Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 1 - 10 of 19 Results

Sort by:

Protecting the Security of Research Data
November 8, 2011

The effective protection and management of research data has become a hot topic in U.S. higher education. Funding agencies increasingly require data management plans as part of grant submittals…

Identity Management in Higher Education, 2011—Key Findings
June 1, 2011

This document presents the key findings from Identity Management in Higher Education, 2011. This ECAR research study illuminates findings from the 2010 survey of identity management (IdM) …

Identity Management in Higher Education, 2011—Slide Presentation
June 1, 2011

This slide presentation illuminates findings from the ECAR 2011 research of identity management (IdM) practices in higher education . This slide deck can be adapted for presentations within…

Identity Management in Higher Education, 2011—Roadmap
June 1, 2011

This ECAR roadmap synthesizes the important issues and recommended actions drawn from the study Identity Management in Higher Education, 2011 , by Mark C. Sheehan and Cedric Bennett, with…

Who Should Get In?
June 1, 2011

Back to ECAR 2011 Identity Management Research Hub This chart reflects findings from the ECAR 2011 research of identity management (…

Identity Management in Higher Education, 2011 Report
June 1, 2011

Key Findings Higher education has made substantial progress in the last five years, but many institutions are still struggling to deliver the full benefits of IdM. Institutions that report the…

Collective Wisdom on E-Mail Outsourcing
November 17, 2009

This ECAR research bulletin covers experiences and lessons learned from 10 IT leaders who have transitioned their institutions to an outsourced e-mail solution. It provides data from the 2009 EC…

Privacy and Confidentiality: Holding IT Service Providers Accountable
November 3, 2009

This ECAR research bulletin addresses the data privacy issues that must be covered by contractual language when entering into an agreement for externally provided IT services or for external con…

Information Confidentiality
March 11, 2009

Protecting information confidentiality is a critical security objective for all colleges and universities. Institutions must deploy confidentiality controls in addition to security controls, and…

Information Security Governance: Standardizing the Practice of Information Security
August 19, 2008

This ECAR research bulletin discusses the trend to use a variety of risk assessment frameworks and standards to create an information security program that is sufficiently comprehensive for colle…

Close
Close


EDUCAUSE Connect
View dates and locations

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

EDUCAUSE Institute
Leadership/Management Programs
Explore More

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2014 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.