Top Posts & Pages
- More words and phrases that kill customer service
- Does the fish rot from the head down? When organisations go toxic
- Three reasons why Apple will disappear by 2020: What Machiavelli tells us about managing Apple’s future.
- Is augmented reality the future for archives in a digital age?
- Tesco, horsemeat, and how to write an apology letter.
Category Archives: information management
In November 2015, I attended the Threats to Openness conference held at Northumbria University. The conference had a specific aim “discuss the growing threats to citizens’ rights to access public archives across the digital world.” Although we did not discuss … Continue reading
Daniel Morgan was brutally murdered with an axe. In the days before his murder, he had claimed to have information about a network of corrupt police officers. Despite, 6 investigations and two failed prosecutions, his killers have never been brought … Continue reading
The major issue for the web is how to identify a user. At first glance, this seems an obvious question. We know who someone is by the IP address and the owner of the computer. Except that is not always … Continue reading
This post has been removed as it has been superseded by the post How to write transparent investigation reports. I would like to thank Donna Boehme of the Compliance Strategists for comments on 8 Steps to ensure your investigation does … Continue reading
On the 29th of April, I attended the TRIL Trust, Risk, Information and the Law Conference, in Winchester hosted by the University’s Centre for Information Rights. The conference was well organised with about 60 attendees. The day was structured with … Continue reading
Business will need someone to help them deal with the increased risks associated with using personal data. They need someone who can help them exploit the business opportunities of personal data and assure customers, and employees, about their privacy concerns. … Continue reading
A recent story on the BBC highlighted the number of data breaches reported by Welsh local government councils. Aside from the questions about the breaches, how they can be prevented, and whether the reporting mechanism encourages or discourages organisations from … Continue reading
I thought it was time to join the YouTube generation and post a video. I narrated a PowerPoint presentation and converted it into a video. Although these tools have been around for a few years, I did this for two … Continue reading
Like all businesses, archives face the challenges from the social media economy. For most people archives can seem a dusty forgotten place that only scholars or researchers would have an interest. In many ways, this is true because it is … Continue reading