Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 21 - 27 of 27 Results

Sort by:

Information Technology Security Policy: Keys to Success
November 11, 2003

This bulletin examines how higher education is coping with managing information technology security from the policy perspective. It focuses particular attention on policy processes and programs t…

Information Technology Security at the University of Washington
October 13, 2003

This case study is a companion to the 2003 ECAR research study "Information Technology Security: Governance and Strategy in Higher Education." This study examines how information techno…

Information Technology Security at MIT
October 13, 2003

This case study is a companion to the 2003 ECAR research study "Information Technology Security: Governance and Strategy in Higher Education." This study examines how information techno…

Information Technology Security at Indiana University
October 13, 2003

This case study is a companion to the 2003 ECAR research study "Information Technology Security: Governance and Strategy in Higher Education." This study examines how information techno…

Incident Response: Lessons Learned from Georgia Tech, the University of Montana, and the University of Texas at Austin
October 13, 2003

This case study is a companion to the 2003 ECAR research study "Information Technology Security: Governance and Strategy in Higher Education." This study examines how information techno…

Information Technology Security: Governance, Strategy, and Practice in Higher Education
October 24, 2003

Abstract U.S. higher education institutions have historically enjoyed a culture of open access to information. The free flow of information faces increasing challenges as concerns about inform…

Computer and Network Security and Higher Education's Core Values
March 18, 2003

Colleges and universities have a host of security vulnerabilities. Insecure computers and networks have been exploited to launch a variety of attacks on computers--in the academy as well as in so…