1.
What is Information Governance? And Why is it So Hard? - Debra Logan, http://blogs.gartner.com/debra_logan/2010/01/11/what-is-information-governance-and-why-is-it-so-hard/.
2.
Defining Information Governance, http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/book/strategy-business-planning/9781118218303/chapter-1-the-onslaught-of-big-data-and-the-information-governance-imperative/chap01_sec001_html.
3.
Duranti, L., Franks, P.C. eds: Encyclopedia of archival science. Rowman & Littlefield, Lanham (2015).
4.
Generally Accepted Recordkeeping Principles, http://www.arma.org/r2/generally-accepted-br-recordkeeping-principles.
5.
InfoGov Basics What is Info Gov?, http://www.infogovbasics.com/what-is-infogov/.
6.
Home, https://www.igt.hscic.gov.uk/.
7.
The IG Initiative Definition of Information Governance | Iron Mountain, http://www.ironmountain.com/Knowledge-Center/Reference-Library/View-by-Document-Type/General-Articles/T/The-IG-Initiative-Definition-of-Information-Governance.aspx.
8.
INFORMATION GOVERNANCE INITIATIVE - Information Governance Initiative, https://www.opentext.de/file_source/OpenText/en_US/PDF/opentext-3rd-party-igi-infogov-snapshot-series-combined-en.pdf.
9.
InfoGov Basics Information Governance Glossary, http://www.infogovbasics.com/resources/glossary/.
10.
Glossaries « EDRM, http://www.edrm.net/resources/glossaries.
11.
BS ISO/IEC 38500:2015                Information technology. Governance of IT for the organization. BSI (2015).
12.
BS ISO 26000:2010                Guidance on social responsibility. BSI (2010).
13.
BS EN ISO/IEC 27000:2017 : Information technology:  Security techniques: Information security management systems:  Overview and vocabulary. BSI (2016).
14.
BS ISO/IEC 27001:2013                Information technology. Security techniques. Information security management systems. Requirements. BSI (2013).
15.
BS ISO/IEC 27031:2011                Information technology. Security techniques. Guidelines for information and communication technology readiness for business continuity. BSI (2011).
16.
ISO IEC 27002 2013 Information Security Control Objectives, http://www.praxiom.com/iso-27002-objectives.htm.
17.
BS ISO 31000:2009                Risk management. Principles and guidelines. BSI (2010).
18.
BS 31100:2011                Risk management. Code of practice and guidance for the implementation of BS ISO 31000. BSI (2011).
19.
BS ISO 30300:2011                Information and documentation. Management systems for records. Fundamentals and vocabulary. BSI (2011).
20.
BS ISO 30301:2011                Information and documentation. Management systems for records. Requirements. BSI (2011).
21.
BS ISO 15489-1:2016                Information and documentation. Records management. Concepts and principles. BSI (2016).
22.
Buckland, Michael K: Information as Thing. Journal of the American Society for Information Science. 42, 351–360.
23.
Himma, K.E., Tavani, H.T. eds: The Handbook of Information and Computer Ethics. John Wiley & Sons, Inc., Hoboken, NJ, USA (2008). https://doi.org/10.1002/9780470281819.
24.
Theories of the Information Society, Third Edition - Information-Society-Theories.pdf, https://cryptome.org/2013/01/aaron-swartz/Information-Society-Theories.pdf.
25.
Dearnley, J., Feather, J.: The wired world: an introduction to the theory and practice of the information society. Library Association, London (2001).
26.
Feather, J.: The information society: a study of continuity and change. Facet Publishing, London (2013).
27.
Borgmann, A.: Holding on to reality: the nature of information at the turn of the millennium. University of Chicago Press, Chicago (1999).
28.
Mayer-Schönberger, V.: Delete: the virtue of forgetting in the digital age. Princeton University Press, Princeton, N.J. (2009).
29.
