Your Selections
-
EDUCAUSE Library
Search the entire EDUCAUSE Library
< Start a new ERO Search
Filter by Publications
Filter by How I Access
Filter by Date
Filter by Library Taxonomy
- Information Technology Management and Leadership (20)
- Teaching and Learning (15)
- Cybersecurity (9)
- Security Management (9)
- Teaching (7)
- Libraries and Technology (6)
- Networking and Emerging Technologies (6)
- Institutional Management (5)
- Instructional Technologies (5)
- Privacy (5)
- Support for Teaching and Learning (5)
- Distributed Computing (4)
- Mobile Computing (4)
- Policy and Law (4)
- Support Services (4)
- Teaching with Technology (4)
- E-Content (3)
- Leadership Development (3)
- Leadership (3)
- Staffing (3)
Add Keyword to refine your results
Meeting the Challenge: Women CIOs
A recent discussion among six female chief information officers (CIOs) in higher education was facilitated by Norma Holland, director of Leadership Program Management and Professional Development…
Student Success Center Enhances Student Experiences
Key Takeaways In an effort to deliver student support services more efficiently , Suffolk County Community College assessed its routine practices in search of new ways of making pos…
Leading Change as a Library Administrator
Key Takeaways What should a leader do when moving to a new administrative position in a field where she hasn't held that role before? Fellow alumni of the Leading Chang…
Containing the Security Threat of Mobile Apps in Higher Ed
Key Takeaways Security breaches and data loss become likelier as more students, faculty, and staff bring their own devices to campus. With a growing number of new offeri…
To Maus or Not to Maus: Technically, That Is the Question
Key Takeaways What should a Maus book owner do when he can't access the multiple copies he owns on all his various devices, including the newest, an iPad ? In …
Overcoming Hurdles to Social Media in Education
Key Takeaways According to a recent study, 100 percent of colleges and universities surveyed use social media , but instructors use it far less for teaching than they do for per…
An Incremental Approach to Building an Information Security Program
Key Takeaways Constraints such as tight budgets, increased responsibilities, lack of resources or incentive, and disagreement on a common approach to information security pose ch…
Privacy and Security Initiatives and Recommendations from the U.S. Department of Education
Key Takeaways At EDUCAUSE 2012, U.S. Department of Education speakers discussed new privacy and security initiatives, as well as offering recommendations on navigating privacy ef…
Establishing a Data Management Plan Consulting Group on Campus
Key Takeaways Higher education institutions that create an internal consulting service to develop data management plans can assist researchers in crafting such plans for th…
Ten Years Later: Why Open Educational Resources Have Not Noticeably Affected Higher Education, and Why We Should Care
Key Takeaways Open educational resources made a dramatic appearance with the 2002 debut of MIT's Open Courseware initiative. In the roughly 10 years since, OERs hav…














Stay Up-to-date