‘8 Characteristics of Good User Requirements’ <http://www.slideshare.net/guest24d72f/8-characteristics-of-good-user-requirements-presentation>
‘A Digital Forensic Practitioner’s Guide to Giving Evidence in a Court of Law - Viewcontent.Cgi’ <http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1032&amp;context=adf>
‘An Introduction to Information System Risk Management - Introduction-Information-System-Risk-Management-1204’ <https://www.sans.org/reading-room/whitepapers/auditing/introduction-information-system-risk-management-1204>
‘Anonymisation Code of Practice’ <https://ico.org.uk/media/1061/anonymisation-code.pdf>
‘AsianLII - Asian Legal Information Institute’ <http://www.asianlii.org/>
‘Australasian Legal Information Institute (AustLII)’ <http://www.austlii.edu.au/>
Baase S, A Gift of Fire: Social, Legal, and Ethical Issues for Computing and the Internet (3rd ed, Pearson Prentice Hall 2009)
Bailey S, Managing the Crowd: Rethinking Records Management for the Web 2.0 World (Facet 2008) <http://www.vlebooks.com/vleweb/product/openreader?id=UCL&amp;isbn=9781856047906>
Bainbridge DI and Bainbridge DI, Introduction to Information Technology Law (6th ed, Pearson/Longman 2008)
Ballard C and International Business Machines Corporation. International Technical Support Organization, IBM Information Governance Solutions, vol IBM redbooks (1st ed, IBM Corp, International Technical Support Organization 2014) <http://proquest.safaribooksonline.com/?uiCode=ucl&amp;xmlId=0738439517>
‘Barclay T. Blair | Essays in Information Governance (and More)’ <https://iginitiative.com/tag/barclay-t-blair/>
Batini C and others, ‘Methodologies for Data Quality Assessment and Improvement’ (2009) 41 ACM Computing Surveys 1
Borgmann A, Holding on to Reality: The Nature of Information at the Turn of the Millennium (University of Chicago Press 1999)
‘British and Irish Legal Information Institute’ <http://www.bailii.org/>
Brotby K, Information Security Governance (John Wiley & Sons, Inc 2009) <http://doi.wiley.com/10.1002/9780470476017>
Bryant R, Investigating Digital Crime (J Wiley & Sons 2008)
BS 31100:2011                Risk Management. Code of Practice and Guidance for the Implementation of BS ISO 31000 (BSI 2011) <https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030228064>
BS EN ISO/IEC 27000:2017 : Information Technology:  Security Techniques: Information Security Management Systems:  Overview and Vocabulary (BSI 2016) <https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030347477>
BS ISO 15489-1:2016                Information and Documentation. Records Management. Concepts and Principles (BSI 2016) <https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030298891>
BS ISO 26000:2010                Guidance on Social Responsibility (BSI 2010) <https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030140726>
BS ISO 30300:2011                Information and Documentation. Management Systems for Records. Fundamentals and Vocabulary (BSI 2011) <https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030205371>
BS ISO 30301:2011                Information and Documentation. Management Systems for Records. Requirements (BSI 2011) <https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030205374>
BS ISO 31000:2009                Risk Management. Principles and Guidelines (BSI 2010) <https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030202344>
BS ISO/IEC 27001:2013                Information Technology. Security Techniques. Information Security Management Systems. Requirements (BSI 2013) <https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030328895>
BS ISO/IEC 27031:2011                Information Technology. Security Techniques. Guidelines for Information and Communication Technology Readiness for Business Continuity (BSI 2011) <https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030168355>
