Eden Dahlstrom, Senior Research Analyst, EDUCAUSE Stephen diFilipo, Vice President and CIO, Cecil College BYOE AND THE CONSUMERIZATION OF TECHNOLOOGY AND.

Slides:



Advertisements
Similar presentations
JAKIN II Project Transfer and full development of the formal and non formal training assessment tool, within new trends and needs of business ES1-LEO
Advertisements

Improving Statistical Systems: Advice from the UIS Technical Guide National training workshop Amman, Jordan October 2010.
ECAR Students and IT Study, 2012 Eden Dahlstrom, EDUCAUSE.
The Changing Face of Higher Ed and the Role of IT as a Strategic Enabler Dave Wallace Chief Information Officer University of Waterloo December 4, 2012.
A relentless commitment to academic achievement and personal growth for every student. Redmond School District Graduates are fully prepared for the demands.
Division of Information Resources BYOD & Classroom Technology How are we designing classrooms for the future?
Update on the Impact of Corporate Business Architecture on IT at StatCan 2011 MSIS Meeting Karen Doherty May 2011.
New IT Leadership Announcement 1 Transforming U-M: Leadership and High-level Organization Announcement June 12, 2009.
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
Today’s Speakers  Diane Dagefoerde, CIO, Arts and Sciences, The Ohio State University  Butch Juelg, Associate Vice Chancellor, Technology Services,
EDUCAUSE Center for Applied Research An Update. New EDUCAUSE Initiatives for 2002 EDUCAUSE Core Data Survey Virtual Communities Initiative Institute for.
Technical Review Group (TRG)Agenda 27/04/06 TRG Remit Membership Operation ICT Strategy ICT Roadmap.
Impact of Mobile Technology Tim Nesler CIO and Associate VP for Information Technology Services Santa Fe College League for Innovation 2011 CIO Summit.
Joint Unit Liaison Meeting 1 INFORMATION AND TECHNOLOGY SERVICES Transforming U-M: Joint UL Meeting July 21, 2009.
Chatham College Community and Computers Pervasive Computing at a Liberal Arts College Charlotte E. Lott, Ph. D. Lynda Barner West, Ed. D. Copyright Charlotte.
Technology Trends Impacting Community Colleges Technology trends impacting community colleges and SJECCD over the next five years, Ben Seaberry.
Company LOGO Leading, Connecting, Transforming UNC… …Through Its People Human Capital Management.
Solution Briefing Business Productivity in Action Keynote.
21 st Century Maricopa Review of Process Human Resources Projects Steering Team Meeting May 12, 2010.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
SLIDE 1 Innovations Conference March SLIDE 2 The National Lone Star Report Aligning Technology with Student Success.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Strategic Planning for EEO & HR Offices Dinah Cohen CAP Director Derek Shields CAP Program Manager EEOC Executive Leadership Conference – May 3-5, 2011.
Administrative Evaluation Committee – Orientation Meeting Dr. Christine Carver, Associate Superintendent of Human Capital Development Mr. Stephen Foresi,
Sustaining Change in Higher Education J. Douglas Toma Associate Professor Institute of Higher Education University of Georgia May 28, 2004.
Value & Excitement University Technology Services Oakland University Information Technology Strategic Planning Theresa Rowe October 2004 Copyright Theresa.
ELearning Update March 12, National Trends Approximately 1.9 million students were studying online in the fall of 2003 In 2009, 11.9 million students.
UCSF IT Update November 2013 Presenter: Joe Bengfort.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Richard Tworek VP, Enterprise Communication Servers 2006 Technology Focus Enhancing the Human Experience with Enterprise Real-Time and Secure Converged.
IT ISSUES & TRENDS, 2015 Faculty Technology Day Wednesday, August 19, 2025.
EDUCAUSE 2014 Top Ten IT Issues. Today’s Agenda Introduction to EDUCAUSE IT Issues History & Methodology 2014 Top Ten IT Issues Selected Issues Reviewed.
© 2008 IBM Corporation Challenges for Infrastructure Outsourcing July 29, 2011 Atul Gupta Vice President, Strategic Outsourcing, IBM.
Top Issues Facing Information Technology at UAB Sheila M. Sanders UAB Vice President Information Technology February 8, 2007.
Seminars on Academic Computing Addressing Organizational Development at Collab State University August 5, 2007.
Elbert Guintivano Manager – Presales Consulting BMC Software Trend/Strategy in IT Service Management.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
Shoreline Community College Planning Session November 3 rd, 2010.
1 DUT e-Learning Project Pathfinders Review Symposium 5 March 2015.
1 New Enhanced Collaboration Workspace Pilot Initiative for 2006 ITSC Status Update Sally Waselik 02-Dec-2005.
1 Centers for Teaching, Learning and Technology...What Fits Your Institution? Kathy Christoph, University of Wisconsin Carrie Regenstein, University of.
Young Change Makers. Want Perfect Education? Educational institutes must create and sustain a highly educated and innovative workforce and the capacity.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
Moving to BYOD Gary Audin 1.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
1 Chapter 9 Implementing Six Sigma. Top 8 Reasons for Six Sigma Project Failure 8. The training was not practical. 7. The project was too small for DMAIC.
JMFIP Financial Management Conference
Updating the Value Proposition:
SAMPLE Drive Engagement Through Interdepartmental Collaboration
Higher Education’s 2016 Top 10 IT Issues: Divest, Reinvest,
Digital Workplace.
Impact of IT Consumerisation on Enterprise Security
University of Arkansas Information Technology Services
One ODOT: Positioned for the Future
Brian Voss, Chief Information Officer April 5, 2006
Capex to Opex: Are You Ready?
Dan Bieler, Principal Analyst
Assistant Vice President and Chief Technology Officer
Profile of a Virginia Graduate:
The EDUCAUSE 2019 Top 10 IT Issues
Technology in education: A friend or foe ?
Are you measuring what really counts?
The EDUCAUSE 2019 Top 10 IT Issues
Information Technology Organization Overview RFP #220-05
OU BATTLECARD: Oracle Identity Management Training
A Workshop for New Academic Administrators
Presentation transcript:

Eden Dahlstrom, Senior Research Analyst, EDUCAUSE Stephen diFilipo, Vice President and CIO, Cecil College BYOE AND THE CONSUMERIZATION OF TECHNOLOOGY AND THE BRING- YOUR-OWN-EVERYTHING (BYOE) ERA OF HIGHER EDUCATION, 2013

Slide Deck Overview  Introduction and Methodology  Findings  Planning and Governance  Security Practices  Fiscal Considerations  Technology Infrastructure  Support Strategies  Teaching and Learning  Recommendations

Introduction and Methodology

Introduction: A Framework for the Most Important BYOE IT Issues in HE

Introduction: Device Proliferation Is Manic Device proliferation is manic, and unmanaged growth could result in a “tragedy of the commons” situation, where too many devices find their way to campus networks too fast and institutions find more opportunities lost than taken.

Introduction: IT Leaders Are Bracing for Personal Mobile Computing Environment Expansion

Smartphone ownership among undergraduate students increased from 55% in 2011 to 62% in 2012… Introduction: Students Go Mobile …and the trend for more, different, and better devices is predicted to continue to increase.

Introduction: Institutional Motivation for Permissive BYOE IT leaders want happy and productive faculty and staff.

Introduction: Extending Enterprise Systems for Mobile Access Most institutions have already–or are planning to– extend enterprise systems to be compatible and friendly with mobile devices.

Methodology  IT Leader Interviews  Focus Groups  ECAR Survey

Findings

Findings: An Overview 1.Planning Doesn’t Necessarily Precede Action for BYOE 2.A Solid Security Presence and Plan Can Adjust to Most BYOE Security Challenges 3.Cost Savings from BYO Can Be Elusive 4.Think of IT Infrastructure as “Middleware” 5.Support Strategies Will Need to Adapt to BYOE Environments 6.Implications for Teaching and Learning Excite IT Professionals the Most about BYO

Planning and Governance

Planning and Governance: Formal Planning Strategies for BYOE Planning doesn’t have to precede action when it comes to BYOE—doing before planning is actually the norm—yet policies are in place where they matter most, such as for security or end- user behaviors.

Formal policies for BYOE are scarce, yet they are common where they matter most, like for security issues. Planning and Governance: Policy Customs for Security Issues

Planning and Governance: Policy Customs for Employee Behaviors Acceptable use and employee privacy expectation policies are the norm.

Security Practices

Security Practices: BYOE Security Issues Priorities A solid security presence and plan can adjust to most BYOE security challenges.

Security Practices: BYOE Security Issues Priorities Managing risk and raising user awareness are two areas in which security practices are a wise investment.

Security Practices: Focus on Securing Data Rather than Devices Data are the paramount institutional asset and are therefore the most important consideration when discussing BYOE security issues.

Security Practices: Mandated BYO Security Training Is Common for Knowledge Workers Educating users about sound security practices will raise awareness of security risks.

Fiscal Considerations

Fiscal Considerations: Reimbursement Practices BYO reimbursements are NOT the norm in higher education.

Fiscal Considerations: No Plans to Reduce Provisioned Devices for Students Some institutions are converting former computer labs into general collaboration spaces with power, Wi-Fi, printing stations, and free-moving future for ad hoc get-togethers.

Fiscal Considerations: Financial Impact on IT Budgets BYOE can cost more than it saves.

Fiscal Considerations: Reinvest in Infrastructure The cost to update/upgrade IT infrastructure can outweigh the cost savings from providing fewer institutionally provisioned devices and other technologies. Retiring or downsizing underused technologies and applying the savings to upgrade infrastructure is a wise investment.

Technology Infrastructure

Technology Infrastructure: BYOE “Middleware” Think of IT infrastructure as BYOE “middleware”—the commodities that bridge users, their devices, and their consumer-level applications to the institution’s data, services, systems, and enterprise-level applications. IT middleware should be robust yet nimble.

Technology Infrastructure: Ubiquitous and Frictionless Access Including campus penetration of cellular coverage from main providers Including network Wi-Fi capabilities and open public Wi- Fi versus restricted network access Including bandwidth and Wi- Fi density ratios (i.e., number of devices per user) Including access capabilities through device, applications, browsers, virtualized desktops, identify management tools, and cloud services

Technology Infrastructure: Current IT Practices that Relate to BYOE

Technology Infrastructure: Upgrades Needed in Next Two Years Though present accommodation of BYOE is adequate, most respondents expect infrastructure upgrades within two years for Wi-Fi and networks, in particular.

Support Strategies

Support Strategies: Full and Best- Effort Support are Common for Employees Current help desk support efforts for employees are extensive. Support strategies will need to adapt to BYOE environments.

Support Strategies: Best Effort Support is Common For Students “Having the manpower to provide the support [is a challenge]. We will work on their devices if we have time.” – ECAR BYOE Survey Respondent

Support Strategies: Increased Support Demand Estimates in Two Years 74% of institutions predict costs to increase for providing IT services to support user-provisioned technology.

Support Strategies: Rating of BYOE Support Priorities as High or Essential Improving end- user experiences and providing more support are among the top priorities of IT leaders.

Support Strategies: The New Support Paradigm as “Technology Consultant” 1.Routing help seekers to self-service portals and tutorials 2.Providing links to vendor resources or direct customer support 3.Crowdsourcing solutions through blogs, wikis, and Google searches 4.Using what Jarod Green from Gartner calls “Hey, Joe!” support–asking about until you find something that works rather than opening a support ticket

Teaching and Learning

Teaching and Learning: Priority for Facilitating Anytime, Anywhere Access + Student Guidelines Utilizing mobile technologies for T&L is a priority, but providing students guidance for how to do so is still rare.

Balancing academic freedom, professional development, and expectations for end-user experiences is important. Teaching and Learning: Priority for Supporting Innovative Teaching Opportunities + Faculty Guidelines

Teaching and Learning: Authority for Allowing/Disallowing Mobile Devices in F2F Courses There is a general sense that institutions are accommodating BYOE practices to the best of their abilities

Recommendations

Recommendations: Planning, Governance, and Leadership  Have strong leadership and strong follow- through that address technology expectations at the top levels and are supported throughout the institution.  Establish a mobile vision that considers human behavioral traits as a significant variable.  Focus on having policies for issues that are within the purview of IT, such as securing data, and only have policies that can and will be enforced.

Recommendations: Security Practices  Balance rigorous security standards (managed risks) with user (in)conveniences.  Accept that the proliferation of user- provisioned technologies does little to change the basic best practices around security—a solid security presence and plan on campus can adjust to most BYOE challenges.

Recommendations: Security Practices  Manage risk through securing data (access) rather than devices (assets).  Collaborate with other units, such as human resources, to establish user-awareness training and education programs that focus on the understanding of risks of data exposure, how users can avoid security breaches, and how users can separate work and personal usage.

Recommendations: Fiscal Considerations  Don’t count on cost savings, but when they arise, invest in infrastructure.  Reconsider reimbursement plans for BYO and retain these services only if there is the right combination of political and financial investment for your institution.

Recommendations: Support Strategies  Have clear and accessible support service- level options.  Champion the paradigm shift so that BYOE means more DIY support.  Strive to improve end-user experiences through empowering solutions such as “Hey, Joe” support crowdsourcing.

Recommendations: Teaching and Learning  Be mobile ready, willing, and able with a mobile-friendly environment that meets student, faculty, and staff expectations.  Collaborate with other units to formalize systems for guiding students and faculty in incorporating mobile, networkable devices into the curriculum and pedagogy.

If an IT organization currently provides effective and innovative services for university-owned technologies, it is likely well positioned to adapt to a bring-your-own culture.

Contact the 2013 BYOE Research Team: Eden Dahlstrom Stephen diFilipo