Printer Friendly

Articles from Information Management Journal (January 1, 2015)

1-26 out of 26 article(s)
Title Author Type Words
2015's 10 top strategic technology trends. 343
8 steps to effective information lifecycle management. Dederer, Melissa G. 2034
A cybersecurity threat many miss. 128
ARMA Live! San Diego: ARMA Live! Best of Show 2014. Awards list 1446
Assess to be 'the best' in 2015. Wiler, Vicki Editorial 557
China gets serious about copyright. Conference news 334
Cloud computing from the CIO's view. 493
Count the cost: quantifying your vital records' risks: quantitative risks assessment, which uses numeric calculations to measure the likelihood and impact of the loss of specific vital records, provides a solid basis for planning how to protect them. Saffady, William 2624
Court claims LinkedIn violates FCRA. Brief article 148
Court endorses predictive coding. 356
EU vs. Google: the saga continues. 453
Europe's biggest cybersecurity threat isn't hackers. Brief article 187
Executives say--but don't act like--data security is vital. 326
FCC jumps into data security enforcement. Brief article 146
Fortune 1000 privacy spending 2015 forecast: up 20%. Brief article 190
From RFP to selection: guidance for outsourcing RIM functions. Bergeson, Dave 1992
Guidelines on data breach insurance released. Brief article 163
New search engine to make obsolete formats accessible. Brief article 158
NIST releases final cloud computing roadmap. Brief article 244
Payment card security group issues best practices. 303
Principles for assessing an IG Program. Gable, Julie 2532
Real mobile security takes more than a policy. 390
Smartphone market, challenges continue to grow. Brief article 103
Social media makes e-discovery a headache. Brief article 294
Standard practices for primary archives management tasks. Haller, Stephen E. Book review 1041
Turning the big data crush into an advantage. Hudy, Anissa C. Book review 830

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters