Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 1 - 9 of 9 Results

Sort by:

Baylor University's IT Security Risk Assessment Program
October 12, 2006

This case study examines Baylor University's risk assessment program for information technology security, which was established in the face of the escalating demands that security places on …

Formal Planning Optimizes BYOE Opportunities: University of Florida
June 3, 2013

“Bring your own everything” ( BYOE ) represents more than people using their own devices on campus and upgrading the i nstitution’s wireless network accordingly. It is a convergenc…

Identity Management in Higher Education, 2011 Report
June 1, 2011

Key Findings Higher education has made substantial progress in the last five years, but many institutions are still struggling to deliver the full benefits of IdM. Institutions that report the…

Incident Response: Lessons Learned from Georgia Tech, the University of Montana, and the University of Texas at Austin
October 13, 2003

This case study is a companion to the 2003 ECAR research study "Information Technology Security: Governance and Strategy in Higher Education." This study examines how information techno…

Information Technology Security at Indiana University
October 13, 2003

This case study is a companion to the 2003 ECAR research study "Information Technology Security: Governance and Strategy in Higher Education." This study examines how information techno…

Information Technology Security at MIT
October 13, 2003

This case study is a companion to the 2003 ECAR research study "Information Technology Security: Governance and Strategy in Higher Education." This study examines how information techno…

Information Technology Security at the University of Washington
October 13, 2003

This case study is a companion to the 2003 ECAR research study "Information Technology Security: Governance and Strategy in Higher Education." This study examines how information techno…

Most Improved: How Four Institutions Developed Successful IT Security Programs
November 3, 2006

Researchers conducted this in-depth case study to complement the ECAR study, Safeguarding the Tower: IT Security in Higher Education 2006. The case study examines how four higher education instit…

The Virginia Alliance for Secure Computing and Networking (VA SCAN): A Statewide Collaborative IT Security Resource
October 17, 2006

This case study examines ways in which the Virginia Alliance for Secure Computing and Networking (VA SCAN) provides a blueprint for higher education institutions interested in collaboratively pro…