{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T22:39:52Z","timestamp":1772059192883,"version":"3.50.1"},"reference-count":47,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2014,2,14]],"date-time":"2014-02-14T00:00:00Z","timestamp":1392336000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Librarianship and Information Science"],"published-print":{"date-parts":[[2015,6]]},"abstract":"<jats:p> This paper explores how library managers go about implementing RFID (radio frequency identification) technology and particularly how associated privacy issues have been managed. The research methodology consisted of a literature review, theme identification, interview scheduling, interviews and interview analysis. The sample was 10 libraries or library networks and 18 participants. Findings covered the main drivers of RFID development, perceived benefits, tag data, data security, levels of ethical concern, public consultation, potential impact of technological developments on ethical issues, and managers\u2019 sources of ethical decision making. Analysis of potential ethical issues was not found to be a central part of the process of implementing RFID technology in the libraries. The study sees RFID implementation as an informative example of current practice in the implementation of new technologies in libraries and suggests that we look at management structures and decision-making processes to clarify where responsibility for ethical considerations should lie. <\/jats:p>","DOI":"10.1177\/0961000613518572","type":"journal-article","created":{"date-parts":[[2014,2,16]],"date-time":"2014-02-16T01:14:17Z","timestamp":1392513257000},"page":"117-130","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":10,"title":["How do libraries manage the ethical and privacy issues of RFID implementation? A qualitative investigation into the decision-making processes of ten libraries"],"prefix":"10.1177","volume":"47","author":[{"given":"Stuart","family":"Ferguson","sequence":"first","affiliation":[{"name":"University of Canberra, Australia"}]},{"given":"Clare","family":"Thornley","sequence":"additional","affiliation":[{"name":"University College Dublin, Ireland"}]},{"given":"Forbes","family":"Gibb","sequence":"additional","affiliation":[{"name":"University of Strathclyde, UK"}]}],"member":"179","published-online":{"date-parts":[[2014,2,14]]},"reference":[{"key":"bibr1-0961000613518572","unstructured":"American Library Association (2002) Library Bill of Rights: Interpretations of the Library Bill of Rights: Privacy. Available at: http:\/\/www.ala.org\/advocacy\/intfreedom\/librarybill\/interpretations\/privacy (accessed 22 March 2013)."},{"key":"bibr2-0961000613518572","unstructured":"American Library Association (2006) RFID in Libraries: Privacy and Confidentiality Guidelines. Chicago, IL: American Library Association. Available at: http:\/\/www.ala.org\/offices\/oif\/statementspols\/otherpolicies\/rfidguidelines (accessed 26 March 2013)."},{"key":"bibr3-0961000613518572","unstructured":"ANEC and BEUC (2007) Consumers\u2019 Scenarios for a RFID policy. Joint ANEC\/BEUC Comments on the Communication on Radio Frequency Identification (RFID) in Europe: Steps towards a Policy Framework. Brussels: ANEC(ICT-2007-G-059). Available at: www.anec.org\/attachments\/ANEC-ICT-2007-G-059.pdf (accessed 2 December 2012)."},{"key":"bibr4-0961000613518572","unstructured":"Angwin J, Valentino-Devries J (2012) Google\u2019s iPhone tracking. Wall Street Journal, 17 February. Available at: http:\/\/online.wsj.com\/article\/SB10001424052970204880404577225380456599176.html (accessed 3 December 2012)."},{"key":"bibr5-0961000613518572","first-page":"21","volume":"26","author":"Archer JD","year":"2007","journal-title":"Indiana Libraries"},{"key":"bibr6-0961000613518572","unstructured":"Arthur C (2012) Google\u2019s privacy policy: EU data chiefs \u2018to act within days\u2019. Guardian, 8 October. Available at: http:\/\/www.guardian.co.uk\/technology\/2012\/oct\/08\/google-privacy-policy-data-protection (accessed 3 December 2012)."},{"key":"bibr7-0961000613518572","unstructured":"Australian Government. Office of the Australian Information Commissioner (2010) Privacy Impact Assessment Guide. Revised May 2010. Available at: http:\/\/www.oaic.gov.au\/privacy\/privacy-resources\/privacy-guides\/privacy-impact-assessment-guide (accessed 14 August 2013)."},{"key":"bibr8-0961000613518572","unstructured":"Ayre LB (2004) Position paper: RFID and libraries. Draft chapter to be published in: Garfinkel S, Rosenberg B (2005) Wireless Privacy: RFID, Bluetooth and 802.11. New York: Addison-Wesley\/Prentice Hall. Available at: http:\/\/www.fatburen.org\/wpbagen\/bagenmappar\/dokument\/arx\/rfid-permission.pdf (accessed 22 March 2013)."