{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T11:15:54Z","timestamp":1773314154606,"version":"3.50.1"},"reference-count":143,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T00:00:00Z","timestamp":1741824000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T00:00:00Z","timestamp":1741824000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Librarianship and Information Science"],"published-print":{"date-parts":[[2026,3]]},"abstract":"<jats:p>\n                    This article presents a new taxonomy of privacy in library and information science (LIS). Current treatment of the concept often overlooks its diverse character within the LIS profession and neglects its heterogeneity within wider discourse. This study, by contrast, presents a taxonomy, connecting privacy in LIS with wider literature to improve understanding of the concept within professional practice. A structured literature search samples conceptions of privacy across LIS, paving the way for descriptive conceptualisation of the concept. The argument is presented in four stages. First, it is argued that privacy is a heterogenous concept within LIS which can be discussed in an abstract, ethical or practical context. Second, 10 conceptions of privacy in wider literature build a case for this diversity and form a theoretical backdrop for understanding the concept. Third, a structured search of literature reveals a range of views across the LIS profession. Constructivist grounded theory builds an informative taxonomy with four categories: conceptual, normative, contextual, and remedial, with the relationships between categories depicted via four \u2018meta-categories\u2019: theoretical, practical, descriptive and value-based. Fourth, the taxonomy\u2019s benefit is twofold. First, to provide a template of comparison between LIS and wider literature and, second, to act as a tool within professional practice, asking\n                    <jats:italic toggle=\"yes\">what, where, why, and how<\/jats:italic>\n                    the concept interacts with ethical situations. This, in turn, provokes a more thorough appreciation of privacy problems. This depth, it is argued, builds support for a re-orientation of core value in LIS as a manifestation of professional virtue.\n                  <\/jats:p>","DOI":"10.1177\/09610006251322982","type":"journal-article","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T05:12:38Z","timestamp":1741842758000},"page":"565-585","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy: A new taxonomy"],"prefix":"10.1177","volume":"58","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3435-5435","authenticated-orcid":false,"given":"Stephen","family":"Macdonald","sequence":"first","affiliation":[{"name":"University of Lincoln, UK"}]}],"member":"179","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"issue":"1","key":"e_1_3_3_2_1","first-page":"1","article-title":"Security and privacy in cloud computing: Technical review","volume":"14","author":"Abdulsalam YS","year":"2022","unstructured":"Abdulsalam YS, Hedabou M (2022) Security and privacy in cloud computing: Technical review. Future Internet 14(1): 1\u201327.","journal-title":"Future Internet"},{"key":"e_1_3_3_3_1","unstructured":"ABF (2003) The Librarian\u2019s Code of Ethics. Available at: https:\/\/www.ifla.org\/wp-content\/uploads\/2019\/05\/assets\/faife\/codesofethics\/france.pdf (accessed 27 November 2023)."},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/0340035218777275"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/03085147.2019.1690275"},{"key":"e_1_3_3_6_1","unstructured":"AIB (2014) Librarians\u2019 Code of Ethics: Fundamental Principles. Available at: https:\/\/www.aib.it\/documenti\/code-ethics\/ (accessed 27 November 2023)"},{"key":"e_1_3_3_7_1","unstructured":"ALA (2019) Privacy: An Interpretation of the Library Bill of Rights. Available at: https:\/\/www.ala.org\/advocacy\/intfreedom\/librarybill\/interpretations\/privacy (accessed 27 November 2023)"},{"key":"e_1_3_3_8_1","unstructured":"ALA (2020) Library Privacy Checklist \u2013 Overview. Available at: https:\/\/www.ala.org\/advocacy\/privacy\/checklists\/overview (accessed 27 November 2023)"},{"key":"e_1_3_3_9_1","unstructured":"ALA (2021) Professional Ethics. Available at: https:\/\/www.ala.org\/tools\/ethics (accessed 27 November 2023)"},{"key":"e_1_3_3_10_1","unstructured":"ALA (2022) Privacy Field Guides. Available at: https:\/\/www.ala.org\/advocacy\/privacy\/fieldguides (accessed 27 November 2023)"},{"issue":"2","key":"e_1_3_3_11_1","first-page":"5","article-title":"Information ethics in the workplace: Misplacing privacy","volume":"10","author":"Alfino M","year":"2001","unstructured":"Alfino M (2001) Information ethics in the workplace: Misplacing privacy. Journal of Information Ethics 10(2): 5\u20138.","journal-title":"Journal of Information Ethics"},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195141375.001.0001"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:ETIN.0000006918.22060.1f"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1515\/icom-2019-0019"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2014.12.001"},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1108\/LHTN-10-2022-0113"},{"key":"e_1_3_3_17_1","first-page":"1","article-title":"Confidentiality and the problem of third parties: Protecting reader privacy in the age of intermediaries","volume":"16","author":"Ard BJ","year":"2013","unstructured":"Ard BJ (2013) Confidentiality and the problem of third parties: Protecting reader privacy in the age of intermediaries. Yale JL & Tech 16: 1\u201358.","journal-title":"Yale JL & Tech"},{"key":"e_1_3_3_18_1","first-page":"43","volume-title":"Protecting Patron Privacy: A LITA Guide","author":"Asher AD","year":"2017","unstructured":"Asher AD (2017) Risk, benefits, and user privacy: Evaluating the ethics of library data. In: Newman B, Tijerina B (eds) Protecting Patron Privacy: A LITA Guide. Lanham, MD: Rowman & Littlefield, pp.43\u201356."},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2014.04.003"},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1023906406866"},{"key":"e_1_3_3_21_1","volume-title":"Doing a Literature Review in Health and Social Care: A Practical Guide","author":"Aveyard H","year":"2014","unstructured":"Aveyard H (2014) Doing a Literature Review in Health and Social Care: A Practical Guide. Maidenhead: Open University Press."},{"issue":"1","key":"e_1_3_3_22_1","first-page":"1","article-title":"Protecting patron privacy: Vendors, libraries, and patrons each have a role to play","volume":"9","author":"Ayre LB","year":"2017","unstructured":"Ayre LB (2017) Protecting patron privacy: Vendors, libraries, and patrons each have a role to play. Collaborative Librarianship 9(1): 1\u20135.","journal-title":"Collaborative Librarianship"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1108\/JD-05-2017-0080"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/0361526X.2021.1875963"},{"key":"e_1_3_3_25_1","volume-title":"Individual and Group Privacy","author":"Bloustein EJ","year":"2017","unstructured":"Bloustein EJ, Pallone NJ (2017) Individual and Group Privacy. Abingdon: Routledge."},{"key":"e_1_3_3_26_1","volume-title":"Secrets: On the Ethics of Concealment and Revelation","author":"Bok S","year":"1989","unstructured":"Bok S (1989) Secrets: On the Ethics of Concealment and Revelation. New York, NY: Pantheon."},{"key":"e_1_3_3_27_1","unstructured":"Bork RH (2009) The Tempting of America. New York NY: Simon and Schuster."},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/0361526X.2021.1895958"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/15252019.2022.2051097"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/meet.14505001087"},{"issue":"2","key":"e_1_3_3_31_1","first-page":"40","article-title":"The practical matter of privacy vs. anonymity: When is anonymity an unethical power move in the educative information professions?","volume":"23","author":"Buschman J","year":"2014","unstructured":"Buschman J (2014) The practical matter of privacy vs. anonymity: When is anonymity an unethical power move in the educative information professions? Journal of Information Ethics 23(2): 40\u201356.","journal-title":"Journal of Information