Sources
Sources are sorted by a "short citation" – typically the author's last name and year of publication. A short citation for well-known works and works with no single author may be are often forms from an initialism or the first few words of the title, followed by a date or other reference. (For example, AACR2 or 17 USC 107.)
Click on a source number to see all citations from that work.
-
(†919)
-
[UK] Minister of State 2012 (†663)
[UK] Minister of State for the Cabinet Office and Paymaster General. Open Data White Paper: Unleashing the Potential. (Cm 8353). (London: Stationery Office, 2012), p. 5.
-
5 USC 552a (†709)
"Records Maintained on Individuals." 5 USC 552a (cited in Cornell University Law School, Legal Information Institute, checked 1 May 2015).
-
5chdn, 2016. (†811)
5chdn. "What does it mean that Ethereum is 'turing complete'?" (Ethereum Stack Exchange, 30 Mar 2016).
-
A&C Black (†575)
A&C Black. Business: The Ultimate Resource (A&C Black, 2009).
-
ActiveState 2012 (†864)
"Cloud Portability: PaaS Delivers the Holy Grail" (ActiveState, 2012).
-
AIIP 2018 (†907)
"What is an IPP?" (Association of Independent Information Professionals, [2018]).
-
AJS 2012 (†421)
American Jurisprudence – 2nd ed. (West, 2012).
-
Alexander 2012 (†479)
Alexander, Doug. "Data Mining." ([s.n., ca. 2012).
-
Allen 2013 (†317)
Allen, Kevin. 2013. August #cloud chat: Big Data in the big leagues-how cloud is transforming sports. IBM, Thoughts on Cloud. August 5, 2013
-
Amazon 2017 (†868)
"What is a Data Warehouse?" (Amazon Web Services, [2017]).
-
Amazon Web Services, Data Lake 2017 (†867)
"What is a Data Lake?" (Amazon Web Services, [2017]).
-
American Forensics 2017 (†880)
"What is Forensics?" (American Forensic Association, [2017]).
-
Amiri 2007 (†725)
Amiri, Ali, "Dare to Share: Protecting Sensitive Knowledge with Data Sanitization," Decision Support Systems 43:1 (February 2007), p.181-191.
-
Amsel 2016 (†829)
Amsel, Alex. "Understanding Proposed Ethereum Forks." (Ownage, 18 Jun 2016).
-
Anawis 2014 (†525)
Anawis, Mark A. "Text Mining: The Next Data Frontier." Scientific Computing (6 January 2014).
-
Anciaux-Duclert 2013 (†665)
Anciaux-Duclert, Camille. "The Open-data issues in the United Kingdom: A literature review." Unpublished mss, March 2013.
-
Andreev 2015 (†797)
Andreev, Oleg. "Bitcoin Glossary" (2015).
-
ANSI/ARMA 18-2011 (†474)
ARMA International. Implications of Web-Based, Collaborative Technologies in Records Management. ANSI/ARMA 18-2011.
-
APP 2014 (†445)
Australian Privacy Principles guidelines (Office of the Australian Information Commissioner, 2014).
-
Arbesman 2013 (†258)
Arbesman, Samuel. "Five Myths About Big Data." The Washington Post (16 August 2013).
-
Ariely 2013 (†348)
Ariely, Dan. Facebook post (6 January 2013).
-
ARMA 2010 (†450)
Information Governance Maturity Model (ARMA International, 2010)
-
ARMA Glossary (†297)
ARMA International. Glossary of Records and Information Management Terms, 3rd Edition. http://archive.arma.org/standards/glossaryw2/index.cfm (accessed August 16, 2013)
-
ARMA Glossary 2016 (†899)
Glossary of Records Management and Information Governance Terms – 5th edition, (ARMA International, 2016).
-
Arthur 2013 (†454)
Arthur, Lisa. "What is Big Data?" CMO Network (Forbes 15 Aug 2013).
-
Askhoj et al. 2011 (†608)
Askhoj, Jan, Mitsuharu Nagamori, and Shigeo Sugimoto. 2011. Archiving as a service: A model for the provision of shared archiving services using cloud computing. Proceedings of the 2011 iConference: 151-158.
-
Askhoj et al. 2011 (†609)
Askhoj, Jan, Shigeo Sugimoto, and Mitsuharu Nagamori. "A metadata framework for cloud-based digital archives using METS with PREMIS." In Digital Libraries: For Cultural Heritage, Knowledge Dissemination, and Future Creation, pp. 118-127. Springer Berlin Heidelberg, 2011.
-
ASTRI 2016 (†806)
ASTRI. "Whitepaper On Distributed Ledger Technology" (Hong Kong Monetary Authority, 2016).
-
Atanasiu 2013 (†361)
Atanasiu, Vlad. 2014. Expert bytes: computer expertise in forensic documents (CRC Press, 2013).
-
Back et al. 2010 (†832)
Back, Adam et al. "Enabling Blockchain Innovations with Pegged Sidechains." (white paper, Genius.com, 2010)
-
Bakken, et al. 2004 (†515)
Bakken, D. E., R. Rarameswaran, D. M. Blough, A. A. Franz, and T. J. Palmer. "Data Obfuscation: Anonymity and Desensitization of Usable Data Sets." Security and Privacy 2:6 (Nov-Dec 2004).
-
Ballard 2014 (†528)
Ballard, Chuck, et al. Information Governance: Principles and Practices for a Big Data Landscape (IBM 2014).
-
Ballentine 2010 (†332)
Ballentine's Law Dictionary (LexisNexis, 2010).
-
Balocco, et al. 2013 (†559)
Balocco, Raffaello, Alessia Ciappini, and Andrea Rangone. "ICT Governance: A Reference Framework" Information Systems Management 30 (2013), p.150-167
-
Barns 2013 (†356)
Barns, Sarah. "Will Open Data Lead to Open Government?" Business Spectator (5 December 2013).
-
Bauer 2005 (†537)
Bauer, Nigel. "Management: Take Control of Your Audit Process." ISO Management Systems 5:4 (July-August 2005).
-
Beall 2013 (†248)
Beall, Jeffrey. "Beall's List of Predatory Publishers 2013." Scholarly Open Access (4 December 2012).
-
Beigel, 2016 (†809)
Beigel, Ofir. "[Video] What is Segwit? (Segregated Witness)" (99Bitcoins, 2016)
-
Bender 2012 (†604)
Bender, David. "Privacy and Security Issues in Cloud Computing" Computer and Internet Lawyer 29:10 (October 2012), p.1-15
-
Berman 2008 (†586)
Berman, Francine. "Got Data? A Guide to Data Preservation in the Information Age" Communications of the ACM 51:12 (December 2008) p.50-56.
-
Bernal 2014 (†430)
Bernal, Paul. Internet Privacy Rights: Rights to Protect Autonomy (Cambridge University Press, 2014).
-
Bicer, Chiu, and Agrawal 2011 (†308)
Bicer, Tekin, David Chiu, and Gagan Agrawal. “Poster: a Framework for Data-intensive Computing with Cloud Bursting.” In Proceedings of the 2011 Companion on High Performance Computing Networking, Storage and Analysis Companion, 5–6. SC ’11 Companion. New York, NY, USA: ACM, 2011. doi:10.1145/2148600.2148604.
-
Big Data 2011 (†265)
Big data: The next frontier for innovation, competition, and productivity. (McKinsey Global Institute, 2011).
-
Big Data Revolution 2016 (†779)
Big Data Revolution, TED Radio Hour (NPR, 9 September 2016).
-
Bitcoin Classic 2017 (†792)
"Bitcoin Classic" (Wikipedia, 2017)
-
Bitcoin Core 2017 (†790)
"Bitcoin Core" (Bitcoin, [2017]).
-
Bitcoin Developer Glossary 2017 (†791)
"Bitcoin Developer Glossary" (Bitcoin, [2017])
-
Bitcoin Glossary 2017 (†812)
"Bitcoin Glossary." (Coindesk, 2017)
-
Bitcoin Group [2017] (†846)
"Bitcoin Glossary." (Bitcoin Group Limited, 2017).
-
Bitcoin Unlimited 2017 (†808)
"Bitcoin Unlimited" (Wikipedia, 2017).
-
Bitcoin Wiki Vocabulary [2017] (†796)
Bitcoin Wiki Vocabulary
-
bitcoinj [2017] (†835)
"Understanding the bitcoinj security model" (bitcoinj.github, 2017).
-
Black's 5th 1983 (†372)
Black’s Law Dictionary, Abridged 5th Edition (West 1983)
-
Black's 7th (†419)
Black's Law Dictionary – 7th ed. (West, 1999).
-
Black's 9th 2009 (†382)
Garner, Bryan A., and Henry Campbell Black. Black’s Law Dictionary. St. Paul, MN: West, 2009.
-
Blockchain 2016 (†768)
"Blockchain and Electronic Distributed Ledger Technologies" : ISO/TS/P 258 (ISO, 2016).
-
Blockchain Luxembourg S.A.R.L.2017 (†794)
"Hash-Rate" (Blockchain Luxembourg S.A.R.L., 2017)
-
Blockchain Révolution 2017 (†859)
Lexique de la Blockchain (Blockchain Révolution, 2017).
-
Blockchain Technologies 2016 (†789)
Blockchain Technology Glossary: Industry Definitions and Explanations (Technology Trends, [2016]).
-
BlockchainHub Glossary (†807)
"BlockchainHub Glossary" [2016]
-
Bogle 2013 (†363)
Bogle, Ariel. "Study: Student Data Not Safe in the Cloud." Slate (16 Dec 2013).
-
Bohle 2013 (†301)
Bohle, Shannon. "Binary Moment: A One-on-One Q&A About the US Government and Open Data with Jeanne Holm, Chief Data Wrangler and Open Data Evangelist." SciLongs (27 September 2013).
-
Bradbury 2008 (†674)
Bradbury, Carl. "DISASTER! Creating and Testing an Effective Recovery Plan" The British Journal of Administrative Management (April 2008), p.14-16.
-
Brakeville and Perepa 2017 (†813)
Brakeville, Sloan and Bhargav Perepa. "Blockchain basics: Glossary and use cases" (IBM, 2017)
-
Brandeis 1914 (†661)
Brandeis, Louis D. Other People's Money and How the Bankers Use It (Frederick A. Stokes, c. 1914).
-
Brandel 2008 (†613)
Brandel, Mary. "Stormy Weather" Computerworld 42:44 (November 3, 2008), p.22-23,26-28.
-
Breeding 2010 (†611)
Breeding, Marshall. "Ensuring Our Digital Future" Computers in Libraries 30:9 (November 2010), p.32-34.
-
Brock 2017 (†882)
Brock, Carol. "Personalized Public Services Require a new era of Information Sharing," opentext (12 May 2017).
-
Bunn 2016 (†842)
Bunn, Jenny. "How has InterPARES Trust considered trust?: An initial thematic analysis (InterPARES Trust, 2016).
-
Buntinx 2017 (†836)
Buntinx, JP. "What is a bitcoin user-activated soft fork?" (The Merkle, 13 Mar 2017).
-
Bushey et al. 2015 (†756)
Bushey, Jessica, Marie Demoulin, Elissa How, and Robert McLelland. "Trust in Cloud Service Contracts" (InterPARES Trust, 2015).
-
Bushey et al. 2016 (†755)
Bushey, Jessica, Marie Demoulin, Eliisa How, and Robert McLelland. "Checklist for Cloud Services Contracts" (ITrust, February 2016).
-
Bushey, et al. 2015 (†767)
Bushey, Jessica, Marie Demoulin, Elissa How, and Robert McLelland. "Cloud Service Contracts: An Issue of Trust," Canadian Journal of Information and Library Science 39:2 (June 2015), p. 128-153.
-
Business & Management Dictionary (†563)
Bloomsbury Business Library - Business and Management Dictionary (2007) Business Source Complete.
-
Business Dictionary 2014 (†539)
Business Dictionary.com (WebFinance, [2014]).
-
Buterin [2017] (†818)
Buterin, Vitalik. "A next-generation smart contract and decentralized application platform." Ethereum White Paper Wiki (2017).
-
Butler 2012 (†672)
Butler, Brandon. "Gartner's State of Cloud Security: Outages are Bigger Risk Than Breaches" Network World (Network World, 14 November, 2012).
-
Butler 2013 (†673)
Butler, Brandon. "How Long Will Big-Name Customers Like Netflix Put Up With Amazon Cloud Outages?" Network World (Network World, 3 January, 2013).
-
Butler 2014 (†548)
Butler, Mary. "Breaking Down Information Governance Versus Data Governance." Journal of AHIMA (American Health Information Management Association, 2014).
-
Buyya, et al. 2009 (†587)
Buyya, Rajkumar, Chee Shin Yeo, Srikumar Venugopal, James Broberg, and Ivona Brandic. "Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility" Future Generation Computer Systems 25:6 (2009) p.599-616.
-
Calcutt 2016 (†786)
Calcutt, Andrew. "Forget Brexit and Trump, “Post-Truth” was spawned by the Liberal Left Long Ago," Ars Technica (24 November 2016).
-
Calcutt 2016 (†885)
Calcutt, Andrew. "The Truth about Post-truth Politics," Newsweek (21 November 2016).
-
Callaghan 2010 (†766)
Callaghan, Diane. "Answering your Questions on Framework Agreements." Tenders Direct Blog (Tenders Direct, 2010).
-
Cambridge Dictionaries (†293)
Cambridge Dictionaries Online
-
Cambridge Dictionary 2017 (†883)
Cambridge Dictionary (Cambridge University Press, 2017).
-
Campbell 2016 (†865)
Campbell, Chris. "Top Five Differences Between Data Lakes and Data Warehouses," Business Insights (Blue Granite, 26 January 2015).
-
Casey 2016 (†877)
Casey, Michael. "The Blockchain: Decentralized Trust to Unlock a Decentralized Future" (O'Reilly, 2016).
-
Castelfranchi, et al 2001 (†508)
Castelfranchi, Cristiano, and Rino Falcone. "Social Trust: A Cognitive Approach." (Springer Netherlands, 2001).
