NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Helsing, Cheryl; And Others – 1989
This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes the essential components of an effective information resource protection process that applies to an individual…
Descriptors: Access to Information, Computer System Design, Confidentiality, Decision Making
Peer reviewed Peer reviewed
Levary, Reuven R. – European Journal of Engineering Education, 1986
Discusses the use of simulations to study complex real-life systems in engineering. Describes some of the limitations of using simulations. Identifies some situations in which computer simulations are practical and useful tools for the design, analysis, and evaluation of systems. (TW)
Descriptors: College Science, Computer Assisted Instruction, Computer Simulation, Computer Uses in Education