@book{Baase_2009, address={Harlow}, edition={3rd ed}, title={A gift of fire: social, legal, and ethical issues for computing and the Internet}, publisher={Pearson Prentice Hall}, author={Baase, Sara}, year={2009} }
@book{Bailey_2008, address={London}, title={Managing the crowd: rethinking records management for the Web 2.0 world}, url={http://www.vlebooks.com/vleweb/product/openreader?id=UCL&isbn=9781856047906}, publisher={Facet}, author={Bailey, Steve}, year={2008} }
@book{Bainbridge_Bainbridge_2008, address={Harlow}, edition={6th ed}, title={Introduction to information technology law}, publisher={Pearson/Longman}, author={Bainbridge, David I. and Bainbridge, David I.}, year={2008} }
@book{Ballard_International Business Machines Corporation. International Technical Support Organization_2014, address={Poughkeepsie, NY}, edition={1st ed}, title={IBM information governance solutions}, volume={IBM redbooks}, url={http://proquest.safaribooksonline.com/?uiCode=ucl&xmlId=0738439517}, publisher={IBM Corp., International Technical Support Organization}, author={Ballard, Chuck and International Business Machines Corporation. International Technical Support Organization}, year={2014} }
@article{Batini_Cappiello_Francalanci_Maurino_2009, title={Methodologies for data quality assessment and improvement}, volume={41}, DOI={10.1145/1541880.1541883}, number={3}, journal={ACM Computing Surveys}, author={Batini, Carlo and Cappiello, Cinzia and Francalanci, Chiara and Maurino, Andrea}, year={2009}, month={Jul}, pages={1–52} }
@book{Borgmann_1999, address={Chicago}, title={Holding on to reality: the nature of information at the turn of the millennium}, publisher={University of Chicago Press}, author={Borgmann, Albert}, year={1999} }
@book{Brotby_2009, address={Hoboken, NJ, USA}, title={Information Security Governance}, url={http://doi.wiley.com/10.1002/9780470476017}, DOI={10.1002/9780470476017}, publisher={John Wiley & Sons, Inc.}, author={Brotby, Krag}, year={2009}, month={Mar} }
@book{Bryant_2008, address={Chichester}, title={Investigating digital crime}, publisher={J. Wiley & Sons}, author={Bryant, Robin}, year={2008} }
@article{Buckland, Michael K, title={Information as Thing}, volume={42}, url={http://search.proquest.com/docview/1301244196?rfr_id=info%3Axri%2Fsid%3Aprimo}, number={5}, journal={Journal of the American Society for Information Science}, author={Buckland, Michael K}, pages={351–360} }
@book{Calder_Watkins_2010, address={Cambridgeshire}, title={Information security risk management for ISO27001/ISO27002}, url={http://www.jstor.org/stable/10.2307/j.ctt5hh7jd}, publisher={IT Governance Pub}, author={Calder, Alan and Watkins, Steve G.}, year={2010} }
@article{Craig_Selzer_Seymour_2006, title={There is disaster planning and there is reality—the Cayman Islands National Archive (CINA) experience with Hurricane Ivan 1}, volume={27}, DOI={10.1080/00379810601081396}, number={2}, journal={Journal of the Society of Archivists}, author={Craig, Roger and Selzer, Tamara and Seymour, Josette}, year={2006}, month={Oct}, pages={187–199} }
@book{Daniel_Daniel_2012, address={[Place of publication not identified]}, title={Digital forensics for legal professionals: understanding digital evidence from the warrant to the courtroom}, url={https://learning.oreilly.com/library/view/digital-forensics-for/9781597496438/?ar=}, publisher={Syngress}, author={Daniel, Larry and Daniel, Lars}, year={2012} }
@book{Dearnley_Feather_2001, address={London}, title={The wired world: an introduction to the theory and practice of the information society}, publisher={Library Association}, author={Dearnley, James and Feather, John}, year={2001} }
@article{Donaldson_Walker_2004, title={Information governance—a view from the NHS}, volume={73}, DOI={10.1016/j.ijmedinf.2003.11.009}, number={3}, journal={International Journal of Medical Informatics}, author={Donaldson, Alistair and Walker, Phil}, year={2004}, month={Mar}, pages={281–284} }
@article{Dykstra_Sherman_2012, title={Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques}, volume={9}, DOI={10.1016/j.diin.2012.05.001}, journal={Digital Investigation}, author={Dykstra, Josiah and Sherman, Alan T.}, year={2012}, month={Aug}, pages={S90–S98} }
@inbook{Edited by David Levi-Faur, title={Information And Governing: Cybernetic Models Of Governance}, url={http://www.oxfordhandbooks.com.libproxy.ucl.ac.uk/view/10.1093/oxfordhb/9780199560530.001.0001/oxfordhb-9780199560530-e-8}, booktitle={The Oxford Handbook of Governance}, author={Edited by David Levi-Faur} }
@book{Feather_2013, address={London}, edition={6th ed}, title={The information society: a study of continuity and change}, url={https://ebookcentral.proquest.com/lib/ucl/detail.action?docID=4923761}, publisher={Facet Publishing}, author={Feather, John}, year={2013} }
@inbook{Fell_2013, address={Hoboken, NJ, USA}, title={Outsourcing IT}, url={http://doi.wiley.com/10.1002/9781118757512.ch10}, DOI={10.1002/9781118757512.ch10}, booktitle={Decoding the IT Value Problem}, publisher={John Wiley & Sons, Inc.}, author={Fell, Gregory J.}, year={2013}, month={Sep}, pages={114–125} }
@article{Ferguson, Kelly, title={Information Governance}, volume={18}, url={http://search.proquest.com.libproxy.ucl.ac.uk/docview/197266433?rfr_id=info%3Axri%2Fsid%3Aprimo}, number={8}, journal={KM World}, author={Ferguson, Kelly} }
@article{Ferguson, Kelly, title={Information Governance}, volume={18}, url={http://search.proquest.com.libproxy.ucl.ac.uk/docview/197266433?rfr_id=info%3Axri%2Fsid%3Aprimo}, number={8}, journal={KM World}, author={Ferguson, Kelly} }
@book{Finch_Fafinski_2015, address={Oxford, United Kingdom}, edition={Fifth edition}, title={Legal skills}, publisher={Oxford University Press}, author={Finch, Emily and Fafinski, Stefan}, year={2015} }
@book{Flinn_Jones_2009, address={London}, title={Freedom of information: open access, empty archives?}, publisher={Routledge}, author={Flinn, Andrew and Jones, Harriet}, year={2009} }
@article{Floridi, Luciano, title={Information Quality}, volume={26}, url={http://search.proquest.com.libproxy.ucl.ac.uk/docview/1291912830?rfr_id=info%3Axri%2Fsid%3Aprimo}, number={1}, journal={Philosophy & Technology}, author={Floridi, Luciano}, pages={1–6} }
@book{Fraser_Simkins_2009, address={Hoboken, NJ, USA}, title={Enterprise Risk Management}, url={http://doi.wiley.com/10.1002/9781118267080}, DOI={10.1002/9781118267080}, publisher={John Wiley & Sons, Inc.}, author={Fraser, John and Simkins, Betty J.}, year={2009}, month={Dec} }
@article{Hagmann_2013, title={Information governance – beyond the buzz}, volume={23}, DOI={10.1108/RMJ-04-2013-0008}, number={3}, journal={Records Management Journal}, author={Hagmann, Juerg}, year={2013}, month={Nov}, pages={228–240} }
@book{Harmer_2013, address={Ely, Cambridgeshire, U.K.}, title={Governance of enterprise IT based on COBIT 5: a management guide}, url={https://www.jstor.org/stable/10.2307/j.ctt7zsxfv}, publisher={IT Governance Pub}, author={Harmer, Geoff}, year={2013} }
@book{Harris_2007, address={Cambridge}, edition={Seventh edition}, title={An introduction to law}, volume={The law in context series}, publisher={Cambridge University Press}, author={Harris, Phil}, year={2007} }
@book{Hawley_Hawley Committee_KPMG IMPACT Programme_1995, address={London}, title={Information as an asset: a consultative report : the Board agenda}, publisher={KPMG Impact Programme}, author={Hawley, Robert and Hawley Committee and KPMG IMPACT Programme}, year={1995} }
@article{Haynes_2016a, title={Social media, risk and information governance}, volume={33}, DOI={10.1177/0266382116651781}, number={2}, journal={Business Information Review}, author={Haynes, D.}, year={2016}, month={Jun}, pages={90–93} }
@article{Haynes_2016b, title={Social media, risk and information governance}, volume={33}, DOI={10.1177/0266382116651781}, number={2}, journal={Business Information Review}, author={Haynes, D.}, year={2016}, month={Jun}, pages={90–93} }