-
CCSDS Audit and Certification 2011 (†733)
Audit and Certification of Trustworthy Digital Repositories: CCSDS 652.0-M-1 (Consultative Committee for Space Data Systems, 2011).
-
CESG 2009 (†328)
CESG. Good Practice Guide No. 18, (2009) Forensic Readiness, Issue No: 1.0.
-
CESG Identity Proofing, 2013. (†365)
"Identity Proofing and Verification of an Individual: Good Practice Guide No. 45." (CESG, National Technical Authority for Information Assurance, December 2013).
-
Chabrow 2013 (†288)
Chabrow, Eric. "The Media as Critical Infrastructure." The Public Eye [blog], August 30, 2013
-
Chain Documentation 2017 (†840)
Chain Docs. "Unspent Outputs Guide." (Chain, 2017).
-
Chappell and Funk, 2010 (†466)
Chappell, N.and Funk, L. "Social capital: Does it add to the health inequalities debate?" Social Indicators Research 99 no.3 (2010): 357.
-
Chen, et al. 2014 (†646)
Chen, Chung-Yang, Chun-Shuo Chen, and Xiang-Ting Wang, "Cloud Service Capability Maturity Model (CS-CMM): A Preliminary Study on Its Conceptual Design" International Journal of Electronic Business Management 12:3 (2014), p.190-199.
-
Chou 2013 (†897)
Chou, Yung. "Resource Pooling, Virtualization, Fabric, and Cloud, " Yung Chou on Hybrid Cloud (Microsfot Technet), 8 August 2013.
-
Chowdhury 2014 (†573)
Chowdhury, Dhiman. "Governance is Primarily Intellectual Exercise" The Financial Express (Bangladesh) (May 21,2014).
-
Chuen (ed) 20156 (†855)
Chuen, David Lee Kuo, ed. Handbook of digital currency: Bitcoin, innovation, financial instruments, and big data. Academic Press, 2015.
-
Chun 2012 (†345)
Chun, Wesley. "What is Cloud Computing?" Google Developers Academy (June 2012).
-
Chun et al., 2010 (†471)
Chun, S. A., Shulman, S., Sandoval, R., and Hovy, E. "Government 2.0: Making connections between citizens, data and government." Information Polity 15, no.1 (2010): 1-9.
-
CIBER 2013 (†257)
"A Citizen-Led Crowdsourcing Roadmap for the CI-BER 'Big Data' Project." CI-BER: CyberInfrastructure for Billions of Electronic Records [blog], 19 March 2013.
-
Ciccatelli, 2014 (†362)
Ciccatelli, Amanda. "Patent Trolls Invade the Cloud." Inside Counsel (14 Jan 2014).
-
Classen and McCaw 2012 (†599)
Classen, H. Ward, and Andrew McCaw. "Cloud Computing Confidentiality and Data Security in the Cloud: Avoiding Turbulence Through Careful Drafting" Computer and Internet Lawyer 29:12 (December 2012), p. 1-9.
-
Cloud Security Alliance 2010 (†592)
Cloud Security Alliance. Top Threats to Cloud Computing v. 1.0 (Cloud Security Alliance, March 2010).
-
Cloud Security Alliance 2011 (†594)
Cloud Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing v. 3.0 (Cloud Security Alliance, 2011).
-
Cloud Security Alliance 2013 (†593)
Cloud Security Alliance. The Notorious Nine: Cloud Computing Top Threats in 2013 (Cloud Security Alliance, February 2013).
-
Cloud Storage SNIA 2009 (†501)
Cloud Storage for Cloud Computing (Storage Network Industry Association, 2009).
-
CMMI 2002 (†651)
Capability Maturity Model Integration, – ver. 1.1 (Carnegie Mellon, Software Engineering Institute, 2002).
-
CMU 2011 (†706)
Guidelines for Data Protection (Carnegie Mellon University, 2011).
-
CNSS-4009 (†730)
National Information Assurance (IA) Glossary (Committee on National Security Systems, 2010).
-
Coglianese, 2009. (†497)
Coglianese, Cary. “The Transparency President? The Obama Administration and Open Government.” Governance 22, no. 4 (2009): 529-544.
-
Cohen 2008 (†652)
Cohen, Fred. Enterprise Information Protection (Fred Cohen and Associates, 1987-2008).
-
Cohen 2012 (†249)
Cohen, Fred. Digital Forensic Evidence Examination – 4th ed. (Fred Cohen & Associates, 2009-2012).
-
Cohen 2013A (†273)
Cohen, Fred. Email (31 July 2013)
-
Cohen 2013B (†274)
Cohen, Fred. Email (4 Aug 2013)
-
Cohen 2013C (†290)
Cohen, Fred. Email (2 September 2013).
-
Cohen 2014A (†458)
Cohen, Fred. Discussion board comment (21 July 2014).
-
Coleman 2016. (†810)
Coleman, Jeff. "What is a sidechain?" (Ethereum Stack Exchange, 22 Jan 2016)
-
Condos et al. 2016 (†819)
Condos, J., W.H. Sorrell, and S.L Donegan. "Blockchain Technology: Opportunities and Risks." (Vermont Office of Attorney General, 15 Jan 2016).
-
Contine 2013 (†441)
Constine, Josh. "Facebook Will Fight German Anonymity Law And $26K Fine Against Zuckerberg To Keep Real Name Policy." Tech Crunch (7 Jan 2013).
-
Copie et al. 2013 (†740)
Copie, Adrian, Teodor-Florin Fortis, and Victor Ion Munteanu. "Determining the performance of the databases in the context of Cloud Governance." Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing 2013.
-
Corda Introductory White Paper 2016 (†817)
Brown, Richard Gendal, James Carlyle, Ian Grigg, and Mike Hearn. "Corda: An Introduction." (Corda Introductory White Paper, August 2016).
-
Corda Technical Whitepaper 2016 (†816)
Hearn, Mike. "Corda: A distributed ledger." (Corda Technical Whitepaper v. 0.5, 29 Nov 2016).
-
Cornell University Library 2000 (†891)
Moving Theory into Practice: Digital Imaging Tutorial (Cornell University Library, 2000-2003).
-
Cravotta 2002 (†669)
Cravotta, Robert. "Preserve the Value of Your Engineering Data" EDN 47:10 (May 2, 2002), p.53-60.
-
Creative Commons 2014 (†434)
"About." Creative Commons ([2014]).
-
Cripe 2007 (†452)
Cripe, Billy. "Structured and Unstructured Data: What Are They?" Fusion ECM (Oracle, 13 Sep 2007).
-
Croll 2015 (†649)
Croll, Alistair. "Year Zero: Our life timelines begin." O'Reilly Radar (3 March 2015).
-
Crowe 2016 (†771)
Crowe, Portia. "There is a 'game changer' technology on Wall Street and people keep confusing it with bitcoin," Business Insider (5 March 2016).
-
Cryptocompare 2016 (†839)
"What is merged mining – Bitcoin & Namecoin – Litecoin & Dogecoin?" (Cryptocompare, 25 Oct 2016)
-
CSA and ISACA 2012 (†742)
Cloud Computing Market Maturity Study Results (Cloud Security Alliance and ISACA, 2012).
-
Cukier, et al. 2013 (†473)
Cukier, Kenneth Neil, and Viktor Mayer-Schoenberger. "The Rise of Big Data: How It's Changing the the Way We Think About the World." Foreign Affairs (May/June 2013).
-
D'Agostino et al., 2011 (†465)
D’Agostino, M. , Schwester, R. , Carrizales, T. , and Melitski, J. "A study of e-government and e-governance: An empirical examination of municipal websites." Public Administration Quarterly 35, no.1 (2011): 3-25.
-
Danova 2015 (†827)
Danova, Helga. "What is Bitcoin Fork?" (Bitcoin Dictionary, 2 Sept 2015)
-
Das and Teng 2004 (†406)
Das, T. K., and Bing-Sheng Teng. "The Risk-Based View of Trust: A Conceptual Framework." Journal of Business Psychology 19:1 (Fall 2004), p. 85-116.
-
DataOne 2009 (†530)
"Plan Data Management Early in Your Project" (DataOne, [n.d., post 2009]).
-
DataWatch 2017 (†869)
"What is Data Wrangling?" (DataWatch, [2017]).
-
Davies 2013 (†330)
Davies, Tim. Open Data Barometer: 2013 Global Report. Open Data Institute and World Wide Web Foundation. 2013.
-
Davis 2013 (†327)
Davis, Jenny. "Context Collapse: A Literature Review." Cyborgology (blog), January 10, 2013.
-
Davis and Lukomnik 2012 (†647)
Davis, Stephen, and Jon Lukomnik, "Governance and Oversight in the Era of Complexity" Compliance Week 9:104 (September 2012), p.48-49
-
de Leeuw et al. (eds) 2007 (†850)
“An Introduction to Modern Cryptography” in de Leeuw, Karl Maria Michael, and Jan Bergstra, eds. The history of information security: a comprehensive handbook. Elsevier, 2007.
-
Deloitte Insights 2016 (†801)
Bitcoin, Blockchain & distributed ledgers: Caught between promise and reality (Deloitte, 2016).
-
Dennedy, et al. 2014 (†568)
Dennedy, Michelle Finneran, Jonathan Fox and Thomas R. Finneran. The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value (Apress Open, 2014).
-
Determann 2011 (†601)
Determann, Lothar. "Data Privacy in the Cloud: A Dozen Myths and Facts" Computer and Internet Lawyer 28:11 (November 2011), p. 1-8.
-
DGI Definition 2014 (†543)
"Definitions of Data Governance." Data Governance: The Basic Information (Data Governance Institute, 2014).
-
DGI Glossary 2014 (†544)
"Data Governance Glossary." Data Governance: The Basic Information (Data Governance Institute, 2014).
-
DGI Governance 2014 (†545)
"Governance and Stewardship." Data Governance: The Basic Information (Data Governance Institute, 2014).
-
DGPO 2014 (†541)
Data Governance Professionals Organization [website] (the Organization, [2014]).
URL: http://www.dgpo.org/
-
Dictionary of Computing 1996 (†517)
Dictionary of Computing – 4th ed. (Oxford University Press, 1996).
-
Diffie & Landau 2007 (†848)
Diffie, Whitfield, and Susan Landau. Privacy on the line: The politics of wiretapping and encryption. (updated and expanded ed.) MIT press, 2007.
-
Dilly 1995 (†480)
Dilly, Ruth. "Data Mining: An Introduction: Student Notes" – ver. 2.0 (The Queen's University, Belfast, 1995).
-
Directive 2004/18/EC (†765)
"Directive 2004/18/EC of the European Parliament and of the Council of 31 March 2004 on the coordination of procedures for the award of public works contracts, public supply contracts and public service contracts." Official Journal L 134 , 30/04/2004 P. 0114 - 0240
-
Directive 95/46/EC 1995 (†684)
"Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data." Official Journal L 281 , 23/11/1995, p. 0031 - 0050
-
Dollar and Ashley 2014 (†650)
Dollar, Charles M., and Lori Ashley. "Digital Preservation Capability Maturity Model: Background and Performance Metrics" – ver. 2.6 (16 May 2014).
-
Dorian 2011 (†489)
Dorian, Lisa. "Risk Management: Understanding Risk Mitigation." Industry Insights: A Newsletter for the CA Industry (Chartered Accountants of British Columbia, 11 February 2011).
-
Doshi 2012 (†346)
Doshi, Paras. "Gartner's Hype Cycle for Cloud Computing: 2008 - 2009 - 2010 - 2011." Paras Doshi's Blog (18 March 2012).
-
Duizend 2006 (†776)
Van Duizend, Richard. "Guidelines For State Trial Courts Regarding DiscoveryOf Electronically-Stored Information" (Conference of Chief Justices, 2006).
-
Dupont & Maurer 2015 (†856)
Dupont, Q., and B. Maurer. "Ledgers and Law in the Blockchain." Kings Review 23 (2015).
-
DuPont 2016 (†854)
DuPont, Quinn. An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext (PhD thesis). University of Toronto, Toronto ON. 2016.
-
Duranti 1995 (†279)
Duranti, Luciana. “Reliability and Authenticity: The Concepts and Their Implications.” Archivaria 39 (Spring 1995): 5-10.
-
Duranti 1997 (†758)
Duranti, Luciana. "The Archival Bond," Archives and Museum Informatics 11 (1997), p. 213-218.
-
Duranti 2005 (†277)
Duranti, Luciana, ed. 2005. The Long-Term Preservation of Accurate and Authentic Digital Data: Findings of the InterPARES Project. (San Miniato : Archilab)
-
Duranti 2010 (†759)
Duranti, Luciana. "Diplomatics," Encyclopedia of Library and Information Science – 3rd ed. (Taylor & Francis, 2010).
-
Duranti 2013 (†911)
Duranti, Luciana. "Trust and Conflicting Rights in the Digital Environment," The Memory of the World in the Digital Age: Digitization and Preservation (UNESCO, 2013).
-
Duranti 2013 (†408)
Duranti, Luciana. “Historical Documentary Memory in the Cloud: An Oxymoron or the Inescapable Future?” Revista D'arxius (2013), p. 19-60.
-
Duranti 2014 (†490)
Duranti, Luciana. "Historical Documentary Memory in the Cloud: An Oxymoron or the Inescapable Future." [unpub. mss., 2014]
-
Duranti 2015 (†677)
Duranti, Luciana. "Establishing a Digital Preservation Program." Presentation at Abu Dhabi, UAE National Archives, 28 January 2015.
-
Duranti and Rogers 2012 (†278)
Duranti, Luciana, and Corinne Rogers. “Trust in digital records: An increasingly cloudy legal area.” Computer Law & Security Review 28.5 (2012): 522-531.
-
Duranti, Suderman, and Todd 2008 (†280)
Duranti, Luciana, Jim Suderman, and Malcom Todd. “A Framework of Principles for the Development of Policies, Strategies and Standards for the Long-term Preservation of Digital Records.” InterPARES 2. (2008)
-
DW Akademie 2016 (†874)
"Controversial EU digital rights charter is food for thought" (DW Akademie, 16 December 2016).
