Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 1 - 9 of 9 Results

Sort by:

User Authentication Technologies Beyond the Password
July 20, 2015

User authentication is an essential element of modern IT systems, yet understanding options and balancing requirements remain complex. One-time passwords, smart cards, certificates, biometrics an…

Evaluation Criteria for Enterprise Mobility Management Suites
August 11, 2014

Enterprise mobility management (EMM) suites provide multiplatform mobile device management resulting in lower risk and lower cost of ownership. EMM products are evolving to support app, security,…

The Career of the IT Security Officer in Higher Education
July 1, 2009

This ECAR occasional paper reports the result of a study designed to understand and document the attributes and responsibilities of the relatively new role of information security officer in high…

International Study of Identity Management and IT Security in Higher Education
July 9, 2007

This July 2007 survey is part of a study of identity management and information technology (IT) security in higher education sponsored by CAUDIT in Australasia, by EUNIS in Europe, and by the EDU…

Safeguarding the Tower: IT Security in Higher Education 2006 – Key Findings
October 12, 2006

This document presents the key findings of the ECAR study, Safeguarding the Tower: IT Security in Higher Education 2006. When ECAR studied IT security in 2003, we discovered that despite efforts …

Safeguarding the Tower: IT Security in Higher Education 2006 Roadmap
October 12, 2006

This roadmap synthesizes the important issues and recommended actions drawn from the ECAR study, Safeguarding the Tower: IT Security in Higher Education 2006. When ECAR studied IT security in 200…

Safeguarding the Tower: IT Security in Higher Education 2006
October 12, 2006

Abstract When ECAR studied IT security in 2003, we discovered that despite efforts to develop a secure IT infrastructure in higher education, uneven management awareness and a culture that e…

Campus IT Security: Leveraging Identity Management Technologies
October 10, 2006

This bulletin is a companion to Campus IT Security: Governance, Strategy, Policy, and Enforcement, ECAR's 2006 bulletin (No. 17) by the same authors. Security technologies provide various ty…

The Emergence of Identity Service Providers
March 5, 2002

To manage today's complex set of networked relationships and processes a new category of service provider is emerging—the identity service provider. Higher education has many needs for ide…