Enterprise Content Management (ECM) is a broad term that incorporates a variety of technologies that can significantly affect your business. ECM encompasses the strategies, methods and tools used to capture, manage, store, preserve, and deliver content and documents related to your organizational processes. ECM tools and strategies allow the active management of an organization's unstructured information, wherever that information exists1. How you manage this content has a direct impact on business efficiency, employee productivity, IT infrastructure complexity, and most importantly, your bottom line.
Management Information System Complete Guide and Notes by muhammad Khurram ba...Muhammad Khurram Baig
This is complete Guide of MIS Book by Muhammad Khurram Baig. MIS and ERP Consultant of RIBAMS Audit and Technology House
For more information please contact 00923138854562
or drkoi99@gmail.com
Enterprise Content Management (ECM) is a broad term that incorporates a variety of technologies that can significantly affect your business. ECM encompasses the strategies, methods and tools used to capture, manage, store, preserve, and deliver content and documents related to your organizational processes. ECM tools and strategies allow the active management of an organization's unstructured information, wherever that information exists1. How you manage this content has a direct impact on business efficiency, employee productivity, IT infrastructure complexity, and most importantly, your bottom line.
Management Information System Complete Guide and Notes by muhammad Khurram ba...Muhammad Khurram Baig
This is complete Guide of MIS Book by Muhammad Khurram Baig. MIS and ERP Consultant of RIBAMS Audit and Technology House
For more information please contact 00923138854562
or drkoi99@gmail.com
O Portal do Cerrado Condomínio - Clube localizado no negrão de lima, composto por apartamentos com 3 quartos sendo 1 suíte, na metragem de 67,94 m2, com 1 ou 2 vagas de garagem e com entrega para Março de 2016. com facilidades para aquisição
Dreamforce Campfire - Apex Testing Tips and TricksDaniel Ballinger
Useful apex development tools
Unconference description:
"We will cover several useful tools and techniques for working with Apex test cases. This will include running single Apex test methods in isolation and alternative views of test runs."
Recruiting Optimization Roadshow - John Hundrieser, HumanConnections.ioGreenhouseSoftware
John Hundrieser, founder of HumanConnections.io and former Head of Recruiting at Groupon, presents "Architecting the Interview Process" at the Recruiting Optimization Roadshow in Chicago.
Simplify Your Enterprise Content Management Strategy with Inspired ECM, which is a global organization specializing in Oracle WebCenter Suite and the entire Oracle Fusion Middleware platform.
Contact us today to find out how we can help you innovate your business technologies and achieve your goals.
Or you can visit us at: http://www.inspiredecm.com/
Best Practices for Managing Asset Information
Although the effort required to develop and maintain accurate databases of
currently deployed assets remains a major barrier to broader Enterprise Asset
Management (EAM) adoption, solutions are appearing that address this
critical issue and EAM provides an ideal structure for organizing asset information.
Many of these solutions offer deep
visualization tools that enhance stakeholder access
to asset information. ARC considers the use of as
EAM a Best Practice in Asset Information Management.
Architecting an Enterprise Content Management Strategy: A Four-Pillar ApproachCognizant
Using a structured enterprise-content management (ECM) framework organization can develop a well-defined process and system for capturing, distributing, storing and managing unstructured content end-to-end
How Enterprise Content Management System Solution working and can effect in your company and business. With ECMS you can deliver your company knowledge in the right way,
Section 1: PROJECT INTRODUCTION
Section 1: PROJECT INTRODUCTION
Project Deliverable 1: Project Plan Inception
CIS 499 – Information Systems Capstone
Background
In the last two years, the ACME Company has experienced continued growth. This growth is expected to continue in the very near future. Specifically, the company is expected to experience a 60% growth in the next eighteen months. This rate of growth has presented new challenges for the company. It now has to redesign its information systems for the larger office space occupied. The continued growth has also highlighted the need to set up the company to deal with more data and ensure for safety and security for its clients. The ACME Company is currently valued at $25 million but is expected to experience significant growth in the future.