},{"issue":"9","key":"bibr9-0961000613518572","first-page":"17","volume":"43","author":"Ayre LB","year":"2012","journal-title":"American Libraries"},{"key":"bibr10-0961000613518572","doi-asserted-by":"publisher","DOI":"10.1080\/15424065.2010.527255"},{"key":"bibr11-0961000613518572","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"bibr12-0961000613518572","doi-asserted-by":"publisher","DOI":"10.1108\/02640470710779844"},{"issue":"3","key":"bibr13-0961000613518572","first-page":"120","volume":"21","author":"Butters A","year":"2008","journal-title":"Australasian Public Libraries and Information Services"},{"key":"bibr14-0961000613518572","unstructured":"Cadoo S, Cadoo A (2004) RFID use within libraries: An Australian perspective. In: New librarians\u2019 symposium 2, Adelaide, Australia, 3\u20134 December 2004. Available at: http:\/\/conferences.alia.org.au\/newlibrarian2004\/zobjects\/presymppapers\/Cadoowebsitepaperfinal.pdf (accessed 7 May 2012)."},{"key":"bibr15-0961000613518572","unstructured":"Cai S, (2009) Attacks and improvements to an RFID mutual authentication protocol and its extensions. In: 2nd ACM conference on wireless network security (WiSec \u201909), Zurich, Switzerland, 16\u201318 March 2009. Available at: http:\/\/www.mysmu.edu\/phdis2009\/shaoyingcai.2009\/WISEC.pdf (accessed 7 May 2012)."},{"key":"bibr16-0961000613518572","unstructured":"Cavoukian A (2004) Tag, You\u2019re It: Privacy Implications of Radio Frequency Identification (RFID) Technology. Toronto: Information and Privacy Commissioner of Ontario. Available at: http:\/\/www.ipc.on.ca\/images\/resources\/up-rfid.pdf (accessed 7 May 2012)."},{"key":"bibr17-0961000613518572","doi-asserted-by":"publisher","DOI":"10.1016\/j.acalib.2004.08.003"},{"key":"bibr18-0961000613518572","doi-asserted-by":"publisher","DOI":"10.1016\/j.acalib.2005.06.001"},{"key":"bibr19-0961000613518572","unstructured":"Engels E (2006) RFID Implementation in California Libraries: Costs and Benefits. Sacramento, CA: California Library Association. Available at: http:\/\/www.clanet.org\/included\/docs\/IT3.pdf (accessed 3 December 2012)."},{"key":"bibr20-0961000613518572","unstructured":"European Commission (2011) Privacy and Data Protection Impact Assessment Framework for RFID Applications, 12 January 2011. Available at: http:\/\/cordis.europa.eu\/fp7\/ict\/enet\/documents\/rfid-pia-framework-final.pdf (accessed 22 March 2013)."},{"key":"bibr21-0961000613518572","unstructured":"Garofoli J, Podger PJ (2003) Ethics of library tag plan doubted. San Francisco Chronicle, 6 October. Available at: http:\/\/www.sfgate.com\/bayarea\/article\/Ethics-of-library-tag-plan-doubted-Privacy-2583912.php (accessed 12 December 2013)."},{"key":"bibr22-0961000613518572","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2010.07.005"},{"key":"bibr23-0961000613518572","unstructured":"Hall J (2012) Google accused of invading privacy with pictures of house numbers. Telegraph, 15 April. Available at: http:\/\/www.telegraph.co.uk\/technology\/google\/9205486\/Google-accused-of-invading-privacy-with-pictures-of-house-numbers.html (accessed 3 December 2012)."},{"key":"bibr24-0961000613518572","unstructured":"Information Commissioner\u2019s Office (UK) (n.d.) Privacy Impact Assessment. Available at: http:\/\/www.ico.org.uk\/for_organisations\/data_protection\/topic_guides\/privacy_impact_assessment (accessed 14 August 2013)."},{"key":"bibr25-0961000613518572","unstructured":"International Federation of Library Associations and Institutions (2012) IFLA Code of Ethics for Librarians and other Information Workers (full version). Available at: http:\/\/www.ifla.org\/news\/ifla-code-of-ethics-for-librarians-and-other-information-workers-full-version (accessed 13 August 2013)."},{"key":"bibr26-0961000613518572","unstructured":"Ionescu D (2010) Google resumes street view driving: More trouble looming? PC World, 9 July. Available at: http:\/\/www.pcworld.com\/article\/200753\/googleresumesstreetviewdrivingmoretroublelooming.html (accessed 3 December 2012)."},{"key":"bibr27-0961000613518572","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-006-0014-2"},{"key":"bibr28-0961000613518572","doi-asserted-by":"publisher","DOI":"10.1108\/02640471111111424"},{"key":"bibr29-0961000613518572","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.09.008"},{"key":"bibr30-0961000613518572","unstructured":"Molnar D, Wagner D (2004) Privacy and security in library RFID issues, practices, and architectures. In: CCS \u201904: Proceedings of the 11th ACM conference on computer and communications security. Available at: http:\/\/delivery.acm.org\/10.1145\/1040000\/1030112\/p210-molnar.pdf?ip=149.157.1.188&id=1030112&acc=ACTIVE%20SERVICE&key=C2716FEBFA981EF1C517B38E12D13249503B474E5DC23DD5&CFID=359794273&CFTOKEN=36463715&__acm__=1378812800_434aac65f4f13de591ae8aa6da0b24a2 (accessed 10 September 2013)."