NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Family Educational Rights and…1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 16 to 19 of 19 results Save | Export
Pickett, A. Dean; Thomas, Christopher – National Association of Secondary School Principals (NASSP), 2005
Thirty to forty years ago educators had at most the challenge of tape recorders and players and transistor radios to confront as electronic distractions in the classroom. Then pagers were introduced and became associated with drug trafficking and gang activity. Not long after, the first cellular phones were introduced and, when they became…
Descriptors: Influence of Technology, Mass Media Effects, Mass Media Use, Information Policy
O'Neil, Robert M. – Association of Governing Boards of Universities and Colleges, 2005
Faculty handbooks are as essential as they are likely to be overlooked, and they serve an invaluable purpose in the lives of most colleges and universities (if only occasionally). A conscientious trustee should know certain basic attributes of such publications. This article presents a list of ten important things to keep in mind about faculty…
Descriptors: Trustees, Faculty Handbooks, Institutional Mission, Courts
Baule, Steven M. – 1997
Planning for the instructional use of technology within a modern and progressive school system is extremely complex because of the speed at which technology is advancing. The identification of strategic goals and objectives and an evolving rough map of how to achieve those goals has replaced the traditional strategic planning process. This book…
Descriptors: Computer Uses in Education, Cooperative Planning, Educational Cooperation, Educational Finance
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software
« Previous Page | Next Page
Pages: 1  |  2