Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Publications
Filter by Library Taxonomy
We Built, We Bought, We Shared: The Costs of Administrative Service Systems vs. the Academic Mission, EDUCAUSE Review, July 2014. In this article, CIOs talk candidly about three strategies: building-your-own in the modern era; buying and implementing in smarter ways; and joining a higher education consortium that shares processes and software.
2013 CDS Executive Summary Report February 2014. This report provides higher education CIOs and senior IT leaders with the benchmarks they need to make strategic decisions about IT at their institutions. Each year, more than 750 institutions (both within and outside the United States) participate in a survey about IT financials, staffing, and services. This report provides a glimpse into the breadth of CDS data and summarizes the most important findings from this year’s survey.
Technology and the Broken Higher Education Cost Model: Insights from the Delta Cost Project, September 5, 2012. The Delta Cost Project has drawn attention to the need for a new focus on institutional spending and has provided a number of useful metrics for thinking about how different types of institutions spend money, about the relationships between costs and revenues, and about the declining public subsidies in public higher education.
The EDUCAUSE 2011 Core Data Service Report: Highlights and Insights into Higher Education Information Technology, January 2012. "The IT Organization, Budgets, and Funding" chapter provides statistics on where IT funding sources are from and what the budget is being spent on.
Expert Discussion Session: Unexpected Outcomes from the Cost-Cutting Era. EDUCAUSE 2011 presentation. Two CIOs share their experiences and some of the outcomes from these belt-tightening measures.
Funding-Model Archetypes for Central Information Technology Functions. ECAR research bulletin, January 2012. This CDS Spotlight ECAR research bulletin focuses on EDUCAUSE Core Data Service survey results related to funding models for IT functions.
Library Items on this Topic
EDUCAUSE Library Items for IT Funding
- Higher Education Information Security Council Charter
January 30, 2014
The HEISC mission is to support higher education institutions as they improve information security governance, compliance, data protection, and privacy programs. HEISC accomplishes this work thro…
- IT Security Questionnaire/IT Standards and Requirements Questionnaire
July 14, 2014
The University of Missouri IT Standards and Requirements Questionnaire (ITSRQ), currently in draft form, is predominantly focused on SaaS solutions although it can be readily adapted for other pu…
- Browsing the Web More Securely and More Privately With Firefox On Your Mac
April 28, 2014
This document is meant to help moderately technical users who are security- and privacy-focused make progress toward achieving online security and privacy goals when using an Apple Mac with the M…
- Overview of Bro
October 30, 2013
An increasing number of institutions are recognizing the need to log network data in large volume and to analyze the data efficiently to detect sophisticated network intrusion attempts affect…
- Can Big Data Help Universities Tackle Security, BYOD?
July 31, 2012
Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…
- DNSSEC with BIND 9.8.0
May 4, 2011
This blog posting gives directions for upgrading from an older version of BIND. This blog posting gives directions for upgrading from an older …
- Guide to Enterprise Telework and Remote Access Security (SP 800-46 Revision 1)
June 4, 2009
Many organizations’ employees and contractors use enterprise telework technologies to perform work from external locations. Most teleworkers use remote access technologies to interface with an…
- Application Security for Management, Project Managers, and Architects
March 25, 2011
Although Web application security is gradually improving, many project leaders, vendors, and programmers are still unaware of vulnerabilities that can expose confidential institutional data, allo…
- Application Security for Developers and Quality Assurance Personnel
March 25, 2011
It is often the case that developers and software vendors are not fully aware of application security vulnerabilities. In many cases, these vulnerabilities can be prevented with training, more co…
- Ten Steps to Secure Your Mobile Device
August 4, 2010
This Higher Education Information Security Council resource includes US-CERT recommendations and suggested steps to take when securing campus mobile devices, as well as links to higher educat…