BS ISO/IEC 38500:2015                Information Technology. Governance of IT for the Organization (BSI 2015) <https://bsol.bsigroup.com/Bibliographic/BibliographicInfoData/000000000030272233>
Buckland, Michael K, ‘Information as Thing’ 42 Journal of the American Society for Information Science 351 <http://search.proquest.com/docview/1301244196?rfr_id=info%3Axri%2Fsid%3Aprimo>
Calder A and Watkins SG, Information Security Risk Management for ISO27001/ISO27002 (IT Governance Pub 2010) <http://www.jstor.org/stable/10.2307/j.ctt5hh7jd>
‘CCTV Code of Practice’ <https://ico.org.uk/media/1542/cctv-code-of-practice.pdf>
‘CommonLII - Commonwealth Legal Information Institute’ <http://www.commonlii.org/>
‘Corporate Governance | ICAEW | ICAEW’ <https://www.icaew.com/en/technical/corporate-governance>
‘COSO in the Cyber Age_FULL_r11.Pdf’ <https://www.coso.org/documents/COSO%20in%20the%20Cyber%20Age_FULL_r11.pdf>
Craig R, Selzer T and Seymour J, ‘There Is Disaster Planning and There Is Reality—the Cayman Islands National Archive (CINA) Experience with Hurricane Ivan 1’ (2006) 27 Journal of the Society of Archivists 187
‘CREATe-Working-Paper-2014-01.Pdf’ <https://zenodo.org/record/8381/files/CREATe-Working-Paper-2014-01.pdf>
Daniel L and Daniel L, Digital Forensics for Legal Professionals: Understanding Digital Evidence from the Warrant to the Courtroom (Syngress 2012) <https://learning.oreilly.com/library/view/digital-forensics-for/9781597496438/?ar=>
‘Data Sharing Code of Practice’ <https://ico.org.uk/media/for-organisations/documents/1068/data_sharing_code_of_practice.pdf>
‘DCMI Metadata Basics’ <http://dublincore.org/metadata-basics/>
Dearnley J and Feather J, The Wired World: An Introduction to the Theory and Practice of the Information Society (Library Association 2001)
‘Defining Information Governance’ <http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/book/strategy-business-planning/9781118218303/chapter-1-the-onslaught-of-big-data-and-the-information-governance-imperative/chap01_sec001_html>
‘Diversity and Corporate Governance - DiversityAndCorporateGovernance.Pdf’ <http://tools.ashridge.org.uk/website/IC.nsf/wFARATT/Diversity%20and%20Good%20Governance/$file/DiversityAndCorporateGovernance.pdf>
Donaldson A and Walker P, ‘Information Governance—a View from the NHS’ (2004) 73 International Journal of Medical Informatics 281
Duranti L and Franks PC (eds), Encyclopedia of Archival Science (Rowman & Littlefield 2015) <https://ebookcentral.proquest.com/lib/ucl/detail.action?docID=2076364>
Dykstra J and Sherman AT, ‘Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Computing: Exploring and Evaluating Tools, Trust, and Techniques’ (2012) 9 Digital Investigation S90
Edited by David Levi-Faur, ‘Information And Governing: Cybernetic Models Of Governance’, The Oxford Handbook of Governance <http://www.oxfordhandbooks.com.libproxy.ucl.ac.uk/view/10.1093/oxfordhb/9780199560530.001.0001/oxfordhb-9780199560530-e-8>
‘Ethical Investment Research Services Â�� Ceres’ <https://www.ceres.org/about-us/coalition/coalition-members/eiris>
‘Executive Summary: The Advantages, Economics and Value of Reuse’ <https://www.gartner.com/doc/1406319?ref=SiteSearch&amp;sthkw=information%20governance&amp;fnl=search&amp;srcId=1-3478922254>
Farrall J and Rubenstein K (eds), Sanctions, Accountability and Governance in a Globalised World (Cambridge University Press 2009) <http://ebooks.cambridge.org/ref/id/CBO9780511776847>
Feather J, The Information Society: A Study of Continuity and Change (6th ed, Facet Publishing 2013) <https://ebookcentral.proquest.com/lib/ucl/detail.action?docID=4923761>
Fell GJ, ‘Outsourcing IT’, Decoding the IT Value Problem (John Wiley & Sons, Inc 2013) <http://doi.wiley.com/10.1002/9781118757512.ch10>
Ferguson, Kelly, ‘Information Governance’ 18 KM World <http://search.proquest.com.libproxy.ucl.ac.uk/docview/197266433?rfr_id=info%3Axri%2Fsid%3Aprimo>