Robert F. Smallwood: Information Governance: Concepts, Strategies, and Best Practices, http://proquest.safaribooksonline.com.libproxy.ucl.ac.uk/9781118218303.
30.
MacLennan, A.: Information governance and assurance: reducing risk, promoting policy. Facet Publishing, London (2014).
31.
Ferguson, Kelly: Information Governance. KM World. 18,.
32.
Haynes, D.: Social media, risk and information governance. Business Information Review. 33, 90–93 (2016). https://doi.org/10.1177/0266382116651781.
33.
Tallon, P.P., Ramirez, R.V., Short, J.E.: The Information Artifact in IT Governance: Toward a Theory of Information Governance. Journal of Management Information Systems. 30, 141–178 (2013). https://doi.org/10.2753/MIS0742-1222300306.
34.
Performing Information Governance: A Step-by-Step Guide to Making Information Governance Work. IBM Press1.
35.
Hagmann, J.: Information governance – beyond the buzz. Records Management Journal. 23, 228–240 (2013). https://doi.org/10.1108/RMJ-04-2013-0008.
36.
Taylor, Sheila: Information Governance. Municipal World. 126, 21–24.
37.
Edited by David Levi-Faur: Information And Governing: Cybernetic Models Of Governance. In: The Oxford Handbook of Governance.
38.
Donaldson, A., Walker, P.: Information governance—a view from the NHS. International Journal of Medical Informatics. 73, 281–284 (2004). https://doi.org/10.1016/j.ijmedinf.2003.11.009.
39.
Ballard, C., International Business Machines Corporation. International Technical Support Organization: IBM information governance solutions. IBM Corp., International Technical Support Organization, Poughkeepsie, NY (2014).
40.
Ferguson, Kelly: Information Governance. KM World. 18,.
41.
Lomas, E.: Information governance: information security and access within a UK context. Records Management Journal. 20, 182–198 (2010). https://doi.org/10.1108/09565691011064322.
42.
Haynes, D.: Social media, risk and information governance. Business Information Review. 33, 90–93 (2016). https://doi.org/10.1177/0266382116651781.
43.
Barclay T. Blair | Essays in Information Governance (and more), https://iginitiative.com/tag/barclay-t-blair/.
44.
Farrall, J., Rubenstein, K. eds: Sanctions, Accountability and Governance in a Globalised World. Cambridge University Press, Cambridge (2009). https://doi.org/10.1017/CBO9780511776847.
45.
Mallin, C.: Introduction. In: Corporate governance. pp. 1–11. Oxford University Press, Oxford (2013).
46.
Tricker, R.I.: Corporate governance: principles, policies, and practices. Oxford University Press, Oxford (2015).
47.
Diversity and Corporate Governance - DiversityAndCorporateGovernance.pdf, http://tools.ashridge.org.uk/website/IC.nsf/wFARATT/Diversity%20and%20Good%20Governance/$file/DiversityAndCorporateGovernance.pdf.
48.
Moral Maze - The morailty of business Radio 4 Podcast, https://learningonscreen.ac.uk/ondemand/index.php/prog/0CA3B385?bcast=121840888.
49.
G20/OECD Principles of Corporate Governance - OECD, https://www.oecd.org/corporate/principles-corporate-governance.htm.
50.
The Sarbanes-Oxley Act 2002, http://www.soxlaw.com/.
51.
Corporate governance | ICAEW | ICAEW, https://www.icaew.com/en/technical/corporate-governance.
52.
Ethical Investment Research Services � Ceres, https://www.ceres.org/about-us/coalition/coalition-members/eiris.
53.
Hawley, R., Hawley Committee, KPMG IMPACT Programme: Information as an asset: a consultative report : the Board agenda. KPMG Impact Programme, London (1995).
54.
Shepherd, E.: Why are records in the public sector organizational assets? Records Management Journal. 16, 6–12 (2006). https://doi.org/10.1108/09565690610654747.
