8 Characteristics of good user requirements. (n.d.). http://www.slideshare.net/guest24d72f/8-characteristics-of-good-user-requirements-presentation
A digital forensic practitioner’s guide to giving evidence in a court of law - viewcontent.cgi. (n.d.). http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1032&context=adf
An Introduction to Information System Risk Management - introduction-information-system-risk-management-1204. (n.d.). https://www.sans.org/reading-room/whitepapers/auditing/introduction-information-system-risk-management-1204
Anonymisation Code of Practice. (2016). https://ico.org.uk/media/1061/anonymisation-code.pdf
AsianLII - Asian Legal Information Institute. (n.d.). http://www.asianlii.org/
Australasian Legal Information Institute (AustLII). (n.d.). http://www.austlii.edu.au/
Baase, S. (2009). A gift of fire: social, legal, and ethical issues for computing and the Internet (3rd ed). Pearson Prentice Hall.
Bailey, S. (2008). Managing the crowd: rethinking records management for the Web 2.0 world. Facet. http://www.vlebooks.com/vleweb/product/openreader?id=UCL&isbn=9781856047906
Bainbridge, D. I., & Bainbridge, D. I. (2008). Introduction to information technology law (6th ed). Pearson/Longman.
Ballard, C. & International Business Machines Corporation. International Technical Support Organization. (2014). IBM information governance solutions: Vol. IBM redbooks (1st ed). IBM Corp., International Technical Support Organization. http://proquest.safaribooksonline.com/?uiCode=ucl&xmlId=0738439517
Barclay T. Blair | Essays in Information Governance (and more). (n.d.). https://iginitiative.com/tag/barclay-t-blair/
Batini, C., Cappiello, C., Francalanci, C., & Maurino, A. (2009). Methodologies for data quality assessment and improvement. ACM Computing Surveys, 41(3), 1–52. https://doi.org/10.1145/1541880.1541883
Borgmann, A. (1999). Holding on to reality: the nature of information at the turn of the millennium. University of Chicago Press.
British and Irish Legal Information Institute. (n.d.). http://www.bailii.org/
Brotby, K. (2009). Information Security Governance. John Wiley & Sons, Inc. https://doi.org/10.1002/9780470476017
Bryant, R. (2008). Investigating digital crime. J. Wiley & Sons.
BS 31100:2011 Risk management. Code of practice and guidance for the implementation of BS ISO 31000. (2011). BSI. https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030228064
BS EN ISO/IEC 27000:2017 : Information technology: Security techniques: Information security management systems: Overview and vocabulary. (2016). BSI. https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030347477
BS ISO 15489-1:2016 Information and documentation. Records management. Concepts and principles. (2016). BSI. https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030298891
BS ISO 26000:2010 Guidance on social responsibility. (2010). BSI. https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030140726
BS ISO 30300:2011 Information and documentation. Management systems for records. Fundamentals and vocabulary. (2011). BSI. https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030205371
BS ISO 30301:2011 Information and documentation. Management systems for records. Requirements. (2011). BSI. https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030205374
BS ISO 31000:2009 Risk management. Principles and guidelines. (2010). BSI. https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030202344
BS ISO/IEC 27001:2013 Information technology. Security techniques. Information security management systems. Requirements. (2013). BSI. https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030328895
BS ISO/IEC 27031:2011 Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity. (2011). BSI. https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030168355
BS ISO/IEC 38500:2015 Information technology. Governance of IT for the organization. (2015). BSI. https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030272233
Buckland, Michael K. (n.d.). Information as Thing. Journal of the American Society for Information Science, 42(5), 351–360. http://search.proquest.com/docview/1301244196?rfr_id=info%3Axri%2Fsid%3Aprimo
Calder, A., & Watkins, S. G. (2010). Information security risk management for ISO27001/ISO27002. IT Governance Pub. http://www.jstor.org/stable/10.2307/j.ctt5hh7jd
CCTV Code of Practice. (2016). https://ico.org.uk/media/1542/cctv-code-of-practice.pdf
CommonLII - Commonwealth Legal Information Institute. (n.d.). http://www.commonlii.org/
Corporate governance | ICAEW | ICAEW. (n.d.). https://www.icaew.com/en/technical/corporate-governance
COSO in the Cyber Age_FULL_r11.pdf. (n.d.). https://www.coso.org/documents/COSO%20in%20the%20Cyber%20Age_FULL_r11.pdf
Craig, R., Selzer, T., & Seymour, J. (2006). There is disaster planning and there is reality—the Cayman Islands National Archive (CINA) experience with Hurricane Ivan 1. Journal of the Society of Archivists, 27(2), 187–199. https://doi.org/10.1080/00379810601081396
CREATe-Working-Paper-2014-01.pdf. (n.d.). https://zenodo.org/record/8381/files/CREATe-Working-Paper-2014-01.pdf
Daniel, L., & Daniel, L. (2012). Digital forensics for legal professionals: understanding digital evidence from the warrant to the courtroom. Syngress. https://learning.oreilly.com/library/view/digital-forensics-for/9781597496438/?ar=
Data sharing Code of Practice. (2016). https://ico.org.uk/media/for-organisations/documents/1068/data_sharing_code_of_practice.pdf
DCMI Metadata Basics. (n.d.). http://dublincore.org/metadata-basics/
Dearnley, J., & Feather, J. (2001). The wired world: an introduction to the theory and practice of the information society. Library Association.