@book{Lester_2015, address={Cambridge}, title={When Should State Secrets Stay Secret?: Accountability, Democratic Governance, and Intelligence}, url={http://dx.doi.org/10.1017/CBO9781107337015}, publisher={Cambridge University Press}, author={Lester, Genevieve}, year={2015} }
@book{LeVeque_2006, address={New York}, title={Information security: a strategic approach}, url={http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138}, publisher={Wiley}, author={LeVeque, Vincent}, year={2006} }
@article{Lindström_Samuelsson_Hägerfors_2010, title={Business continuity planning methodology}, volume={19}, DOI={10.1108/09653561011038039}, number={2}, journal={Disaster Prevention and Management: An International Journal}, author={Lindström, John and Samuelsson, Sören and Hägerfors, Ann}, year={2010}, month={Apr}, pages={243–255} }
@book{Lloyd_2014, address={Oxford, United Kingdom}, edition={Seventh edition}, title={Information technology law}, publisher={Oxford University Press}, author={Lloyd, Ian J.}, year={2014} }
@article{Lomas_2010, title={Information governance: information security and access within a UK context}, volume={20}, DOI={10.1108/09565691011064322}, number={2}, journal={Records Management Journal}, author={Lomas, Elizabeth}, year={2010}, month={Jul}, pages={182–198} }
@book{MacLennan_2014, address={London}, title={Information governance and assurance: reducing risk, promoting policy}, publisher={Facet Publishing}, author={MacLennan, Alan}, year={2014} }
@inbook{Mallin_2013, address={Oxford}, edition={4th ed}, title={Introduction}, url={https://contentstore.cla.co.uk/secure/link?id=b03226c7-6053-ec11-981f-0050f2f09783}, booktitle={Corporate governance}, publisher={Oxford University Press}, author={Mallin, C.}, year={2013}, pages={1–11} }
@article{Matthews_Smith_Knowles_2004, title={The Disaster Control Plan}, volume={19}, DOI={10.1300/J114v19n02_02}, number={2}, journal={Library & Archival Security}, author={Matthews, Graham and Smith, Yvonne and Knowles, Gemma}, year={2004}, month={Jul}, pages={3–23} }
@book{Mayer-Schönberger_2009, address={Princeton, N.J.}, title={Delete: the virtue of forgetting in the digital age}, publisher={Princeton University Press}, author={Mayer-Schönberger, Viktor}, year={2009} }
@book{Mayer-Schönberger_Cukier_2013, address={Boston}, title={Big data: a revolution that will transform how we live, work, and think}, publisher={Houghton Mifflin Harcourt}, author={Mayer-Schönberger, Viktor and Cukier, Kenneth}, year={2013} }
@book{McLeod_Hare_2006, address={London}, edition={2nd ed}, title={How to manage records in the e-environment}, volume={Know how guides}, publisher={Routledge}, author={McLeod, Julie and Hare, Catherine}, year={2006} }
@article{Mendel_2016, title={The Fiftieth Anniversary of the Freedom of Information Act: How it Measures up Against International Standards and Other Laws}, volume={21}, DOI={10.1080/10811680.2016.1216685}, number={4}, journal={Communication Law and Policy}, author={Mendel, Toby}, year={2016}, month={Oct}, pages={465–491} }
@book{Newman_2010, address={Oxford}, title={Networks: an introduction}, url={https://ucl.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma9930800789604761&context=L&vid=44UCL_INST:UCL_VU2&lang=en&search_scope=UCLLibraryCatalogue&adaptor=Local%20Search%20Engine&isFrbr=true&tab=UCLLibraryCatalogue&query=any,contains,Networks:%20an%20introduction&sortby=date_d&facet=frbrgroupid,include,9020048350542987714&offset=0}, publisher={Oxford University Press}, author={Newman, M. E. J.}, year={2010} }
@book{Proffitt_2011, address={London}, title={A guide to outsourcing records management}, publisher={Routledge}, author={Proffitt, Jane}, year={2011} }
@misc{Robert F. Smallwood, title={Information Governance: Concepts, Strategies, and Best Practices}, url={http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9781118218303}, publisher={John Wiley & Sons}, author={Robert F. Smallwood} }
@article{Shepherd_2006, title={Why are records in the public sector organizational assets?}, volume={16}, DOI={10.1108/09565690610654747}, number={1}, journal={Records Management Journal}, author={Shepherd, Elizabeth}, year={2006}, month={Jan}, pages={6–12} }
