1
What is Information Governance? And Why is it So Hard? - Debra Logan. http://blogs.gartner.com/debra_logan/2010/01/11/what-is-information-governance-and-why-is-it-so-hard/
2
Defining Information Governance. http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/book/strategy-business-planning/9781118218303/chapter-1-the-onslaught-of-big-data-and-the-information-governance-imperative/chap01_sec001_html
3
Duranti L, Franks PC, editors. Encyclopedia of archival science. Lanham: Rowman & Littlefield 2015.
4
Generally Accepted Recordkeeping Principles. http://www.arma.org/r2/generally-accepted-br-recordkeeping-principles
5
InfoGov Basics What is Info Gov? http://www.infogovbasics.com/what-is-infogov/
6
Home. https://www.igt.hscic.gov.uk/
7
The IG Initiative Definition of Information Governance | Iron Mountain. http://www.ironmountain.com/Knowledge-Center/Reference-Library/View-by-Document-Type/General-Articles/T/The-IG-Initiative-Definition-of-Information-Governance.aspx
8
INFORMATION GOVERNANCE INITIATIVE - Information Governance Initiative. https://www.opentext.de/file_source/OpenText/en_US/PDF/opentext-3rd-party-igi-infogov-snapshot-series-combined-en.pdf
9
InfoGov Basics Information Governance Glossary. http://www.infogovbasics.com/resources/glossary/
10
Glossaries « EDRM. http://www.edrm.net/resources/glossaries
11
BS ISO/IEC 38500:2015                Information technology. Governance of IT for the organization. BSI 2015.
12
BS ISO 26000:2010                Guidance on social responsibility. BSI 2010.
13
BS EN ISO/IEC 27000:2017 : Information technology:  Security techniques: Information security management systems:  Overview and vocabulary. BSI 2016.
14
BS ISO/IEC 27001:2013                Information technology. Security techniques. Information security management systems. Requirements. BSI 2013.
15
BS ISO/IEC 27031:2011                Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity. BSI 2011.
16
ISO IEC 27002 2013 Information Security Control Objectives. http://www.praxiom.com/iso-27002-objectives.htm
17
BS ISO 31000:2009                Risk management. Principles and guidelines. BSI 2010.
18
BS 31100:2011                Risk management. Code of practice and guidance for the implementation of BS ISO 31000. BSI 2011.
19
BS ISO 30300:2011                Information and documentation. Management systems for records. Fundamentals and vocabulary. BSI 2011.
20
BS ISO 30301:2011                Information and documentation. Management systems for records. Requirements. BSI 2011.
21
BS ISO 15489-1:2016                Information and documentation. Records management. Concepts and principles. BSI 2016.
22
Buckland, Michael K. Information as Thing. Journal of the American Society for Information Science. ;42:351–60.
23
Himma KE, Tavani HT, editors. The Handbook of Information and Computer Ethics. Hoboken, NJ, USA: John Wiley & Sons, Inc. 2008.
24
Theories of the Information Society, Third Edition - Information-Society-Theories.pdf.
25
Dearnley J, Feather J. The wired world: an introduction to the theory and practice of the information society. London: Library Association 2001.
26
Feather J. The information society: a study of continuity and change. 6th ed. London: Facet Publishing 2013.
27
Borgmann A. Holding on to reality: the nature of information at the turn of the millennium. Chicago: University of Chicago Press 1999.
28
Mayer-Schönberger V. Delete: the virtue of forgetting in the digital age. Princeton, N.J.: Princeton University Press 2009.
29
Robert F. Smallwood. Information Governance: Concepts, Strategies, and Best Practices. http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9781118218303
30
MacLennan A. Information governance and assurance: reducing risk, promoting policy. London: Facet Publishing 2014.
31
Ferguson, Kelly. Information Governance. KM World. ;18.
32
Haynes D. Social media, risk and information governance. Business Information Review. 2016;33:90–3. doi: 10.1177/0266382116651781
33
Tallon PP, Ramirez RV, Short JE. The Information Artifact in IT Governance: Toward a Theory of Information Governance. Journal of Management Information Systems. 2013;30:141–78. doi: 10.2753/MIS0742-1222300306
34
Performing Information Governance: A Step-by-Step Guide to Making Information Governance Work. IBM Press1 .