Defining Information Governance. (n.d.). http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/book/strategy-business-planning/9781118218303/chapter-1-the-onslaught-of-big-data-and-the-information-governance-imperative/chap01_sec001_html
Diversity and Corporate Governance - DiversityAndCorporateGovernance.pdf. (n.d.). http://tools.ashridge.org.uk/website/IC.nsf/wFARATT/Diversity%20and%20Good%20Governance/$file/DiversityAndCorporateGovernance.pdf
Donaldson, A., & Walker, P. (2004). Information governance—a view from the NHS. International Journal of Medical Informatics, 73(3), 281–284. https://doi.org/10.1016/j.ijmedinf.2003.11.009
Duranti, L., & Franks, P. C. (Eds.). (2015). Encyclopedia of archival science. Rowman & Littlefield. https://ebookcentral.proquest.com/lib/ucl/detail.action?docID=2076364
Dykstra, J., & Sherman, A. T. (2012). Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digital Investigation, 9, S90–S98. https://doi.org/10.1016/j.diin.2012.05.001
Edited by David Levi-Faur. (n.d.). Information And Governing: Cybernetic Models Of Governance. In The Oxford Handbook of Governance. http://www.oxfordhandbooks.com.libproxy.ucl.ac.uk/view/10.1093/oxfordhb/9780199560530.001.0001/oxfordhb-9780199560530-e-8
Ethical Investment Research Services � Ceres. (n.d.). https://www.ceres.org/about-us/coalition/coalition-members/eiris
Executive Summary: The Advantages, Economics and Value of Reuse. (n.d.). https://www.gartner.com/doc/1406319?ref=SiteSearch&sthkw=information%20governance&fnl=search&srcId=1-3478922254
Farrall, J., & Rubenstein, K. (Eds.). (2009). Sanctions, Accountability and Governance in a Globalised World. Cambridge University Press. https://doi.org/10.1017/CBO9780511776847
Feather, J. (2013). The information society: a study of continuity and change (6th ed). Facet Publishing. https://ebookcentral.proquest.com/lib/ucl/detail.action?docID=4923761
Fell, G. J. (2013). Outsourcing IT. In Decoding the IT Value Problem (pp. 114–125). John Wiley & Sons, Inc. https://doi.org/10.1002/9781118757512.ch10
Ferguson, Kelly. (n.d.-a). Information Governance. KM World, 18(8). http://search.proquest.com.libproxy.ucl.ac.uk/docview/197266433?rfr_id=info%3Axri%2Fsid%3Aprimo
Ferguson, Kelly. (n.d.-b). Information Governance. KM World, 18(8). http://search.proquest.com.libproxy.ucl.ac.uk/docview/197266433?rfr_id=info%3Axri%2Fsid%3Aprimo
Finch, E., & Fafinski, S. (2015). Legal skills (Fifth edition). Oxford University Press.
Flinn, A., & Jones, H. (2009). Freedom of information: open access, empty archives? Routledge.
