Professional Documents
Culture Documents
Duranti L
Duranti L
In c o n g r e s s . J
EN CYCLO PED IA
OF ARCHIVAL
SC IEN C E
EDITED BY
Luctana Duranti
AND
Patricia C. Franks
218 Functional Analysis
arguments. For this reason, this entry focuses on individual organizations and types of organizations,
functional analysis in the context of archival ap such as scientific institutions and colleges/universi-
praisal and current records management, and in par ties. However, no general methods for carrying it
ticular, within the latter, on records classification, out were introduced. Varsity Letters exemplified
as records classification joins together and manifests one procedural step, consisting of deriving catego
records creation and capture on the one hand, and ries and terms from “a careful examination of the
serves as foundation for disposition on the other. literature on higher education, and particularly the
vocabularies this community uses to describe and
evaluate itself,” and then consider “the categories
Functional Analysis and Archival Appraisal
and concepts familiar to the archivists responsible
The term functional analysis was introduced in for these records” (Samuels, 132).
Helen Samuels’s 1992 article, “Improving Our In contrast, macroappraisal considers “functional
Disposition: Documentation Strategy,” along with analysis” its “theoretical and methodological core.”
the qualifying term institutional. To be accurate, the Without the benefit of a dedicated definition, the
phrase functional analysis appeared earlier in her “theoretical core” likely refers to the assumptions,
1986 article, “Who Controls the Past,” published as reflected by the concept of function, on “what
in The American Archivist, but only once, and as is valuable and what is not, what is worth remem
a general term. The 1992 article, which is primar bering by society and what is not, what should
ily based on the introduction section of her book become archives and what should be destroyed”
Varsity Letter, Documenting Modern Colleges and (Cook 2004, 5-6), and the “methodological core”
Universities, formally presented “institutional func refers to “researching, understanding and evaluat
tional analysis” as “a new tool to supplement archi ing the degree of importance of the legislation,
val practice . . . and revamp it.” Archival practice regulations, policies, mandates, purposes, functions,
here was used to include “appraisal,” “selection,” programmes, decision-making processes and delib
“acquisition,” and “collection analysis” (Samuels, erations, the internal organisation and structures,
128). The term, however, was not accompanied by a organisational culture and communication patterns,
definition, nor were its relationships with those ar the liberty and flexibility allowed to public servants
chival practices specifically explained. The discus to interpret policy and thus implement it in varying
sion involved general all archival practices, without ways, and, out of all this, the activities and transac
sufficient differentiation. Moreover, a number of tions of the record creator (the branch, sector or
terms such as functional study, functional approach, programme entity covered by the appraisal project)”
and functional understanding were seemingly used (Cook 2004, 12). Here, functional analysis, in addi
as synonyms of functional analysis, although the tion to a methodological usage, acquired a theoreti
synonym-stance was not explicitly stated and none cal underpinning, thus differentiating itself from the
of the terms are defined or elaborated on. In the institutional functional analysis as articulated in the
article the term institution seems to be used to refer documentation strategy, where it is only a “tool”
to two types of institutions: a designated archival or “technique.” Moreover, the analysis component
institution and an organization having an in-house of the macroappraisal functional analysis, as pre
archival program. According to Samuels, functional scribed by its methodology, is much more intensive
analysis means to understand what institutions do, than that of the institutional functional analysis,
irrespective of organizational structures and the as the former includes many aspects not required
content of records. The analysis of organizational to be examined by the latter, with “internal orga
structure and records content is considered “tradi nization and structures” being the most noticeable
tional” and no longer responsive to archival needs example. Correspondingly, the issue of recurring
arising from contemporary reality. The arguments organizational changes as a supporting argument for
for this assertion are built around two main issues: functional analysis is no longer present, and the jus
frequently changing structures and unmanageable tification for functional analysis becomes primarily
volume of records. Methodologically, institutional the unmanageable volume of records and the “crisis
functional analysis is stated as applicable to both of preserving electronic records” (Cook 2004, 5)
220 Functional Analysis
There are other discussions of functional analysis to represent the uncovered relationships in a hierar
in relation to archival appraisal, presenting rather chical fashion. Unlike process and transaction, the
distinct focuses from the aforementioned two. Ger term function is not defined, but, as indicated by the
ald Ham explained functional analysis as “an ex prescribed basic steps of functional analysis, linked
amination of who created the record and for what to the strategic goals of the organization. Functional
purpose,” and considered it useful for providing analysis distinguishes “operational functions” and
“important clues to the value of a record, especially “administrative functions,” with the former defined
for institutional history,” yet less useful in evaluat as those that “meet the unique objectives of the or
ing “what records tell us about people, places, and ganization” and the latter as those that “support the
phenomena with which the institution dealt with” delivery of the operation functions” (ISO 2008, 8).
