Research Agenda & Proposal Guidelines
The agenda is reviewed regularly, and topics (as well as their order of priority) may be added or removed.
The Research Committee is always open for suggestions of similar topics within the categories to be considered other than those listed below.
Areas of Research Interest
Risk Management and Mitigation
Research projects that examine various information-related risks and ways to manage and mitigate them, including, but not limited to:
i. Risk mitigation/business continuity strategies for records in the private sector.
ii. Managing records in the Business Continuity Plan.
iii. Evaluating the practice of defensible disposition of legacy data.
iv. Developing the business continuity plan with IT as a partner.
v. New risks with COVID records in the future.
vi. Compliance in the workplace: how is it doing with all those e-records?
Litigation Readiness and Discovery
Research projects that address various aspects of litigation readiness, including, but not limited to:
i. Analyzing litigation readiness program elements as practiced by different organizations/industries.
ii. Electronic disaster recovery with no readiness plan.
iii. Predictive coding.
iv. Current trends in implementing and managing legal holds.
Research projects that examine various aspects of privacy and/or information security, including:
- Protecting personally identifiable information with the “right to be forgotten,” comparing global views of privacy to the U.S. perspective
- Examining the Freedom of Information Act (FOIA) and its requirements as they pertain to metadata
- Regulatory updates – US and non-US (including the European Union’s pending GDPR requirements)
Research projects that address the deficiencies in current means of information security, including, but not limited to:
i. Measuring the use of encryption and the extent of its impact on managing information.
ii. Electronic signatures as it gains commonplace use.
iii. Hacking – Implementing a multi-layer security system to prevent intrusion (technology and record creator/holder participation and compliance).
iv. Losing information through security breaches – how to recover and prevent recurrence.
v. Cybersecurity best practices – technology updates, how to prepare, etc.
Research projects that examine popular technology use from the perspective of sharing new insights and pointing out potential risks and benefits and/or what new technology might be on the horizon, including but not limited to:
i. Bitcoin: who has the records?
ii. The capture of business records & information when personal technology is the primary source, capture & storage.
iii. Storage needs for managing business records in the “cloud”.
iv. Defining, working with, and analyzing Big Data-the role of RIM.
v. Achieving returns on AI projects.
vi. Current challenges and implications of managing information created, shared, and used specifically via social media. What records should be retained to respond to product liability lawsuits based on product performance claims made using social media, websites, and other digital display methods?
vii. How to establish and control record retention policies in organizations that have adopted cloud-based enterprise-wide document creation and management programs such as Google Workspace, Microsoft Office 365 and others?
Standards and Best Practices
Research projects that examine the relevant standards and best practices that are developed and used by information governance practitioners, including, but not limited to:
i. US and non-US information governance standards: comparison and implications.
ii. Determining information governance best practice.
iii. Productivity and ROI.
iv. Using standards and other measurements as IG program assessment tools.
AIEF uses the following guidelines to assist with the selection of quality projects. Please keep them in mind as you complete your project proposal form.
- The subject matter must be in alignment with the AIEF Foundation’s mission and goals and the current research agenda.
- The research should promote fresh thinking and new perspectives. It may also focus on new products and tools, but it must be objective, not intended for the promotion of specific products or vendors.
- Address the challenges the information management profession and individual professionals face, particularly when dealing with the impact and implications of information technology.
- Have a realistic timeline, measurable milestones, and the means to achieve these milestones.
- Be relevant to at least two of AIEF’s audiences (listed below).
- Demonstrate unbiased, credible, and ethical research practices.
- Comply with professional ethical standards for data collection, management, and analysis (e.g., not capture e-mail addresses or other personally identifiable information without the express permission of the participants, anonymize the data, etc.).
- Ensure that all research data is maintained in secured and locked areas and, when appropriate, password protect all devices with access to the raw data.
- Ensure that, upon the completion of the project, that the aggregate research data will be made available for media releases, articles, and/or other editorial or promotional purposes.
- Certification Bodies in Information Management
- Compliance Professionals
- Disaster Preparedness/Business Continuity Communities
- Executive Managers
- Government Agencies & Associations
- Heavily Regulated/Litigious Organizations
- Information Governance Professionals
- Information Management Professionals (Established)
- Information Management Professionals (New)
- Information Technology Businesses
- Information Technology Professionals
- Privacy Professionals
- Government Employees
- Risk Professionals
- Security Professionals
Research Proposal Information
AIEF is always interested to consider new topics that might be developed into funded research projects. Even if you do not have the time or interest in fully developing the topic into a research project, please consider submitting your idea. If you have an idea for a topic that you would like to the Research Committee to consider, please contact us.
- You may be contacted to clarify the details about this research topic.
- AIEF reserves the right to fully develop, fund or reject any topic ideas submitted.
- If the topic is developed into a research project, funded, and contracted by AIEF, you may be credited with the topic idea, however, AIEF will retain copyright of the final product.
- A “Call for Researchers” will be posted for all developed topics to procure the most qualified researcher.
AIEF is the owner of the research project and final report for purposes of copyright. Foundation has the sole and exclusive right throughout the universe in all languages and in perpetuity to use and exploit all or any part of the project, and all or any part of any material contained therein or prepared, whether or not used therein, in any format or version, by any means and in any media. Researcher grants, assigns, and transfers to AIEF all rights, title, and interest in the project and Report, and all materials contained therein or prepared therefor. Either the researcher or AIEF may reuse the intellectual property in other forms or for other purposes with appropriate attribution to the Researcher and AIEF. A party may grant permission to the other party to reprint the final report with attribution to the Researcher and AIEF. The attribution is to be worded: “This report first appeared on AIEF website www.armaedfoundation.org, © ARMA International Educational Foundation, and [Researcher’s name]. Reproduced with permission.” For further information or questions, please contact us.