Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 31 - 40 of 104 Results

Sort by:

Identity Management in Higher Education, 2011—Key Findings
June 1, 2011

This document presents the key findings from Identity Management in Higher Education, 2011. This ECAR research study illuminates findings from the 2010 survey of identity management (IdM) …

Identity Management in Higher Education, 2011—Roadmap
June 1, 2011

This ECAR roadmap synthesizes the important issues and recommended actions drawn from the study Identity Management in Higher Education, 2011 , by Mark C. Sheehan and Cedric Bennett, with…

Identity Management in Higher Education: A Baseline Study
April 18, 2006

Abstract This ECAR research study illuminates findings from a survey of identity management practices in higher education. In addition to exploring the adoption of identity management techno…

Identity Management in Higher Education: A Baseline Study Key Findings
April 18, 2006

These Key Findings describe the major discoveries of the ECAR research study called "Identity Management in Higher Education: A Baseline Study". This ECAR research study illuminates fin…

Identity Management in Higher Education: A Baseline Study Roadmap
April 18, 2006

This ECAR research study illuminates findings from a survey of identity management practices in higher education. In addition to exploring the adoption of identity management technologies, the st…

Implementing Google Apps for Faculty and Staff
October 19, 2010

This ECAR research bulletin explains how Boise State University addressed important concerns about security and strategic alignment in finalizing its decision to move to Google Apps for Educatio…

Incident Response: Lessons Learned from Georgia Tech, the University of Montana, and the University of Texas at Austin
October 13, 2003

This case study is a companion to the 2003 ECAR research study "Information Technology Security: Governance and Strategy in Higher Education." This study examines how information techno…

Information Confidentiality
March 11, 2009

Protecting information confidentiality is a critical security objective for all colleges and universities. Institutions must deploy confidentiality controls in addition to security controls, and…

Information Security Governance: Standardizing the Practice of Information Security
August 19, 2008

This ECAR research bulletin discusses the trend to use a variety of risk assessment frameworks and standards to create an information security program that is sufficiently comprehensive for colle…

Information Technology Accessibility in Higher Education: Research and Promising Practices
June 7, 2005

Federal law requires higher education entities to ensure that qualified students with disabilities have equal access to programs and services, including those that use information technology. In …