{"id":46,"date":"2013-02-12T03:32:24","date_gmt":"2013-02-12T03:32:24","guid":{"rendered":"https:\/\/informationtechnologydecisions.net\/?page_id=46"},"modified":"2016-05-17T16:43:47","modified_gmt":"2016-05-17T20:43:47","slug":"publications","status":"publish","type":"page","link":"https:\/\/informationtechnologydecisions.net\/?page_id=46","title":{"rendered":"Publications"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><strong>Professional Journal Articles<\/strong><\/p>\n<p><strong>\u201cSoftware Management and Information Governance,\u201d Information Management, July\/August 2016.<\/strong><\/p>\n<p><strong>\u201cInformation, Survival, and Protection,\u201d Survivalist Magazine \u2013 Issue 25, October 2015. <\/strong><\/p>\n<p><strong>\u201cBest Practices for Governing Social Media Content,\u201d Information Management, September\/October 2015.<\/strong><\/p>\n<p><strong>\u201cPlug Internal Data Leaks with an Effective IG Program,\u201d Information Management, May\/June 2014.<\/strong><\/p>\n<p><strong>\u201cRetiring Legacy IT Systems under the IG Umbrella,\u201d Information Management, November\/December 2013.<\/strong><\/p>\n<p><strong>\u201cClearing the Hurdles of International Technology Implementations,\u201d Information Management, July\/August 2013.<\/strong><\/p>\n<p><strong>\u201cA Roadmap to Litigation Readiness \u2013 RIM Staff Help Prepare the Way,\u201d Information Management, September\/October 2012.<\/strong><\/p>\n<p><strong>\u201cSound Design + Implementation =\u00a0 Big Payoff \u2013 Building RIM Program Excellence\u201d, Information Management, March\/April 2011.<\/strong><\/p>\n<p><strong>&#8220;Selecting Software for Managing Physical and Electronic Records&#8221;, Information Management Journal, May\/June 2009.<\/strong><\/p>\n<p><strong>&#8220;The RIM Manager\u2019s Role in Supporting Major Business Changes&#8221;, Information Management Journal, March\/April 2007.<\/strong><\/p>\n<p><strong>&#8220;RIM Checklist for Mergers, Acquisitions, Divestitures and Closings,\u201d ARMA International Educational Foundation, Research Report, September 2005.<\/strong><\/p>\n<p><strong>\u201cIT and records managers should team up on data retention policies,\u201d Computerworld Storage Networking World Online, October 17, 2005.<\/strong><\/p>\n<p><strong>&#8220;Professional Certification: Does it Matter?&#8221;, Information Management Journal, November\/December 2004.<\/strong><\/p>\n<p><strong>\u201cWeb Site Records Preservation,\u201d Information Management Journal, March\/April 2003.<\/strong><\/p>\n<p><strong>&#8220;Are Digital Files Bit-Buckets?&#8221; Repro Report, 21(6), November\/December, 2002.<\/strong><\/p>\n<p><strong>&#8220;Tips On Protecting your E-Documents,&#8221; Repro Report, 21(5), September\/October 2002.<\/strong><\/p>\n<p><strong>&#8220;The E-Document Supply Chain,&#8221; Repro Report, 21(4), July\/August 2002.<\/strong><\/p>\n<p><strong>&#8220;Protecting Your Internet Workflow,&#8221; Repro Report, 21(3), May\/June 2002.<\/strong><\/p>\n<p><strong>\u201cPrivacy vs Cybersecurity\u201d, Information Management Journal, 36(3), May\/June 2002.<\/strong><\/p>\n<p><strong>&#8220;Is Your Firm Joining A Collaboration Club?&#8221; Repro Report, 21(2), March\/April 2002.<\/strong><\/p>\n<p><strong>&#8220;CD or DVD for Document Archiving?\u201d Repro Report, 21(1), January\/February 2002.<\/strong><\/p>\n<p><strong>\u201cWelcome to the New Wireless Culture,\u201d Information Management Journal, 36(1), January\/February 2002.<\/strong><\/p>\n<p><strong>&#8220;Doc Retention: A Little Knowledge Can Lure Clients,&#8221; Repro Report, 20(6), November\/December 2001.<\/strong><\/p>\n<p><strong>&#8220;Start With E-mail!&#8221; Information Management Journal, 35(4), October 2001.<\/strong><\/p>\n<p><strong>&#8220;Don&#8217;t Shoot from the Tech Hip,&#8221; Repro Report, 20(5), September\/October 2001.<\/strong><\/p>\n<p><strong>&#8220;Software Enhances Workflow,&#8221; Repro Report, 20(4), July\/August 2001.<\/strong><\/p>\n<p><strong>&#8220;Technology &#8211; Embracing the Challenge of Leadership,&#8221; Information Management Journal, 35(3), July 2001.<\/strong><\/p>\n<p><strong>&#8220;Plan Rooms R Us,&#8221; Repro Report, 20(3), May\/June 2001.