1
What is Information Governance? And Why is it So Hard? - Debra Logan, http://blogs.gartner.com/debra_logan/2010/01/11/what-is-information-governance-and-why-is-it-so-hard/.
2
Defining Information Governance, http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/book/strategy-business-planning/9781118218303/chapter-1-the-onslaught-of-big-data-and-the-information-governance-imperative/chap01_sec001_html.
3
L. Duranti and P. C. Franks, Eds., Encyclopedia of archival science, Rowman & Littlefield, Lanham, 2015.
4
Generally Accepted Recordkeeping Principles, http://www.arma.org/r2/generally-accepted-br-recordkeeping-principles.
5
InfoGov Basics What is Info Gov?, http://www.infogovbasics.com/what-is-infogov/.
6
Home, https://www.igt.hscic.gov.uk/.
7
The IG Initiative Definition of Information Governance | Iron Mountain, http://www.ironmountain.com/Knowledge-Center/Reference-Library/View-by-Document-Type/General-Articles/T/The-IG-Initiative-Definition-of-Information-Governance.aspx.
8
INFORMATION GOVERNANCE INITIATIVE - Information Governance Initiative, https://www.opentext.de/file_source/OpenText/en_US/PDF/opentext-3rd-party-igi-infogov-snapshot-series-combined-en.pdf.
9
InfoGov Basics Information Governance Glossary, http://www.infogovbasics.com/resources/glossary/.
10
Glossaries « EDRM, http://www.edrm.net/resources/glossaries.
11
BS ISO/IEC 38500:2015 Information technology. Governance of IT for the organization, BSI, 2015.
12
BS ISO 26000:2010 Guidance on social responsibility, BSI, 2010.
13
BS EN ISO/IEC 27000:2017 : Information technology: Security techniques: Information security management systems: Overview and vocabulary, BSI, 2016.
14
BS ISO/IEC 27001:2013 Information technology. Security techniques. Information security management systems. Requirements, BSI, 2013.
15
BS ISO/IEC 27031:2011 Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity, BSI, 2011.
16
ISO IEC 27002 2013 Information Security Control Objectives, http://www.praxiom.com/iso-27002-objectives.htm.
17
BS ISO 31000:2009 Risk management. Principles and guidelines, BSI, 2010.
18
BS 31100:2011 Risk management. Code of practice and guidance for the implementation of BS ISO 31000, BSI, 2011.
19
BS ISO 30300:2011 Information and documentation. Management systems for records. Fundamentals and vocabulary, BSI, 2011.
20
BS ISO 30301:2011 Information and documentation. Management systems for records. Requirements, BSI, 2011.
21
BS ISO 15489-1:2016 Information and documentation. Records management. Concepts and principles, BSI, 2016.
22
Buckland, Michael K, Journal of the American Society for Information Science, 42, 351–360.
23
K. E. Himma and H. T. Tavani, Eds., The Handbook of Information and Computer Ethics, John Wiley & Sons, Inc., Hoboken, NJ, USA, 2008.
25
J. Dearnley and J. Feather, The wired world: an introduction to the theory and practice of the information society, Library Association, London, 2001.
26
J. Feather, The information society: a study of continuity and change, Facet Publishing, London, 6th ed., 2013.
27
A. Borgmann, Holding on to reality: the nature of information at the turn of the millennium, University of Chicago Press, Chicago, 1999.
28
V. Mayer-Schönberger, Delete: the virtue of forgetting in the digital age, Princeton University Press, Princeton, N.J., 2009.
29
Robert F. Smallwood, Information Governance: Concepts, Strategies, and Best Practices, http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9781118218303.
30
A. MacLennan, Information governance and assurance: reducing risk, promoting policy, Facet Publishing, London, 2014.
31
Ferguson, Kelly, KM World.
32
D. Haynes, Business Information Review, 2016, 33, 90–93.
33
P. P. Tallon, R. V. Ramirez and J. E. Short, Journal of Management Information Systems, 2013, 30, 141–178.
34
Performing Information Governance: A Step-by-Step Guide to Making Information Governance Work, IBM Press1.
35
J. Hagmann, Records Management Journal, 2013, 23, 228–240.
36
Taylor, Sheila, Municipal World, 126, 21–24.
37
Edited by David Levi-Faur, in The Oxford Handbook of Governance.
38
A. Donaldson and P. Walker, International Journal of Medical Informatics, 2004, 73, 281–284.
39
C. Ballard and International Business Machines Corporation. International Technical Support Organization, IBM information governance solutions, IBM Corp., International Technical Support Organization, Poughkeepsie, NY, 1st ed., 2014, vol. IBM redbooks.
40
Ferguson, Kelly, KM World.
