8 Characteristics of good user requirements (no date). Available at: http://www.slideshare.net/guest24d72f/8-characteristics-of-good-user-requirements-presentation.
A digital forensic practitioner’s guide to giving evidence in a court of law - viewcontent.cgi (no date). Available at: http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1032&context=adf.
An Introduction to Information System Risk Management - introduction-information-system-risk-management-1204 (no date). Available at: https://www.sans.org/reading-room/whitepapers/auditing/introduction-information-system-risk-management-1204.
‘Anonymisation Code of Practice’ (2016). Available at: https://ico.org.uk/media/1061/anonymisation-code.pdf.
AsianLII - Asian Legal Information Institute (no date). Available at: http://www.asianlii.org/.
Australasian Legal Information Institute (AustLII) (no date). Available at: http://www.austlii.edu.au/.
Baase, S. (2009) A gift of fire: social, legal, and ethical issues for computing and the Internet. 3rd ed. Harlow: Pearson Prentice Hall.
Bailey, S. (2008) Managing the crowd: rethinking records management for the Web 2.0 world. London: Facet. Available at: http://www.vlebooks.com/vleweb/product/openreader?id=UCL&isbn=9781856047906.
Bainbridge, D.I. and Bainbridge, D.I. (2008) Introduction to information technology law. 6th ed. Harlow: Pearson/Longman.
Ballard, C. and International Business Machines Corporation. International Technical Support Organization (2014) IBM information governance solutions. 1st ed. Poughkeepsie, NY: IBM Corp., International Technical Support Organization. Available at: http://proquest.safaribooksonline.com/?uiCode=ucl&xmlId=0738439517.
Barclay T. Blair | Essays in Information Governance (and more) (no date). Available at: https://iginitiative.com/tag/barclay-t-blair/.
Batini, C. et al. (2009) ‘Methodologies for data quality assessment and improvement’, ACM Computing Surveys, 41(3), pp. 1–52. Available at: https://doi.org/10.1145/1541880.1541883.
Borgmann, A. (1999) Holding on to reality: the nature of information at the turn of the millennium. Chicago: University of Chicago Press.
British and Irish Legal Information Institute (no date). Available at: http://www.bailii.org/.
Brotby, K. (2009) Information Security Governance. Hoboken, NJ, USA: John Wiley & Sons, Inc. Available at: https://doi.org/10.1002/9780470476017.
Bryant, R. (2008) Investigating digital crime. Chichester: J. Wiley & Sons.
BS 31100:2011 Risk management. Code of practice and guidance for the implementation of BS ISO 31000 (2011). BSI. Available at: https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030228064.
BS EN ISO/IEC 27000:2017 : Information technology: Security techniques: Information security management systems: Overview and vocabulary (2016). BSI. Available at: https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030347477.
BS ISO 15489-1:2016 Information and documentation. Records management. Concepts and principles (2016). BSI. Available at: https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030298891.
BS ISO 26000:2010 Guidance on social responsibility (2010). BSI. Available at: https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030140726.
BS ISO 30300:2011 Information and documentation. Management systems for records. Fundamentals and vocabulary (2011). BSI. Available at: https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030205371.
BS ISO 30301:2011 Information and documentation. Management systems for records. Requirements (2011). BSI. Available at: https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030205374.
BS ISO 31000:2009 Risk management. Principles and guidelines (2010). BSI. Available at: https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030202344.
BS ISO/IEC 27001:2013 Information technology. Security techniques. Information security management systems. Requirements (2013). BSI. Available at: https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030328895.
BS ISO/IEC 27031:2011 Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity (2011). BSI. Available at: https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030168355.
BS ISO/IEC 38500:2015 Information technology. Governance of IT for the organization (2015). BSI. Available at: https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030272233.
Buckland, Michael K (no date) ‘Information as Thing’, Journal of the American Society for Information Science, 42(5), pp. 351–360. Available at: http://search.proquest.com/docview/1301244196?rfr_id=info%3Axri%2Fsid%3Aprimo.
