‘8 Characteristics of Good User Requirements’. N.p., n.d. Web. <http://www.slideshare.net/guest24d72f/8-characteristics-of-good-user-requirements-presentation>.
‘A Digital Forensic Practitioner’s Guide to Giving Evidence in a Court of Law - Viewcontent.Cgi’. N.p., n.d. Web. <http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1032&amp;context=adf>.
‘An Introduction to Information System Risk Management - Introduction-Information-System-Risk-Management-1204’. N.p., n.d. Web. <https://www.sans.org/reading-room/whitepapers/auditing/introduction-information-system-risk-management-1204>.
‘Anonymisation Code of Practice’. (2016): n. pag. Web. <https://ico.org.uk/media/1061/anonymisation-code.pdf>.
‘AsianLII - Asian Legal Information Institute’. N.p., n.d. Web. <http://www.asianlii.org/>.
‘Australasian Legal Information Institute (AustLII)’. N.p., n.d. Web. <http://www.austlii.edu.au/>.
Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues for Computing and the Internet. 3rd ed. Harlow: Pearson Prentice Hall, 2009. Print.
Bailey, Steve. Managing the Crowd: Rethinking Records Management for the Web 2.0 World. London: Facet, 2008. Web. <http://www.vlebooks.com/vleweb/product/openreader?id=UCL&amp;isbn=9781856047906>.
Bainbridge, David I., and David I. Bainbridge. Introduction to Information Technology Law. 6th ed. Harlow: Pearson/Longman, 2008. Print.
Ballard, Chuck and International Business Machines Corporation. International Technical Support Organization. IBM Information Governance Solutions. 1st ed. IBM redbooks. Poughkeepsie, NY: IBM Corp., International Technical Support Organization, 2014. Web. <http://proquest.safaribooksonline.com/?uiCode=ucl&amp;xmlId=0738439517>.
‘Barclay T. Blair | Essays in Information Governance (and More)’. N.p., n.d. Web. <https://iginitiative.com/tag/barclay-t-blair/>.
Batini, Carlo et al. ‘Methodologies for Data Quality Assessment and Improvement’. ACM Computing Surveys 41.3 (2009): 1–52. Web.
Borgmann, Albert. Holding on to Reality: The Nature of Information at the Turn of the Millennium. Chicago: University of Chicago Press, 1999. Print.
‘British and Irish Legal Information Institute’. N.p., n.d. Web. <http://www.bailii.org/>.
Brotby, Krag. Information Security Governance. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2009. Web. <http://doi.wiley.com/10.1002/9780470476017>.
Bryant, Robin. Investigating Digital Crime. Chichester: J. Wiley & Sons, 2008. Print.
BS 31100:2011                Risk Management. Code of Practice and Guidance for the Implementation of BS ISO 31000. BSI, 2011. Web. <https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030228064>.
BS EN ISO/IEC 27000:2017 : Information Technology:  Security Techniques: Information Security Management Systems:  Overview and Vocabulary. BSI, 2016. Web. <https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030347477>.
BS ISO 15489-1:2016                Information and Documentation. Records Management. Concepts and Principles. BSI, 2016. Web. <https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030298891>.
BS ISO 26000:2010                Guidance on Social Responsibility. BSI, 2010. Web. <https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030140726>.
BS ISO 30300:2011                Information and Documentation. Management Systems for Records. Fundamentals and Vocabulary. BSI, 2011. Web. <https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030205371>.
BS ISO 30301:2011                Information and Documentation. Management Systems for Records. Requirements. BSI, 2011. Web. <https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030205374>.
BS ISO 31000:2009                Risk Management. Principles and Guidelines. BSI, 2010. Web. <https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030202344>.
BS ISO/IEC 27001:2013                Information Technology. Security Techniques. Information Security Management Systems. Requirements. BSI, 2013. Web. <https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030328895>.
BS ISO/IEC 27031:2011                Information Technology. Security Techniques. Guidelines for Information and Communication Technology Readiness for Business Continuity. BSI, 2011. Web. <https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030168355>.
BS ISO/IEC 38500:2015                Information Technology. Governance of IT for the Organization. BSI, 2015. Web. <https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030272233>.
