Edili: Ethical dilemmas for librarians and other information workers: case studies

Overview of the previously registered case studies
The database contains 27 case studies

IDTitleKeywordsType of libraryType of activity
1 Use of filtering software Filtering software ; freedom of information ; protection of minors Public library Use
2 Armenian Genocide Armenians; equal treatment; freedom of expression; neutrality; pluralism; censorship Scientific library; city public library Cooperation with external partners; space allocation
3 Assisted Dying Neutrality ; assisted dying ; censorship Public library

Collection development

4 Use of RFID Data protection ; user’s point of view ; rationalisation ; RFID ; monitoring Public library

Academic library
Use

Management
5 Instructions for bomb-making Protection of minors ; freedom of information ; leftism ; political violence; explosive devices; terrorism; censorship Public library

Use
6 Reviews in the catalogue Catalogue enrichment ; neutrality ; review Public library Development
7 Cultivation of cannabis Data protection ; drugs ; cannabis cultivation ; police investigations ; police access to user data Public library Management
8 Suicide Suicide ; responsibility ; censorship Public library Collection development
9 Anorexic girl Data protection ; protection of minors ; anorexia ; responsibility ; confidentiality Public library Use
10 Creationism Fundamentalism ; gift ; creationism ; neutrality ; sect Public library

Collection development
11 Piglet book Atheism ; child protection ; children′s books ; censorship Public library in a small town Collection development

Development
12 Sex tourism Development ; feminism ; misogyny; sexism; sex tourism; keywords Academic library Development
13 Customer or user? Library function ; educational mission; public service ; economisation ; New Public Management Public library Public relations

14 Bookbinding Bookbinding ; book cover ; courtesy ; corruption Academic library Management
15 Animal rights Equal treatment ; hunting ; neutrality ; animal rights activists Public library Use
16 Negro king Children′s books ; political correctness ; racism ; text authenticity Public library Collection development
17 Homework exchange Fraud ; filtering software ; homework exchange ; internet access ; obtaining grades by fraud ; plagiarism Academic library Use
18 Bestseller service Bestseller service ; range of services ; fees ; cost of freedom ; professionalism ; social commitment Public library Use
19 Gay parents Homosexuality ; child protection; children′s books ; gay parents ; censorship Public library Use

20 Burka wearing Acceptable use policy ; misogyny ; clothing ; cultural diversity ; religion Public library

Academic library
Use
21 Smell of urine Harassment ; damage ; equal treatment ; smells ; media ; smell of urine Public library

Academic library
Use
22 Transvestite Harassment ; transvestite Public library

Academic library
Use
23 Guttenberg Development ; Guttenberg ; plagiarism ; tradition Academic library Development
24 Activities on first day of school Enrolment ; corruption ; promotion of reading ; neutrality ; sponsorship Public library Public relations

Management
25 Indexing term foreign infiltration Development ; neutrality ; indexing Public library

Academic library
Development
26 Author reading Author reading ; blackmail ; political pressure ; quality Public library

District library
Space allocation
27 Homophobia Exhibition ; homophobia ; homosexuality ; caricature ; artistic freedom ; freedom of expression ; censorship City public library Use

case study 17: Homework exchange
Case description:It has come to light that work from various homework exchanges has been systematically downloaded from the library computers and, after slight reformatting, has been subsequently submitted as student′s own work in different university courses. There are many indications that it is organised fraud.

Now, the university administration proposes to block access to homework exchanges via the library.

Potential solution 1:You take on board the proposal of the university administration and block appropriate homework exchanges and comparable offers using a blacklist of filtering software.

Assessment :
  • The core values of freedom of information and freedom from censorship are violated.
  • The university administration is pleased with the uncomplicated solution and the cooperation from the library.
  • The library can claim to have taken a measure to prevent plagiarism.
    See D 2:12; I 2.6; I 4.5
  • It will hardly be possible to identify all homework exchanges for the blacklist so that none may be accessed from the library computers. The list would have to be constantly maintained and checked.
  • Of course, those who are interested in homework exchanges have further access to them through their own networks and internet cafes, etc.
  • The infringement of freedom of information on the part of the library is hardly likely to have serious consequences.
Potential solution 2:You explain to the university administration why you refuse to block the respective websites. On the one hand, in your opinion, this would violate the fundamental values of freedom of information and freedom from censorship. On the other hand, such a measure would be ineffective. You propose instead a university-wide campaign to raise awareness of plagiarism and professional use of plagiarism detection software.

Assessment :
  • The core values of freedom of information and freedom from censorship are respected.
    See D 1.3; D 2.1; I 1.1; I 1.2
  • The university administration takes up the library′s proposal and acknowledges its problem-solving skills.
  • The library can claim to have proposed measures to prevent plagiarism.
    See D 2.12; I 2.6; I 4.5
Potential solution 3:
Potential solution 4:
References to values:
Values: Professional ethics in Germany:
D 1.3 Free access:
“We provide our clients access to our holdings and publicly accessible information resources.”

D 2.1 Freedom of expression, freedom of information, freedom from censorship:
"We support freedom of expression and the free flow of information; libraries and information facilities should guarantee unimpeded access to information resources of all kinds in our democratic society. We reject censorship."

D 2.12 Copyright:
"We recognize the rights of creators and copyright holders of copyright-protected library and information material".

References to values:
Values: International professional ethics (IFLA):
I 1.1 Access to information:
“The core mission of librarians and other information workers is to ensure access to information for all for personal development, education, cultural enrichment, leisure, economic activity and informed participation in and enhancement of democracy.”

I 1.2 Freedom from censorship:
“Librarians and other information workers reject the denial and restriction of access to information and ideas most particularly through censorship whether by states, governments, or religious or civil society institutions.”

I 2.6 Prevention of plagiarism:
"Librarians and other information workers promote the ethical use of information thereby helping to eliminate plagiarism and other forms of misuse of information."

I 4.5 Copyright:
"Librarians and other information workers recognise the intellectual property right of authors and other creators and will seek to ensure that their rights are respected."

Further values:
References:Gewissensbisse. Ethische Probleme der Informatik. Biometrie, Datenschutz, geistiges Eigentum. Debora Weber-Wulff, Christina Class, Wolfgang Croy, Constanze Kurz, David Zellhöfer. Bielefeld: transcript 2009. p. 40

Metadata:
Title:Homework exchange
KeywordsFraud ; filtering software ; homework exchange ; internet access ; obtaining grades by fraud ; plagiarism
ClassificationAccess to information : use of filtering software

Type of libraryAcademic library
Place:University town
Type of activityUse
References to valuesCf Case study 1 – Use of filtering software
Author:Hermann Rösch


User comments

No comments yet Do you have something to contribute?


Add a contribution

We would appreciate it if you would enrich the individual case studies with your comments and a description of your own experience.
Your email address will not be made public. Providing your name is optional.

Your name (optional):
Your email address (not made public):
Heading:
Your comment:

To submit your comment, please enter the solution to the following exercise:

10 + 10