[1]
R. Murray-Webster and Great Britain. Office of Government Commerce, Management of risk: guidance for practitioners, Third edition, 2010 edition. London, [England]: TSO, 2010 [Online]. Available: https://eu.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5988344240002418&institutionId=2418&customerId=2415
[2]
H.M. Government, ‘Risk assessment handbook’. 2011 [Online]. Available: http://www.nationalarchives.gov.uk/documents/information-management/risk-assessment-handbook.pdf
[3]
G. Williams, ‘Everything you wanted to know about Management of Risk: Guidance for Practitioners (M_o_R®) in less than one thousand words’. 2009 [Online]. Available: http://www.best-management-practice.com/gempdf/MoR_1000Words_White_Paper_May09.pdf
[4]
‘FINRA Fines Barclays $3.75 Million for Systemic Record and Email Retention Failures | Reuters’, Dec. 27, 2013. [Online]. Available: http://www.reuters.com/article/2013/12/27/dc-finra-idUSnBw265098a+100+BSW20131227
[5]
‘NHS trust fined £175,000 for “troubling” data security breach’, 6AD. [Online]. Available: http://www.theguardian.com/uk/2012/aug/06/nhs-trust-fined-data-security
[6]
R. McKie and V. Thorpe, ‘Digital Domesday Book lasts 15 years not 1000’, 3AD. [Online]. Available: http://www.theguardian.com/uk/2002/mar/03/research.elearning
[7]
‘Official migration statistics “little better than a guess”, says report’, 28AD. [Online]. Available: http://www.theguardian.com/uk-news/2013/jul/28/official-migration-statistics-guess-report
[8]
L. Kelion, ‘Dyson sues Samsung over new vacuum’s steering mechanism’, 10AD. [Online]. Available: http://www.bbc.co.uk/news/technology-24023430
[9]
‘The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world’. Cabinet Office, UK Government [Online]. Available: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber-security-strategy-final.pdf
[10]
‘Office of Cyber Security and Information Assurance’. [Online]. Available: https://www.gov.uk/government/groups/office-of-cyber-security-and-information-assurance
[11]
J. Currall, ‘Security and the digital domain.’, in Record keeping in a hybrid environment: managing the creation, use, preservation and disposal of unpublished information objects in context, vol. Chandos information professional series, Oxford: Chandos, 2006, pp. 47–68.
[12]
E. Lomas, ‘Information governance: information security and access within a UK context’, Records Management Journal, vol. 20, no. 2, pp. 182–198, Jul. 2010, doi: 10.1108/09565691011064322.
[13]
‘Public Services Network (PSN)’. [Online]. Available: https://www.gov.uk/government/groups/public-services-network
[14]
‘IT security top tips’, 2015. [Online]. Available: https://ico.org.uk/for-organisations/it-security-top-tips/
[15]
‘The Statutory Sick Pay (General) Regulations 1982’. H.M. Government, 1982 [Online]. Available: http://www.legislation.gov.uk/uksi/1982/894/regulation/13/made
[16]
‘Legislation.gov.uk’, 2015. [Online]. Available: http://www.legislation.gov.uk/
[17]
Department for Constitutional Affairs, ‘Lord Chancellor’s Code of Practice on the Management of Records: Issued under section 46 of the Freedom of Information Act 2000’. Archived by The National Archives, 2009 [Online]. Available: http://webarchive.nationalarchives.gov.uk/+/http:/www.dca.gov.uk/foi/reference/imprep/codemanrec.htm
[18]
‘Guide to freedom of information’, 2015. [Online]. Available: https://ico.org.uk/for-organisations/guide-to-freedom-of-information/
[19]
‘Guide to data protection’, 2015. [Online]. Available: https://ico.org.uk/for-organisations/guide-to-data-protection/
[20]
‘Sarbanes-Oxley Act of 2002, 116 Stat. 745’. United States Congress, 2002 [Online]. Available: http://www.sec.gov/about/laws/soa2002.pdf
[21]
‘Legislation | Corporate Governance | University of Portsmouth’, 2012. [Online]. Available: http://www.port.ac.uk/departments/services/corporategovernance/recordsmanagement/legislation/
[22]
‘The Cabinet Manual: A guide to laws, conventions and rules on the operation of government’. Cabinet Office, UK Government, 2011 [Online]. Available: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60641/cabinet-manual.pdf
[23]
‘What is the Freedom of Information Act?’, 2015. [Online]. Available: https://ico.org.uk/for-organisations/guide-to-freedom-of-information/what-is-the-foi-act/
[24]
The National Archives, ‘Guidelines on developing a policy for managing email’. 2004 [Online]. Available: http://www.nationalarchives.gov.uk/documents/information-management/managing-emails.pdf
[25]
New South Wales State Records Authority, ‘Strategies for managing social media information’, 2014. [Online]. Available: http://www.records.nsw.gov.au/recordkeeping/advice/designing-implementing-and-managing-systems/strategies-for-managing-social-media-information/strategies-for-managing-social-media-information
[26]
V. Stobo, R. Deazley, and L. G. Anderson, ‘Copyright & risk: Scoping the Wellcome Digital Library project. (CREATe Working Paper No. 10)’. Dec. 2013 [Online]. Available: http://www.create.ac.uk/wp-content/uploads/2013/12/CREATe-Working-Paper-No.10.pdf
[27]
L. Tchankova, ‘Risk identification – basic stage in risk management’, Environmental Management and Health, vol. 13, no. 3, pp. 290–297, Aug. 2002, doi: 10.1108/09566160210431088.