Calder, A. and Watkins, S.G. (2010) Information security risk management for ISO27001/ISO27002. Cambridgeshire: IT Governance Pub. Available at: http://www.jstor.org/stable/10.2307/j.ctt5hh7jd.
‘CCTV Code of Practice’ (2016). Available at: https://ico.org.uk/media/1542/cctv-code-of-practice.pdf.
CommonLII - Commonwealth Legal Information Institute (no date). Available at: http://www.commonlii.org/.
Corporate governance | ICAEW | ICAEW (no date). Available at: https://www.icaew.com/en/technical/corporate-governance.
‘COSO in the Cyber Age_FULL_r11.pdf’ (no date). Available at: https://www.coso.org/documents/COSO%20in%20the%20Cyber%20Age_FULL_r11.pdf.
Craig, R., Selzer, T. and Seymour, J. (2006) ‘There is disaster planning and there is reality—the Cayman Islands National Archive (CINA) experience with Hurricane Ivan 1’, Journal of the Society of Archivists, 27(2), pp. 187–199. Available at: https://doi.org/10.1080/00379810601081396.
‘CREATe-Working-Paper-2014-01.pdf’ (no date). Available at: https://zenodo.org/record/8381/files/CREATe-Working-Paper-2014-01.pdf.
Daniel, Larry and Daniel, Lars (2012) Digital forensics for legal professionals: understanding digital evidence from the warrant to the courtroom. [Place of publication not identified]: Syngress. Available at: https://learning.oreilly.com/library/view/digital-forensics-for/9781597496438/?ar=.
‘Data sharing Code of Practice’ (2016). Available at: https://ico.org.uk/media/for-organisations/documents/1068/data_sharing_code_of_practice.pdf.
DCMI Metadata Basics (no date). Available at: http://dublincore.org/metadata-basics/.
Dearnley, J. and Feather, J. (2001) The wired world: an introduction to the theory and practice of the information society. London: Library Association.
Defining Information Governance (no date). Available at: http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/book/strategy-business-planning/9781118218303/chapter-1-the-onslaught-of-big-data-and-the-information-governance-imperative/chap01_sec001_html.
‘Diversity and Corporate Governance - DiversityAndCorporateGovernance.pdf’ (no date). Available at: http://tools.ashridge.org.uk/website/IC.nsf/wFARATT/Diversity%20and%20Good%20Governance/$file/DiversityAndCorporateGovernance.pdf.
Donaldson, A. and Walker, P. (2004) ‘Information governance—a view from the NHS’, International Journal of Medical Informatics, 73(3), pp. 281–284. Available at: https://doi.org/10.1016/j.ijmedinf.2003.11.009.
Duranti, L. and Franks, P.C. (eds) (2015) Encyclopedia of archival science. Lanham: Rowman & Littlefield. Available at: https://ebookcentral.proquest.com/lib/ucl/detail.action?docID=2076364.
Dykstra, J. and Sherman, A.T. (2012) ‘Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques’, Digital Investigation, 9, pp. S90–S98. Available at: https://doi.org/10.1016/j.diin.2012.05.001.
Edited by David Levi-Faur (no date) ‘Information And Governing: Cybernetic Models Of Governance’, in The Oxford Handbook of Governance. Available at: http://www.oxfordhandbooks.com.libproxy.ucl.ac.uk/view/10.1093/oxfordhb/9780199560530.001.0001/oxfordhb-9780199560530-e-8.
Ethical Investment Research Services � Ceres (no date). Available at: https://www.ceres.org/about-us/coalition/coalition-members/eiris.
Executive Summary: The Advantages, Economics and Value of Reuse (no date). Available at: https://www.gartner.com/doc/1406319?ref=SiteSearch&sthkw=information%20governance&fnl=search&srcId=1-3478922254.
Farrall, J. and Rubenstein, K. (eds) (2009) Sanctions, Accountability and Governance in a Globalised World. Cambridge: Cambridge University Press. Available at: https://doi.org/10.1017/CBO9780511776847.