Type of Business
The ACME Company collects data using Web analytics and combines it with operational systems data. Increasingly, businesses have appreciated the competitive edge presented by analyzing market data. However, the successful use of data in decision making is a long process that has greatly influenced the growth of information systems. Some of the major steps in this process include collecting information and interpreting its significance. This is intended to compare the external and internal environments of a business and propose better practices that would benefit as a whole.
ACME based its information technology on a hybrid model where some of the systems are hosted and other in-house. This method was initially done with the goal of minimizing costs. However, a lot has changed in the business that necessitates major changes to be made.
Skilled Information Systems Personnel
At the moment, there are only four employees in the company dedicated to the Information Technology department. ACME has adopted a hybrid solution to information technology where much of the systems used by the company were hosted by other entities. This was believed to be part of cutting costs. As the business has continually grown, its information technology needs have expanded and redesigned to meet its current obligations.
The personnel at the company will need to be trained to use any other systems introduced at the workplace. Although all the workers are trained information technology experts, it will be important to involve them in the development of the new design to facilitate its effectiveness. This is primarily intended to ensure that all the qualified personnel at the organization are well-informed about the information technology changes occurring at the workplace.
Types of Data
ACME collects web analytics and combines it with operational systems data. Web analytics includes all the data tha.
Information Management aaS AIIM First Canadian presentationChristopher Wynder
High level talk given at AIIM Canada's breakfast event March 23, 2017.
The talk goes through the challenges of information management in the era of BYOD and cloud services. The last part of the talk is how to start with a small but impactful project to show the value of IMaaS.
Encryption is the most important concept to
enhance the security in cloud access policies. Encryption
data in the cloud is the procedure of transforming or
encrypted data or information before it’s moved to
cloud storage. Normally, in cloud service sources give
encrypted services ranging from an encoding
connection to limited encode sensitive information and
provide encode key to decode the data as
required.Several security problems and some of their
solution are examined and are concentrating primarily
in public security problems and their solutions. In this
paper, we’ve implemented a hybrid approach, where
access policies won’t leak any privacy data and to
enhance the security and performance parameters like
decryption time, encryption time and accuracy and
compared with existing performance
parameters.Security is the main limitation while storing
data over cloud server. The introduced approach is
implemented appropriately even if the tenant could
access the information all that would appear is gabble.,
Hijacking of sessions while accessing data, insider
threats, outsider malicious attacks, data loss, loss of
control, and service disruption. Therefore enhancing
the security for multimedia data storage in a cloud
center is of paramount importance.
Demystifying Computer Vision Data Management | A Comprehensive GuideFlyWly
Computer vision has emerged as a transformative technology in recent years, enabling machines to perceive and understand visual data. With the increasing adoption of computer vision applications across various industries, managing computer vision data has become a crucial aspect of development. This comprehensive guide will explore the intricacies of computer vision data management and provide valuable insights into its importance, challenges, and best practices.
ECM services aim to edit, manage, and maintain mission-critical documents. The ability to access and share critical corporate data in real-time can drive consistency and appropriate decision-making to ensure your company’s growth.
Similar to Taming Information - InfoManagement2015 (20)
Leveraging shared IT and Business resources to maintain PCI complianceShiva Hullavarad
Given the serious security risks to information technology (IT) assets, managing those risks effectively is an essential task for the University and its departments. The process will benefit both the individual departments and the University as a whole. It is important that management understand what risks exist in their IT environment, and how those risks can be reduced or eliminated. In an increasingly competitive business environment organizations must develop capabilities that will provide them with a sustainable competitive advantage. The universities and colleges big and small – face continued the threat of data theft ranging from finance, heath, intellectual property and other sensitive information.
In such a high-risk environment, it’s imperative for universities and colleges to share and collaborate ideas, methods, and technologies to learn how the risks can be addressed. This talk will provide some insights on how to identify the areas for cross – collaboration to stay compliant and reduce risk. The talk also outlines the University of Alaska and Texas A&M synergistic efforts.