Floridi, Luciano. (n.d.). Information Quality. Philosophy & Technology, 26(1), 1–6. http://search.proquest.com.libproxy.ucl.ac.uk/docview/1291912830?rfr_id=info%3Axri%2Fsid%3Aprimo
Fraser, J., & Simkins, B. J. (2009). Enterprise Risk Management. John Wiley & Sons, Inc. https://doi.org/10.1002/9781118267080
Freedom of Information Laws | Global Investigative Journalism Network. (n.d.). http://gijn.org/resources/freedom-of-information-laws/
G20/OECD Principles of Corporate Governance - OECD. (n.d.). https://www.oecd.org/corporate/principles-corporate-governance.htm
Generally Accepted Recordkeeping Principles. (n.d.). http://www.arma.org/r2/generally-accepted-br-recordkeeping-principles
Glossaries « EDRM. (n.d.). http://www.edrm.net/resources/glossaries
Guide for conducting risk assessments - nistspecialpublication800-30r1.pdf. (n.d.). http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf
Hagmann, J. (2013). Information governance – beyond the buzz. Records Management Journal, 23(3), 228–240. https://doi.org/10.1108/RMJ-04-2013-0008
Harmer, G. (2013). Governance of enterprise IT based on COBIT 5: a management guide. IT Governance Pub. https://www.jstor.org/stable/10.2307/j.ctt7zsxfv
Harris, P. (2007). An introduction to law: Vol. The law in context series (Seventh edition). Cambridge University Press.
Hawley, R., Hawley Committee, & KPMG IMPACT Programme. (1995). Information as an asset: a consultative report : the Board agenda. KPMG Impact Programme.
Haynes, D. (2016a). Social media, risk and information governance. Business Information Review, 33(2), 90–93. https://doi.org/10.1177/0266382116651781
Haynes, D. (2016b). Social media, risk and information governance. Business Information Review, 33(2), 90–93. https://doi.org/10.1177/0266382116651781
Himma, K. E., & Tavani, H. T. (Eds.). (2008). The Handbook of Information and Computer Ethics. John Wiley & Sons, Inc. https://doi.org/10.1002/9780470281819
Home. (n.d.). https://www.igt.hscic.gov.uk/
Home Page | Equality and Human Rights Commission. (n.d.). https://www.equalityhumanrights.com/en
InfoGov Basics Information Governance Glossary. (n.d.). http://www.infogovbasics.com/resources/glossary/
InfoGov Basics What is Info Gov? (n.d.). http://www.infogovbasics.com/what-is-infogov/
INFORMATION GOVERNANCE INITIATIVE - Information Governance Initiative. (n.d.). https://www.opentext.de/file_source/OpenText/en_US/PDF/opentext-3rd-party-igi-infogov-snapshot-series-combined-en.pdf
Information Security: Principles and Practices, Second Edition. (n.d.-a). Pearson IT Certification2. http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9780133589412
Information Security: Principles and Practices, Second Edition. (n.d.-b). Pearson IT Certification2. http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9780133589412
Information Tribunal > Search. (n.d.). http://informationrights.decisions.tribunals.gov.uk//Public/search.aspx
ISO IEC 27002 2013 Information Security Control Objectives. (n.d.). http://www.praxiom.com/iso-27002-objectives.htm
Journal of Intellectual Capital Table Of Contents: Volume 1 Issue 1. (n.d.). http://www.emeraldinsight.com.libproxy.ucl.ac.uk/toc/jic/1/1
Legrand, P., & Munday, R. (Eds.). (2003). Comparative Legal Studies: Traditions and Transitions. Cambridge University Press. https://doi.org/10.1017/CBO9780511522260
Lester, G. (2015). When Should State Secrets Stay Secret?: Accountability, Democratic Governance, and Intelligence. Cambridge University Press. http://dx.doi.org/10.1017/CBO9781107337015
LeVeque, V. (2006). Information security: a strategic approach. Wiley. http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138
Liberty. (n.d.). https://www.liberty-human-rights.org.uk/
Lindström, J., Samuelsson, S., & Hägerfors, A. (2010). Business continuity planning methodology. Disaster Prevention and Management: An International Journal, 19(2), 243–255. https://doi.org/10.1108/09653561011038039
Lloyd, I. J. (2014). Information technology law (Seventh edition). Oxford University Press.
Lomas, E. (2010). Information governance: information security and access within a UK context. Records Management Journal, 20(2), 182–198. https://doi.org/10.1108/09565691011064322
MacLennan, A. (2014). Information governance and assurance: reducing risk, promoting policy. Facet Publishing.