55.
Journal of Intellectual Capital                                                  Table Of Contents: Volume 1 Issue 1.
56.
WIPO - World Intellectual Property Organization, http://www.wipo.int/portal/en/index.html.
57.
CREATe-Working-Paper-2014-01.pdf, https://zenodo.org/record/8381/files/CREATe-Working-Paper-2014-01.pdf.
58.
Executive Summary: The Advantages, Economics and Value of Reuse, https://www.gartner.com/doc/1406319?ref=SiteSearch&sthkw=information%20governance&fnl=search&srcId=1-3478922254.
59.
McLeod, J., Hare, C.: How to manage records in the e-environment. Routledge, London (2006).
60.
Shepherd, E., Yeo, G.: Managing records: a handbook of principles and practice. Facet Publishing, London (2003).
61.
Bailey, S.: Managing the crowd: rethinking records management for the Web 2.0 world. Facet, London (2008).
62.
Information Security: Principles and Practices, Second Edition. Pearson IT Certification2.
63.
LeVeque, V.: Information security: a strategic approach. Wiley, New York (2006).
64.
Brotby, K.: Information Security Governance. John Wiley & Sons, Inc., Hoboken, NJ, USA (2009). https://doi.org/10.1002/9780470476017.
65.
Information Security: Principles and Practices, Second Edition. Pearson IT Certification2.
66.
Calder, A., Watkins, S.G.: Information security risk management for ISO27001/ISO27002. IT Governance Pub, Cambridgeshire (2010).
67.
the-cost-of-cyber-crime-full-report.pdf, https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60943/the-cost-of-cyber-crime-full-report.pdf.
68.
COSO in the Cyber Age_FULL_r11.pdf, https://www.coso.org/documents/COSO%20in%20the%20Cyber%20Age_FULL_r11.pdf.
69.
Harmer, G.: Governance of enterprise IT based on COBIT 5: a management guide. IT Governance Pub, Ely, Cambridgeshire, U.K. (2013).
70.
8 Characteristics of good user requirements, http://www.slideshare.net/guest24d72f/8-characteristics-of-good-user-requirements-presentation.
71.
Batini, C., Cappiello, C., Francalanci, C., Maurino, A.: Methodologies for data quality assessment and improvement. ACM Computing Surveys. 41, 1–52 (2009). https://doi.org/10.1145/1541880.1541883.
72.
DCMI Metadata Basics, http://dublincore.org/metadata-basics/.
73.
Floridi, Luciano: Information Quality. Philosophy & Technology. 26, 1–6.
74.
User Behaviour Observational Study: User Behaviour Observational Study Final Report - Bhimani_ubirdfinalreport.pdf, http://discovery.ucl.ac.uk/1472604/7/Bhimani_ubirdfinalreport.pdf.
75.
Tapscott, D., Williams, A.D.: Wikinomics: how mass collaboration changes everything. Atlantic, London (2008).
76.
Ohlhorst, F. ed: Big Data Analytics. John Wiley & Sons, Inc., Hoboken, NJ, USA (2012). https://doi.org/10.1002/9781119205005.
77.
Mayer-Schönberger, V., Cukier, K.: Big data: a revolution that will transform how we live, work, and think. Houghton Mifflin Harcourt, Boston (2013).
78.
Newman, M.E.J.: Networks: an introduction. Oxford University Press, Oxford (2010).
79.
Risk Management on JSTOR. (9394).
80.
An Introduction to Information System Risk Management - introduction-information-system-risk-management-1204, https://www.sans.org/reading-room/whitepapers/auditing/introduction-information-system-risk-management-1204.
81.
Fraser, J., Simkins, B.J.: Enterprise Risk Management. John Wiley & Sons, Inc., Hoboken, NJ, USA (2009). https://doi.org/10.1002/9781118267080.
82.
