Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Publications
Filter by Library Taxonomy
We Built, We Bought, We Shared: The Costs of Administrative Service Systems vs. the Academic Mission, EDUCAUSE Review, July 2014. In this article, CIOs talk candidly about three strategies: building-your-own in the modern era; buying and implementing in smarter ways; and joining a higher education consortium that shares processes and software.
2013 CDS Executive Summary Report February 2014. This report provides higher education CIOs and senior IT leaders with the benchmarks they need to make strategic decisions about IT at their institutions. Each year, more than 750 institutions (both within and outside the United States) participate in a survey about IT financials, staffing, and services. This report provides a glimpse into the breadth of CDS data and summarizes the most important findings from this year’s survey.
Technology and the Broken Higher Education Cost Model: Insights from the Delta Cost Project, September 5, 2012. The Delta Cost Project has drawn attention to the need for a new focus on institutional spending and has provided a number of useful metrics for thinking about how different types of institutions spend money, about the relationships between costs and revenues, and about the declining public subsidies in public higher education.
The EDUCAUSE 2011 Core Data Service Report: Highlights and Insights into Higher Education Information Technology, January 2012. "The IT Organization, Budgets, and Funding" chapter provides statistics on where IT funding sources are from and what the budget is being spent on.
Expert Discussion Session: Unexpected Outcomes from the Cost-Cutting Era. EDUCAUSE 2011 presentation. Two CIOs share their experiences and some of the outcomes from these belt-tightening measures.
Funding-Model Archetypes for Central Information Technology Functions. ECAR research bulletin, January 2012. This CDS Spotlight ECAR research bulletin focuses on EDUCAUSE Core Data Service survey results related to funding models for IT functions.
Library Items on this Topic
EDUCAUSE Library Items for IT Funding
- IT Security Questionnaire/IT Standards and Requirements Questionnaire
July 14, 2014
The University of Missouri IT Standards and Requirements Questionnaire (ITSRQ), currently in draft form, is predominantly focused on SaaS solutions although it can be readily adapted for other pu…
- Browsing the Web More Securely and More Privately With Firefox On Your Mac
April 28, 2014
This document is meant to help moderately technical users who are security- and privacy-focused make progress toward achieving online security and privacy goals when using an Apple Mac with the M…
- Information Security Program Assessment Tool
November 20, 2015
This self-assessment tool was created to evaluate the maturity of higher education information security programs using as a framework the International Organization for Standardization (ISO) 2700…
- Can Big Data Help Universities Tackle Security, BYOD?
July 31, 2012
Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…
- For BYOD Best Practices, Secure Data, Not Devices
July 17, 2012
Author, Thor Olavsrud, writes for CIO Magazine that "IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to …
- Guide to Enterprise Telework and Remote Access Security (SP 800-46 Revision 1)
June 4, 2009
Many organizations’ employees and contractors use enterprise telework technologies to perform work from external locations. Most teleworkers use remote access technologies to interface with an…
- Catch a clue from an EDU: Universities that get security right
May 20, 2011
In these days of consumer gadgets and mobile access, corporations can learn a lot from how universities deploy multiple layers of security. In th…
- Security Guidance for Critical Areas of Focus in Cloud Computing
December 18, 2009
Adopting cloud computing is a complex decision involving many factors. It is the Cloud Security Alliance hope that the guidance contained in this work will help others better understand what que…
- Information Technology Sector Baseline Risk Assessment
August 28, 2009
The IT Sector Baseline Risk Assessment evaluates risk to the IT Sector and focuses on critical IT Sector functions. The assessment methodology is not intended to be guidance for individual entiti…
- Directions in Security Metrics Research
August 20, 2009
More than 100 years ago, Lord Kelvin insightfully observed that measurement is vital to deep knowledge and understanding in physical science. During the last few decades, researchers have made va…