-
ECJ 2014 (†697)
"Data Protection" (European Commission, Directorate-General for Justice and Consumers,
-
Edgar 2004 (†694)
Edgar, Dale. "Data Sanitization Techniques" (Net 2000 Ltd, 2003-2004).
-
EDRi 2014 (†875)
Fiedler, Kirsten, Joe McNamee, et al., The Charter of Digital Rights, 10th ed. (EDRi, 2014).
-
Edwards 2014 (†617)
Edwards, Timothy D. "The Admissibility of Electronically Stored Information under the Federal Rules of Evidence" Computer and Internet Lawyer 31:11 (November 2014), p.6-11.
-
Emison 2013 (†630)
Emison, Joe Masters. "Cloud Control" Information Week 1356 (January 28, 2013), p.19-21.
-
EO 13526 (†787)
Obama, Barack. "Executive Order 13526 – Classified National Security Information" (The White House, Office of the Press Secretary, 2009).
-
EOP 2007 (†708)
Johnson, Clay, III. "Memorandum for the Heads of Executive Departments and Agencies: Safeguarding Against and Responding to the Breach of Personally Identifiable Information." (Executive Office of the President, 22 May 2007).
-
EPIC 2014 (†442)
"Internet Anonymity." EPIC.org (Electronic Privacy Information Center, [2014]).
-
EPIC 2015 (†680)
"Reidentification." (Electronic Privacy Information Center, [28 March 2015]).
-
EU 22 2016 (†752)
EU22 Personal Cloud: Regulation and Trust: Progress Report (February 2016).
-
EU Committee on Civil Liberties, Justice and Home Affairs 2012 (†444)
DRAFT REPORT on the proposal for a regulation of the European Parliament and of the Council on the protection of individual with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) (COM(2012) 0011 – C7-0025/2012 – 2012/0011(COD)). (European Parliment, Committee on Civil Liberties, Justice and Home Affairs, 17 Dec 2012.
-
EU Council Directive 1995/46/EC, 1995 (†698)
"On the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data" – Directive 95/46/EC (European Parliament and Council of the European Union, 24 October 1995).
-
EU Factsheet 2014 (†431)
Factsheet on the "Right to be Forgotten" Ruling (C-131/12)
-
EU Glossary (†300)
"transparency (access to data)" in Glossary (European Union, [n.d., checked 16 Nov 2013).
-
Euchner and Ganguly 2014 (†657)
Euchner, Jim, and Abhijit Ganguly. "Business Model Innovation in Practice" Research Technology Mangement 57:6 (November/December 2014), p.33-39.
-
Eufemio, et al. 2016 (†798)
Eufemio, Anthony C., Kai C. Chng, and Shaun Djie. "Digix’s Whitepaper: The Gold Standard in CryptoAssets." (2016)
-
Evans 2013A (†341)
Evans, Bob. "The Cloud Revolution and Creative Destruction." ForbesBrandVoice (12 February 2013).
-
Evans 2013B (†340)
Evans, Bob. "The Top 10 Myths About Cloud Computing." ForbesBrandVoice (11 June 2013).
-
Fanlore 2016 (†753)
Fanlore.
-
Fed R Ed 2013 (†422)
Federal Rules of Evidence (United States House of Representatives, Committee on the Judiciary, 2013).
-
Fed. R. Civ. P. (†438)
Federal Rules of Civil Procedures.
-
Fed. R. Ed. (LII) 2014 (†552)
Federal Rules of Evidence (Legal Information Institute, 2014).
-
Feldman 2001 (†628)
Feldman, Anrew. "Dynamic Provisioning: The New Mantra" Telecommunications Americas 35:6 (June 2001), p.58-60.
-
Ferguson, et al. 2013 (†557)
Ferguson, Colin, Peter Green, Ravi Vaswani, and Gang (Henry) Wu. "Determinants of Effective Information Technology Governance" International Journal of Auditing 17 (2013) p.75-99
-
Fernandes, et. al 2014 (†717)
Fernandes, Diogo A. B., Liliana F. B. Soares, Joao V. Gomes, Mario M. Freire, and Pedro R. M. Inacio. "Security Issues in Cloud Environments: a Survey" International Journal of Information Security 13:2 (April 2014), p.113-170.
-
Finley 2014 (†512)
Finley, Klint. "Out in the Open: This Man Wants to Turn Data Into Free Food (And So Much More)." Wired (20 August 2014).
-
Finley 2015 (†781)
Finley, Klint. "Hacked Fridges Aren't the Internet of Things' Biggest Worry," Wired (12 March 2015).
-
Fleischer 2011 (†425)
Fleischer, Peter. "Foggy thinking about the Right to Oblivion." Peter Fleischer: Privacy...? (9 March 2011).
-
Fleischer 2012 (†426)
Fleischer, Peter. "The right to be forgotten, or how to edit your history." Peter Fleischer: Privacy...? (29 January 2012).
-
Flinders 2012 (†741)
Flinders, Jar. "Top Ten Cloud Computing Confidence Killers." ComputerWeekly.com" (28 September 2012).
-
Flood 2016 (†783)
Flood, Alison. "'Post-truth' named word of the year by Oxford Dictionaries," The Guardian (15 November 2016).
-
Forman 2012 (†629)
Forman, Nik. "Broadcast Engineering" World Edition 54:10 (October 2012), p.38-42.
-
Forsheit 2010 (†618)
Forsheit, Tanya L. "E-Discovery Involving Cloud Facilities" Computer and Internet Lawyer 27:12 (December 2010), p.1-7.
-
Franco 2014 (†793)
Franco, Pedro. Understanding Bitcoin: Cryptography, engineering and economics. (John Wiley & Sons, 2014).
-
Franks 2013 (†291)
Franks, Pat. Email (2 Sept 2013)
-
Franks 2013 (†560)
Franks, Patricia C. Records and Information Management (Neal-Schuman, 2013).
-
Franks 2014 (†371)
Franks, Pat. Email (15 February 2014).
-
Franks et al. 2016 (†754)
Franks, Pat, et al. "NA 05 Social Media and Trust in Local Government: Phase 1 Final Report" (16 February 2016).
-
Franks, Hamidzadeh et al. 2021 (†918)
This is a test citation for this paper.
-
Freed, 2010 (†472)
Freed, L. "Calculating the ROI on Social Media." ForSeeResults.com, (2010).
-
Fukuyama, 2002 (†470)
Fukuyama, F. "Social capital and development: The coming Agenda." SAIS Review 22 no.1 (2002): 23-37.
-
Furht and Escalante 2010 (†583)
Furht, Borko, and Armando Escalante, eds. Handbook of Cloud Computing (Springer, 2010).
-
G8 Open Data 2013 (†270)
"G8 Open Data Charter" (June 2013).
-
Gallagher 2014 (†554)
Gallagher, Sean. "Taking Back Privacy in the Post-Snowden Cloud." Ars Technica (28 October 2014).
-
GAO 2008 (†687)
Privacy: Alternatives Exist for Enhancing Protection of Personally Identifiable Information (United States Government Accountability Office, May 2008).
-
GAO 2011 (†538)
Government Auditing Standards (Government Accountability Office, 2011).
-
Garfinkel and Shelat 2003 (†718)
Garfinkel, Simson L. and Abhi Shelat. "Remembrance of Data Passed: A Study of Disk Sanitization Practices." IEEE Security and Privacy 1 (2003), p.17-27.
-
Garfinkel et al. 2016 (†823)
Garfinkel, Haskell, Jeremy Drank, and Cathryn Marsh. "Q&A What is blockchain?" (pwc, January 2016)
-
Garner 2003 (†878)
Garner, Bryan A. Garner's Modern American Usage (Oxford University Press, 2003).
-
Gartner IT Glossary (†298)
IT Glossary (Gartner Research, n.d. checked 16 Aug 2013).
-
Gaur 2016 (†772)
Gaur, Nitin. "Blockchain: A Platform for Disintermedation" (Information Forecast, 2016).
-
Gazaryan 2013 (†624)
Gazaryan, Karen. "Authenticity of Archived Websites: The Need to Lower the Evidentiary Hurdle is Imminent" Rutgers Computer & Technology Law Journal 39:2 (2013), p.216-245.
-
GCN 2013 (†261)
"Big Data = Big Exposure. What Can You Do About It?" GCN (29 July 2013).
-
Geber et al. 2009 (†688)
Gerber, Benjamin, Adam C. Nelson, and Steven L. Jones. "Achieving Data Privacy Through Data Obfuscation." Privacy and Data Security Law Journal (March 2009).
-
Geiger and von Lucke 2013 (†296)
Geiger,Christian Philipp, and Jörn von Lucke, “Open Government and (Linked) (Open) (Government) (Data),” JeDEM 4, no. 2 (2013): 465-278.
-
Gellman 2009 (†561)
Gellman, Robert. Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing (World Privacy Forum, 2009).
-
Gens 2008 (†582)
Gens, Frank. "Defining 'Cloud Services' and 'Cloud Computing'" IDC Exchange blog (IDC, 23 September 2008).
-
Gilbert 1791 (†702)
Gilbert, Geoffrey. The Law of Evidence, with Notes and Additional References to Contemporary Writers and Later Cases, by James Sedgwick (Philadelphia: Jospeh Crukshank, 1805).
-
Gingrich & Morris 2006 (†358)
Gingrich, Laurie L., and Brian D. Morris. “Retention and Disposition of Structured Data: The Next Frontier for Records Managers." The Information Management Journal, Mar/Apr (2006).
-
Girotra and Netessine 2014 (†656)
Girotra, Karan, and Serguei Netessine. "Four Paths to Business Model Innovation" Harvard Business Review 92:7/8 (July/August 2014), p.96-103.
-
Gittlen 2009 (†633)
Gittlen, Sandra. "Thin Provisioning: Don't Let the Gotchas Getcha" Network World 26:4 (January 26, 2009), p.32,34.
-
Goh 2014 (†726)
Goh, Elaine. "Clear Skies or Cloudy Forecast?: Legal Challenges in the Management and Acquisition of Audiovisual Materials in the Cloud," Records Management Journal 24:1 (2014), p.56-73.
-
Google v. AEPD 2014 (†423)
In Case C-131/12, REQUEST for a preliminary ruling under Article 267 TFEU from the Audiencia Nacional (Spain), made by decision of 27 February 2012, received at the Court on 9 March 2012, in the proceedings Google Spain SL, Google Inc. v Agencia Esp"Agencia Española de Protección de Datos (AEPD), Mario Costeja González (Court of Justice of the European Union, 13 May 2014).
-
Google v. AEPD Opinion 2013 (†424)
Opinion of Advocate General Jääskinen delivered on 25 June 2013, Case C-131/12, Google Spain SL, Google Inc. v Agencia Española de Protección de Datos (AEPD), Mario Costeja González (Eurpean Court of Justice, 13 May 2014).
-
Greenway 2009 (†514)
Greenway, Mateen. "Data Obfuscation: Managing Data Privacy in Development and Test Environments." ITadviser 59 (Autumn 2009).
-
Grounds and Cheesbro 2013 (†600)
Grounds, Alison, and Ben Cheesbro, "Cloud Control: eDiscovery and Litigation Concerns with Cloud Computing" Computer & Internet Lawyer 30:9 (September 2013), p.23-31.
-
Guiding the Enterprise (part 5) 2011 (†276)
"Understanding the key terms surrounding the hybrid cloud model" (part 5). Guiding the enterprise into a hybrid cloud model (TechTarget, 31 May 2011).
-
Gutwirth 2011 (†429)
Gutwirth, Serge, Computers, Privacy and Data Protection: an Element of Choice: An Element of Choice (Springer, 2011).
-
Halvening [2017] (†799)
The Halvening! Bitcoin Halving for Rocket Lovers
-
Hamilton 2011 (†360)
Hamilton, Kelly. “Structured Data Elements: Are They Records?” Information Management, Mar/Apr (2011).
-
Han 2011 (†644)
Han, Yan. "Cloud Computing: Case Studies and Total Costs of Ownership" Information Technology and Libraries 30:4 (December 2011), p.198-206.
-
Hanna and Molina 2010 (†584)
Hanna, Steve, and Jesus Molina. "Cloud Security Questions? Here Are Some Answers" Cloud Computing Journal (SYS-CON Media, 24 March 2010).
-
Harbert 2011 (†634)
Harbert, Tam. "A New Job for Mainframes?" Computerworld 45:13 (July 18, 2011), p.20,22,24-25.
-
Hardin 2002 (†284)
Hardin, Russell. Trust and Trustworthiness. (New York: Russell Sage Foundation, 2002).
-
Hawkins, et al. 2000 (†676)
Hawkins, Steve M., David Yen, and David C. Chou. "Disaster Recovery Planning: A Strategy for Data Security" Information Management and Computer Security 8:5 (2000), p.222-229.
-
Hayes 2003 (†912)
Hayes, Bill. "Conducting a Security Audit: An Introductory Overview," Symantec Connect (25 May 2003).
-
Health Analytics 2013 (†704)
"Pseudonymization or Anonymization?" Health Analytics' Blog (19 June 2013).
-
Health Informatics 2008 (†703)
Health Informatics – Pseudonymization : ISO/TS 25237:2008 (ISO, 2008)
-
Heffernan 2014 (†368)
Heffernan, Shayne. "Privacy and Security in the Cloud IBM." HeffX (19 Jan 2014).
-
Hendler et al. 2012 (†353)
Hendler, James, Jeanne Holm, Chris Musialek, and George Thomas. "US Government Linked Open Data: Semantic.data.gov." IEEE Intelligent Systems 27, no. 3 (2012): 25-31.
-
Hesseldahl 2013 (†267)
Hesseldahl, Arik. "Think Big Data is All Hype? You're Not Alone." All Things D (19 August 2013).
-
Hilbert 2013 (†320)
Hilbert, Martin. “Big Data for Development: From Information to Knowledge-Societies,” pre-published version (2013).
-
HLWIKI Canadata 2016, s.v. "context collapse" (†748)
HLWIKI Canada
-
Hobson 2013 (†315)
Hobson, Sophie. Beginner's guide to big data #1: what are big data and business analytics? London Loves Business (August 2013).
