School of Information and Library Science
University of North Carolina at Chapel Hill

INLS 584, Information Ethics
Fall 2013

Access to Information; Censorship/Freedom of Speech

Access to Information

Duff, A.S. (2011). The Rawls-Tawney theorem and the digital divide in postindustrial society. Journal of the American Society for Information Science & Technology, 62(3), 604-612. [UNC libraries]

Granka, L.A. (2010). The politics of search: A decade retrospective. Information Society, 26(5), 364-374. [UNC libraries]

Haider, J., & Bawden, D. (2007). Conceptions of 'information poverty' in LIS: A discourse analysis. Journal of Documentation, 63(4), 534-557. [UNC libraries]

Houston, R. D., & Erdelez, S. (2004). The digital divide: Who really benefits from the proposed solutions for closing the gap. Journal of Information Ethics, 13(1), 19-33. [UNC libraries]

Hoyer, J. (2013). Finding room for everyone: Libraries confront social exclusion. In Dudley, M. (ed.), Public Libraries and Resilient Cities. Chicago: Americal Library Association, 57-66. [SILS - Z716.2 .P82 2013]

Jaeger, P.T., Bertot, J.C., McClure, C.R., & Langa, L.A. (2006). The policy implications of internet connectivity in public libraries. Government Information Quarterly, 23(1), 123-141. [UNC libraries]

Jones, B.M. (2009). Protecting Intellectual Freedom in Your Academic Library: Scenarios from the Front Lines. Chicago: American Library Association. [SILS reserves - Z675 .U5 J72 2009]

Lievrouw, L. A., & Farb, S. E. (2003). Information and equity. Annual Review of Information Science & Technology, 37. [SILS - Reference Z699.A1 A65]

Lingel, J., & boyd, d. (2013). "Keep it secret, keep it safe": Information poverty, information norms, and stigma. JOurnal of the American Society for Information Science & Technology, 64(5), 981-991. [UNC libraries]

Lumiérs, E. M., & Schimmel, M. (2004). Information poverty: A measurable concept? In Mendina, T., & Britz, J. J. (eds.), Information Ethics in the Electronic Age: Current Issues in Africa and the World. Jefferson, NC: McFarland, 47-61. [SILS - Z665 .I5795 2004]

McCabe, R. B. (2001). Civic Librarianship: Renewing the Social Mission of the Public Library. Lanham, MD: Scarecrow Press.

Pariser, E. (2011). Beware online "filter bubbles". TED talk, http://www.ted.com/talks/eli_pariser_beware_online_filter_bubbles.html.

Schewe, D.B. (2009). Access to information: Promise versus practice in the USA. In Flinn, A., & Jones, H. (eds.), Freedom of Information: Open Access, Empty Archives? London: Routledge, 90-101. [SILS Library - KF3255 .F74 2009]

Segev, E., & Ahituv, N. (2010). Popular searches in Google and Yahoo!: A "digital divide" in information uses? Information Society, 26(1), 17-37. [UNC libraries]

Smiraglia, R.P. (2009). Bibliocentrism, cultural warrant, and the ethics of resource description: A case study. Cataloging & Classification Quarterly, 47(7), 671-686. [UNC libraries]

Stevenson, S. (2009). Digital divide: A discursive move away from the real inequities. The Information Society, 25(1), 1-22. [UNC libraries]

Sweeney, L. (2013). Discrimination in online advertising. Communications of the ACM, 56(5), 44-54. [ACM Digital Library]

van Deursen, A., & van Dijk, J. (2011). Internet skills and the digital divide. New Media & Society, 13(6), 893-911. [UNC libraries]

Vogl, P., & Barrett, M. (2010). Regulating the information gatekeepers. Communications of the ACM, 53(11), 67-72. [UNC libraries]

Equitable Access to Authoring Platforms

Blank, G. (2013). Who creates content? Stratification and content creation on the internet. Information, Communication & Society, 16(4), 590-612. [UNC libraries]

Correa, T., & Jeong, S.H. (2011). Race and online content creation. Information, Communication & Society, 14(5), 638-659. [UNC libraries]

König, R. (2013). Wikipedia: Between lay participation and elite knowledge representation. Information, Communication & Society, 16(2), 160-177. [UNC libraries]

MacKinnon, R. (2011). Rebecca MacKinnon: Let's take back the Internet! TED talk. http://www.ted.com/talks/rebecca_mackinnon_let_s_take_back_the_internet.html.

Mathiesen, K. (2008). Censorship and access to expression. In Himma, K.E., & Tavani, H.T. (eds.), The Handbook of Information and Computer Ethics. Wiley, 573-587. [UNC libraries]

McIver, W. J., Jr., Birdsall, W. F., & Rasmussen, M. (2003). The Internet and the right to communicate. First Monday, 8(12). http://www.firstmonday.dk/issues/issue8_12/mciver/index.html

Schradie, J. (2011). The digital production gap: The digital divide and Web 2.0 collide. Poetics, 39, 145-168. [UNC libraries]

Schradie, J. (2012). The trend of class, race, and ethnicity in social media inequality: Who still cannot afford to blog? Information, Communication & Society, 15(4), 555-571. [UNC libraries]

Censorship/Freedom of Speech

Akers, C.G. (2012). Which books are challenged more - classics or contemporary? New Library World, 113(7/8), 385-395. [UNC libraries]

Balkin, J.M. (2004). Digital speech and democratic culture: A theory of freedom of expression for the information society. New York University Law Review, 79(1), 1-58. [UNC libraries]

Beardsley, A. (2011). Art under fire: A timeline of censorship in the name of decency, from Aubrey Beardsley to Richard Prince. Index of Censorship, 40(3), 103-112. [UNC libraries]

Blitz, M.J. (2006). Constitutional safeguards for silent experiments in living: Libraries, the right to read, and a First Amendment theory for an unaccompanied right to receive information. UMKC Law Review, 74, 799-882. [UNC libraries, via HeinOnline]

Blume, Judy. (2012). Gentle reader. Index on Censorship, 41(2), 182-183. [UNC libraries]

Brown, G., & McMenemy, D. (2013). The implementation of internet filtering in Scottish public libraries. Aslib Proceedings, 65(2), 182-202. [UNC libraries]

Buchanan, E.A., & Henderson, K.A. (2009). Intellectual freedom. In Case Studies in Library and Information Science Ethics. Jefferson, NC: McFarland, 23-29. [SILS - Z682.35 .P75 B83 2009]

Crandall, J.R., Crete-Nishihata, M., Knockel, J., McKune, S., Senft, A., Tseng, D., & Wiseman, G. (2013). Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC. First Monday, 18(7). http://dx.doi.org/10.5210%2Ffm.v18i7.4628.

Depken, C.A., II. (2006). Who supports Internet censorship? First Monday, 11(9). http://www.firstmonday.org/issues/issue11_9/depken/index.html.

Dingledine, R. (2010). Tools of the trade. Index on Censorship, 39(1), 127-137. [UNC libraries]

Foerstel, H. N. (2002). Banned in the U.S.A.: A Reference Guide to Book Censorship in Schools and Public Libraries. Westport, CT: Greenwood Press. [SILS Reference - Z658 .U5 F64 2002]

Godejord, P.E. (2007). Fighting child pornography: Exploring didactics and student engagement in social informatics. Journal of the American Society for Information Science & Technology, 58(3), 446-451. [UNC libraries]

Gray, L. (2010). Can music kill? Index on Censorship, 39(3), 112-120. [UNC libraries]

Green, J., & Karolides, N. J. (2005). Encyclopedia of Censorship. New York: Facts on File. [SILS Reference - Z657 .G73 2005]

Greengard, S. (2010). Censored! Communications of the ACM, 53(7), 16-18. [UNC libraries]

Harris, C., Rowbotham, J., & Stevenson, K. (2009). Truth, law and hate in the virtual marketplace of ideas: Perspectives on the regulation of Internet content. Information & Communications Technology Law, 18(2), 155-184. [UNC libraries]

Henry, J.S. (2009). Beyond free speech: Novel approaches to hate on the internet in the United States. Information & Communications Technology Law, 18(2), 235-251. [UNC libraries]

Jaeger, P. T., & McClure, C. R. (2004). Potential legal challenges to the application of the Children's Internet Protection Act (CIPA) in public libraries: Strategies and issues. First Monday, 9(2). http://www.firstmonday.org/issues/issue9_2/jaeger/index.html.

