[1]
8 Characteristics of good user requirements: http://www.slideshare.net/guest24d72f/8-characteristics-of-good-user-requirements-presentation.
[2]
A digital forensic practitioner’s guide to giving evidence in a court of law - viewcontent.cgi: http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1032&context=adf.
[3]
An Introduction to Information System Risk Management - introduction-information-system-risk-management-1204: https://www.sans.org/reading-room/whitepapers/auditing/introduction-information-system-risk-management-1204.
[4]
AsianLII - Asian Legal Information Institute: http://www.asianlii.org/.
[5]
Australasian Legal Information Institute (AustLII): http://www.austlii.edu.au/.
[6]
Baase, S. 2009. A gift of fire: social, legal, and ethical issues for computing and the Internet. Pearson Prentice Hall.
[7]
Bailey, S. 2008. Managing the crowd: rethinking records management for the Web 2.0 world. Facet.
[8]
Bainbridge, D.I. and Bainbridge, D.I. 2008. Introduction to information technology law. Pearson/Longman.
[9]
Ballard, C. and International Business Machines Corporation. International Technical Support Organization 2014. IBM information governance solutions. IBM Corp., International Technical Support Organization.
[10]
Barclay T. Blair | Essays in Information Governance (and more): https://iginitiative.com/tag/barclay-t-blair/.
[11]
Batini, C. et al. 2009. Methodologies for data quality assessment and improvement. ACM Computing Surveys. 41, 3 (Jul. 2009), 1–52. DOI:https://doi.org/10.1145/1541880.1541883.
[12]
Borgmann, A. 1999. Holding on to reality: the nature of information at the turn of the millennium. University of Chicago Press.
[13]
British and Irish Legal Information Institute: http://www.bailii.org/.
[14]
Brotby, K. 2009. Information Security Governance. John Wiley & Sons, Inc.
[15]
Bryant, R. 2008. Investigating digital crime. J. Wiley & Sons.
[16]
Buckland, Michael K Information as Thing. Journal of the American Society for Information Science. 42, 5, 351–360.
[17]
Calder, A. and Watkins, S.G. 2010. Information security risk management for ISO27001/ISO27002. IT Governance Pub.
[18]
CommonLII - Commonwealth Legal Information Institute: http://www.commonlii.org/.
[19]
Corporate governance | ICAEW | ICAEW: https://www.icaew.com/en/technical/corporate-governance.
[20]
Craig, R. et al. 2006. There is disaster planning and there is reality—the Cayman Islands National Archive (CINA) experience with Hurricane Ivan 1. Journal of the Society of Archivists. 27, 2 (Oct. 2006), 187–199. DOI:https://doi.org/10.1080/00379810601081396.
[21]
Daniel, L. and Daniel, L. 2012. Digital forensics for legal professionals: understanding digital evidence from the warrant to the courtroom. Syngress.
[22]
DCMI Metadata Basics: http://dublincore.org/metadata-basics/.
[23]
Dearnley, J. and Feather, J. 2001. The wired world: an introduction to the theory and practice of the information society. Library Association.
[24]
Defining Information Governance: http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/book/strategy-business-planning/9781118218303/chapter-1-the-onslaught-of-big-data-and-the-information-governance-imperative/chap01_sec001_html.
[25]
Donaldson, A. and Walker, P. 2004. Information governance—a view from the NHS. International Journal of Medical Informatics. 73, 3 (Mar. 2004), 281–284. DOI:https://doi.org/10.1016/j.ijmedinf.2003.11.009.
[26]
Duranti, L. and Franks, P.C. eds. 2015. Encyclopedia of archival science. Rowman & Littlefield.
[27]
Dykstra, J. and Sherman, A.T. 2012. Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digital Investigation. 9, (Aug. 2012), S90–S98. DOI:https://doi.org/10.1016/j.diin.2012.05.001.
[28]
Edited by David Levi-Faur Information And Governing: Cybernetic Models Of Governance. The Oxford Handbook of Governance.
[29]
Ethical Investment Research Services � Ceres: https://www.ceres.org/about-us/coalition/coalition-members/eiris.
[30]
Executive Summary: The Advantages, Economics and Value of Reuse: https://www.gartner.com/doc/1406319?ref=SiteSearch&sthkw=information%20governance&fnl=search&srcId=1-3478922254.
