Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 71 - 80 of 111 Results

Sort by:

What Do Researchers Need? Higher Education IT from the Researcher’s Perspective
August 17, 2006

Research methods, research subjects, the composition of research teams, and collaborative practices have all been affected in ways that are important to those who manage research and information …

Campus IT Security: Governance, Strategy, Policy, and Enforcement
August 15, 2006

Successful implementation of an effective information, data, and system "security blanket" for higher education institutions requires recognition of and action upon the cultural, politi…

The Auditor’s Dilemma: Audit Issues for Higher Education in the Information Age
May 23, 2006

May 23, 2006, presentation to the Big 12 Auditors. May 23, 2006, presentation to the Big 12 Auditors. …

Higher Education in the Age of Paradox: Fostering a Culture of Evidence
May 16, 2006

Presentation at the May 2006 ECAR Academy in Dedham, Massachusetts. "NERCOMP Presents: ECAR Academy" was developed jointly by NERCOMP and ECAR to develop the next generation of current …

Identity Management in Higher Education: A Baseline Study Roadmap
April 18, 2006

This ECAR research study illuminates findings from a survey of identity management practices in higher education. In addition to exploring the adoption of identity management technologies, the st…

Identity Management in Higher Education: A Baseline Study Key Findings
April 18, 2006

These Key Findings describe the major discoveries of the ECAR research study called "Identity Management in Higher Education: A Baseline Study". This ECAR research study illuminates fin…

IT Readiness for Business Continuity
May 2, 2006

This May 2006 survey seeks to understand higher education's plans, infrastructure, experience, and capability in the area of information technology support for business continuity. …

Making Business Sense of Information Security
March 21, 2006

A well-managed security program starts at the top and must provide strong governance, business risk management, auditing, and control processes. This Burton Group study proposes a security techn…

Identity Management in Higher Education: A Baseline Study
April 18, 2006

Abstract This ECAR research study illuminates findings from a survey of identity management practices in higher education. In addition to exploring the adoption of identity management techno…

Surveying the Steps to a Secure Emory University
March 28, 2006

This research bulletin summarizes how Emory University used the results of a security survey of higher education institutions to make important, peer-informed decisions on how to secure and prote…