Ethics"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1086\/688031"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1108\/02640470710779844"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1353\/lib.2016.0006"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1300\/J111v36n04_03"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077800416657105"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/0361526X.2016.1270248"},{"key":"e_1_3_3_38_1","unstructured":"CILIP (2018a) CILIP\u2019s ethical framework. Available at: https:\/\/www.cilip.org.uk\/page\/ethics (accessed 27 November 2023)"},{"key":"e_1_3_3_39_1","unstructured":"CILIP (2018b) Protecting the individual\u2019s right to privacy. Available at: https:\/\/www.cilip.org.uk\/page\/ProtectingTheIndividualPrivacy (accessed 27 November 2023)"},{"key":"e_1_3_3_40_1","unstructured":"CILIP (2022) Ethical framework: clarifying notes. Available at: https:\/\/cdn.ymaws.com\/www.cilip.org.uk\/resource\/resmgr\/cilip\/policy\/new_ethical_framework\/clarifying_notes_on_the_ethi.pdf (accessed 27 November 2023)"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.5206\/elip.v4i1.13463"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/02763877.2012.678765"},{"key":"e_1_3_3_43_1","first-page":"54","volume-title":"Freedom of Expression: Counting the Costs","author":"Davis GS","year":"2007","unstructured":"Davis GS (2007) Aristotelian privacy: Perfectionism, pornography, and the virtues of the polis. In: Newey G (ed.) Freedom of Expression: Counting the Costs. Newcastle: Cambridge Scholars Publishing, pp.54\u201373."},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107280557.006"},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819876570"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.5840\/ijap20131222"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1080\/13645579.2010.494930"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781315619309-5"},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1177\/0961000613518572"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3012430.3012531"},{"key":"e_1_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781529716658"},{"key":"e_1_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-006-9121-3"},{"key":"e_1_3_3_53_1","first-page":"175","article-title":"The future development of the information society","volume":"2007","author":"Floridi L","year":"2007","unstructured":"Floridi L (2007) The future development of the information society. Jahrbuch der Akademie der Wissenschaften in G\u00f6ttingen 2007:175\u2013187.","journal-title":"Jahrbuch der Akademie der Wissenschaften in G\u00f6ttingen"},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.6017\/ital.v34i3.5495"},{"key":"e_1_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1108\/14779961111191039"},{"key":"e_1_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1080\/0361526X.2021.1943105"},{"issue":"1","key":"e_1_3_3_57_1","first-page":"74","article-title":"Privacy of electronic health records: A review of the literature","volume":"42","author":"Gari\u00e9py-Saper K","year":"2021","unstructured":"Gari\u00e9py-Saper K, Decarie N (2021) Privacy of electronic health records: A review of the literature. The journal of the Canadian Health Libraries Association 42(1): 74\u201384.","journal-title":"The"},{"issue":"1","key":"e_1_3_3_58_1","first-page":"216","article-title":"Librarian\/patron confidentiality: An ethical challenge","volume":"40","author":"Garoogian R","year":"1991","unstructured":"Garoogian R (1991) Librarian\/patron confidentiality: An ethical challenge. Library Trends 40(1): 216\u2013233.","journal-title":"Library Trends"},{"key":"e_1_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.2307\/795891"},{"key":"e_1_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1086\/292105"},{"key":"e_1_3_3_61_1","volume-title":"Private and Public: Individuals, Households, and Body Politic in Locke and Hutcheson","author":"Gobetti D","year":"1992","unstructured":"Gobetti D (1992) Private and Public: Individuals, Households, and Body Politic in Locke and Hutcheson. Abingdon: Routledge."