1
What is Information Governance? And Why is it So Hard? - Debra Logan. http://blogs.gartner.com/debra_logan/2010/01/11/what-is-information-governance-and-why-is-it-so-hard/
2
Defining Information Governance. http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/book/strategy-business-planning/9781118218303/chapter-1-the-onslaught-of-big-data-and-the-information-governance-imperative/chap01_sec001_html
3
Duranti L, Franks PC, editors. Encyclopedia of archival science. Lanham: : Rowman & Littlefield 2015. https://ebookcentral.proquest.com/lib/ucl/detail.action?docID=2076364
4
Generally Accepted Recordkeeping Principles. http://www.arma.org/r2/generally-accepted-br-recordkeeping-principles
5
InfoGov Basics What is Info Gov? http://www.infogovbasics.com/what-is-infogov/
6
Home. https://www.igt.hscic.gov.uk/
7
The IG Initiative Definition of Information Governance | Iron Mountain. http://www.ironmountain.com/Knowledge-Center/Reference-Library/View-by-Document-Type/General-Articles/T/The-IG-Initiative-Definition-of-Information-Governance.aspx
8
INFORMATION GOVERNANCE INITIATIVE - Information Governance Initiative. https://www.opentext.de/file_source/OpenText/en_US/PDF/opentext-3rd-party-igi-infogov-snapshot-series-combined-en.pdf
9
InfoGov Basics Information Governance Glossary. http://www.infogovbasics.com/resources/glossary/
10
Glossaries « EDRM. http://www.edrm.net/resources/glossaries
11
BS ISO/IEC 38500:2015                Information technology. Governance of IT for the organization. BSI 2015. https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030272233
12
BS ISO 26000:2010                Guidance on social responsibility. BSI 2010. https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030140726
13
BS EN ISO/IEC 27000:2017 : Information technology:  Security techniques: Information security management systems:  Overview and vocabulary. BSI 2016. https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030347477
14
BS ISO/IEC 27001:2013                Information technology. Security techniques. Information security management systems. Requirements. BSI 2013. https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030328895
15
BS ISO/IEC 27031:2011                Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity. BSI 2011. https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030168355
16
ISO IEC 27002 2013 Information Security Control Objectives. http://www.praxiom.com/iso-27002-objectives.htm
17
BS ISO 31000:2009                Risk management. Principles and guidelines. BSI 2010. https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030202344
18
BS 31100:2011                Risk management. Code of practice and guidance for the implementation of BS ISO 31000. BSI 2011. https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030228064
19
BS ISO 30300:2011                Information and documentation. Management systems for records. Fundamentals and vocabulary. BSI 2011. https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030205371
20
BS ISO 30301:2011                Information and documentation. Management systems for records. Requirements. BSI 2011. https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030205374
21
BS ISO 15489-1:2016                Information and documentation. Records management. Concepts and principles. BSI 2016. https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030298891
22
Buckland, Michael K. Information as Thing. Journal of the American Society for Information Science;42:351–60.http://search.proquest.com/docview/1301244196?rfr_id=info%3Axri%2Fsid%3Aprimo
23
Himma KE, Tavani HT, editors. The Handbook of Information and Computer Ethics. Hoboken, NJ, USA: : John Wiley & Sons, Inc. 2008. doi:10.1002/9780470281819
24
Theories of the Information Society, Third Edition - Information-Society-Theories.pdf. https://cryptome.org/2013/01/aaron-swartz/Information-Society-Theories.pdf
25
Dearnley J, Feather J. The wired world: an introduction to the theory and practice of the information society. London: : Library Association 2001.
26
Feather J. The information society: a study of continuity and change. 6th ed. London: : Facet Publishing 2013. https://ebookcentral.proquest.com/lib/ucl/detail.action?docID=4923761
27
Borgmann A. Holding on to reality: the nature of information at the turn of the millennium. Chicago: : University of Chicago Press 1999.
28
Mayer-Schönberger V. Delete: the virtue of forgetting in the digital age. Princeton, N.J.: : Princeton University Press 2009.
29
Robert F. Smallwood. Information Governance: Concepts, Strategies, and Best Practices. http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9781118218303
30
MacLennan A. Information governance and assurance: reducing risk, promoting policy. London: : Facet Publishing 2014.
31
Ferguson, Kelly. Information Governance. KM World;18.http://search.proquest.com.libproxy.ucl.ac.uk/docview/197266433?rfr_id=info%3Axri%2Fsid%3Aprimo
32
Haynes D. Social media, risk and information governance. Business Information Review 2016;33:90–3. doi:10.1177/0266382116651781
33
Tallon PP, Ramirez RV, Short JE. The Information Artifact in IT Governance: Toward a Theory of Information Governance. Journal of Management Information Systems 2013;30:141–78. doi:10.2753/MIS0742-1222300306
34
Performing Information Governance: A Step-by-Step Guide to Making Information Governance Work. IBM Press1 http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9780133385618
35
Hagmann J. Information governance – beyond the buzz. Records Management Journal 2013;23:228–40. doi:10.1108/RMJ-04-2013-0008
36
Taylor, Sheila. Information Governance. Municipal World;126:21–4.http://search.proquest.com.libproxy.ucl.ac.uk/docview/1781342715?rfr_id=info%3Axri%2Fsid%3Aprimo
37
Edited by David Levi-Faur. Information And Governing: Cybernetic Models Of Governance. In: The Oxford Handbook of Governance.http://www.oxfordhandbooks.com.libproxy.ucl.ac.uk/view/10.1093/oxfordhb/9780199560530.001.0001/oxfordhb-9780199560530-e-8
38
Donaldson A, Walker P. Information governance—a view from the NHS. International Journal of Medical Informatics 2004;73:281–4. doi:10.1016/j.ijmedinf.2003.11.009
39
Ballard C, International Business Machines Corporation. International Technical Support Organization. IBM information governance solutions. 1st ed. Poughkeepsie, NY: : IBM Corp., International Technical Support Organization 2014. http://proquest.safaribooksonline.com/?uiCode=ucl&xmlId=0738439517
40
Ferguson, Kelly. Information Governance. KM World;18.http://search.proquest.com.libproxy.ucl.ac.uk/docview/197266433?rfr_id=info%3Axri%2Fsid%3Aprimo
41
Lomas E. Information governance: information security and access within a UK context. Records Management Journal 2010;20:182–98. doi:10.1108/09565691011064322
42
Haynes D. Social media, risk and information governance. Business Information Review 2016;33:90–3. doi:10.1177/0266382116651781
43
Barclay T. Blair | Essays in Information Governance (and more). https://iginitiative.com/tag/barclay-t-blair/
44
Farrall J, Rubenstein K, editors. Sanctions, Accountability and Governance in a Globalised World. Cambridge: : Cambridge University Press 2009. doi:10.1017/CBO9780511776847
45
Mallin C. Introduction. In: Corporate governance. Oxford: : Oxford University Press 2013. 1–11.https://contentstore.cla.co.uk/secure/link?id=b03226c7-6053-ec11-981f-0050f2f09783
46
Tricker RI. Corporate governance: principles, policies, and practices. Third edition. Oxford: : Oxford University Press 2015.
47
Diversity and Corporate Governance - DiversityAndCorporateGovernance.pdf. http://tools.ashridge.org.uk/website/IC.nsf/wFARATT/Diversity%20and%20Good%20Governance/$file/DiversityAndCorporateGovernance.pdf
48
Moral Maze - The morailty of business Radio 4 Podcast. https://learningonscreen.ac.uk/ondemand/index.php/prog/0CA3B385?bcast=121840888
49
G20/OECD Principles of Corporate Governance - OECD. https://www.oecd.org/corporate/principles-corporate-governance.htm
50
The Sarbanes-Oxley Act 2002. http://www.soxlaw.com/
51
Corporate governance | ICAEW | ICAEW. https://www.icaew.com/en/technical/corporate-governance
52
Ethical Investment Research Services � Ceres. https://www.ceres.org/about-us/coalition/coalition-members/eiris
53
Hawley R, Hawley Committee, KPMG IMPACT Programme. Information as an asset: a consultative report : the Board agenda. London: : KPMG Impact Programme 1995.
