Edili: Ethical dilemmas for librarians and other information workers: case studies

Overview of the previously registered case studies
The database contains 27 case studies

IDTitleKeywordsType of libraryType of activity
1 Use of filtering software Filtering software ; freedom of information ; protection of minors Public library Use
2 Armenian Genocide Armenians; equal treatment; freedom of expression; neutrality; pluralism; censorship Scientific library; city public library Cooperation with external partners; space allocation
3 Assisted Dying Neutrality ; assisted dying ; censorship Public library

Collection development

4 Use of RFID Data protection ; user’s point of view ; rationalisation ; RFID ; monitoring Public library

Academic library
Use

Management
5 Instructions for bomb-making Protection of minors ; freedom of information ; leftism ; political violence; explosive devices; terrorism; censorship Public library

Use
6 Reviews in the catalogue Catalogue enrichment ; neutrality ; review Public library Development
7 Cultivation of cannabis Data protection ; drugs ; cannabis cultivation ; police investigations ; police access to user data Public library Management
8 Suicide Suicide ; responsibility ; censorship Public library Collection development
9 Anorexic girl Data protection ; protection of minors ; anorexia ; responsibility ; confidentiality Public library Use
10 Creationism Fundamentalism ; gift ; creationism ; neutrality ; sect Public library

Collection development
11 Piglet book Atheism ; child protection ; children′s books ; censorship Public library in a small town Collection development

Development
12 Sex tourism Development ; feminism ; misogyny; sexism; sex tourism; keywords Academic library Development
13 Customer or user? Library function ; educational mission; public service ; economisation ; New Public Management Public library Public relations

14 Bookbinding Bookbinding ; book cover ; courtesy ; corruption Academic library Management
15 Animal rights Equal treatment ; hunting ; neutrality ; animal rights activists Public library Use
16 Negro king Children′s books ; political correctness ; racism ; text authenticity Public library Collection development
17 Homework exchange Fraud ; filtering software ; homework exchange ; internet access ; obtaining grades by fraud ; plagiarism Academic library Use
18 Bestseller service Bestseller service ; range of services ; fees ; cost of freedom ; professionalism ; social commitment Public library Use
19 Gay parents Homosexuality ; child protection; children′s books ; gay parents ; censorship Public library Use

20 Burka wearing Acceptable use policy ; misogyny ; clothing ; cultural diversity ; religion Public library

Academic library
Use
21 Smell of urine Harassment ; damage ; equal treatment ; smells ; media ; smell of urine Public library

Academic library
Use
22 Transvestite Harassment ; transvestite Public library

Academic library
Use
23 Guttenberg Development ; Guttenberg ; plagiarism ; tradition Academic library Development
24 Activities on first day of school Enrolment ; corruption ; promotion of reading ; neutrality ; sponsorship Public library Public relations

Management
25 Indexing term foreign infiltration Development ; neutrality ; indexing Public library

Academic library
Development
26 Author reading Author reading ; blackmail ; political pressure ; quality Public library

District library
Space allocation
27 Homophobia Exhibition ; homophobia ; homosexuality ; caricature ; artistic freedom ; freedom of expression ; censorship City public library Use

case study 4: Use of RFID
Case description:Bar codes have been replaced by RFID technology in your library. The use of transponder technology results in a considerable rationalisation. Lending operations can be more easily automated using self-service terminals. Books can be located, i.e. found, even if they had been mislaid. Items can be automatically sorted before replacement on the shelf. And last but not least, theft prevention is greatly improved.

A student group dedicated to real and potential threats to privacy calls for the library to explain what is stored on the chips and the location of the readout stations. Furthermore, they require the library to comment on reports that hackers are able to download the information on the chips and that new hardware will allow the chips to be read not only from a short distance, i.e. up to one metre, but up to 300 metres. In addition, the activists demand that users can check the data on the chips so that they can see that no personal information is included.

Potential solution 1:You ignore the demand. In recent years, RFID has become so widely accepted that it is an integral part of everyday life; loyalty cards are willingly used. As a user of RFID, the library is in good company. The economic benefits and the increasing convenience outweigh all other concerns.

Assessment :

  • The existing, highly professional practice is not questioned.
    See D 1.2; I 5.6
  • Uncertainty among staff is avoided.
  • Economies of scale are retained.
    See D 1.2; I 5.6
  • Concerns of the critics about data protection are not taken seriously.
  • Critics may seek other ways to voice their concerns: press, media, university administration. Negative publicity and increased pressure to justify the decision are not excluded.
  • The critics may resign themselves to the decision. The issue dies down.
  • The point of view of the users is completely ignored.
  • There is no discussion of the complaint.
Potential solution 2:You invite the group to a discussion in which you explain and justify current practice. A change of practice is not discussed.

Assessment :

  • The existing, highly professional practice is not questioned.
    See D 1.2; I 5.6
  • Uncertainty among staff is avoided.
  • Economies of scale are retained.
    See D 1.2; I 5.6
  • Concerns of the critics about data protection are taken seriously, but their arguments are refuted.
  • The point of view of the users is not ignored.
  • The complaint is addressed.
  • Nonetheless, critics may seek other ways to voice their concerns: press, media, university administration. Negative publicity and increased pressure to justify the decision are not excluded.
Potential solution 3:You are persuaded by the arguments of the group and deactivate the chips and readers. You no longer use RFID technology in your library.

Assessment :

  • The existing, highly professional practice is called into question.
  • Uncertainty arises among staff.
  • Economies of scale are lost.
  • Investment in the introduction of RFID is wasted.
  • Concerns of the critics about data protection are taken seriously.
    See D 1.8; I 3.1; I 3.2
  • The point of view of the users is recognised in the specific case.
  • The complaint is recognised in the specific case.
  • The administration / maintenance support, which is unsettled by this decision, demands justification and announces consequences.
  • Other users complain because deactivation of RFID results in radical restriction of use and self issue must be used: this does not meet the standard that is common in other libraries.
Potential solution 4:You have a discussion with the group in which you explain your reasons for the continued use of RFID. At the same time, you acknowledge the privacy-related risks and concerns. You assure the group that RFID practice in the library will be checked in a data protection audit by an independent panel of experts. The result will be made public. In addition, a policy for dealing with RFID technology in the library will be developed. The starting point should be the ALA’s guidelines "RFID in Libraries". In the future, the library must evaluate its practice according to these guidelines. Furthermore, users will be able to contact a named member of staff with questions, objections and suggestions.

Assessment :

  • The existing, highly professional practice is not questioned.
    See D 1.2; I 5.6
  • There is no uncertainty among staff.
  • Economies of scale are not lost.
    See D 1.2; I 5.6
  • Investment in the introduction of RFID is not wasted.
  • Concerns of the critics about data protection are taken seriously.
  • The point of view of the users is recognised in the specific case.
  • The complaint is recognised in the specific case.
  • The library lets it be known that it is committed to transparency.
  • The library defines criteria (policy) against which its own practice can be evaluated and verified.
    See I 3.3
References to values:
Values: Professional ethics in Germany:
D 1.2 Professionalism/guarantee of quality:
"We offer high quality services to all our clients."

D 1.8 Data protection:
" We respect our clients' privacy. Personal data will be saved only to ensure service delivery and only within the legal framework. We will share personal data with other institutions only as required by law."

References to values:
Values: International professional ethics (IFLA):
I 3.1 Data protection:
“Librarians and other information workers respect personal privacy, and the protection of personal data, necessarily shared between individuals and institutions.”

I 3.2 Confidentiality:
"The relationship between the library and the user is one of confidentiality and librarians and other information workers will take appropriate measures to ensure that user data is not shared beyond the original transaction."

I 5.6 Professionalism:
“You aim for the highest standards of service quality and thus promote the positive reputation of the profession.”