Feather, J. (2013) The information society: a study of continuity and change. 6th ed. London: Facet Publishing. Available at: https://ebookcentral.proquest.com/lib/ucl/detail.action?docID=4923761.
Fell, G.J. (2013) ‘Outsourcing IT’, in Decoding the IT Value Problem. Hoboken, NJ, USA: John Wiley & Sons, Inc., pp. 114–125. Available at: https://doi.org/10.1002/9781118757512.ch10.
Ferguson, Kelly (no date a) ‘Information Governance’, KM World, 18(8). Available at: http://search.proquest.com.libproxy.ucl.ac.uk/docview/197266433?rfr_id=info%3Axri%2Fsid%3Aprimo.
Ferguson, Kelly (no date b) ‘Information Governance’, KM World, 18(8). Available at: http://search.proquest.com.libproxy.ucl.ac.uk/docview/197266433?rfr_id=info%3Axri%2Fsid%3Aprimo.
Finch, E. and Fafinski, S. (2015) Legal skills. Fifth edition. Oxford, United Kingdom: Oxford University Press.
Flinn, A. and Jones, H. (2009) Freedom of information: open access, empty archives? London: Routledge.
Floridi, Luciano (no date) ‘Information Quality’, Philosophy & Technology, 26(1), pp. 1–6. Available at: http://search.proquest.com.libproxy.ucl.ac.uk/docview/1291912830?rfr_id=info%3Axri%2Fsid%3Aprimo.
Fraser, J. and Simkins, B.J. (2009) Enterprise Risk Management. Hoboken, NJ, USA: John Wiley & Sons, Inc. Available at: https://doi.org/10.1002/9781118267080.
Freedom of Information Laws | Global Investigative Journalism Network (no date). Available at: http://gijn.org/resources/freedom-of-information-laws/.
G20/OECD Principles of Corporate Governance - OECD (no date). Available at: https://www.oecd.org/corporate/principles-corporate-governance.htm.
Generally Accepted Recordkeeping Principles (no date). Available at: http://www.arma.org/r2/generally-accepted-br-recordkeeping-principles.
Glossaries « EDRM (no date). Available at: http://www.edrm.net/resources/glossaries.
‘Guide for conducting risk assessments - nistspecialpublication800-30r1.pdf’ (no date). Available at: http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf.
Hagmann, J. (2013) ‘Information governance – beyond the buzz’, Records Management Journal, 23(3), pp. 228–240. Available at: https://doi.org/10.1108/RMJ-04-2013-0008.
Harmer, G. (2013) Governance of enterprise IT based on COBIT 5: a management guide. Ely, Cambridgeshire, U.K.: IT Governance Pub. Available at: https://www.jstor.org/stable/10.2307/j.ctt7zsxfv.
Harris, P. (2007) An introduction to law. Seventh edition. Cambridge: Cambridge University Press.
Hawley, R., Hawley Committee, and KPMG IMPACT Programme (1995) Information as an asset: a consultative report : the Board agenda. London: KPMG Impact Programme.
Haynes, D. (2016a) ‘Social media, risk and information governance’, Business Information Review, 33(2), pp. 90–93. Available at: https://doi.org/10.1177/0266382116651781.
Haynes, D. (2016b) ‘Social media, risk and information governance’, Business Information Review, 33(2), pp. 90–93. Available at: https://doi.org/10.1177/0266382116651781.
Himma, K.E. and Tavani, H.T. (eds) (2008) The Handbook of Information and Computer Ethics. Hoboken, NJ, USA: John Wiley & Sons, Inc. Available at: https://doi.org/10.1002/9780470281819.
Home (no date). Available at: https://www.igt.hscic.gov.uk/.
Home Page | Equality and Human Rights Commission (no date). Available at: https://www.equalityhumanrights.com/en.
InfoGov Basics Information Governance Glossary (no date). Available at: http://www.infogovbasics.com/resources/glossary/.