-
Hogge 2010 (†269)
Hogge, Becky, Open Data Study: New Technologies (Open Society Foundation, 2010).
-
Holpuch 2015 (†622)
Holpuch, Amanda. "Facebook still suspending Native Americans over 'real name' policy." The Guardian (16 February 2015).
-
Hon, et al. 2011 (†692)
Hon, W. Kuan, Christopher Millard, and Ian Walden. "The Problem of 'Personal Data' in Cloud Computing: What Information is Regulated?--The Cloud of Unknowing" International Data Privacy Law 1:4 (November 2011), p.211-228.
-
Hoover 2008 (†671)
Hoover, J. Nicholas. "Service Outages Force Cloud Adopters to Rethink Tactics" InformationWeek 1199 (August 18-25, 2008), p.24, 26
-
Hope 2007 (†668)
Hope, Michele. "The Fine Art of Destruction" Network World 24:15 (April 16, 2007), p.27,30,32,35.
-
Horizon 2020 2013 (†397)
Horizon 2020. “Horizon 2020 Work Programme 2014 – 2015 (Informal Draft Discussion Document),” 2013.
-
Horne and Shirley, 2009 (†463)
Horne, M., and Shirley, T. (2009). “Co-production in public services: A new partnership with Citizens” (Discussion Paper). U.K.: Cabinet Office [The Strategy Unit].
-
Hu, et al. 2006 (†728)
Hu, Vincent C., David F. Ferraiolo, and D. Rick Kuhn. Assessmenet of Access Control Systems (National Institute of Standards and Technology, 2006).
-
Hunter 2014 (†602)
Hunter, Steven V. "As You Consider Moving Data to the Cloud..." Computer and Internet Lawyer 31:1 (January 2014), p. 16-18.
-
Hurley 2015 (†642)
Hurley, Grant. "A Standard of Practice for Information Protection in Archives and Records Management: Discussion Paper" (InterPARES Trust, 2015). Personal communication from the author.
-
Hurley 2017 (†902)
Hurley, Grant. "Your Comments Here: Contextualizing Technologies, Seeking Records and Supporting Transparency for Citizen Engagement. Tidsskriftet Arkiv 8: 1, p. 1-25.
-
Hurley, Léveillé, and McDonald 2016 (†901)
Hurley, Grant, Valerie Léveillé, and John McDonald. "Managing Records of Citizen Engagement Initiatives: A primer: NA 08" (InterPARES Trust, 2016).
-
Hutchinson 2015 (†632)
Hutchinson, Lee. "The Big Deal about 'Big Data' - Your Guide to What the Heck It Actually Means." Wired (24 February 2015).
-
Hutt 2015 (†873)
Hutt, Rosamond. "What are your digital rights?" (World Economic Forum, 13 November 2015).
-
Hype Cycles 2013 (†268)
"Hype Cycle Research Methodology" [webpage] (Gartner, 2013).
-
IBM 2013 (†343)
"What is cloud?" [IBM Cloud website (n.d., checked 16 Nov 2013).]
-
IBM Data Governance 2007 (†529)
The IBM Data Governance Council Maturity Model: Building a Roadmap for Effective Data Governance. (IBM 2007).
-
IBM Four Vs 2103 (†522)
"The Four V's of Big Data." (IBM, [2013?]).
-
IBM IIG 2014 (†448)
"Information Integration and Governance." (IBM, [n.d. 2014]).
-
ICA Terminology (†247)
ICA Terminology Database
-
ICPSR Guide 2013 (†531)
"Guide to Social Science Data Preparation and Archiving Phase 1: Proposal Development and Data Management Plans." Deposit Data (ICPSR, [2013]).
-
IGI 2014 (†498)
Information Governance Initiative. "Information Governance Initiative Annual Report 2014", 2014
-
IGRM 2012 (†447)
"Information Governance Reference Model (IGRM)." EDRM ([ca. 2012])
-
InfoLawGroup 2010 (†746)
InfoLawGroup LLP. "Cloud Computing Customers’ 'Bill of Rights'.” Information Law Group website (October 11, 2010).
-
Information Security Handbook 2009. (†485)
"Inherent and Residual Risk." Information Security Handbook (ISRMC, 2009).
-
Information Security Handbook Glossary 2009 (†486)
"Glossary of Information Security Terms." Information Security Handbook (ISMRC, 2009).
-
Inofuentes 2014. (†369)
Inofuentes, Jason. "Western Digital My Cloud Review: The $150 personal cloud." Ars Technica (19 Jan 2014).
-
International Records Management Trust 2009 (†572)
International Records Management Trust. Training in Electronic Records Management: Glossary of Terms (International Records Management Trust, 2009).
-
IP2 (†761)
"Authenticity Task Force Report,"The Long-term Preservation of Authentic Electronic Records: Findings of the InterPARES Project.
-
IP2 Dictionary (†242)
The InterPARES 2 Project Dictionary (8 June 2013).
-
IP2 Glossary (†386)
InterPARES 2 Glossary
-
IRM 2002 (†491)
A Risk Management Standard (Institute of Risk Management, [2002?]).
-
Irwin Law (†378)
Irwin Law. “The Canadian Online Legal Dictionary.” Welcome to Irwin Law’s Canadian Online Legal Dictionary | Irwin Law. Accessed February 27, 2014. http://www.irwinlaw.com/cold.
-
ISACA Glossary (†743)
ISACA. "Glossary." ISACA
-
Isaza 2010 (†326)
Isaza, John. "Metadata in Court: What RIM, Legal and IT Need to Know." (ARMA International Education Foundation, 2010).
-
ISO 14873 (draft) 2012 (†504)
Information and Documentation – Statistics and Quality Indicators for Web Archiving [draft] (ISO, 2012).
-
ISO 73, 2009 (†456)
ISO/GUIDE 73:2009(en) – Risk Management – Vocabulary
-
ISO TC307 (Japan). 2017 (†857)
ISO TC307 (Japan). 2017. "Blockchain and electronic distributed ledger technologies–Terminology and concepts," unpublished submission, 2017.
-
ISO TC307 N38 (United States). 2017. (†834)
ISO TC307 N38 (United States). 2017. "United States NB-Contribution-SG-Vocabulary-RA,” unpublished submission, March 15, 2017.
-
ISO TC307 N55 (France). 2017 (†858)
ISO TC307 N55 (France). 2017. "Blockchain and electronic distributed ledger technologies –Terminology and concepts," AFNOR Blockchain Standardization Committee, unpublished submission, March 30, 2017.
-
ISO TC307 N67 (United Kingdom). 2017. (†841)
ISO TC307 N67 (United Kingdom). 2017. "United Kingdom NB-Contribution-SG-Vocabulary-RA,” unpublished submission, April 5, 2017.
-
ISO/IEC 10118-1:2016 (†843)
ISO/IEC 10118-1:2016
-
IT Governance Institute 2003 (†579)
IT Governance Institute. Board Briefing on IT Governance 2nd ed. (IT Governance Institute, 2003).
-
IT Governance Institute 2014 (†578)
IT Governance Institute. "About Governance of Enterprise IT (GEIT)" IT Governance Institute website (IT Governance Institute, 2014).
-
ITrust Africa - Launch Report 2014 (†399)
ITrust, Luciana Duranti, Shadrack Katuu, G Wagener, A Motsi, and E Pretorius. “Report on the Meeting for the Launch of the InterPARES African Team on 27 November 2013, at the University of South Africa, Muckleneuk Ridge Campus, Tshwane,” November 27, 2013. http://interparestrust.org/assets/documents/iTrust_Nov272013_TeamAfrica_Launch_Report.pdf.
-
ITrust EU. Research Project 5, Proposal. (†396)
ITrust. “Research Project 5 - Models for Monitoring and Auditing of Compliance in the Flow from Registration to Archive in E-Register - Proposal,” January 19, 2014. http://interparestrust.org/assets/documents/iTrust_Jan192014_EUR_Team_Research_Project_05_Models_Monitoring_Auditing_Compliance_eRegister_Proposal_FINAL.pdf.
-
ITrust NA. Research Project 17 - Proposal (†392)
ITrust. “Research Project 17 - Plurality and Policy - Proposal,” October 28, 2013. http://interparestrust.org/assets/documents/iTrust_Oct282013_NA_Team_Research_Project_17_Policy_Proposal_FINAL.pdf.
-
ITrust NA. Research Project 4 - Proposal (†393)
ITrust. “Research Project 4 - Putting the Fun in Functional - Proposal,” October 28, 2013.
-
ITrust Research Project 16 Proposal, 2013 (†388)
ITrust. “Research Project 16 - Metadata Design Requirements - Proposal,” October 28, 2013. http://interparestrust.org/assets/documents/iTrust_Oct282013_NA_Team_Research_Project_16_Metadata_Design_Requirements_Proposal_FINAL.pdf.
-
ITrust Research Project 8 Proposal, 2013 (†390)
ITrust. “Research Project 9 - Retention Specifications - Proposal,” October 28, 2013. http://interparestrust.org/assets/documents/iTrust_Oct282013_NA_Team_Research_Project_09_Retention_Specifications_Proposal_FINAL.pdf.
-
ITrust Research Project 9 Proposal, 2013 (†389)
ITrust. “Research Project 8 - Open Data Open Government - Proposal,” October 28, 2013. http://interparestrust.org/assets/documents/iTrust_Oct282013_NA_Team_Research_Project_08_Open_Data_Open_Government_Big_Data_Proposal_v2_FINAL.pdf.
-
ITrust RP 19 Proposal (†410)
ITrust. “Research Project 19 - International Reporting Program - Creative Commons Content Archive - Proposal”, March 27, 2014.
-
Iyengar, et al. 2014 (†637)
Iyengar, N. Ch. S. N., Arindam Banerjee, and Gopinath Ganapathy. "A Fuzzy Logic Based Defense Mechanism Against Distributed Denial of Service Attack in Cloud Computing Environment" International Journal of Communication Networks and Information Security 6:3 (December 2014), p.233-245.
-
Jacoby, Vint, and Simon 2013 (†359)
Jacoby, Conrad, Jim Vint, and Michael Simon. “Databases Lie! Successfully Managing Structured Data, the Oft-Overlooked ESI.” Richmond Journal of Law & Technology, Vol. 19.3 (2013).
-
James 2013 (†520)
James, Laura. "Defining Open Data." Open Knowledge Foundation Blog (3 October 2013).
-
Jannsen 2015 (†612)
Janssen, Cory. "Measured Service." Techopedia ([2015]).
-
Jansen and Grance 2011 (†409)
Jansen, Wayne, and Timothy Grance. Guidelines on Security and Privacy in the Cloud (National Institute of Standards and Technology, 2011).
-
Janssen 2014 (†453)
Janssen, Cory. "Semi-structured data." Techopedia ([n.d. 2014]).
-
Janssen, Charalabidis, and Zuiderwijk, 2012 (†351)
Janssen, Marlijn, Yannis Charalabidis, and Anneke Zuiderwijk. "Benefits, Adoption Barriers and Myths of Open Data and Open Government." Information Systems Management 29, no. 4 (2012): 258-268.
-
Jee 2013 (†354)
Jee, Charlotte. "Opening Up Government." New Statesman (blog). November 25, 2013.
-
Jenkinson 1922 (†502)
Jenkinson, Hilary. A Manual of Archive Administration: Including the Problems of War Archives and Archive Making. (Humphrey Milford, 1922).
-
Kahn 1967 (†849)
Kahn, David. The Codebreakers: the Story of Secret Writing. New York: Macmillan,1967.
-
Kanter 2014 (†416)
Kanter, James. "Google Must Honor Requests to Delete Links, E.U. Court Says," New York Times (13 May 2014).
-
Kar & Wong 2016 (†828)
Kar, Ian and Joon Ian Wong. "Everything you need to know about the Ethereum 'hard fork'." (Quartz, 18 July 2016)
-
Kelton, Fleischmann, and Wallace 2008 (†287)
Kelton, Kari, Kenneth R. Fleischmann, and William A. Wallace. “Trust in Digital Information.” Journal of the American Society for Information Science and Technology 59(3) (2008): 363-374.
-
Kesan, et al. 2013 (†720)
Kesan, Jay P., Carol M. Hayes, and Masooda N. Bashir, "Information Privacy and Data Control in Cloud Computing: Consumers, Privacy Preferences, and Market Efficiency," Washington and Lee Law Review 70:1 (Winter 2013), p.341-472.
-
Khramtsovsky 2014 (†459)
Khramtsovsky, Natasha. Email to Richard Pearce-Moses, 22 July 2014
-
Killerby, 2005. (†467)
Killerby, P. "Trust Me, I'm From the Government": The Complex Relationship between Trust in Government and Quality of Governance. Social Policy Journal of New Zealand 25, no.1 (2005): 1-15.
-
Kirby 2010 (†598)
Kirby, Paul. "Microsoft Urges Congress, Administration to Enhance Security of Cloud Computing" Cybersecurity Policy Report (January 25, 2010), p.N/A.
-
Kirkpatrick 2011 (†325)
Kirkpatrick, Robert. “Data Philanthropy: Public & Private Sector Data Sharing for Global Resilience.” Global Pulse Blog (September 16, 2011).
-
Kirkpatrick 2013 (†321)
Kirkpatrick, Robert. “A New Type of Philanthropy: Donating Data”, HBR Blog Network (March 21, 2013).
-
Kissel, et al. 2014 (†716)
Kissel, Richard, Andrew Regenscheid, Matthew Scholl, and Kevin Stine. Guidelines for Media Sanitization (National Institute of Standards and Technology, U.S. Department of Commerce: 2014).
-
Kiviat 2015 (†822)
Kiviat, Trevor I. 2015. Beyond bitcoin: Issues in regulating blockchain transactions. Duke Law Journal 65 (3): 569. p.605; citing Swanson, Tim. "Great chain of numbers: A guide to smart contracts, smart property and trustless asset management." (2014)
-
Knapp 2008 (†282)
Knapp, Thomas R. "Reliability." In Encyclopedia of Survey Research Methods, edited by Paul J. Lavrakas, 714-15. Thousand Oaks, CA: SAGE Publications, Inc., 2008. doi: 10.4135/9781412963947.n464.
