Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Publications
Filter by Library Taxonomy
Aligning IT Funding Models to the Pace of Technology Change: Enabling Financial Flexibility for Core, Flexible, and Transformative Services, ECAR Working Group, December 2015. The EDUCAUSE Center for Analysis and Research (ECAR) brought together a group of high-level IT and finance leaders from a wide range of institutions to work together to understand how to better align IT funding models to the pace of technology change. The results of this collaboration between technology and business officers provide guidance and suggestions to help institution
2014 CDS Benchmarking Report February 2015. This report provides higher education CIOs and senior IT leaders with the benchmarks they need to make strategic decisions about IT at their institutions. Each year, more than 750 institutions (both within and outside the United States) participate in a survey about IT financials, staffing, and services. This report provides a glimpse into the breadth of CDS data and summarizes the most important findings from this year’s survey.
We Built, We Bought, We Shared: The Costs of Administrative Service Systems vs. the Academic Mission, EDUCAUSE Review, July 2014. In this article, CIOs talk candidly about three strategies: building-your-own in the modern era; buying and implementing in smarter ways; and joining a higher education consortium that shares processes and software.
Technology and the Broken Higher Education Cost Model: Insights from the Delta Cost Project, September 5, 2012. The Delta Cost Project has drawn attention to the need for a new focus on institutional spending and has provided a number of useful metrics for thinking about how different types of institutions spend money, about the relationships between costs and revenues, and about the declining public subsidies in public higher education.
The EDUCAUSE 2011 Core Data Service Report: Highlights and Insights into Higher Education Information Technology, January 2012. "The IT Organization, Budgets, and Funding" chapter provides statistics on where IT funding sources are from and what the budget is being spent on.
Expert Discussion Session: Unexpected Outcomes from the Cost-Cutting Era. EDUCAUSE 2011 presentation. Two CIOs share their experiences and some of the outcomes from these belt-tightening measures.
Funding-Model Archetypes for Central Information Technology Functions. ECAR research bulletin, January 2012. This CDS Spotlight ECAR research bulletin focuses on EDUCAUSE Core Data Service survey results related to funding models for IT functions.
Library Items on this Topic
EDUCAUSE Library Items for IT Funding
- EDUCAUSE Comments: NTIA Multi-Stakeholder Process for Cybersecurity Engagement
May 20, 2015
The National Telecommunications and Information Administration (NTIA) released a request-for-comments (RFC) in Spring 2015 on behalf of the U.S. Department of Commerce’s multi-agency Internet P…
- EDUCAUSE Comments: NIST Controlled Unclassified Information Guidelines
May 19, 2015
In late 2014, the National Institute of Standards and Technology (NIST) released an initial public draft of a new set of guidelines for federal agencies to follow in securing sensitive unclassifi…
- Cybersecurity: Selected Legal Issues
July 23, 2012
The federal government’s role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional interest. Critical infrastructure commonly …
- Cybersecurity: Authoritative Reports and Resources
July 24, 2012
Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government netw…
- Guide to Protecting the Confidentiality of Personally Identifiable Information
April 15, 2010
This publication provides guidance to agencies for identifying PII and determining the appropriate level of protection for it. It also suggests controls to provide that level of protection and gi…
- NIST Interagency Report on Privilege Management
March 25, 2010
This National Institute of Standards and Technology (NIST) and Interagency Report (NISTIR) presents a technical position on Privilege Management. Sections include: A Context for Thinking about Pr…
- Information Technology Sector Baseline Risk Assessment
August 28, 2009
The IT Sector Baseline Risk Assessment evaluates risk to the IT Sector and focuses on critical IT Sector functions. The assessment methodology is not intended to be guidance for individual entiti…
- NIST Secure Domain Name System (DNS) Deployment Guide
February 18, 2009
This document provides deployment guidelines for securing DNS within an enterprise. Because DNS data is meant to be public, preserving the confidentiality of DNS data pertaining to publicly acces…
- Disposal of Consumer Report Information and Records
June 30, 2005
The Fair and Accurate Credit Transactions Act of 2003 ("FACT Act" or "Act") requires the Federal Reserve Board, Office of the Comptroller of the Currency, Federal Deposit Insu…
- Enhancing the Security and Stability of the Internetâ€™s Domain Name and Addressing System: Notice of Inquiry
October 9, 2008
Federal Register notice of inquiry concerning DNSSEC. The Department of Commerce (Department) notes the increase in interest among government, technology experts and industry representatives reg…