196
Views
9
CrossRef citations to date
0
Altmetric
THEMED ARTICLES: ELECTRONIC RECORDS MANAGEMEMT

Managing the Lifecycle of Electronically Stored Information

, &
Pages 231-238 | Published online: 21 Nov 2007

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (2)

Janice C. Sipior, Burke T. Ward & Linda Volonino. (2014) Benefits and Risks of Social Business: Are Companies Considering E-Discovery?. Information Systems Management 31:4, pages 328-339.
Read now
Burke T. Ward, Carolyn Purwin, Janice C. Sipior & Linda Volonino. (2009) Recognizing the Impact of E-Discovery Amendments on Electronic Records Management. Information Systems Management 26:4, pages 350-356.
Read now

Articles from other publishers (7)

Airi Salminen, Eliisa Jauhiainen & Reija Nurmeksela. (2014) A life cycle model of XML documents. Journal of the Association for Information Science and Technology 65:12, pages 2564-2580.
Crossref
Klaus Rechert, Dirk von Suchodoletz, Isgandar Valizada, Johann Latocha, Tatiana Jimenez Cardenas & Alibek Kulzhabayev. (2014) Take care of your belongings today – securing accessibility to complex electronic business processes. Electronic Markets.
Crossref
Daniel Burda & Frank Teuteberg. (2013) Sustaining accessibility of information through digital preservation: A literature review. Journal of Information Science 39:4, pages 442-458.
Crossref
Daniel Burda & Frank Teuteberg. (2013) Investigating the Needs, Capabilities and Decision Making Mechanisms in Digital Preservation. Information Resources Management Journal 26:3, pages 17-39.
Crossref
Staci M. Zavattaro. 2012. Citizen 2.0: Public and Governmental Interaction through Web 2.0 Technologies. Citizen 2.0: Public and Governmental Interaction through Web 2.0 Technologies 41 64 .
Robert M. Barker, Andrew T. Cobb & Julia Karcher. (2009) The legal implications of electronic document retention: Changing the rules. Business Horizons 52:2, pages 177-186.
Crossref
Faith M. Heikkila. (2008) E-Discovery: Identifying and Mitigating Security Risks during Litigation. IT Professional 10:4, pages 20-25.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.