-
Knorr & Gruman 2011 (†342)
Knorr, Eric, and Galen Gruman. What Cloud Computing Really Means." InfoWorld (7 April 2008).
-
Kohn 2008 (†285)
Kohn, Marek. Trust: Self-interest and the Common Good (Oxford University Press, 2008).
-
Kolsaker and Lee-Kelley, 2008 (†494)
Kolsaker, Ailsa and Lee-Kelley, Liz. “Citizen’s Attitudes Towards e-Government and e-Governance: A UK Study.” International Journal of Public Sector Management 21, no. 7 (2008): 723-738.
-
Kouns and Minoli 2010 (†404)
Kouns, Jake, and Daniel Minoli. "Information Technology Risk Management in Enterprise Environments: A review of industry practices and a practical guide to risk management teams" (Wiley, 2010).
-
Kroll 2013 (†695)
Kroll, Karen. "How to Destroy Data ... Once and for All" Compliance Week 10:112 (May 2013), p.42-43.
-
Krusten 2014 (†375)
Krusten, Maarja. "Context." NixoNARA (27 February 2014).
-
Kuner 2011 (†727)
Kuner, C. "Regulation of Transborder Data Flows under Data Protection and Privacy Law: Past, Present, and Future," OECD Digital Economy Papers No. 187 (OECD Publishing, 2011).
-
Kurian 2013 (†576)
Kurian, George Thomas. The AMA Dictionary of Business Management (Amacom, 2013).
-
Kushida, et al. 2011 (†691)
Kushida, Kenji E., Jonathan Murray, and John Zysman. "Diffusing the Cloud: Cloud Computing and Implications for Public Policy" Journal of Industry, Competition and Trade 11:3 (September 2011), p.209-237.
-
Kusnetzky 2010 (†337)
Kusnetzky, Dan. "What is 'Big Data'?" ZD.net (16 February 2010).
-
Ladley 2012 (†589)
Ladley, John. Data Governance: How to Design, Deploy, and Sustain an Effective Data Governance Program (Morgan Kaufman, 2012).
-
Lalonde [2017] (†820)
Lalonde, Oli. "Proof of Assets." (GitHub, olalonde 2017).
-
Laney 2013 (†481)
Laney, Doug. "Batman on Big Data." Garter Blog Network (13 November 2013).
-
Lasewicz 2013 (†329)
Lasewicz, Paul. "The Origins of Cloud Computing." The Greater IBM Connection (10 October 2013).
-
Law 2011 (†581)
Law, Jonathan. Business: The Ultimate Resource 3rd ed. (A & C Black, 2011).
-
Lawless 2000 (†283)
Lawless, Jerry. “Statistics in Reliability.” Journal of the American Statistical Association 95(451) (2000): 989-992.
-
Lemieux 2001 (†245)
Lemieux, Victoria L."Let the Ghosts Speak: An Empirical Exploration of the 'Nature' of the Record." Archivaria 51 (Spring 2001), p. 81–111.
-
Lemieux 2004 (†405)
Lemieux, L. Victoria. Managing Risks for Records and Information. ARMA International 2004.
-
Lemieux and Sporny 2017 (†847)
Lemieux, Victoria L., and Manu Sporny. "Preserving the Archival Bond in Distributed Ledgers: A Data Model and Syntax," Proceedings of the 26th International Conference on World Wide Web Companion (International World Wide Web Conferences Steering Committee, 2017), p. 1437-1443
-
Leverich, et al. 2014 (†547)
Leverich, Mel, Kathryn Nalliah, and Jim Suderman. "Historical Study of Cloud-based Services." iTrust #11.
-
Leverich, et al. 2014 (†666)
Leverich, Mel, Meghan Whyte Eng Senseveng, and Fred Cohen. "A Comparison of ARM Literature and Information Protection Standards of Practice." InterPARES Trust, 2014.
-
Lévillé 2015 (†738)
Lévillé, Valerie. "Cloud Archives," in Luciana Duranti and Patricia Franks, ed. Encyclopedia of Archival Science Rowman & Littlefield, 2015).
-
Lexalytics 2018 (†910)
"Sentiment Analysis" (Lexalytics, [2018]).
-
Liang, et al. 2008 (†658)
Liang, F., R. Y. K. Fung, Z. Jiang, and T. N. Wong. "A Hybrid Control Architecture and Coordination Mechanism in Virtual Manufacturing Enterprise" International Journal of Production Research 46:13 (July 2008), p.3641-3663.
-
Library Privacy Blog 2017 (†895)
"Public/private & the Concept of 'Practical Obscurity'," Library Privacy Blog (4 May 2017).
-
Lin 2013 (†304)
Lin, Thomas. "Big Data is too Big for Scientists to Handle Alone." Wired (13 October 2013).
-
Lipkis 2013 (†339)
Lipkis, Tom. Email to Richard Pearce-Moses (15 Nov 2013).
-
Liu 2013 (†913)
Liu, Wayne W. "Accountability for Archival Digital Curation in Preserving the Memory of the World," The Memory of the World in the Digital Age: Digitization and Preservation (UNESCO, 2013).
-
Logan 2010 (†446)
Logan, Debra. "What is Information Governance? And Why is it So Hard?" Gartner Blog Network (Gartner, 11 January 2010).
-
Lohr 2012A (†260)
Lohr, Steve. "How Big Data Became So Big." The New York Times (11 August 2012).
-
Lohr 2013B (†259)
Lohr, Steve. "The Origins of 'Big Data': An Etymological Detective Story." The New York Times: Bits (1 February 2013).
-
Lohr 2013C (†252)
Lohr, Steve. Searching Big Data for Digital Smoke Signals. New York Times (7 August 2013).
-
Lorican 2016 (†745)
Lorica, Ben. "Metadata services can lead to performance and organizational improvements." The O'Reilley Data Show Podcast (11 February 2016).
-
Loveland, et al. 2008 (†643)
Loveland, S., E. M. Dow, F. LeFevre, D. Beyer, and P. F. Chan. "Leveraging virtualization to optimize high-availability system configurations" IBM Systems Journal 47:4 (October-December 2008), p.591-604.
-
Lynch 2000 (†391)
Lynch, Clifford A. “Authenticity and Integrity in the Digital Environment: An Exploratory Analysis of the Central Role of Trust.” In Authenticity in a Digital Environment, edited by Council on Library and Information Resources. Washington, D.C.: Council on Library and Information Resources, 2000. http://www.clir.org/pubs/reports/pub92/reports/pub92/pub92.pdf.
-
Lynch 2017 (†888)
Lynch, Michael. “Post-truth, Alt-facts, and Asymmetric Controversies (Part I): Between Liars and Truthers,” First 100 Days: Narratives of Normalization and Disruption (Program on Science, Technology, and Society, 6 February 2017).
-
Macintosh, 2004 (†493)
Macintosh, A. “Characterizing e-Participation in Policy-Making.” Proceeding of the 37th Annual Hawaii International Conference on System Sciences (2004):1-10.
-
MacNeil 2000 (†286)
MacNeil, Heather. Trusting Records: Legal, Historical, and Diplomatic Perspectives. (Dordrecht: Kluwer, 2000).
-
MacNeil 2011 (†289)
MacNeil, Heather. "Trust and professional identity: narratives, counter-narratives and lingering ambiguities." Archival Science (2011) 11: 175-192.
-
Magoulas and Lorica 2009 (†338)
Magoulas, Roger, and Ben Lorica. "Big Data: Technologies and Techniques for Large-Scale Data." Release 2.0 11 (February 2009).
-
Magretta 2002 (†655)
Magretta, Joan, "Why Business Models Matter" Harvard Business Review 80:5 (May 2002), p.86-92.
-
Malin, et al. 2003 (†722)
Malin, B., L. Sweeney, and E. Newton, "Trail Re-Identification: Learning Who You Are From Where You Have Been" Mellon University, Laboratory for International Data Privacy (Pittsburgh, PA: March 2003).
-
Mambl 2013 (†619)
Mambl, Adam J. "Electronic Evidence in Tanzania" Digital Evidence and Electronic Signature Law Review 10 (2013), p.123-127.
-
Mancuso 2013A (†366)
Mancuso, Lara. "Trust in Business." [Unpublished mss on ITrust site].
-
Mancuso 2013B (†367)
Mancuso, Lara. "Trust in Law." [Unpublished mss on ITrust site.]
-
Manyika, et al. 2011 (†306)
Manyika, James, Michael Chui, Brad Brown, Jacques Bughin, Richard Dobbs, Charles Roxburgh, and Angela Hung Byers. Big Data: The Next Frontier for Innovation, Competition, and Productivity (McKinsey Global Institute, May 2011).
-
Martin 2008 (†715)
Martin, Richard. "The Web's New Traffic COP" Information Week 1215 (December 15, 2008), p.32-33, 36-37.
-
Marwick and Boyd 2011 (†635)
Marwick, Alice E. and Danah Boyd. "I Tweet Honestly, I Tweet Passionately: Twitter Users, Context Collapse, and the Imagined Audience" New Media and Society 13:1 (February 2011), p.114-133.
-
Marwick and Ellison 2012 (†627)
Marwick, Alice, and Nicole B. Ellison. "'There Isn't Wifi in Heaven!' Negotiating Visibility on Facebook Memorial Pages" 56:3 (July 2012), p.378-400.
-
Matthews 2010 (†606)
Matthews, Steve. "Anonymity and the Social Self" American Philosophical Quarterly 47:4 (October 2010), p.351-363.
-
Mattson, 1986 (†462)
Mattson, G. “The Promise of Citizen Coproduction: Some Persistent Issues.” Public Productivity Review 10, no. 2 (1986): 51-56.
-
Mayer-Schönberger and Cukier 2013 (†271)
Mayer-Schönberger, Viktor, and Kenneth Cukier. Big Data: A Revolution that will transform how we live, work, and think (Eamon Dolan/Houghton Mifflin Harcour, 2013).
-
Mazmanian 2014 (†682)
Mazmanian, Adam. "The Mosaic Effect and Big Data." FCW (13 May 2014).
-
McDonald and Lévillé 2014 (†519)
McDonald, John, and Valerie Lévillé. "Wither the Retention Schedule in the Era of Big Data and Open Data?" [Forthcoming in Records Management Journal).
-
McLellan 2015 (†777)
McLellan, Charles. "Archiving as a Service: A Cold-Storage Solution," ZDNet (1 July 2015).
-
McLelland, et al. 2014 (†403)
McLelland, Robert, Grant Hurley, and Daniel Collins. “10-Contract Terms with Cloud Service Providers (Draft).” InterPARES Trust, February 12, 2014.
-
McLelland, et al. 2014 (†690)
McLelland, Robert, Yvette Hackett, Grant Hurley, and Daniel Collins Agreements between Cloud Service Providers and their Clients: A Review of Contract Terms (InterPARES Trust, 2014).
-
McMillan 2014 (†535)
McMillan, Robert. "The Internet Is Broken, and Shellshock Is Just the Start of Our Woes." Wired (29 September 2014).
-
Medhat et al. 2014 (†886)
Medhat, Walaa, Ahmed Hassan, and Hoda Korashy. "Sentiment analysis algorithms and applications: A survey," Ain Shams Engineering Journal 5:4 (December 2014).
-
Mell and Grance 2011 (†334)
NIST Definition of Cloud Computing: Recommendations of the National Institute (National Institute of Standards and Technology, 2011).
-
Merriam-Webster Online (†395)
“Dictionary and Thesaurus - Merriam-Webster Online.”
-
Messmer 2013 (†636)
Messmer, Ellen. "Can your cloud provider get evidence you need?" Network World 30:4 (March 11, 2013), p.15.
-
Microsoft 2015 (†662)
"Security and Identity," Windows Dev Center - Desktop (Microsoft, 2015).
-
Mill & Reeve 2016 (†764)
"Framework agreements," Procurement Portal (Mill & Reeve, [2016]).
-
Miller 2012 (†625)
Miller, Colin. Evidence: Best Evidence Rule (CALI eLangdell Press, 2012).
-
Miller and Listhaug 1990 (†394)
Miller, Arthur H., and Ola Listhaug. “Political Parties and Confidence in Government: A Comparison of Norway, Sweden and the United States.” British Journal of Political Science 20:3 (1 July 1990), p. 357–86.
-
Miola 2008 (†713)
Miola, Jose. "Owning Information - Anonymity, Confidentiality and Human Rights" Clinical Ethics 3:3 (2008), p.116-120.
-
Misra 2014 (†370)
Misra, Ria. "A Look Inside the World of 'Dark Data'." io9 (11 February 2014).
-
Mistal 2003 (†893)
Misztal, Barbara. Theories of Social Remembering (Open University Press, 2003).
-
Modi, et al. 2013 (†595)
Modi, Chirag, Dhiren Patel, Bhavesh Borisaniya, Avi Patel, and Muttukrishnan Rajarajan. "A Survey on Security Issues and Solutions at Different Layers of Cloud Computing" Journal of Supercomputing 63:2 (February 2013), p.561-592.
-
Mohamed and Kaur a/p Gian Singh 2012 (†558)
Mohamed, Norshidah, Jasber Kaur a/p Gian Singh. "A Conceptual Framework for Information Technology Governance Effectiveness in Private Organizations" Information Management & Computer Security 20:2 (2012), p.88-106
-
Möller 2014 (†427)
Möller, Christian. "Internet Dementia – European Court Judgment and the ‘Right to be Forgotten’." CGCS Media Wire (16 June 2014).
-
Moskop et al. 2005 (†506)
Moskop, et al. "From Hippocrates to HIPAA: Privacy and Confidentiality in Emergency Medicine." Annuals of Emergency Medicine 45:1 (January 2005), p. 53-59.
-
Moss 2012 (†614)
Moss, Simon. "How to Build an Effective Enterprise Risk Management Solution" Wall Street and Technology 30:3 (September 2012), n/a.
-
Multisignature 2017 (†795)
"Multisignature." (Wikipedia, 2017)
-
Muralidhar and Sarathy 2006. (†699)
Muralidhar, Krishnamurty, and Rathindra Sarathy. "Data Shuffling: A New Masking Approach for Numerical Data." Management Science 52:5 (May 2006), p. 658–670.
-
Murphy and Barton 2014 (†721)
Murphy, Michael, and John Barton, "From a Sea of Data to Actionable Insights: Big Data and What It Means for Lawyers," Intellectual Property & Technology Law Journal 26:3 (March 2014), p.8-17.
-
Nadhan 2014 (†549)
Nadhan, E. G. "Information Governance is more than just Data Governance." Enterprise CIO Forum (22 January 2014).
-
Nakamoto 2008 (†804)
Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic cash system" (2008).
-
NARA FAQ Cloud Computing (†335)
"Frequently Asked Questions about Managing Federal Records In Cloud Computing Environments" [webpage] (National Archives and Records Administration, [n.d.])
-
National Archives Information Asset (†788)
"What is an information asset?" (The National Archives, [n.d.]).
-
Neff 2013 (†318)
Neff, Gina. “Why big data won’t cure us,” Big Data 1:3 (2013): 117-123
-
Nelson and Simek [2016] (†775)
Nelson, Sharon, and John Simek. "Hot Buttons," Law Practice 32:8.
-
Nelson et al. 2014 (†887)
Nelson, Bill, Amelia Phillips, and Christopher Steuart. Guide to Computer Forensics and Investigations (Cengage Learning, 2014).
-
Net 2000 2010 (†700)
"Data Masking: What You Need to Know" (Net 2000 Ltd, 2010).
-
Net 2000 2010B (†701)
"Data Sanitization Techniques" (Net 2000 Ltd, 2010).
-
NetLingo 2002 (†292)
Jansen, Eric. NetLingo: The Internet Dictionary (NetLingo, 2002).
-
Newitz 2005 (†894)
Newitz, Annalee. "Dangerous Terms: A User's Guide to EULAs" (Electronic Frontier Foundation, 2005).
-
Nickel and Vaesen 2012 (†407)
Nickel, Philip J., and Krist Vaesen. "Risk and Trust." In S. Roeser, R. Hillerbrand, P. Sandin, M. Peterson, eds., Handbook of Risk Theory (Springer, 2012).
-
Nissenbaum 1999 (†607)
Nissenbaum, Helen. "The Meaning of Anonymity in an Information Age" Information Society 15:2 (April-June 1999), p.141-144.
-
NIST 2010 (†710)
McCallister, Erika, Tim Grance, and Karen Scarfone. "Guide to Protecting the Confidentiality of Personally Identifiable Information (PII): Special Publication 800-122" (National Institute of Standards and Technology, 2010).
-
NIST 2011B (†415)
NIST Cloud Computing Reference Architecture: Special Publication 500-292 (NIST, 2011).
-
NIST 2013 (†734)
Security and Privacy Controls for Federal Information Systems and Organizations: SP 800-53 – rev. 4 (National Institute of Standards and Technology, 2013).
-
NIST 2014 (†707)
Kissel, Richard, Andrew Regenscheid, Matthew Scholl, and Kevin Stine. Guidelines for Media Sanitization (National Institute of Standards and Technology, 2014).
-
NIST FIPS 199 2004 (†735)
Standards for Security Categorization of Federal Information and Information Systems: FIPS Pub 199 (National Institute of Standards and Technology, 2004).
-
NIST Framework 2014 (†413)
Framework for Improving Critical Infrastructure Cybersecurity - v. 1.0 (National Institute of Technology, 2014).
-
NIST Managing Information Security Risk 2011 (†484)
Managing Information Security Risk: Organization, Mission, and Information System View (NIST, 2011).
-
NIST Public Affairs Office 2017 (†898)
"NIST General Information" (NIST Public Affairs Office, 2017).
-
NIST Risk Assessment 2012 (†482)
Guide for Conducting Risk Assessments (NIST, 2012).
-
NIST Risk Management Framework 2010 (†483)
Guide for Applying the Risk Management Framework to Federal Information Systems (NIST, 2010).
-
NIST Security Reference 2013 (†414)
NIST Cloud Computing Security Reference Architecture: Special Publication 500-299 (NIST, [2013?]).
-
NIST SP800-128 2011 (†732)
Johnson, Arnold, et al. Guide for Security-Focused Configuration Management of Information Systems: SP 800-128 (National Institute of Standards and Technology, 2011).
-
Norton 2016 (†770)
Norton, Steven. "CIO Explainer: What Is Blockchain?", Wall Street Journal (2 February 2016).
-
Noyes 2016 (†780)
Noyes, Katherine. "5 Things You Need to Know About Data Exhaust," Computerworld (13 May 2016).
-
O'Leary 2009 (†620)
O'Leary, Edward P. "Satisfying the Best Evidence Rule When the Original Document Exists Only as Electronically Stored Information" Proof 18:1 (Fall 2009), p.3-15.
-
O'Reilly Big Data 2013 (†347)
Planning for Big Data (O'Reilly, 2012).
-
OAIS 2012 (†374)
Consultative Committee for Space Data Systems. Reference Model for an Open Archival Information System (OAIS). Washington, D.C.: CCSDS Secretariat, Magenta Book, June 2012.
-
Obama 2009 (†510)
Obama, Barack. "Transparency and Open Government: Memorandum for the Heads of Executive Departments and Agencies." (White House,
-
OECD 2007 (†896)
"A Bigger Picture," Human Capital: How what you know shapes your life OECD [(Organisation for Economic Co-operation and Development], 2007).
-
OED 2007 (†400)
Oxford English Dictionary (Oxford University Press, 2007).
-
OED 3rd (†333)
"trust" in Oxford English Dictionary, 3rd web ed. (checked 15 Nov 2013).
-
OED 3rd (†243)
"big" in Oxford English Dictionary ([2013]).
-
OED 3rd (†244)
"crowdsourcing" in Oxford English Dictionary ([2013])
-
OED 3rd (CD) 2004 (†499)
Oxford English Dictionary -- v. 3.1 (Oxford University Press, 2004).
-
OED Concise 10th (†440)
Concise Oxford English Dictionary – 10th ed. (Oxford University Press, n.d.).
-
OED Web 2018 (†401)
Oxford English Dictionary, 3rd web ed. (Oxford University Press, 2018).
URL: http://www.oed.com/
-
Ohlhorst 2013 (†305)
Ohlhorst, Frank. Big Data Analytics: Turning Big Data into Big Money. Wiley & SAS Business Series. Hoboken, N.J: Wiley, 2013.
-
Ohm 2010 (†679)
Ohm, Paul. "Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization." UCLA Law Review 57 (2010), p. 1701-1777.
-
Ohm 2010 (†712)
Ohm, Paul. "Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization" UCLA Law Review 57:6 (August 2010), p.1701-1777.
-
Ojala and Tyrvainen 2011 (†654)
Ojala, Arto, and Pasi Tyrvainen. "Developing Cloud Business Models: A Case Study on Cloud Gaming" IEEE Software 28:4 (July/August 2011), p.42-47.
-
Olufon, et al. 2014 (†638)
Olufon, Tope, Carlene E-A Campbell, Stephen Hole, and Kapilan Radhakrishnan. "Mitigating External Threats in Wireless Local Area Networks" International Journal of Communication Networks and Information Security 6:3 (Dec 2014), p.200-216.
-
OMB A-130 2000 (†731)
"Memorandum for Heads of Executive Departments and Agencies: Management of Federal Information Resources: Circular A-130 revised" (United States,Office of Management and Budget, 28 November 2000).
-
OMB M-13-13 2013 (†685)
"Memorandum for the Heads of Executive Departments and Agencies: Open Data Policy – Managing Information as an Asset" (Executive Office of the President, 9 May 2013).
-
OMG UML 2.5 (†861)
OMG Unified Modeling Language, version 2.5 (Object Management Group, 2015).
-
Open Data Institute 2013 (†331)
"What is Open Data?" Open Data Institute. Accessed November 13, 2013.
-
Open Definition (†350)
"Open Definition," version 1.1. Open Knowledge Foundation, [n.d.].
-
Open Government Data 2014 (†532)
"Welcome to Open Government Data." (Open Government Data, [n.d. 2014]).
-
Open Government Guide 2013 (†355)
Transparency and Accountability Initiative. "Open Government Guide." 2013.
-
Open Government Standards (†660)
Open Government Standards (OpenGovernmentStandards.org, n.d.]).
-
Open Knowledge International 2014 (†916)
Open Definition 2.1 (Open Knowledge International, 2014).
-
Open Source 2014 (†509)
"The Open Source Initiative ([2014]).
-
Oracle Enterprise Information Management 2011 (†542)
Enterprise Information Management: Best Practices in Data Governance (Oracle, May 2011).
-
Orszag 2009 (†511)
Orszag, Peter R. "Open Government Directive: Memorandum for the Heads of Executive Departments and Agencies," (Open Governmenet Initiative, 2009).
-
Ostrom, 1996 (†461)
Ostrom, E. (1996). Crossing the great divide: coproduction, synergy, and development. World development, 24(6), 1073-1087.
-
Owner's Role 2005 (†487)
The Owner's Role in Project Risk Management. (National Academies Press, 2005).
-
Oxford Dictionaries 2016 (†784)
"Word of the Year 2016 is . . . ," Oxford Dictionaries Word of the Year (Oxford Dictionaries, 2016).
-
PaaST (0.11) 2016 (†778)
Thibodeau, Kenneth. "Preservation as a Service for Trust (PaaST)," ver. 0.11 (InterPARES Trust, September 2016).
-
PaaST (0.8) 2016 (†751)
"Preservation as a Service for Trust (PaaST)" – Draft ver. 0.8 (1 April 2016).
-
PaaST (1.0) 2017 (†860)
Thibodeau, Kenneth, et al. "Preservation as a Service for Trust (PaaST): Functional and Data Requirements for Digital Preservation – version 1.0 (InterPARES Trust, May 2017).
-
Pace 2014 (†664)
Pace, Alberto. "Technologies for Large Data Management in Scientific Computing" International Journal of Modern Physics C: Computational Physics and Physical Computation 25:2 (Feb 2014), p.1-72
-
Päivärinta, et al. 2015 (†762)
Päivärinta, Tero, Carl-Mikael Lönn, Gustaf Juell-Skielse, and Göran Samuelsson. "Benefits Realization Management (InterPARES Trust, 2015).
-
Palace 1996 (†478)
Palace, Bill. "Data Mining: Technology Note prepared for Management 274A, Anderson Graduate School of Management at UCLA." (Spring 1996).
-
Pangburn 2015 (†826)
Pangburn, DJ. “The Humans Who Dream of Companies That Won’t Need Us.” (Fast Company, 19 June 2015).
-
Parameswaran and Blough (†516)
Parameswaran, Rupa, and Douglas M. Blough."A Robust Data-obfuscation Approach for Privacy Preservation of Clustered Data" (2006?]).
-
Parkinson and Baker 2005 (†577)
Parkinson, Michael J. A., and Nicholas J. Baker. "IT and Enterprise Governance" ISACA Journal (ISACA, 2005).
-
Parry 2013 (†336)
Parry, Marc. "‘Big Data’ Is Bunk, Obama Campaign’s Tech Guru Tells University Leaders." The Chronicle of Higher Education (30 October 2013).
-
Pasik and Sahoo 2013 (†640)
Pasik, Alexander, and Sanjib Sahoo. "Is the Cloud Ready for Mission-Critical Apps?" Network World 30:5 (March 25, 2013), p.28-29.
-
PC Magazine Encyclopedia 2014 (†451)
PC Magazine Encyclopedia (Ziff-Davis, 1981-2014).
-
Pfeffer [2017] (†844)
Pfeffer Johannes. "EthOn - An Ethereum Ontology." (2017).
-
Piasecki 2017 (†815)
Piasecki, Piotr. ThePiachu's Bitcoin Blog: A blog about Bitcoin, Ripple, Crypto 2.0 and everything related. (2017).
-
Plotkin 2013 (†588)
Plotkin, David. Data Stewardship: An Actionable Guide to Effective Data Management and Data Governance (Morgan Kaufman, 2013).
-
Popper 2016 (†814)
Popper, Nathaniel. "Ethereum, a Virtual Currency, Enables Transactions That Rival Bitcoin’s." (The New York Times, 2016)
-
Principles . . . Operational Risk 2011 (†518)
Principles for the Sound Management of Operational Risk (Bank for International Settlement, Basel Committee on Banking Supervision, 2011).
-
Privacy International 2015 (†889)
"What is Data Protection?" (Privacy International, [2015]).
-
Provost and Fawcett 2013 (†302)
Provost, Foster, and Tom Fawcett, “Data Science and its relationship to Big Data and Data-Driven Decision Making,” Big Data 1 1 (2013): 51-59,
-
Putnam, 1995 (†468)
Putnam, R.D. "Bowling Alone: America's Declining Social Capital." Journal of Democracy 6, no. 1 (1995): 65-78.
-
r/bitcoin 2015 (†838)
"Scaling the Blockchain: Sharding." (Reddit, 2015)
-
r/bitcoin 2017 (†837)
"Bitcoin now protected by exchanges from a hard fork split." (Reddit, 2017)
-
Rackspace 2014 (†433)
"What is cloud computing?" (Rackspace, [checked 2014]).
-
Rajalaxmi and Natarajan 2012 (†724)
Rajalaxmi, R. R., and A. M. Natarajan, "Effective Sanitization Approaches to Hide Sensitive Utility and Frequent Itemsets," Intelligent Data Analysis 16:6 (2012), p.933-951.
-
Rattenbury 2015 (†872)
Rattenbury, Tye. "Six Core Data Wrangling Activities" (Trifacta, 2 October 2015).
-
Rattenbury et al. 2017 (†871)
Rattenbury, Tye, Joseph M. Hellerstein, Jeffrey Heer, Sean Kandel, and Connor Carreras. Principles of Data Wrangling: Practical Techniques for Data Preparation (O'Reilly, 2017).