<\/strong><\/p>\n<p><strong>\u201cXML For Content and E-Commerce,\u201d Information Management Journal, 35(2), April 2001.<\/strong><\/p>\n<p><strong>\u201cDoes XML Affect Reprographics?\u201d Repro Report, 20(2), March\/April 2001.<\/strong><\/p>\n<p><strong>\u201cShould PDF Be Used For Archiving Electronic Records?\u201d Information Management Journal, 35(1), January 2001.<\/strong><\/p>\n<p><strong>\u201cPDF: Utilizing the Universal File Format,\u201d Repro Report, 20(1), January\/February 2001.<\/strong><\/p>\n<p><strong>\u201cDocument Management and Enterprise Fundamentals,\u201d Repro Report, 19(9), November\/December 2000.<\/strong><\/p>\n<p><strong>\u201cExtranets Are B2B Solutions,\u201d Repro Report, 19(8), October 2000.<\/strong><\/p>\n<p><strong>\u201cISPs and ASPs Create New Records Issues,\u201d Information Management Journal, 34(4), October 2000.<\/strong><\/p>\n<p><strong>\u201cInternal Consulting \u2013 A Strategic Opportunity,\u201d InfoPro, 2 (3), September 2000.<\/strong><\/p>\n<p><strong>\u201cDocument Retention and Disposal,\u201d Repro Report, 19(7), August\/September 2000.<\/strong><\/p>\n<p><strong>\u201cDM Software: From CD to E-Commerce,\u201d Repro Report, 19(6), July 2000.<\/strong><\/p>\n<p><strong>\u201cWill KM Alter Information Manager\u2019s Roles?\u201d Information Management Journal, 34(3), July 2000.<\/strong><\/p>\n<p><strong>\u201cDocument Preservation and Migration,\u201d Repro Report, 19(5), June 2000.<\/strong><\/p>\n<p><strong>\u201cCan Digital Documents Create Business Liabilities?\u201d Repro Report, 19(4), April\/May 2000.<\/strong><\/p>\n<p><strong>\u201cDoes ICR Keep Paper Forms Viable?\u201d Information Management Journal, 34(2), April 2000.<\/strong><\/p>\n<p><strong>&#8220;Do Digital File Formats Drive Document Management?,\u201d Repro Report, 19(3), March 2000.<\/strong><\/p>\n<p><strong>\u201cSoftware for Managing Documents,\u201d Repro Report, 19(2), February 2000.<\/strong><\/p>\n<p><strong>\u201cDigital Assets, Documents and Records \u2013 What\u2019s the Difference?,\u201d Repro Report, 19(1), January 2000.<\/strong><\/p>\n<p><strong>\u201cPreparing to Be a RIM Consultant,\u201d Information Management Journal, 34(1), January 2000.<\/strong><\/p>\n<p><strong>For a more extensive listing of publications, request contact through this web site.<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Professional Journal Articles \u201cSoftware Management and Information Governance,\u201d Information Management, July\/August 2016. \u201cInformation, Survival, and Protection,\u201d Survivalist Magazine \u2013 Issue 25, October 2015. \u201cBest Practices for Governing Social Media Content,\u201d Information Management, September\/October 2015. \u201cPlug Internal Data Leaks with an Effective IG Program,\u201d Information Management, May\/June 2014. \u201cRetiring Legacy \u2026 <a class=\"continue-reading-link\" href=\"https:\/\/informationtechnologydecisions.net\/?page_id=46\"> Continue reading <span class=\"meta-nav\">&rarr; <\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":2,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-46","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P5Nxlz-K","_links":{"self":[{"href":"https:\/\/informationtechnologydecisions.net\/index.php?rest_route=\/wp\/v2\/pages\/46","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/informationtechnologydecisions.net\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/informationtechnologydecisions.net\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/informationtechnologydecisions.net\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/informationtechnologydecisions.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=46"}],"version-history":[{"count":9,"href":"https:\/\/informationtechnologydecisions.net\/index.php?rest_route=\/wp\/v2\/pages\/46\/revisions"}],"predecessor-version":[{"id":210,"href":"https:\/\/informationtechnologydecisions.net\/index.php?rest_route=\/wp\/v2\/pages\/46\/revisions\/210"}],"up":[{"embeddable":true,"href":"https:\/\/informationtechnologydecisions.net\/index.php?rest_route=\/wp\/v2\/pages\/2"}],"wp:attachment":[{"href":"https:\/\/informationtechnologydecisions.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=46"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}