35
8/10/2019 Top 10 IT Issues, 2015: Inflection Point (252489129) http://slidepdf.com/reader/full/top-10-it-issues-2015-inflection-point-252489129 1/35 IT 10  EDUCAUSE review   JANUARY/FEBRUARY 2015 ILLUSTRATION BY STEVE McCRACKEN, © 2015

Top 10 IT Issues, 2015: Inflection Point (252489129)

Embed Size (px)

Citation preview

Page 1: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 135

IT

10 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5 ILLUSTRATION BY STEVE McCRACKEN copy 2015

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 235

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

By Susan Grajek and the 2014ndash2015 EDUCAUSE IT Issues Panel

C

hange continues to characterize the EDUCAUSE Top 10 ITIssues in 2015 The pace of change seems not to be slowing butrather is increasing and is happening on many fronts Thereis reason to believe that higher education information tech-nology has reached an inflection pointmdashthe point at which

the trends that have dominated thought leadership and havemotivated early adopters are now cascading into the main-stream This inflection point is the biggest of three themes

of change characterizing the 2015 EDUCAUSE Top 10 IT Issues (see Figure 1) A second dimension of change is the shifting focus of IT leaders and profes-sionals from technical problems to business problems along with the ensuinginterdependence between the IT organization and business units Underlyingall this strategic change the day-to-day work of the IT organization goes on Butchange dominates even the day-to-day where challenges are in some ways morecomplex than ever This ldquonew normalrdquo is the third theme of change

TOP 10

IT ISSUES2015

Inflection

Point

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 335

12 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Themes ofChange

Inflection PointChange Itrsquos a song thatrsquos been playingeverywhere the last several years Yoursquovebeen humming the tune perhaps danc-ing to its rhythm You may not knowall the words but everyone knowsthe refrain ldquoMobile-Cloud-Big Data-Business Value-Agile-Transformation-Social-Analytics-Online LearningrdquoSome people know just a verse or twosome know several and some are evenhelping to write new verses If change

has become a standard what is newabout 2015 Well nothing has changed

And everything has changed Informa-tion technology has reached an inflec-tion point

Mathematically an inflection pointis a point of change on a curve in whichthe concavity sign reverses Colloqui-ally the term is used to describe a turn-ing point that results in extraordinarychange Andy Grove Intelrsquos former CEOdescribed a strategic inflection point as ldquothat

which causes you to make a fundamentalchange in business strategyrdquo1 As Erik Brynjolf sson and Andrew

McAfee assert in The Second Machine Age this all comes back to Moorersquos Law whichposits a cyclical doubling of computingpower2 This doubling represents a rateof growth that is exponential Perhapsthe most vivid illustration of the powerof exponential growth is Ray Kurzweilrsquosconcept of the second half of the chess-board3 This concept is based on a legendabout the invention of chess When the

emperor asked the creator of chess toname his reward for having invented thegame the inventor requested that forthe first square of the board he wouldreceive one grain of wheat two for thesecond square four for the third squareand so forth doubling the amountfor each square Kurzweil noted thatalthough such an exponential growthpattern accrues only modest quantitiesat the beginning when the second half

FROM TECHNICAL TO BUSINESS

2 Optimizing the use of technology in teaching and learningin collaboration with academic leadership includingunderstanding the appropriate level of technology to use

3 Developing IT funding models that sustain core servicesupport innovation and facilitate growth

4 Improving student outcomes through an institutionalapproach that strategically leverages technology

5 Demonstrating the business value of informationtechnology and how the IT organization can help theinstitution achieve its goals

INFLECTION POINT

1 Hiring and retaining qualified staff and updating theknowledge and skills of existing technology staff

6 Increasing the IT organizations capacity for managing changedespite differing community needs priorities and abilities

9 Developing an enterprise IT architecture that can respond tochanging conditions and new opportunities

10 Balancing agility openness and security

FIGURE 1 Focus Areas of the 2015 Top 10 IT Issues

THE NEW NORMAL

7 Providing user support in the new normalmdashmobile onlineeducation cloud and BYOD environments

8 Developing mobile cloud and digital security policiesthat work for most of the institutional community

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 435

14 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

of the chessboard is reached the ensu-ing increases produce almost unimagin-ably large amounts Viewing the impactof Moorersquos Law from this perspective

we can see that technology will at somepoint reach the second half of thechessboard Brynjolfsson and McAfeeposit that this has already happenedand they call it the second machine ageldquoComputers and other digital advancesare doing for mental powermdashthe abil-ity to use our brains to understand andshape our environmentsmdashwhat thesteam engine and its descendants did formuscle powerrdquo4 Analytics cloud mobiledevices social media and online educa-tion might all be viewed as the fruits of

the second machine age IT architectureprocess optimization service manage-ment and risk management are efforts tomanage this overwhelming bounty

The second half of the chessboard isone reason for the inflection point wehave reached A second is related to thetechnology adoption curve Individu-als and institutions adopt technology atdifferent rates a few are on the bleedingedge a few are the last to change andmost fall somewhere in the comfortable

middle of the bell curve of adoptionThe higher education community isno exception (see Figure 2) In Crossingthe Chasm Geoffrey Moore describes apause or chasm between early adopt-ers and the mainstream5 An inflectionpoint in adoption is reached when main-stream adopters cross that chasm andbegin to enter a marketplace As Mooredescribes it they are motivated not bythe desire to innovate (which motivatesearly adopters) but by the need to solvea problem that their current solutions

cannot address a need that activates anotherwise cautious group When solu-tions become available that address theirparticular problems members of thatgroup will adopt new technologies

The present inflection point in highereducation information technology islikely due to improving solutions incloud analytics bandwidth and othertechnologies very real problems of costproductivity and student success and

1 Hiring and retaining qualified staff and updatingthe knowledge and skills of existing technologystaff

2 Optimizing the use of technology in teachingand learning in collaboration with academicleadership including understanding theappropriate level of technology to use

3 Developing IT funding models that sustain coreservice support innovation and facilitate growth

4 Improving student outcomes through aninstitutional approach that strategically leveragestechnology

5 Demonstrating the business value of informationtechnology and how technology and the ITorganization can help the institution achieveits goals

6 Increasing the IT organizationrsquos capacity formanaging change despite differing communityneeds priorities and abilities

7 Providing user support in the new normalmdashmobile online education cloud and BYODenvironments

8 Developing mobile cloud and digital securitypolicies that work for most of the institutionalcommunity

9 Developing an enterprise IT architecture thatcan respond to changing conditions and newopportunities

10 Balancing agility openness and security

Top 10 IT Issues 2015

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

the useful examples and learnings ofinnovators among our highly collegialcommunity This inflection point ishitting IT organizations hard As theystretch and struggle to help colleges anduniversities use technology to addresschallenges of student success afford-ability and accountability IT organiza-tions are retooling and restructuring toadapt to challenges of their own Thosechallenges include ensuring a stable

qualified and adaptable IT workforceand a clear and adaptable enterprisearchitecture In both cases ldquoadaptablerdquomeans the ongoing ability to respond tochanging technologies and solutionsThose changes are transforming both ITinfrastructure which is generally trans-parent to end users and IT services andsolutions which are very much on theminds of end users and in the strategiesof higher education leaders IT organiza-tions are struggling to manage both thepace and the volume of change on all

levels And anyone who has experienceda new system rollout knows how impor-tant good change management is to thesuccess of an initiative Managing infor-mation security in the light of ongoingnew technology opportunities for bothIT and higher education professionalspresents another set of challenges

Collectively IT leaders and profes-sionals may feel deluged by the volume

variety and pace of change In response

to that deluge many IT leaders areadopting a strategic approach to changethrough the use of frameworks for suchactivities as service management ven-dor management risk managementIT architecture information securitymanagement project managementprocess management and capabilitymaturity management On the surfaceframeworks may seem restrictive andbureaucratic which accounts for the

past reluctance by many in higher edu-cation to adopt them However at theirbest frameworks can provide stabilityin times of change by creating repli-cable and scalable environments that canadapt gracefully to new and changingcircumstances

From Technical to BusinessBridging the gap between technologysolutions and business problems is achallenge that many IT leaders are strug-gling to address Moving from the role

of technology leader to business leaderis the second major theme of the 2015EDUCAUSE Top 10 IT Issues

Perhaps most exciting this themehighlights the challenge of deliveringIT solutions that can address two of themost pressing issues in higher educationhow to apply technology to teaching andlearning and how to improve studentoutcomes To solve these strategic insti-tutional problems the IT and academic

communities need to collaborate andcocreate Each group has a different viewof the problem possesses different rele-

vant expertise and plays a different role

in the solution Further many solutionsthat were previously accessible only totechnologists are now available to endusers who are adopting applicationswith sometimes serious implications forinformation security data managementand IT architecture All this calls for theIT organization to recast its relationshipwith administrative and academic areas

This second theme is also relatedto the need to reach across the whitespace in the institutionrsquos organizationalchart so that the IT department better

understands the needs of the institutionand so that institutional leaders betterunderstand the exciting potential ofinformation technology and the timeresources and executive commitmentrequired to achieve that potential Thesuccess and perhaps even the survivalof higher education are more dependentthan ever on technology Members ofthe 2014 EDUCAUSE IT Issues Panelreport that many institutional leaders

believe that technology solutions areboth easier and less expensive than theyactually are Because those executivesare also increasingly interested in usingtechnology to achieve strategic goalsmany IT leaders are struggling to manageexpectations without losing credibilityor attention On the other hand some ITleaders are struggling with a different setof problems how to communicate moreeffectively with institutional leaders

FIGURE 2 Technology Adoption Curve for Higher Education Institutions

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

We are usually among the very firstto adoptnewtechnologies

3

43

We tend toadopt new technologiesafter our peersdo so

We tendto adoptnewtechnologiesat the paceof our peers

We strive to beearly adoptersof new technologieswhere we seeexceptionalbenefits

We are oneof the lastto adoptnewtechnologies

3

24

27

Movingfrom the role of

technology leaderto business leader is

the second majortheme of the

2015 EDUCAUSETop 10 IT Issues

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 635

16 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

and how to influence uninterestedleadership

Funding has made the EDUCAUSETop 10 list every year This year the chal-lenge with funding is to ensure that insti-tutional leaders understand the need tofund the entire IT portfolio so that theIT organization is capable of supportingthe aspirations ongoing operations andgrowth of the institution

The New NormalIn the midst of so much change chal-lenge and opportunity IT organiza-tions continue running core servicesand supporting end users IT staff stillgo into fire-fighting mode more oftenthan they would wish But even normaloperations are subject to the forces ofchange

Most notably bring-your-own-device

(BYOD) digitization and associated tech-nologies and opportunities are changingthe nature of user support and appropri-ate security policies In the first instancethe IT organization needs to retool andredefine its support strategy In the secondsecurity policies must comply with regu-latory requirements to protect data andprivacy without hamstringing academicsand administrators

