NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Adkins, Meredith C.; Lucas, Kathleen C. – Electronic Library, 1986
This checklist provides guidance on how to measure adequacy of control and security of computer systems, identifies areas of risk, raises management and user awareness of their stewardship responsibilities, and reviews issues relative to system documentation, maintenance, integrity, and reliability. (MBR)
Descriptors: Check Lists, Computer Software, Cost Effectiveness, Integrity
Ragan, Stephen W. – 1976
Two systematic ways of analyzing and planning the components of a program or project, both used extensively by industry and government, are discussed in this paper. The methods are Program Evaluation and Review Technique (PERT) Networks and Critical Path Method (CPM) Arrow Diagrams. The purposes of this paper are (1) to explore the need for…
Descriptors: Critical Path Method, Diagrams, Educational Planning, Long Range Planning
Association of Research Libraries, Washington, DC. Office of Management Studies. – 1977
This kit on the systems functions in Association of Research Libraries (ARL) member institutions contains 10 source documents from ARL libraries and a summary of data from a 1976 survey on the organization, staffing, and operation of library systems functions. Source documents include: (1) "Library Systems Office Annual Report, 1974-75"…
Descriptors: Academic Libraries, Annual Reports, Higher Education, Library Surveys