Descriptor
Author
Buckland, Michael K. | 1 |
Elshami, Ahmed M. | 1 |
Freeman, Grey | 1 |
Graczyk, Sandra L. | 1 |
Lynch, Clifford A. | 1 |
York, Jerry | 1 |
Publication Type
Guides - Non-Classroom | 3 |
Speeches/Meeting Papers | 3 |
Journal Articles | 2 |
Opinion Papers | 2 |
Reports - Descriptive | 2 |
Books | 1 |
Legal/Legislative/Regulatory… | 1 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Audience
Administrators | 9 |
Practitioners | 9 |
Media Staff | 3 |
Teachers | 3 |
Policymakers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Freeman, Grey; York, Jerry – CAUSE/EFFECT, 1991
This article discusses the emergence of the client/server paradigm for the delivery of computer applications, its emergence in response to the proliferation of microcomputers and local area networks, the applicability of the model in academic institutions, and its implications for college campus information technology organizations. (Author/DB)
Descriptors: Computer Networks, Delivery Systems, Higher Education, Information Management
CAUSE, Boulder, CO. – 1991
Seven papers from the 1990 CAUSE conference's Track IV, Policy and Standards are presented. Topics addressed in this track include data administration, computing access, involvement of constituencies in policy making and enforcement, and institutional standards for departmental systems. Papers and their authors are as follows: "Evolution of a…
Descriptors: Case Studies, College Administration, Computer Networks, Documentation

Buckland, Michael K.; Lynch, Clifford A. – Information Technology and Libraries, 1987
Describes the Linked Systems Protocol, a draft national standard for bibliographic information retrieval aimed at developing an extended protocol for the movement of bibliographic information from one system to another, and its implications for library automation, the individual librarian, and the library user. (CLB)
Descriptors: Access to Information, Bibliographic Utilities, Cataloging, Computer Networks
CAUSE, Boulder, CO. – 1991
Six papers from the 1990 CAUSE conference's Track II, Challenges and Opportunities of Information Technology in the 90s are presented. The papers focus on daily funding and accountability problems, the related management of growth, and funding relationships in higher education. Papers and their authors are as follows: "Achieving Excellence in…
Descriptors: Administrators, Budgeting, Case Studies, Change Agents
Elshami, Ahmed M. – 1996
In an era when patrons want access to CD-ROM resources but few libraries can afford to buy multiple copies, CD-ROM local area networks (LANs) are emerging as a cost-effective way to provide shared access. To help librarians make informed decisions, this manual offers information on: (1) the basics of LANs, a "local area network primer";…
Descriptors: Access to Information, Computer Networks, Decision Making, Disk Drives

Texas Education Agency, Austin. – 1992
This handbook for educators and officials in Texas school districts provides guidelines for planning, implementing, and evaluating technology use in order to improve student achievement. Intended for use in districts that are planning locally appropriate strategies, the handbook is divided into seven major sections: (1) Introduction (purpose, the…
Descriptors: Advisory Committees, Check Lists, Computer Networks, Computer Uses in Education
Graczyk, Sandra L. – 1987
Based on a doctoral dissertation that involved a study of the nation's 100 most successful school computer systems, this report summarizes the study's purpose, scope, methodology, resultant model, general observations, and future implications. The model is divided into two major sections: (1) strategic planning activities, focusing on computer…
Descriptors: Computer Networks, Computer Oriented Programs, Computer Uses in Education, Criteria
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software
Missouri State Dept. of Elementary and Secondary Education, Jefferson City. Div. of Vocational and Adult Education. – 2000
Each year, the Policies Commission for Business and Economic Education develops statements regarding business education. The following are among the commission's guidelines regarding planning the business education curriculum for the new century: (1) making business education an integral and equal partner within schools' educational communities…
Descriptors: Accounting, Articulation (Education), Business Administration, Business Communication