How do libraries manage the ethical and privacy issues of RFID implementation? A qualitative investigation into the decision-making processes of ten libraries

This paper explores how library managers go about implementing RFID (radio frequency identification) technology and particularly how associated privacy issues have been managed. The research methodology consisted of a literature review, theme identification, interview scheduling, interviews and interview analysis. The sample was 10 libraries or library networks and 18 participants. Findings covered the main drivers of RFID development, perceived benefits, tag data, data security, levels of ethical concern, public consultation, potential impact of technological developments on ethical issues, and managers’ sources of ethical decision making. Analysis of potential ethical issues was not found to be a central part of the process of implementing RFID technology in the libraries. The study sees RFID implementation as an informative example of current practice in the implementation of new technologies in libraries and suggests that we look at management structures and decision-making processes to clarify where responsibility for ethical considerations should lie.

[1]  Karen A. Coombs Walking a tightrope: Academic libraries and privacy , 2004 .

[2]  Priya S,et al.  RFID : The Big Player in the Libraries of the Future , 2012 .

[3]  Bill Fitzgerald Your address book is mine: Many iPhone apps take your data , 2015 .

[4]  B. Douglas Blansit RFID Terminology and Technology: Preparing to Evaluate RFID for Your Library , 2010 .

[5]  Lee S. Strickland,et al.  Technology, security, and individual privacy: New tools, new threats, and new public perceptions , 2005, J. Assoc. Inf. Sci. Technol..

[6]  Alan Butters,et al.  RFID for Libraries: A Comparison of High Frequency and Ultra High Frequency Options , 2008 .

[7]  Karen Coyle,et al.  Management of RFID in libraries , 2005 .

[8]  Gul N. Khan,et al.  Secure authentication scheme for passive C1G2 RFID tags , 2012, Comput. Networks.

[9]  Martin Zimerman Radio frequency identification (RFID): time to take another look , 2011, OCLC Syst. Serv..

[10]  Richard S. Rosenberg,et al.  RFID: The Next Serious Threat to Privacy , 2005, Ethics and Information Technology.

[11]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[12]  Jean L. Preer Library Ethics , 2008 .

[13]  J. Douglas Archer An RFID Primer and Intellectual Freedom Caution , 2007 .

[14]  V. Braun,et al.  Using thematic analysis in psychology , 2006 .

[15]  Srdjan Capkun,et al.  On the Practicality of UHF RFID Fingerprinting: How Real is the RFID Tracking Problem? , 2011, PETS.

[16]  Alan Butters RFID systems, standards and privacy within libraries , 2007, Electron. Libr..

[17]  B. Gillham The Research Interview , 2000 .

[18]  Forbes Gibb,et al.  International Journal of Information Management , 2022 .

[19]  Robert H. Deng,et al.  Attacks and improvements to an RIFD mutual authentication protocol and its extensions , 2009, WiSec '09.

[20]  Scott P. Muir RFID security concerns , 2007, Libr. Hi Tech.

[21]  Forbes Gibb,et al.  The application of RFIDs in libraries: an assessment of technological, management and professional issues , 2011, Int. J. Inf. Manag..

[22]  Firas Sarhan Telemedicine in healthcare. 2: The legal and ethical aspects of using new technology. , 2009, Nursing times.