Mark C Adams

Vice President for Information

Technology

Sam Houston State University

Mark I Berman

Chief Information Officer

Siena College

Christian Boniforti

Chief Information Officer

Lynn University

Michael Bourque

Vice President Information

Technology Services

Boston College

Karin Moyano Camihort

Dean of Online Learning and

Academic Initiatives

Holyoke Community College

Keelan Cleary

Director of Infrastructure andEnterprise Services

Marylhurst University

Jenny Crisp

QEP Director and Assistant

Professor of English

Dalton State College

Patrick Cronin

Vice President of Information

Technology

Bridgewater State University

Lisa M Davis

Vice President for Information

Services and ChiefInformation Officer

Georgetown University

Andrea Deau

Director of Information

Technology

University of Wisconsin

Extension

Patrick J Feehan

Director IT Policy and

Cybersecurity ComplianceMontgomery College

Steve Fleagle

Chief Information Officer and

Associate Vice President

The University of Iowa

Tom Haymes

Director Technology and

Instructional Computing

Houston Community College

Richard A Holmgren

Vice President for Information

Services and Assessment Allegheny College

Brad Judy

Director of Information

Security

University of Colorado System

James Kulich

Vice President and Chief

Information Officer

Elmhurst College

Jo Meyertons

Director Educational

Technology

Linfield College

Kevin Morooney

Vice Provost for Information

Technology and Chief

Information Officer

The Pennsylvania State

University

Angela Neria

Chief Information Officer

Pittsburg State University

Celeste M Schwartz

Vice President for InformationTechnology and College

Services

Montgomery County

Community College

Paul Sherlock

Chief Information Officer

University of South Australia

Francisca Yonekura

Associate Department Head

Center for DistributedLearning

University of Central Florida

EDUCAUSE IT Issues Panel Members

2014ndash2015

The EDUCAUSE IT Issues Panel comprises individuals from EDUCAUSE member institutions to provide quick feedback to EDUCAUSE on current issues problems andproposals across higher education information technology Panel members who are recruited from a randomly drawn and statistically valid sample to represent the EDUCAUSEmembership serve for eighteen months with staggered terms Panel members meet quarterly for ninety minutes via webinar or in person The meetings facilitated byEDUCAUSE Vice President Susan Grajek are designed as an ongoing dialogue to flesh out and refine an array of open-ended technology questions about the IT organizationthe institution and cross-institutional boundaries The members discuss refine and vote on the most relevant underlying issues or options

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Issue 1Hiring and Retaining

Qualified Staff andUpdating the Knowledge

and Skills of ExistingTechnology Staff

The long-held notion that infor-mation technology has threecritical dimensionsmdashpeopleprocess and technologymdashis stilltrue today Behind every suc-

cessful implementation of technology is

a group of talented people ensuring thateverything goes according to specifica-tions to meet the needs of the studentsand faculty Recruiting and retainingexceptional staff with the requiredknowledge skills and attitudes is not asmall feat Higher education competesfor talent in an extremely competitiveenvironment The technology fieldcurrently has very low and in someregions virtually no unemployment

As higher education competes with allindustries those of us in academe are

operating in an environment in whichchange comes quickly whether in tech-nology business disciplines or our coremissions of teaching and research Toattract maintain and retain the neces-sary talent higher education IT organi-zations need to adjust and adapt

Todayrsquos IT workforce needs are dif-ferent from needs in the past We need awide array of skill sets for roles that areevolving quickly The field of informa-

tion technology has always demandedthat professionals retrain and retoolto be able to design and support thelatest technologies Thus the ongoing

evolution of technical skills is not newHowever the very models for provid-ing and supporting technology-basedservices are in flux today This set ofchanges requires staff to be not onlyadept at retooling but also capable ofreinventing their roles And those rolesdemand entirely new skills To be ableto deliver the technology solutions thatstudents and faculty presently needwhile preparing themselves to lead theinstitution to adopt innovate or inventfuture technological advances IT staff

need such nontechnical qualities as ini-tiative grit adaptability and emotionalintelligence

Retaining talented staff requires aculture of teamwork that supports andencourages the growth of the individualand the team Management needs tofoster a vibrant workplace in whichdiversity is valued and individuals feelrespected Management must also rec-ognize that employeesrsquo views of satisfac-tion with their jobs are based on their

collective experiences ranging fromsalary to the culture of water-coolerdiscussions (see Figure 3) Leadersmust remember that every employeehas unique issues and methods of com-

municating so at times retention willcome down to one-on-one discussionsto understand employeesrsquo needs andto help employees understand their

role in the larger IT and institutionalstrategy Team members need to feelengaged with the organization and itsmission and they need to sense align-ment of their efforts with somethingimportant (eg mission) to have a senseof purpose With this sense of purposethey are more likely to be committed tothe institution But with such long-termcommitments also come the expecta-tion of ongoing skill development andcareer advancement opportunities

For performance management to

be successful it must become a criticaland continuous part of the operationsof the IT organization Managers mustensure that staff are aware of their fullbenefits packages and of leadershipefforts to provide a fulfilling and enjoy-able work environment Many institu-tions offer benefits and local area perksthat employees are not aware of

Augmenting the challenge o f hiringqualified staff is the exponential speedat which technology is continuously

changing In light of this new normalmany current roles and even profes-sions will not exist in the future Newroles and professions will arise toaddress changing technology delivery

FIGURE 3 Top Reasons IT Management and Staff Leave Their Jobs

CIOs MANAGERS STAFF

At high risk of leaving 1 in 8 1 in 6 1 in 5

Personal career goals are unattainable

Not recognized for value aside fromcompensation

No opportunities to learn and grow in the past year

Institutional mission does not make me feelmy job is important

Not compensated fairly

Based on rated importance of working in higher education combined with reported likelihood of pursuing opportunities outside theinstitution

Source Jacqueline Bichsel Todayrsquos Higher Education IT Workforce (Louisville CO ECAR January 2014)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 835

18 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

pedagogical and research methods and higher education business models

Not all staff will be able to recognize or adapt to these changes Managersneed to help staff recognize and prepare for new oppor tunities to minimizethe disruption Change affects not only the individuals who are disruptedbut also those staff who are bystanders witnessing the change and anticipat-ing the worst

Fortunately IT management is not without support That support b eginsby building a partnership with the Human Resources department (HR) Asuccess for the IT organization is a success for HR

Advice983150 Know how to sell the value of a career that contributes to the advance-

ment of higher education and its teaching learning and researchmissions983150 Develop a list of the nonmonetary benefits of working for the institution

and share that list with staff983150 Hire staff not just for their fit for the job but also for their emotional

intelligence and fit with the values and culture of the IT organization andthe institution At the same time remember that the strongest teams arethose that are most diverse so strive for a heterogeneous workforce thatshares a common set of core values

983150 Work with staff to select appropriate training Funding and facilitatingtime for training and travel is only part of the process Establish somedeliverables and accountability for the training so that employees returnto the office with the anticipated insights and skill set

983150 Work with HR to develop career paths for the major divisions of or rolesin central and distributed IT units Careers paths donrsquot have to stay withinthe IT organization consider lateral paths that can broaden someonersquosinstitutional or business experience Develop paths that reward knowl-edge work as well as managerial talent and understand that not everystaff member need aspire to leadership

983150 Create a talent plan for the IT organization itself Identify the skill setsand roles the organization will need to acquire and retire in the next oneto three years Create a roadmap to where the organization needs to headand begin working with HR now to implement the roadmap with as littledisruption as possible for individual staff and o perations

Issue 2Optimizing the Use

of Technology inTeaching and Learningin Collaboration with

Academic LeadershipIncluding Understandingthe Appropriate Level of

Technology to Use

C

olleges and universities con-tinue to invest in technologiesin support of teaching and

learning while struggling withways to help faculty understandthe value and potential impact of thesetechnologies An overlooked but criti-cal starting point is for an institutionto define its educational objectives andstrategy Institutions whose educationalculture is intentionally and predomi-nantly residential ones that serve manypart-time working commuters thosewith strong global outreach techno-logical institutes and institutions withstrong practicum orientations may all

grant similar degrees but will have verydifferent pedagogical strategies andtherefore different educational tech-nology needs Without a larger guiding

vision the application of technology toteaching and learning is neither strate-gic nor optimized it is instead a series ofendpoint solutions driven by individualfaculty requests and by the best (oftenuncoordinated) efforts of service pro-

viders throughout the institution

ldquoWe must be willing to combine someof the best benefits that business has to

offer (eg flexible work arrangements)with the strong selling points of a careerin higher education (eg connection withthe mission)rdquo

mdashMichael Bourque Vice President Information Technology Services

Boston College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

It is important to view technology asa supporting tool similar to earlier toolssuch as blackboardchalk Technolo-gies need to be carefully scrutinized

for their pedagogical implications Alt ho ug h on li ne co ur se s of fer th eallure of convenience and the opening(and thus increasing) of enrollments tostudents who might not otherwise beable to attend college in a traditionalmanner their pedagogical effectivenessshould be assessed as carefully as that oftraditional classroom courses Doing so

might identify gaps in overall pedagogi-cal assessment at an institution and thusimprove even face-to-face learning Thereal value of technologies is how facultyintegrate the technologies into theirteaching and learning and how they usethe technologies to further refine theircourse delivery and student engage-ment (see Figure 4)

If institutional leaders become moreintentional about their pedagogicalobjectives and assessment methodsthey will have the opportunity to influ-

ence the institutional technology mar-ketplace Todayrsquos solutions could bemuch more effective with better guid-ance from the leadership at colleges anduniversities

For example faculty often findthemselves overwhelmed with the vol-ume of new technologies and the ongo-ing upgrades of existing technologiesas they struggle to find time to researchhow to integrate the technologies into

their teaching Faculty new to onlinelearning will commonly try to replicatetheir physical classroom online butthis is a classic McLuhanesque mistake6

Optimizing the use of technology inteaching and learning depends on theability of the institutional and academicleadership to help faculty develop theirdigital competency and then to con-tinue to provide learning opportunitiesto keep their competencies currentFaculty need ongoing digital literacyopportunities that enable them to betterunderstand not only educational tech-nologies but also the social technolo-

gies that are affecting their everydaylives and the everyday lives of their stu-dents Those students expect engage-ment in their instruction Faculty need

to understand instructional narrativeand the implications of media as part oftheir technological introduction This ismore than just training on a particulartechnology It is as the saying goes thedifference between giving a man a fishand teaching him how to fish

The effective optimization ofinstructional technology also requiresrethinking reinforcing and clarifyingroles and relationships among faculty

ldquoFaculty armed with current understandingand research on the power and value

of technologies are more likely to usetechnology to enhance their pedagogicalapproachesrdquo

mdashCeleste M Schwartz Vice President for Information Technology and College Services

Montgomery County Community College

FIGURE 4 Integrating Technology into Courses

ldquoI could be a more effective faculty member if I were better skilled at integrating this technology

into my coursesrdquo

Percentage of respondents

3D printers

Non-keyboard or non-mouse computer interfacesSocial media as a teaching and learning tool

E-portfolios

Lecture capturerecordings

E-books or e-textbooks

Simulations or educational games

LMS

Online collaboration tools

Free web-based content

Agree Strongly agree

50250 75 100

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014 (Louisville CO ECAR July 2014)

The

real value oftechnologies is howfaculty integrate

technologies intoteaching and learning

and how they usetechnologies to further

refine course delivery andstudent engagement

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1035

20 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

librarians teaching and learn-ing center professionals and ITprofessionals They all need to

view themselves as colleag ues

and even partners in designingthe right infusion of technologyresources at the right time duringthe instructional process

Is all this a tall order Yes Butit is directed toward the primarymission of higher education andis thus well worth addressing Ifcollege and university leaders donot optimize the use of technol-ogy in teaching and learningexisting and emerging alterna-tives will almost certainly step

forward to fill the gap

Advice983150 Work with academic leader-

ship to articulate the institu-tional strategy for the use oftechnology in teaching andlearning to best fit the institu-tional culture and priorities

983150 Translate that strategy into ateaching and learning tech-

nology roadmap that pri-oritizes the technologies thatwill best achieve the institu-tional strategy and fit institu-tional resources

983150 Define and clarify roles insupporting instructionaltechnology to bring togetherall relevant institutionalparties as productively aspossible

983150 Move to a technology sup-port model that aligns tech-

nology integration supportand faculty professionaldevelopment that is courseprogram specific and basedon research that demonstratesimproved student engage-ment and success

