Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 1 - 10 of 13 Results

Sort by:

Public Key Infrastructure: Making Progress, But Many Challenges Remain
March 28, 2003

Public Key Infrastructure: Making Progress, But Many Challenges Remain" is a Research Report prepared by Burton Group, an ECAR partner. It is available to ECAR subscribers through special a…

Information Technology Security: Governance, Strategy, and Practice in Higher Education
October 24, 2003

Abstract U.S. higher education institutions have historically enjoyed a culture of open access to information. The free flow of information faces increasing challenges as concerns about inform…

Policy-Based Security and Enterprise Policy Management
April 5, 2004

"Policy-Based Security and Enterprise Policy Management" is a Research Report prepared by Burton Group, an ECAR partner. It is available to ECAR subscribers through special arrangement…

A Systematic, Comprehensive Approach to Information Security
July 6, 2005

Information security is a process of business risk management that must be performed on an ongoing basis. It is critical to take an approach to information security that examines the risks and s…

Making Business Sense of Information Security
March 21, 2006

A well-managed security program starts at the top and must provide strong governance, business risk management, auditing, and control processes. This Burton Group study proposes a security techn…

Identity Management in Higher Education: A Baseline Study
April 18, 2006

Abstract This ECAR research study illuminates findings from a survey of identity management practices in higher education. In addition to exploring the adoption of identity management techno…

Safeguarding the Tower: IT Security in Higher Education 2006
October 12, 2006

Abstract When ECAR studied IT security in 2003, we discovered that despite efforts to develop a secure IT infrastructure in higher education, uneven management awareness and a culture that e…

Information Confidentiality
March 11, 2009

Protecting information confidentiality is a critical security objective for all colleges and universities. Institutions must deploy confidentiality controls in addition to security controls, and…

Spreading the Word: Messaging and Communications in Higher Education
March 31, 2009

Abstract This 2009 ECAR research study is a comprehensive analysis of how colleges and universities plan, organize, deploy, and support messaging and communication technologies. It provides …

Institutional Data Management in Higher Education
December 1, 2009

Abstract This 2009 ECAR study of institutional data management examines the policies and practices by which higher education institutions effectively collect, protect, and use digital informat…