[31]
Farrall, J. and Rubenstein, K. eds. 2009. Sanctions, Accountability and Governance in a Globalised World. Cambridge University Press.
[32]
Feather, J. 2013. The information society: a study of continuity and change. Facet Publishing.
[33]
Fell, G.J. 2013. Outsourcing IT. Decoding the IT Value Problem. John Wiley & Sons, Inc. 114–125.
[34]
Ferguson, Kelly Information Governance. KM World. 18, 8.
[35]
Ferguson, Kelly Information Governance. KM World. 18, 8.
[36]
Finch, E. and Fafinski, S. 2015. Legal skills. Oxford University Press.
[37]
Flinn, A. and Jones, H. 2009. Freedom of information: open access, empty archives?. Routledge.
[38]
Floridi, Luciano Information Quality. Philosophy & Technology. 26, 1, 1–6.
[39]
Fraser, J. and Simkins, B.J. 2009. Enterprise Risk Management. John Wiley & Sons, Inc.
[40]
Freedom of Information Laws | Global Investigative Journalism Network: http://gijn.org/resources/freedom-of-information-laws/.
[41]
G20/OECD Principles of Corporate Governance - OECD: https://www.oecd.org/corporate/principles-corporate-governance.htm.
[42]
Generally Accepted Recordkeeping Principles: http://www.arma.org/r2/generally-accepted-br-recordkeeping-principles.
[43]
Glossaries « EDRM: http://www.edrm.net/resources/glossaries.
[44]
Hagmann, J. 2013. Information governance – beyond the buzz. Records Management Journal. 23, 3 (Nov. 2013), 228–240. DOI:https://doi.org/10.1108/RMJ-04-2013-0008.
[45]
Harmer, G. 2013. Governance of enterprise IT based on COBIT 5: a management guide. IT Governance Pub.
[46]
Harris, P. 2007. An introduction to law. Cambridge University Press.
[47]
Hawley, R. et al. 1995. Information as an asset: a consultative report : the Board agenda. KPMG Impact Programme.
[48]
Haynes, D. 2016. Social media, risk and information governance. Business Information Review. 33, 2 (Jun. 2016), 90–93. DOI:https://doi.org/10.1177/0266382116651781.
[49]
Haynes, D. 2016. Social media, risk and information governance. Business Information Review. 33, 2 (Jun. 2016), 90–93. DOI:https://doi.org/10.1177/0266382116651781.
[50]
Himma, K.E. and Tavani, H.T. eds. 2008. The Handbook of Information and Computer Ethics. John Wiley & Sons, Inc.
[51]
Home: https://www.igt.hscic.gov.uk/.
[52]
Home Page | Equality and Human Rights Commission: https://www.equalityhumanrights.com/en.
[53]
InfoGov Basics Information Governance Glossary: http://www.infogovbasics.com/resources/glossary/.
[54]
InfoGov Basics What is Info Gov? http://www.infogovbasics.com/what-is-infogov/.
[55]
Information Governance: Concepts, Strategies, and Best Practices: http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9781118218303.
[56]
INFORMATION GOVERNANCE INITIATIVE - Information Governance Initiative: https://www.opentext.de/file_source/OpenText/en_US/PDF/opentext-3rd-party-igi-infogov-snapshot-series-combined-en.pdf.
[57]
Information Tribunal > Search: http://informationrights.decisions.tribunals.gov.uk//Public/search.aspx.
[58]
ISO IEC 27002 2013 Information Security Control Objectives: http://www.praxiom.com/iso-27002-objectives.htm.
[59]
Legrand, P. and Munday, R. eds. 2003. Comparative Legal Studies: Traditions and Transitions. Cambridge University Press.
[60]
Lester, G. 2015. When Should State Secrets Stay Secret?: Accountability, Democratic Governance, and Intelligence. Cambridge University Press.
[61]
LeVeque, V. 2006. Information security: a strategic approach. Wiley.
[62]
Liberty: https://www.liberty-human-rights.org.uk/.
[63]
Lindström, J. et al. 2010. Business continuity planning methodology. Disaster Prevention and Management: An International Journal. 19, 2 (Apr. 2010), 243–255. DOI:https://doi.org/10.1108/09653561011038039.
[64]
Lloyd, I.J. 2014. Information technology law. Oxford University Press.