[28]
Jisc, ‘Prioritisation’, 2014. [Online]. Available: https://www.jisc.ac.uk/guides/managing-strategic-activity/prioritisation
[29]
S. Henczel, ‘FUMSI Report: Information Auditing Report and Tool Kit’, Oct. 23, 2007. [Online]. Available: http://web.freepint.com/go/sub/report/947
[30]
Mind Tools, ‘Gap Analysis - Project Management Tools From MindTools.com’, 2014. [Online]. Available: https://www.mindtools.com/pages/article/gap-analysis.htm
[31]
Records Management Society of Great Britain: Local Government Group., ‘Information Audits – Guidelines’. 20AD [Online]. Available: http://www.irms.org.uk/images/resources/infoguides/informationauditguidelines03.pdf
[32]
J. McLeod and C. Hare, How to manage records in the e-environment, 2nd ed. London: Routledge, 2006 [Online]. Available: http://www.vlebooks.com/vleweb/product/openreader?id=AberystUni&isbn=9780203403570
[33]
The National Archives, ‘Guide 4: Keeping records to meet corporate requirements’. 2010 [Online]. Available: http://www.nationalarchives.gov.uk/documents/information-management/rm-code-guide4.pdf
[34]
Financial Services Authority, ‘FSA Retention Criteria’. [Online]. Available: http://www.fsa.gov.uk/pubs/staff/retention.pdf
[35]
Aberystwyth University, ‘Records retention schedule v1.0’. 2012 [Online]. Available: http://www.aber.ac.uk/en/media/departmental/informationcompliance/pdfdocuments/english/records_retention_schedule_v1.0.pdf
[36]
The National Archives, ‘Guide 8: Disposal of records’. 2011 [Online]. Available: http://www.nationalarchives.gov.uk/documents/information-management/rm-code-guide8.pdf
[37]
D. P. Best, The fourth resource: information and its management. Aldershot: Gower, 1995.
[38]
OECD and Eurostat, ‘Oslo Manual: Guidelines for Collecting and Interpreting Innovation Data, 3rd Edition’, 2005. [Online]. Available: http://www.oecd.org/innovation/inno/oslomanualguidelinesforcollectingandinterpretinginnovationdata3rdedition.htm
[39]
F. Damanpour, ‘Organizational Complexity and Innovation: Developing and Testing Multiple Contingency Models’, Management Science, vol. 42, no. 5, pp. 693–716, May 1996, doi: 10.1287/mnsc.42.5.693.
[40]
A. Baregheh, J. Rowley, and S. Sambrook, ‘Towards a multidisciplinary definition of innovation’, Management Decision, vol. 47, no. 8, pp. 1323–1339, Sep. 2009, doi: 10.1108/00251740910984578.
[41]
P. F. Drucker, ‘The Discipline of Innovation.’, Harvard Business Review, vol. 80, no. 8, pp. 149–157, 2002 [Online]. Available: https://primo.aber.ac.uk/permalink/44WHELF_ABW/1cejflt/cdi_webofscience_primary_000177090500011CitationCount
[42]
M. A. Musa, S. E. Ismail, and S. Othman, ‘Corporate governance and innovative leaders’, Social Responsibility Journal, vol. 4, no. 1/2, pp. 34–40, Mar. 2008, doi: 10.1108/17471110810856811.
[43]
J. E. Rowley, Being an information innovator. London: Facet, 2011.
[44]
J. Bowers and A. Khorakian, ‘Integrating risk management in the innovation project’, European Journal of Innovation Management, vol. 17, no. 1, pp. 25–40, Jan. 2014, doi: 10.1108/EJIM-01-2013-0010.
[45]
H. Government. Knowledge Council, ‘Information matters: Building government’s capability in managing knowledge and information’. 2008 [Online]. Available: http://web.archive.org/web/20150321235414/http://www.nationalarchives.gov.uk/documents/information-management/information-matters-strategy.pdf
[46]
A. Khedhaouria and V. Ribiere, ‘The influence of team knowledge sourcing on team creativity’, The Learning Organization, vol. 20, no. 4/5, pp. 308–321, May 2013, doi: 10.1108/TLO-10-2012-0063.
[47]
General Electric Company, ‘What is Six Sigma?’, 2015. [Online]. Available: http://www.ge.com/en/company/companyinfo/quality/whatis.htm
[48]
M. Barney, ‘Motorola’s Second Generation’. 2002 [Online]. Available: http://www.kellogg.northwestern.edu/course/opns430/modules/quality_management/Mot_Six_Sigma.pdf
[49]
R. W. Hoerl and M. M. Gardner, ‘Lean Six Sigma, creativity, and innovation’, International Journal of Lean Six Sigma, vol. 1, no. 1, pp. 30–38, Mar. 2010, doi: 10.1108/20401461011033149.