InfoGov Basics What is Info Gov? (no date). Available at: http://www.infogovbasics.com/what-is-infogov/.
INFORMATION GOVERNANCE INITIATIVE - Information Governance Initiative (no date). Available at: https://www.opentext.de/file_source/OpenText/en_US/PDF/opentext-3rd-party-igi-infogov-snapshot-series-combined-en.pdf.
Information Security: Principles and Practices, Second Edition (no date a). Pearson IT Certification2. Available at: http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9780133589412.
Information Security: Principles and Practices, Second Edition (no date b). Pearson IT Certification2. Available at: http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9780133589412.
Information Tribunal > Search (no date). Available at: http://informationrights.decisions.tribunals.gov.uk//Public/search.aspx.
ISO IEC 27002 2013 Information Security Control Objectives (no date). Available at: http://www.praxiom.com/iso-27002-objectives.htm.
‘Journal of Intellectual Capital Table Of Contents: Volume 1 Issue 1’ (no date). Available at: http://www.emeraldinsight.com.libproxy.ucl.ac.uk/toc/jic/1/1.
Legrand, P. and Munday, R. (eds) (2003) Comparative Legal Studies: Traditions and Transitions. Cambridge: Cambridge University Press. Available at: https://doi.org/10.1017/CBO9780511522260.
Lester, G. (2015) When Should State Secrets Stay Secret?: Accountability, Democratic Governance, and Intelligence. Cambridge: Cambridge University Press. Available at: http://dx.doi.org/10.1017/CBO9781107337015.
LeVeque, V. (2006) Information security: a strategic approach. New York: Wiley. Available at: http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138.
Liberty (no date). Available at: https://www.liberty-human-rights.org.uk/.
Lindström, J., Samuelsson, S. and Hägerfors, A. (2010) ‘Business continuity planning methodology’, Disaster Prevention and Management: An International Journal, 19(2), pp. 243–255. Available at: https://doi.org/10.1108/09653561011038039.
Lloyd, I.J. (2014) Information technology law. Seventh edition. Oxford, United Kingdom: Oxford University Press.
Lomas, E. (2010) ‘Information governance: information security and access within a UK context’, Records Management Journal, 20(2), pp. 182–198. Available at: https://doi.org/10.1108/09565691011064322.
MacLennan, A. (2014) Information governance and assurance: reducing risk, promoting policy. London: Facet Publishing.
Mallin, C. (2013) ‘Introduction’, in Corporate governance. 4th ed. Oxford: Oxford University Press, pp. 1–11. Available at: https://contentstore.cla.co.uk/secure/link?id=b03226c7-6053-ec11-981f-0050f2f09783.
Matthews, G., Smith, Y. and Knowles, G. (2004) ‘The Disaster Control Plan’, Library & Archival Security, 19(2), pp. 3–23. Available at: https://doi.org/10.1300/J114v19n02_02.
Mayer-Schönberger, V. (2009) Delete: the virtue of forgetting in the digital age. Princeton, N.J.: Princeton University Press.
Mayer-Schönberger, V. and Cukier, K. (2013) Big data: a revolution that will transform how we live, work, and think. Boston: Houghton Mifflin Harcourt.
McLeod, J. and Hare, C. (2006) How to manage records in the e-environment. 2nd ed. London: Routledge.
Mendel, T. (2016) ‘The Fiftieth Anniversary of the Freedom of Information Act: How it Measures up Against International Standards and Other Laws’, Communication Law and Policy, 21(4), pp. 465–491. Available at: https://doi.org/10.1080/10811680.2016.1216685.
‘MIGUEL_MALHEIROS_844263_phd_thesis_malheiros.pdf._COPYRIGHT_REMOVED..pdf’ (no date). Available at: http://discovery.ucl.ac.uk/1427369/2/MIGUEL_MALHEIROS_844263_phd_thesis_malheiros.pdf._COPYRIGHT_REMOVED..pdf.