Vulnerability is a weakness in the application or a design flaw that allows an attacker to exploit for potential harm or financial benefits. Though it is practically impossible to have vulnerability free system, one can implement tools to identify the nature of vulnerabilities and mitigate the potential risk they pose. As an institution, it is very important for business managers, administrators, and IT security personnel to pay attention to those security warnings. The talk will identify types, sources, and mitigation of external and internal threats. The talk will review Vulnerability Assessment and Penetration Testing (VAPT) tools available in the market and their benefits. Presenters will engage the audience in interactive style discussion on the available tools to detect vulnerabilities and threats and the steps needed to mitigate.
Vulnerability is a weakness in the application or a design flaw that allows an attacker to exploit for potential harm or financial benefits. Though it is practically impossible to have vulnerability free system, one can implement tools to identify the nature of vulnerabilities and mitigate the potential risk they pose. As an institution, it is very important for business managers, administrators, and IT security personnel to pay attention to those security warnings. The talk will identify types, sources, and mitigation of external and internal threats. The talk will review Vulnerability Assessment and Penetration Testing (VAPT) tools available in the market and their benefits. Presenters will engage the audience in interactive style discussion on the available tools to detect vulnerabilities and threats and the steps needed to mitigate.
Enterprise Content Management (ECM) solutions provide robust functionality to control and analyze information. ECM solutions help reduce search times, manage data, and enable institutions with regulatory compliance. The correlation between impact on a business process through ECM implementation stage is demonstrated and been shown to follow reported hypothesis by Reimer (2002). The objective of this article is to provide (1) a typical architecture of an ECM, (2) identify key challenges in implementation and (3) implementation road map strategy
3. 36 MAY/JUNE 2015 INFORMATIONMANAGEMENT
Taming the Information Explosion
with Enterprise Content Management
Shiva Hullavarad, Ph.D.; Russell O’Hare, Ed.D., CRM;
Ashok Roy, Ph.D., CBA, CIA
RIMFUNDAMENTALS
4. MAY/JUNE 2015 INFORMATIONMANAGEMENT 37
retention rules that ensure it is kept
for the required time and automati-
cally deleted after the retention re-
quirement is fulfilled.
3) Features/Attributes – An ECM
system is equipped with features
meant to achieve specific business
purposes. For example:
• Data archival provides a sys-
tematic approach for archiving
and retrieving information us-
ing select keywords.
• Intelligent data capture con-
I
nformation is among every orga-
nization’s most valuable business
assets, regardless of its size or busi-
ness. As the fuel that powers their
unique business processes – from
product development, to sales and
marketing, product/service delivery,
and business management – infor-
mation must be captured, processed,
accessed, measureed, integrated, and
stored efficiently and effectively.
For most, this is an ongoing chal-
lenge; implementing enterprise con-
tent management (ECM), which is
broadly defined as the strategies,
tools, processes, and skills needed to
manage all information assets over
their life cycle, can be a good solution.
Implementing an ECM system,
which is a single, decentralized sys-
tem that can serve multiple systems
and business areas, offers robust func-
tionality for systematically control-
ling and analyzing an organization’s
increasingly complex and voluminous
information, whether it is in a struc-
tured format (e.g., in databases), un-
structured format (e.g., e-mail, word
processed, spreadsheet, image, audio,
video), or hard copy.
ECM Functionalities
As shown in Figure 1, an ECM
solution typically consists of four es-
sential functionalities:
1) User interface – The user in-
terface brings information (digital
or non-digital) into an ECM system.
This is accomplished, for example,
by scanning hard-copy documents to
convert them into electronic images,
by uploading a born-digital document
such as a Google doc word processing
file, or being fed from an enterprise
resource planning (ERP) system the
organization uses to collect informa-
tion from many business activities.
2) Information governance – This
key functionality is what separates
ECM solutions from other digital
archival systems. For example, the
information governance functionality
assigns incoming information-specific
for connecting different data
streams.