},{"key":"e_1_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1471-1842.2009.00848.x"},{"key":"e_1_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1177\/0340035220956804"},{"key":"e_1_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1080\/0361526X.2021.1875961"},{"issue":"1","key":"e_1_3_3_65_1","first-page":"31","article-title":"Justifying intellectual property","volume":"18","author":"Hettinger EC","year":"1989","unstructured":"Hettinger EC (1989) Justifying intellectual property. Philosophy & Public Affairs 18(1): 31\u201352.","journal-title":"Philosophy & Public Affairs"},{"key":"e_1_3_3_66_1","first-page":"145","volume-title":"Privacy, Security, and Accountability: Ethics, Law and, Policy","author":"Himma KE","year":"2016","unstructured":"Himma KE (2016) Why security trumps privacy. In: Moore A (ed.) Privacy, Security, and Accountability: Ethics, Law and, Policy. London: Rowman & Littlefield, pp.145\u2013170."},{"key":"e_1_3_3_67_1","unstructured":"IFLA (1999) IFLA statement on libraries and intellectual freedom. Available at: https:\/\/repository.ifla.org\/items\/72090712-b389-450b-94df-e05fd6c582d4 (accessed 29 November 2023)."},{"key":"e_1_3_3_68_1","unstructured":"IFLA (2012) IFLA code of ethics for librarians and other information workers. Available at: https:\/\/www.ifla.org\/wp-content\/uploads\/2019\/05\/assets\/faife\/publications\/IFLA%20Code%20of%20Ethics%20-%20Long_0.pdf (accessed 1 July 2024)"},{"key":"e_1_3_3_69_1","unstructured":"IFLA (2015) Statement on privacy in the library environment. Available at: https:\/\/www.ifla.org\/publications\/ifla-statement-on-privacy-in-the-library-environment\/ (accessed 27 November 2023)"},{"key":"e_1_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1093\/0195104609.001.0001"},{"key":"e_1_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1080\/0361526X.2021.1875960"},{"issue":"3","key":"e_1_3_3_72_1","first-page":"15","article-title":"Privacy, liberty and integrity","volume":"3","author":"Johnson JL","year":"1989","unstructured":"Johnson JL (1989) Privacy, liberty and integrity. Public Affairs Quarterly 3(3): 15\u201334.","journal-title":"Public Affairs Quarterly"},{"key":"e_1_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01001201"},{"key":"e_1_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.5860\/crl.81.3.570"},{"key":"e_1_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1108\/JD-12-2018-0202"},{"key":"e_1_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2933899"},{"key":"e_1_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1300\/J113v26n01_13"},{"issue":"3","key":"e_1_3_3_78_1","first-page":"703","article-title":"The birth of privacy law: A century since Warren and Brandeis","volume":"39","author":"Kramer IR","year":"1990","unstructured":"Kramer IR (1990) The birth of privacy law: A century since Warren and Brandeis. Catholic University Law Review 39(3): 703\u2013724.","journal-title":"Catholic University Law Review"},{"key":"e_1_3_3_79_1","doi-asserted-by":"publisher","DOI":"10.5860\/jifp.v2i1.6252"},{"key":"e_1_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.1002\/pra2.2015.145052010044"},{"key":"e_1_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2012.12.005"},{"key":"e_1_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1177\/0312896219877678"},{"key":"e_1_3_3_83_1","doi-asserted-by":"publisher","DOI":"10.1080\/0361526X.2021.1875958"},{"key":"e_1_3_3_84_1","doi-asserted-by":"publisher","DOI":"10.1108\/JD-01-2021-0007"},{"issue":"1","key":"e_1_3_3_85_1","first-page":"42","article-title":"Ethical codes, moral particularism and target centered virtue: A reinterpretation","volume":"32","author":"Macdonald S","year":"2023","unstructured":"Macdonald S (2023) Ethical codes, moral particularism and target centered virtue: A reinterpretation. Journal of Information Ethics 32(1): 42\u201363.","journal-title":"Journal of Information Ethics"},{"key":"e_1_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.1177\/09610006231160795"},{"key":"e_1_3_3_87_1","doi-asserted-by":"publisher","DOI":"10.1108\/JD-05-2019-0102"},{"key":"e_1_3_3_88_1","doi-asserted-by":"publisher","DOI":"10.1177\/0340035218773786"},{"key":"e_1_3_3_89_1","doi-asserted-by":"publisher","DOI":"10.1080\/0361526X.2021.1875959"},{"key":"e_1_3_3_90_1","unstructured":"MacKinnon CA (1989) Toward a Feminist Theory of the State. Cambridge: Harvard University Press."},{"key":"e_1_3_3_91_1","doi-asserted-by":"publisher","DOI":"10.1108\/01435120810917341"},{"key":"e_1_3_3_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lisr.2007.07.001"},{"key":"e_1_3_3_93_1","doi-asserted-by":"publisher","DOI":"10.5860\/0710254"},{"key":"e_1_3_3_94_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2648.2007.04436.x"},{"key":"e_1_3_3_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030112"},{"key":"e_1_3_3_96_1","doi-asserted-by":"publisher","DOI":"10.1080\/02763877.2011.585279"},{"key":"e_1_3_3_97_1","first-page":"91","volume-title":"Intellectual Property: Moral, Legal, and International Dilemmas","author":"Moore AD","year":"1997","unstructured":"Moore AD (1997) Toward a Lockean theory of intellectual property. In: Moore AD (ed.) Intellectual Property: Moral, Legal, and International Dilemmas. Lanham: Rowman and Littlefield, pp.91\u2013112."},{"key":"e_1_3_3_98_1","doi-asserted-by":"publisher","DOI":"10.2307\/3857899"},{"issue":"3","key":"e_1_3_3_99_1","first-page":"215","article-title":"Privacy: Its meaning and value","volume":"40","author":"Moore AD","year":"2003","unstructured":"Moore AD (2003) Privacy: Its meaning and value. American Philosophical Quarterly 40(3): 215\u2013227.","journal-title":"American Philosophical Quarterly"},{"key":"e_1_3_3_100_1","first-page":"171","volume-title":"Privacy, Security, and Accountability: Ethics, Law and, Policy","author":"Moore AD","year":"2016","unstructured":"Moore AD (2016) Why privacy and accountability trump security. In: Moore AD (ed.) Privacy, Security, and Accountability: Ethics, Law and, Policy. London: Rowman & Littlefield, pp.171\u2013182."},{"key":"e_1_3_3_101_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0265052511000288"},{"key":"e_1_3_3_102_1","first-page":"169","article-title":"US and EU privacy policy: Comparison of regulatory approaches. Journal of","volume":"3","author":"Movius LB","year":"2009","unstructured":"Movius LB, Krup N (2009) US and EU privacy policy: Comparison of regulatory approaches. Journal of International Communication 3: 169\u2013187.","journal-title":"International Communication"},{"key":"e_1_3_3_103_1","first-page":"203","volume-title":"Privacy, Security, and Accountability: Ethics, Law and, Policy","author":"Newell B","year":"2016","unstructured":"Newell B (2016) Mass surveillance, privacy, and freedom: A case for public access to information about mass government surveillance programs. In: Moore AD (ed.) Privacy, Security, and Accountability: Ethics, Law and, Policy. London: Rowman & Littlefield, pp.203\u2013222."},{"key":"e_1_3_3_104_1","doi-asserted-by":"publisher","DOI":"10.7591\/9781501729218"},{"key":"e_1_3_3_105_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.acalib.2014.10.010"},{"issue":"2","key":"e_1_3_3_106_1","first-page":"53","article-title":"A critical literature analysis of library and user privacy","volume":"7","author":"Noh Y","year":"2017","unstructured":"Noh Y (2017) A critical literature analysis of library and user privacy. International Journal of Knowledge Content Development & Technology 7(2): 53\u201383.","journal-title":"International Journal of Knowledge Content Development & Technology"},{"key":"e_1_3_3_107_1","unstructured":"NVB (2001) Professional charter for librarians in public libraries. Available at: https:\/\/www.ifla.org\/wpcontent\/uploads\/2019\/05\/assets\/faife\/codesofethics\/netherlands.pdf (accessed 28 November 2023)."},{"issue":"4","key":"e_1_3_3_108_1","first-page":"269","article-title":"Privacy, morality and the law","volume":"12","author":"Parent W","year":"1983","unstructured":"Parent W (1983) Privacy, morality and the law. Philosophy & Public Affairs 12(4): 269\u2013288.","journal-title":"Philosophy & Public Affairs"},{"key":"e_1_3_3_109_1","doi-asserted-by":"publisher","DOI":"10.1177\/0963662510376886"},{"key":"e_1_3_3_110_1","doi-asserted-by":"publisher","DOI":"10.6017\/ital.v36i2.9817"},{"issue":"2","key":"e_1_3_3_111_1","first-page":"405","article-title":"The economics of privacy","volume":"71","author":"Posner RA","year":"1981","unstructured":"Posner RA (1981) The economics of privacy. American Economic Review 71(2): 405\u2013409.","journal-title":"American Economic Review"},{"key":"e_1_3_3_112_1","volume-title":"The Economics of Justice","author":"Posner RA","year":"1983","unstructured":"Posner RA (1983) The Economics of Justice. Cambridge: Harvard University Press."