Molnár, P. (ed.) (2015) Free speech and censorship around the globe. Budapest: Central European University Press. Available at: http://www.jstor.org/stable/10.7829/j.ctt13wztv7.
‘Moral Maze - The morailty of business Radio 4 Podcast’ (no date). BBC Radio 4. Available at: https://learningonscreen.ac.uk/ondemand/index.php/prog/0CA3B385?bcast=121840888.
Myers, K.N. (ed.) (2012) Business Continuity Strategies. Hoboken, NJ, USA: John Wiley & Sons, Inc. Available at: https://doi.org/10.1002/9781119196730.
Newman, M.E.J. (2010) Networks: an introduction. Oxford: Oxford University Press. Available at: https://ucl.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma9930800789604761&context=L&vid=44UCL_INST:UCL_VU2&lang=en&search_scope=UCLLibraryCatalogue&adaptor=Local%20Search%20Engine&isFrbr=true&tab=UCLLibraryCatalogue&query=any,contains,Networks:%20an%20introduction&sortby=date_d&facet=frbrgroupid,include,9020048350542987714&offset=0.
‘OECD Reviews of Risk Management Policies, Books /
OECD Reviews of Risk Management Policies /
OECD Reviews of Risk Management Policies: Norway 2006:Information Security’ (no date). Available at: https://doi.org/10.1787/19934106 10.1787/9789264025516-en.
Ohlhorst, F. (ed.) (2012) Big Data Analytics. Hoboken, NJ, USA: John Wiley & Sons, Inc. Available at: https://doi.org/10.1002/9781119205005.
Open Government Manifesto � UK Open Government Network (no date). Available at: http://www.opengovernment.org.uk/open-government-manifesto/.
Open Government Partnership | (no date). Available at: http://www.opengovpartnership.org/.
Overview | United Nations (no date). Available at: http://www.un.org/en/sections/about-un/overview/index.html.
Overview of privacy legislation in Canada - Office of the Privacy Commissioner of Canada (no date). Available at: https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/02_05_d_15/.
‘Overview of the General Data Protection Regulation (GDPR)’ (2016). Available at: https://ico.org.uk/for-organisations/data-protection-reform/overview-of-the-gdpr/.
Performing Information Governance: A Step-by-Step Guide to Making Information Governance Work (no date). IBM Press1. Available at: http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9780133385618.
‘Privacy by design’ (2016). Available at: https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-law-enforcement-processing/accountability-and-governance/data-protection-impact-assessments/.
Privacy International | (no date). Available at: https://www.privacyinternational.org/.
‘Privacy-autonomy-and-the-internet’ (no date). Available at: https://www.cambridge.org/core/services/aop-cambridge-core/content/view/F745701FFEA03DD2CF5BCBDAE47FDEEA/9781107337428c2_p24-52_CBO.pdf/privacy-autonomy-and-the-internet.pdf.
Proffitt, J. (2011) A guide to outsourcing records management. London: Routledge.
Project risk analysis using Monte Carlo Simulation | quantmleap (no date). Available at: http://quantmleap.com/blog/2010/07/project-risk-management-and-the-application-of-monte-carlo-simulation/.
‘Quick_guide_to_the_employment_practices_code’ (no date). Available at: https://ico.org.uk/media/for-organisations/documents/1128/quick_guide_to_the_employment_practices_code.pdf.
‘Risk Management on JSTOR’ (9394). Available at: http://www.jstor.org.libproxy.ucl.ac.uk/journal/riskmanagement.
Robert F. Smallwood (no date) Information Governance: Concepts, Strategies, and Best Practices. John Wiley & Sons. Available at: http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9781118218303.
‘Search’ (no date). Available at: https://ico.org.uk/ESDWebPages/Search.
Shepherd, E. (2006) ‘Why are records in the public sector organizational assets?’, Records Management Journal, 16(1), pp. 6–12. Available at: https://doi.org/10.1108/09565690610654747.