@book{Shepherd_Yeo_2003, address={London}, title={Managing records: a handbook of principles and practice}, publisher={Facet Publishing}, author={Shepherd, Elizabeth and Yeo, Geoffrey}, year={2003} }
@book{Shiva_2001, address={London}, title={Protect or plunder?: understanding intellectual property rights}, volume={Global issues series (Zed Books)}, publisher={Zed}, author={Shiva, Vandana}, year={2001} }
@book{Smallwood_Gurushanta_2011, address={[Lexington, Mass.]}, edition={New [ed.]}, title={Managing Canadian electronic records: electronic records management, document management & e-discovery in Canada : a management guide}, publisher={Imerge Consulting}, author={Smallwood, Robert F. and Gurushanta, Vigi}, year={2011} }
@article{Tallon_Ramirez_Short_2013, title={The Information Artifact in IT Governance: Toward a Theory of Information Governance}, volume={30}, DOI={10.2753/MIS0742-1222300306}, number={3}, journal={Journal of Management Information Systems}, author={Tallon, Paul P. and Ramirez, Ronald V. and Short, James E.}, year={2013}, month={Jan}, pages={141–178} }
@book{Tapscott_Williams_2008, address={London}, edition={Expanded ed}, title={Wikinomics: how mass collaboration changes everything}, publisher={Atlantic}, author={Tapscott, Don and Williams, Anthony D.}, year={2008} }
@article{Taylor, Sheila, title={Information Governance}, volume={126}, url={http://search.proquest.com.libproxy.ucl.ac.uk/docview/1781342715?rfr_id=info%3Axri%2Fsid%3Aprimo}, number={4}, journal={Municipal World}, author={Taylor, Sheila}, pages={21–24} }
@book{Torremans_2008, address={Austin}, edition={Section ed}, title={Intellectual property and human rights: enhanced edition of Copyright and human rights}, volume={Information law series}, publisher={Kluwer}, author={Torremans, Paul}, year={2008} }
@book{Tricker_2015, address={Oxford}, edition={Third edition}, title={Corporate governance: principles, policies, and practices}, publisher={Oxford University Press}, author={Tricker, R. Ian}, year={2015} }
@book{Vagadia_2007, address={Berlin}, title={Outsourcing to India - a legal handbook}, url={http://dx.doi.org/10.1007/978-3-540-72220-5}, publisher={Springer}, author={Vagadia, Bharat}, year={2007} }
@book{Wiles, address={Burlington, Mass}, title={Techno security’s guide to e-discovery and digital forensics}, url={http://www.sciencedirect.com/science/book/9781597492232}, publisher={Syngress}, author={Wiles, Jack} }
@inbook{Wiles_Alexander_Ashlock_Ballou_Depew_Dominguez_Ehuan_Green_Long_Reis_et al._2007, title={Digital Forensics}, DOI={10.1016/B978-159749223-2.50006-6}, booktitle={Techno Security’s Guide to E-Discovery and Digital Forensics}, publisher={Elsevier}, author={Wiles, Jack and Alexander, Tammy and Ashlock, Stevee and Ballou, Susan and Depew, Larry and Dominguez, Greg and Ehuan, Art and Green, Ron and Long, Johnny and Reis, Kevin and Schroader, Amber and Schuler, Karen and Thompson, Eric}, year={2007}, pages={33–63} }
@book{Legrand_Munday_2003, address={Cambridge}, title={Comparative Legal Studies: Traditions and Transitions}, url={http://ebooks.cambridge.org/ref/id/CBO9780511522260}, DOI={10.1017/CBO9780511522260}, publisher={Cambridge University Press}, year={2003} }
@book{Himma_Tavani_2008, address={Hoboken, NJ, USA}, title={The Handbook of Information and Computer Ethics}, url={http://doi.wiley.com/10.1002/9780470281819}, DOI={10.1002/9780470281819}, publisher={John Wiley & Sons, Inc.}, year={2008}, month={May} }
@book{Farrall_Rubenstein_2009, address={Cambridge}, title={Sanctions, Accountability and Governance in a Globalised World}, url={http://ebooks.cambridge.org/ref/id/CBO9780511776847}, DOI={10.1017/CBO9780511776847}, publisher={Cambridge University Press}, year={2009} }
@book{BS ISO 26000:2010                Guidance on social responsibility_2010, url={https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030140726}, publisher={BSI}, year={2010} }
@book{BS ISO 31000:2009                Risk management. Principles and guidelines_2010, url={https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030202344}, publisher={BSI}, year={2010} }