Mallin, C. (2013). Introduction. In Corporate governance (4th ed, pp. 1–11). Oxford University Press. https://contentstore.cla.co.uk/secure/link?id=b03226c7-6053-ec11-981f-0050f2f09783
Matthews, G., Smith, Y., & Knowles, G. (2004). The Disaster Control Plan. Library & Archival Security, 19(2), 3–23. https://doi.org/10.1300/J114v19n02_02
Mayer-Schönberger, V. (2009). Delete: the virtue of forgetting in the digital age. Princeton University Press.
Mayer-Schönberger, V., & Cukier, K. (2013). Big data: a revolution that will transform how we live, work, and think. Houghton Mifflin Harcourt.
McLeod, J., & Hare, C. (2006). How to manage records in the e-environment: Vol. Know how guides (2nd ed). Routledge.
Mendel, T. (2016). The Fiftieth Anniversary of the Freedom of Information Act: How it Measures up Against International Standards and Other Laws. Communication Law and Policy, 21(4), 465–491. https://doi.org/10.1080/10811680.2016.1216685
MIGUEL_MALHEIROS_844263_phd_thesis_malheiros.pdf._COPYRIGHT_REMOVED..pdf. (n.d.). http://discovery.ucl.ac.uk/1427369/2/MIGUEL_MALHEIROS_844263_phd_thesis_malheiros.pdf._COPYRIGHT_REMOVED..pdf
Molnár, P. (Ed.). (2015). Free speech and censorship around the globe. Central European University Press. http://www.jstor.org/stable/10.7829/j.ctt13wztv7
Moral Maze - The morailty of business Radio 4 Podcast. (n.d.). BBC Radio 4. https://learningonscreen.ac.uk/ondemand/index.php/prog/0CA3B385?bcast=121840888
Myers, K. N. (Ed.). (2012). Business Continuity Strategies. John Wiley & Sons, Inc. https://doi.org/10.1002/9781119196730
Newman, M. E. J. (2010). Networks: an introduction. Oxford University Press. https://ucl.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma9930800789604761&context=L&vid=44UCL_INST:UCL_VU2&lang=en&search_scope=UCLLibraryCatalogue&adaptor=Local%20Search%20Engine&isFrbr=true&tab=UCLLibraryCatalogue&query=any,contains,Networks:%20an%20introduction&sortby=date_d&facet=frbrgroupid,include,9020048350542987714&offset=0
OECD Reviews of Risk Management Policies, Books /
OECD Reviews of Risk Management Policies /
OECD Reviews of Risk Management Policies: Norway 2006:Information Security. (n.d.). https://doi.org/10.1787/19934106 10.1787/9789264025516-en
Ohlhorst, F. (Ed.). (2012). Big Data Analytics. John Wiley & Sons, Inc. https://doi.org/10.1002/9781119205005
Open Government Manifesto � UK Open Government Network. (n.d.). http://www.opengovernment.org.uk/open-government-manifesto/
Open Government Partnership |. (n.d.). http://www.opengovpartnership.org/
Overview | United Nations. (n.d.). http://www.un.org/en/sections/about-un/overview/index.html
Overview of privacy legislation in Canada - Office of the Privacy Commissioner of Canada. (n.d.). https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/02_05_d_15/
Overview of the General Data Protection Regulation (GDPR). (2016). https://ico.org.uk/for-organisations/data-protection-reform/overview-of-the-gdpr/
Performing Information Governance: A Step-by-Step Guide to Making Information Governance Work. (n.d.). IBM Press1. http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9780133385618
Privacy by design. (2016). https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-law-enforcement-processing/accountability-and-governance/data-protection-impact-assessments/
Privacy International |. (n.d.). https://www.privacyinternational.org/
Privacy-autonomy-and-the-internet. (n.d.). https://www.cambridge.org/core/services/aop-cambridge-core/content/view/F745701FFEA03DD2CF5BCBDAE47FDEEA/9781107337428c2_p24-52_CBO.pdf/privacy-autonomy-and-the-internet.pdf
Proffitt, J. (2011). A guide to outsourcing records management. Routledge.