• Information disposal affixes a
post-dated time to information
that will be automatically ap-
plied to delete it in compliance
with its retention require-
ments.
4) Repository – ECM systems
provide a secure approach to storing
information for on-demand access. A
variety of information storage proto-
cols allow information to be stored on
Figure 1: Typical ECM Architecture
verts image-based information
to a computer readable format
by using optical character rec-
ognition.
• Workflow provides an auto-
mated process for informa-
tion flowing through different
stages; this is based on a pre-
configured logic.
• Integration/Data process-
ing is a built-in information
management functionality
arrayed disks to allow for enhanced
data security. The repositories can be
onsite or in the cloud.
ECM Implementation Goals
The main goal of an ECM imple-
mentation is to provide transparent
content sharing by making different
and incongruent applications (for ex-
ample, web content management and
records management) interoperable.
With a complete suite of product
ECM User Interface
Scanner/
Image Capture
Device
ERP Google Apps Microsoft
Office
Records
Management
Records
Security
Records
Retention
Records
Interoperability
Data Servers
File Servers
Infrastucture
Storage
Cloud Storage
Services
Magnetic Tape
DVD
Microfiche
Data Archival Integration Security Workflow
Intelligent
Data Capture
Data
Processing
Access
Information
Disposal
ECM Information Governance
ECM Features
ECM Repository
5. 38 MAY/JUNE 2015 INFORMATIONMANAGEMENT
options, an ECM system can manage
and integrate data systems, automate
document handling, reduce workload
by streamlining tasks, provide trace-
ability and version control, reduce
duplication, and improve search
and retrieval for information across
platforms. This reduces costs and the
burden on IT departments for infor-
mation storage and retrieval.
Therefore, transitioning to an
ECM can help an organization in-
crease its decision-making capa-
bilities, improve customer service,
enhance employee creativity and
productivity, facilitate compliance
with regulations, eliminate unneeded
information on servers and in filing
cabinets, implement business con-
tinuity measures, and, ultimately,
enhance its reputation in the eyes of
its stakeholders.
ECM Implementation Stages
As shown in Figure 2 and de-
scribed below, there are four stages
of an ECM implementation plan: 1)
Roadmap Strategy; 2) Development;
3) Deployment; and 4) Support.
Stage 1: Roadmap Strategy
The primary goal of ECM imple-
mentation roadmap strategy is to es-
tablish the information governance
for the life cycle of the information
based on establishing an amalgam-
ated, interoperable space that will
reduce the content classification bur-
den for the end user. A well-developed
strategy:
• Encompasses the majority of
records, including paper and
electronic, unstructured and
structured
• Meets the needs of a wide va-
riety of stakeholders
• Enables the organization to
respond to legal discovery
• Automates business processes,
removing the inconsistency of
manual processes
• Brings the organization up to
date with respect to technology
Follow these steps to develop the
roadmap strategy.
Conduct a needs assessment.
The “Forrester Wave™: Enterprise
Content Management, Q3 2013” re-
port by Alan Weintraub, Craig Le
Clair, and Cheryl McKinnon said
ECM requirements are driven by user
productivity goals and compliance
needs. This means that identifying
the best ECM solution depends on
knowing how the organization intends
to use the information that will be
stored in it.
An organization’s business needs
are inherent and specific to the nature
of its business and culture, so the
needs assessment should sufficiently
cover:
• Existing technology infra-
structure/environment, readi-
ness
• Change management
• Immediate and long-term
training
• Information security and
alignment with regulatory
compliance
• Taxonomy and metadata re-
quirements for data classifica-
tion and retrieval
RIMFUNDAMENTALS
• Records management and in-
formation governance
• Storage capacity – on premises
and in the cloud
• Disaster recovery strategy
Get stakeholder buy-in. An in-
formation governance team compris-
ing representatives from all stake-
holder groups should act as a catalyst
to enforce consistent governing poli-
cies, such as for the adoption of an
organization file plan or classification
scheme; use of the taxonomy; and ap-
plication of retention, disposal, and
archival rules.
Identify the perceived benefits.
