Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 51 - 60 of 73 Results

Sort by:

Surveying the Steps to a Secure Emory University
March 28, 2006

This research bulletin summarizes how Emory University used the results of a security survey of higher education institutions to make important, peer-informed decisions on how to secure and prote…

Making Business Sense of Information Security
March 21, 2006

A well-managed security program starts at the top and must provide strong governance, business risk management, auditing, and control processes. This Burton Group study proposes a security techn…

CHEMA Looks at the Future of Higher Education, 2006
January 30, 2006

This survey instrument is part of a project sponsored by CHEMA to look at the future of higher education from the perspective of its members. The project will examine how the executives who lead …

IT Security in Higher Education, 2006
October 31, 2005

This survey instrument covers the security of networks and computing systems, including data, application, service, and operating systems. This s…

A Systematic, Comprehensive Approach to Information Security
July 6, 2005

Information security is a process of business risk management that must be performed on an ongoing basis. It is critical to take an approach to information security that examines the risks and s…

IT and Higher Education: The View from the Supreme Court
January 4, 2005

This research bulletin discusses implications of U.S. Supreme Court decisions involving institutions of higher education and the ways in which colleges and universities can take advantage of tech…

A Framework for HIPAA IT Security Compliance: Leveraging for Security
December 7, 2004

This research bulletin describes a functional framework for higher education compliance with the HIPAA IT security final rule. The framework, which can be adapted for individual universities, inc…

Information Technology Security: Governance, Strategy, and Practice in Higher Education Roadmap
September 23, 2004

U.S. higher education institutions have historically enjoyed a culture of open access to information. The free flow of information faces increasing challenges as concerns about information securi…

Policy-Based Security and Enterprise Policy Management
April 5, 2004

"Policy-Based Security and Enterprise Policy Management" is a Research Report prepared by Burton Group, an ECAR partner. It is available to ECAR subscribers through special arrangement…

High Stakes: Strategies for Optimal IT Security Staffing
March 16, 2004

At many higher education institutions, casual staffing arrangements are no longer adequate to handle the myriad technical, procedural, and cultural issues surrounding information technology secur…

Close
Close


EDUCAUSE Connect
View dates and locations

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

EDUCAUSE Institute
Leadership/Management Programs
Explore More

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2014 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.