35
Hagmann J. Information governance – beyond the buzz. Records Management Journal. 2013;23:228–40. doi: 10.1108/RMJ-04-2013-0008
36
Taylor, Sheila. Information Governance. Municipal World. ;126:21–4.
37
Edited by David Levi-Faur. Information And Governing: Cybernetic Models Of Governance. The Oxford Handbook of Governance.
38
Donaldson A, Walker P. Information governance—a view from the NHS. International Journal of Medical Informatics. 2004;73:281–4. doi: 10.1016/j.ijmedinf.2003.11.009
39
Ballard C, International Business Machines Corporation. International Technical Support Organization. IBM information governance solutions. 1st ed. Poughkeepsie, NY: IBM Corp., International Technical Support Organization 2014.
40
Ferguson, Kelly. Information Governance. KM World. ;18.
41
Lomas E. Information governance: information security and access within a UK context. Records Management Journal. 2010;20:182–98. doi: 10.1108/09565691011064322
42
Haynes D. Social media, risk and information governance. Business Information Review. 2016;33:90–3. doi: 10.1177/0266382116651781
43
Barclay T. Blair | Essays in Information Governance (and more). https://iginitiative.com/tag/barclay-t-blair/
44
Farrall J, Rubenstein K, editors. Sanctions, Accountability and Governance in a Globalised World. Cambridge: Cambridge University Press 2009.
45
Mallin C. Introduction. Corporate governance. Oxford: Oxford University Press 2013:1–11.
46
Tricker RI. Corporate governance: principles, policies, and practices. Third edition. Oxford: Oxford University Press 2015.
47
Diversity and Corporate Governance - DiversityAndCorporateGovernance.pdf.
48
Moral Maze - The morailty of business Radio 4 Podcast.
49
G20/OECD Principles of Corporate Governance - OECD. https://www.oecd.org/corporate/principles-corporate-governance.htm
50
The Sarbanes-Oxley Act 2002. http://www.soxlaw.com/
51
Corporate governance | ICAEW | ICAEW. https://www.icaew.com/en/technical/corporate-governance
52
Ethical Investment Research Services � Ceres. https://www.ceres.org/about-us/coalition/coalition-members/eiris
53
Hawley R, Hawley Committee, KPMG IMPACT Programme. Information as an asset: a consultative report : the Board agenda. London: KPMG Impact Programme 1995.
54
Shepherd E. Why are records in the public sector organizational assets? Records Management Journal. 2006;16:6–12. doi: 10.1108/09565690610654747
55
Journal of Intellectual Capital                                                  Table Of Contents: Volume 1 Issue 1.
56
WIPO - World Intellectual Property Organization. http://www.wipo.int/portal/en/index.html
57
CREATe-Working-Paper-2014-01.pdf.
58
Executive Summary: The Advantages, Economics and Value of Reuse. https://www.gartner.com/doc/1406319?ref=SiteSearch&sthkw=information%20governance&fnl=search&srcId=1-3478922254
59
McLeod J, Hare C. How to manage records in the e-environment. 2nd ed. London: Routledge 2006.
60
Shepherd E, Yeo G. Managing records: a handbook of principles and practice. London: Facet Publishing 2003.
61
Bailey S. Managing the crowd: rethinking records management for the Web 2.0 world. London: Facet 2008.
62
Information Security: Principles and Practices, Second Edition. Pearson IT Certification2 .
63
LeVeque V. Information security: a strategic approach. New York: Wiley 2006.
64
Brotby K. Information Security Governance. Hoboken, NJ, USA: John Wiley & Sons, Inc. 2009.
65
Information Security: Principles and Practices, Second Edition. Pearson IT Certification2 .
66
Calder A, Watkins SG. Information security risk management for ISO27001/ISO27002. Cambridgeshire: IT Governance Pub 2010.
67
the-cost-of-cyber-crime-full-report.pdf.
68
COSO in the Cyber Age_FULL_r11.pdf.