Further values:User’s point of view

References:Caldwell-Stone, Deborah: RFID in Libraries. In: Library technology reports. 46, 2010, 8, pp. 38-44.

Giersberg, Dagmar: RFID - Funkende Bücher sorgen für mehr Effizienz. In: Goethe-Institute. February 2008.
http://www.goethe.de/wis/bib/fdk/de3101909.htm (4.6.2013)

Günther, Oliver, Spiekermann Sarah: RFID vs. Privatsphäre - ein Widerspruch? In: Wirtschaftsinformatik. 46, 2004, 4, pp. 245-246.

Kern, Christian: RFID für Bibliotheken / Christian Kern. With Eva Schubert und Marianne Pohl. - Berlin [and others] : Springer, 2011.

Oltersdorf, Jenny: RFID in öffentlichen Bibliotheken - auch eine Frage der Ethik. In: BIT online. 12, 2009, 1, pp. 40-42.

RFID in Libraries: Privacy and Confidentiality Guidelines. American Library Association. 2006.
http://www.ala.org/Template.cfm?Section=otherpolicies&Template=/ContentManagement/ContentDisplay.cfm&ContentID=130851 (4.6.13)

Schläger, Uwe: Datenschutz aktuell: RFID bei den Bücherhallen Hamburg. 2006.
http://www.buecherhallen.de/datenschutz_rfid (19.5.14)

Thornley, Clare, Stuart Ferguson, John Weckert, Forbes Gibb: Do RFIDs (Radio Frequency identifier devices) provide new ethical dilemmas for librarians and information professionals? In: International Journal of Information Management, 31, 2011/12, 6, pp. 546-555.

Verch, Ulrike: Selbstklebend, selbstverbuchend und auch selbstverpflichtend? Rechtliche Rahmenbedingungen für den Einsatz von RFID-Chips in Bibliotheken. Information und Ethik. Dritter Leipziger Kongress für Information und Bibliotheken, ed. Barbara Lison. Wiesbaden 2007, pp. 450-454.
http://www.opus-bayern.de/bib-info/volltexte/2007/305/pdf/verch-leipzig-2007.pdf (4.6.13)

Metadata:
Title:Use of RFID
KeywordsData protection ; user’s point of view ; rationalisation ; RFID ; monitoring
ClassificationData protection : RFiD
Type of libraryPublic library

Academic library
Place:Germany
Type of activityUse

Management
References to valuesCase study 1 – filtering software
Author:Hermann Rösch


User comments

M.F. - - RFID, ethics, additional solution (08.05.2014 17:28:47)

It is suggested to the group members that they hand in their library cards, return all the books they have borrowed and discontinue use of the library. There is after all a great deal of information on the internet, and anonymisation services (proxies) provide for greater privacy when searching and downloading.


Alternative

It is suggested to the group members that they prove there is another modern library of comparable size without RFID within a radius of 200 km. Then they will be directed there.


A little harsh, but why must one always humiliate oneself when struggling with justifications?


Best regards,


M.F.


H.S. - RFID, ethics (09.05.2014 08:57:54)

In my opinion, potential solution 4 is the best. I have never understood why a useful but controversial technique is introduced without appropriate publicly made "policies". Transparency in advance can take much of the sting out of the conflict. The policy and the internal handling of the RFID tags and thus the read data should be checked regularly, because the technology – in this case, the readout devices – developed quickly.


To comment on MF: Libraries provide services for your customers, users or whatever we like to call them. The libraries are usually (indirectly) funded by those same people. In this context, I do not regard it as expedient not to take requests / concerns seriously and to say, "If it does not suit you here, go somewhere else!"


Best wishes, H.S.



Add a contribution

We would appreciate it if you would enrich the individual case studies with your comments and a description of your own experience.
Your email address will not be made public. Providing your name is optional.

Your name (optional):
Your email address (not made public):
Heading:
Your comment:

To submit your comment, please enter the solution to the following exercise:

3 + 7