983150 Ensure that faculty have suf-ficient support and releasetime to integrate the tech-nologies into their courses

Issue 3Developing IT Funding

Models That SustainCore Service

Support Innovation andFacilitate Growth

As governmental financial sup-port for higher educationcontinues to decline bothpublic and private institutionsare desperately trying to focus

scarce resources on strategically impor-

tant needsTo create funding models that willsustain IT operations IT leaders need toclarify to institutional leaders and boardsof trustees why IT services are strategi-cally important to the enterprise Articu-lating and making some of the toughstrategic choices explicit is fundamentalto developing a sustainable fundingmodel As the role of information tech-nology in higher education matures andas institutions are increasingly pressedto balance costs with tangible benefits

IT leaders will need to strengthen andleverage their relationships with gover-nance groups connect execution withstrategy and exploit funding models tiedto institutional strategy (see Figure 5)

EDUCAUSE defines gov ern anc e asldquohow a higher education institution isorganized for the purposes of decisionmaking and resource allocation andhow the varying parts are managed ina way that promotes the mission of the

institutionrdquo7 The distributed nature ofhigher education institutions thoughhighly effective in supporting innova-tion and meeting specialized needs can

be a roadblock to strategic investmentsand efficiency realization InstitutionalIT governance can help achieve andsupport a clear IT strategy When IT gov-ernance programs have influence over ashared pot of institutional resources andare able to prioritize strategic IT invest-ments IT leaders can support ongoinginnovation and growth across the entireinstitutional portfolio of functions Inthe absence of institutional IT gover-nance IT projects will be prioritizedaccording to which areas can most easily

secure funding for their priorities Inevi-tably worthy and even critical projectswill not be funded if they are not spon-sored by well-resourced areas

Capital funding is relatively easy tosecure obtaining additional operationalfunding is much more difficult Sincemost capital projects have an opera-tional impact the differential access tofunding streams can create significantproblems for budget managers To sat-isfy demand and remain competitive

leaders at higher education institutionshave allocated capital funds to coverthe development cost of new IT infra-structure yet they seldom incorporateplans for ongoing operational funding ofcapital projects As a consequence thereis a fundamental misunderstanding ofthe total cost of information technologyand often no culturally accepted billingmodels exist for one-time and full-life-cycle costs

To help governance groups under-stand and support funding for the real

cost of information technology IT lead-ers need to develop total cost of owner-ship (TCO) scenarios and vet them withappropriate groups before projects arefunded Higher education informationtechnology is dogged by cost-savingsexpectations that usually create a falsesense of expenditure reduction In somecases the benefit of the IT investmentderives from risk reduction or new func-tionality and cost savings are not to be

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

expected In other cases cost savingsare theoretically possible but difficultto achieve if non-IT changes such asbusiness process redesign are requiredto realize them Even if the project is

successfully completed funding mayneed to shift to derive real institutionalsavings For example an IT project thatintroduces efficiencies to academicdepartments or business units mayreduce costs for the departments or units

and also for the institution overall butthe project may increase IT costs To real-ize net savings for the institution budgetfunding needs to be withdrawn from thedepartment and a portion needs to be

directed to the IT organization to coverits increased costs with the balanceaccruing to the bottom line of the insti-tution When each department controlsits own budget those shifts and realloca-tions are very difficult to negotiate and

often fall apart eroding any potentialcost savings

Growth can be managed but doingso requires service management models

that are able to project and prepare forgrowth Those models need to includecost management to ensure that serviceproviders understand and budget forboth fixed and variable costs The pay-ing IT customersmdashwhether institutionalleaders or individual departmentsmdashneedto understand IT service cost drivers andhow they can help manage those driv-ers Funding for growth in variable costsis relatively easy to justify if IT servicemanagers have and can show data onboth growth and the associated costs

Funding for growth in fixed costs needsto be justified as well and that requiresdata on the cost increases and a justifi-cation of the risks that will be reducedthe functionality that will be added orenhanced or some other compelling

FIGURE 5 IT Spending on Institutional Activities

Institutionalgrowth

Running theinstitution

Transformativechange

1576 9

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1235

22 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

reason This approach also paves the way for discussions of tradeoffs that mightaccommodate growth without increasing funding such as service-level reduc-tions shared services or outsourcing

Supporting innovation is a key piece of IT resource justification Studentsexist in a digital ecosystem and expect educational institutions to interact withthem in the ways that they are used to interacting with each other and with thecommercial entities they deal with on a daily basis Banks retail stores andeven government services are available to them through a multiplying swarmof devices Institutional leaders are increasingly aware that higher educationneeds to deliver services in the same way and that the development of an ITarchitecture to do so takes resources To better afford the resources necessaryto keep institutions current the IT organization itself needs to be innovativein the way it is organized the way it delivers IT services and the way it workswith various institutional constituencies Recognizing that IT drivers andcore services in 2014 may not even remotely resemble those necessary in 2020

demands funding flexibility since too tight a correlation will act as a disincen-tive to improvement and will create technology lags greater than those of thelast decade

Different but rigorous strategies for IT core services growth and innovationwill help in the development of IT funding models that best fit these separateactivities and are aligned with the institution and its constituents Effective ITgovernance can tie these three activities together and prioritize the IT expensein ways that support existing operations ensure ongoing innovation andrespond to growth across the entire IT portfolio

Advice983150 Benchmark IT finances by participating in the EDUCAUSE Core Data

Service983150 Ensure that IT projects build models for ongoing operational funding into

project deliverables and expectations983150 Establish an institutional IT governance structure that is responsible for allo-

cating funding not just identifying IT priorities983150 Understand the costs and cost drivers of todayrsquos IT services983150 Help leadership understand both the costs and the benefits of information

technology Arguments for new IT initiatives should always include cost esti-mates as well as estimates of the costs of not innovating

983150 Build the costs of growth and maintenance into funding models for core ITservices

Issue 4Improving Student

Outcomes through anInstitutional Approach

That StrategicallyLeverages Technology

The benefits of completing acollege education are widelyknown They include higherlifetime earnings greater levelsof happiness increased civic

engagement and reduced health risks

There are also societal benefits as theproportion of college graduates in thepopulation increases So it is in our ownbest interests to help both individualsand society by improving the successof students at our higher educationinstitutions

There are few cases in which tech-nology by itself has helped studentssucceed However there are opportuni-ties for technology to support studentsuccess initiatives The first task for anyinstitution is to assess both the insti-

tutional needs and the most currentremedies for the pain points that areidentified Although this is a constantlyand rapidly evolving area some specificexamples include the following

983150 Developin g a training course (orworkshop) to help students under-stand the technology landscape ofthe institution and how they can usethose tools to succeed

ldquoWhen it comes to innovation is the ITfunding principle lsquoWe optimize new IT

investments for the entire institutionrsquo orlsquoWe optimize new IT investments for theindividual unitsdepartmentsrsquo or bothPricing models will emerge accordinglyrdquo

mdashKarin Moyano CamihortDean of Online Learning and Academic Initiatives

Holyoke Community College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Removing barriersmdashs uch as accessusability and lack of supportmdashto theeffective use of technology

983150 Using technology to recast large lec-

ture courses and support pedagogi-cal transformations

983150 Using technology to provide flex-ibility for students to match thecourse with their learning style

983150 Using technology to distributelearning content in multiple waysincluding lectures (live and archivedfor review) electronic texts andlearning management systems

983150 Using technology such as peertutoring discussion boards andg roup videoconferences (eg

Google hangouts) to facilitate syn-chronous and asynchronous inter-actions with others and to promotecollaborative learning

983150 Considering the emerging role oftools used traditionally by business(ie CRM) to manage the institu-tionrsquos relationship with the student

983150 Applying elements of what is beinglearned in competency-based edu-cation initiatives at an institutionallevel for traditional students

Institutional leaders continueto emphasize and pour resourcesinto improving student retentionand completion Technology can beapplied to develop the broad area oflearning analytics to provide feedbackto students on their behavior (both pastand predictive) to faculty on the effec-tiveness of the pedagogy employed inthe course to content providers (andfaculty who select the content) on theeffectiveness of the content used in the

course and to administrators on broadsystemic issues and trendsMany colleges and universities

have student success committees thatfocus on initiatives to improve coursecompletion program completion andstudent support services Examplesof initiatives can be found in the areasof teaching and learning and studentsupport services In the area of reme-dial education great strides have been

made in reducing time to completionfor remedial students and in increas-ing retention and completion rates Anexample of the work occurring in the

area of student success can be found onthe Achieving the Dream InterventionsShowcase website (httpachievingthedreamorgresourcesachieving-the-dream-interventions-showcase) withmany of those interventions strategi-cally leveraging technology

As data analytics tools have becomemore sophisticated institutionshave been better able to recognizestudentsrsquo challenges and track stu-dentsrsquo journeys With theimplementation of early

alert systems advisors andfaculty have been able toassist students with just-in-time intervention recom-mendations In addition itis becoming commonplacefor advisors to have access todata beyond the traditionalERP demographic and stu-dent gradesmdashdata such ascourse performance throughlearning management sys-

tems early alert informationtutoring participation andeducation planning informa-tion (see Figure 6) Systemslike these sometimes referred to asIntegrated Planning and AdvisingServices (IPAS)8 permit the advisor tosupport and coach students based ona comprehensive view of the studentsrsquoinformation throughout their educa-

tional journey In the area of onlineeducation too wraparound studentsupport services are mirroring the on-ground experience with some colleges

and universities implementing careercoaches with supporting technologiesto provide services to online studentsThe integration of technologies in eachof these areas has had a positive impacton improving student outcomes

A variety of existing tools many stillin the early development stages canhelp institutions gather data to identifystudentsrsquo success opportunities andtheir achievements This information

is only as good as the data however Tofind the low-hanging fruit IT leadersneed to begin the data conversationsto locate tools that may already begenerating useful data To capture rele-

vant aspects of the student experience

FIGURE 6 Technology for Supporting Education Planning Advising and Counseling and Early Alerts

Source EDUCAUSE Core Data Service 2013

46

66

73

Early alert systems

Education planningacademicprogress tracking

Academic advising

Percentage of institutions

Tocapture relevant aspects

of the student experienceleaders must think institutionally

and identify technologyresources that canbring together the

diverse and enormousdata sets that represent this

experience

(continued on page 26)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1435

To create sustainable IT funding models IT leaders need to

clarify to institutional leaders and boards of trustees why

IT services are strategically important to the enterprise

TOP 10 IT ISSUES

EVOLVING STAFFING MODELS

IMPROVING

STUDENT

OUTCOMES

OPTIMIZING TECHNOLOGY IN

TEACHING AND LEARNING

FUNDING IT STRATEGICALLY

soft skills

moreresources

professional development

clear goals networking

65

Technical proficiency is as important as ever

So skills are more important that ever before

higher education IT staff are not

satisfied with their current position

To be more effective IT

staff say they need

of students wish their

instructors would use

early-alert systems more

of central ITrsquos budgetis spent running the institution

is spent on growth

is spent on transformation

Students respond

positively to learning

analytics opportunities

not at allimportant

technical proficiencystrategic planning

effective communication

1

veryimportant

5

Top 3 motivators for faculty integration of technology

in the classroom

bull Clear indicationevidence that students will benefit

bull Release time to designredesign courses

bull Confidence that the technology will work as planned

1 in 4

Todayrsquos market for IT talent is competitive Hiring andretaining top talent requires engaged managers whopossess and know how to foster good communication skills