69
Harmer G. Governance of enterprise IT based on COBIT 5: a management guide. Ely, Cambridgeshire, U.K.: IT Governance Pub 2013.
70
8 Characteristics of good user requirements. http://www.slideshare.net/guest24d72f/8-characteristics-of-good-user-requirements-presentation
71
Batini C, Cappiello C, Francalanci C, et al. Methodologies for data quality assessment and improvement. ACM Computing Surveys. 2009;41:1–52. doi: 10.1145/1541880.1541883
72
DCMI Metadata Basics. http://dublincore.org/metadata-basics/
73
Floridi, Luciano. Information Quality. Philosophy & Technology. ;26:1–6.
74
User Behaviour Observational Study: User Behaviour Observational Study Final Report - Bhimani_ubirdfinalreport.pdf.
75
Tapscott D, Williams AD. Wikinomics: how mass collaboration changes everything. Expanded ed. London: Atlantic 2008.
76
Ohlhorst F, editor. Big Data Analytics. Hoboken, NJ, USA: John Wiley & Sons, Inc. 2012.
77
Mayer-Schönberger V, Cukier K. Big data: a revolution that will transform how we live, work, and think. Boston: Houghton Mifflin Harcourt 2013.
78
Newman MEJ. Networks: an introduction. Oxford: Oxford University Press 2010.
79
Risk Management on JSTOR. Published Online First: 9394.
80
An Introduction to Information System Risk Management - introduction-information-system-risk-management-1204. https://www.sans.org/reading-room/whitepapers/auditing/introduction-information-system-risk-management-1204
81
Fraser J, Simkins BJ. Enterprise Risk Management. Hoboken, NJ, USA: John Wiley & Sons, Inc. 2009.
82
OECD Reviews of Risk Management Policies, Books / OECD Reviews of Risk Management Policies / OECD Reviews of Risk Management Policies: Norway 2006:Information Security. doi: 10.1787/19934106  10.1787/9789264025516-en
83
THE ORANGE BOOK 2004.pdf - orange_book.pdf.
84
Guide for conducting risk assessments - nistspecialpublication800-30r1.pdf.
85
Project risk analysis using Monte Carlo Simulation | quantmleap. http://quantmleap.com/blog/2010/07/project-risk-management-and-the-application-of-monte-carlo-simulation/
86
Overview | United Nations. http://www.un.org/en/sections/about-un/overview/index.html
87
Universal Declaration of Human Rights | United Nations. http://www.un.org/en/universal-declaration-human-rights/
88
Liberty. https://www.liberty-human-rights.org.uk/
89
Home Page | Equality and Human Rights Commission. https://www.equalityhumanrights.com/en
90
Legrand P, Munday R, editors. Comparative Legal Studies: Traditions and Transitions. Cambridge: Cambridge University Press 2003.
91
Finch E, Fafinski S. Legal skills. Fifth edition. Oxford, United Kingdom: Oxford University Press 2015.
92
Harris P. An introduction to law. Seventh edition. Cambridge: Cambridge University Press 2007.
93
Baase S. A gift of fire: social, legal, and ethical issues for computing and the Internet. 3rd ed. Harlow: Pearson Prentice Hall 2009.
94
Shiva V. Protect or plunder?: understanding intellectual property rights. London: Zed 2001.
95
Who owns information: The defining battle of our time? - RSA. https://www.thersa.org/discover/publications-and-articles/rsa-blogs/2013/01/who-owns-information-the-defining-battle-of-our-time-
96
Lester G. When Should State Secrets Stay Secret?: Accountability, Democratic Governance, and Intelligence. Cambridge: Cambridge University Press 2015.
97
Bainbridge DI, Bainbridge DI. Introduction to information technology law. 6th ed. Harlow: Pearson/Longman 2008.
98
Torremans P. Intellectual property and human rights: enhanced edition of Copyright and human rights. Section ed. Austin: Kluwer 2008.
99
Lloyd IJ. Information technology law. Seventh edition. Oxford, United Kingdom: Oxford University Press 2014.