Buckland, Michael K. ‘Information as Thing’. Journal of the American Society for Information Science 42.5 351–360. Web. <http://search.proquest.com/docview/1301244196?rfr_id=info%3Axri%2Fsid%3Aprimo>.
Calder, Alan, and Steve G. Watkins. Information Security Risk Management for ISO27001/ISO27002. Cambridgeshire: IT Governance Pub, 2010. Web. <http://www.jstor.org/stable/10.2307/j.ctt5hh7jd>.
‘CCTV Code of Practice’. (2016): n. pag. Web. <https://ico.org.uk/media/1542/cctv-code-of-practice.pdf>.
‘CommonLII - Commonwealth Legal Information Institute’. N.p., n.d. Web. <http://www.commonlii.org/>.
‘Corporate Governance | ICAEW | ICAEW’. N.p., n.d. Web. <https://www.icaew.com/en/technical/corporate-governance>.
‘COSO in the Cyber Age_FULL_r11.Pdf’. Web. <https://www.coso.org/documents/COSO%20in%20the%20Cyber%20Age_FULL_r11.pdf>.
Craig, Roger, Tamara Selzer, and Josette Seymour. ‘There Is Disaster Planning and There Is Reality—the Cayman Islands National Archive (CINA) Experience with Hurricane Ivan 1’. Journal of the Society of Archivists 27.2 (2006): 187–199. Web.
‘CREATe-Working-Paper-2014-01.Pdf’. Web. <https://zenodo.org/record/8381/files/CREATe-Working-Paper-2014-01.pdf>.
Daniel, Larry, and Lars Daniel. Digital Forensics for Legal Professionals: Understanding Digital Evidence from the Warrant to the Courtroom. [Place of publication not identified]: Syngress, 2012. Web. <https://learning.oreilly.com/library/view/digital-forensics-for/9781597496438/?ar=>.
‘Data Sharing Code of Practice’. (2016): n. pag. Web. <https://ico.org.uk/media/for-organisations/documents/1068/data_sharing_code_of_practice.pdf>.
‘DCMI Metadata Basics’. N.p., n.d. Web. <http://dublincore.org/metadata-basics/>.
Dearnley, James, and John Feather. The Wired World: An Introduction to the Theory and Practice of the Information Society. London: Library Association, 2001. Print.
‘Defining Information Governance’. N.p., n.d. Web. <http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/book/strategy-business-planning/9781118218303/chapter-1-the-onslaught-of-big-data-and-the-information-governance-imperative/chap01_sec001_html>.
‘Diversity and Corporate Governance - DiversityAndCorporateGovernance.Pdf’. Web. <http://tools.ashridge.org.uk/website/IC.nsf/wFARATT/Diversity%20and%20Good%20Governance/$file/DiversityAndCorporateGovernance.pdf>.
Donaldson, Alistair, and Phil Walker. ‘Information Governance—a View from the NHS’. International Journal of Medical Informatics 73.3 (2004): 281–284. Web.
Duranti, Luciana, and Patricia C. Franks, eds. Encyclopedia of Archival Science. Lanham: Rowman & Littlefield, 2015. Web. <https://ebookcentral.proquest.com/lib/ucl/detail.action?docID=2076364>.
Dykstra, Josiah, and Alan T. Sherman. ‘Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Computing: Exploring and Evaluating Tools, Trust, and Techniques’. Digital Investigation 9 (2012): S90–S98. Web.
Edited by David Levi-Faur. ‘Information And Governing: Cybernetic Models Of Governance’. The Oxford Handbook of Governance. N.p. Web. <http://www.oxfordhandbooks.com.libproxy.ucl.ac.uk/view/10.1093/oxfordhb/9780199560530.001.0001/oxfordhb-9780199560530-e-8>.
‘Ethical Investment Research Services Â�� Ceres’. N.p., n.d. Web. <https://www.ceres.org/about-us/coalition/coalition-members/eiris>.
‘Executive Summary: The Advantages, Economics and Value of Reuse’. N.p., n.d. Web. <https://www.gartner.com/doc/1406319?ref=SiteSearch&amp;sthkw=information%20governance&amp;fnl=search&amp;srcId=1-3478922254>.