Jin, J., & Co, A.-C. (2012). Ethics, strategy and user relevance: The case of Google.cn (Response to: Google vs. China's 'Great Firewall': Ethical implications for free speech and sovereignty). Technology in Society, 34(2), 182-184. [UNC libraries]

Kennicott, P. (2011). Culture wars. Index on Censorship, 40(3), 38-49. [UNC libraries]

Kim, S.W., & Douai, A. (2012). Google vs. China's 'Great Firewall': Ethical implications for free speech and sovereignty. Technology in Society, 34(2), 174-181. [UNC libraries]

Labaree, R.V. (1994). The regulation of hate speech on college campuses and the Library Bill of Rights. Journal of Academic Librarianship, 19(6), 372-377. [UNC libraries]

LaRue, J. (2007). the New Inquisition: Understanding and Manageing Intellectual Freedom Challenges. Westport, CT: Libraries Unlimited. [SILS - Z716.4 .L37 2007]

Macgillivray, A. (2012). The business of free speech. Index on Censorship, 41(4), 92-93. [UNC libraries]

MacKinnon, R. (2010). Google rules. Index on Censorship, 39(1), 32-45. [UNC libraries]

Malik, K., & Shabout, N. (2013). Should religious or cultural sensibilities ever limit free expression? Index on Censorship, 42(1), 106-108. [UNC libraries]

Mason, E. (2013). Shaking up the anaconda: The new face of censorship in China. Index on Censorship, 42(2), 43-45. [UNC libraries]

McCarthy, M. (2003). Free market morality: Why evangelicals need free speech on the Internet. In Wolf, M. J. P. (ed.), Virtual Morality: Morals, Ethics, & New Media. New York: Peter Lang, 201-221. [SILS - TK5105.875 .I57 V57 2003]

Mintcheva, S. (2013). Land of the free? Index on Censorship, 42(2), 70-73. [UNC libraries]

Moya, C. (2001). Subject access to "pornography" for serious research purposes. Proceedings of the ASIST Annual Meeting, 118-125. [SILS - Z1008 .A4616]

Nakya, A. C. (2005). Opposing Viewpoints: Censorship. Detroit: Greenhaven Press. [SILS - Z658 .U5 C433 2005]

Oravec, J. A. (2003). On-line advocacy of violence and hate-group activity: The Internet as a platform for the expression of youth aggression and anxiety. In Wolf, M. J. P. (ed.), Virtual Morality: Morals, Ethics, & New Media. New York: Peter Lang, 119-134. [SILS - TK5105.875 .I57 V57 2003]

Peace, A. G. (2003). Balancing free speech and censorship: Academia's response to the internet. Communications of the ACM, 46(11), 104-110. [ACM Digital Library]

Prichard, J., Spiranovic, C., Watters, P., & Lueg, C. (2013). Young people, child pornography, and subcultural norms on the internet. Journal of the American Society for Information Science & Technology, 64(5), 992-1000. [UNC libraries]

Pye, G., & Miller, A. (2008). Scandal, censorship and representation in the online world: An ethical conundrum. Proceedings of the Fifth Australian Institute of Computer Ethics (AiCE) Conference, 98-104. http://hdl.handle.net/10536/DRO/DU:30018035.

Ross, A., & Caidi, N. (2005). Action and reaction: Libraries in the post 9/11 environment. Library &Information Science Research, 27(1), 97-114. [UNC libraries]

Schweinsburg, J. D. (1995). Professional awareness of the ethics of selection. Journal of Information Ethics, 4(2), 33-42. [SILS]

Shiffrin, S. H. (2001). First Amendment: Cases, Comments, Questions. 3rd ed. St. Paul, MN: West Pub. Co. [SILS - KF4770.A7 S48 2001]

Sova, D. B. (2005). 120 Banned Books: Censorship Histories of World Literature. New York: Checkmark Books/Facts On File. [SILS - Z658.U5 K35 2005]

Taylor, K., & McMenemy, D. (2013). Censorship challenges to books in Scottish public libraries. Journal of Librarianship and Information Science, 45(2), 153-167. [UNC libraries]

Warburton, N., & Franco, J. (2013). Should there be limits on hate speech? Index on Censorship, 42(2), 150-152. [UNC libraries]

Zuckerman, E. (2010). Intermediary censorship. In Diebert, R., et al. (eds.), Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace. Cambridge, MA: MIT Press, 71-85. [Davis - HM851 .A254 2010]

Access to Government Information, including Government-Funded Research

Barker, A. N. (2005). Executive order no. 13,233: A threat to government accountability. Government Information Quarterly, 22(1), 4-19. [UNC libraries]

De Baets, A. (2011). Taxonomy of concepts related to the censorship of history. In Maret, S. (ed.), Government Secrecy. Research in Social Problems and Public Policy, Vol. 19. UK: Emerald, 53-65. [Davis - JF1525.S4 G68 2011]

Depository Library Council. (2006, Sep. 29). "Knowledge Will Forever Govern": A Vision Statement for Federal Depository Libraries in the 21st Century. http://www.gpo.gov/su_docs/fdlp/council/dlcvision092906.pdf.

