Descriptor
Computer Software | 5 |
Microcomputers | 3 |
Check Lists | 2 |
Guidelines | 2 |
Library Automation | 2 |
Academic Libraries | 1 |
Classrooms | 1 |
Computer Networks | 1 |
Computer Software Evaluation | 1 |
Contingency Management | 1 |
Copyrights | 1 |
More ▼ |
Author
Adkins, Meredith C. | 1 |
Carnahan, Lisa J. | 1 |
Johnson, Millard F., Jr. | 1 |
Lucas, Kathleen C. | 1 |
Reed, Mary Hutchings | 1 |
Stanek, Debra | 1 |
Wack, John P. | 1 |
White, Charles S. | 1 |
Publication Type
Guides - General | 6 |
Journal Articles | 3 |
Tests/Questionnaires | 2 |
Book/Product Reviews | 1 |
Legal/Legislative/Regulatory… | 1 |
Reports - Research | 1 |
Education Level
Audience
Administrators | 6 |
Practitioners | 6 |
Media Staff | 3 |
Teachers | 1 |
Location
Laws, Policies, & Programs
Copyright Law 1976 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
White, Charles S. – 1987
In formulating a practical guide for evaluators of social studies courseware, the fundamental elements of the "Evaluator's Guide to Microcomputer-Based Instructional Packages," (MicroSIFT, 1982) were combined with an abbreviated version of the National Council for the Social Studies (NCSS) adopted curriculum-specific guidelines. The categories…
Descriptors: Computer Software, Courseware, Evaluation, Evaluation Criteria
Wack, John P.; Carnahan, Lisa J. – 1989
This document contains guidance for managing the threats of computer viruses, Trojan horses, network worms, etc. and related software along with unauthorized use. It is geared towards managers of end-user groups, managers dealing with multi-user systems, personal computers, and networks. The guidance is general and addresses the vulnerabilities…
Descriptors: Computer Networks, Computer Software, Contingency Management, Guidelines

Adkins, Meredith C.; Lucas, Kathleen C. – Electronic Library, 1986
This checklist provides guidance on how to measure adequacy of control and security of computer systems, identifies areas of risk, raises management and user awareness of their stewardship responsibilities, and reviews issues relative to system documentation, maintenance, integrity, and reliability. (MBR)
Descriptors: Check Lists, Computer Software, Cost Effectiveness, Integrity

Johnson, Millard F., Jr. – Library Software Review, 1987
Suggests a model for using a spreadsheet to allocate academic library salary increases. Seven variables are incorporated in the model: (1) experience; (2) difficulty of the job; (3) initiative; (4) cost of living; (5) inflation; (6) equity; and (7) merit. One reference is listed. (MES)
Descriptors: Academic Libraries, Computer Software, Higher Education, Library Administration
Reed, Mary Hutchings; Stanek, Debra – Information Reports and Bibliographies, 1986
Guidelines for the fair use of videotapes and computer software in library and classroom situations under the Copyright Revision Act of 1976 cover the areas of reproduction, adaptation, distribution, public performance, and display. Several hypothetical situations are presented to explain the legal responsibility of the library. (CLB)
Descriptors: Classrooms, Computer Software, Copyrights, Elementary Secondary Education
Wisconsin State Dept. of Public Instruction, Madison. – 1991
Highlighting the issues that confront small libraries who are exploring automation options, this report focuses on microcomputer-based automation systems for circulation and an online patron access catalog (OPAC). The information provided outlines some of the questions that librarians must ask themselves or vendors before they select a specific…
Descriptors: Check Lists, Computer Software Evaluation, Costs, Database Management Systems