——, ‘Information Governance’ 18 KM World <http://search.proquest.com.libproxy.ucl.ac.uk/docview/197266433?rfr_id=info%3Axri%2Fsid%3Aprimo>
Finch E and Fafinski S, Legal Skills (Fifth edition, Oxford University Press 2015)
Flinn A and Jones H, Freedom of Information: Open Access, Empty Archives? (Routledge 2009)
Floridi, Luciano, ‘Information Quality’ 26 Philosophy & Technology 1 <http://search.proquest.com.libproxy.ucl.ac.uk/docview/1291912830?rfr_id=info%3Axri%2Fsid%3Aprimo>
Fraser J and Simkins BJ, Enterprise Risk Management (John Wiley & Sons, Inc 2009) <http://doi.wiley.com/10.1002/9781118267080>
‘Freedom of Information Laws | Global Investigative Journalism Network’ <http://gijn.org/resources/freedom-of-information-laws/>
‘G20/OECD Principles of Corporate Governance - OECD’ <https://www.oecd.org/corporate/principles-corporate-governance.htm>
‘Generally Accepted Recordkeeping Principles’ <http://www.arma.org/r2/generally-accepted-br-recordkeeping-principles>
‘Glossaries « EDRM’ <http://www.edrm.net/resources/glossaries>
‘Guide for Conducting Risk Assessments - Nistspecialpublication800-30r1.Pdf’ <http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf>
Hagmann J, ‘Information Governance – beyond the Buzz’ (2013) 23 Records Management Journal 228
Harmer G, Governance of Enterprise IT Based on COBIT 5: A Management Guide (IT Governance Pub 2013) <https://www.jstor.org/stable/10.2307/j.ctt7zsxfv>
Harris P, An Introduction to Law, vol The law in context series (Seventh edition, Cambridge University Press 2007)
Hawley R, Hawley Committee, and KPMG IMPACT Programme, Information as an Asset: A Consultative Report : The Board Agenda (KPMG Impact Programme 1995)
Haynes D, ‘Social Media, Risk and Information Governance’ (2016) 33 Business Information Review 90
——, ‘Social Media, Risk and Information Governance’ (2016) 33 Business Information Review 90
Himma KE and Tavani HT (eds), The Handbook of Information and Computer Ethics (John Wiley & Sons, Inc 2008) <http://doi.wiley.com/10.1002/9780470281819>
‘Home’ <https://www.igt.hscic.gov.uk/>
‘Home Page | Equality and Human Rights Commission’ <https://www.equalityhumanrights.com/en>
‘InfoGov Basics Information Governance Glossary’ <http://www.infogovbasics.com/resources/glossary/>
‘InfoGov Basics What Is Info Gov?’ <http://www.infogovbasics.com/what-is-infogov/>
‘INFORMATION GOVERNANCE INITIATIVE - Information Governance Initiative’ <https://www.opentext.de/file_source/OpenText/en_US/PDF/opentext-3rd-party-igi-infogov-snapshot-series-combined-en.pdf>
Information Security: Principles and Practices, Second Edition (Pearson IT Certification2) <http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9780133589412>
—— (Pearson IT Certification2) <http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9780133589412>
‘Information Tribunal > Search’ <http://informationrights.decisions.tribunals.gov.uk//Public/search.aspx>
‘ISO IEC 27002 2013 Information Security Control Objectives’ <http://www.praxiom.com/iso-27002-objectives.htm>
‘Journal of Intellectual Capital                                                  Table Of Contents: Volume 1 Issue 1’ <http://www.emeraldinsight.com.libproxy.ucl.ac.uk/toc/jic/1/1>
Legrand P and Munday R (eds), Comparative Legal Studies: Traditions and Transitions (Cambridge University Press 2003) <http://ebooks.cambridge.org/ref/id/CBO9780511522260>
Lester G, When Should State Secrets Stay Secret?: Accountability, Democratic Governance, and Intelligence (Cambridge University Press 2015) <http://dx.doi.org/10.1017/CBO9781107337015>
LeVeque V, Information Security: A Strategic Approach (Wiley 2006) <http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5989138>
‘Liberty’ <https://www.liberty-human-rights.org.uk/>
Lindström J, Samuelsson S and Hägerfors A, ‘Business Continuity Planning Methodology’ (2010) 19 Disaster Prevention and Management: An International Journal 243
