These are the sources and citations used to research IDMA 2023-2028. This bibliography was generated on Cite This For Me on
In-text: (DAMA-DMBOK, 2017)
Your Bibliography: 2017. DAMA-DMBOK. Basking Ridge, N.J.: Technics Publications.
In-text: (Aaser and McElhaney, 2021)
Your Bibliography: Aaser, M. and McElhaney, D., 2021. Harnessing the power of external data. [online] mckinsey.com. Available at: <https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/harnessing-the-power-of-external-data> [Accessed 10 October 2022].
In-text: (Broeders and Prenio, 2018)
Your Bibliography: Broeders, D. and Prenio, J., 2018. Innovative technology in financial supervision (suptech) - the experience of early users. FSI Insights, [online] Available at: <https://www.bis.org/fsi/publ/insights9.htm> [Accessed 26 September 2022].
In-text: (Insider Threat Mitigation | CISA, 2022)
Your Bibliography: Cisa.gov. 2022. Insider Threat Mitigation | CISA. [online] Available at: <https://www.cisa.gov/insider-threat-mitigation> [Accessed 5 September 2022].
In-text: (Understanding Denial-of-Service Attacks | CISA, 2022)
Your Bibliography: Cisa.gov. 2022. Understanding Denial-of-Service Attacks | CISA. [online] Available at: <https://www.cisa.gov/uscert/ncas/tips/ST04-015> [Accessed 8 October 2022].
In-text: (Cote, 2021)
Your Bibliography: Cote, C., 2021. 5 Principles of Data Ethics for Business. [online] Business Insights Blog. Available at: <https://online.hbs.edu/blog/post/data-ethics> [Accessed 3 September 2022].
In-text: (Dodds, 2022)
Your Bibliography: Dodds, L., 2022. What is a data portal?. [online] Lost Boy. Available at: <https://blog.ldodds.com/2015/10/13/what-is-a-data-portal/> [Accessed 14 October 2022].
In-text: (Data Protection Officer (DPO), 2022)
Your Bibliography: EUROPEAN DATA PROTECTION SUPERVISOR. 2022. Data Protection Officer (DPO). [online] Available at: <https://edps.europa.eu/data-protection/data-protection/reference-library/data-protection-officer-dpo> [Accessed 31 August 2022].
In-text: (LaBerge, O’Toole, Schneider and Smaje, 2022)
Your Bibliography: LaBerge, L., O’Toole, C., Schneider, J. and Smaje, K., 2022. How COVID-19 has pushed companies over the technology tipping point—and transformed business forever. [online] McKinsey & Company. Available at: <https://www.mckinsey.com/business-functions/strategy-and-corporate-finance/our-insights/how-covid-19-has-pushed-companies-over-the-technology-tipping-point-and-transformed-business-forever> [Accessed 10 August 2022].
In-text: (Qualifications for DPOs | Data Protection Commission, 2022)
Your Bibliography: Qualifications for DPOs | Data Protection Commission. 2022. Qualifications for DPOs | Data Protection Commission. [online] Available at: <https://www.dataprotection.ie/en/dpos/qualifications-dpos> [Accessed 30 August 2022].
In-text: (A Step-by-step Framework to Building a Data Literacy Program, 2022)
Your Bibliography: Sigmacomputing.com. 2022. A Step-by-step Framework to Building a Data Literacy Program. [online] Available at: <https://www.sigmacomputing.com/blog/how-to-build-a-data-literacy-program-a-step-by-step-framework-for-data-and-business-leaders/> [Accessed 7 October 2022].
In-text: (Data Use and Literacy Program, 2022)
Your Bibliography: The World Bank. 2022. Data Use and Literacy Program. [online] Available at: <https://www.worldbank.org/en/programs/data-use-and-literacy-program/overview> [Accessed 7 October 2022].
In-text: (Unterluggauer, Werner and Mangard, 2018)
Your Bibliography: Unterluggauer, T., Werner, M. and Mangard, S., 2018. MEAS: memory encryption and authentication secure against side-channel attacks. Journal of Cryptographic Engineering, 9(2), pp.137-158.
In-text: (Zhang, 2022)
Your Bibliography: Zhang, R., 2022. The Importance Of Memory Encryption For Protecting Data In Use. [online] Semiconductor Engineering. Available at: <https://semiengineering.com/the-importance-of-memory-encryption-for-protecting-data-in-use/> [Accessed 3 September 2022].
10,587 students joined last month!