Farrall, Jeremy, and Kim Rubenstein, eds. Sanctions, Accountability and Governance in a Globalised World. Cambridge: Cambridge University Press, 2009. Web. <http://ebooks.cambridge.org/ref/id/CBO9780511776847>.
Feather, John. The Information Society: A Study of Continuity and Change. 6th ed. London: Facet Publishing, 2013. Web. <https://ebookcentral.proquest.com/lib/ucl/detail.action?docID=4923761>.
Fell, Gregory J. ‘Outsourcing IT’. Decoding the IT Value Problem. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2013. 114–125. Web. <http://doi.wiley.com/10.1002/9781118757512.ch10>.
Ferguson, Kelly. ‘Information Governance’. KM World 18.8 n. pag. Web. <http://search.proquest.com.libproxy.ucl.ac.uk/docview/197266433?rfr_id=info%3Axri%2Fsid%3Aprimo>.
---. ‘Information Governance’. KM World 18.8 n. pag. Web. <http://search.proquest.com.libproxy.ucl.ac.uk/docview/197266433?rfr_id=info%3Axri%2Fsid%3Aprimo>.
Finch, Emily, and Stefan Fafinski. Legal Skills. Fifth edition. Oxford, United Kingdom: Oxford University Press, 2015. Print.
Flinn, Andrew, and Harriet Jones. Freedom of Information: Open Access, Empty Archives? London: Routledge, 2009. Print.
Floridi, Luciano. ‘Information Quality’. Philosophy & Technology 26.1 1–6. Web. <http://search.proquest.com.libproxy.ucl.ac.uk/docview/1291912830?rfr_id=info%3Axri%2Fsid%3Aprimo>.
Fraser, John, and Betty J. Simkins. Enterprise Risk Management. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2009. Web. <http://doi.wiley.com/10.1002/9781118267080>.
‘Freedom of Information Laws | Global Investigative Journalism Network’. N.p., n.d. Web. <http://gijn.org/resources/freedom-of-information-laws/>.
‘G20/OECD Principles of Corporate Governance - OECD’. N.p., n.d. Web. <https://www.oecd.org/corporate/principles-corporate-governance.htm>.
‘Generally Accepted Recordkeeping Principles’. N.p., n.d. Web. <http://www.arma.org/r2/generally-accepted-br-recordkeeping-principles>.
‘Glossaries « EDRM’. N.p., n.d. Web. <http://www.edrm.net/resources/glossaries>.
‘Guide for Conducting Risk Assessments - Nistspecialpublication800-30r1.Pdf’. Web. <http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf>.
Hagmann, Juerg. ‘Information Governance – beyond the Buzz’. Records Management Journal 23.3 (2013): 228–240. Web.
Harmer, Geoff. Governance of Enterprise IT Based on COBIT 5: A Management Guide. Ely, Cambridgeshire, U.K.: IT Governance Pub, 2013. Web. <https://www.jstor.org/stable/10.2307/j.ctt7zsxfv>.
Harris, Phil. An Introduction to Law. Seventh edition. The law in context series. Cambridge: Cambridge University Press, 2007. Print.
Hawley, Robert, Hawley Committee, and KPMG IMPACT Programme. Information as an Asset: A Consultative Report : The Board Agenda. London: KPMG Impact Programme, 1995. Print.
Haynes, D. ‘Social Media, Risk and Information Governance’. Business Information Review 33.2 (2016): 90–93. Web.
---. ‘Social Media, Risk and Information Governance’. Business Information Review 33.2 (2016): 90–93. Web.
Himma, Kenneth Einar, and Herman T. Tavani, eds. The Handbook of Information and Computer Ethics. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2008. Web. <http://doi.wiley.com/10.1002/9780470281819>.
‘Home’. N.p., n.d. Web. <https://www.igt.hscic.gov.uk/>.
‘Home Page | Equality and Human Rights Commission’. N.p., n.d. Web. <https://www.equalityhumanrights.com/en>.
‘InfoGov Basics Information Governance Glossary’. N.p., n.d. Web. <http://www.infogovbasics.com/resources/glossary/>.