Identification of tactical benefits may
include improving internal and exter-
nal collaboration, enhancing content
quality and maintaining consistency,
standardizing workflows, producing
organizational metadata attached to
content objects, and provisioning for
regulatory requirements.
Determine strategic require-
ments. These requirements can be
broadly grouped under three catego-
ries:
1. Organizational Requirements:
• Information governance
• Management of official records
Figure 2: ECM Implementation Stages
ECM Implementation Considerations
ECM Roadmap Strategy
ECM Development
ECM Deployment
ECM Support
Business
Needs
Needs
Assessment
Stakeholder
Buy-In
Perceived
Benefits
Strategic
Requirements
Business
Requirements
and Analysis
Customize
Solution
Design
Solution
Build
Solution
Test
Solution
Plan
Implementation
Test and
Validate
Plan
Prepare
Deployment
Deploy
Solution
Confirm
Benefits
Technical
Support
Structure
System
Upgrades
User
Training
Support Level
Customization
In-House
Support
ECMStages
6. MAY/JUNE 2015 INFORMATIONMANAGEMENT 39
• Regulatory compliance
• Knowledge of industry best
practices
2. Access and Collaboration Require-
ments
• User-easy access, easy retriev-
al of information
• Information sharing
• Defined access rights & privi-
leges based on roles
• Automation, workflow
3. Functional Requirements:
• Based on information/records
governance and access
• Information protection from
loss and retained per retention
• External investigation and ob-
ligation may be met easily
• Reduction in information over-
load
A well-planned roadmap strategy
will help ensure user adoption.
Stage 2: ECM Development
ECM solutions are not plug-and-
play and can be customized based
on application data and content.
Every business process is different
with varying inflow of information
originating internally and externally.
Although ECM solutions for specific
business types, such as health care,
finance, education, insurance, and
research and development, provide
some basic functionality that is spe-
cific to those industries, a certain
degree of product customization is
necessary.
Numerous ECM providers offer a
suite of solutions suitable for organiza-
tions of all sizes and with varied types
and volumes of information. The Infor-
mation Systems Audit & Control Asso-
ciation’s COBIT 5 (Control Objectives
for Information and Related Technolo-
gies) framework – which is globally
accepted and provides an end-to-end
business view of the governance of
enterprise IT – recommends a model
for selecting ECM solutions based on
the organization’s nature of business,
size, risk tolerance, resources avail-
able, program governance, ease of
standardization across the enterprise,
and opportunity for continuous review
of quality improvements.
The likelihood of ECM success
depends heavily on the outcome of
connected workflow execution order
and process schedules. The following
may be considered in designing the
ECM to:
• Route documents in a stan-
dard, controlled, and prompt
manner
• Accommodate exceptions by
assigning specific users with
rights to add or exempt stages
on an ad hoc basis
• Forward documents without
delay to each successive phase
• Prioritize documents in each
queue. If there is no priority
assigned, the documents are
sorted by the date and time
they enter the life cycle.
• Monitor and measure the time
to complete a process
• Audit queues for periodic re-
view for quality assurance
• Add or adjust processes at the
document, process, group, or
enterprise level by specified
users or administrators
• Enable point-and-click config-
uration to customize both the
routing and the user interface
without programming
Stage 3: ECM Deployment
The detailed deployment and vali-
dation plan is critical to achieving
timely implementation of the ECM.
The deployment should be piloted in
a test environment to discover any
process-related bottlenecks before
ECM is migrated to the production
environment. Figure 3 provides in-
dustry standards for stress testing
key functionalities, such as large data
handling or varied types of data in-
flow, for understanding any missing
feature during the course of deploy-
ment.
Stage 4: ECM Support
Training personnel and keeping
pace with upgrades for the deployed
ECM solution should be part of the
ECM vendor’s product support. Some
ECM providers require power users
who serve in an ECM administra-
tive capacity to get certified against
standardized testing.