Ellington, T.C. (2011). Secrecy and disclosure: Policies and consequences in the American experience. In Maret, S. (ed.), Government Secrecy. Research in Social Problems and Public Policy, Vol. 19. UK: Emerald, 67-90. [Davis - JF1525.S4 G68 2011]

Gaidos, K. (2007). Access to vice presidential records in the aftermath of Executive Order 13,233: From haphazard past to uncertain future. Government Information Quarterly, 24(1), 2-28. [UNC libraries]

Haque, A. (2003). Information technology, GIS and democratic values: Ethical implications for IT professionals in public service. Ethics and Information Technology, 5(1), 39-48. [UNC libraries]

Jaeger, P.T. (2007). Information policy, information access, and democratic participation: The national and international implications of the Bush administration's information politics. Government Information Quarterly, 24(4), 840-859. [UNC libraries]

Jaeger, P.T., Bertot, J.C., & Shuler, J.A. (2010). The Federal Depository Library Program (FDLP), academic libraries, and access to government information. Journal of Academic Librarianship, 36(6), 469-478. [UNC libraries]

Liu, W. (2011). Government information sharing: Principles, practice, and problems -- An international perspective. Government Information Quarterly, 28(3), 363-373. [UNC libraries]

Maxwell, T. A. (2003). The public need to know: Emergencies, government organizations, and public information policies. Government Information Quarterly, 20(3), 233-258. [UNC libraries]

McDermott, P. (2011). Secrecy reform or secrecy redux? Access to information in the Obama administration. In Maret, S. (ed.), Government Secrecy. Research in Social Problems and Public Policy, Vol. 19. UK: Emerald, 189-217. [Davis - JF1525.S4 G68 2011]

Metcalfe, D.J. (2009). The nature of government secrecy [editorial]. Government Information Quarterly, 26(2), 305-310. [UNC libraries]

Miller, D.W., Urbaczewski, A., & Salisbury, W.D. (2005). Does 'public access' imply 'ubiquitous' or 'immediate'? Issues surrounding public documents online. In Freeman, L.A., & Peace, A.G. (eds.), Information Ethics: Privacy and Intellectual Property. Hershey, PA: Information Science Publishing, 100-119. [Law Library - T58.5 .I5248 2005]

Morrisroe, D.A. (2009). Freedom of information and the American presidency: A researcher's perspective. In Flinn, A., & Jones, H. (eds.), Freedom of Information: Open Access, Empty Archives? London: Routledge, 102-112. [SILS Library - KF3255 .F74 2009]

Piltz, R. (2011). Secrecy, complicity, and resistance: Political control of climate science communication under the Bush-Cheney administration. In Maret, S. (ed.), Government Secrecy. Research in Social Problems and Public Policy, Vol. 19. UK: Emerald, 219-246. [Davis - JF1525.S4 G68 2011]

Relyea, H.C. (2009). Congress and freedom of information: A retrospective and a look at a current issue. Government Information Quarterly, 26(3), 437-440. [UNC libraries]

Relyea, H.C. (2009). Federal freedom of information policy: Highlights of recent developments. Government Information Quarterly, 26(2), 314-320. [UNC libraries]

Schewe, D.B. (2009). Access to information: Promise versus practice in the USA. In Flinn, A., & Jones, H. (eds.), Freedom of Information: Open Access, Empty Archives? London: Routledge, 90-101. [SILS - K3255 .F74 2009]

Selby, B. (2008). Age of Aquarius -- The FDLP in the 21st century. Government Information Quarterly, 25(1), 38-47. [UNC libraries]

Sobel, D.L. (2011). The urge to classify. Index on Censorship, 40(1), 29-35. [UNC libraries]

Open Access Publishing

Beaudouin-Lafon, M. (2010). Open access to scientific publications [Viewpoint]. Communications of the ACM, 53(2), 32-34. [UNC libraries]