54
Shepherd E. Why are records in the public sector organizational assets? Records Management Journal 2006;16:6–12. doi:10.1108/09565690610654747
55
Journal of Intellectual Capital                                                  Table Of Contents: Volume 1 Issue 1. http://www.emeraldinsight.com.libproxy.ucl.ac.uk/toc/jic/1/1
56
WIPO - World Intellectual Property Organization. http://www.wipo.int/portal/en/index.html
57
CREATe-Working-Paper-2014-01.pdf. https://zenodo.org/record/8381/files/CREATe-Working-Paper-2014-01.pdf
58
Executive Summary: The Advantages, Economics and Value of Reuse. https://www.gartner.com/doc/1406319?ref=SiteSearch&sthkw=information%20governance&fnl=search&srcId=1-3478922254
59
McLeod J, Hare C. How to manage records in the e-environment. 2nd ed. London: : Routledge 2006.
60
Shepherd E, Yeo G. Managing records: a handbook of principles and practice. London: : Facet Publishing 2003.
61
Bailey S. Managing the crowd: rethinking records management for the Web 2.0 world. London: : Facet 2008. http://www.vlebooks.com/vleweb/product/openreader?id=UCL&isbn=9781856047906
62
Information Security: Principles and Practices, Second Edition. Pearson IT Certification2 http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9780133589412
63
LeVeque V. Information security: a strategic approach. New York: : Wiley 2006. http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138
64
Brotby K. Information Security Governance. Hoboken, NJ, USA: : John Wiley & Sons, Inc. 2009. doi:10.1002/9780470476017
65
Information Security: Principles and Practices, Second Edition. Pearson IT Certification2 http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9780133589412
66
Calder A, Watkins SG. Information security risk management for ISO27001/ISO27002. Cambridgeshire: : IT Governance Pub 2010. http://www.jstor.org/stable/10.2307/j.ctt5hh7jd
67
the-cost-of-cyber-crime-full-report.pdf. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60943/the-cost-of-cyber-crime-full-report.pdf
68
COSO in the Cyber Age_FULL_r11.pdf. https://www.coso.org/documents/COSO%20in%20the%20Cyber%20Age_FULL_r11.pdf
69
Harmer G. Governance of enterprise IT based on COBIT 5: a management guide. Ely, Cambridgeshire, U.K.: : IT Governance Pub 2013. https://www.jstor.org/stable/10.2307/j.ctt7zsxfv
70
8 Characteristics of good user requirements. http://www.slideshare.net/guest24d72f/8-characteristics-of-good-user-requirements-presentation
71
Batini C, Cappiello C, Francalanci C, et al. Methodologies for data quality assessment and improvement. ACM Computing Surveys 2009;41:1–52. doi:10.1145/1541880.1541883
72
DCMI Metadata Basics. http://dublincore.org/metadata-basics/
73
Floridi, Luciano. Information Quality. Philosophy & Technology;26:1–6.http://search.proquest.com.libproxy.ucl.ac.uk/docview/1291912830?rfr_id=info%3Axri%2Fsid%3Aprimo
74
User Behaviour Observational Study: User Behaviour Observational Study Final Report - Bhimani_ubirdfinalreport.pdf. http://discovery.ucl.ac.uk/1472604/7/Bhimani_ubirdfinalreport.pdf
75
Tapscott D, Williams AD. Wikinomics: how mass collaboration changes everything. Expanded ed. London: : Atlantic 2008.
76
Ohlhorst F, editor. Big Data Analytics. Hoboken, NJ, USA: : John Wiley & Sons, Inc. 2012. doi:10.1002/9781119205005
77
Mayer-Schönberger V, Cukier K. Big data: a revolution that will transform how we live, work, and think. Boston: : Houghton Mifflin Harcourt 2013.
78
Newman MEJ. Networks: an introduction. Oxford: : Oxford University Press 2010. https://ucl.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma9930800789604761&context=L&vid=44UCL_INST:UCL_VU2&lang=en&search_scope=UCLLibraryCatalogue&adaptor=Local%20Search%20Engine&isFrbr=true&tab=UCLLibraryCatalogue&query=any,contains,Networks:%20an%20introduction&sortby=date_d&facet=frbrgroupid,include,9020048350542987714&offset=0
79
Risk Management on JSTOR. Published Online First: 9394.http://www.jstor.org.libproxy.ucl.ac.uk/journal/riskmanagement
80
An Introduction to Information System Risk Management - introduction-information-system-risk-management-1204. https://www.sans.org/reading-room/whitepapers/auditing/introduction-information-system-risk-management-1204
81
Fraser J, Simkins BJ. Enterprise Risk Management. Hoboken, NJ, USA: : John Wiley & Sons, Inc. 2009. doi:10.1002/9781118267080
82
OECD Reviews of Risk Management Policies, Books / OECD Reviews of Risk Management Policies / OECD Reviews of Risk Management Policies: Norway 2006:Information Security. doi:10.1787/19934106  10.1787/9789264025516-en
83
THE ORANGE BOOK 2004.pdf - orange_book.pdf. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/220647/orange_book.pdf
84
Guide for conducting risk assessments - nistspecialpublication800-30r1.pdf. http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf
85
Project risk analysis using Monte Carlo Simulation | quantmleap. http://quantmleap.com/blog/2010/07/project-risk-management-and-the-application-of-monte-carlo-simulation/
86
Overview | United Nations. http://www.un.org/en/sections/about-un/overview/index.html
87
Universal Declaration of Human Rights | United Nations. http://www.un.org/en/universal-declaration-human-rights/
88
Liberty. https://www.liberty-human-rights.org.uk/
89
Home Page | Equality and Human Rights Commission. https://www.equalityhumanrights.com/en
90
Legrand P, Munday R, editors. Comparative Legal Studies: Traditions and Transitions. Cambridge: : Cambridge University Press 2003. doi:10.1017/CBO9780511522260
91
Finch E, Fafinski S. Legal skills. Fifth edition. Oxford, United Kingdom: : Oxford University Press 2015.
92
Harris P. An introduction to law. Seventh edition. Cambridge: : Cambridge University Press 2007.
93
Baase S. A gift of fire: social, legal, and ethical issues for computing and the Internet. 3rd ed. Harlow: : Pearson Prentice Hall 2009.
94
Shiva V. Protect or plunder?: understanding intellectual property rights. London: : Zed 2001.
95
Who owns information: The defining battle of our time? - RSA. https://www.thersa.org/discover/publications-and-articles/rsa-blogs/2013/01/who-owns-information-the-defining-battle-of-our-time-
96
Lester G. When Should State Secrets Stay Secret?: Accountability, Democratic Governance, and Intelligence. Cambridge: : Cambridge University Press 2015. http://dx.doi.org/10.1017/CBO9781107337015
97
Bainbridge DI, Bainbridge DI. Introduction to information technology law. 6th ed. Harlow: : Pearson/Longman 2008.
98
Torremans P. Intellectual property and human rights: enhanced edition of Copyright and human rights. Section ed. Austin: : Kluwer 2008.
99
Lloyd IJ. Information technology law. Seventh edition. Oxford, United Kingdom: : Oxford University Press 2014.
100
World Legal Information Institute (WorldLII). http://www.worldlii.org/
101
AsianLII - Asian Legal Information Institute. http://www.asianlii.org/
102
Australasian Legal Information Institute (AustLII). http://www.austlii.edu.au/
103
British and Irish Legal Information Institute. http://www.bailii.org/
104
CommonLII - Commonwealth Legal Information Institute. http://www.commonlii.org/
105
Privacy-autonomy-and-the-internet. https://www.cambridge.org/core/services/aop-cambridge-core/content/view/F745701FFEA03DD2CF5BCBDAE47FDEEA/9781107337428c2_p24-52_CBO.pdf/privacy-autonomy-and-the-internet.pdf
106
Overview of the General Data Protection Regulation (GDPR). Published Online First: 2016.https://ico.org.uk/for-organisations/data-protection-reform/overview-of-the-gdpr/
107
Privacy by design. Published Online First: 2016.https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-law-enforcement-processing/accountability-and-governance/data-protection-impact-assessments/
108
CCTV Code of Practice. Published Online First: 2016.https://ico.org.uk/media/1542/cctv-code-of-practice.pdf
109
Data sharing Code of Practice. Published Online First: 2016.https://ico.org.uk/media/for-organisations/documents/1068/data_sharing_code_of_practice.pdf
110
Anonymisation Code of Practice. Published Online First: 2016.https://ico.org.uk/media/1061/anonymisation-code.pdf
111
Quick_guide_to_the_employment_practices_code. https://ico.org.uk/media/for-organisations/documents/1128/quick_guide_to_the_employment_practices_code.pdf
112
Overview of privacy legislation in Canada - Office of the Privacy Commissioner of Canada. https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/02_05_d_15/
113
Privacy International |. https://www.privacyinternational.org/
114
MIGUEL_MALHEIROS_844263_phd_thesis_malheiros.pdf._COPYRIGHT_REMOVED..pdf. http://discovery.ucl.ac.uk/1427369/2/MIGUEL_MALHEIROS_844263_phd_thesis_malheiros.pdf._COPYRIGHT_REMOVED..pdf
115
Freedom of Information Laws | Global Investigative Journalism Network. http://gijn.org/resources/freedom-of-information-laws/
116
Molnár P, editor. Free speech and censorship around the globe. Budapest: : Central European University Press 2015. http://www.jstor.org/stable/10.7829/j.ctt13wztv7
117
Mendel T. The Fiftieth Anniversary of the Freedom of Information Act: How it Measures up Against International Standards and Other Laws. Communication Law and Policy 2016;21:465–91. doi:10.1080/10811680.2016.1216685
118
Flinn A, Jones H. Freedom of information: open access, empty archives? London: : Routledge 2009.
119
Open Government Partnership |. http://www.opengovpartnership.org/
120
Open Government Manifesto � UK Open Government Network. http://www.opengovernment.org.uk/open-government-manifesto/
121
WhatDoTheyKnow - Make and browse Freedom of Information (FOI) requests. https://www.whatdotheyknow.com/
122
Information Tribunal > Search. http://informationrights.decisions.tribunals.gov.uk//Public/search.aspx
123
Search. https://ico.org.uk/ESDWebPages/Search
124
A digital forensic practitioner’s guide to giving evidence in a court of law - viewcontent.cgi. http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1032&context=adf
125
Daniel L, Daniel L. Digital forensics for legal professionals: understanding digital evidence from the warrant to the courtroom. [Place of publication not identified]: : Syngress 2012. https://learning.oreilly.com/library/view/digital-forensics-for/9781597496438/?ar=
126
Wiles J. Techno security’s guide to e-discovery and digital forensics. Burlington, Mass: : Syngress http://www.sciencedirect.com/science/book/9781597492232
127
Bryant R. Investigating digital crime. Chichester: : J. Wiley & Sons 2008.
128
Wiles J, Alexander T, Ashlock S, et al. Digital Forensics. In: Techno Security’s Guide to E-Discovery and Digital Forensics. Elsevier 2007. 33–63. doi:10.1016/B978-159749223-2.50006-6
129
Smallwood RF, Gurushanta V. Managing Canadian electronic records: electronic records management, document management & e-discovery in Canada : a management guide. New [ed.]. [Lexington, Mass.]: : Imerge Consulting 2011.
130
Dykstra J, Sherman AT. Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digital Investigation 2012;9:S90–8. doi:10.1016/j.diin.2012.05.001
131
Myers KN, editor. Business Continuity Strategies. Hoboken, NJ, USA: : John Wiley & Sons, Inc. 2012. doi:10.1002/9781119196730
132
Lindström J, Samuelsson S, Hägerfors A. Business continuity planning methodology. Disaster Prevention and Management: An International Journal 2010;19:243–55. doi:10.1108/09653561011038039
133
Matthews G, Smith Y, Knowles G. The Disaster Control Plan. Library & Archival Security 2004;19:3–23. doi:10.1300/J114v19n02_02
134
Craig R, Selzer T, Seymour J. There is disaster planning and there is reality—the Cayman Islands National Archive (CINA) experience with Hurricane Ivan 1. Journal of the Society of Archivists 2006;27:187–99. doi:10.1080/00379810601081396
135
Fell GJ. Outsourcing IT. In: Decoding the IT Value Problem. Hoboken, NJ, USA: : John Wiley & Sons, Inc. 2013. 114–25. doi:10.1002/9781118757512.ch10
136
Proffitt J. A guide to outsourcing records management. London: : Routledge 2011.
137
Vagadia B. Outsourcing to India - a legal handbook. Berlin: : Springer 2007. http://dx.doi.org/10.1007/978-3-540-72220-5