Descriptor
Microcomputers | 7 |
Systems Analysis | 7 |
Computer Software | 3 |
Public Agencies | 3 |
Access to Information | 2 |
Check Lists | 2 |
Confidentiality | 2 |
Databases | 2 |
Decision Making | 2 |
Guidelines | 2 |
Information Management | 2 |
More ▼ |
Source
Database | 1 |
Electronic Library | 1 |
Author
Helsing, Cheryl | 2 |
Adkins, Meredith C. | 1 |
Barkley, John | 1 |
Blair, John C., Jr. | 1 |
Lucas, Kathleen C. | 1 |
Tucker, Susan | 1 |
Publication Type
Guides - General | 7 |
Journal Articles | 2 |
Opinion Papers | 2 |
ERIC Publications | 1 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Adkins, Meredith C.; Lucas, Kathleen C. – Electronic Library, 1986
This checklist provides guidance on how to measure adequacy of control and security of computer systems, identifies areas of risk, raises management and user awareness of their stewardship responsibilities, and reviews issues relative to system documentation, maintenance, integrity, and reliability. (MBR)
Descriptors: Check Lists, Computer Software, Cost Effectiveness, Integrity
Blair, John C., Jr. – Database, 1982
Outlines the important factors to be considered in selecting a database management system for use with a microcomputer and presents a series of guidelines for developing a database. General procedures, report generation, data manipulation, information storage, word processing, data entry, database indexes, and relational databases are among the…
Descriptors: Computer Programs, Data Processing, Databases, Guidelines
Barkley, John; And Others – 1984
Intended to provide assistance to non-technical end-users in evaluating the applicability of microcomputer-based systems to their needs and in choosing appropriate systems, this document recommends first identifying requirements and then identifying and evaluating alternative sources for application software, system software and hardware, and…
Descriptors: Computer Software, Evaluation Methods, Information Networks, Microcomputers
Tucker, Susan – 1986
This digest discusses several aspects of electronic networking, including network functions, implementation, and applications in education. Electronic networking is defined as including the four basic services of electronic mail (E-mail), electronic "bulletin boards," teleconferencing, and online databases, and an overview of these four…
Descriptors: Check Lists, Computer Software, Computer Uses in Education, Databases
General Services Administration, Washington, DC. – 1983
This report presents an initial approach developed by the General Services Administration for the management of end user computing in federal government agencies. Defined as technology used directly by individuals in need of information products, end user computing represents a new field encompassing such technologies as word processing, personal…
Descriptors: Administration, Administrator Role, Administrators, Change Strategies
Helsing, Cheryl; And Others – 1989
This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes the essential components of an effective information resource protection process that applies to an individual…
Descriptors: Access to Information, Computer System Design, Confidentiality, Decision Making
Helsing, Cheryl; And Others – 1989
The purpose of this guide is to help the policy maker address a series of questions regarding the protection and safety of computer systems and data processed within his/her agency. It introduces information systems security concerns, outlines the management issues that must be addressed by agency policies and programs, and describes the essential…
Descriptors: Access to Information, Confidentiality, Decision Making, Information Management