Craig, I.D., Plume, A.M., McVeigh, M.E., Pringle, J., & Amin, M. (2007). Do open access articles have greater citation impact? A critical review of the literature. Journal of Informetrics, 1(3), 239-248. [UNC libraries]

Flinn, A., & Jones, H. (eds.) (2009). Freedom of Information: Open Access or Empty Archives? London: Routledge. [SILS Library - K3255 .F74 2009]

Harnad, S., Brody, T., Vallieres, F., Carr, L., Hitchcock, S., Gingras, Y., Oppenheim, C., Hajjem, C., & Hilf, E.R. (2008). The access/impact problem and the green and gold roads to open access: An update. Serials Review, 34(1), 36-40. [UNC libraries]

Palepu, A. (2011, April 6). Open access publishing [video]. Digital Tattoo. http://www.youtube.com/watch?v=3umZS98MnUs.

Willinsky, J. (2006). The Access Principle: The Case for Open Access to Research and Scholarship. Cambridge, MA: MIT Press. [Davis Library - Z286.O63 W55 2006]

Additional Readings

Alfino, M., & Pierce, L. (2001). The social nature of information. Library Trends, 49(3), 471-485. [UNC libraries]

Aufderheide, P. (2000). The threat to the net. The Progressive, 64(2), 17-19. [Online via UNC libraries]

Banks, M. A. (1998). Filtering the net in libraries: the case (mostly) in favor. Computers in Libraries, 18(3), 50-52,54. [UNC libraries]

Bishop, A. P., Tidline, T. U., Shoemaker, S., & Salela, P. (1999). Public libraries and networked information services in low-income communities. Library & Information Science Research, 21(3), 361-390. [UNC libraries]

Bricca, J. (director and producer). (2006?). Indies Under Fire: The Battle for the American Bookstore [videorecording]. New York: Filmakers Library. [Undergrad Library, Media Resources Center, 65-DVD3534]

Britz, J.J., & Snyman, R. (2003). Universal bibliographic control -- a contradiction in terms? A reflection on the ethical problems and dilemmas of universal bibliographic control. In Rockenbach, B., & Mendina, T. (eds.), Ethics and Electronic Information: A Festschrift for Stephen Almagno. Jefferson, NC: McFarland, 108-118. [SILS - Z665 .E83 2003]

Canellopoulou-Bottis, M., & Himma, K.E. (2008). The digital divide: A perspective for the future. In Himma, K.E., & Tavani, H.T. (eds.), The Handbook of Information and Computer Ethics. Wiley, 621-637. [UNC libraries]

Cox, P (1997). The conceits of law and the transmission of the indecent, obscene, and ugly. Journal of Information Ethics, 6(2), 23-34. [SILS]

Gosseries, A. (2003). A case for restricted access. Journal of Information Ethics, 12(1), 56-66. [UNC libraries]

Hauptman, R. (1998). Professionalism or culpability? An experiment in ethics. In Stichler, R. N., & Hauptman, R. (Eds.). Ethics, Information, and Technology: Readings. Jefferson, NC: McFarland, 291-295. [Davis - P94 .E795 1998]

Heins, M. (2001). Filtering fever. In Not in Front of the Children: "Indecency," Censorship, and the Innocence of Youth. New York: Hill & Wang, 180-200. [SILS, Davis - Z658 .U5 H42 2001]

Hill, M. (1999). Information ethics: Expectations and rights. In The Impact of Information on Society: An Examination of Its Nature, Value, and Usage. London: Bowker-Saur, 111-132. [SILS - HM221 .H55 1999]

Information bill of rights and responsibilities: I. Communication rights and responsibilities. In Firestone, C. M., & Schement, J. R. (Eds.). (1995). Toward an Information Bill of Rights and Responsibilities. Washington, DC: Aspen Institute, 7-18. [Davis - HE7781 .T683 1995]

James, J. (2007). From origins to implications: Key aspects in the debate over the digital divide. Journal of Information Technology, 22, 284-295.

Kahle, B. (2007). Brewster Kahle builds a free digital library. TED: Ideas Worth Spreading. http://www.ted.com/talks/brewster_kahle_builds_a_free_digital_library.html.

Knuth, R. (2003). Libricide: The Regime-Sponsored Destruction of Books and Libraries During the Twentieth Century. Westport, CT: Prager. [Davis - Z659 .K58 2003]

Liu, A. (1995). Should we link to the Unabomber? An essay on practical Web ethics. http://www.english.ucsb.edu/faculty/ayliu/research/whyuna.htm.