-
Regalado 2011 (†436)
Regalado, Antonio, "Who Coined 'Cloud Computing'?" MIT Technology Review (31 October 2011).
-
Reidenberg, et al. 2013 (†364)
Reidenberg, et al. "Privacy and Cloud Computing in Public Schools." (Fordham Law School, Center on Law and Information Policy, 2013).
-
Rein 2014 (†376)
Rein, Lisa. "Archives’ inspector general enters 18th month on paid leave; taxpayers footing the bill." Washington Post (24 February 2014).
-
Reitz 2004 (†763)
Reitz, Joan M. Dictionary for Library and Information Science (Libraries Unlimited, 2004).
-
Research Information Ltd. 2007 (†667)
"Data Security Threats" International Journal of Micrographics and Optical Technology 25:3/4 (2007), p.4-5.
-
Research Project 10 (TN) - Report (†398)
Boel, Jens, and Elaine Goh. “Research Project 01 (TN) - The Use of Cloud Services for Records Management Purposes by International Organizations - Report,” February 2014.
-
Research Project 13 - Proposal (†377)
ITrust. “Research Project 13 - Patents and Trust - Proposal,” October 28, 2013. http://interparestrust.org/assets/documents/iTrust_Oct282013_NA_Team_Research_Project_13_Patents_and_Trust_Proposal_FINAL.pdf.
-
RFC 4949 (†591)
Shirey, R. RFC 4949: Internet Security Glossary, Version 2 (Network Working Group, 2007).
-
Richardson, et al. 2015 (†714)
Richardson, Victor, Sallie Milam, and Denise Chrysler. "Is Sharing De-identified Data Legal? The State of Public Health Confidentiality Laws and Their Interplay with Statistical Disclosure Limitation Techniques." Journal of Law, Medicine, and Ethics 43:1 Supplement (Spring 2015), p.83-86.
-
Richtel 2013 (†785)
Richtel, Matt. "How Big Data Is Playing Recruiter for Specialized Workers," New York Times (27 April 2013.
-
Ridener 2008 (†307)
Ridener, John. From Polders to Postmodernism: A Concise History of Archival Theory (Litwin Books, 2008).
-
Riley 2017 (†890)
Riley, Jenn. "Understanding Metadata: What is Metadata, and What is It For?" (National Information Standards Organization, 2017).
-
Risk Assessment 2006 (†488)
Risk Assessment and Allocation for Highway Construction Management. (Federal Highway Administration, 2006).
-
Ritvo, et al. 2007 (†616)
Ritvo, Elizabeth, Jeffrey P. Hermes, and Samantha L. Gerlovin. "Shutting the Door on Online Forums and Chat Rooms in Defamation Actions: Excluding Inflammatory and Prejudicial Statements by Third Parties on the Internet" Computer and Internet Lawyer 24:5 (May 2007), p.1-11.
-
Rodrigue 2013 (†915)
Rodrigues, Thoran. "Cloud computing and the dangers of shadow IT," TechRepublic (16 August 2013).
-
Rosen 2012 (†428)
Rosen, Jeffrey. "The Right to be Forgotten." Stanford Law Review Online (13 February 2012).
-
Rossel and Finger, 2007 (†464)
Rossel, P. and Finger, M. (2007). "Conceptualizing e-governance." in ICEGOV '07: Proceedings of the 1st international conference on theory and practice of electronic governance.
-
Rotter, 1980 (†477)
Rotter, J. B. "Interpersonal trust, trustworthiness, and gullibility." American Psychologist 35, no.1 (1980): 1-7. doi:10.1037/0003-066X.35.1.1
-
Rouse 2010 (†556)
Rouse, Margaret. "Infrastructure as a Service (IaaS)" (August 2010).
-
Rouse 2013. (†831)
Rouse, Margaret. "proof of concept (POC)." (SearchSecurity,TechTarget 2013).
-
Russell 2012 (†383)
Russell, Judy G. “A Terms of Use Intro.” Blog. The Legal Genealogist, April 27, 2012. http://www.legalgenealogist.com/blog/2012/04/27/a-terms-of-use-intro/.
-
Russell, et al. 2010 (†653)
Russell, Stephen, Victoria Yoon, and Guisseppi Forgionne. "Cloud-based decision support systems and availability context: the probability of successful decision outcomes" Information Systems and eBusiness Management 8:3 (June 2010), p.189-205.
-
Ryngaert 2015 (†879)
Ryngaert, Cedric. "Symposium issue on extraterritoriality and EU data protection," International Data Privacy Law 5:4 (2015), p. 221-225.
-
SAA Glossary 2005 (†241)
Pearce-Moses, Richard. A Glossary of Archival and Records Terminology (Society of American Archivists, 2005).
-
Saetang and Haider 2011 (†569)
Saetang, Sureerat, and Abrar Haider. "Counceptual Aspects of IT Governance in Enterprise Environment" Proceedings of the 49th SIGMIS Annual Conference on Computer Personnel Research (2011), p.79-82
-
Sage 2009 (†574)
Sage. The SAGE Glossary of the Social and Behavioral Sciences (Sage Publications, 2009).
-
Saidah and Abdelbaki 2014 (†739)
Shaker Saidah, Ahmed, and Nashwa Abdelbaki. “A New Cloud Computing Governance Framework,” CLOSER 2014, 4th International Conference on Cloud Computing and Services Science, 3–5 April 2014, Barcelona, Spain.
-
Scaling Bitcoin [2017] (†845)
"Technical Terms." (Scaling Bitcoin Workshop Group, 2017).
-
Scardilli 2014 (†610)
Scardilli, Brandi. "Microfilm Still Matters in the Digital Age" Information Today 31:1 (January/February 2014), p.12.
-
Schmidt 2006 (†437)
Schmidt, Eric. "Conversation with Eric Schmidt hosted by Danny Sullivan." Search Engine Strategies Conference (9 August 2006).
-
Schmidt 2014 (†550)
Schmidt, John. "Information Governance vs. Data Governance – Who Cares?" Perspectives: The Informatica Blog (3 September 2014).
-
Schneider 1999 (†536)
Schneider, Fred B., ed. Trust in Cyberspace (National Academies Press, 1999).
-
Schneier 2004 (†825)
Schneier, Bruce. "Cryptanalysis of MD5 and SHA: Time for a New Standard." (Computerworld, 19 August 2004).
-
Schrage 2003 (†570)
Schrage, Michael. "Why Governance Matters More Than Leadership" Across the Board 40:1 (January/February 2003), p.67-69.
-
Schulz 2009 (†596)
Schultz, Beth. "How to Buy Cloud Computing Services" Network World 26:19 (May 18, 2009), p.27-28.
-
Seagate 2017 (†881)
"What is a Personal Cloud?" (Seagate, 2017).
-
Search Cloud Provider (†412)
SearchCloudProvider.
-
Sedayo 2012 (†681)
Sedayo, Jeff. "Enhancing Cloud Security Using Data Anonymization." (Intel IT, June 2012).
-
Sedona Conference 2014 (†774)
The Sedona Conference Glossary: E-Discovery and Digital Information Management (The Sedona Conference, 2014).
-
Sedona Conference on Information Governance 2013 (†449)
The Sedona Conference Commentary on Information Governance. (The Conference, December 2013).
-
Seibold et al. 2016 (†821)
Seibold, Sigrid, and Samman, George. KPMG. "Consensus: Immutable agreement for the Internet of value." (2016)
-
Seife 2014 (†460)
Seife, Charles. "The Weird Reasons Why People Make Up Identities on the Internet." Wired (29 July 2014).
-
Shadbolt et al. 2012 (†352)
Shadbolt, Nigel, Kieron O’Hara, Tim Berners-Lee, Nicholas Gibbins, Hugh Glaser, Wendy Hall and m.c. schraefel. "Linked Open Government Data: Lessons from Data.gov.uk." IEEE Intelligent Systems 27 no. 3 (2012): 16-24.
-
Shan 2009 (†435)
Shan, Tony. "Cloud Taxonomy and Ontology." Responsive and Adaptive Computing Ecosytems (2 February 2009).
-
Shannon 1945 (†851)
Shannon, Claude E. "A mathematical theory of cryptography." Memorandum MM 45 (1945): 110-02.
-
Sheedy 2008 (†900)
Sheedy, A, Mary Pat MacKinnon, Sonia Pitre, and Judy Watling. Handbook on Citizen Engagement: Beyond Consultation (Canadian Policy Research Networks, 2008).
-
Shepherd and Yeo 2003 (†744)
Shepherd, Elizabeth, and Geoffrey Yeo. Managing Records: a Handbook of Principles and Practice London, UK: Facet Publishing, 2003.
-
Shinder 2014 (†526)
Shinder, Deb. "Mini-glossary: Cloud Computing Terms You Should Know." Tech Republic (16 March 2014).
-
Siegrist, Cvetkovich, and Roth, 2000 (†476)
Siegrist, M., Cvetkovich, G., and Roth, C. "Salient value similarity, social trust, and risk/benefit perception." Risk analysis 20, no.3 (2000): 353-362.
-
Simonsson, et. al. 2010 (†571)
Simonsson, Mårten, Pontus Johnson, and Mathias Ekstedt. "The Effect of IT Governance Maturity on IT Governance Performance" Information Systems Management 27 (2010), p.10-24
-
Sims 2014 (†540)
Sims, Stephen. "Qualitative vs. Quantitative Risk Assessment." Leadership Laboratory (SANS Technology Institute, [2014]).
-
Sinn 2015 (†876)
Richard Sinn. Software Security Technologies (Cengage Learning, 2015).
-
Skupsky 1992 (†621)
Skupsky, Donald S. "The Best Evidence Rule is Dead...Except in the Mind of the Law" Records Management Quarterly 26:3 (July 1992) p.32-35
-
SLA 2016 (†909)
"Competencies for Information Professionals" (Special Libraries Association, 2016).
-
SLA 2018 (†908)
"About Information Professionals" (Special Library Association, [2018]).
-
Smallwood 2014 (†566)
Smallwood, Robert F. Information Governance: Concepts, Strategies, and Best Practices (John Wiley & Sons, 2014).
-
Smith & Atlas 2016. (†830)
Smith, Peter & Kristov Atlas. "A Brief History of Bitcoin Forks. (blockchain blog, 26 February 2016).
-
SNIA CDMI 2012 (†553)
Cloud Data Management Interface (CDMI), v 1.0.2 (Storage Network Industry Association, 2014).
-
Sonehara, et al. 2011 (†723)
Sonehara, Noboru, Isao Echizen, and Sven Wohlgemuth. "Isolation in Cloud Computing and Privacy-Enhancing Technologies" Business and Information Systems Engineering 3:3 (June 2011), p.155-162.
-
Srinivasan 2013 (†689)
Srinivasan, S. "Is Security Realistic in Cloud Computing?" Journal of International Technology and Information Management 22:4 (2013), p.47-66.
-
Stancic, et al. 2015 (†737)
Stancic, Hrvoje, Arian Rajh, and Hrvoje Brzica. "Archival Cloud Services: Portability, Continuity, and Sustainability Aspects of Long-term Preservation of Electronically Signed Records." The Canadian Journal of Information and Library Science 39:2 (June 2015), p. 210-227.
-
Stancic, Rajg, and Milosevic 2013 (†904)
Stancic, Hrvoje, Arian Rajh, and Ivor Milosevic. "Archiving-as-a-Service: Influence of Cloud Computing on the Archival Theory and Practice," in The Memory of the World in the Digital Age: Digitization and Preservation (UNESCO, 2013).
-
Stefanczak 2014 (†645)
Stefanczak, Corey, "Optimize the Climb up the Enterprise Information Systems Maturity Model" Control Engineering 61:11 (November 2014), p.34-35.
-
Stein and Morrison 2014 (†866)
Stein, Brian, and Alan Morrison. "The Enterprise Data Lake: Better Integration and Deeper Analytics," Technology Forecast: Rethinking Integration 1 (2014).
-
Stewart 2009 (†670)
Stewart, Wan. "Service Impact Analysis Using Business Continuity Planning Processes" Campus-Wide Information Systems 26:1 (2009), p.20-42.
-
Stiglich 2014 (†546)
Stiglich, Pete. "Data Governance vs. Data Management." Health Care Industry Trends (Perficient, 2014).
-
Stitilis and Malinauskaite 2013 (†693)
Stitilis, Darius and Inga Malinauskaite. "Evaluation of Legal Data Protection Requirements in Cloud Services in the Context of Contractual Relations with End-Users" Socialines Technologijos 3:2 (2013), p.390-414.
-
Strasser, et al. 2012 (†590)
Stasser, Carly, Robert Cook, William Michener, and Amber Budden. Primer on Data Management: What you always wanted to know (California Digital Library, 2012).
-
Strategi 2009 (†555)
"Abstraction: The Key Understanding Cloud Computing" (Strategi, 14 April 2009).
-
Streitfeld 2014 (†420)
Streitfeld, David. "European Court Lets Users Erase Records on Web." New York Times (13 May 2014).
-
Structured Approach 2010 (†492)
A Structured Approach to Enterprise Risk Management (ERM) and the Requirements of ISO 3100 (Association of Insurance and Risk Managers, Public Risk Management Association, and Institute of Risk Managemenet, 2010).
-
Stubbs and Ankeemana 2016 (†773)
Stubbs, Evan, and Chami Akmeemana, "Blockchain, Cryptoeconomics, and the Disintermediation of Trust" (LinkedIn, 10 May 2016 [checked 21 Sep 2016]).
-
Sucha 2014 (†567)
Sucha, Melanie. "Beyond the Hype: Data Management and Data Governance" Feliciter 60:2 (April 2014), p.26-29.
-
Swan 2015 (†805)
Swan, Melanie. Blockchain: Blueprint for a new economy (O'Reilly Media, 2015).
-
Sweeney 2000 (†678)
Sweeney, Latanya. "Simple Demographics Often Identify People Uniquely. Carnegie Mellon University, Data Privacy Working Paper 3. Pittsburgh 2000.
