Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 1 - 10 of 21 Results

Sort by:

Public Key Infrastructure: Making Progress, But Many Challenges Remain
March 28, 2003

Public Key Infrastructure: Making Progress, But Many Challenges Remain" is a Research Report prepared by Burton Group, an ECAR partner. It is available to ECAR subscribers through special a…

Information Technology Security: Governance, Strategy, and Practice in Higher Education
October 24, 2003

Abstract U.S. higher education institutions have historically enjoyed a culture of open access to information. The free flow of information faces increasing challenges as concerns about inform…

Policy-Based Security and Enterprise Policy Management
April 5, 2004

"Policy-Based Security and Enterprise Policy Management" is a Research Report prepared by Burton Group, an ECAR partner. It is available to ECAR subscribers through special arrangement…

Wireless LAN Systems: What a Difference a Year Makes
January 13, 2005

Current wireless local area network (WLAN) system offerings go a long way toward addressing the planning, verification, deployment, and management requirements of network managers. However, many…

Information Technology Networking in Higher Education: Campus Commodity and Competitive Differentiator
February 7, 2005

Abstract This ECAR research study is designed to illuminate a host of current network management practices related to IT in higher education; opportunities for connectivity to external netwo…

A Systematic, Comprehensive Approach to Information Security
July 6, 2005

Information security is a process of business risk management that must be performed on an ongoing basis. It is critical to take an approach to information security that examines the risks and s…

Federating a Distributed World: Asserting Next-Generation Identity Standards
November 3, 2005

In the last few years, federated identity management—the agreements, standards, and technologies that make identity and entitlements portable across autonomous domains—has become a topic of …

Making Business Sense of Information Security
March 21, 2006

A well-managed security program starts at the top and must provide strong governance, business risk management, auditing, and control processes. This Burton Group study proposes a security techn…

Identity Management in Higher Education: A Baseline Study
April 18, 2006

Abstract This ECAR research study illuminates findings from a survey of identity management practices in higher education. In addition to exploring the adoption of identity management techno…

Safeguarding the Tower: IT Security in Higher Education 2006
October 12, 2006

Abstract When ECAR studied IT security in 2003, we discovered that despite efforts to develop a secure IT infrastructure in higher education, uneven management awareness and a culture that e…