u201d, available at: www.ifla.org\/en\/publications\/Internet-and-children-s-library-services (accessed 15 April 2015)."},{"key":"key2020121704291158800_b34","unstructured":"International Federation of Library Associations and Institutions (2014), \u201cIFLA code of ethics for librarians and other information workers\u201d, available at: www.ifla.org\/news\/ifla-code-of-ethics-for-librarians-and-other-information-workers-full-version (accessed 10 February 2015)."},{"key":"key2020121704291158800_b36","unstructured":"Kranich, N. (2004), \u201cWhy filters won\u2019t protect children or adults\u201d, Library Administration and Management , Vol. 18 No. 1, pp. 14-18."},{"key":"key2020121704291158800_b37","unstructured":"Library and Information Commission (1997), New Library: The People\u2019s Network , DCMS, London."},{"key":"key2020121704291158800_b38","unstructured":"Library and Information Commission (1998), Building the New Library Network , DCMS, London."},{"key":"key2020121704291158800_b40","doi-asserted-by":"crossref","unstructured":"McMenemy, D. (2009), The Public Library , Facet Publishing, London.","DOI":"10.29085\/9781856047951"},{"key":"key2020121704291158800_b41","unstructured":"McMenemy, D. and Burton, P.F. (2005), \u201cManaging access: legal and policy issues of ICT use\u201d, in McMenemy, D. and Poulter, A. (Eds), Delivering Digital Services: A Handbook for Public Libraries and Learning Centres , Facet Publishing, London, pp. 19-34."},{"key":"key2020121704291158800_b39","unstructured":"Malicious Communications Act 1988."},{"key":"key2020121704291158800_b42","doi-asserted-by":"crossref","unstructured":"Minow, M. (2004), \u201cLawfully surfing the net: disabling public library internet filters to avoid more lawsuits in the United States\u201d, First Monday , Vol. 9 No. 4, available at: http:\/\/firstmonday.org\/htbin\/cgiwrap\/bin\/ojs\/index.php\/fm\/article\/view\/1132\/1052 (accessed 15 April 2015).","DOI":"10.5210\/fm.v9i4.1132"},{"key":"key2020121704291158800_b43","unstructured":"Obscene Publications Act 1959."},{"key":"key2020121704291158800_b44","doi-asserted-by":"crossref","unstructured":"Pors, N.O. (2001), \u201cMisbehaviour in the public library: internet use, filters and difficult people\u201d, New Library World , Vol. 102 No. 9, pp. 309-313.","DOI":"10.1108\/EUM0000000005899"},{"key":"key2020121704291158800_b45","doi-asserted-by":"crossref","unstructured":"Poulter, A. , Ferguson, I. , McMenemy, D. and Glassey, R.J. (2009), \u201cQuestion: where would you go to escape detection if you wanted to do something illegal on the Internet? Hint: shush!\u201d, in Jahankhani, H. , Hessami, A.G. and Hsu, F. (Eds), 5th International Conference, ICGS3 2009 on Global Security, Safety and Sustainability, Springer-Verlag, New York, NY, pp. 1-8.","DOI":"10.1007\/978-3-642-04062-7_1"},{"key":"key2020121704291158800_b70","unstructured":"Public Lending Right Act (1979)."},{"key":"key2020121704291158800_b71","unstructured":"Protection of Children Act (1978)."},{"key":"key2020121704291158800_b47","unstructured":"Public Libraries and Museums Act (1964)."},{"key":"key2020121704291158800_b48","unstructured":"Radom, R. (2007), \u201cInternet filtering companies with religious affiliations in the context of Indiana public libraries\u201d, LIBRES , Vol. 17 No. 2, pp. 1-19."},{"key":"key2020121704291158800_b49","unstructured":"Reading Agency (2011), Libraries and Digital: Research into the Use of Digital Media in Libraries to Develop Audiences for Reading , Reading Agency, London."},{"key":"key2020121704291158800_b50","unstructured":"Sobel, D.L. (2003), \u201cInternet filters and public libraries: first reports\u201d, available at: www.firstamendmentcenter.org\/madison\/wp-content\/uploads\/2011\/03\/Internetfilters.pdf (accessed 15 April 2015)."},{"key":"key2020121704291158800_b51","unstructured":"Society of Chief Librarians (SCL) (2014), \u201cUniversal offers\u201d, available at: www.goscl.com\/universal-offers\/about-universal-offers\/ (accessed 10 February 2015)."},{"key":"key2020121704291158800_b52","doi-asserted-by":"crossref","unstructured":"Spacey, R. , Cooke, L. , Creaser, C. and Muir, A. (2013), \u201cRegulating internet access and content in UK public libraries: findings from the MAIPLE project\u201d, Journal of Librarianship and Information Science , Vol. 47 No. 1, pp. 71-84.","DOI":"10.1177\/0961000613500688"},{"key":"key2020121704291158800_b53","doi-asserted-by":"crossref","unstructured":"Spacey, R. , Cooke, L. , Muir, A. and Creaser, C. (2014), \u201cRegulating use of the Internet in public libraries: a review\u201d, Journal of Documentation , Vol. 70 No. 3, pp. 478-497.","DOI":"10.1108\/JD-02-2013-0021"},{"key":"key2020121704291158800_b54","doi-asserted-by":"crossref","unstructured":"Still, J. and Kassabian, V. (1999), \u201cThe mole\u2019s dilemma: ethical aspects of public internet access in academic libraries\u201d, Internet Reference Services Quarterly , Vol. 4 No. 3, pp. 7-23.","DOI":"10.1300\/J136v04n03_03"},{"key":"key2020121704291158800_b55","unstructured":"Sturges, P. (2002), Public Internet Access in Libraries and Information Services , Facet Publishing, London."},{"key":"key2020121704291158800_b72","unstructured":"Telecommunications Act (1984)."},{"key":"key2020121704291158800_b56","doi-asserted-by":"crossref","unstructured":"Trushina, I. (2004), \u201cFreedom of access: ethical dilemmas for internet librarians\u201d, The Electronic Library , Vol. 22 No. 5, pp. 416-421.","DOI":"10.1108\/02640470410561938"},{"key":"key2020121704291158800_b58","unstructured":"United Nations (1989), \u201cConvention on the rights of the child\u201d, available at: www.ohchr.org\/en\/professionalinterest\/pages\/crc.aspx (accessed 10 February 2015)."},{"key":"key2020121704291158800_b59","unstructured":"Willard, N. (2002), \u201cFiltering software: the religious connection\u201d, available at: www.ntia.doc.gov\/legacy\/ntiahome\/ntiageneral\/cipacomments\/pre\/willard\/FSRCreport.htm (accessed 15 April 2015)."},{"key":"key2020121704291158800_b60","doi-asserted-by":"crossref","unstructured":"Willson, J. and Oulton, T. (2000), \u201cControlling access to the internet in UK public libraries\u201d, OCLC Systems and Services , Vol. 16 No. 4, pp. 194-201.","DOI":"10.1108\/10650750010354166"},{"key":"key2020121704291158800_b61","doi-asserted-by":"crossref","unstructured":"Young, S. (1997), \u201cSexually-explicit materials via the internet: ethical concerns for the library profession\u201d, Journal of Academic Librarianship , Vol. 23 No. 1, pp. 49-50.","DOI":"10.1016\/S0099-1333(97)90073-2"},{"key":"key2020121704291158800_frd1","unstructured":"Chartered Institute of Library and Information Professionals (2014), \u201cEthics\u201d, available at: www.cilip.org.uk\/cilip\/about\/ethics (accessed 10 February 2015)."},{"key":"key2020121704291158800_frd2","doi-asserted-by":"crossref","unstructured":"Jaeger, P.T. , Bertot, J.C. , McClure, C.R. and Langa, L.A. (2006), \u201cThe policy implications of internet connectivity in public libraries\u201d, Government Information Quarterly , Vol. 23 No. 1, pp. 123-141.","DOI":"10.1016\/j.giq.2005.10.002"},{"key":"key2020121704291158800_frd3","unstructured":"Protection of Children Act 1999."},{"key":"key2020121704291158800_frd4","unstructured":"United Nations (1948), \u201cThe Universal declaration of human rights\u201d, available at: www.un.org\/en\/documents\/udhr\/ (accessed 10 February 2015)."}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/JICES-02-2015-0005","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-02-2015-0005\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-02-2015-0005\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:38:09Z","timestamp":1753393089000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jices\/article\/14\/1\/87-104\/213429"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,14]]},"references-count":68,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,3,14]]}},"alternative-id":["10.1108\/JICES-02-2015-0005"],"URL":"https:\/\/doi.org\/10.1108\/jices-02-2015-0005","relation":{},"ISSN":["1477-996X"],"issn-type":[{"type":"print","value":"1477-996X"}],"subject":[],"published":{"date-parts":[[2016,3,14]]}}}