@book{BS ISO/IEC 27031:2011                Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity_2011, url={https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030168355}, publisher={BSI}, year={2011} }
@book{BS 31100:2011                Risk management. Code of practice and guidance for the implementation of BS ISO 31000_2011, url={https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030228064}, publisher={BSI}, year={2011} }
@book{BS ISO 30300:2011                Information and documentation. Management systems for records. Fundamentals and vocabulary_2011, url={https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030205371}, publisher={BSI}, year={2011} }
@book{BS ISO 30301:2011                Information and documentation. Management systems for records. Requirements_2011, url={https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030205374}, publisher={BSI}, year={2011} }
@book{Ohlhorst_2012, address={Hoboken, NJ, USA}, title={Big Data Analytics}, url={http://doi.wiley.com/10.1002/9781119205005}, DOI={10.1002/9781119205005}, publisher={John Wiley & Sons, Inc.}, year={2012}, month={Jan} }
@book{Myers_2012, address={Hoboken, NJ, USA}, title={Business Continuity Strategies}, url={http://doi.wiley.com/10.1002/9781119196730}, DOI={10.1002/9781119196730}, publisher={John Wiley & Sons, Inc.}, year={2012}, month={Jan} }
@book{BS ISO/IEC 27001:2013                Information technology. Security techniques. Information security management systems. Requirements_2013, url={https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030328895}, publisher={BSI}, year={2013} }
@book{Duranti_Franks_2015, address={Lanham}, title={Encyclopedia of archival science}, url={https://ebookcentral.proquest.com/lib/ucl/detail.action?docID=2076364}, publisher={Rowman & Littlefield}, year={2015} }
@book{BS ISO/IEC 38500:2015                Information technology. Governance of IT for the organization_2015, url={https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030272233}, publisher={BSI}, year={2015} }
@book{Molnár_2015, address={Budapest}, title={Free speech and censorship around the globe}, url={http://www.jstor.org/stable/10.7829/j.ctt13wztv7}, publisher={Central European University Press}, year={2015} }
@book{BS EN ISO/IEC 27000:2017 : Information technology:  Security techniques: Information security management systems:  Overview and vocabulary_2016, url={https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030347477}, publisher={BSI}, year={2016} }
@book{BS ISO 15489-1:2016                Information and documentation. Records management. Concepts and principles_2016, url={https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030298891}, publisher={BSI}, year={2016} }
@article{Overview of the General Data Protection Regulation (GDPR)_2016, url={https://ico.org.uk/for-organisations/data-protection-reform/overview-of-the-gdpr/}, publisher={ICO}, year={2016} }
@article{Privacy by design_2016, url={https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-law-enforcement-processing/accountability-and-governance/data-protection-impact-assessments/}, publisher={ICO}, year={2016} }
@article{CCTV Code of Practice_2016, url={https://ico.org.uk/media/1542/cctv-code-of-practice.pdf}, publisher={ICO}, year={2016} }
@article{Data sharing Code of Practice_2016, url={https://ico.org.uk/media/for-organisations/documents/1068/data_sharing_code_of_practice.pdf}, publisher={ICO}, year={2016} }
@article{Anonymisation Code of Practice_2016, url={https://ico.org.uk/media/1061/anonymisation-code.pdf}, publisher={ICO}, year={2016} }
@article{Risk Management on JSTOR_9394, url={http://www.jstor.org.libproxy.ucl.ac.uk/journal/riskmanagement}, publisher={Palgrave Macmillan Journals}, year={9394} }
@misc{What is Information Governance? And Why is it So Hard? - Debra Logan, url={http://blogs.gartner.com/debra_logan/2010/01/11/what-is-information-governance-and-why-is-it-so-hard/} }
