Rowman & Littlefield Publishers
Pages: 256
Trim: 6½ x 9
978-1-5381-3548-8 • Hardback • November 2020 • $116.00 • (£89.00)
978-1-5381-3549-5 • Paperback • October 2020 • $58.00 • (£45.00)
978-1-5381-3550-1 • eBook • October 2020 • $55.00 • (£42.00)
William Saffady is a records management and information governance consultant and researcher based in New York City. He is the author of over three-dozen books and many articles on information governance, records management, record retention, document storage and retrieval technologies, library automation, and other information management topics. Dr. Saffady received his B.A. degree from Central Michigan University and his M.A., Ph.D, and M.S.L.S. degrees from Wayne State University. Before establishing his full-time consulting practice, he was a professor of library and information science at the State University of New York at Albany, Long Island University, Pratt Institute, and Vanderbilt University. Dr. Saffady is a Fellow of ARMA International, and he is profiled in the Encyclopedia of Archival Writers, 1515-2015, a reference work published by Rowman & Littlefield in 2019.
Preface
Chapter 1: Risk Terms and Concepts
Chapter 2: Creation and Collection of Information
Chapter 3: Loss of Information
Chapter 4: Retention of Information
Chapter 5: Retrieval and Disclosure of Information
Chapter 6: Ownership of Information
This is the most important, comprehensive, and sensible book available today on information risk management.
Risk managers, information governance specialists, records mangers, compliance officers, and other professionals will appreciate the lifecycle approach taken to address information-related threats and vulnerabilities that arise at any point from information creation through disposition.
The value of the work as a textbook for courses in risk management, information governance and related subjects is undeniable. Those new to both information governance and risk management will appreciate Saffady’s view of risk as a combination of threats, vulnerabilities, and consequences and his assertion that without vulnerability a threat can pose no harm.
All readers will come away with an understanding of information-related threats, vulnerabilities each threat can exploit, and options available to address those threats and associated vulnerabilities.
— Patricia C. Franks, Program Coordinator for the Master of Archives and Records Management, School of Information, San José State University, and author of Records and Information Management