100
World Legal Information Institute (WorldLII). http://www.worldlii.org/
101
AsianLII - Asian Legal Information Institute. http://www.asianlii.org/
102
Australasian Legal Information Institute (AustLII). http://www.austlii.edu.au/
103
British and Irish Legal Information Institute. http://www.bailii.org/
104
CommonLII - Commonwealth Legal Information Institute. http://www.commonlii.org/
105
Privacy-autonomy-and-the-internet.
106
Overview of the General Data Protection Regulation (GDPR). Published Online First: 2016.
107
Privacy by design. Published Online First: 2016.
108
CCTV Code of Practice. Published Online First: 2016.
109
Data sharing Code of Practice. Published Online First: 2016.
110
Anonymisation Code of Practice. Published Online First: 2016.
111
Quick_guide_to_the_employment_practices_code.
112
Overview of privacy legislation in Canada - Office of the Privacy Commissioner of Canada. https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/02_05_d_15/
113
Privacy International |. https://www.privacyinternational.org/
114
MIGUEL_MALHEIROS_844263_phd_thesis_malheiros.pdf._COPYRIGHT_REMOVED..pdf.
115
Freedom of Information Laws | Global Investigative Journalism Network. http://gijn.org/resources/freedom-of-information-laws/
116
Molnár P, editor. Free speech and censorship around the globe. Budapest: Central European University Press 2015.
117
Mendel T. The Fiftieth Anniversary of the Freedom of Information Act: How it Measures up Against International Standards and Other Laws. Communication Law and Policy. 2016;21:465–91. doi: 10.1080/10811680.2016.1216685
118
Flinn A, Jones H. Freedom of information: open access, empty archives? London: Routledge 2009.
119
Open Government Partnership |. http://www.opengovpartnership.org/
120
Open Government Manifesto � UK Open Government Network. http://www.opengovernment.org.uk/open-government-manifesto/
121
WhatDoTheyKnow - Make and browse Freedom of Information (FOI) requests. https://www.whatdotheyknow.com/
122
Information Tribunal > Search. http://informationrights.decisions.tribunals.gov.uk//Public/search.aspx
123
Search.
124
A digital forensic practitioner’s guide to giving evidence in a court of law - viewcontent.cgi. http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1032&context=adf
125
Daniel L, Daniel L. Digital forensics for legal professionals: understanding digital evidence from the warrant to the courtroom. [Place of publication not identified]: Syngress 2012.
126
Wiles J. Techno security’s guide to e-discovery and digital forensics. Burlington, Mass: Syngress .
127
Bryant R. Investigating digital crime. Chichester: J. Wiley & Sons 2008.
128
Wiles J, Alexander T, Ashlock S, et al. Digital Forensics. Techno Security’s Guide to E-Discovery and Digital Forensics. Elsevier 2007:33–63.
129
Smallwood RF, Gurushanta V. Managing Canadian electronic records: electronic records management, document management & e-discovery in Canada : a management guide. New [ed.]. [Lexington, Mass.]: Imerge Consulting 2011.
130
Dykstra J, Sherman AT. Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digital Investigation. 2012;9:S90–8. doi: 10.1016/j.diin.2012.05.001
131
Myers KN, editor. Business Continuity Strategies. Hoboken, NJ, USA: John Wiley & Sons, Inc. 2012.
132
Lindström J, Samuelsson S, Hägerfors A. Business continuity planning methodology. Disaster Prevention and Management: An International Journal. 2010;19:243–55. doi: 10.1108/09653561011038039
133
Matthews G, Smith Y, Knowles G. The Disaster Control Plan. Library & Archival Security. 2004;19:3–23. doi: 10.1300/J114v19n02_02
134
Craig R, Selzer T, Seymour J. There is disaster planning and there is reality—the Cayman Islands National Archive (CINA) experience with Hurricane Ivan 1. Journal of the Society of Archivists. 2006;27:187–99. doi: 10.1080/00379810601081396
135
Fell GJ. Outsourcing IT. Decoding the IT Value Problem. Hoboken, NJ, USA: John Wiley & Sons, Inc. 2013:114–25.
136
Proffitt J. A guide to outsourcing records management. London: Routledge 2011.
137
Vagadia B. Outsourcing to India - a legal handbook. Berlin: Springer 2007.