41
E. Lomas, Records Management Journal, 2010, 20, 182–198.
42
D. Haynes, Business Information Review, 2016, 33, 90–93.
43
Barclay T. Blair | Essays in Information Governance (and more), https://iginitiative.com/tag/barclay-t-blair/.
44
J. Farrall and K. Rubenstein, Eds., Sanctions, Accountability and Governance in a Globalised World, Cambridge University Press, Cambridge, 2009.
45
C. Mallin, in Corporate governance, Oxford University Press, Oxford, 4th ed., 2013, pp. 1–11.
46
R. I. Tricker, Corporate governance: principles, policies, and practices, Oxford University Press, Oxford, Third edition., 2015.
49
G20/OECD Principles of Corporate Governance - OECD, https://www.oecd.org/corporate/principles-corporate-governance.htm.
50
The Sarbanes-Oxley Act 2002, http://www.soxlaw.com/.
51
Corporate governance | ICAEW | ICAEW, https://www.icaew.com/en/technical/corporate-governance.
52
Ethical Investment Research Services � Ceres, https://www.ceres.org/about-us/coalition/coalition-members/eiris.
53
R. Hawley, Hawley Committee, and KPMG IMPACT Programme, Information as an asset: a consultative report : the Board agenda, KPMG Impact Programme, London, 1995.
54
E. Shepherd, Records Management Journal, 2006, 16, 6–12.
56
WIPO - World Intellectual Property Organization, http://www.wipo.int/portal/en/index.html.
58
Executive Summary: The Advantages, Economics and Value of Reuse, https://www.gartner.com/doc/1406319?ref=SiteSearch&sthkw=information%20governance&fnl=search&srcId=1-3478922254.
59
J. McLeod and C. Hare, How to manage records in the e-environment, Routledge, London, 2nd ed., 2006, vol. Know how guides.
60
E. Shepherd and G. Yeo, Managing records: a handbook of principles and practice, Facet Publishing, London, 2003.
61
S. Bailey, Managing the crowd: rethinking records management for the Web 2.0 world, Facet, London, 2008.
62
Information Security: Principles and Practices, Second Edition, Pearson IT Certification2.
63
V. LeVeque, Information security: a strategic approach, Wiley, New York, 2006.
64
K. Brotby, Information Security Governance, John Wiley & Sons, Inc., Hoboken, NJ, USA, 2009.
65
Information Security: Principles and Practices, Second Edition, Pearson IT Certification2.
66
A. Calder and S. G. Watkins, Information security risk management for ISO27001/ISO27002, IT Governance Pub, Cambridgeshire, 2010.
69
G. Harmer, Governance of enterprise IT based on COBIT 5: a management guide, IT Governance Pub, Ely, Cambridgeshire, U.K., 2013.
70
8 Characteristics of good user requirements, http://www.slideshare.net/guest24d72f/8-characteristics-of-good-user-requirements-presentation.
71
C. Batini, C. Cappiello, C. Francalanci and A. Maurino, ACM Computing Surveys, 2009, 41, 1–52.
72
DCMI Metadata Basics, http://dublincore.org/metadata-basics/.
73
Floridi, Luciano, Philosophy & Technology, 26, 1–6.
75
D. Tapscott and A. D. Williams, Wikinomics: how mass collaboration changes everything, Atlantic, London, Expanded ed., 2008.
76
F. Ohlhorst, Ed., Big Data Analytics, John Wiley & Sons, Inc., Hoboken, NJ, USA, 2012.
77
V. Mayer-Schönberger and K. Cukier, Big data: a revolution that will transform how we live, work, and think, Houghton Mifflin Harcourt, Boston, 2013.
78
M. E. J. Newman, Networks: an introduction, Oxford University Press, Oxford, 2010.
80
An Introduction to Information System Risk Management - introduction-information-system-risk-management-1204, https://www.sans.org/reading-room/whitepapers/auditing/introduction-information-system-risk-management-1204.
81
J. Fraser and B. J. Simkins, Enterprise Risk Management, John Wiley & Sons, Inc., Hoboken, NJ, USA, 2009.
82,
DOI:10.1787/19934106 10.1787/9789264025516-en.
85
Project risk analysis using Monte Carlo Simulation | quantmleap, http://quantmleap.com/blog/2010/07/project-risk-management-and-the-application-of-monte-carlo-simulation/.
86
Overview | United Nations, http://www.un.org/en/sections/about-un/overview/index.html.
87
Universal Declaration of Human Rights | United Nations, http://www.un.org/en/universal-declaration-human-rights/.
88
Liberty, https://www.liberty-human-rights.org.uk/.
89
Home Page | Equality and Human Rights Commission, https://www.equalityhumanrights.com/en.
90
P. Legrand and R. Munday, Eds., Comparative Legal Studies: Traditions and Transitions, Cambridge University Press, Cambridge, 2003.