@misc{Defining Information Governance, url={http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/book/strategy-business-planning/9781118218303/chapter-1-the-onslaught-of-big-data-and-the-information-governance-imperative/chap01_sec001_html} }
@misc{Generally Accepted Recordkeeping Principles, url={http://www.arma.org/r2/generally-accepted-br-recordkeeping-principles} }
@misc{InfoGov Basics What is Info Gov?, url={http://www.infogovbasics.com/what-is-infogov/} }
@misc{Home, url={https://www.igt.hscic.gov.uk/} }
@misc{The IG Initiative Definition of Information Governance | Iron Mountain, url={http://www.ironmountain.com/Knowledge-Center/Reference-Library/View-by-Document-Type/General-Articles/T/The-IG-Initiative-Definition-of-Information-Governance.aspx} }
@misc{INFORMATION GOVERNANCE INITIATIVE - Information Governance Initiative, url={https://www.opentext.de/file_source/OpenText/en_US/PDF/opentext-3rd-party-igi-infogov-snapshot-series-combined-en.pdf} }
@misc{InfoGov Basics Information Governance Glossary, url={http://www.infogovbasics.com/resources/glossary/} }
@misc{Glossaries « EDRM, url={http://www.edrm.net/resources/glossaries} }
@misc{ISO IEC 27002 2013 Information Security Control Objectives, url={http://www.praxiom.com/iso-27002-objectives.htm} }
@misc{Theories of the Information Society, Third Edition - Information-Society-Theories.pdf, url={https://cryptome.org/2013/01/aaron-swartz/Information-Society-Theories.pdf} }
@book{Performing Information Governance: A Step-by-Step Guide to Making Information Governance Work, url={http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9780133385618}, publisher={IBM Press1} }
@misc{Barclay T. Blair | Essays in Information Governance (and more), url={https://iginitiative.com/tag/barclay-t-blair/} }
@misc{Diversity and Corporate Governance - DiversityAndCorporateGovernance.pdf, url={http://tools.ashridge.org.uk/website/IC.nsf/wFARATT/Diversity%20and%20Good%20Governance/$file/DiversityAndCorporateGovernance.pdf} }
@misc{Moral Maze - The morailty of business Radio 4 Podcast, url={https://learningonscreen.ac.uk/ondemand/index.php/prog/0CA3B385?bcast=121840888}, publisher={BBC Radio 4} }
@misc{G20/OECD Principles of Corporate Governance - OECD, url={https://www.oecd.org/corporate/principles-corporate-governance.htm} }
@misc{The Sarbanes-Oxley Act 2002, url={http://www.soxlaw.com/} }
@misc{Corporate governance | ICAEW | ICAEW, url={https://www.icaew.com/en/technical/corporate-governance} }
@misc{Ethical Investment Research Services � Ceres, url={https://www.ceres.org/about-us/coalition/coalition-members/eiris} }
@article{Journal of Intellectual Capital                                                  Table Of Contents: Volume 1 Issue 1, url={http://www.emeraldinsight.com.libproxy.ucl.ac.uk/toc/jic/1/1} }
@misc{WIPO - World Intellectual Property Organization, url={http://www.wipo.int/portal/en/index.html} }
@misc{CREATe-Working-Paper-2014-01.pdf, url={https://zenodo.org/record/8381/files/CREATe-Working-Paper-2014-01.pdf} }
@misc{Executive Summary: The Advantages, Economics and Value of Reuse, url={https://www.gartner.com/doc/1406319?ref=SiteSearch&sthkw=information%20governance&fnl=search&srcId=1-3478922254} }
@book{Information Security: Principles and Practices, Second Edition, url={http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9780133589412}, publisher={Pearson IT Certification2} }
@book{Information Security: Principles and Practices, Second Edition, url={http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9780133589412}, publisher={Pearson IT Certification2} }
@misc{the-cost-of-cyber-crime-full-report.pdf, url={https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60943/the-cost-of-cyber-crime-full-report.pdf} }
@misc{COSO in the Cyber Age_FULL_r11.pdf, url={https://www.coso.org/documents/COSO%20in%20the%20Cyber%20Age_FULL_r11.pdf} }
@misc{8 Characteristics of good user requirements, url={http://www.slideshare.net/guest24d72f/8-characteristics-of-good-user-requirements-presentation} }
