Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 1 - 10 of 17 Results

Sort by:

Protecting the Security of Research Data
November 8, 2011

The effective protection and management of research data has become a hot topic in U.S. higher education. Funding agencies increasingly require data management plans as part of grant submittals…

Electronic Records Management: Today’s High Stakes
April 20, 2010

This ECAR research bulletin discusses the issues involved in successful electronic records management and provides guidance on how to start and sustain an electronic records management program a…

Revitalizing Data Stewardship through Risk Reduction: Managing Sensitive Data at the University of Virginia
December 1, 2009

The 2009 ECAR study Institutional Data Management in Higher Education , by Ronald Yanosky, examines how higher education institutions are facing the challenges of institutional data management…

Institutional Data Management in Higher Education Roadmap
December 1, 2009

This ECAR roadmap synthesizes the important issues and recommended actions drawn from the study Institutional Data Management in Higher Education , by Ronald Yanosky. The study examines the po…

Institutional Data Management in Higher Education
December 1, 2009

Abstract This 2009 ECAR study of institutional data management examines the policies and practices by which higher education institutions effectively collect, protect, and use digital informat…

Institutional Data Management in Higher Education—Key Findings
December 1, 2009

This document presents the key findings from the 2009 ECAR study of institutional data management, which examines the policies and practices by which higher education institutions effectively col…

The Career of the IT Security Officer in Higher Education
July 1, 2009

This ECAR occasional paper reports the result of a study designed to understand and document the attributes and responsibilities of the relatively new role of information security officer in high…

Information Confidentiality
March 11, 2009

Protecting information confidentiality is a critical security objective for all colleges and universities. Institutions must deploy confidentiality controls in addition to security controls, and…

International Study of Identity Management and IT Security in Higher Education
July 9, 2007

This July 2007 survey is part of a study of identity management and information technology (IT) security in higher education sponsored by CAUDIT in Australasia, by EUNIS in Europe, and by the EDU…

Most Improved: How Four Institutions Developed Successful IT Security Programs
November 3, 2006

Researchers conducted this in-depth case study to complement the ECAR study, Safeguarding the Tower: IT Security in Higher Education 2006. The case study examines how four higher education instit…

Close
Close


EDUCAUSE Connect
View dates and locations

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

EDUCAUSE Institute
Leadership/Management Programs
Explore More

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2014 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.