16221.png

References

 

Aiken, P. H. (1996). Data Reverse Engineering: Slaying the Legacy Dragon. New York, McGraw-Hill. Aiken, P. H., et al. (2007). “Measuring Data Management Pratice Maturity: A Community’s Self-Assessment.” IEEE Computer 40(4): 8.

Aiken, P. H., et al. (2010). “Use of the IEEE Codes of Conduct to Resolve Legal Disputes.” IEEE Computer 43(4): 5.

Aiken, P. H., et al. (2011). “Data Management and Data Administration: Assessing 25 Years of Practice.” Journal of Database Management 22(3): 20.

Aiken, P. H. and M. Gorman (2013). The Case for the Chief Data Officer: Recasting the C-Suite to Leverage Your Most Valuable Asset. San Francisco, Morgan Kaufmann.

Aiken, P. H., et al. (1994). “DoD Legacy Systems: Reverse Engineering Data Requirements.” Communications of the ACM 37(5): 15.

Aiken, P. H., et al. (1999). “Reverse Engineering New Systems for Smooth Implementation.” IEEE Software 16(2): 36-43.

Appleton, D. (1986). Information Asset Management. Datamation. Newton, MA, Cahners Publishing Company 32: 6.

Billings, J., et al. (1999). The BRIDGE: A Toolkit Approach to Reverse Engineering System Metadata in Support of Migration to Enterprise Software. Advances in Conceptual Modeling ER’99 Workshop on Reverse Engineering in Information Systems, Paris, France, Springer-Verlag, Berlin.

DAMA-International (2009). The Guide to the Data Management Body of Knowledge, Technics Publications, LLC.

Nugee, R. and R. S. Seiner (2010, 6/1/2010). “TDAN.com Interview with Brigadier Richard Nugee – The British Army.” 2013, from http://www.tdan.com/view-special-features/13897 and personal communications.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset