Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 71 - 80 of 108 Results

Sort by:

Life with HIPAA: A Primer for Higher Education
April 1, 2003

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) includes complex legislation that impacts higher education but was not specifically written with academic institutions in m…

Local IT Security for Colleges, Schools, and Departments: A Higher Education Perspective
December 5, 2006

This bulletin discusses some of the lessons learned by the Emory College, Faculty of Arts and Sciences, in developing its information technology security strategy, as well as what other schools g…

Making Business Sense of Information Security
March 21, 2006

A well-managed security program starts at the top and must provide strong governance, business risk management, auditing, and control processes. This Burton Group study proposes a security techn…

Managing Availability and Performance Risks in the Cloud: Expect the Unexpected
December 7, 2010

We know that the best way to avoid cloud risks is to apply sound risk management strategies before placing applications and IT services in the cloud. Some risks, however, cannot be predetermined …

Managing IT Risk in Higher Education: A Methodology
March 18, 2008

This research bulletin presents a methodology, used successfully at the University of Technology, Sydney (UTS) in Australia, for managing and assessing risks related to information technology sys…

Measuring the Effectiveness of Security Awareness Programs
December 10, 2013

Security awareness is a core component of an information security program. Many information security professionals struggle, however, with delivering security awareness messages and mea…

Most Improved: How Four Institutions Developed Successful IT Security Programs
November 3, 2006

Researchers conducted this in-depth case study to complement the ECAR study, Safeguarding the Tower: IT Security in Higher Education 2006. The case study examines how four higher education instit…

New Directions in Federation
November 16, 2009

Federation technology has become a very important connective technology that enables efficient distributed identity management (IdM) and enhanced convenience for users. The trend toward outsource…

Policy-Based Security and Enterprise Policy Management
April 5, 2004

"Policy-Based Security and Enterprise Policy Management" is a Research Report prepared by Burton Group, an ECAR partner. It is available to ECAR subscribers through special arrangement…

Practical Strategies for Managing Risk in Cloud Computing
March 1, 2011

This ECAR research bulletin identifies some key principles on which to base decisions related to security assurance and compliance capabilities in cloud computing environments. It also illustrate…

Close
Close


EDUCAUSE Connect
View dates and locations

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

EDUCAUSE Institute
Leadership/Management Programs
Explore More

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2014 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.