OECD Reviews of Risk Management Policies, Books / OECD Reviews of Risk Management Policies / OECD Reviews of Risk Management Policies: Norway 2006:Information Security. https://doi.org/10.1787/19934106  10.1787/9789264025516-en.
83.
THE ORANGE BOOK 2004.pdf - orange_book.pdf, https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/220647/orange_book.pdf.
84.
Guide for conducting risk assessments - nistspecialpublication800-30r1.pdf, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf.
85.
Project risk analysis using Monte Carlo Simulation | quantmleap, http://quantmleap.com/blog/2010/07/project-risk-management-and-the-application-of-monte-carlo-simulation/.
86.
Overview | United Nations, http://www.un.org/en/sections/about-un/overview/index.html.
87.
Universal Declaration of Human Rights | United Nations, http://www.un.org/en/universal-declaration-human-rights/.
88.
Liberty, https://www.liberty-human-rights.org.uk/.
89.
Home Page | Equality and Human Rights Commission, https://www.equalityhumanrights.com/en.
90.
Legrand, P., Munday, R. eds: Comparative Legal Studies: Traditions and Transitions. Cambridge University Press, Cambridge (2003). https://doi.org/10.1017/CBO9780511522260.
91.
Finch, E., Fafinski, S.: Legal skills. Oxford University Press, Oxford, United Kingdom (2015).
92.
Harris, P.: An introduction to law. Cambridge University Press, Cambridge (2007).
93.
Baase, S.: A gift of fire: social, legal, and ethical issues for computing and the Internet. Pearson Prentice Hall, Harlow (2009).
94.
Shiva, V.: Protect or plunder?: understanding intellectual property rights. Zed, London (2001).
95.
Who owns information: The defining battle of our time? - RSA, https://www.thersa.org/discover/publications-and-articles/rsa-blogs/2013/01/who-owns-information-the-defining-battle-of-our-time-.
96.
Lester, G.: When Should State Secrets Stay Secret?: Accountability, Democratic Governance, and Intelligence. Cambridge University Press, Cambridge (2015).
97.
Bainbridge, D.I., Bainbridge, D.I.: Introduction to information technology law. Pearson/Longman, Harlow (2008).
98.
Torremans, P.: Intellectual property and human rights: enhanced edition of Copyright and human rights. Kluwer, Austin (2008).
99.
Lloyd, I.J.: Information technology law. Oxford University Press, Oxford, United Kingdom (2014).
100.
World Legal Information Institute (WorldLII), http://www.worldlii.org/.
101.
AsianLII - Asian Legal Information Institute, http://www.asianlii.org/.
102.
Australasian Legal Information Institute (AustLII), http://www.austlii.edu.au/.
103.
British and Irish Legal Information Institute, http://www.bailii.org/.
104.
CommonLII - Commonwealth Legal Information Institute, http://www.commonlii.org/.
105.
Privacy-autonomy-and-the-internet, https://www.cambridge.org/core/services/aop-cambridge-core/content/view/F745701FFEA03DD2CF5BCBDAE47FDEEA/9781107337428c2_p24-52_CBO.pdf/privacy-autonomy-and-the-internet.pdf.
106.
Overview of the General Data Protection Regulation (GDPR). (2016).
107.
Privacy by design. (2016).
108.
CCTV Code of Practice. (2016).
109.
Data sharing Code of Practice. (2016).
110.
Anonymisation Code of Practice. (2016).
111.
Quick_guide_to_the_employment_practices_code, https://ico.org.uk/media/for-organisations/documents/1128/quick_guide_to_the_employment_practices_code.pdf.
112.
Overview of privacy legislation in Canada - Office of the Privacy Commissioner of Canada, https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/02_05_d_15/.
113.
Privacy International |, https://www.privacyinternational.org/.
114.
MIGUEL_MALHEIROS_844263_phd_thesis_malheiros.pdf._COPYRIGHT_REMOVED..pdf, http://discovery.ucl.ac.uk/1427369/2/MIGUEL_MALHEIROS_844263_phd_thesis_malheiros.pdf._COPYRIGHT_REMOVED..pdf.