Faculty and students alike are

interested in learning analytics for

notifications on course progress

Although technology is omnipresent in the lives ofstudents leveraging technology to engage students in

meaningful ways and to enhance learning is still evolving

76

15

9

I think this is great

This sounds positive

I am neutral

This sounds negative

Irsquom totallyagainst this

Spending model

breakdown in the USdoes not differsignificantly by

Institution type

Size

Central IT staff size

CIO reporting line

25

0

50

75

100

E D U C

A U S E E

R E S

E A R C

H S N

A P S H

O T

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1535

A look into EDUCAUSE research on the 2015 list of the

most intriguing ideas in higher education IT

DEMONSTRATING

VALUE OF IT

DEVELOPING

SECURITY

POLICIES FOR

THE INSTITUTION

DEVELOPING ENTERPRISE IT

ARCHITECTURE

BALANCING INFORMATION

SECURITY AND OPENNESS

INCREASING CAPACITY

FOR CHANGE

PROVIDING USER SUPPORT

The gaps between effectiveness in and

importance of addressing risks are large

Percentage using the college or university help desk for support

Percentage looking to peers

Student Device Ownership

Between 2005 and 2014 there were 727 education-sector

data breachesmdashinvolving more than 14 million recordsmdashas

reported to the Privacy Rights Clearinghouse

locally integrate the

architectures of multiple

major systems

follow the architecture of a

primary system or suite

20142013

25

0

50

75

100

2015 projection

Smartphones

Tablets

86

47

31

76

58

90

Information security

Data privacyconfidentiality

Identityaccess management

66

66

84

82

79

70

36

1

33

29

The most important IT risks to

address concern security privacy

and access

In a world of increasing

complex security threats

institutions must move from

a reactive to a proactive security response

We are living in an era when readily

accessible technologies facilitate a

BYOD standard requiring institutions

to rethink user support

A well-defined enterprise IT architecture is instrumental to

optimizing opportunities and managing change effectively

The higher education community is

struggling with the pace variety and sheer volume

of change in information technology as well as the

corresponding risks

IT leaders need to draw the lines from

technology initiatives to their institutionsrsquo

changing strategic objectives and on to the

ultimate bottom lines of mission and means

OtherLossthestInternal threatsExternal threats

81of institutions

do notaddress IT risk

in their strategicplan

7357

69

22

Faculty

Students

effectiveness

importance

effectiveness

importance

effectiveness

importance

6 3 10 10

Breachcauses

53Administration

37Teaching

and learning

10Researchother

Percentage of IT spend by institutional mission

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1635

26 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

leaders must think institutionally and identify technology resources that

can bring together the diverse and enormous data sets that represent thisexperience

As was discussed last year when this was the 1 issue in the 2014 Top 10list looking at this data may raise privacy issues so leaders must rememberto include the appropriate individuals in these discussions to ensure compli-ance security and privacy

Advice983150 Keep in mind that students consider success from a holistic view of their

campus experience not necessarily their experience with just a courseor a semester To maximize the impact of technology identify the combi-

nation of data and tools that will encompass as much of the institutionalexperience as possible983150 Remember that results will be only as good as the data Take time in the

beginning to build a reliable strategic foundation by starting with conciseoutcome objectives and then develop t he data-driven questions that willultimately define actionable steps to influence success

983150 Work with key individuals from various institutional areas to identifydata that may be available at an individual student level and that could becombined with other values to establish an assessment point for the stu-dent Next consider comparing this assessment point with the studentrsquossuccess level and attempt to identify some trends Drill down to indica-tors that can be used as targets for predicting success and for identifyingearly warning signs

983150 Ensure that the project is embedded in a cross-institutional student suc-cess effort that includes all relevant parties Dedicated student successteams or cross-departmental governance structures can be the vehiclefor organizing consensus Donrsquot allow a perception of IT ownership todevelop

983150 Resolve problems in academic and business processes before implemen-tation donlsquot adapt applications to dysfunctional processes

983150 Define the role of faculty in improving student outcomes through thestrategic leveraging of technology

983150 Determine how much individualized student data should be shared withadvisors in supporting improved student outcomes

Issue 5Demonstrating the

Business Value ofInformation Technologyand How Technology

and the IT OrganizationCan Help the Institution

Achieve Its Goals

IT leaders need to continue to get bet-ter at drawing the lines from technol-ogy initiatives to their institutionsrsquochanging strategic objectives and on

to the ultimate bottom lines of mis-sion and means Successfully demon-strating the business value of informationtechnology to the institution begins withdeveloping a clear understanding of the

various ways in which technology as awhole and the IT department as a unitadd value to the institution Institutionalleadersrsquo struggle to respond to changingpublic perceptions of the value of highereducation itself is a complicating factorHerein lies an opportunity for IT profes-sionals not only to demonstrate the value

of the IT organizationrsquos particular offer-ings but also to create new and significant value for the institution This requiresthinking of technology strategy as both aconsequence and a driver of institutionalstrategy IT leaders who have the abilityto see the entire institutional landscapeand can offer strategic insights for movingthe institution forward have never beenmore important to the well-being of col-leges and universities

ldquoInstead of reacting to new technologiestop institutions seek out new technologies

as a strategic imperative leveraging theseinnovations to improve learning insideand outside the classroom with datadecision making enhanced pedagogy andbetter student outcomesrdquo

mdashLisa M Davis Vice President for Information Services and Chief Information Officer

Georgetown University

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

So in what ways do IT leaders add value They add value to the organizationby enhancing the core productmdashnamelythe learning experiences of students and

the teaching activities of faculty They add value very directly by creating new chan-nels through which students can accessinstitutional offerings The channels thatonline opportunities provide would notexist without the technologies deliveredand supported by the IT organizationFrom a business perspective this cre-ates new sources of revenue a criticalobjective for virtually all colleges anduniversities Drawing a clear line that con-nects specific technology initiatives withtangible revenue for the institution is a

powerful way to demonstrate the busi-ness value of technologymdashand of the ITorganization

And of course the yin of revenue isbalanced by the yang of cost reductionStories of expense reduction and effi-ciency are perhaps easier to identify andtell and they should be carefully and dili-gently told but IT leaders must be carefulto also emphasize the much larger poten-tial that a clear focus on the revenue sidecan provide Doing so can help to avoid

the impression that the value of informa-tion technology is limited to simple actsof automation and efficiency Part of thiswork entails ensuring that the institu-tional leadership understands what is andis not possible Many times the need tohave the value discussion in the first placeis because leaders are not inherently feel-ing the value Those in the IT organiza-tion must take the time to develop andprovide clear data-based informationabout the services they deliver and valuethey provide

One way to demonstrate value iswith well-constructed service portfoliosand service catalogs A service portfolioprovides a high-level overview of howfunds are spent on major institutionalstrategic and operational goals and isgeared toward institutional leaders Aservice catalog (see Figure 7) provides amore detailed view into how IT dollarsare spent on IT projects products andservices and is geared toward IT leaders

Combined the service portfolio and theservice catalog can be a useful tool forshowing the business value of the invest-ments that institutions make in informa-tion technology

Assembling a service portfolio andcatalog may be the IT organizationrsquos firstcomprehensive view into the actual valueit is bringing to the institution Depend-ing on that value IT leaders may first needto focus on quick fixes to better align theirservices with the institutional mission

Before IT leaders can advocate howinformation technology can be leveragedto drive the business the IT organiza-tion must be operationally effective andefficient Institutional and business unitleaders must view the IT organizationas providing operational excellence andoutstanding customer service before theywill consider it as a partner in deliveringbusiness value

The CIO and IT leadership teamsshould remember that they are the pri-mary marketing avenue for sharing the

value that information technology bringsto the institutional mission IT leadersspend about 10 percent of their time ongovernance and planning and on innova-tion with business and academic units9 IT leaders thus must be intentional aboutidentifying opportunities for communi-cating how the IT organization is help-ing the institution CIOs must establish

strong and trusting relationships withtheir peer business leadersSharing the value of information

technology begins with IT leadership butmust extend to the entire IT organization

All IT staff must understand how theirwork contributes to the institutional mis-sions and priorities They need to under-stand the IT organizationrsquos capabilitiesand priorities and how the organizationcan advance the institution the indi-

vidual business units and the faculty stu-dents and staff with whom they work IT

leaders can encourage and enable IT staffto learn the mission business processesand requirements of business units inorder to understand how informationtechnology can best be leveraged Get-ting to this point may require a culturechange within the IT organization At the

very least all IT staff should know boththe institutional and the IT priorities toensure that everyone is telling the samestory

FIGURE 7 Percentage of Institutions with a Service Catalog

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

32

17

29

40

56

62

Source EDUCAUSE Core Data Service 2013

IT leaders add value

to the organization byenhancing the core

productmdashnamely thelearning experiences of

students and the teachingactivities of faculty

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1835

28 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Advice983150 Map IT priorities to institutional priorities Find the points of intersection

with the business unit operations customers and technology Partnerwith the business unit to develop a roadmap and to align the business withthe IT architecture

983150 Donrsquot wait for an invitation to discuss business and customer impact Butdonrsquot try to boil the ocean keep focused and be clear about what the IT

organization can and cannot do IT leaders must be translators usingterminology that resonates with non-IT experts and connecting the dotsbetween the technology capabilities and the business needs Develop asmall set of short and simple stories about concrete ways in which tech-nology has improved the learning experience at the institution createdaccess to institutional resources strengthened affinity for the institutiongenerated revenue and streamlined operations Focus at least as much onhelping others see what is possible with technology as on showing howtechnology investments improve current institutional life

983150 Develop a service catalog to serve as a base for connecting the work of theIT organization to the larger institutional strategic objectives

983150 Implement a metrics program that can demonstrate the extent to which theIT organization is achieving its service-level goals customer-satisfaction

goals and financial goals and is delivering on strategic priorities983150 Ensure that IT leaders and IT staff understand what drives academic and

business value for the institution and can identify and articulate how tech-nology can deliver that value Consider attending non-technology confer-ences to learn how business officers faculty and academic leaders thinkabout technology and what their pressing problems are Be the translatorfor business strategy

983150 To reach the broader institutional community consider newslettersbrown-bag gatherings and roundtable discussions and take advantageof recurring events such as National Cyber Security Awareness Month(httpwwweducauseeduncsam) and start-of-the-semester gatherings

Issue 6Increasing the IT

Organizationrsquos Capacityfor Managing Change

Despite DifferingCommunity Needs

Priorities and Abilities

Change is the watchword todayand going forward In the 2011book Race against the Machine MIT economists Erik Bryn-jolfsson and Andrew McAfee

write ldquoAdvances like the Googleautonomous car Watson the Jeop-ardy champion supercomputer andhigh-quality instantaneous machinetranslation then can be seen as thefirst examples of the kinds of digitalinnovations wersquoll see as we move into the phase where exponentialgrowth yields jaw-dropping resultsrdquo10

When technology changes organiza-tions are always challenged to adapt tonew circumstances This is par ticularlytrue of the organizations tasked with

implementing and maintaining thetechnology itselfThe higher education community

is struggling not only with the pace ofchange in information technology butalso with the variety and sheer volumeof change Information technology isincreasingly important to and increas-ingly integrated with all aspects ofboth the strategic and the operationalfunctions of the campus The chal-

ldquoWe also add value by creating newways for those who know us less well to

develop affinity with our institutions Asmall MOOC my college offered made usknown to groups of prospective studentswho would never have paid a momentrsquosattention to any traditional advertisingmessages we might have sent By joiningtheir party first via our technologies weput ourselves in a much better position to

invite them to our partyrdquomdashJames Kulich

Vice President and Chief Information OfficerElmhurst College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

lenge is how to engage multiple areasof the institution and expand servicesin numerous simultaneous initiativesMeanwhile institutional informa-

tion technology is reengineering itsinfrastructure platforms and servicesThose change efforts are often additiveto the applications being introduced aspart of new business-area initiatives