(1993, 51-52), hardly resembling any aspect of the The standard recommends conducting functional
functional analysis as advocated in both Samuels’s analysis independently o f organizational structure
documentation strategy and the Canadian macroap and rationalizes the recommendation as due to the
praisal. Relying on Mintzberg’s theory on organi consideration that “function may be exercised in
zational configuration, Victoria Lemieux proposed more than one location within, or across one or more
to analyze how the structural components of an organizations” (ISO 2008, 6). Structural analysis,
organizational system function rather than what they however, is not ignored but addressed as part of
specifically do (1998, 37-85). Theoretically sub “contextual review”—“the foundation for undertak
scribing to the same assumptions of macroappraisal, ing functional analysis” (ISO 2008, 6). The major
however, the methodological aspect of Lemieux’s outcome of the analysis is a high-level relation
proposal—^that is, the focus on how—differs signifi ship representation model, useful for “determining
cantly from the one developed by Cook. aggregations of records for disposition”—an idea
similar to that claimed by functional analysis for
appraisal and for a “functions-based classification
Functional Analysis and Records Classification
scheme” (ISO 2008, 8).
As a phrase, functional analysis was first used in A function-based classification scheme in the
the Australian national standard AS 5090-2003, context of ISO 15489-2001 refers to a logically
Work Process Analysis fo r Recordkeeping, which established system that identifies and arranges
was subsequently issued in 2008 as an ISO stan business activities or records. The analysis of busi
dard. Functional analysis in this standard conforms ness activity, therefore, becomes synonymous with
theoretically with the requirements of ISO 15489- functional analysis in this sense. For example, the
2001 Information and Documentation—Records Step B in the DIRKS manual is termed “Analysis
Management, that is, operates along the lines of of Business Activity,” producing a hierarchical
the relationship between records and “business representation of functions, activities, and trans
activity,” with the latter as the sole cause for the actions, which, in turn, serves the need of con
creation and use of the former. In the standard, structing a function-based records classification
functional analysis constitutes one of the two types (NSW State Records 2007). Another example is the
of analyses that aim at “the creation, capture and methodology developed by Library and Archives
control of records,” which “seeks to group together Canada, called the Business Activity Structure
all the processes undertaken to achieve a specific, Classification System (BASCS), which prescribes
strategic goal of an organization” (ISO 2008, 2). A a classification structure o f function, subfunction,
(work) process in this context means “one or more and activity (Library and Archives Canada 2006).
sequences of transactions required to produce an These developing methodologies maintain the same
outcome that complies with governing rules,” and theoretical stance, by prescribing the adherence to
transaction means “the smallest unit of a work pro the operations of an organization embodied in func
cess consisting of an exchange between two or more tions as the foundation for classifying records—a
participants or systems” (ISO 2008, 2). Functional recommendation made by Schellenberg in his 1956
analysis, therefore, is expected to uncover relation book. Modern Archives: Principles and Tech
ships among functions, processes, and transactions niques, and already proposed by Campbell in 1941.
