NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
Genaway, David C. – Electronic Library, 1986
Proposes a resource analysis model to help library managers acquire most appropriate integrated online library system. The model examines human, equipment, and fiscal resources of acquiring library and supplying vendor, complementing respective strengths and weaknesses of each. A resource checklist is provided to narrow range of choices to single…
Descriptors: Check Lists, Decision Making, Equipment, Fiscal Capacity
Walton, Bob – 1984
Designed to provide managers with a basic introduction to the planning components and procedures involved in planning for library automation, the overview provided here offers guidelines for eight documents that may be produced as part of such a study: (1) Automation Project Long Range Plan (60 Month Plan), an executive summary document providing…
Descriptors: Budgeting, Check Lists, Costs, Guidelines
Hodges, Gerald G. – 1982
Aimed at consultants and those responsible for the development of school library media programs, this paper outlines the functions of school library media personnel, with emphasis on their instructional role and their role as agents of societal change. A discussion of entry-level competencies which should be required for school library media…
Descriptors: Change Agents, Check Lists, Competence, Consultants
Cloonan, Michele – 1993
This resource guide considers issues in the staffing and organization of preservation activities. It provides guidance in implementing a systematic preservation program and evaluates the structures of various types of preservation programs. The following articles complement the discussion of program models and implementation: (1)…
Descriptors: Academic Libraries, Check Lists, Cost Effectiveness, Higher Education
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software