Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 11 - 20 of 108 Results

Sort by:

2014 Student and Faculty Technology Research Studies
October 30, 2014

EDUCAUSE Technology Research in the Academic Community This research can catalyze conversations among IT professionals about how to better serve their constituents; among institutional leaders…

Just in Time Research: Data Breaches in Higher Education
May 20, 2014

This “Just in Time” research is in response to recent discussions on the EDUCAUSE Higher Education Information Security Council (HEISC) discussion list about data breaches in higher education…

Higher Education's Top-Ten Strategic Technologies in 2014
February 12, 2014

Key Findings Analytics dominates the list, with four of the 10 technologies. Institutions are focusing on both learning and administrative analytics. Mobile apps are also prominent, wit…

Measuring the Effectiveness of Security Awareness Programs
December 10, 2013

Security awareness is a core component of an information security program. Many information security professionals struggle, however, with delivering security awareness messages and mea…

Learning While Doing: Two Institutions’ Practical IT Risk Management Experiences
July 29, 2013

IT risk management identifies, assesses, and responds to IT risks. Effective IT risk management examines issues such as institutional use of data , IT security measures to prevent or…

Information Security
June 14, 2013

This Spotlight focuses on data from the 2012 Core Data Service (CDS) to better understand how higher education institutions approach information security activities. Information provided …

What Does BYOE Mean for IT?: IT Leader Roundtable
May 15, 2013

The bring-your-own-everything (BYOE) phenomenon continues to gain momentum as more students, faculty, and staff use personal devices and services on campus. The person who previously brou…

Enterprise Content-Aware DLP Solution Comparison and Select Vendor Profiles
May 14, 2013

This Gartner report covers content-aware data-loss prevention, which has grown up and is on the verge of becoming a standard part of security architecture. A small set of vendors dominate a major…

Information Systems Risk Assessment
July 24, 2012

This Spotlight bulletin focuses on 2011 CDS survey results related to information systems (IS) risk assessments. Research findings and industry experience demonstrate that conducting a …

Protecting the Security of Research Data
November 8, 2011

The effective protection and management of research data has become a hot topic in U.S. higher education. Funding agencies increasingly require data management plans as part of grant submittals…