},{"key":"bibr31-0961000613518572","first-page":"115","volume-title":"The Research Interview","author":"Mostyn B","year":"1985"},{"key":"bibr32-0961000613518572","doi-asserted-by":"publisher","DOI":"10.1108\/07378830710735885"},{"key":"bibr33-0961000613518572","unstructured":"National Information Standards Organization (2007) RFID in US Libraries: A Recommended Practice of the National Information Standards Organization. NISO RP-6-2008. Baltimore, MD: National Information Standards Organization. Available at: http:\/\/www.niso.org\/publications\/rp\/RP-6-2008.pdf (accessed 01 March 2010; inactive and replaced by NISO RP-6-2012)."},{"key":"bibr34-0961000613518572","unstructured":"National Information Standards Organization (2012) RFID in US Libraries: A Recommended Practice of the National Information Standards Organization, prepared by the NISO RFID Revision Working Group. NISO RP-6-2012. Baltimore, MD: National Information Standards Organization. Available at: http:\/\/www.niso.org\/apps\/group_public\/download.php\/8269\/RP-6-2012_RFID-in_US_Libraries.pdf (accessed 22 March 2013)."},{"key":"bibr35-0961000613518572","doi-asserted-by":"publisher","DOI":"10.29085\/9781856048712"},{"key":"bibr36-0961000613518572","doi-asserted-by":"crossref","DOI":"10.5040\/9798400679087","volume-title":"Library Ethics","author":"Preer J","year":"2008"},{"key":"bibr37-0961000613518572","unstructured":"Rogers K (2012) Facebook users raise privacy concerns as company tweaks security settings. Guardian, 15 October. Available at: http:\/\/www.guardian.co.uk\/technology\/2012\/oct\/15\/facebook-users-privacy-concerns-security (accessed 3 December 2012)."},{"key":"bibr38-0961000613518572","unstructured":"San Francisco Public Library Technology and Privacy Advisory Committee (2005) Radio Frequency Identification and the San Francisco Public Library: Summary Report. San Francisco, CA: LTPAC. Available at: http:\/\/sfpl.org\/pdf\/about\/commission\/RFID-and-SFPL-summary-report-oct2005.pdf (accessed 22 March 2013)."},{"issue":"43","key":"bibr39-0961000613518572","first-page":"18","volume":"105","author":"Sarhan F","year":"2009","journal-title":"Nursing Times"},{"key":"bibr40-0961000613518572","unstructured":"Standards Australia Working Party (2006) RFID for Libraries. Standards Australia Working Group IT-019-01-02. Sydney: Standards Australia. Available at: http:\/\/www.sybis.com.au\/IT-019-01-02%20minutes%2012-1-06.pdf (accessed 7 May 2012)."},{"key":"bibr41-0961000613518572","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20122"},{"key":"bibr42-0961000613518572","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2011.02.006"},{"key":"bibr43-0961000613518572","unstructured":"United States, Department of Homeland Security, The Privacy Office (2007) Privacy Impact Assessments: Official Guidance. Available at: http:\/\/www.dhs.gov\/xlibrary\/assets\/privacy\/privacy_pia_guidance_may2007.pdf (accessed 14 August 2013)."},{"key":"bibr44-0961000613518572","unstructured":"Van Grove J (2012) Your address book is mine: Many iPhone apps take your data. VB Mobile, 14 February. Available at: http:\/\/venturebeat.com\/2012\/02\/14\/iphone-address-book\/(accessed 3 December2012)."},{"key":"bibr45-0961000613518572","unstructured":"Webinar (2010) The Power and Pitfalls of RFID: Questions, Comments, and Responses, hosted by Library Journal on 16 March, 2010. Available at: https:\/\/www.jiscmail.ac.uk\/cgi-bin\/webadmin?A3=ind1005&L=LIB-RFID-UK&E=base64&P=205642&B=\u2014%3D_NextPart_000_003F_01CAF763.AB55CB70&T=application%2Foctet-stream;%20name=%22Webinar%20Questions%20final.pdf%22&N=Webinar%20Questions%20final.pdf&attachment=q&XSS=3 (accessed 7 May 2012)."},{"key":"bibr46-0961000613518572","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22263-4_6"},{"key":"bibr47-0961000613518572","doi-asserted-by":"publisher","DOI":"10.1108\/10650751111135436"}],"container-title":["Journal of Librarianship and Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0961000613518572","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/0961000613518572","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0961000613518572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T21:49:34Z","timestamp":1741038574000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0961000613518572"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,14]]},"references-count":47,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["10.1177\/0961000613518572"],"URL":"https:\/\/doi.org\/10.1177\/0961000613518572","relation":{},"ISSN":["0961-0006","1741-6477"],"issn-type":[{"value":"0961-0006","type":"print"},{"value":"1741-6477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2,14]]}}}