Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 1 - 10 of 12 Results

Sort by:

What Does BYOE Mean for IT?: IT Leader Roundtable
May 15, 2013

The bring-your-own-everything (BYOE) phenomenon continues to gain momentum as more students, faculty, and staff use personal devices and services on campus. The person who previously brou…

From Homegrown to the Cloud: Identity Management Evolution at Coppin State University
June 1, 2011

This ECAR case study offers an introductory, not highly technical, look at a SaaS identity management (IdM) solution in higher education . It traces Coppin State University’s evolution fr…

Federating The University of North Carolina: Origins and Benefits
June 1, 2011

This ECAR case study of the University of North Carolina Identity Federation explores the benefits and impacts of federated identity on the university and its 17 constituent institutions . Fe…

Identity Management in Higher Education, 2011 Report
June 1, 2011

Key Findings Higher education has made substantial progress in the last five years, but many institutions are still struggling to deliver the full benefits of IdM. Institutions that report the…

Revitalizing Data Stewardship through Risk Reduction: Managing Sensitive Data at the University of Virginia
December 1, 2009

The 2009 ECAR study Institutional Data Management in Higher Education , by Ronald Yanosky, examines how higher education institutions are facing the challenges of institutional data management…

Most Improved: How Four Institutions Developed Successful IT Security Programs
November 3, 2006

Researchers conducted this in-depth case study to complement the ECAR study, Safeguarding the Tower: IT Security in Higher Education 2006. The case study examines how four higher education instit…

The Virginia Alliance for Secure Computing and Networking (VA SCAN): A Statewide Collaborative IT Security Resource
October 17, 2006

This case study examines ways in which the Virginia Alliance for Secure Computing and Networking (VA SCAN) provides a blueprint for higher education institutions interested in collaboratively pro…

Baylor University's IT Security Risk Assessment Program
October 12, 2006

This case study examines Baylor University's risk assessment program for information technology security, which was established in the face of the escalating demands that security places on …

Incident Response: Lessons Learned from Georgia Tech, the University of Montana, and the University of Texas at Austin
October 13, 2003

This case study is a companion to the 2003 ECAR research study "Information Technology Security: Governance and Strategy in Higher Education." This study examines how information techno…

Information Technology Security at Indiana University
October 13, 2003

This case study is a companion to the 2003 ECAR research study "Information Technology Security: Governance and Strategy in Higher Education." This study examines how information techno…