91
E. Finch and S. Fafinski, Legal skills, Oxford University Press, Oxford, United Kingdom, Fifth edition., 2015.
92
P. Harris, An introduction to law, Cambridge University Press, Cambridge, Seventh edition., 2007, vol. The law in context series.
93
S. Baase, A gift of fire: social, legal, and ethical issues for computing and the Internet, Pearson Prentice Hall, Harlow, 3rd ed., 2009.
94
V. Shiva, Protect or plunder?: understanding intellectual property rights, Zed, London, 2001, vol. Global issues series (Zed Books).
95
Who owns information: The defining battle of our time? - RSA, https://www.thersa.org/discover/publications-and-articles/rsa-blogs/2013/01/who-owns-information-the-defining-battle-of-our-time-.
96
G. Lester, When Should State Secrets Stay Secret?: Accountability, Democratic Governance, and Intelligence, Cambridge University Press, Cambridge, 2015.
97
D. I. Bainbridge and D. I. Bainbridge, Introduction to information technology law, Pearson/Longman, Harlow, 6th ed., 2008.
98
P. Torremans, Intellectual property and human rights: enhanced edition of Copyright and human rights, Kluwer, Austin, Section ed., 2008, vol. Information law series.
99
I. J. Lloyd, Information technology law, Oxford University Press, Oxford, United Kingdom, Seventh edition., 2014.
100
World Legal Information Institute (WorldLII), http://www.worldlii.org/.
101
AsianLII - Asian Legal Information Institute, http://www.asianlii.org/.
102
Australasian Legal Information Institute (AustLII), http://www.austlii.edu.au/.
103
British and Irish Legal Information Institute, http://www.bailii.org/.
104
CommonLII - Commonwealth Legal Information Institute, http://www.commonlii.org/.
112
Overview of privacy legislation in Canada - Office of the Privacy Commissioner of Canada, https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/02_05_d_15/.
113
Privacy International |, https://www.privacyinternational.org/.
115
Freedom of Information Laws | Global Investigative Journalism Network, http://gijn.org/resources/freedom-of-information-laws/.
116
P. Molnár, Ed., Free speech and censorship around the globe, Central European University Press, Budapest, 2015.
117
T. Mendel, Communication Law and Policy, 2016, 21, 465–491.
118
A. Flinn and H. Jones, Freedom of information: open access, empty archives?, Routledge, London, 2009.
119
Open Government Partnership |, http://www.opengovpartnership.org/.
120
Open Government Manifesto � UK Open Government Network, http://www.opengovernment.org.uk/open-government-manifesto/.
121
WhatDoTheyKnow - Make and browse Freedom of Information (FOI) requests, https://www.whatdotheyknow.com/.
122
Information Tribunal > Search, http://informationrights.decisions.tribunals.gov.uk//Public/search.aspx.
124
A digital forensic practitioner’s guide to giving evidence in a court of law - viewcontent.cgi, http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1032&context=adf.
125
L. Daniel and L. Daniel, Digital forensics for legal professionals: understanding digital evidence from the warrant to the courtroom, Syngress, [Place of publication not identified], 2012.
126
J. Wiles, Techno security’s guide to e-discovery and digital forensics, Syngress, Burlington, Mass.
127
R. Bryant, Investigating digital crime, J. Wiley & Sons, Chichester, 2008.
128
J. Wiles, T. Alexander, S. Ashlock, S. Ballou, L. Depew, G. Dominguez, A. Ehuan, R. Green, J. Long, K. Reis, A. Schroader, K. Schuler and E. Thompson, in Techno Security’s Guide to E-Discovery and Digital Forensics, Elsevier, 2007, pp. 33–63.
129
R. F. Smallwood and V. Gurushanta, Managing Canadian electronic records: electronic records management, document management & e-discovery in Canada : a management guide, Imerge Consulting, [Lexington, Mass.], New [ed.]., 2011.
130
J. Dykstra and A. T. Sherman, Digital Investigation, 2012, 9, S90–S98.
131
K. N. Myers, Ed., Business Continuity Strategies, John Wiley & Sons, Inc., Hoboken, NJ, USA, 2012.
132
J. Lindström, S. Samuelsson and A. Hägerfors, Disaster Prevention and Management: An International Journal, 2010, 19, 243–255.
133
G. Matthews, Y. Smith and G. Knowles, Library & Archival Security, 2004, 19, 3–23.
134
R. Craig, T. Selzer and J. Seymour, Journal of the Society of Archivists, 2006, 27, 187–199.
135
G. J. Fell, in Decoding the IT Value Problem, John Wiley & Sons, Inc., Hoboken, NJ, USA, 2013, pp. 114–125.
136
J. Proffitt, A guide to outsourcing records management, Routledge, London, 2011.
137
B. Vagadia, Outsourcing to India - a legal handbook, Springer, Berlin, 2007.