Ideally the institutional stancetoward change is proactive and ITleaders have the vision and good senseto advocate to broker and to preparetheir various constituents for upcom-ing changes while sustaining ongo-ing operations In reality end users

vary widely in their predisposition to

technology As a group students andfaculty are positively disposed towardinformation technology but as indi-

viduals they run the gamut (see Figure8) And attitudes influence behaviorthe way faculty and students adopt and

FIGURE 8 Relationship between Faculty Attitudes toward Online Learningand Their Experience with Online Teaching

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014(Louisville CO ECAR July 2014)

Percentage of respondents who agree or strongly agree

No recent onlineteaching

Some recentonline teaching

50250 75 100

All respondents

Online learning helps students learn more effectively

Online learning will lead to pedagogical breakthroughs

Online learning will make higher education available to more students

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2035

30 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

use technology tends to reflect theirattitudes11

The IT organizationrsquos history of exe-cution can influence community open-ness toward future technology changesThe shadow cast by a deeply flawed ERPimplementation for example can last adecade or longer

Change management is preciselythat managing change rather than lettingchange happen on its own (see Figure 9)

Successful change management is notaccidental or organic It is intentionaland has multiple components Manyinstitutions adopt a specific approachto implementing changemdashapproachessuch as ADKAR Kurt Lewinrsquos changemanagement model and John Kot-terrsquos eight steps12 Regardless of the

model managing change requires astrategy in which the goals and focusof the change are clear to internal andexternal constituents For examplethe corporate consultant Glenn Llopisadvises being able to identify what thesuccessful implementation of a changestrategy would look like knowing whatthe change strategy is trying to solveand identifying the required resourcesand relationships to implement the

change management strategy

13

As theIT organization sifts through the differ-ent needs abilities and priorities of theinstitution and tries to adapt to changeit must avoid being caught in a viciouscircle of tactics with no purpose

A good change management strat-egy has multiple components which

include communications and inclu-siveness John Jones DeAnne Agu-irre and Matthew Calderone provideten sensible principles for managing

change by keeping the human elementat the center14 Involving every level ofan organization creating ownershipassessing the cultural landscape andcommunicating effectively are keyfactors Change always affects some-body somewheremdashboth internally andexternally IT organizations must doeverything possible to find engagedpeople who can advocate on behalf ofthe change strategy It helps to havechampions at all levels executiveswho can demonstrate the institutional

leadersrsquo commitment area leaders whocan reinforce commitment with theirworkforce and explain how the change

will benefit their part of the institu-tion and individual influencers whocan help determine success factorsidentify and address pain points andevangelize with their colleagues

But change management involves

more than communications and inclu-siveness A successful change is a fullydesigned change Too often institu-tional leaders conflate new initiativeswith new systems and fail to fully thinkthrough and execute on the business-end components The successfulintroduction of a new system mightrequire new or reengineered businessprocesses new roles and even differ-ent organizational structures Every

ldquoTechnology is now integrated into just about

every aspect of our colleges and universitiesThat allows us a myriad of opportunitiesto use technology to help students succeedacademically Using technology to helpstudents succeed is at the core of what we dordquo

mdashSteve FleagleChief Information Officer and Associate Vice President

The University of Iowa

FIGURE 9 Percentage of Institutions That Have Implemented the ITIL ChangeManagement Process

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

23

13

25

30

44

44

Source EDUCAUSE Core Data Service 2013

Involvingevery level of an

organization creatingownership assessing thecultural landscape and

communicating effectivelyare key factors Changealways affects somebody

somewhere

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 2: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 235

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

By Susan Grajek and the 2014ndash2015 EDUCAUSE IT Issues Panel

C

hange continues to characterize the EDUCAUSE Top 10 ITIssues in 2015 The pace of change seems not to be slowing butrather is increasing and is happening on many fronts Thereis reason to believe that higher education information tech-nology has reached an inflection pointmdashthe point at which

the trends that have dominated thought leadership and havemotivated early adopters are now cascading into the main-stream This inflection point is the biggest of three themes

of change characterizing the 2015 EDUCAUSE Top 10 IT Issues (see Figure 1) A second dimension of change is the shifting focus of IT leaders and profes-sionals from technical problems to business problems along with the ensuinginterdependence between the IT organization and business units Underlyingall this strategic change the day-to-day work of the IT organization goes on Butchange dominates even the day-to-day where challenges are in some ways morecomplex than ever This ldquonew normalrdquo is the third theme of change

TOP 10

IT ISSUES2015

Inflection

Point

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 335

12 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Themes ofChange

Inflection PointChange Itrsquos a song thatrsquos been playingeverywhere the last several years Yoursquovebeen humming the tune perhaps danc-ing to its rhythm You may not knowall the words but everyone knowsthe refrain ldquoMobile-Cloud-Big Data-Business Value-Agile-Transformation-Social-Analytics-Online LearningrdquoSome people know just a verse or twosome know several and some are evenhelping to write new verses If change

has become a standard what is newabout 2015 Well nothing has changed

And everything has changed Informa-tion technology has reached an inflec-tion point

Mathematically an inflection pointis a point of change on a curve in whichthe concavity sign reverses Colloqui-ally the term is used to describe a turn-ing point that results in extraordinarychange Andy Grove Intelrsquos former CEOdescribed a strategic inflection point as ldquothat

which causes you to make a fundamentalchange in business strategyrdquo1 As Erik Brynjolf sson and Andrew

McAfee assert in The Second Machine Age this all comes back to Moorersquos Law whichposits a cyclical doubling of computingpower2 This doubling represents a rateof growth that is exponential Perhapsthe most vivid illustration of the powerof exponential growth is Ray Kurzweilrsquosconcept of the second half of the chess-board3 This concept is based on a legendabout the invention of chess When the

emperor asked the creator of chess toname his reward for having invented thegame the inventor requested that forthe first square of the board he wouldreceive one grain of wheat two for thesecond square four for the third squareand so forth doubling the amountfor each square Kurzweil noted thatalthough such an exponential growthpattern accrues only modest quantitiesat the beginning when the second half

FROM TECHNICAL TO BUSINESS

2 Optimizing the use of technology in teaching and learningin collaboration with academic leadership includingunderstanding the appropriate level of technology to use

3 Developing IT funding models that sustain core servicesupport innovation and facilitate growth

4 Improving student outcomes through an institutionalapproach that strategically leverages technology

5 Demonstrating the business value of informationtechnology and how the IT organization can help theinstitution achieve its goals

INFLECTION POINT

1 Hiring and retaining qualified staff and updating theknowledge and skills of existing technology staff

6 Increasing the IT organizations capacity for managing changedespite differing community needs priorities and abilities

9 Developing an enterprise IT architecture that can respond tochanging conditions and new opportunities

10 Balancing agility openness and security

FIGURE 1 Focus Areas of the 2015 Top 10 IT Issues

THE NEW NORMAL

7 Providing user support in the new normalmdashmobile onlineeducation cloud and BYOD environments

8 Developing mobile cloud and digital security policiesthat work for most of the institutional community

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 435

14 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

of the chessboard is reached the ensu-ing increases produce almost unimagin-ably large amounts Viewing the impactof Moorersquos Law from this perspective

we can see that technology will at somepoint reach the second half of thechessboard Brynjolfsson and McAfeeposit that this has already happenedand they call it the second machine ageldquoComputers and other digital advancesare doing for mental powermdashthe abil-ity to use our brains to understand andshape our environmentsmdashwhat thesteam engine and its descendants did formuscle powerrdquo4 Analytics cloud mobiledevices social media and online educa-tion might all be viewed as the fruits of

the second machine age IT architectureprocess optimization service manage-ment and risk management are efforts tomanage this overwhelming bounty

The second half of the chessboard isone reason for the inflection point wehave reached A second is related to thetechnology adoption curve Individu-als and institutions adopt technology atdifferent rates a few are on the bleedingedge a few are the last to change andmost fall somewhere in the comfortable

middle of the bell curve of adoptionThe higher education community isno exception (see Figure 2) In Crossingthe Chasm Geoffrey Moore describes apause or chasm between early adopt-ers and the mainstream5 An inflectionpoint in adoption is reached when main-stream adopters cross that chasm andbegin to enter a marketplace As Mooredescribes it they are motivated not bythe desire to innovate (which motivatesearly adopters) but by the need to solvea problem that their current solutions

cannot address a need that activates anotherwise cautious group When solu-tions become available that address theirparticular problems members of thatgroup will adopt new technologies

The present inflection point in highereducation information technology islikely due to improving solutions incloud analytics bandwidth and othertechnologies very real problems of costproductivity and student success and

1 Hiring and retaining qualified staff and updatingthe knowledge and skills of existing technologystaff

2 Optimizing the use of technology in teachingand learning in collaboration with academicleadership including understanding theappropriate level of technology to use

3 Developing IT funding models that sustain coreservice support innovation and facilitate growth

4 Improving student outcomes through aninstitutional approach that strategically leveragestechnology

5 Demonstrating the business value of informationtechnology and how technology and the ITorganization can help the institution achieveits goals

6 Increasing the IT organizationrsquos capacity formanaging change despite differing communityneeds priorities and abilities

7 Providing user support in the new normalmdashmobile online education cloud and BYODenvironments

8 Developing mobile cloud and digital securitypolicies that work for most of the institutionalcommunity

9 Developing an enterprise IT architecture thatcan respond to changing conditions and newopportunities

10 Balancing agility openness and security

Top 10 IT Issues 2015

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

the useful examples and learnings ofinnovators among our highly collegialcommunity This inflection point ishitting IT organizations hard As theystretch and struggle to help colleges anduniversities use technology to addresschallenges of student success afford-ability and accountability IT organiza-tions are retooling and restructuring toadapt to challenges of their own Thosechallenges include ensuring a stable

qualified and adaptable IT workforceand a clear and adaptable enterprisearchitecture In both cases ldquoadaptablerdquomeans the ongoing ability to respond tochanging technologies and solutionsThose changes are transforming both ITinfrastructure which is generally trans-parent to end users and IT services andsolutions which are very much on theminds of end users and in the strategiesof higher education leaders IT organiza-tions are struggling to manage both thepace and the volume of change on all

levels And anyone who has experienceda new system rollout knows how impor-tant good change management is to thesuccess of an initiative Managing infor-mation security in the light of ongoingnew technology opportunities for bothIT and higher education professionalspresents another set of challenges

Collectively IT leaders and profes-sionals may feel deluged by the volume

variety and pace of change In response

to that deluge many IT leaders areadopting a strategic approach to changethrough the use of frameworks for suchactivities as service management ven-dor management risk managementIT architecture information securitymanagement project managementprocess management and capabilitymaturity management On the surfaceframeworks may seem restrictive andbureaucratic which accounts for the

past reluctance by many in higher edu-cation to adopt them However at theirbest frameworks can provide stabilityin times of change by creating repli-cable and scalable environments that canadapt gracefully to new and changingcircumstances

From Technical to BusinessBridging the gap between technologysolutions and business problems is achallenge that many IT leaders are strug-gling to address Moving from the role

of technology leader to business leaderis the second major theme of the 2015EDUCAUSE Top 10 IT Issues

Perhaps most exciting this themehighlights the challenge of deliveringIT solutions that can address two of themost pressing issues in higher educationhow to apply technology to teaching andlearning and how to improve studentoutcomes To solve these strategic insti-tutional problems the IT and academic

communities need to collaborate andcocreate Each group has a different viewof the problem possesses different rele-

vant expertise and plays a different role

in the solution Further many solutionsthat were previously accessible only totechnologists are now available to endusers who are adopting applicationswith sometimes serious implications forinformation security data managementand IT architecture All this calls for theIT organization to recast its relationshipwith administrative and academic areas

This second theme is also relatedto the need to reach across the whitespace in the institutionrsquos organizationalchart so that the IT department better

understands the needs of the institutionand so that institutional leaders betterunderstand the exciting potential ofinformation technology and the timeresources and executive commitmentrequired to achieve that potential Thesuccess and perhaps even the survivalof higher education are more dependentthan ever on technology Members ofthe 2014 EDUCAUSE IT Issues Panelreport that many institutional leaders

believe that technology solutions areboth easier and less expensive than theyactually are Because those executivesare also increasingly interested in usingtechnology to achieve strategic goalsmany IT leaders are struggling to manageexpectations without losing credibilityor attention On the other hand some ITleaders are struggling with a different setof problems how to communicate moreeffectively with institutional leaders

FIGURE 2 Technology Adoption Curve for Higher Education Institutions

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

We are usually among the very firstto adoptnewtechnologies

3

43

We tend toadopt new technologiesafter our peersdo so

We tendto adoptnewtechnologiesat the paceof our peers

We strive to beearly adoptersof new technologieswhere we seeexceptionalbenefits

We are oneof the lastto adoptnewtechnologies

3

24

27

Movingfrom the role of

technology leaderto business leader is

the second majortheme of the

2015 EDUCAUSETop 10 IT Issues

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 635

16 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

and how to influence uninterestedleadership

Funding has made the EDUCAUSETop 10 list every year This year the chal-lenge with funding is to ensure that insti-tutional leaders understand the need tofund the entire IT portfolio so that theIT organization is capable of supportingthe aspirations ongoing operations andgrowth of the institution

The New NormalIn the midst of so much change chal-lenge and opportunity IT organiza-tions continue running core servicesand supporting end users IT staff stillgo into fire-fighting mode more oftenthan they would wish But even normaloperations are subject to the forces ofchange

Most notably bring-your-own-device

(BYOD) digitization and associated tech-nologies and opportunities are changingthe nature of user support and appropri-ate security policies In the first instancethe IT organization needs to retool andredefine its support strategy In the secondsecurity policies must comply with regu-latory requirements to protect data andprivacy without hamstringing academicsand administrators

Mark C Adams

Vice President for Information

Technology

Sam Houston State University

Mark I Berman

Chief Information Officer

Siena College

Christian Boniforti

Chief Information Officer

Lynn University

Michael Bourque

Vice President Information

Technology Services

Boston College

Karin Moyano Camihort

Dean of Online Learning and

Academic Initiatives

Holyoke Community College

Keelan Cleary

Director of Infrastructure andEnterprise Services

Marylhurst University

Jenny Crisp

QEP Director and Assistant

Professor of English

Dalton State College

Patrick Cronin

Vice President of Information

Technology

Bridgewater State University

Lisa M Davis

Vice President for Information

Services and ChiefInformation Officer

Georgetown University

Andrea Deau

Director of Information

Technology

University of Wisconsin

Extension

Patrick J Feehan

Director IT Policy and

Cybersecurity ComplianceMontgomery College

Steve Fleagle

Chief Information Officer and

Associate Vice President

The University of Iowa

Tom Haymes

Director Technology and

Instructional Computing

Houston Community College

Richard A Holmgren

Vice President for Information

Services and Assessment Allegheny College

Brad Judy

Director of Information

Security

University of Colorado System

James Kulich

Vice President and Chief

Information Officer

Elmhurst College

Jo Meyertons

Director Educational

Technology

Linfield College

Kevin Morooney

Vice Provost for Information

Technology and Chief

Information Officer

The Pennsylvania State

University

Angela Neria

Chief Information Officer

Pittsburg State University

Celeste M Schwartz

Vice President for InformationTechnology and College

Services

Montgomery County

Community College

Paul Sherlock

Chief Information Officer

University of South Australia

Francisca Yonekura

Associate Department Head

Center for DistributedLearning

University of Central Florida

EDUCAUSE IT Issues Panel Members

2014ndash2015

The EDUCAUSE IT Issues Panel comprises individuals from EDUCAUSE member institutions to provide quick feedback to EDUCAUSE on current issues problems andproposals across higher education information technology Panel members who are recruited from a randomly drawn and statistically valid sample to represent the EDUCAUSEmembership serve for eighteen months with staggered terms Panel members meet quarterly for ninety minutes via webinar or in person The meetings facilitated byEDUCAUSE Vice President Susan Grajek are designed as an ongoing dialogue to flesh out and refine an array of open-ended technology questions about the IT organizationthe institution and cross-institutional boundaries The members discuss refine and vote on the most relevant underlying issues or options

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Issue 1Hiring and Retaining

Qualified Staff andUpdating the Knowledge

and Skills of ExistingTechnology Staff

The long-held notion that infor-mation technology has threecritical dimensionsmdashpeopleprocess and technologymdashis stilltrue today Behind every suc-

cessful implementation of technology is

a group of talented people ensuring thateverything goes according to specifica-tions to meet the needs of the studentsand faculty Recruiting and retainingexceptional staff with the requiredknowledge skills and attitudes is not asmall feat Higher education competesfor talent in an extremely competitiveenvironment The technology fieldcurrently has very low and in someregions virtually no unemployment

As higher education competes with allindustries those of us in academe are

operating in an environment in whichchange comes quickly whether in tech-nology business disciplines or our coremissions of teaching and research Toattract maintain and retain the neces-sary talent higher education IT organi-zations need to adjust and adapt

Todayrsquos IT workforce needs are dif-ferent from needs in the past We need awide array of skill sets for roles that areevolving quickly The field of informa-

tion technology has always demandedthat professionals retrain and retoolto be able to design and support thelatest technologies Thus the ongoing

evolution of technical skills is not newHowever the very models for provid-ing and supporting technology-basedservices are in flux today This set ofchanges requires staff to be not onlyadept at retooling but also capable ofreinventing their roles And those rolesdemand entirely new skills To be ableto deliver the technology solutions thatstudents and faculty presently needwhile preparing themselves to lead theinstitution to adopt innovate or inventfuture technological advances IT staff

need such nontechnical qualities as ini-tiative grit adaptability and emotionalintelligence

Retaining talented staff requires aculture of teamwork that supports andencourages the growth of the individualand the team Management needs tofoster a vibrant workplace in whichdiversity is valued and individuals feelrespected Management must also rec-ognize that employeesrsquo views of satisfac-tion with their jobs are based on their

collective experiences ranging fromsalary to the culture of water-coolerdiscussions (see Figure 3) Leadersmust remember that every employeehas unique issues and methods of com-

municating so at times retention willcome down to one-on-one discussionsto understand employeesrsquo needs andto help employees understand their

role in the larger IT and institutionalstrategy Team members need to feelengaged with the organization and itsmission and they need to sense align-ment of their efforts with somethingimportant (eg mission) to have a senseof purpose With this sense of purposethey are more likely to be committed tothe institution But with such long-termcommitments also come the expecta-tion of ongoing skill development andcareer advancement opportunities

For performance management to

be successful it must become a criticaland continuous part of the operationsof the IT organization Managers mustensure that staff are aware of their fullbenefits packages and of leadershipefforts to provide a fulfilling and enjoy-able work environment Many institu-tions offer benefits and local area perksthat employees are not aware of

Augmenting the challenge o f hiringqualified staff is the exponential speedat which technology is continuously

changing In light of this new normalmany current roles and even profes-sions will not exist in the future Newroles and professions will arise toaddress changing technology delivery

FIGURE 3 Top Reasons IT Management and Staff Leave Their Jobs

CIOs MANAGERS STAFF

At high risk of leaving 1 in 8 1 in 6 1 in 5

Personal career goals are unattainable

Not recognized for value aside fromcompensation

No opportunities to learn and grow in the past year

Institutional mission does not make me feelmy job is important

Not compensated fairly

Based on rated importance of working in higher education combined with reported likelihood of pursuing opportunities outside theinstitution

Source Jacqueline Bichsel Todayrsquos Higher Education IT Workforce (Louisville CO ECAR January 2014)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 835

18 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

pedagogical and research methods and higher education business models

Not all staff will be able to recognize or adapt to these changes Managersneed to help staff recognize and prepare for new oppor tunities to minimizethe disruption Change affects not only the individuals who are disruptedbut also those staff who are bystanders witnessing the change and anticipat-ing the worst

Fortunately IT management is not without support That support b eginsby building a partnership with the Human Resources department (HR) Asuccess for the IT organization is a success for HR

Advice983150 Know how to sell the value of a career that contributes to the advance-

ment of higher education and its teaching learning and researchmissions983150 Develop a list of the nonmonetary benefits of working for the institution

and share that list with staff983150 Hire staff not just for their fit for the job but also for their emotional

intelligence and fit with the values and culture of the IT organization andthe institution At the same time remember that the strongest teams arethose that are most diverse so strive for a heterogeneous workforce thatshares a common set of core values

983150 Work with staff to select appropriate training Funding and facilitatingtime for training and travel is only part of the process Establish somedeliverables and accountability for the training so that employees returnto the office with the anticipated insights and skill set

983150 Work with HR to develop career paths for the major divisions of or rolesin central and distributed IT units Careers paths donrsquot have to stay withinthe IT organization consider lateral paths that can broaden someonersquosinstitutional or business experience Develop paths that reward knowl-edge work as well as managerial talent and understand that not everystaff member need aspire to leadership

983150 Create a talent plan for the IT organization itself Identify the skill setsand roles the organization will need to acquire and retire in the next oneto three years Create a roadmap to where the organization needs to headand begin working with HR now to implement the roadmap with as littledisruption as possible for individual staff and o perations

Issue 2Optimizing the Use

of Technology inTeaching and Learningin Collaboration with

Academic LeadershipIncluding Understandingthe Appropriate Level of

Technology to Use

C

olleges and universities con-tinue to invest in technologiesin support of teaching and

learning while struggling withways to help faculty understandthe value and potential impact of thesetechnologies An overlooked but criti-cal starting point is for an institutionto define its educational objectives andstrategy Institutions whose educationalculture is intentionally and predomi-nantly residential ones that serve manypart-time working commuters thosewith strong global outreach techno-logical institutes and institutions withstrong practicum orientations may all

grant similar degrees but will have verydifferent pedagogical strategies andtherefore different educational tech-nology needs Without a larger guiding

vision the application of technology toteaching and learning is neither strate-gic nor optimized it is instead a series ofendpoint solutions driven by individualfaculty requests and by the best (oftenuncoordinated) efforts of service pro-

viders throughout the institution

ldquoWe must be willing to combine someof the best benefits that business has to

offer (eg flexible work arrangements)with the strong selling points of a careerin higher education (eg connection withthe mission)rdquo

mdashMichael Bourque Vice President Information Technology Services

Boston College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

It is important to view technology asa supporting tool similar to earlier toolssuch as blackboardchalk Technolo-gies need to be carefully scrutinized

for their pedagogical implications Alt ho ug h on li ne co ur se s of fer th eallure of convenience and the opening(and thus increasing) of enrollments tostudents who might not otherwise beable to attend college in a traditionalmanner their pedagogical effectivenessshould be assessed as carefully as that oftraditional classroom courses Doing so

might identify gaps in overall pedagogi-cal assessment at an institution and thusimprove even face-to-face learning Thereal value of technologies is how facultyintegrate the technologies into theirteaching and learning and how they usethe technologies to further refine theircourse delivery and student engage-ment (see Figure 4)

If institutional leaders become moreintentional about their pedagogicalobjectives and assessment methodsthey will have the opportunity to influ-

ence the institutional technology mar-ketplace Todayrsquos solutions could bemuch more effective with better guid-ance from the leadership at colleges anduniversities

