Main Nav

ECAR publications range from short, timely research bulletins to major research reports. See descriptions of ECAR research publications. >

Search results

Showing 91 - 100 of 109 Results

Sort by:

Public Key Infrastructure: Making Progress, But Many Challenges Remain Key Findings
March 28, 2003

Public Key Infrastructure: Making Progress, But Many Challenges Remain" is a Key Findings summary. Research Director Dan Blum and Analyst Gerry Gebel provide an update to Burton Group'…

Information Technology Security: Governance, Strategy, and Practice in Higher Education Key Findings
October 24, 2003

U.S. higher education institutions have historically enjoyed a culture of open access to information. The free flow of information faces increasing challenges as concerns about information securi…

Policy-Based Security and Enterprise Policy Management
April 5, 2004

"Policy-Based Security and Enterprise Policy Management" is a Research Report prepared by Burton Group, an ECAR partner. It is available to ECAR subscribers through special arrangement…

High Stakes: Strategies for Optimal IT Security Staffing
March 16, 2004

At many higher education institutions, casual staffing arrangements are no longer adequate to handle the myriad technical, procedural, and cultural issues surrounding information technology secur…

Federating Identify Management: Standards, Technologies and Industry Trends
November 20, 2003

Federated identity management has emerged as a strategic requirement to enterprises. Traditional approaches such as delegated administration or directory synchronization do not support many users…

IT Security: The State of the Practice in Higher Education
November 6, 2003

In the spring of 2003, the EDUCAUSE Center for Analysis and Research (ECAR) launched a major study of IT security in higher education. Nearly 500 colleges and universities responded to the ECAR q…

Information Technology Security Policy: Keys to Success
November 11, 2003

This bulletin examines how higher education is coping with managing information technology security from the policy perspective. It focuses particular attention on policy processes and programs t…

Information Technology Security at the University of Washington
October 13, 2003

This case study is a companion to the 2003 ECAR research study "Information Technology Security: Governance and Strategy in Higher Education." This study examines how information techno…

Information Technology Security at MIT
October 13, 2003

This case study is a companion to the 2003 ECAR research study "Information Technology Security: Governance and Strategy in Higher Education." This study examines how information techno…

Information Technology Security at Indiana University
October 13, 2003

This case study is a companion to the 2003 ECAR research study "Information Technology Security: Governance and Strategy in Higher Education." This study examines how information techno…