‘InfoGov Basics What Is Info Gov?’ N.p., n.d. Web. <http://www.infogovbasics.com/what-is-infogov/>.
‘INFORMATION GOVERNANCE INITIATIVE - Information Governance Initiative’. N.p., n.d. Web. <https://www.opentext.de/file_source/OpenText/en_US/PDF/opentext-3rd-party-igi-infogov-snapshot-series-combined-en.pdf>.
Information Security: Principles and Practices, Second Edition. Pearson IT Certification2. Web. <http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9780133589412>.
---. Pearson IT Certification2. Web. <http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9780133589412>.
‘Information Tribunal > Search’. N.p., n.d. Web. <http://informationrights.decisions.tribunals.gov.uk//Public/search.aspx>.
‘ISO IEC 27002 2013 Information Security Control Objectives’. N.p., n.d. Web. <http://www.praxiom.com/iso-27002-objectives.htm>.
‘Journal of Intellectual Capital                                                  Table Of Contents: Volume 1 Issue 1’. n. pag. Web. <http://www.emeraldinsight.com.libproxy.ucl.ac.uk/toc/jic/1/1>.
Legrand, Pierre, and Roderick Munday, eds. Comparative Legal Studies: Traditions and Transitions. Cambridge: Cambridge University Press, 2003. Web. <http://ebooks.cambridge.org/ref/id/CBO9780511522260>.
Lester, Genevieve. When Should State Secrets Stay Secret?: Accountability, Democratic Governance, and Intelligence. Cambridge: Cambridge University Press, 2015. Web. <http://dx.doi.org/10.1017/CBO9781107337015>.
LeVeque, Vincent. Information Security: A Strategic Approach. New York: Wiley, 2006. Web. <http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138>.
‘Liberty’. N.p., n.d. Web. <https://www.liberty-human-rights.org.uk/>.
Lindström, John, Sören Samuelsson, and Ann Hägerfors. ‘Business Continuity Planning Methodology’. Disaster Prevention and Management: An International Journal 19.2 (2010): 243–255. Web.
Lloyd, Ian J. Information Technology Law. Seventh edition. Oxford, United Kingdom: Oxford University Press, 2014. Print.
Lomas, Elizabeth. ‘Information Governance: Information Security and Access within a UK Context’. Records Management Journal 20.2 (2010): 182–198. Web.
MacLennan, Alan. Information Governance and Assurance: Reducing Risk, Promoting Policy. London: Facet Publishing, 2014. Print.
Mallin, C. ‘Introduction’. Corporate Governance. 4th ed. Oxford: Oxford University Press, 2013. 1–11. Web. <https://contentstore.cla.co.uk/secure/link?id=b03226c7-6053-ec11-981f-0050f2f09783>.
Matthews, Graham, Yvonne Smith, and Gemma Knowles. ‘The Disaster Control Plan’. Library & Archival Security 19.2 (2004): 3–23. Web.
Mayer-Schönberger, Viktor. Delete: The Virtue of Forgetting in the Digital Age. Princeton, N.J.: Princeton University Press, 2009. Print.
Mayer-Schönberger, Viktor, and Kenneth Cukier. Big Data: A Revolution That Will Transform How We Live, Work, and Think. Boston: Houghton Mifflin Harcourt, 2013. Print.
McLeod, Julie, and Catherine Hare. How to Manage Records in the E-Environment. 2nd ed. Know how guides. London: Routledge, 2006. Print.
Mendel, Toby. ‘The Fiftieth Anniversary of the Freedom of Information Act: How It Measures up Against International Standards and Other Laws’. Communication Law and Policy 21.4 (2016): 465–491. Web.
‘MIGUEL_MALHEIROS_844263_phd_thesis_malheiros.Pdf._COPYRIGHT_REMOVED..Pdf’. Web. <http://discovery.ucl.ac.uk/1427369/2/MIGUEL_MALHEIROS_844263_phd_thesis_malheiros.pdf._COPYRIGHT_REMOVED..pdf>.
Molnár, Péter, ed. Free Speech and Censorship around the Globe. Budapest: Central European University Press, 2015. Web. <http://www.jstor.org/stable/10.7829/j.ctt13wztv7>.
