Descriptor
Computer Networks | 3 |
Program Implementation | 3 |
Computer Uses in Education | 2 |
Case Studies | 1 |
Check Lists | 1 |
College Libraries | 1 |
Computer Security | 1 |
Computer Software | 1 |
Costs | 1 |
Curriculum Enrichment | 1 |
Databases | 1 |
More ▼ |
Author
Heller, Norma | 1 |
Moran, Barbara B. | 1 |
Publication Type
Books | 1 |
Guides - Classroom - Teacher | 1 |
Journal Articles | 1 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Audience
Media Staff | 3 |
Practitioners | 3 |
Administrators | 1 |
Teachers | 1 |
Location
Canada | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Heller, Norma – 1994
This book offers school librarians, media specialists, classroom teachers, computer coordinators, and others involved with educational technology step-by-step procedures for planning and implementing technologies into both library and curricula. The interdisciplinary projects use print sources, as well as CD-ROMs, online databases,…
Descriptors: Computer Networks, Curriculum Enrichment, Databases, Educational Technology

Moran, Barbara B.; And Others – College and Research Libraries, 1987
Describes the Scholar's Workstation project, a campuswide computerization project at Brown University, and assesses its effects on the role and operation of the institution's libraries. Suggestions are provided for other libraries whose institutions are exploring the possibility of a similar venture. (CLB)
Descriptors: Case Studies, College Libraries, Computer Networks, Computer Uses in Education
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software