NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Wack, John P.; Carnahan, Lisa J. – 1989
This document contains guidance for managing the threats of computer viruses, Trojan horses, network worms, etc. and related software along with unauthorized use. It is geared towards managers of end-user groups, managers dealing with multi-user systems, personal computers, and networks. The guidance is general and addresses the vulnerabilities…
Descriptors: Computer Networks, Computer Software, Contingency Management, Guidelines
Peer reviewed Peer reviewed
Heady, James; Niewoehner, Melanie – Teaching Exceptional Children, 1979
Academic and behavior management techniques for school and home use with behavior disordered children are described. Among school management techniques identified is the Personal Intervention Paper, a chart on which the student tracks his/her problem behavior and receives a reward for reduction of occurrence. Home management techniques included…
Descriptors: Behavior Change, Behavior Problems, Contingency Management, Elementary Secondary Education