Lor, P. J., & Britz, J. (2004). Digitization of Africa's documentary heritage: Aid or exploitation? Journal of Information Ethics, 13(2), 78-93. [UNC libraries]

O'Hara, K., & Shadbolt, N. (2005). Knowledge technologies and the Semantic Web. In Mansell, R., & Collins, B.S. (eds.), Trust and Crime in Information Societies. Cheltenham, UK: Edward Elgar, 113-164. [Davis - HN400 .I56 T78 2005]

Pautz, H. (2013). Managing access to the internet in public libraries. New Library World, 114(7/8), 308-318. [UNC libraries]

Sharlet, J. (2003). Big world: How Clear Channel programs America. Harper's, 307(1843), 37-45. [UNC libraries]

Stichler, R. N. (1998). Ethics in the information market. In Stichler, R. N., & Hauptman, R. (Eds.). Ethics, Information, and Technology: Readings. Jefferson, NC: McFarland, 169-183. [Davis - P94 .E795 1998]

Tisselli, E. (2010). thinkflickrthink: A case study on strategic tagging. Communications of the ACM Virtual Extension, 53(8), 141-145. [UNC libraries]

Van Dijk, J., & Hacker, K. (2003). The digital divide as a complex and dynamic phenomenon. The Information Society, 19(4), 315-326. [UNC libraries]

Weckert, J. (2000). What is so bad about internet content regulation? Ethics and Information Technology, 2(2), 105-111. [UNC libraries]

Wilinksy, J. (2006). Rights. In The Access Principla: The Case for Open Access to Research and Scholarship. Cambridge, MA: MIT Press, 143-154. [Davis - Z286 .O63 W55 2006]

Willems, H. (1998). Filtering the net in libraries: the case (mostly) against. Computers in Libraries, 18(3), 5555-56,58. [UNC libraries]

Web Sites of Interest

ALA Office for Intellectual Freedom. (2005). American Library Association. http://www.ala.org/ala/oif/Default622.htm.

The Freedom to Read Foundation Home Page. (2005). American Library Association. http://www.ala.org/ala/ourassociation/othergroups/ftrf/freedomreadfoundation.htm.

National Coalition Against Censorship. (2002). http://ncac.org/index.html

Open Government. (1999, April 15.) Electronic Privacy Information Center. http://www.epic.org/open_gov/.

World Information Access Project. (2007). http://www.wiareport.org/.

Scenarios of Ethical Decisions

Buchanan, E.A., & Henderson, K.A. (2009). Cases 2.1-2.25. In Case Studies in Library and Information Science Ethics. Jefferson, NC: McFarland, 29-45. [SILS - Z682.35 .P75 B83 2009]

Ericson, T. (2003). Case twenty-three: Equal access and equal treatment of users. In Benedict, K., Ethics and the Archival Profession: Introduction and Case Studies. Chicago: Society of American Archivists, 55-56. [SILS - CD971 .B46 2003]

Geiszler, R. W. (1998). Patron behavior policies in the public library: Kreimer v. Morristown revisited. Journal of Information Ethics, 7(1), 54-67. [SILS]

Jones, B.M. (2009). The case of Ward Churchill. In Protecting Intellectual Freedom in Your Academic Library: Scenarios from the Front Lines. Chicago: American Library Association, 58-60. [SILS reserves - Z675 .U5 J72 2009]

Jones, B.M. (2009). Mahmoud Ahmadinejad visits Columbia University. In Protecting Intellectual Freedom in Your Academic Library: Scenarios from the Front Lines. Chicago: American Library Association, 60-62. [SILS reserves - Z675 .U5 J72 2009]

Jones, B.M. (2009). Would you buy this book? Where would you house it? In Protecting Intellectual Freedom in Your Academic Library: Scenarios from the Front Lines. Chicago: American Library Association, 95-98. [SILS reserves - Z675 .U5 J72 2009]

LaRue, J. (1992). About face: an opinion on the firing of Will Manley. Journal of Information Ethics, 1, 42-44. [SILS]

Oz, E. (1994). Ethics in higher education. In Ethics for the Information Age: Cases. Dubuque, IA: Business & Educational Technologies, 27-28. [SILS - T58.5 .O9 1994 c.2]

Preer, J. (2008). Kreimer v. Morristown, NJ (1989). In Library Ethics. Westport, CT: Libraries Unlimited, 64-67. [SILS - Z682.35 .P75 P74 2008]