The ECM implementation team
must develop training methods that
are carefully customized for user
preference (e.g., video vs. PowerPoint
presentation) to ensure that they will
engage personnel through all stages
Stress Test Type Process
Volume handling Assume 50% of employees log on to the ECM, handling at least 60% of the total data/information
volume. Repeat for two different scenarios.
Processing power • Based on information load, write at least 250 scanned pages per minute
• Response to user input – retrieval rate
• Recover from server failure within 10 minutes
Test Configuration • Multiple physical servers, hosted on VMWare and running VMWare for failover
• Dynamic reallocation of computing resources across cluster
Figure 3: Industry Standards for Stress Testing Key ECM Functionalities
7. 40 MAY/JUNE 2015 INFORMATIONMANAGEMENT
of testing, upgrading, and extending
ECM functionalities.
Barriers to Success
AN ECM implementation is often
hindered by incompatibility between
the ECM platform and the existing
technology environment. The ECM
solution must be compatible with
the existing software applications in
use for routine job functions, such
as editing documents, storing data
files, searching, and electronic record
fabrication and preservations.
In other cases, projects fail dis-
mally for lack of:
• A proper initial needs assess-
ment
• A broad stakeholder pool
• A good deployment plan
• Executive support for the proj-
ect
See the sidebar “Keys to a Success-
ful ECM Implementation” for strate-
gies to avoid these barriers.
Keys to Success
The success of an ECM imple-
mentation lies in articulating the
perceived benefits and potential of
system efficiency. To achieve these
benefits, organizations must involve
all stakeholders in selecting the ECM
product and vendor, developing the
implementation plan, deploying the
plan, and training users. Mapping the
organization’s information manage-
ment needs, culture, and business
processes and threading those into
an ECM implementation roadmap
strategy will enable organizations
to weather the big data and be in
compliance.
A small gap between perceived
benefits and user adoption is a clear
indication of a well-planned roadmap.
ShivaHullavarad,Ph.D.,canbecontactedat
sshullavarad@alaska.edu. Russell O’Hare,
Ed.D., CRM, can be contacted at rjohare@
alaska.edu. Ashok Roy, Ph.D., CBA, CIA,
can be contacted at akroy@alaska.edu.
See their bios on page 47.
RIMFUNDAMENTALS
Keys to a Successful ECM Implementation
1. Identify realistic functional needs and configure the ECM solution to meet them –
not the other way around. The functional needs should drive the technology; the
technology should not drive the implementation.
2. Include all stakeholders at the initiation of the process, including top-level execu-
tives, and get their buy-in.
3. Analyze the content before deciding on an ECM solution.
4. Delineate security access controls, roles, and responsibilities.
5. Document access and approval procedures.
6. Define the quantitative expected outcomes for the organization.
7. Be prepared to accept the fact that launching an ECM is just the beginning of a long
process that involves training, routine upgrades, and certifications.
ECM System Components and Major Features
The major components of an ECM system, according to Gartner’s September
2014 ECM Magic Quadrant, and their major features are summarized below:
• Document management – has check-in/out capabilities, version control,
security, library services
• Web content management – controls the website content through manage-
ment tools; includes content creation and deployment functions
• Records management – allows long-term retention of content through au-
tomation and policies to ensure legal/regulatory/industry compliance
• Image-processing applications ¬– captures, transforms, and manages im-
ages of paper documents
• Social content – allows document sharing and collaboration support for
project teams and knowledge management use
• Content workflow – supports business processes, routes content, assigns
tasks, creates audit trails
• Extended components – can include mobile applications, digital asset
management, search, analytics, and packaged integration capabilities
Disclaimer
The views and opinions expressed in this article are solely by the authors. No
reliance should be placed upon this article for making legal, business, or other
important decisions. The University of Alaska and the authors do not endorse
and/or approve any affiliations to any commercial entities, and the study re-
ported in this paper is for education and knowledge dissemination purposes only.
