NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Helsing, Cheryl; And Others – 1989
This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes the essential components of an effective information resource protection process that applies to an individual…
Descriptors: Access to Information, Computer System Design, Confidentiality, Decision Making
Helsing, Cheryl; And Others – 1989
The purpose of this guide is to help the policy maker address a series of questions regarding the protection and safety of computer systems and data processed within his/her agency. It introduces information systems security concerns, outlines the management issues that must be addressed by agency policies and programs, and describes the essential…
Descriptors: Access to Information, Confidentiality, Decision Making, Information Management
National Bureau of Standards (DOC), Washington, DC. Inst. for Computer Sciences and Technology. – 1981
These guidelines for communicating effectively the details of computer model design and operation to persons with varying interests in a model recommend the development of four different types of manuals to meet the needs of managers, users, analysts and programmers. The guidelines for preparing a management summary manual suggest a broad spectrum…
Descriptors: Computer Programs, Data Processing, Flow Charts, Guidelines
Nwagbaroacha, Joel O.; And Others – 1975
PPBS is a process by which priorities among the kinds of services a college may provide are weighed, objectives are stated in operational terms, alternative means to accomplish the given objectives are analyzed, and a choice among competing means is made according to criteria for efficient utilization of resources. This manual attempts to…
Descriptors: Administration, Budgets, Evaluation, Guidelines