‘Moral Maze - The Morailty of Business Radio 4 Podcast’. Web. <https://learningonscreen.ac.uk/ondemand/index.php/prog/0CA3B385?bcast=121840888>.
Myers, Kenneth N., ed. Business Continuity Strategies. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. Web. <http://doi.wiley.com/10.1002/9781119196730>.
Newman, M. E. J. Networks: An Introduction. Oxford: Oxford University Press, 2010. Web. <https://ucl.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma9930800789604761&amp;context=L&amp;vid=44UCL_INST:UCL_VU2&amp;lang=en&amp;search_scope=UCLLibraryCatalogue&amp;adaptor=Local%20Search%20Engine&amp;isFrbr=true&amp;tab=UCLLibraryCatalogue&amp;query=any,contains,Networks:%20an%20introduction&amp;sortby=date_d&amp;facet=frbrgroupid,include,9020048350542987714&amp;offset=0>.
‘OECD Reviews of Risk Management Policies, Books / OECD Reviews of Risk Management Policies / OECD Reviews of Risk Management Policies: Norway 2006:Information Security’. n. pag. Web. <http://www.oecd-ilibrary.org.libproxy.ucl.ac.uk/science-and-technology/oecd-reviews-of-risk-management-policies-norway-2006_9789264025516-en>.
Ohlhorst, Frank, ed. Big Data Analytics. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. Web. <http://doi.wiley.com/10.1002/9781119205005>.
‘Open Government Manifesto Â�� UK Open Government Network’. N.p., n.d. Web. <http://www.opengovernment.org.uk/open-government-manifesto/>.
‘Open Government Partnership |’. N.p., n.d. Web. <http://www.opengovpartnership.org/>.
‘Overview | United Nations’. N.p., n.d. Web. <http://www.un.org/en/sections/about-un/overview/index.html>.
‘Overview of Privacy Legislation in Canada - Office of the Privacy Commissioner of Canada’. N.p., n.d. Web. <https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/02_05_d_15/>.
‘Overview of the General Data Protection Regulation (GDPR)’. (2016): n. pag. Web. <https://ico.org.uk/for-organisations/data-protection-reform/overview-of-the-gdpr/>.
Performing Information Governance: A Step-by-Step Guide to Making Information Governance Work. IBM Press1. Web. <http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9780133385618>.
‘Privacy by Design’. (2016): n. pag. Web. <https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-law-enforcement-processing/accountability-and-governance/data-protection-impact-assessments/>.
‘Privacy International |’. N.p., n.d. Web. <https://www.privacyinternational.org/>.
‘Privacy-Autonomy-and-the-Internet’. Web. <https://www.cambridge.org/core/services/aop-cambridge-core/content/view/F745701FFEA03DD2CF5BCBDAE47FDEEA/9781107337428c2_p24-52_CBO.pdf/privacy-autonomy-and-the-internet.pdf>.
Proffitt, Jane. A Guide to Outsourcing Records Management. London: Routledge, 2011. Print.
‘Project Risk Analysis Using Monte Carlo Simulation | Quantmleap’. N.p., n.d. Web. <http://quantmleap.com/blog/2010/07/project-risk-management-and-the-application-of-monte-carlo-simulation/>.
‘Quick_guide_to_the_employment_practices_code’. Web. <https://ico.org.uk/media/for-organisations/documents/1128/quick_guide_to_the_employment_practices_code.pdf>.
‘Risk Management on JSTOR’. (9394): n. pag. Web. <http://www.jstor.org.libproxy.ucl.ac.uk/journal/riskmanagement>.
Robert F. Smallwood. ‘Information Governance: Concepts, Strategies, and Best Practices’. John Wiley & Sons, n.d. Web. <http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9781118218303>.
‘Search’. n. pag. Web. <https://ico.org.uk/ESDWebPages/Search>.
Shepherd, Elizabeth. ‘Why Are Records in the Public Sector Organizational Assets?’ Records Management Journal 16.1 (2006): 6–12. Web.
Shepherd, Elizabeth, and Geoffrey Yeo. Managing Records: A Handbook of Principles and Practice. London: Facet Publishing, 2003. Print.
Shiva, Vandana. Protect or Plunder?: Understanding Intellectual Property Rights. Global issues series (Zed Books). London: Zed, 2001. Print.
Smallwood, Robert F., and Vigi Gurushanta. Managing Canadian Electronic Records: Electronic Records Management, Document Management & e-Discovery in Canada : A Management Guide. New [ed.]. [Lexington, Mass.]: Imerge Consulting, 2011. Print.
Tallon, Paul P., Ronald V. Ramirez, and James E. Short. ‘The Information Artifact in IT Governance: Toward a Theory of Information Governance’. Journal of Management Information Systems 30.3 (2013): 141–178. Web.
Tapscott, Don, and Anthony D. Williams. Wikinomics: How Mass Collaboration Changes Everything. Expanded ed. London: Atlantic, 2008. Print.
Taylor, Sheila. ‘Information Governance’. Municipal World 126.4 21–24. Web. <http://search.proquest.com.libproxy.ucl.ac.uk/docview/1781342715?rfr_id=info%3Axri%2Fsid%3Aprimo>.
‘The IG Initiative Definition of Information Governance | Iron Mountain’. N.p., n.d. Web. <http://www.ironmountain.com/Knowledge-Center/Reference-Library/View-by-Document-Type/General-Articles/T/The-IG-Initiative-Definition-of-Information-Governance.aspx>.
‘THE ORANGE BOOK 2004.Pdf - Orange_book.Pdf’. Web. <https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/220647/orange_book.pdf>.
‘The Sarbanes-Oxley Act 2002’. N.p., n.d. Web. <http://www.soxlaw.com/>.
‘The-Cost-of-Cyber-Crime-Full-Report.Pdf’. Web. <https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60943/the-cost-of-cyber-crime-full-report.pdf>.
‘Theories of the Information Society, Third Edition - Information-Society-Theories.Pdf’. Web. <https://cryptome.org/2013/01/aaron-swartz/Information-Society-Theories.pdf>.
Torremans, Paul. Intellectual Property and Human Rights: Enhanced Edition of Copyright and Human Rights. Section ed. Information law series. Austin: Kluwer, 2008. Print.
Tricker, R. Ian. Corporate Governance: Principles, Policies, and Practices. Third edition. Oxford: Oxford University Press, 2015. Print.
‘Universal Declaration of Human Rights | United Nations’. N.p., n.d. Web. <http://www.un.org/en/universal-declaration-human-rights/>.
‘User Behaviour Observational Study: User Behaviour Observational Study Final Report - Bhimani_ubirdfinalreport.Pdf’. Web. <http://discovery.ucl.ac.uk/1472604/7/Bhimani_ubirdfinalreport.pdf>.
Vagadia, Bharat. Outsourcing to India - a Legal Handbook. Berlin: Springer, 2007. Web. <http://dx.doi.org/10.1007/978-3-540-72220-5>.
‘What Is Information Governance? And Why Is It So Hard? - Debra Logan’. N.p., n.d. Web. <http://blogs.gartner.com/debra_logan/2010/01/11/what-is-information-governance-and-why-is-it-so-hard/>.
‘WhatDoTheyKnow - Make and Browse Freedom of Information (FOI) Requests’. N.p., n.d. Web. <https://www.whatdotheyknow.com/>.
‘Who Owns Information: The Defining Battle of Our Time? - RSA’. N.p., n.d. Web. <https://www.thersa.org/discover/publications-and-articles/rsa-blogs/2013/01/who-owns-information-the-defining-battle-of-our-time->.
Wiles, Jack et al. ‘Digital Forensics’. Techno Security’s Guide to E-Discovery and Digital Forensics. Elsevier, 2007. 33–63. Web.
---. Techno Security’s Guide to e-Discovery and Digital Forensics. Burlington, Mass: Syngress. Web. <http://www.sciencedirect.com/science/book/9781597492232>.
‘WIPO - World Intellectual Property Organization’. N.p., n.d. Web. <http://www.wipo.int/portal/en/index.html>.
‘World Legal Information Institute (WorldLII)’. N.p., n.d. Web. <http://www.worldlii.org/>.