Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Author
Backman, Char, Ed. | 1 |
Levinson, Michael | 1 |
Nixon, Andrea | 1 |
Small, LaVeta, Ed. | 1 |
Stang, David J. | 1 |
Stringfield, Sam | 1 |
Wayman, Jeffrey C. | 1 |
Webster, Sally | 1 |
Yakimowski, Mary | 1 |
Publication Type
Opinion Papers | 5 |
Journal Articles | 3 |
Collected Works - Serials | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Practitioners | 1 |
Location
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Stang, David J.; Levinson, Michael – Media and Methods, 1984
Describes ways of using spreadsheets to maintain gradebooks, including use of weighted scores to calculate a student's running average and potential for use in preparing report cards. Several spreadsheet programs currently available are reviewed, and their advantages and disadvantages for educators are indicated. (MBR)
Descriptors: Administrators, Computer Oriented Programs, Computer Software, Grading
Webster, Sally – CAUSE/EFFECT, 1989
The 1989 computer "worm" resulted in some needed attention to computer security. Academic computing has the goal of integrating computing into the fabric of teaching, learning, and research, and must be relatively open. Ways to raise awareness of ethical and social issues are described. (MLW)
Descriptors: Computer Software, Confidential Records, Ethics, Higher Education
Wayman, Jeffrey C.; Stringfield, Sam; Yakimowski, Mary – Center for Research on the Education of Students Placed at Risk (CRESPAR), Johns Hopkins University, 2004
The No Child Left Behind legislation has drawn increased attention to student data. Data are most useful in educational decision-making when the purpose extends beyond vertical accountability and toward school- and classroom-level decision-making that enhances the experience and achievement of students. This necessarily involves getting practical…
Descriptors: Computer Uses in Education, Computer Software, Data Analysis, Information Management
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers
Backman, Char, Ed.; Small, LaVeta, Ed. – Carolina View, 1985
Ways to promote student development and the undergraduate student experience are considered in a collection of 13 articles. Research findings and innovative approaches to college administration and advancement are also addressed. Article titles and authors are as follows: "Gaining International Understanding" (James B. Holderman);…
Descriptors: Ancillary School Services, Black Students, College Administration, Computer Oriented Programs