For example faculty often findthemselves overwhelmed with the vol-ume of new technologies and the ongo-ing upgrades of existing technologiesas they struggle to find time to researchhow to integrate the technologies into

their teaching Faculty new to onlinelearning will commonly try to replicatetheir physical classroom online butthis is a classic McLuhanesque mistake6

Optimizing the use of technology inteaching and learning depends on theability of the institutional and academicleadership to help faculty develop theirdigital competency and then to con-tinue to provide learning opportunitiesto keep their competencies currentFaculty need ongoing digital literacyopportunities that enable them to betterunderstand not only educational tech-nologies but also the social technolo-

gies that are affecting their everydaylives and the everyday lives of their stu-dents Those students expect engage-ment in their instruction Faculty need

to understand instructional narrativeand the implications of media as part oftheir technological introduction This ismore than just training on a particulartechnology It is as the saying goes thedifference between giving a man a fishand teaching him how to fish

The effective optimization ofinstructional technology also requiresrethinking reinforcing and clarifyingroles and relationships among faculty

ldquoFaculty armed with current understandingand research on the power and value

of technologies are more likely to usetechnology to enhance their pedagogicalapproachesrdquo

mdashCeleste M Schwartz Vice President for Information Technology and College Services

Montgomery County Community College

FIGURE 4 Integrating Technology into Courses

ldquoI could be a more effective faculty member if I were better skilled at integrating this technology

into my coursesrdquo

Percentage of respondents

3D printers

Non-keyboard or non-mouse computer interfacesSocial media as a teaching and learning tool

E-portfolios

Lecture capturerecordings

E-books or e-textbooks

Simulations or educational games

LMS

Online collaboration tools

Free web-based content

Agree Strongly agree

50250 75 100

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014 (Louisville CO ECAR July 2014)

The

real value oftechnologies is howfaculty integrate

technologies intoteaching and learning

and how they usetechnologies to further

refine course delivery andstudent engagement

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1035

20 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

librarians teaching and learn-ing center professionals and ITprofessionals They all need to

view themselves as colleag ues

and even partners in designingthe right infusion of technologyresources at the right time duringthe instructional process

Is all this a tall order Yes Butit is directed toward the primarymission of higher education andis thus well worth addressing Ifcollege and university leaders donot optimize the use of technol-ogy in teaching and learningexisting and emerging alterna-tives will almost certainly step

forward to fill the gap

Advice983150 Work with academic leader-

ship to articulate the institu-tional strategy for the use oftechnology in teaching andlearning to best fit the institu-tional culture and priorities

983150 Translate that strategy into ateaching and learning tech-

nology roadmap that pri-oritizes the technologies thatwill best achieve the institu-tional strategy and fit institu-tional resources

983150 Define and clarify roles insupporting instructionaltechnology to bring togetherall relevant institutionalparties as productively aspossible

983150 Move to a technology sup-port model that aligns tech-

nology integration supportand faculty professionaldevelopment that is courseprogram specific and basedon research that demonstratesimproved student engage-ment and success

983150 Ensure that faculty have suf-ficient support and releasetime to integrate the tech-nologies into their courses

Issue 3Developing IT Funding

Models That SustainCore Service

Support Innovation andFacilitate Growth

As governmental financial sup-port for higher educationcontinues to decline bothpublic and private institutionsare desperately trying to focus

scarce resources on strategically impor-

tant needsTo create funding models that willsustain IT operations IT leaders need toclarify to institutional leaders and boardsof trustees why IT services are strategi-cally important to the enterprise Articu-lating and making some of the toughstrategic choices explicit is fundamentalto developing a sustainable fundingmodel As the role of information tech-nology in higher education matures andas institutions are increasingly pressedto balance costs with tangible benefits

IT leaders will need to strengthen andleverage their relationships with gover-nance groups connect execution withstrategy and exploit funding models tiedto institutional strategy (see Figure 5)

EDUCAUSE defines gov ern anc e asldquohow a higher education institution isorganized for the purposes of decisionmaking and resource allocation andhow the varying parts are managed ina way that promotes the mission of the

institutionrdquo7 The distributed nature ofhigher education institutions thoughhighly effective in supporting innova-tion and meeting specialized needs can

be a roadblock to strategic investmentsand efficiency realization InstitutionalIT governance can help achieve andsupport a clear IT strategy When IT gov-ernance programs have influence over ashared pot of institutional resources andare able to prioritize strategic IT invest-ments IT leaders can support ongoinginnovation and growth across the entireinstitutional portfolio of functions Inthe absence of institutional IT gover-nance IT projects will be prioritizedaccording to which areas can most easily

secure funding for their priorities Inevi-tably worthy and even critical projectswill not be funded if they are not spon-sored by well-resourced areas

Capital funding is relatively easy tosecure obtaining additional operationalfunding is much more difficult Sincemost capital projects have an opera-tional impact the differential access tofunding streams can create significantproblems for budget managers To sat-isfy demand and remain competitive

leaders at higher education institutionshave allocated capital funds to coverthe development cost of new IT infra-structure yet they seldom incorporateplans for ongoing operational funding ofcapital projects As a consequence thereis a fundamental misunderstanding ofthe total cost of information technologyand often no culturally accepted billingmodels exist for one-time and full-life-cycle costs

To help governance groups under-stand and support funding for the real

cost of information technology IT lead-ers need to develop total cost of owner-ship (TCO) scenarios and vet them withappropriate groups before projects arefunded Higher education informationtechnology is dogged by cost-savingsexpectations that usually create a falsesense of expenditure reduction In somecases the benefit of the IT investmentderives from risk reduction or new func-tionality and cost savings are not to be

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

expected In other cases cost savingsare theoretically possible but difficultto achieve if non-IT changes such asbusiness process redesign are requiredto realize them Even if the project is

successfully completed funding mayneed to shift to derive real institutionalsavings For example an IT project thatintroduces efficiencies to academicdepartments or business units mayreduce costs for the departments or units

and also for the institution overall butthe project may increase IT costs To real-ize net savings for the institution budgetfunding needs to be withdrawn from thedepartment and a portion needs to be

directed to the IT organization to coverits increased costs with the balanceaccruing to the bottom line of the insti-tution When each department controlsits own budget those shifts and realloca-tions are very difficult to negotiate and

often fall apart eroding any potentialcost savings

Growth can be managed but doingso requires service management models

that are able to project and prepare forgrowth Those models need to includecost management to ensure that serviceproviders understand and budget forboth fixed and variable costs The pay-ing IT customersmdashwhether institutionalleaders or individual departmentsmdashneedto understand IT service cost drivers andhow they can help manage those driv-ers Funding for growth in variable costsis relatively easy to justify if IT servicemanagers have and can show data onboth growth and the associated costs

Funding for growth in fixed costs needsto be justified as well and that requiresdata on the cost increases and a justifi-cation of the risks that will be reducedthe functionality that will be added orenhanced or some other compelling

FIGURE 5 IT Spending on Institutional Activities

Institutionalgrowth

Running theinstitution

Transformativechange

1576 9

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1235

22 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

reason This approach also paves the way for discussions of tradeoffs that mightaccommodate growth without increasing funding such as service-level reduc-tions shared services or outsourcing

Supporting innovation is a key piece of IT resource justification Studentsexist in a digital ecosystem and expect educational institutions to interact withthem in the ways that they are used to interacting with each other and with thecommercial entities they deal with on a daily basis Banks retail stores andeven government services are available to them through a multiplying swarmof devices Institutional leaders are increasingly aware that higher educationneeds to deliver services in the same way and that the development of an ITarchitecture to do so takes resources To better afford the resources necessaryto keep institutions current the IT organization itself needs to be innovativein the way it is organized the way it delivers IT services and the way it workswith various institutional constituencies Recognizing that IT drivers andcore services in 2014 may not even remotely resemble those necessary in 2020

demands funding flexibility since too tight a correlation will act as a disincen-tive to improvement and will create technology lags greater than those of thelast decade

Different but rigorous strategies for IT core services growth and innovationwill help in the development of IT funding models that best fit these separateactivities and are aligned with the institution and its constituents Effective ITgovernance can tie these three activities together and prioritize the IT expensein ways that support existing operations ensure ongoing innovation andrespond to growth across the entire IT portfolio

Advice983150 Benchmark IT finances by participating in the EDUCAUSE Core Data

Service983150 Ensure that IT projects build models for ongoing operational funding into

project deliverables and expectations983150 Establish an institutional IT governance structure that is responsible for allo-

cating funding not just identifying IT priorities983150 Understand the costs and cost drivers of todayrsquos IT services983150 Help leadership understand both the costs and the benefits of information

technology Arguments for new IT initiatives should always include cost esti-mates as well as estimates of the costs of not innovating

983150 Build the costs of growth and maintenance into funding models for core ITservices

Issue 4Improving Student

Outcomes through anInstitutional Approach

That StrategicallyLeverages Technology

The benefits of completing acollege education are widelyknown They include higherlifetime earnings greater levelsof happiness increased civic

engagement and reduced health risks

There are also societal benefits as theproportion of college graduates in thepopulation increases So it is in our ownbest interests to help both individualsand society by improving the successof students at our higher educationinstitutions

There are few cases in which tech-nology by itself has helped studentssucceed However there are opportuni-ties for technology to support studentsuccess initiatives The first task for anyinstitution is to assess both the insti-

tutional needs and the most currentremedies for the pain points that areidentified Although this is a constantlyand rapidly evolving area some specificexamples include the following

983150 Developin g a training course (orworkshop) to help students under-stand the technology landscape ofthe institution and how they can usethose tools to succeed

ldquoWhen it comes to innovation is the ITfunding principle lsquoWe optimize new IT

investments for the entire institutionrsquo orlsquoWe optimize new IT investments for theindividual unitsdepartmentsrsquo or bothPricing models will emerge accordinglyrdquo

mdashKarin Moyano CamihortDean of Online Learning and Academic Initiatives

Holyoke Community College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Removing barriersmdashs uch as accessusability and lack of supportmdashto theeffective use of technology

983150 Using technology to recast large lec-

ture courses and support pedagogi-cal transformations

983150 Using technology to provide flex-ibility for students to match thecourse with their learning style

983150 Using technology to distributelearning content in multiple waysincluding lectures (live and archivedfor review) electronic texts andlearning management systems

983150 Using technology such as peertutoring discussion boards andg roup videoconferences (eg

Google hangouts) to facilitate syn-chronous and asynchronous inter-actions with others and to promotecollaborative learning

983150 Considering the emerging role oftools used traditionally by business(ie CRM) to manage the institu-tionrsquos relationship with the student

983150 Applying elements of what is beinglearned in competency-based edu-cation initiatives at an institutionallevel for traditional students

Institutional leaders continueto emphasize and pour resourcesinto improving student retentionand completion Technology can beapplied to develop the broad area oflearning analytics to provide feedbackto students on their behavior (both pastand predictive) to faculty on the effec-tiveness of the pedagogy employed inthe course to content providers (andfaculty who select the content) on theeffectiveness of the content used in the

course and to administrators on broadsystemic issues and trendsMany colleges and universities

have student success committees thatfocus on initiatives to improve coursecompletion program completion andstudent support services Examplesof initiatives can be found in the areasof teaching and learning and studentsupport services In the area of reme-dial education great strides have been

made in reducing time to completionfor remedial students and in increas-ing retention and completion rates Anexample of the work occurring in the

area of student success can be found onthe Achieving the Dream InterventionsShowcase website (httpachievingthedreamorgresourcesachieving-the-dream-interventions-showcase) withmany of those interventions strategi-cally leveraging technology

