Descriptor
Source
Publication Type
Guides - Non-Classroom | 2 |
Books | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Audience
Administrators | 4 |
Media Staff | 4 |
Practitioners | 4 |
Teachers | 3 |
Location
Canada | 3 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Picciano, Anthony G. – 2002
The purpose of this book is to provide educators with both the theoretical and the practical considerations for planning and implementing technology, particularly computer applications, in schools. Section I provides the basic concepts and foundation material for an overall understanding of the themes and major issues related to planning for…
Descriptors: Computer Uses in Education, Distance Education, Educational Administration, Educational Planning
Harley, Dwight; Wendel, Terry – 1999
This study presents preliminary information about how Alberta school jurisdictions are currently providing technical support to schools and administrative offices. The focus of the study is on costs, planning and management practices, and key issues. Six "case study" jurisdictions were examined in depth, and a questionnaire was used to…
Descriptors: Access to Computers, Case Studies, Computer Uses in Education, Educational Administration
Adamyk, Linda; Dach, Edna – 1999
To successfully create a Web site, schools and jurisdictions must plan for the site's content, design and development and learn the principles of effective page design. This report contains technical advice on implementing and managing Web site development in schools. Following an introduction which discusses functions of jurisdiction and school…
Descriptors: Access to Computers, Computer System Design, Computer Uses in Education, Copyrights
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software