and, as dictated by its being a top-down approach. They, however, differ in the methodology, most
Functional Analysis 221
noticeably on how to break down or formulate a former focusing on developing an adequate un
function (Xie 2006). The most challenging part for derstanding of the organization and the latter on
users of these methodologies is to determine how synthesizing the lowest level of business actions
specific or at what level the analysis should be. A for the purpose of identifying functions, activities,
(true) function-based, or functional, classification or processes (Xie 2013). Therefore, the decision
system cannot stop at high-level analyses (that is, of conducting bottom-up analysis should not be
what constitutes function, subfunction, activity, left to individual organizations to make—as the
or process, depending on the methodology being functional classification methods typically recom
applied), but needs to go further down to the level mend, but instead, should be strongly advocated if
of transactions—that is, it needs to conduct, for ex not prescribed as a precondition for good records
ample, the other type of analysis described in ISO management. The concept of functional analysis,
26122-2008 as sequential analysis. It is at the level therefore, requires a further development that takes
of transaction that records creation takes place, and, into consideration these factors.—Sherry Xie
in order to classify records functionally, in par
ticular digital records, classification is to be done Keywords: function-based approach, functional
when and where records are created. In this sense, classification, top-down approach, bottom-up
transactional analysis is at the heart of functional analysis, transactional analysis
analysis for records classification, and this contrasts Related Entries: Appraisal; Formal Analysis; Func
sharply with the top-down approach o f functional tion; Records Classification
analysis for archival appraisal.
Bibliography
Conclusion Campbell, E. G. “Functional Classification of Ar
Functional analysis in its current state appears to chival Material.” The Library Quarterly: Informa
be an underdeveloped concept, in both its theoreti tion, Community, Policy 11 (4) (1941): 431-41.
cal underpinnings and its methodological implica www.jstor.org/stable/4302884.
tions. This is due to its inherent link to the concept Cook, Terry. “Macro-Appraisal and Functional
of function, which is abstract and difficult to be Analysis: Documenting Governance Rather Than
defined in a way that allows direct application. Government.” Journal o f the Society o f Archivists
The common guidance that functions are derivable 25 (1)(2004): 5-18.
from legal and regulatory documentations perti Ham, Gerald. Selecting and Appraising Archives
nent to the records-creating organization is simply and Manuscripts. Chicago: Society of American
inadequate for explaining the nature of functions Archivists, 1993. Available online at http://babel.
and ineffective in indicating the complexity of the hathitrust.org/cgi/pt?id=mdp.39015024110697;vi
analysis required to reach the pursued goal. Also, ew=lup;seq=21.
there is a lack of recognition by the archival lit International Standards Organization. ISO/TR
erature on functional analysis of the indispensable 26122:2008: Information and D ocumentation-
role of records management in supporting and, in Work Process Analysis fo r Records. Paris, France:
some cases, allowing to conduct archival work. As International Standards Organization, 2008.
discussed earlier, all of the functional analyses pro Lemieux, Victoria. “Applying Mintzberg’s Theories
posed by archivists focus exclusively on guiding on Organizational Configuration to Archival Ap
archivists to tackle “messy” records in organiza praisal.” Archivaria 1 (46) (1998): 32-85. http://
tions. Messy records are only the symptom of poor journals.sfu.ca/archivar/index.php/archivaria/ar-
records management. In other words, the archival ticle/view/12675/13842.
discourse on functional analysis misses the cause Library and ArchivesofCanada.“BASCS Guidance.”
of the issues that functional analysis is called to re www.collectionscanada.gc.ca/007/002/007002-
solve—the lack o f a records management program 2089-e.html#six (accessed December 2013).
in creating organizations. A strong and effective NSW State Records. “DIRKS Manual.” www.
records management program is one that conducts records.nsw.gov.au/recordkeeping/dirks-manual
both top-down and bottom-up analysis, with the (accessed December 2013).
222 Functional Analysis
223
224 Information Assurance
Related Entries: Authenticity; Interrelatedness (Re A key element of RM has always been its abil
cord); Naturalness (Record); Reliability; Unique ity to provide evidence of an activity. Historically,
ness if evidence could be provided of an event, it was
deemed to have happened that way. Records, then,
are powerful tools in the hands of those who seek
Bibliography
recognition of positions of authority and verifica
Duranti, Luciana. “The Concept of Appraisal in tion of the status quo, for example. Recent archival
Archival Science.” The American Archivist 57 articles on ethies and the use of records in countries
(2) (Spring 1994): 328-44. http://archivists.meta- where power structures are shaping and reshaping
press.com/content/pu548273j5j 1p8 16/fulltext. highlight the danger of misuse. Control of records
pdf. and therefore evidence enables the construction of
Duranti, Luciana, and Corrine Rogers. “Trust in external image, affecting standing within the inter
Digital Records: An Increasingly Cloudy Le national community and ultimately global power
gal Area.” Computer Law & Security Review structures. At an organizational level, control of re
28 (5) (October 2012): 522-31. http://dx.doi. cords requires the implementation of RM processes
org/10.1016/j .clsr.2012.07.009. to ensure that records can be provided as evidence.
Eastwood, Terence M. “What Is Archival Theory Records are defined in ISO 15489 (the interna
and Why Is It Important?” Archivaria 1 (37) tional standard for RM) as “information created, re
(1994): 122-30. http://joumals.sfu.ca/archivar/in- ceived and maintained as evidence and information
dex.php/archivaria/article/view/11991/12954. by an organization or person, in pursuance of legal
Jenkinson, Hilary. A Manual o f Archives Adminis obligations or in the transaction of business” (In
tration. London: Percy Lund, Humphries & Co., ternational Standards Organization 2001). It further
1937. identifies the RM role as ensuring that records will
be accepted as evidence in a court of law, should this
be required.
IN FO RM A TIO N ASSU RAN CE “The principles of good practice in recordkeeping
are of value, even if the need to produce electronic
The goal of information assurance (lA) is to en records in court never arises. The effort and re
sure that “the information flows within a company sources required to comply quickly bring business
are confidential; their integrity is safeguarded and benefits, whether the original is in court or not”
available” (U.S. Federal Government Committee; (International Standards Organization 2001).
McCumber 1992; Maconachy, Schou, Ragsdale, Frank Upward, creator of the Record Continuum
and Welch 2001). The integrity of the system’s Model, highlights “evidentiality” as one of the four
architecture and the authenticity of its contents are axes of recordkeeping (RK) and asks how the use
now regarded as of equal importance as the security of the term evidence in RK relates to legal evidence
of its data. Verifying the identity of the creators of (2005).
information, proving that they are who they say they The tools available to the records manager in
are and that the information in question has not been clude classification schemes to categorize records
altered subsequently, have all proven to be critical in a systematic and consistent way, appraisal to
success factors in recent court cases. The field of determine which records are deemed to have value,
records management (RM) has been addressing the retention to determine how long they should be kept,
issue of what constitutes critical information for an and disposition to ensure these decisions are imple
organization for some time. RM is one of disciplines mented. The authors believe that some of the tried
within the broader context of communities with a and tested methods honed to international standards
fundamental stake in lA. Both RM and lA seek to ad in the records management arena can shed light on
dress issues relating to the integrity, authenticity, and the management of digital forensics data embedded
security of the content of systems that directly impact in systems in order to ensure the preservation of reli
our private, organizational, and societal personas. able digital evidence for current and future access.
Information Assurance 225
Discussion of the Principles of Each pean Commission. In some respects, ISO 15489
itself was devised in order to deal with the issues of
The authors make the case that the goals of both are
nonrepudiation. By following the principles and rec
similar. ISO 15489 states that records must possess
ommendations enshrined in the standard, it would
content, context, and structure. Content reflects the
prove more difficult to repudiate records provided
facts about the activity: they should be accurate and
as evidence of activities.
complete. Context, that is, the circumstances of cre
In RM, the level of accountability and the op
ation and use, include the a c t i v i t y , a n d ad
erational requirements of the organization and their
ministrative context of the record. Structure reflects
perception of legal risk, compliance, and business
the relationships within the record and external to it
decision making will define which transactions
and organizes the content in such a way as to denote
require full evidential protection. These are organi
context (Shepard and Yeo 2003, 156).
zational decisions that the RM team will implement.
