Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 1 - 10 of 13 Results

Sort by:

Higher Education’s Top 10 Strategic Technologies for 2015
January 12, 2015

Related Resources ECAR Working Group Technology Spotlights — Quite a few survey respondents indicated they were unfamiliar with various technologies. In Q1 2015 the ECAR W…

Enterprise Content-Aware DLP Solution Comparison and Select Vendor Profiles
May 14, 2013

This Gartner report covers content-aware data-loss prevention, which has grown up and is on the verge of becoming a standard part of security architecture. A small set of vendors dominate a major…

Identity Management in Higher Education, 2011 Report
June 1, 2011

Key Findings Higher education has made substantial progress in the last five years, but many institutions are still struggling to deliver the full benefits of IdM. Institutions that report the…

Institutional Data Management in Higher Education
December 1, 2009

Abstract This 2009 ECAR study of institutional data management examines the policies and practices by which higher education institutions effectively collect, protect, and use digital informat…

Spreading the Word: Messaging and Communications in Higher Education
March 31, 2009

Abstract This 2009 ECAR research study is a comprehensive analysis of how colleges and universities plan, organize, deploy, and support messaging and communication technologies. It provides …

Information Confidentiality
March 11, 2009

Protecting information confidentiality is a critical security objective for all colleges and universities. Institutions must deploy confidentiality controls in addition to security controls, and…

Safeguarding the Tower: IT Security in Higher Education 2006
October 12, 2006

Abstract When ECAR studied IT security in 2003, we discovered that despite efforts to develop a secure IT infrastructure in higher education, uneven management awareness and a culture that e…

Making Business Sense of Information Security
March 21, 2006

A well-managed security program starts at the top and must provide strong governance, business risk management, auditing, and control processes. This Burton Group study proposes a security techn…

Identity Management in Higher Education: A Baseline Study
April 18, 2006

Abstract This ECAR research study illuminates findings from a survey of identity management practices in higher education. In addition to exploring the adoption of identity management techno…

A Systematic, Comprehensive Approach to Information Security
July 6, 2005

Information security is a process of business risk management that must be performed on an ongoing basis. It is critical to take an approach to information security that examines the risks and s…