Lloyd IJ, Information Technology Law (Seventh edition, Oxford University Press 2014)
Lomas E, ‘Information Governance: Information Security and Access within a UK Context’ (2010) 20 Records Management Journal 182
MacLennan A, Information Governance and Assurance: Reducing Risk, Promoting Policy (Facet Publishing 2014)
Mallin C, ‘Introduction’, Corporate governance (4th ed, Oxford University Press 2013) <https://contentstore.cla.co.uk/secure/link?id=b03226c7-6053-ec11-981f-0050f2f09783>
Matthews G, Smith Y and Knowles G, ‘The Disaster Control Plan’ (2004) 19 Library & Archival Security 3
Mayer-Schönberger V, Delete: The Virtue of Forgetting in the Digital Age (Princeton University Press 2009)
Mayer-Schönberger V and Cukier K, Big Data: A Revolution That Will Transform How We Live, Work, and Think (Houghton Mifflin Harcourt 2013)
McLeod J and Hare C, How to Manage Records in the E-Environment, vol Know how guides (2nd ed, Routledge 2006)
Mendel T, ‘The Fiftieth Anniversary of the Freedom of Information Act: How It Measures up Against International Standards and Other Laws’ (2016) 21 Communication Law and Policy 465
‘MIGUEL_MALHEIROS_844263_phd_thesis_malheiros.Pdf._COPYRIGHT_REMOVED..Pdf’ <http://discovery.ucl.ac.uk/1427369/2/MIGUEL_MALHEIROS_844263_phd_thesis_malheiros.pdf._COPYRIGHT_REMOVED..pdf>
Molnár P (ed), Free Speech and Censorship around the Globe (Central European University Press 2015) <http://www.jstor.org/stable/10.7829/j.ctt13wztv7>
‘Moral Maze - The Morailty of Business Radio 4 Podcast’ <https://learningonscreen.ac.uk/ondemand/index.php/prog/0CA3B385?bcast=121840888>
Myers KN (ed), Business Continuity Strategies (John Wiley & Sons, Inc 2012) <http://doi.wiley.com/10.1002/9781119196730>
Newman MEJ, Networks: An Introduction (Oxford University Press 2010) <https://ucl.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma9930800789604761&amp;context=L&amp;vid=44UCL_INST:UCL_VU2&amp;lang=en&amp;search_scope=UCLLibraryCatalogue&amp;adaptor=Local%20Search%20Engine&amp;isFrbr=true&amp;tab=UCLLibraryCatalogue&amp;query=any,contains,Networks:%20an%20introduction&amp;sortby=date_d&amp;facet=frbrgroupid,include,9020048350542987714&amp;offset=0>
‘OECD Reviews of Risk Management Policies, Books / OECD Reviews of Risk Management Policies / OECD Reviews of Risk Management Policies: Norway 2006:Information Security’ <http://www.oecd-ilibrary.org.libproxy.ucl.ac.uk/science-and-technology/oecd-reviews-of-risk-management-policies-norway-2006_9789264025516-en>
Ohlhorst F (ed), Big Data Analytics (John Wiley & Sons, Inc 2012) <http://doi.wiley.com/10.1002/9781119205005>
‘Open Government Manifesto Â�� UK Open Government Network’ <http://www.opengovernment.org.uk/open-government-manifesto/>
‘Open Government Partnership |’ <http://www.opengovpartnership.org/>
‘Overview | United Nations’ <http://www.un.org/en/sections/about-un/overview/index.html>
‘Overview of Privacy Legislation in Canada - Office of the Privacy Commissioner of Canada’ <https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/02_05_d_15/>
‘Overview of the General Data Protection Regulation (GDPR)’ <https://ico.org.uk/for-organisations/data-protection-reform/overview-of-the-gdpr/>
Performing Information Governance: A Step-by-Step Guide to Making Information Governance Work (IBM Press1) <http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9780133385618>
‘Privacy by Design’ <https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-law-enforcement-processing/accountability-and-governance/data-protection-impact-assessments/>
‘Privacy International |’ <https://www.privacyinternational.org/>
‘Privacy-Autonomy-and-the-Internet’ <https://www.cambridge.org/core/services/aop-cambridge-core/content/view/F745701FFEA03DD2CF5BCBDAE47FDEEA/9781107337428c2_p24-52_CBO.pdf/privacy-autonomy-and-the-internet.pdf>
Proffitt J, A Guide to Outsourcing Records Management (Routledge 2011)