115.
Freedom of Information Laws | Global Investigative Journalism Network, http://gijn.org/resources/freedom-of-information-laws/.
116.
Molnár, P. ed: Free speech and censorship around the globe. Central European University Press, Budapest (2015).
117.
Mendel, T.: The Fiftieth Anniversary of the Freedom of Information Act: How it Measures up Against International Standards and Other Laws. Communication Law and Policy. 21, 465–491 (2016). https://doi.org/10.1080/10811680.2016.1216685.
118.
Flinn, A., Jones, H.: Freedom of information: open access, empty archives? Routledge, London (2009).
119.
Open Government Partnership |, http://www.opengovpartnership.org/.
120.
Open Government Manifesto � UK Open Government Network, http://www.opengovernment.org.uk/open-government-manifesto/.
121.
WhatDoTheyKnow - Make and browse Freedom of Information (FOI) requests, https://www.whatdotheyknow.com/.
122.
Information Tribunal > Search, http://informationrights.decisions.tribunals.gov.uk//Public/search.aspx.
123.
Search.
124.
A digital forensic practitioner’s guide to giving evidence in a court of law - viewcontent.cgi, http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1032&context=adf.
125.
Daniel, L., Daniel, L.: Digital forensics for legal professionals: understanding digital evidence from the warrant to the courtroom. Syngress, [Place of publication not identified] (2012).
126.
Wiles, J.: Techno security’s guide to e-discovery and digital forensics. Syngress, Burlington, Mass.
127.
Bryant, R.: Investigating digital crime. J. Wiley & Sons, Chichester (2008).
128.
Wiles, J., Alexander, T., Ashlock, S., Ballou, S., Depew, L., Dominguez, G., Ehuan, A., Green, R., Long, J., Reis, K., Schroader, A., Schuler, K., Thompson, E.: Digital Forensics. In: Techno Security’s Guide to E-Discovery and Digital Forensics. pp. 33–63. Elsevier (2007). https://doi.org/10.1016/B978-159749223-2.50006-6.
129.
Smallwood, R.F., Gurushanta, V.: Managing Canadian electronic records: electronic records management, document management & e-discovery in Canada : a management guide. Imerge Consulting, [Lexington, Mass.] (2011).
130.
Dykstra, J., Sherman, A.T.: Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digital Investigation. 9, S90–S98 (2012). https://doi.org/10.1016/j.diin.2012.05.001.
131.
Myers, K.N. ed: Business Continuity Strategies. John Wiley & Sons, Inc., Hoboken, NJ, USA (2012). https://doi.org/10.1002/9781119196730.
132.
Lindström, J., Samuelsson, S., Hägerfors, A.: Business continuity planning methodology. Disaster Prevention and Management: An International Journal. 19, 243–255 (2010). https://doi.org/10.1108/09653561011038039.
133.
Matthews, G., Smith, Y., Knowles, G.: The Disaster Control Plan. Library & Archival Security. 19, 3–23 (2004). https://doi.org/10.1300/J114v19n02_02.
134.
Craig, R., Selzer, T., Seymour, J.: There is disaster planning and there is reality—the Cayman Islands National Archive (CINA) experience with Hurricane Ivan 1. Journal of the Society of Archivists. 27, 187–199 (2006). https://doi.org/10.1080/00379810601081396.
135.
Fell, G.J.: Outsourcing IT. In: Decoding the IT Value Problem. pp. 114–125. John Wiley & Sons, Inc., Hoboken, NJ, USA (2013). https://doi.org/10.1002/9781118757512.ch10.
136.
Proffitt, J.: A guide to outsourcing records management. Routledge, London (2011).
137.
Vagadia, B.: Outsourcing to India - a legal handbook. Springer, Berlin (2007).