},{"issue":"3","key":"e_1_3_3_113_1","first-page":"647","article-title":"Rereading Warren and Brandeis: Privacy, property, and appropriation","volume":"41","author":"Post RC","year":"1991","unstructured":"Post RC (1991) Rereading Warren and Brandeis: Privacy, property, and appropriation. Case Western Reserve Law Review 41(3): 647\u2013680.","journal-title":"Case Western Reserve Law Review"},{"issue":"2","key":"e_1_3_3_114_1","first-page":"22","article-title":"Information ethics and academic libraries: Data privacy in the era of big data","volume":"26","author":"Prindle S","year":"2017","unstructured":"Prindle S, Loos A (2017) Information ethics and academic libraries: Data privacy in the era of big data. Journal of Information Ethics 26(2): 22\u201333.","journal-title":"Journal of Information Ethics"},{"key":"e_1_3_3_115_1","unstructured":"PRISMA (2024) PRISMA Flow Diagram. Available at: https:\/\/www.prismastatement.org\/prisma-2020-flow-diagram (accessed 18 April 2024)."},{"key":"e_1_3_3_116_1","doi-asserted-by":"publisher","DOI":"10.2307\/3478805"},{"issue":"4","key":"e_1_3_3_117_1","first-page":"323","article-title":"Why privacy is important","volume":"4","author":"Rachels J","year":"1975","unstructured":"Rachels J (1975) Why privacy is important. Philosophy & Public Affairs 4(4): 323\u2013333.","journal-title":"Philosophy & Public Affairs"},{"key":"e_1_3_3_118_1","doi-asserted-by":"publisher","DOI":"10.1080\/0361526X.2021.1900022"},{"key":"e_1_3_3_119_1","volume-title":"Legislating Privacy: Technology, Social Values, and Public Policy","author":"Regan PM","year":"1995","unstructured":"Regan PM (1995) Legislating Privacy: Technology, Social Values, and Public Policy. London: University of North Carolina Press."},{"key":"e_1_3_3_120_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107280557.004"},{"issue":"1","key":"e_1_3_3_121_1","first-page":"1","article-title":"Abduction: The logic of discovery of grounded theory","volume":"11","author":"Reichertz J","year":"2007","unstructured":"Reichertz J (2007) Abduction: The logic of discovery of grounded theory. Forum: Qualitative Social Research 11(1): 1\u201317.","journal-title":"Forum: Qualitative Social Research"},{"issue":"3","key":"e_1_3_3_122_1","first-page":"27","article-title":"Driving to the panopticon: A philosophical exploration of the risks to privacy posed by the highway technology of the future","volume":"11","author":"Reiman JH","year":"1995","unstructured":"Reiman JH (1995) Driving to the panopticon: A philosophical exploration of the risks to privacy posed by the highway technology of the future. Computer and High-Tech Law Journal 11(3): 27\u201344.","journal-title":"Computer and High-Tech Law Journal"},{"issue":"4","key":"e_1_3_3_123_1","first-page":"1887","article-title":"Prosser\u2019s privacy law: A mixed legacy","volume":"98","author":"Richards NM","year":"2010","unstructured":"Richards NM, Solove DJ (2010) Prosser\u2019s privacy law: A mixed legacy. California Law Review 98(4): 1887\u20131924.","journal-title":"California Law Review"},{"key":"e_1_3_3_124_1","author":"Richardson J","year":"2016","unstructured":"Richardson J (2016) Law and the Philosophy of Privacy. Abingdon: Routledge.","journal-title":"Law and the Philosophy of Privacy"},{"key":"e_1_3_3_125_1","doi-asserted-by":"publisher","DOI":"10.5860\/crl.76.4.427"},{"key":"e_1_3_3_126_1","doi-asserted-by":"publisher","DOI":"10.1080\/0361526X.2021.1875962"},{"issue":"4","key":"e_1_3_3_127_1","first-page":"315","article-title":"Thomson on privacy","volume":"4","author":"Scanlon T","year":"1975","unstructured":"Scanlon T (1975) Thomson on privacy. Philosophy & Public Affairs 4(4): 315\u2013322.","journal-title":"Philosophy & Public Affairs"},{"key":"e_1_3_3_128_1","doi-asserted-by":"crossref","first-page":"263","DOI":"10.4324\/9781315246024-11","author":"Schneider EM","year":"2017","unstructured":"Schneider EM (2017) The violence of privacy. In: Barendt E (ed.) Privacy. Routledge: Abingdon. pp.263\u2013289.","journal-title":"Privacy. Routledge: Abingdon"},{"key":"e_1_3_3_129_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511625138.002"},{"issue":"6","key":"e_1_3_3_130_1","first-page":"1966","article-title":"The EU-US privacy collision: A turn to institutions and procedures","volume":"126","author":"Schwartz PM","year":"2012","unstructured":"Schwartz PM (2012) The EU-US privacy collision: A turn to institutions and procedures. Harvard Law Review 126(6): 1966\u20132009.","journal-title":"Harvard Law Review"},{"key":"e_1_3_3_131_1","unstructured":"SEDIC (2013) Code of ethics for librarians and information professionals. Available at: https:\/\/www.ifla.org\/wp-content\/uploads\/2019\/05\/assets\/faife\/codesofethics\/spain-nationalcodeofethics.pdf (accessed 29 November 2023)"},{"issue":"1","key":"e_1_3_3_132_1","first-page":"1","article-title":"Use of RFID technology in libraries: A new approach to circulation, tracking, inventorying, and security of library materials","volume":"8","author":"Shahid SM","year":"2005","unstructured":"Shahid SM (2005) Use of RFID technology in libraries: A new approach to circulation, tracking, inventorying, and security of library materials. Library Philosophy and Practice 8(1): 1\u20139.","journal-title":"Library Philosophy and Practice"},{"key":"e_1_3_3_133_1","doi-asserted-by":"publisher","DOI":"10.2307\/3481326"},{"key":"e_1_3_3_134_1","volume-title":"Understanding Privacy","author":"Solove DJ","year":"2008","unstructured":"Solove DJ (2008) Understanding Privacy. Cambridge: Harvard University Press."},{"key":"e_1_3_3_135_1","first-page":"1","article-title":"Security and privacy protection in cloud computing: Discussions and challenges","volume":"102642","author":"Sun P","year":"2020","unstructured":"Sun P (2020) Security and privacy protection in cloud computing: Discussions and challenges. Journal of Network and Computer Applications 160, 102642: 1\u201322.","journal-title":"Journal of Network and Computer Applications 160"},{"key":"e_1_3_3_136_1","doi-asserted-by":"publisher","DOI":"10.1177\/0961000610368916"},{"key":"e_1_3_3_137_1","doi-asserted-by":"publisher","DOI":"10.7591\/9781501740831"},{"issue":"4","key":"e_1_3_3_138_1","first-page":"295","article-title":"The right to privacy","volume":"4","author":"Thomson J","year":"1975","unstructured":"Thomson J (1975) The right to privacy. Philosophy & Public Affairs 4(4): 295\u2013314.","journal-title":"Philosophy & Public Affairs"},{"key":"e_1_3_3_139_1","doi-asserted-by":"publisher","DOI":"10.2307\/1321160"},{"key":"e_1_3_3_140_1","volume-title":"Philosophical Investigations","author":"Wittgenstein L","year":"1953","unstructured":"Wittgenstein L (1953) Philosophical Investigations. Hoboken: Wiley."},{"key":"e_1_3_3_141_1","doi-asserted-by":"publisher","DOI":"10.1353\/lib.2017.0022"},{"key":"e_1_3_3_142_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.51"},{"key":"e_1_3_3_143_1","doi-asserted-by":"publisher","DOI":"10.1086\/675329"},{"key":"e_1_3_3_144_1","doi-asserted-by":"publisher","DOI":"10.1177\/1095796018819461"}],"container-title":["Journal of Librarianship and Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/09610006251322982","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/09610006251322982","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/09610006251322982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:55:24Z","timestamp":1773248124000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/09610006251322982"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,13]]},"references-count":143,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["10.1177\/09610006251322982"],"URL":"https:\/\/doi.org\/10.1177\/09610006251322982","relation":{},"ISSN":["0961-0006","1741-6477"],"issn-type":[{"value":"0961-0006","type":"print"},{"value":"1741-6477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,13]]}}}