In a recent article in the Economist the author(s) suggest that the protection of intellectual property/confidential information may be one of the most important drivers in the deployment of ECM . See http://tinyurl.com/4oqyx5o
They also identify some interesting approaches to control access/distribution of information in the electronic age. One such approach is to place false information that no one is authorized to access so if someone tries to get this information it will trigger "alarm bells". On the other hand the article tries to balance the inevitable trade offs between control and creativity.
David B. Gaynon
[log in to unmask]
Huntington Beach CA, USA
List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]