Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 61 - 70 of 103 Results

Sort by:

Just in Time Research: Data Breaches in Higher Education
May 20, 2014

This “Just in Time” research is in response to recent discussions on the EDUCAUSE Higher Education Information Security Council (HEISC) discussion list about data breaches in higher education…

Just in Time Research: Privacy Practices
February 19, 2014

The January 2014 edition of the ECAR Update subscriber newsletter included an informal poll on information privacy practices . The poll was intended to collect a quick snapshot of the higher e…

Key Issues to Consider in Assessing the Digital Content Landscape
July 9, 2002

As the digital content market develops and the offerings of publisher/suppliers evolve, institutions will need to formulate a digital content strategy. This Research Bulletin examines the emergin…

Learning While Doing: Two Institutions’ Practical IT Risk Management Experiences
July 29, 2013

IT risk management identifies, assesses, and responds to IT risks. Effective IT risk management examines issues such as institutional use of data , IT security measures to prevent or…

Leveraging IT Infrastructure for HIPAA Training
July 6, 2004

Faced with the challenge of quickly developing, delivering, tracking, and reporting customized HIPAA training for 17,000 workers and students, the University of Minnesota leveraged important piec…

Life with HIPAA: A Primer for Higher Education
April 1, 2003

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) includes complex legislation that impacts higher education but was not specifically written with academic institutions in m…

Local IT Security for Colleges, Schools, and Departments: A Higher Education Perspective
December 5, 2006

This bulletin discusses some of the lessons learned by the Emory College, Faculty of Arts and Sciences, in developing its information technology security strategy, as well as what other schools g…

Making Business Sense of Information Security
March 21, 2006

A well-managed security program starts at the top and must provide strong governance, business risk management, auditing, and control processes. This Burton Group study proposes a security techn…

Managing IT Risk in Higher Education: A Methodology
March 18, 2008

This research bulletin presents a methodology, used successfully at the University of Technology, Sydney (UTS) in Australia, for managing and assessing risks related to information technology sys…

Managing Virtual Research Collaboration Effectively
July 14, 2005

Presentation at the Fourth Annual ECAR/HP Summer Symposium for Higher Education IT Executives, July 13-15, 2005, New Castle Island, New Hampshire. Scientific and engineering research increasingly…