RM has always been about the context in which
ISO 15489 catalogues an eight-stage procedure
records are created—that is, if this is not known, the
for RM programs, the first five of which relate to
“record” ceases to be relevant and evidential. ISO
establishing the current position and identifying
15489 further isolates four qualities that records
the requirements for records, before designing a
should possess: authenticity, reliability, integrity,
strategy to satisfy these requirements. This common
and usability. Authenticity is linked to the accuracy
objective of defining what records/information/data
of the records; reliability pertains to the records be
are required for evidential and legal purposes is an
ing a full and accurate representation of the activity/
area that we believe brings the two disciplines closer
transaction. Integrity relates to the fact that records
together. By pre-identifying certain categories of
are complete and unaltered. Finally, usability re
evidence, it would be possible to provide special
fers to records being retrievable, presentable, and
treatment for those requiring full digital forensics
interpretable. Although the language relates to the
(DF) protection.
“record,” increasingly it is accepted that in order
Sremack refers to the need for research into “us
to maintain the above characteristics in records, it
ing case specific knowledge of a system to deter
is the systems and the information architecture that
mine what information is critical, thereby minimiz
must be proven to meet these requirements.
ing the amount of extraneous information that is
RM does not explicitly refer to nonrepudiation
collected and analyzed and guarantee that no criti
and confidentiality. It does, however, constantly
cal data is missed” (2008, 6). Sommer (2005, 34)
work within the confines of legislation, particularly
calls for “improvements in overall system specific
freedom of information and data-protection laws.
and management process to capture more potential
These form a natural tension between what society
worthwhile evidence.”
considers appropriate in terms of accountability
Records managers have to analyze the processes
of organizations and confidentiality demanded by
in an organization before they can identify the
citizens and customers. Access rights and data secu
record-creating processes. Only then are they able to
rity are key elements in the management of digital
identify those that require “special treatment” (i.e.,
records, as is evidenced by their prominence in the
vital records in current business terms). From a DF
recently released MOREQ 2 specification (February
point of view, knowing where (i.e., what processes)
2008) issued for comment on behalf of the Euro
to apply the techniques more rigorously would be
226 Information Assurance
a benefit. From an RM perspective, the ability to information-security model must be based on en
prove that techniques have been employed to as vironmental, organizational, system, and informa
sist in verifying that a system and, therefore, the tion aspects that remain relatively constant over
records it creates possess integrity and authenticity extended periods of time. The last two decades of
is a benefit. tumultuous change and growth in the information
The aim of RM is to ensure that the relationships processing and -management area has shown that
between the essential business entities are apparent the Comprehensive Model of Information Systems
and maintained for current and future usage. If RM Security (CMISS) presented in 1991 by McCumber
offers tools that narrow down the number of “infor has the basic model components and characteristics
mation objects” that should be considered “critical,” that allow this model to remain useful over this ex
that is, those more likely to be called on in court and tended period of time (McCumber 1992; see figure
therefore have a requirement to be “trustworthy,” I.l). The key aspects of the CMISS that provide the
DF processes could be applied to a more limited set foundation of this continual period of application
of processes, and NFR may be more achievable. and usefulness are its focus on information along
We can’t know how which single documentIdaXst with a model structure that allows human beings the
set/record will be challenged in the future but we ability to organize and reason about information at
can seek to manage those most likely to be required. the proper level of abstraction.
RM procedures are set up to determine which of With a focus on characteristics of information that
these are most likely to be and to capture them into are independent of implementation technology and
RK systems. Making early decisions regarding risk organizational structure, the CMISS distills the es
to the organization and to wider society of keeping sence of information-security practices in a manner
or not keeping records and utilizing RM and DF that is usable by security planners and managers.
practices and procedures to ensure their reliability By arranging primary concepts in groups of three
and accessibility may reduce discovery and spolia and constraining model relationship views to nine
tion costs. It may also reduce digital preservation or fewer items, the CMISS also addresses critical
costs. cognitive complexity issues associated with the ap
plication of these types of models. The stable form
A Comprehensive Model of Information presented by the CMISS is of great benefit to sea
Assurance soned information-assurance professionals that have
an extensive background and expert understanding
Hardware, software, protocols, and operational tech of the information-assurance domain.
niques associated with the process of managing Walking through the model, security must be
information change at a very high rate. Any stable considered for each information state through which
information passes in a system: transmission, stor Maconachy, W., C. D. Schou, Maconachy, Daniel
age, and processing. In each information state, the Ragsdale, and Don Welch. “A Model for Infor
required security services of confidentiality, integ mation Assurance: An Integrated Approach.”
