Disruptive Technology and its Implications for University Information Services David Harrison, Cardiff University “Exploiting the Potential of Blogs &

Slides:



Advertisements
Similar presentations
How Will it Help Me Do My Job?
Advertisements

ENQA seminar:First external evaluations of quality assurance agencies – lessons learned Panel discussion: Practicalities and challenges of self and external.
A centre of expertise in digital information managementwww.ukoln.ac.uk Approaches To E-Learning: Introduction Brian Kelly UKOLN University of Bath Bath,
UKOLN is supported by: Using Blogs Effectively Within Your Organisation Case Study 1: The UK Web Focus Blog Brian Kelly UKOLN University of Bath Bath,
Bonnygate Primary School
CILIP 2007 with huge thanks to Ed Mitchell edmitchell.co.uk Knowledge networks, communities of practice, communities of interest and all that stuff…. Lyndsay.
Barry Spencer eLearning Barry Spencer eLearning Development Coordinator Bromley College.
Servicing 'Core' and 'Chore': A framework for understanding a Modern IT Working Environment David Harrison and Joe Nicholls Cardiff University.
© 2003 IBM Corporation Preparing for Privacy Society of Internet Professionals January 19, 2004 Nigel Brown Senior Privacy.
Recently.... The IfA has began a major new initiative to establish an Academic Special Interest Group (SIG) The IfA Registered Organisations Committee.
Higher Apprenticeship and Graduate Recruitment Complementary Approaches to Expanding the Talent Pool – A Professional Services Example Sara Caplan Partner,
PwC David Devlin 23 April 2002 Auditor Independence in a Global Market Place.
ICT Curriculum Evening – an introduction to Wizkid.
Mary Lou Roberts SOCIAL MEDIA MARKETING STRATEGY January 2010.
Gather round for some Rumour, Hearsay & Scuttlebutt.
Stress: manager’s training
Grade 5 Student Assistants
Opportunities & Implications for Turkish Organisations & Projects
Standards and Guidelines for Web Page Publishing December 9, 2009.
Internal Auditing and Outsourcing
What tech Is your family using?. Raising Digital Citizens.
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
WIKI IN EDUCATION Giti Javidi. W HAT IS WIKI ? A Wiki can be thought of as a combination of a Web site and a Word document. At its simplest, it can be.
ICT Coalition Meeting and Stakeholder Forum November 26/27 Brussels.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Social Media Exploring Social Media to Enhance Interactive Communication and e-Learning for Students in Higher Education Billy Rector Texas Southern University.
COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Maryland Digital Government Summit.
Meeting the DET interview panelThe Literacy Project: possibilities and parameters The purpose The parameters The possibilities An Action Research Project.
© 2008 IBM Corporation ® Atlas for Lotus Connections Unlock the power of your social network! Customer Overview Presentation An IBM Software Services for.
The Brain Project – Building Research Background Part of JISC Virtual Research Environments (Phase 3) Programme Based at Coventry University with Leeds.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
About Reasonable Accommodation ADA Trainer Network Module 3c 1 Trainer’s Name Trainer’s Title Phone /Web Page.
Social Media for Business Communication
A centre of expertise in digital information managementwww.ukoln.ac.uk 1 A Risks and Opportunities Framework For Exploiting Social Web Services.
G:\99Q3\9220\PD\AJD2.PPT 1 Harriet P. Pearson Chief Privacy Officer IBM February 7, 2003 IBM.
A centre of expertise in digital information managementwww.ukoln.ac.uk Brian Kelly UKOLN University of Bath Bath, UK UKOLN is supported by: This work is.
Seventh National HIPAA Summit HIPAA Compliance Case Study: HIPAA and Academic Medicine - Lessons Learned Past, Present and Future.
Strategic Partnerships Program All Networks Meeting – Metropolitan Briefing - 29 February 2008 Dianne Peck General Manager, Student Learning Programs.
A centre of expertise in digital information managementwww.ukoln.ac.uk Exploiting The Potential Of Wikis: Introduction Brian Kelly UKOLN University of.
Brian Kelly, UKOLN IWR Information Professional of the Year Resources bookmarked using ‘ ucisa ' and ‘ cliwg ’ tags UKOLN is supported by: Communicating.
A centre of expertise in digital information managementwww.ukoln.ac.uk Beyond - Strategies For Collaborative Working In The 21st Century: Welcome.
A centre of expertise in digital information managementwww.ukoln.ac.uk Lessons Learnt From FOAF: A Bottom-Up Approach To Social Networks Brian Kelly UKOLN.
The partnership principle and the European Code of Conduct on Partnership.
UKOLN is supported by: Introduction To Blogs And Social Networks For Heritage Organisations: Sharing Best Practices Brian Kelly UKOLN University of Bath.
Social Media for Business Communication Chapter 8 © 2016 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not.
Fourth IABIN Council Meeting Support to Building the Inter-American Biodiversity Information Network.
UKOLN is supported by: Effective Use of the Social Web in Organisations: Introduction Brian Kelly & Ann Chapman UKOLN University of Bath Bath, UK
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
UKOLN is supported by: Using Blogs, Micro-blogs and Social Networks Effectively Within Your Library: Beyond Blogs: Micro-blogs & Social Networks Brian.
Welcome Managing concerns and complaints How should schools handle complaints? This session links to guidance from the DfE and local authorities, and looks.
Safeguarding Adults Care Act 2014.
Angela McKinnon Child health lead Aberdeenshire CHP NHS Grampian Jan 2015.
SEND Cluster ‘Host’ Training Introduction Judith Carter – Senior Adviser Complex Needs/Vulnerable Learners Education Achievement Improvement and Governance.
Health and Social Care Action Group A Human Rights Based Approach in action – Care about Rights.
Middle Managers Workshop 2: Measuring Progress. An opportunity for middle managers… Two linked workshops exploring what it means to implement the Act.
Child Safe Standards How effective is your leadership team in promoting a child safe culture in your organisation? 2 June 2016.
Community of Practice K Lead Project Team: الالتزامالتحفيز التفكير المؤسسي المرونةالتميزالشراكةالاستقامة.
Employee Guide: Working on a Virtual Team
BCOM 5 7 Communicating Electronically LEHMAN/ DUFRENE
E-Safety Briefing
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Brian Kelly UKOLN University of Bath Bath, UK
DIGITAL ETIQUETTE The etiquette, or behavioural norms, we apply to situations will differ depending on who our audience is, the topic or issue we are dealing.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Internet Safety and Acceptable Use Policies.
Dan Bieler, Principal Analyst
Compliance with the Freedom of Information Act 2000
National data opt-out - Preparing for implementation
Levels of involvement Consultation Collaboration User control
Presentation transcript:

Disruptive Technology and its Implications for University Information Services David Harrison, Cardiff University “Exploiting the Potential of Blogs & Social Networks” UKOLN Workshop: November 2007

Disclaimer  Everything I’m saying is informed by my employment at Cardiff and the networks I’m part of and have involved myself in whether real (UCISA) or virtual (Facebook).  Everything I’m saying is a personal view or reflection upon what I’ve learnt or experienced, unless directly attributed to another person or organisation.  I’m wholly responsible for the contents of this session; it does not represent the views or policies of either Cardiff University or UCISA.

Why the need for a disclaimer?  Talking about things outside the “service offering”.  Talking about “user-centric” rather than “organisation- centric” issues.  Talking about issues that transcend organisational boundaries.  Talking about issues that break the traditional security and privacy models.  Talking about different ways of visualising the way Information Services operate. … none of which have any substance in standards, services, or policies … yet!

Starting point …  Brian Kelly and John Heap presented at an earlier UKOLN workshop two viewpoints on “disruptive technology” as viewed from the user and the service perspectives.  Discussion document produced which set out the potential conflict between users who want to do “new things” and the central service that has issues of support and security amongst its top concerns.  Discussed at UCISA Exec and the challenge was taken up to produce guidelines.

Our response in Cardiff  A first draft authored by Dr Joe Nicholls appeared in January 2007, first released in April 2007 for comment within UCISA Executive. Part 1 of the Briefing Paper is available at disruptive. disruptive  No intention to go through this but it provides the background for the thought processes being followed by many in Cardiff University.  This presentation considers some of the issues discussed in Part 2 of the paper.

Preparation and engagement  Get the buy-in of “corporate compliance” … make the IT Regulations - institutional ones - NOT just ones that refer to the use of central facilities.  Establish the principle (through practice and “case law” if necessary) that there’s nothing the user can do with “disruptive technology” that is different from their use of traditional technology … the location might be different but the primacy of the AUP remains and the referral to existing disciplinary processes should not change.  Be prepared therefore to relinquish sole responsibility for IT Regulations – your first lesson in partnership.

Practicing Safe IT  Users need protecting against themselves – if was comparable to sending a postcard, then social networking is comparable to a night out in the pub!  Guidance and advice on appropriateness of content, privacy and security is required … but not control.  Focus should be upon EDUCATION. help/safe/. help/safe/

Differing realms, identities and blogs  We work in different realms  Sometimes on our own and in a personal capacity  Sometimes in a way that shields our true identity  Sometimes in a work-related capacity  Sometimes as a member of an internal work group  Sometimes as a member of an external collaboration group  Sometimes as a member of an organisation  Sometimes as a contributor to someone else’s work  We work differently and use different language depending upon the context we find ourselves in

Corporate responses  IBM have taken a lead in encouraging employees to blog com/terra_nova/2007/ 08/ibms-virtual- wo.html com/terra_nova/2007/ 08/ibms-virtual- wo.html

IBM’s Guidelines  They have provided guidelines for blogging ibm.com/developerw orks/blogs/page/jasnell?e ntry=blogging_ibm ibm.com/developerw orks/blogs/page/jasnell?e ntry=blogging_ibm  And engagement in virtual worlds m.com/comm/research_p rojects.nsf/pages/virtualw orlds.IBMVirtualWorldGui delines.html m.com/comm/research_p rojects.nsf/pages/virtualw orlds.IBMVirtualWorldGui delines.html

Roo Reynold’s Webcast  Worth also looking at h/index.html?spres= h/index.html?spres=5 723

Different types of “blog”  Personal (but not corporate) – no need for this type of page to be hosted on corporate systems any more  Personal or Group (work-related) – corporate intranet for internal collaboration hosted on the corporate system  Group Internet Presence – for external collaboration with others of a “like mind” possibly hosted on an independent system  Corporate Internet – in support of the business hosted on the corporate system

Personal (but not corporate) no need for this type of page to be hosted on corporate systems any more

Personal or Group (work-related)  Corporate intranet for internal collaboration hosted on the corporate system – eg within Cardiff

Group Internet Presence for external collaboration with others hosted on an independent system

It’s just common sense  Need to adopt suitable language, style and identity depending on where you are  Need to have guidelines on usage and on what type of collaborative tool is best for what purpose – this goes across the whole gamut from IM, through chat rooms, , shared workspaces to blogs and wikis  Need to be supportive, rather than prevent

Concluding thoughts  There’s nothing different in Web 2.0 to what’s already being done – it’s just the medium that’s different  Users need protecting against their own foolishness – thus EDUCATION is the most important thing  Institutions should begin to trust their staff and students more but be also prepared to use existing disciplinary codes where the trust is betrayed  Must embrace and engage – to do otherwise would be counter- productive and make us look foolish – consider the concept of enablement  Should consider a partnership rather than service provider role and be customer-centric  Must consider where we’re going with work-life balance; for some they want separation – for others they want the flexibility at work that they give to work at home.