-
SWIFT 2016 (†769)
"SWIFT on Distributed Ledger Technologies: Delivering an Industry-Standard Platform Through Community Collaboration" (SWIFT, 2016).
-
Tam and Clark 2015 (†686)
Tam, Siu-Ming, Frederic Clarke. Big Data, Statistical Inference and Official Statistics (Australian Bureau of Statistics, 18 March 2015).
-
Tanner 2012 (†615)
Tanner, John C. "The carrier case for the cloud" Telecom Asia 23:1 (February/March 2012), p.18-20.
-
Tauberer 2012 (†357)
Tauberer, Joshua. Open Government Data. April 2012 (updated June 2012).
-
Taylor 2011 (†903)
Taylor, Martin. "Cloud archive: What it is and what types of cloud archive services exist," ComputerWeekly.com (August 2011).
-
Taylor 2013 (†316)
Taylor, Chris. "Gartner updates its view on Big Data's hype." Successful Workplace(18 August 2013).
-
Taylor 2013 (†760)
Taylor, Isabel. "Data Protection Versus Archival Memory: The Evolution of the Draft European General Data Protection Regulation," in Mousaion 31:3 (2013), p. 36-56.
-
Taylor et al. 2010 (†507)
Taylor, Paul, Cary Funk, and April Clark. Americans and Social Trust: Who, Where and Why." (Pew Research Center, [2010?]).
-
Techopedia (†411)
Techopedia
-
TechRepublic 2010 (†417)
TechRepublic. "Mini-glossary: Cloud computing terms you should know," March 16, 2010, http://www.techrepublic.com/blog/the-enterprise-cloud/mini-glossary-cloud-computing-terms-you-should-know/2308/.
-
Telos 2016 (†782)
"Digital Exhaust: The Impact of Unmanaged Digital Exhaust on the Enterprise" (Telos, 2016).
-
Tennis 2013 (†905)
Tennis, Joseph T. "Data, Documents, and Memory: A Taxonomy of Sources in Relation to Digital Preservation and Authenticity Metadata," in The Memory of the World in the Digital Age: Digitization and Preservation (UNESCO, 2013).
-
Tennis and Rogers 2012 (†906)
Tennis, Joseph T., and Corinne Rogers. "Authenticity Metadata and the IPAM: Progress toward the InterPARES Application Profile," in Proceedings of the International Conference on Dublin Core and Metadata Applications 2012 (Kuching/Sarawak, Malaysia, 2012), p. 38-45.
-
Text and Data Mining 2014 (†521)
Standardisation in the Area of Innovation and Technological Development, Notably in the Field of Text and Data Mining: Report from the Expert Group. (European Union, 2014).
-
The Wheel 2014 (†564)
"Management vs Governance" The Wheel (The Wheel, 2014)
-
Theimer 2010 (†503)
Theimer, Kate. Web 2.0 Tools and Strategies for Archives and Local History Collections (Neal-Schuman, 2010).
-
Thibodeau 2013A (†266)
Thibodeau, Kenneth. "Equation of Authenticity" [email] (15 August 2013).
-
Thibodeau 2015 (†641)
Thibodeau, Kenneth. "Preservation as a Service for Trust (PaaST): It's for the Future." ITrust 2nd International Plenary (17 February 2015).
-
Thibodeau 2016 (†757)
Thibodeau, Kenneth. Personal correspondence, 26 May 2016.
-
Thibodeau Equation 2013B (†272)
Thibodeau, Kenneth. "Equation of Authenticity" [mss] (15 August 2013).
-
Thomas, 1998 (†475)
Thomas, C. “Maintaining and Restoring Public Trust in Government Agencies and their Employees.” Administration and Society 30, no.2 (1998):166-193
-
Tien 2008 (†892)
Tien, Nguyen Gia. "Duty to Remember" (Vietnamese and American Veterans of the Vietnam War, [2008]).
-
Tippman and Powles 2015 (†729)
Tippman, Sylvia, and Julia Powles. "Google accidentally reveals data on 'right to be forgotten' requests." The Guardian (14 July 2015).
-
Tomar 2016 (†870)
Tomar, Shubham Simar. "A Comprehensive Introduction to Data Wrangling" (Springboard, 22 December 2016).
-
Topi and Tucker 2014 (†551)
Topi, Heikki, and Allen Tucker. Computing Handbook: Information Systems and Information Technology – 3rd ed. (CRC Press, 2014).
-
Tricker 1984 (†562)
Tricker, Robert. Corporate Governance (Gower Publishing Company, 1984)
-
Trsuted Digital Repositories 2002 (†736)
Trusted Digital Repositories: Attributes and Responsibilities (RLG, 2002).
-
Trusted Computing Group 2010 (†585)
Trusted Computing Group. Cloud Computing and Security - A Natural Match (Trusted Computing Group, 2010).
-
Tsilas 2010 (†603)
Tsilas, Nick. "Moving Responsibly to the Cloud to Ensure Its Full Potential" Computer and Internet Lawyer 27:11 (November 2010), p.16-24
-
Turk 2014 (†373)
Turk, Victoria. "How We've Been Visualising Big Data Over The Centuries." Motherboard (21 February 2014).
-
Ubaldi 2013 (†324)
Ubaldi, Barbara. “Open Government Data. Towards empirical analysis of open Government Data Initiatives,” OECD Working Papers on Public Governance 22 (2013),
-
UCR 2011 (†705)
"Data Sanitization" (University of California Riverside, 2011).
-
Udupa, et al. 2005 (†719)
Udupa, Sharath K., Saumya K. Debray, and Matias Madou. "Deobfuscation: Reverse Engineering Obfuscated Code" Twentieth Working Conference on Reverse Engineering (Pittsburg, PA, 2005), p.45-54.
-
Uhrig 2003 (†580)
Uhrig, John. Review of the Corporate Governance of Statutory Authorities and Office Holders (Commonwealth of Australia, 2003).
-
UK Information Commissioner's Office 2014 (†696)
"Data Protection" (Information Commissioner's Office, 2014).
-
UN Global Pulse Big Data 2012 (†323)
“Big Data for Development: Challenges and Opportunities” (UN Global Pulse, 2012).
-
UN Global Pulse Big Data 2013 (†319)
“Big Data for Development: A Primer” (UN Global Pulse, 2013).
-
US Copyright Office 2014 (†443)
"Pseudonyms: Factsheet FL 101." (U.S. Copyright Office, [2014]).
-
US Dept of State 2016 (†750)
"All About Security Clearances" (U.S. Department of State, [2016]).
-
USC (†246)
United States Code (Government Printing Office).
-
van Wirdum 2016 (†800)
van Wirdum, Aaron. "The Power of Schnorr: The Signature Algorithm to Increase Bitcoin's Scale and Privacy" (Bitcoin Magazine, 2016).
-
Vaughan-Nichols 2013 (†513)
Vaughan-Nichols, Steven J. "The Top 10 Personal Cloud-Storage Services." ZDNet (25 February 2013).
-
Vickery 1982 (†505)
Vickery, Alan B. "Breach of Confidence: An Emerging Tort." Columbia Law Review 82:7 (November 1982), p. 1426-1468.
-
Vijayan 2014 (†914)
Vijayan, Jaikumar. "Shadow cloud services pose a growing risk to enterprises," Computerworld (25 August 2014).
-
ViON 2014 (†432)
"ViON Presents Capacity Services – A Private Cloud Computing Strategy." ViON (before 2014).
-
Vitak 2012 (†626)
Vitak, Jessica. "The Impact of Context Collapse and Privacy on Social Network Site Disclosures" Journal of Broadcasting and Electronic Media 56:4 (December 2012), p.451-470.
-
Vitak 2012 (†749)
Vitak, Jessica. "The Impact of Context Collapse and Privacy on Social Network Site Disclosures." Journal of Broadcasting & Electronic Media 56:4 (2012), p. 451–470.
-
von Haller Gronbaek 2016 (†833)
von Haller Gronbaek, Martin. “Blockchain 2.0, smart contracts and challenges.” (Bird & Bird. 16 June 2016).
-
W3C PROV-DM (†385)
W3C PROV-DM: The PROV Data Model
-
W3C Provenance Incubator Group 2010 (†381)
W3C Provenance Incubator Group. Provenance XG Final Report, December 8, 2010. http://www.w3.org/2005/Incubator/prov/XGR-prov-20101214/.
-
Wade, et al. 2010 (†639)
Wade, Joshua B., Hiroshi Fujinoki, Adam Coffman, Delia M. Feerer, and Andrew G. Hauck. "A Cross-Layer Approach for Mitigating Denial of Service Attacks: Device-Driver Packet Filter and Remote Firewalling" International Journalof Communication Networks and Information Security 2:3 (December 2010), p.231-239.
-
Wallace 1999 (†605)
Wallace, Kathleen A. "Anonymity" Ethics and Information Technology 1:1 (1999), p.21-35.
-
Walport 2016 (†802)
Walport, Mark. Distributed Ledger Technology: beyond block chain. A report by the UK Government Chief Scientific Adviser (Government Office for Science, 2016).
-
Ward and Street 2010 (†281)
Ward, Kerry and Chris Street. “Reliability.” In Encyclopedia of Case Study Research, edited by Albert J. Mills, Gabrielle Durepos and Elden Wiebe, 801-3. Thousand Oaks, CA: SAGE Publications, Inc., 2010. doi: 10.4135/9781412957397.n293.
-
Warren and Brandeis 1890 (†457)
Warren, Samuel D., and Louis D. Brandeis. "The Right to Privacy." Harvard Law Review 4:5 (15 Dec 1890), p. 193-220.
-
Watson and Mundy, 2001 (†495)
Watson, Richard T. and Mundy, Bryan. "A Strategic Perspective of Electronic Democracy." Communications of the ACM 44, no.1 (2001): 27-30.
-
WEF 2013 (†322)
“Paving the Path to a Big Data Commons” (World Economic Forum, 2013).
-
Werbin 2012 (†631)
Werbin, Kenneth C. "The Social Media Contract: On the Paradoxes of Digital Property in This Digital Land" Journal of Canadian Studies 46:2 (Spring 2012), p.245-262.
-
Wesch 2008 (†747)
Wesch, Michael. "Context Collapse." Digital Ethnography (31 July 2008).
-
Wex 2014 (†500)
Wex (Legal Information Institute, [checked 17 Aug 2014]).
-
What is Unstructured Data 2014 (†455)
"What is Unstructured Data?" Oracle Unstructured Data with Multimedia SIG ([n.d., 2014]).
-
WHO/FAO 2009 (†534)
Risk Characterization of Microbiological Hazards in Food (World Health Organization, Food and Agricultural Organization of the United Nations, 2009).
-
Widmer 2010 (†675)
Widmer, Lori. "The Cloud and Your Data" Risk Management 57:9 (November 2010), p.36-40.
-
Wigmore 1935 (†623)
Wigmore, John Henry. A Students' Textbook of the Law of Evidence (Chicago: The Foundation Press, 1935).
-
Wikipedia (†387)
Wikipedia [US]
-
Wiktionary [2017] (†884)
Wiktionary (Wikimedia, [2017]).
-
Witte and Portinga 2007 (†439)
Witte, Derek S., and D. Andrew Portinga. "E-Discovery and the New Federal Rules of Civil Procedure." Michigan Bar Journal (March 2007), p. 36-40.
-
Witten 2005 (†523)
Witten, I.H. "Text mining." In M.P. Singh, ed., Practical Handbook of Internet Computing, (Chapman & Hall/CRC Press. 2005).
-
Witten et al. 2005 (†524)
Witten, I.H., K. J. Don, M. Dewsnip, and V. Tablan. “Text mining in a digital library.” Journal of Digital Libraries 4:1 (August 2005).
-
Wood 2014 (†803)
Wood, Gavin. "Ethereum: A secure decentralised generalised transaction ledger EIP-150 Revision." Ethereum Project Yellow Paper151 (2014).
-
Woolcock, 1998 (†469)
Woolcock, M. "Social Capital and Economic Development: Toward a Theoretical Synthesis and Policy Framework." Theory and Society 27, no.2 (1998): 151-208.
-
World Bank, 2007 (†565)
World Bank, Independent Evaluation Group, Sourcebook for Evaluating Global and Regional Partnership Programs: Indicative Principles and Standards (IEG-World Bank, 2007).
-
World Economic Forum 2012 (†683)
Rethinking Personal Data: Strengthening Trust (World Economic Forum, May 2012).
-
WTO Glossary (†299)
"transparency" in Glossary (World Trade Organization, [n.d., access 16 Aug 2013]).
-
Yeluri and Castro-Leon 2014 (†659)
Yeluri, Raghu, and Enrique Castro-Leon. Building the Infrastructure for Cloud Security: A Solutions View (Apress Media, LLC, 2014).
-
Yeo 2007 (†349)
Yeo, Geoffrey. "Concepts of Record (1): Evidence, Information, and Persistent Representations." American Archivist 70 (Fall/Winter 2007): 315-343.
-
Yeo 2013 (†380)
Yeo, Geoffrey. “Trust and Context in Cyberspace.” Archives and Records 34, no. 2 (October 2013): 214–234. doi:10.1080/23257962.2013.825207.
-
Yu and Robinson, 2012 (†496)
Yu, Harlan and Robinson, David G. "The New Ambiguity of' Open Government." UCLA Law Review Discourse 59, no. 11 (2012): 178-208
-
Zakerzadeh and Osborn 2013 (†711)
Zakerzadeh, Hessam, and Sylvia Osborn. "Delay-Sensitive Approaches for Anonymizing Numerical Streaming Data." International Journal of Information Security 12:5 (October 2013), p.423-437.
-
Zavidniak et al. 1999 (†402)
Zavidniak, Paul, Anita D’Amico, and Dennis H. McCallam. “Achieving Information Resiliency.” Information Security Technical Report 4:3 (1999), p. 54–62.
-
Zemelman, Daniels, and Hyde 2013 (†295)
Zemelman, Steven, Harvey Daniels, and Arthur Hyde. Best Practice: Bringing Standards to Life in America's Classrooms, 4th ed. (Heinemann, 2012).