Preer, J. (2008). KKK exhibit in Winston-Salem (1979). In Library Ethics. Westport, CT: Libraries Unlimited, 69-71. [SILS - Z682.35 .P75 P74 2008]

Preer, J. (2008). Concerned Women of American and the Lafayett County/Oxfor, Mississippi Public Library (1988). In Library Ethics. Westport, CT: Libraries Unlimited, 71-74. [SILS - Z682.35 .P75 P74 2008]

Preer, J. (2008). Wilson Library Bulletin and the sex questionnaire (1992). In Library Ethics. Westport, CT: Libraries Unlimited, 90-92. [SILS - Z682.35 .P75 P74 2008]

Preer, J. (2008). The California Library Association and the holocaust denier (1983). In Library Ethics. Westport, CT: Libraries Unlimited, 98-100. [SILS - Z682.35 .P75 P74 2008]

Preer, J. (2008). The Higher Power of Lucky (2007). In Library Ethics. Westport, CT: Libraries Unlimited, 105-108. [SILS - Z682.35 .P75 P74 2008]

Preer, J. (2008). Robert Mapplethorpe photographs (1990). In Library Ethics. Westport, CT: Libraries Unlimited, 112-114. [SILS - Z682.35 .P75 P74 2008]

Preer, J. (2008). The Library of Congress and The Birth of a Nation (1993). In Library Ethics. Westport, CT: Libraries Unlimited, 121-124. [SILS - Z682.35 .P75 P74 2008]

Preer, J. (2008). Doing business in South Africa (1986). In Library Ethics. Westport, CT: Libraries Unlimited, 150-151. [SILS - Z682.35 .P75 P74 2008]

Preer, J. (2008). Unblocking Web sites at the Rochester Public Library (2007). In Library Ethics. Westport, CT: Libraries Unlimited, 166-169. [SILS - Z682.35 .P75 P74 2008]

Preer, J. (2008). Brokeback Mountain at St. Andrew's School (2005). In Library Ethics. Westport, CT: Libraries Unlimited, 173-175. [SILS - Z682.35 .P75 P74 2008]

Scenario 1: Explicit photos on a university network. (1994). In Denning, D. S., & Lin, H. S. Rights and Responsibilities of Participants in Networked Communities. Washington, DC: National Academy Press, 56-60. [Davis - TK5105.5 .R54 1994; online at http://books.nap.edu/books/0309050901/html/index.html]

Scenario 2: Negative comments harm a third party. (1994). In Denning, D. S., & Lin, H. S. Rights and Responsibilities of Participants in Networked Communities. Washington, DC: National Academy Press, 60-66. [Davis - TK5105.5 .R54 1994; online at http://books.nap.edu/books/0309050901/html/index.html]

Schweinsburg, J. D. (1997). Family friendly libraries vs. the American Library Association. Journal of Information Ethics, 6(2), 75-87. [SILS]

Shuman, B. A. (1993). Rules, ethics, and the homeless in libraries -- two views. Journal of Information Ethics, 2(2), 71-82. [SILS]

Spinello, R. A. (1997). Case 9.3, Censorship at New England University. In Case Studies in Information and Computer Ethics. Upper Saddle River, NJ: Prentice Hall, 251-254. [Davis - QA76.9 .M65 S65 1997]

Spinello, R. A. (2000). The librarian's dilemma (hypothetical). In Cyberethics: Morality and Law in Cyberspace. Sudbury, MA: Jones and Bartlett, 66-67. [SILS, Davis - TK5105.875 .I57 S68 2000]

Spinello, R. A. (2000). Spam or free speech at Intel? In Cyberethics: Morality and Law in Cyberspace. Sudbury, MA: Jones and Bartlett, 66-67. [SILS, Davis - TK5105.875 .I57 S68 2000]

Swan, J. C. (1998). Untruth or consequences? In Stichler, R. N., & Hauptman, R. (Eds.), Ethics, Information, and Technology: Readings. Jefferson, NC: McFarland, 64-75. [Davis - P94 .E795 1998]


Return to INLS 584 Syllabus or INLS 584 Schedule


Creative Commons LicenseThe INLS 584 website, UNC-CH, 2013, is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License. Address all comments and questions to Barbara M. Wildemuth at wildemuth@unc.edu.
This page was last modified on August 1, 2013, by Barbara M. Wildemuth.