NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 12 results Save | Export
Barrera-Gomez, Julianna; Erway, Ricky – OCLC Online Computer Library Center, Inc., 2013
This document is a companion to the report, "You've Got to Walk before You Can Run: First Steps for Managing Born-Digital Content Received on Physical Media." Like the "First Steps" report, the intended audience is those who are just starting to manage born-digital materials, from those wondering where to begin, to those who…
Descriptors: Archives, Electronic Publishing, Documentation, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
National Forum on Education Statistics, 2011
This document, "Book Three of Four: Effectively Managing LDS Data," is the third installment of this Forum series of guides on longitudinal data systems (LDS). This third book in the guide series discusses organizational issues aimed at moving the project forward and ensuring that the data are of high quality so that users may leverage…
Descriptors: Information Systems, Information Management, Data, Organization
Consortium for School Networking (NJ1), 2011
Web 2.0 applications and mobile Internet devices have added new issues to the safety/access situation for schools. The purpose of this guide is to assist school districts in developing, rethinking, or revising Internet policies as a consequence of the emergence of Web 2.0, and the growing pervasiveness of smart phone use. The Consortium for School…
Descriptors: Safety, Laws, School Districts, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Adler, M. Peter – EDUCAUSE Review, 2006
The increased number of government-mandated and private contractual information security requirements in recent years has caused higher education security professionals to view information security as another aspect of regulatory or contractual compliance. The existence of fines, penalties, or loss (including bad publicity) has also increased the…
Descriptors: Higher Education, Publicity, Computer Security, Colleges
National Forum on Education Statistics (ED/OERI), Washington, DC. – 2003
The purpose of this guidebook is to assist education agencies and organizations--which include state education agencies or state departments of education, school districts, and schools--in the development, maintenance, and standardization of effective Web sites. Also included is a detailed examination of the procedures necessary to provide…
Descriptors: Agencies, Computer Security, Computer Uses in Education, Educational Administration
Bailey, Gerald D. – Learning & Leading with Technology, 1997
School administrators consider themselves technology leaders, but few would claim they know all there is to know. This article examines 10 concepts for technology integration in 21st-century schools: change, technology planning, ethics, teaching and learning, safety and security, curriculum, staff development, infrastructure, technical support,…
Descriptors: Administrators, Change, Computer Security, Curriculum
College Planning & Management, 1999
Presents administrator's views on possible trends in college and universities. Addresses: hazardous waste disposal; privatization of custodial services; libraries and technology; building product purchases based on life-cycle cost; continuing education for employees; armed campus security; fees and tuition collection via online transactions; and…
Descriptors: Colleges, Computer Security, Hazardous Materials, Higher Education
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Karpisek, Marian; And Others – Media & Methods, 1995
Presents five articles and a company resource directory to help librarians successfully incorporate technology into school libraries. Discusses actual situations, examines student needs, and gives advice to help librarians with library automation systems, videodiscs, library security systems, media retrieval, networking CD-ROMs, and locating…
Descriptors: Computer Networks, Computer Security, Educational Media, Elementary Secondary Education
Daly, Kevin F. – Computing Teacher, 1994
This second in a series of articles on planning for instructional computer networks focuses on site preparation, installation, service, and support. Highlights include an implementation schedule; classroom and computer lab layouts; electrical power needs; workstations; network cable; telephones; furniture; climate control; and security. (LRW)
Descriptors: Classroom Design, Classroom Furniture, Climate Control, Computer Assisted Instruction
Alberta Dept. of Education, Edmonton. – 1999
The information in this document is based on a study that Alberta Education commissioned on establishing technology systems that are responsive to the requirements of Alberta's Freedom of Information and Protection of Privacy Act (FOIPP). This document provides an overview of key issues and suggested strategies in the following areas: (1)…
Descriptors: Access to Information, Computer Security, Computer Uses in Education, Educational Administration
Gillis, R. Peter; Whitemarsh, Judith – 1999
This study provides suggestions and best practices for superintendents, Freedom of Information and Protection of Privacy (FOIPP) coordinators and school information technologists in dealing with the impact of Alberta's FOIPP Act on the application of information technologies within their organizations. The study explores the relationship between…
Descriptors: Access to Information, Check Lists, Computer Security, Computer Uses in Education