Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 1 - 7 of 7 Results

Sort by:

Identity Management in Higher Education, 2011—Roadmap
June 1, 2011

This ECAR roadmap synthesizes the important issues and recommended actions drawn from the study Identity Management in Higher Education, 2011 , by Mark C. Sheehan and Cedric Bennett, with…

Identity Management in Higher Education, 2011 Report
June 1, 2011

Key Findings Higher education has made substantial progress in the last five years, but many institutions are still struggling to deliver the full benefits of IdM. Institutions that report the…

Institutional Data Management in Higher Education Roadmap
December 1, 2009

This ECAR roadmap synthesizes the important issues and recommended actions drawn from the study Institutional Data Management in Higher Education , by Ronald Yanosky. The study examines the po…

Spreading the Word: Messaging and Communications in Higher Education Roadmap
March 31, 2009

This ECAR roadmap synthesizes the important issues and recommended actions drawn from the 2009 ECAR research study, Spreading the Word: Messaging and Communications in Higher Education Roadmap, b…

Safeguarding the Tower: IT Security in Higher Education 2006 Roadmap
October 12, 2006

This roadmap synthesizes the important issues and recommended actions drawn from the ECAR study, Safeguarding the Tower: IT Security in Higher Education 2006. When ECAR studied IT security in 200…

Identity Management in Higher Education: A Baseline Study Roadmap
April 18, 2006

This ECAR research study illuminates findings from a survey of identity management practices in higher education. In addition to exploring the adoption of identity management technologies, the st…

Information Technology Security: Governance, Strategy, and Practice in Higher Education Roadmap
September 23, 2004

U.S. higher education institutions have historically enjoyed a culture of open access to information. The free flow of information faces increasing challenges as concerns about information securi…