@misc{DCMI Metadata Basics, url={http://dublincore.org/metadata-basics/} }
@misc{User Behaviour Observational Study: User Behaviour Observational Study Final Report - Bhimani_ubirdfinalreport.pdf, url={http://discovery.ucl.ac.uk/1472604/7/Bhimani_ubirdfinalreport.pdf} }
@misc{An Introduction to Information System Risk Management - introduction-information-system-risk-management-1204, url={https://www.sans.org/reading-room/whitepapers/auditing/introduction-information-system-risk-management-1204} }
@article{OECD Reviews of Risk Management Policies, Books / OECD Reviews of Risk Management Policies / OECD Reviews of Risk Management Policies: Norway 2006:Information Security, url={http://www.oecd-ilibrary.org.libproxy.ucl.ac.uk/science-and-technology/oecd-reviews-of-risk-management-policies-norway-2006_9789264025516-en}, DOI={10.1787/19934106  10.1787/9789264025516-en} }
@misc{THE ORANGE BOOK 2004.pdf - orange_book.pdf, url={https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/220647/orange_book.pdf} }
@misc{Guide for conducting risk assessments - nistspecialpublication800-30r1.pdf, url={http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf} }
@misc{Project risk analysis using Monte Carlo Simulation | quantmleap, url={http://quantmleap.com/blog/2010/07/project-risk-management-and-the-application-of-monte-carlo-simulation/} }
@misc{Overview | United Nations, url={http://www.un.org/en/sections/about-un/overview/index.html} }
@misc{Universal Declaration of Human Rights | United Nations, url={http://www.un.org/en/universal-declaration-human-rights/} }
@misc{Liberty, url={https://www.liberty-human-rights.org.uk/} }
@misc{Home Page | Equality and Human Rights Commission, url={https://www.equalityhumanrights.com/en} }
@misc{Who owns information: The defining battle of our time? - RSA, url={https://www.thersa.org/discover/publications-and-articles/rsa-blogs/2013/01/who-owns-information-the-defining-battle-of-our-time-} }
@misc{World Legal Information Institute (WorldLII), url={http://www.worldlii.org/} }
@misc{AsianLII - Asian Legal Information Institute, url={http://www.asianlii.org/} }
@misc{Australasian Legal Information Institute (AustLII), url={http://www.austlii.edu.au/} }
@misc{British and Irish Legal Information Institute, url={http://www.bailii.org/} }
@misc{CommonLII - Commonwealth Legal Information Institute, url={http://www.commonlii.org/} }
@misc{Privacy-autonomy-and-the-internet, url={https://www.cambridge.org/core/services/aop-cambridge-core/content/view/F745701FFEA03DD2CF5BCBDAE47FDEEA/9781107337428c2_p24-52_CBO.pdf/privacy-autonomy-and-the-internet.pdf} }
@misc{Quick_guide_to_the_employment_practices_code, url={https://ico.org.uk/media/for-organisations/documents/1128/quick_guide_to_the_employment_practices_code.pdf} }
@misc{Overview of privacy legislation in Canada - Office of the Privacy Commissioner of Canada, url={https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/02_05_d_15/} }
@misc{Privacy International |, url={https://www.privacyinternational.org/} }
@misc{MIGUEL_MALHEIROS_844263_phd_thesis_malheiros.pdf._COPYRIGHT_REMOVED..pdf, url={http://discovery.ucl.ac.uk/1427369/2/MIGUEL_MALHEIROS_844263_phd_thesis_malheiros.pdf._COPYRIGHT_REMOVED..pdf} }
@misc{Freedom of Information Laws | Global Investigative Journalism Network, url={http://gijn.org/resources/freedom-of-information-laws/} }
@misc{Open Government Partnership |, url={http://www.opengovpartnership.org/} }
@misc{Open Government Manifesto � UK Open Government Network, url={http://www.opengovernment.org.uk/open-government-manifesto/} }
@misc{WhatDoTheyKnow - Make and browse Freedom of Information (FOI) requests, url={https://www.whatdotheyknow.com/} }
@misc{Information Tribunal > Search, url={http://informationrights.decisions.tribunals.gov.uk//Public/search.aspx} }
@article{Search, url={https://ico.org.uk/ESDWebPages/Search} }
@misc{A digital forensic practitioner’s guide to giving evidence in a court of law - viewcontent.cgi, url={http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1032&context=adf} }