NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Craig, Scotty D. – Advanced Distributed Learning Initiative, 2021
The dynamic and high-stakes nature of education and training requires reliance on evidence-based practices and policies to make decisions about technology adoption and implementation. In the report, "Science of Learning and Readiness (SoLaR) Recommendation Report: Science of Learning Practices for Distributed Online Environments"…
Descriptors: Science Education, Learning Readiness, Evidence Based Practice, Check Lists
Peer reviewed Peer reviewed
Direct linkDirect link
Hughes, Joy R.; Beer, Robert – EDUCAUSE Quarterly, 2007
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
Descriptors: Check Lists, Higher Education, Certification, Guidance
Hassler, Ardoth; Neuman, Michael – CAUSE/EFFECT, 1996
Discusses the advantages and disadvantages of outsourcing remote access to campus computer networks and the Internet, focusing on improved service, cost-sharing, partnerships with vendors, supported protocols, bandwidth, scope of access, implementation, support, network security, and pricing. Includes a checklist for a request for proposals on…
Descriptors: Check Lists, Computer Networks, Higher Education, Internet
Agee, Kelly, Ed. – Research and Curriculum Unit, 2009
Secondary vocational-technical education programs in Mississippi are faced with many challenges resulting from sweeping educational reforms at the national and state levels. Schools and teachers are increasingly being held accountable for providing true learning activities to every student in the classroom. This accountability is measured through…
Descriptors: Information Technology, Educational Technology, Teaching Methods, Computer Science Education
Dark, Melissa; Poftak, Amy – Technology & Learning, 2004
In this article, the authors address the importance of taking a proactive approach to securing a school's network. To do this, it is first required to know the system's specific vulnerabilities and what steps to take to reduce them. The formal process for doing this is known as an information security risk assessment, or a security audit. What…
Descriptors: Computer Security, School Districts, Risk Management, Computer Networks
Peer reviewed Peer reviewed
Price, John A. – Journal of Research on Computing in Education, 1987
Discusses microcomputer systems and networks and presents some economic considerations for their use in education. Highlights include the design of computer assisted instruction (CAI); the development of appropriate software; organization of lesson material; authoring systems and languages; and a checklist for designing or installing a CAI system.…
Descriptors: Authoring Aids (Programing), Check Lists, Computer Assisted Instruction, Computer Networks
PDF pending restoration PDF pending restoration
Texas Education Agency, Austin. – 1992
This handbook for educators and officials in Texas school districts provides guidelines for planning, implementing, and evaluating technology use in order to improve student achievement. Intended for use in districts that are planning locally appropriate strategies, the handbook is divided into seven major sections: (1) Introduction (purpose, the…
Descriptors: Advisory Committees, Check Lists, Computer Networks, Computer Uses in Education
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software