Project risk analysis using Monte Carlo Simulation | quantmleap. (n.d.). http://quantmleap.com/blog/2010/07/project-risk-management-and-the-application-of-monte-carlo-simulation/
Quick_guide_to_the_employment_practices_code. (n.d.). https://ico.org.uk/media/for-organisations/documents/1128/quick_guide_to_the_employment_practices_code.pdf
Risk Management on JSTOR. (9394). http://www.jstor.org.libproxy.ucl.ac.uk/journal/riskmanagement
Robert F. Smallwood. (n.d.). Information Governance: Concepts, Strategies, and Best Practices. John Wiley & Sons. http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9781118218303
Search. (n.d.). https://ico.org.uk/ESDWebPages/Search
Shepherd, E. (2006). Why are records in the public sector organizational assets? Records Management Journal, 16(1), 6–12. https://doi.org/10.1108/09565690610654747
Shepherd, E., & Yeo, G. (2003). Managing records: a handbook of principles and practice. Facet Publishing.
Shiva, V. (2001). Protect or plunder?: understanding intellectual property rights: Vol. Global issues series (Zed Books). Zed.
Smallwood, R. F., & Gurushanta, V. (2011). Managing Canadian electronic records: electronic records management, document management & e-discovery in Canada : a management guide (New [ed.]). Imerge Consulting.
Tallon, P. P., Ramirez, R. V., & Short, J. E. (2013). The Information Artifact in IT Governance: Toward a Theory of Information Governance. Journal of Management Information Systems, 30(3), 141–178. https://doi.org/10.2753/MIS0742-1222300306
Tapscott, D., & Williams, A. D. (2008). Wikinomics: how mass collaboration changes everything (Expanded ed). Atlantic.
Taylor, Sheila. (n.d.). Information Governance. Municipal World, 126(4), 21–24. http://search.proquest.com.libproxy.ucl.ac.uk/docview/1781342715?rfr_id=info%3Axri%2Fsid%3Aprimo
The IG Initiative Definition of Information Governance | Iron Mountain. (n.d.). http://www.ironmountain.com/Knowledge-Center/Reference-Library/View-by-Document-Type/General-Articles/T/The-IG-Initiative-Definition-of-Information-Governance.aspx
THE ORANGE BOOK 2004.pdf - orange_book.pdf. (n.d.). https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/220647/orange_book.pdf
The Sarbanes-Oxley Act 2002. (n.d.). http://www.soxlaw.com/
the-cost-of-cyber-crime-full-report.pdf. (n.d.). https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60943/the-cost-of-cyber-crime-full-report.pdf
Theories of the Information Society, Third Edition - Information-Society-Theories.pdf. (n.d.). https://cryptome.org/2013/01/aaron-swartz/Information-Society-Theories.pdf
Torremans, P. (2008). Intellectual property and human rights: enhanced edition of Copyright and human rights: Vol. Information law series (Section ed). Kluwer.
Tricker, R. I. (2015). Corporate governance: principles, policies, and practices (Third edition). Oxford University Press.
Universal Declaration of Human Rights | United Nations. (n.d.). http://www.un.org/en/universal-declaration-human-rights/
User Behaviour Observational Study: User Behaviour Observational Study Final Report - Bhimani_ubirdfinalreport.pdf. (n.d.). http://discovery.ucl.ac.uk/1472604/7/Bhimani_ubirdfinalreport.pdf
Vagadia, B. (2007). Outsourcing to India - a legal handbook. Springer. http://dx.doi.org/10.1007/978-3-540-72220-5
What is Information Governance? And Why is it So Hard? - Debra Logan. (n.d.). http://blogs.gartner.com/debra_logan/2010/01/11/what-is-information-governance-and-why-is-it-so-hard/
WhatDoTheyKnow - Make and browse Freedom of Information (FOI) requests. (n.d.). https://www.whatdotheyknow.com/
Who owns information: The defining battle of our time? - RSA. (n.d.). https://www.thersa.org/discover/publications-and-articles/rsa-blogs/2013/01/who-owns-information-the-defining-battle-of-our-time-
Wiles, J. (n.d.). Techno security’s guide to e-discovery and digital forensics. Syngress. http://www.sciencedirect.com/science/book/9781597492232
Wiles, J., Alexander, T., Ashlock, S., Ballou, S., Depew, L., Dominguez, G., Ehuan, A., Green, R., Long, J., Reis, K., Schroader, A., Schuler, K., & Thompson, E. (2007). Digital Forensics. In Techno Security’s Guide to E-Discovery and Digital Forensics (pp. 33–63). Elsevier. https://doi.org/10.1016/B978-159749223-2.50006-6
WIPO - World Intellectual Property Organization. (n.d.). http://www.wipo.int/portal/en/index.html
World Legal Information Institute (WorldLII). (n.d.). http://www.worldlii.org/