rity, availability—^the so-called CIA of security—are Paper presented at the Proceedings of the 2001
described. Finally countermeasures—human factors, IEEE Workshop on Information Assurance and
policies and practices, and technologies—are identi Security, U.S. Military Academy, West Point,
fied and prescribed. Further, changes brought about NY, 2001.
by networking systems have generated a modified McCumber, John. “Information Systems Security:
model that incorporates the security services of au A Comprehensive Model.” In Proceedings o f the
thentication and nonrepudiation into the base CMISS 14th National Computer Security Conference,
(Maconachy, Schou, Ragsdale, and Welch 2001). Washington, DC, October 1991. Reprinted in Pro
ceedings o f the Fourth Annual Canadian Com
puter Security Conference, Ottawa, Ontario, May
Conclusion
1992. Reprinted in DataPro Reports on Informa
The field of information assurance is in a formative tion Security. Delran, NJ: McGraw-Hill, 1992.
stage that is proceeding with a high rate of change at Shepherd, Elizabeth, and Geoffrey Yeo. Managing
organizational and technical levels. A fundamental Records: A Handbook o f Principles and Practice.
security model that is independent of technology London: Facet, 2003.
and organizational changes is helpful in thinking Sommer, Peter. “Directors and Corporate Advisors’
through information-security requirements of sys Guide to Digital Investigations and Evidence.”
tems. Using the McCumber Cube, the complete Information Assurance Advisory Council, 2005.
security context for any given situation can be ef Sremack, Joseph. “Formalizing of Analysis: A
fectively addressed.—Barbara Endicott-Popovsky Proof-Based Methodology.” Master’s thesis.
North Carolina State University, Raleigh, NC,
Keywords: information assurance (lA), records 2004.
management, McCumber Cube Upward, Frank. “The Records Continuum.” In Sue
Related Entries: Archival Standards; Authenticity; McKemmish, Michael Pigot, Barbara Reed, and
Records Continuum; Reliability (records) Frank Upward, eds.. Archives: Recordkeeping in
*Acknowledgment: The comparison of lA and RM Society. New South Wales: Charles Stuart Univer
is courtesy of a collaboration between the Uni sity, Centre for Information Studies, 2005, 207.
versity of Washington Center for Information As U.S. Federal Government Committee on National
surance and Cybersecurity and Aberyswyth Uni Security Systems Instruction No. 4009. National
versity, Wales, Adran Astudiaethau Gwybodaeth/ Information Assurance Glossary.
Department of Information Studies (Boucher and
Endicott-Popovsky 2008). (See Table I.l.)
IN FO RM A TIO N G O V ER N A N C E
Bibliography
Information is a vital organizational asset, and in
Boucher, K., and B. Endicott-Popovsky. “Digital formation governance (IG) is an integrated, strate
Forensics and Records Management: What We gic approach to managing, processing, controlling,
Can Learn from the Discipline o f Archiving.” maintaining, and retrieving information as evidence
Paper presented at Information Systems Compli of all transactions of the organization. Informa
ance and Risk Management Institute, University tion governance is defined as “the specification of
of Washington, September 2008. decision rights and an accountability framework
International Standards Organization. ISO 15489- to ensure appropriate behavior in the valuation,
1:2001: Information and Documentation—Re creation, storage, use, archiving and deletion of
cords Management—Part 1: General. Geneva, information. It includes the processes, roles and
Switzerland: International Standards Organiza policies, standards and metrics that ensure the effec
tion, 2001, 5.Iff. tive and efficient use of information in enabling an
228 Information Governance
organization to achieve its goals” (Gartner n.d.). IG This model presents an image of the cross
is a high-level, strategic function that involves stake functional groups of key IG stakeholders; not all
holders from across the organization, each with their organizations will have the same mix of stakehold
own expertise and responsibilities (Franks 2013, ers. Notice the relationship between the value of
321). A renewed interest in records and informa the information assets that were created and used
tion management has resulted in a call by many to and the duty the organization has to hold, discover,
use fundamental records management principles as retain, maintain, store, secure, and dispose of those
the foundation for sound IG. Records management assets. Cooperation between all stakeholders is nec
is just one component of IG, but the processes used essary to develop policies and processes to achieve
to manage records can be leveraged to manage all effective IG.
information (Franks 2013, 29).
\ED GOVERNA/Vç-^
Dispose
.C<
TRANSP^^^'^^
Figure 1.2. The information governance reference model (ICRM ). EDRM (edrm.net)
integrity, safety and security, and appropriate 7. Responsibilities: This section clarifies ind-
access and use of records and information as vidual responsibilities, including those fc«" al
sets; and employees.
• assurance in relation to processes for creat 8. Conclusion: This section reinforces the in>-
ing, collecting, storing, disseminating, sharing, portance of the IG strategy, policy, and actiar
using, and disposing o f information. (Franks plans to ensure efficient information m a n a ^
2013, 324) ment and risk reduction (Franks 2013, 326).
Murphy, B. “What Is Information Governance?” In the United States, information science even
eDiscovery Journal (blog), March 22,2010. http:// tually superseded documentation as the preferred
ediscoveryjoumal.com/2010/03/what-is-informa- term, and the American Documentation Institute,
tion-govemance. founded in 1937, changed its name to the American
National Health Service. Information Governance Society for Information Science in 1968 (Buckland
Toolkit. Department o f Health, England, n.d. 1999), eventually becoming the American Society
www.igt.hscic.gov.uk (accessed July 30, 2014). for Information Science and Technology. It has been
suggested that the terms information management
and information science can be used interchange
IN FO RM A TIO N M ANAGEM ENT ably, with either being today’s manifestation of
documentation (Buckland 1999).
The nature of information management as a disci The second information age occurred in the mid
pline is subject to debate. Information management twentieth century. The formation of records man
is a contested concept, with the meaning varying agement as a distinct profession has been linked
according to the occupational group claiming own to the need to manage the immense proliferation
ership of it. Its origins can be traced back to the of documents in North America post World War
early twentieth century; reflecting on this historical II (Duranti 1989). Today, in the third information
development provides some insight into the current age, there is a tendency for records managers to
situation. emphasize their role as information managers. For
instance, the Records Management Association of
Australasia has rebranded itself as “Records and
The Concept Information Management Professionals Austral
The three modem information ages identified by asia.” However, corporate information technology
Ronald Day (2001) provide a useful perspective professionals may also often refer to themselves as
from which to view the development of particular information managers. Librarians also continue to
occupational specialties that arose in order to ad refer to themselves as information managers.
dress specific problems encountered in managing The consequence of these multiple claims for ju
information. The first information age occurred in risdiction over the domain is that the scope and range
the late nineteenth century and resulted in the spe of information management can be defined too nar
cialty of documentation to manage the explosion rowly, or if broadly, the purposes for which different
of documents in the late nineteenth century. From information types need to be managed may not be
about 1920 in Europe the term “documentation” recognized. A major contributing factor to the ambi
was used as a comprehensive one encompassing guity associated with information management is the
bibliography, records management, and archival absence of a robust and coherent theoretical basis.
work (Buckland 1997). Two leading figures in the The information continuum model that was de
Institut International de Bibliographie (renamed veloped as a teaching tool by academics at Monash
the International Federation for Documentation in University has the potential to clarify the ambiguity.
1935), Paul Otlet and Frits Donker Duyvis, showed The model is briefly described as part of a suite of
an integrative view of the management of informa continua (Upward 2000) and provides a theoretical
tion resources of a variety of types and in a variety framework that unifies approaches to information
of contexts, including the office as well as library management. It is applicable to all information
(Buckland 1998). management specialisms and facilitates more in-
Williams (1998) describes special librarians as the depth analysis of occupational roles. It has been
first documentalists in the United States and quotes applied in various settings, including to assess the
Ethel Johnson in 1915 distinguishing special libraries sustainability of a community information network
from public libraries by emphasizing the key role of (Schauder et al. 2005), to investigate information
information: “The main function of the general library culture (Oliver 2004) and in the development of
is to make books available. The function of the special a university-wide information strategy and digital
library is to make information available” (174). repository (Treloar et al. 2007).