‘Project Risk Analysis Using Monte Carlo Simulation | Quantmleap’ <http://quantmleap.com/blog/2010/07/project-risk-management-and-the-application-of-monte-carlo-simulation/>
‘Quick_guide_to_the_employment_practices_code’ <https://ico.org.uk/media/for-organisations/documents/1128/quick_guide_to_the_employment_practices_code.pdf>
‘Risk Management on JSTOR’ <http://www.jstor.org.libproxy.ucl.ac.uk/journal/riskmanagement>
Robert F. Smallwood, ‘Information Governance: Concepts, Strategies, and Best Practices’ <http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9781118218303>
‘Search’ <https://ico.org.uk/ESDWebPages/Search>
Shepherd E, ‘Why Are Records in the Public Sector Organizational Assets?’ (2006) 16 Records Management Journal 6
Shepherd E and Yeo G, Managing Records: A Handbook of Principles and Practice (Facet Publishing 2003)
Shiva V, Protect or Plunder?: Understanding Intellectual Property Rights, vol Global issues series (Zed Books) (Zed 2001)
Smallwood RF and Gurushanta V, Managing Canadian Electronic Records: Electronic Records Management, Document Management & e-Discovery in Canada : A Management Guide (New [ed], Imerge Consulting 2011)
Tallon PP, Ramirez RV and Short JE, ‘The Information Artifact in IT Governance: Toward a Theory of Information Governance’ (2013) 30 Journal of Management Information Systems 141
Tapscott D and Williams AD, Wikinomics: How Mass Collaboration Changes Everything (Expanded ed, Atlantic 2008)
Taylor, Sheila, ‘Information Governance’ 126 Municipal World 21 <http://search.proquest.com.libproxy.ucl.ac.uk/docview/1781342715?rfr_id=info%3Axri%2Fsid%3Aprimo>
‘The IG Initiative Definition of Information Governance | Iron Mountain’ <http://www.ironmountain.com/Knowledge-Center/Reference-Library/View-by-Document-Type/General-Articles/T/The-IG-Initiative-Definition-of-Information-Governance.aspx>
‘THE ORANGE BOOK 2004.Pdf - Orange_book.Pdf’ <https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/220647/orange_book.pdf>
‘The Sarbanes-Oxley Act 2002’ <http://www.soxlaw.com/>
‘The-Cost-of-Cyber-Crime-Full-Report.Pdf’ <https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60943/the-cost-of-cyber-crime-full-report.pdf>
‘Theories of the Information Society, Third Edition - Information-Society-Theories.Pdf’ <https://cryptome.org/2013/01/aaron-swartz/Information-Society-Theories.pdf>
Torremans P, Intellectual Property and Human Rights: Enhanced Edition of Copyright and Human Rights, vol Information law series (Section ed, Kluwer 2008)
Tricker RI, Corporate Governance: Principles, Policies, and Practices (Third edition, Oxford University Press 2015)
‘Universal Declaration of Human Rights | United Nations’ <http://www.un.org/en/universal-declaration-human-rights/>
‘User Behaviour Observational Study: User Behaviour Observational Study Final Report - Bhimani_ubirdfinalreport.Pdf’ <http://discovery.ucl.ac.uk/1472604/7/Bhimani_ubirdfinalreport.pdf>
Vagadia B, Outsourcing to India - a Legal Handbook (Springer 2007) <http://dx.doi.org/10.1007/978-3-540-72220-5>
‘What Is Information Governance? And Why Is It So Hard? - Debra Logan’ <http://blogs.gartner.com/debra_logan/2010/01/11/what-is-information-governance-and-why-is-it-so-hard/>
‘WhatDoTheyKnow - Make and Browse Freedom of Information (FOI) Requests’ <https://www.whatdotheyknow.com/>
‘Who Owns Information: The Defining Battle of Our Time? - RSA’ <https://www.thersa.org/discover/publications-and-articles/rsa-blogs/2013/01/who-owns-information-the-defining-battle-of-our-time->
Wiles J, Techno Security’s Guide to e-Discovery and Digital Forensics (Syngress) <http://www.sciencedirect.com/science/book/9781597492232>
——, ‘Digital Forensics’, Techno Security’s Guide to E-Discovery and Digital Forensics (Elsevier 2007)
‘WIPO - World Intellectual Property Organization’ <http://www.wipo.int/portal/en/index.html>
‘World Legal Information Institute (WorldLII)’ <http://www.worldlii.org/>