8. MAY/JUNE 2015 INFORMATIONMANAGEMENT 47
Digital Vellum and Other Cures for Bit Rot Page 20
Marc Kosciejew, Ph.D. is a lecturer of library, information,
and archive sciences within the Faculty of Media and
Knowledge Science at the University of Malta. He received
his honours bachelor degree in political science from the
University of Toronto and his masters and Ph.D. degrees
in library and information science from Western University
in London, Ontario, Canada. He also holds certificates in
web search strategies, records management, and freedom
of information and protection of privacy from the Univer-
sity of Toronto. He can be contacted at mkosciej@gmail.com.
The Principles: Using the Principles to Guide EDRM Soft-
ware Decisions Page 26
Julie Gable, CRM, CDIA, FAI, is the retired president and
founder of Gable Consulting LLC, a firm that served clients’
information governance needs for the past 25 years. The
author of numerous articles on information-related topics,
she has a master’s degree in finance from St. Joseph’s Uni-
versity and a bachelor’s degree in management from Drexel
University. Gable can be contacted at juliegable@verizon.net.
Avoiding the Hammer: Defensible Strategies for FRCP Pro-
posed Rule 37(e) Page 32
Katherine Aversano, J.D., is an historic research and informa-
tion specialist at the U.S. Department of Justice. For more
than six years, she has served government agencies on en-
gagements involving environmental litigation. Her practice
includes electronic discovery, information management, and
litigation consulting. Aversano, who earned her legal degree
from Howard University School of Law, can be contacted at
katherine.aversano@gmail.com.
Joe Starnes, J.D., is a senior associate with Deloitte Transac-
tions and Business Analytics LLP, focusing on discovery and
supporting federal litigation involving environmental claims.
He has more than three years of experience serving federal
government agency clients. Starnes earned his law degree at
Vermont Law School. He can be contacted at jmstarnes@gmail.com
RIM Fundamentals: Tamingthe InformationExplosionwith
Enterprise Content Management Page 40
Shiva Hullavarad, Ph.D., is the University of Alaska System
enterprise content management (ECM)/enterprise records
management (ERM) administrator, where he oversees the
active and inactive records. He is also responsible for main-
taining the ECM platform and providing oversight for the
implementation and management of the system. He has
authored 81 technical papers and presented at national confer-
ences. Hullavarad can be contacted at sshullavarad@alaska.edu.
Russell O’Hare, Ed.D., CRM, is the chief records officer for
the University of Alaska System where he is responsible for
the university records information compliance program, ap-
proves university retention and disposition schedules, and
oversees the statewide records center, micrographics, and
enterprise content management offices. He can be contacted
at rjohare@alaska.edu.
Ashok Roy, Ph.D., CBA, CIA, is the vice president for finance
& administration / chief financial officer for the University
of Alaska System, as well as associate professor of business
administration. He has authored more than 88 publications
on business topics, including a chapter in two encyclopedias.
He can be contacted at akroy@alaska.edu.
Culture and Community: IG in the Global Arena Page 42
Nancy Dupre Barnes, Ph.D., CRM, CA, holds a Ph.D. in educa-
tional psychology and research from the University of Kansas
and a bachelor of arts degree in political science from the
University of Massachusetts. She has provided records and
information management, data analysis, and research-related
services to organizations in a variety of sectors. Barnes is a
self-employed consultant who can be contacted at ndbarnes@
ymail.com.
Making Sense of Brontobytes Page 46
Judy Vasek Sitton, CRM, is an information governance analyst
for Kinder Morgan in Houston. A Certified Records Manager
for more than 25 years, she has designed, implemented, and
managed record systems for organizations in a variety of
industries. Vasek Sitton co-authored the ARMA-published
book Managing Active Business Records in 2014, has written
several articles for national publications, and is a frequent
speaker for university classes and association meetings.
She earned a bachelor of arts degree from Our Lady of The
Lake University in San Antonio, Texas. Vasek Sitton can be
contacted at jvscrm@yahoo.com.
AUTHORINFOContact Information
AVERSANO DUPRE BARNES GABLE HULLAVARAD KOSCIEJEW O’HARE ROY STARNES VASEK SITTON