[65]
Lomas, E. 2010. Information governance: information security and access within a UK context. Records Management Journal. 20, 2 (Jul. 2010), 182–198. DOI:https://doi.org/10.1108/09565691011064322.
[66]
MacLennan, A. 2014. Information governance and assurance: reducing risk, promoting policy. Facet Publishing.
[67]
Mallin, C. 2013. Introduction. Corporate governance. Oxford University Press. 1–11.
[68]
Matthews, G. et al. 2004. The Disaster Control Plan. Library & Archival Security. 19, 2 (Jul. 2004), 3–23. DOI:https://doi.org/10.1300/J114v19n02_02.
[69]
Mayer-Schönberger, V. 2009. Delete: the virtue of forgetting in the digital age. Princeton University Press.
[70]
Mayer-Schönberger, V. and Cukier, K. 2013. Big data: a revolution that will transform how we live, work, and think. Houghton Mifflin Harcourt.
[71]
McLeod, J. and Hare, C. 2006. How to manage records in the e-environment. Routledge.
[72]
Mendel, T. 2016. The Fiftieth Anniversary of the Freedom of Information Act: How it Measures up Against International Standards and Other Laws. Communication Law and Policy. 21, 4 (Oct. 2016), 465–491. DOI:https://doi.org/10.1080/10811680.2016.1216685.
[73]
Molnár, P. ed. 2015. Free speech and censorship around the globe. Central European University Press.
[74]
Myers, K.N. ed. 2012. Business Continuity Strategies. John Wiley & Sons, Inc.
[75]
Newman, M.E.J. 2010. Networks: an introduction. Oxford University Press.
[76]
Ohlhorst, F. ed. 2012. Big Data Analytics. John Wiley & Sons, Inc.
[77]
Open Government Manifesto � UK Open Government Network: http://www.opengovernment.org.uk/open-government-manifesto/.
[78]
Open Government Partnership |: http://www.opengovpartnership.org/.
[79]
Overview | United Nations: http://www.un.org/en/sections/about-un/overview/index.html.
[80]
Overview of privacy legislation in Canada - Office of the Privacy Commissioner of Canada: https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/02_05_d_15/.
[81]
Privacy International |: https://www.privacyinternational.org/.
[82]
Proffitt, J. 2011. A guide to outsourcing records management. Routledge.
[83]
Project risk analysis using Monte Carlo Simulation | quantmleap: http://quantmleap.com/blog/2010/07/project-risk-management-and-the-application-of-monte-carlo-simulation/.
[84]
Shepherd, E. 2006. Why are records in the public sector organizational assets? Records Management Journal. 16, 1 (Jan. 2006), 6–12. DOI:https://doi.org/10.1108/09565690610654747.
[85]
Shepherd, E. and Yeo, G. 2003. Managing records: a handbook of principles and practice. Facet Publishing.
[86]
Shiva, V. 2001. Protect or plunder?: understanding intellectual property rights. Zed.
[87]
Smallwood, R.F. and Gurushanta, V. 2011. Managing Canadian electronic records: electronic records management, document management & e-discovery in Canada : a management guide. Imerge Consulting.
[88]
Tallon, P.P. et al. 2013. The Information Artifact in IT Governance: Toward a Theory of Information Governance. Journal of Management Information Systems. 30, 3 (Jan. 2013), 141–178. DOI:https://doi.org/10.2753/MIS0742-1222300306.
[89]
Tapscott, D. and Williams, A.D. 2008. Wikinomics: how mass collaboration changes everything. Atlantic.
[90]
Taylor, Sheila Information Governance. Municipal World. 126, 4, 21–24.
[91]
The IG Initiative Definition of Information Governance | Iron Mountain: http://www.ironmountain.com/Knowledge-Center/Reference-Library/View-by-Document-Type/General-Articles/T/The-IG-Initiative-Definition-of-Information-Governance.aspx.
[92]
The Sarbanes-Oxley Act 2002: http://www.soxlaw.com/.
[93]
Torremans, P. 2008. Intellectual property and human rights: enhanced edition of Copyright and human rights. Kluwer.
[94]
Tricker, R.I. 2015. Corporate governance: principles, policies, and practices. Oxford University Press.
[95]
Universal Declaration of Human Rights | United Nations: http://www.un.org/en/universal-declaration-human-rights/.
[96]
Vagadia, B. 2007. Outsourcing to India - a legal handbook. Springer.
[97]
What is Information Governance? And Why is it So Hard? - Debra Logan: http://blogs.gartner.com/debra_logan/2010/01/11/what-is-information-governance-and-why-is-it-so-hard/.
[98]
WhatDoTheyKnow - Make and browse Freedom of Information (FOI) requests: https://www.whatdotheyknow.com/.
[99]
Who owns information: The defining battle of our time? - RSA: https://www.thersa.org/discover/publications-and-articles/rsa-blogs/2013/01/who-owns-information-the-defining-battle-of-our-time-.
[100]
Wiles, J. et al. 2007. Digital Forensics. Techno Security’s Guide to E-Discovery and Digital Forensics. Elsevier. 33–63.
[101]
Wiles, J. Techno security’s guide to e-discovery and digital forensics. Syngress.
[102]
WIPO - World Intellectual Property Organization: http://www.wipo.int/portal/en/index.html.
[103]
World Legal Information Institute (WorldLII): http://www.worldlii.org/.
[104]
2016. Anonymisation Code of Practice. (2016).
[105]
2011. BS 31100:2011                Risk management. Code of practice and guidance for the implementation of BS ISO 31000. BSI.
[106]
2016. BS EN ISO/IEC 27000:2017 : Information technology:  Security techniques: Information security management systems:  Overview and vocabulary. BSI.
[107]
2016. BS ISO 15489-1:2016                Information and documentation. Records management. Concepts and principles. BSI.
[108]
2010. BS ISO 26000:2010                Guidance on social responsibility. BSI.
[109]
2011. BS ISO 30300:2011                Information and documentation. Management systems for records. Fundamentals and vocabulary. BSI.
[110]
2011. BS ISO 30301:2011                Information and documentation. Management systems for records. Requirements. BSI.
[111]
2010. BS ISO 31000:2009                Risk management. Principles and guidelines. BSI.
[112]
2013. BS ISO/IEC 27001:2013                Information technology. Security techniques. Information security management systems. Requirements. BSI.
[113]
2011. BS ISO/IEC 27031:2011                Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity. BSI.
[114]
2015. BS ISO/IEC 38500:2015                Information technology. Governance of IT for the organization. BSI.
[115]
2016. CCTV Code of Practice. (2016).
[116]
COSO in the Cyber Age_FULL_r11.pdf.
[117]
CREATe-Working-Paper-2014-01.pdf.
[118]
2016. Data sharing Code of Practice. (2016).
[119]
Diversity and Corporate Governance - DiversityAndCorporateGovernance.pdf.
[120]
Guide for conducting risk assessments - nistspecialpublication800-30r1.pdf.
[121]
Information Security: Principles and Practices, Second Edition. Pearson IT Certification2.
[122]
Information Security: Principles and Practices, Second Edition. Pearson IT Certification2.
[123]
Journal of Intellectual Capital                                                  Table Of Contents: Volume 1 Issue 1.
[124]
MIGUEL_MALHEIROS_844263_phd_thesis_malheiros.pdf._COPYRIGHT_REMOVED..pdf.
[125]
Moral Maze - The morailty of business Radio 4 Podcast. BBC Radio 4.
[126]
OECD Reviews of Risk Management Policies, Books / OECD Reviews of Risk Management Policies / OECD Reviews of Risk Management Policies: Norway 2006:Information Security. DOI:https://doi.org/10.1787/19934106  10.1787/9789264025516-en.
[127]
2016. Overview of the General Data Protection Regulation (GDPR). (2016).
[128]
Performing Information Governance: A Step-by-Step Guide to Making Information Governance Work. IBM Press1.
[129]
2016. Privacy by design. (2016).
[130]
Privacy-autonomy-and-the-internet.
[131]
Quick_guide_to_the_employment_practices_code.
[132]
9394. Risk Management on JSTOR. (9394).
[133]
Search.
[134]
THE ORANGE BOOK 2004.pdf - orange_book.pdf.
[135]
the-cost-of-cyber-crime-full-report.pdf.
[136]
Theories of the Information Society, Third Edition - Information-Society-Theories.pdf.
[137]
User Behaviour Observational Study: User Behaviour Observational Study Final Report - Bhimani_ubirdfinalreport.pdf.