Shepherd, E. and Yeo, G. (2003) Managing records: a handbook of principles and practice. London: Facet Publishing.
Shiva, V. (2001) Protect or plunder?: understanding intellectual property rights. London: Zed.
Smallwood, R.F. and Gurushanta, V. (2011) Managing Canadian electronic records: electronic records management, document management & e-discovery in Canada : a management guide. New [ed.]. [Lexington, Mass.]: Imerge Consulting.
Tallon, P.P., Ramirez, R.V. and Short, J.E. (2013) ‘The Information Artifact in IT Governance: Toward a Theory of Information Governance’, Journal of Management Information Systems, 30(3), pp. 141–178. Available at: https://doi.org/10.2753/MIS0742-1222300306.
Tapscott, D. and Williams, A.D. (2008) Wikinomics: how mass collaboration changes everything. Expanded ed. London: Atlantic.
Taylor, Sheila (no date) ‘Information Governance’, Municipal World, 126(4), pp. 21–24. Available at: http://search.proquest.com.libproxy.ucl.ac.uk/docview/1781342715?rfr_id=info%3Axri%2Fsid%3Aprimo.
The IG Initiative Definition of Information Governance | Iron Mountain (no date). Available at: http://www.ironmountain.com/Knowledge-Center/Reference-Library/View-by-Document-Type/General-Articles/T/The-IG-Initiative-Definition-of-Information-Governance.aspx.
‘THE ORANGE BOOK 2004.pdf - orange_book.pdf’ (no date). Available at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/220647/orange_book.pdf.
The Sarbanes-Oxley Act 2002 (no date). Available at: http://www.soxlaw.com/.
‘the-cost-of-cyber-crime-full-report.pdf’ (no date). Available at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60943/the-cost-of-cyber-crime-full-report.pdf.
‘Theories of the Information Society, Third Edition - Information-Society-Theories.pdf’ (no date). Available at: https://cryptome.org/2013/01/aaron-swartz/Information-Society-Theories.pdf.
Torremans, P. (2008) Intellectual property and human rights: enhanced edition of Copyright and human rights. Section ed. Austin: Kluwer.
Tricker, R.I. (2015) Corporate governance: principles, policies, and practices. Third edition. Oxford: Oxford University Press.
Universal Declaration of Human Rights | United Nations (no date). Available at: http://www.un.org/en/universal-declaration-human-rights/.
‘User Behaviour Observational Study: User Behaviour Observational Study Final Report - Bhimani_ubirdfinalreport.pdf’ (no date). Available at: http://discovery.ucl.ac.uk/1472604/7/Bhimani_ubirdfinalreport.pdf.
Vagadia, B. (2007) Outsourcing to India - a legal handbook. Berlin: Springer. Available at: http://dx.doi.org/10.1007/978-3-540-72220-5.
What is Information Governance? And Why is it So Hard? - Debra Logan (no date). Available at: http://blogs.gartner.com/debra_logan/2010/01/11/what-is-information-governance-and-why-is-it-so-hard/.
WhatDoTheyKnow - Make and browse Freedom of Information (FOI) requests (no date). Available at: https://www.whatdotheyknow.com/.
Who owns information: The defining battle of our time? - RSA (no date). Available at: https://www.thersa.org/discover/publications-and-articles/rsa-blogs/2013/01/who-owns-information-the-defining-battle-of-our-time-.
Wiles, J. et al. (2007) ‘Digital Forensics’, in Techno Security’s Guide to E-Discovery and Digital Forensics. Elsevier, pp. 33–63. Available at: https://doi.org/10.1016/B978-159749223-2.50006-6.
Wiles, J. (no date) Techno security’s guide to e-discovery and digital forensics. Burlington, Mass: Syngress. Available at: http://www.sciencedirect.com/science/book/9781597492232.
WIPO - World Intellectual Property Organization (no date). Available at: http://www.wipo.int/portal/en/index.html.
World Legal Information Institute (WorldLII) (no date). Available at: http://www.worldlii.org/.