Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 1 - 10 of 100 Results

Sort by:

CDS Spotlight: Information Security
July 10, 2014

This research bulletin uses data from Modules 1 and 7 of the EDUCAUSE Core Data Service to examine the current state of information security in higher education. Using a graphic-based format, thi…

Just in Time Research: Data Breaches in Higher Education
May 20, 2014

This “Just in Time” research is in response to recent discussions on the EDUCAUSE Higher Education Information Security Council (HEISC) discussion list about data breaches in higher education…

Comparing Methodologies for IT Risk Assessment and Analysis
March 7, 2014

This Gartner report can help institutions identify the most appropriate IT risk management methodology . It summarizes common IT risk management methodologies, highlighting attributes …

Higher Education's Top-Ten Strategic Technologies in 2014
February 12, 2014

Key Findings Analytics dominates the list, with four of the 10 technologies. Institutions are focusing on both learning and administrative analytics. Mobile apps are also prominent, wit…

Measuring the Effectiveness of Security Awareness Programs
December 10, 2013

Security awareness is a core component of an information security program. Many information security professionals struggle, however, with delivering security awareness messages and mea…

2014 Planning Guide for Data Management
December 9, 2013

Gartner's 2014 planning guide for data management can help institutions who are tracking, planning, or even implementing data management programs. The guide covers such concepts as big data,…

Learning While Doing: Two Institutions’ Practical IT Risk Management Experiences
July 29, 2013

IT risk management identifies, assesses, and responds to IT risks. Effective IT risk management examines issues such as institutional use of data , IT security measures to prevent or…

Information Security
June 14, 2013

This Spotlight focuses on data from the 2012 Core Data Service (CDS) to better understand how higher education institutions approach information security activities. Information provided …

What Does BYOE Mean for IT?: IT Leader Roundtable
May 15, 2013

The bring-your-own-everything (BYOE) phenomenon continues to gain momentum as more students, faculty, and staff use personal devices and services on campus. The person who previously brou…

Enterprise Content-Aware DLP Solution Comparison and Select Vendor Profiles
May 14, 2013

This Gartner report covers content-aware data-loss prevention, which has grown up and is on the verge of becoming a standard part of security architecture. A small set of vendors dominate a major…

Close
Close


Annual Conference
September 29–October 2
Register Now!

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

Digital Badges
Member recognition effort
Earn yours >

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2014 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.