NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Keeling, Mary – Knowledge Quest, 2009
Students learn best from well-designed instruction. To what extent can a school district design a curriculum that supports inquiry learning? How can a district implement consistent inquiry practices in forty schools? In this article, the author discusses Newport News Public School District's journey to inquiry which began in 2004 with a…
Descriptors: School Districts, Reading Instruction, Inquiry, Librarians
Peer reviewed Peer reviewed
Direct linkDirect link
Calkins, Kaijsa J. – Public Services Quarterly, 2007
The recent literature on college and university library instruction largely focuses on undergraduate and, more specifically, first-year students. During a review, the author found that discussion of graduate students in library and information science literature is dominated by studies of information behavior and much less often on instruction…
Descriptors: Information Science Education, Graduate Students, Library Instruction, Academic Libraries
Peer reviewed Peer reviewed
Direct linkDirect link
Goebel, Nancy; Neff, Paul; Mandeville, Angie – Public Services Quarterly, 2007
Augustana (located in Camrose, Alberta, Canada, and formerly known as Augustana University College) is an undergraduate liberal arts and sciences faculty of the University of Alberta with an enrollment of approximately 1,100 students. The fall of 2001 marked the inception of for-credit discipline-specific information literacy (IL) course offerings…
Descriptors: Foreign Countries, Information Literacy, Instructional Development, Curriculum Implementation
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software