NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Wack, John P.; Carnahan, Lisa J. – 1989
This document contains guidance for managing the threats of computer viruses, Trojan horses, network worms, etc. and related software along with unauthorized use. It is geared towards managers of end-user groups, managers dealing with multi-user systems, personal computers, and networks. The guidance is general and addresses the vulnerabilities…
Descriptors: Computer Networks, Computer Software, Contingency Management, Guidelines
Peer reviewed Peer reviewed
Pinsker, Mark; And Others – NASSP Bulletin, 1985
Describes an alternative program for ninth-graders "having adjustment problems." The voluntary program includes simple and consistent classroom rules, frequent graded assignments, and a focus on relevance to students' life experiences; students are encouraged to do schoolwork through a system of group rewards. (MCG)
Descriptors: Behavior Standards, Contingency Management, Grade 9, Group Guidance
Peer reviewed Peer reviewed
Hess, Albert M.; And Others – Remedial and Special Education (RASE), 1990
Contingency contracting and group counseling were provided to 26 mildly to moderately handicapped middle school students with high rates of truancy. Subjects exhibited attendance gains after treatment; gains were not maintained at followup but attendance rates were still higher than the rates of control students. Measures of academic performance…
Descriptors: Academic Achievement, Attendance, Attendance Patterns, Contingency Management