As data analytics tools have becomemore sophisticated institutionshave been better able to recognizestudentsrsquo challenges and track stu-dentsrsquo journeys With theimplementation of early

alert systems advisors andfaculty have been able toassist students with just-in-time intervention recom-mendations In addition itis becoming commonplacefor advisors to have access todata beyond the traditionalERP demographic and stu-dent gradesmdashdata such ascourse performance throughlearning management sys-

tems early alert informationtutoring participation andeducation planning informa-tion (see Figure 6) Systemslike these sometimes referred to asIntegrated Planning and AdvisingServices (IPAS)8 permit the advisor tosupport and coach students based ona comprehensive view of the studentsrsquoinformation throughout their educa-

tional journey In the area of onlineeducation too wraparound studentsupport services are mirroring the on-ground experience with some colleges

and universities implementing careercoaches with supporting technologiesto provide services to online studentsThe integration of technologies in eachof these areas has had a positive impacton improving student outcomes

A variety of existing tools many stillin the early development stages canhelp institutions gather data to identifystudentsrsquo success opportunities andtheir achievements This information

is only as good as the data however Tofind the low-hanging fruit IT leadersneed to begin the data conversationsto locate tools that may already begenerating useful data To capture rele-

vant aspects of the student experience

FIGURE 6 Technology for Supporting Education Planning Advising and Counseling and Early Alerts

Source EDUCAUSE Core Data Service 2013

46

66

73

Early alert systems

Education planningacademicprogress tracking

Academic advising

Percentage of institutions

Tocapture relevant aspects

of the student experienceleaders must think institutionally

and identify technologyresources that canbring together the

diverse and enormousdata sets that represent this

experience

(continued on page 26)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1435

To create sustainable IT funding models IT leaders need to

clarify to institutional leaders and boards of trustees why

IT services are strategically important to the enterprise

TOP 10 IT ISSUES

EVOLVING STAFFING MODELS

IMPROVING

STUDENT

OUTCOMES

OPTIMIZING TECHNOLOGY IN

TEACHING AND LEARNING

FUNDING IT STRATEGICALLY

soft skills

moreresources

professional development

clear goals networking

65

Technical proficiency is as important as ever

So skills are more important that ever before

higher education IT staff are not

satisfied with their current position

To be more effective IT

staff say they need

of students wish their

instructors would use

early-alert systems more

of central ITrsquos budgetis spent running the institution

is spent on growth

is spent on transformation

Students respond

positively to learning

analytics opportunities

not at allimportant

technical proficiencystrategic planning

effective communication

1

veryimportant

5

Top 3 motivators for faculty integration of technology

in the classroom

bull Clear indicationevidence that students will benefit

bull Release time to designredesign courses

bull Confidence that the technology will work as planned

1 in 4

Todayrsquos market for IT talent is competitive Hiring andretaining top talent requires engaged managers whopossess and know how to foster good communication skills

Faculty and students alike are

interested in learning analytics for

notifications on course progress

Although technology is omnipresent in the lives ofstudents leveraging technology to engage students in

meaningful ways and to enhance learning is still evolving

76

15

9

I think this is great

This sounds positive

I am neutral

This sounds negative

Irsquom totallyagainst this

Spending model

breakdown in the USdoes not differsignificantly by

Institution type

Size

Central IT staff size

CIO reporting line

25

0

50

75

100

E D U C

A U S E E

R E S

E A R C

H S N

A P S H

O T

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1535

A look into EDUCAUSE research on the 2015 list of the

most intriguing ideas in higher education IT

DEMONSTRATING

VALUE OF IT

DEVELOPING

SECURITY

POLICIES FOR

THE INSTITUTION

DEVELOPING ENTERPRISE IT

ARCHITECTURE

BALANCING INFORMATION

SECURITY AND OPENNESS

INCREASING CAPACITY

FOR CHANGE

PROVIDING USER SUPPORT

The gaps between effectiveness in and

importance of addressing risks are large

Percentage using the college or university help desk for support

Percentage looking to peers

Student Device Ownership

Between 2005 and 2014 there were 727 education-sector

data breachesmdashinvolving more than 14 million recordsmdashas

reported to the Privacy Rights Clearinghouse

locally integrate the

architectures of multiple

major systems

follow the architecture of a

primary system or suite

20142013

25

0

50

75

100

2015 projection

Smartphones

Tablets

86

47

31

76

58

90

Information security

Data privacyconfidentiality

Identityaccess management

66

66

84

82

79

70

36

1

33

29

The most important IT risks to

address concern security privacy

and access

In a world of increasing

complex security threats

institutions must move from

a reactive to a proactive security response

We are living in an era when readily

accessible technologies facilitate a

BYOD standard requiring institutions

to rethink user support

A well-defined enterprise IT architecture is instrumental to

optimizing opportunities and managing change effectively

The higher education community is

struggling with the pace variety and sheer volume

of change in information technology as well as the

corresponding risks

IT leaders need to draw the lines from

technology initiatives to their institutionsrsquo

changing strategic objectives and on to the

ultimate bottom lines of mission and means

OtherLossthestInternal threatsExternal threats

81of institutions

do notaddress IT risk

in their strategicplan

7357

69

22

Faculty

Students

effectiveness

importance

effectiveness

importance

effectiveness

importance

6 3 10 10

Breachcauses

53Administration

37Teaching

and learning

10Researchother

Percentage of IT spend by institutional mission

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1635

26 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

leaders must think institutionally and identify technology resources that

can bring together the diverse and enormous data sets that represent thisexperience

As was discussed last year when this was the 1 issue in the 2014 Top 10list looking at this data may raise privacy issues so leaders must rememberto include the appropriate individuals in these discussions to ensure compli-ance security and privacy

Advice983150 Keep in mind that students consider success from a holistic view of their

campus experience not necessarily their experience with just a courseor a semester To maximize the impact of technology identify the combi-

nation of data and tools that will encompass as much of the institutionalexperience as possible983150 Remember that results will be only as good as the data Take time in the

beginning to build a reliable strategic foundation by starting with conciseoutcome objectives and then develop t he data-driven questions that willultimately define actionable steps to influence success

983150 Work with key individuals from various institutional areas to identifydata that may be available at an individual student level and that could becombined with other values to establish an assessment point for the stu-dent Next consider comparing this assessment point with the studentrsquossuccess level and attempt to identify some trends Drill down to indica-tors that can be used as targets for predicting success and for identifyingearly warning signs

983150 Ensure that the project is embedded in a cross-institutional student suc-cess effort that includes all relevant parties Dedicated student successteams or cross-departmental governance structures can be the vehiclefor organizing consensus Donrsquot allow a perception of IT ownership todevelop

983150 Resolve problems in academic and business processes before implemen-tation donlsquot adapt applications to dysfunctional processes

983150 Define the role of faculty in improving student outcomes through thestrategic leveraging of technology

983150 Determine how much individualized student data should be shared withadvisors in supporting improved student outcomes

Issue 5Demonstrating the

Business Value ofInformation Technologyand How Technology

and the IT OrganizationCan Help the Institution

Achieve Its Goals

IT leaders need to continue to get bet-ter at drawing the lines from technol-ogy initiatives to their institutionsrsquochanging strategic objectives and on

to the ultimate bottom lines of mis-sion and means Successfully demon-strating the business value of informationtechnology to the institution begins withdeveloping a clear understanding of the

various ways in which technology as awhole and the IT department as a unitadd value to the institution Institutionalleadersrsquo struggle to respond to changingpublic perceptions of the value of highereducation itself is a complicating factorHerein lies an opportunity for IT profes-sionals not only to demonstrate the value

of the IT organizationrsquos particular offer-ings but also to create new and significant value for the institution This requiresthinking of technology strategy as both aconsequence and a driver of institutionalstrategy IT leaders who have the abilityto see the entire institutional landscapeand can offer strategic insights for movingthe institution forward have never beenmore important to the well-being of col-leges and universities

ldquoInstead of reacting to new technologiestop institutions seek out new technologies

as a strategic imperative leveraging theseinnovations to improve learning insideand outside the classroom with datadecision making enhanced pedagogy andbetter student outcomesrdquo

mdashLisa M Davis Vice President for Information Services and Chief Information Officer

Georgetown University

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

So in what ways do IT leaders add value They add value to the organizationby enhancing the core productmdashnamelythe learning experiences of students and

the teaching activities of faculty They add value very directly by creating new chan-nels through which students can accessinstitutional offerings The channels thatonline opportunities provide would notexist without the technologies deliveredand supported by the IT organizationFrom a business perspective this cre-ates new sources of revenue a criticalobjective for virtually all colleges anduniversities Drawing a clear line that con-nects specific technology initiatives withtangible revenue for the institution is a

powerful way to demonstrate the busi-ness value of technologymdashand of the ITorganization

And of course the yin of revenue isbalanced by the yang of cost reductionStories of expense reduction and effi-ciency are perhaps easier to identify andtell and they should be carefully and dili-gently told but IT leaders must be carefulto also emphasize the much larger poten-tial that a clear focus on the revenue sidecan provide Doing so can help to avoid

the impression that the value of informa-tion technology is limited to simple actsof automation and efficiency Part of thiswork entails ensuring that the institu-tional leadership understands what is andis not possible Many times the need tohave the value discussion in the first placeis because leaders are not inherently feel-ing the value Those in the IT organiza-tion must take the time to develop andprovide clear data-based informationabout the services they deliver and valuethey provide

One way to demonstrate value iswith well-constructed service portfoliosand service catalogs A service portfolioprovides a high-level overview of howfunds are spent on major institutionalstrategic and operational goals and isgeared toward institutional leaders Aservice catalog (see Figure 7) provides amore detailed view into how IT dollarsare spent on IT projects products andservices and is geared toward IT leaders

Combined the service portfolio and theservice catalog can be a useful tool forshowing the business value of the invest-ments that institutions make in informa-tion technology

Assembling a service portfolio andcatalog may be the IT organizationrsquos firstcomprehensive view into the actual valueit is bringing to the institution Depend-ing on that value IT leaders may first needto focus on quick fixes to better align theirservices with the institutional mission

Before IT leaders can advocate howinformation technology can be leveragedto drive the business the IT organiza-tion must be operationally effective andefficient Institutional and business unitleaders must view the IT organizationas providing operational excellence andoutstanding customer service before theywill consider it as a partner in deliveringbusiness value

The CIO and IT leadership teamsshould remember that they are the pri-mary marketing avenue for sharing the

value that information technology bringsto the institutional mission IT leadersspend about 10 percent of their time ongovernance and planning and on innova-tion with business and academic units9 IT leaders thus must be intentional aboutidentifying opportunities for communi-cating how the IT organization is help-ing the institution CIOs must establish

strong and trusting relationships withtheir peer business leadersSharing the value of information

technology begins with IT leadership butmust extend to the entire IT organization

All IT staff must understand how theirwork contributes to the institutional mis-sions and priorities They need to under-stand the IT organizationrsquos capabilitiesand priorities and how the organizationcan advance the institution the indi-

vidual business units and the faculty stu-dents and staff with whom they work IT

leaders can encourage and enable IT staffto learn the mission business processesand requirements of business units inorder to understand how informationtechnology can best be leveraged Get-ting to this point may require a culturechange within the IT organization At the

very least all IT staff should know boththe institutional and the IT priorities toensure that everyone is telling the samestory

FIGURE 7 Percentage of Institutions with a Service Catalog

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

32

17

29

40

56

62

Source EDUCAUSE Core Data Service 2013

IT leaders add value

to the organization byenhancing the core

productmdashnamely thelearning experiences of

students and the teachingactivities of faculty

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1835

28 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Advice983150 Map IT priorities to institutional priorities Find the points of intersection

with the business unit operations customers and technology Partnerwith the business unit to develop a roadmap and to align the business withthe IT architecture

983150 Donrsquot wait for an invitation to discuss business and customer impact Butdonrsquot try to boil the ocean keep focused and be clear about what the IT

organization can and cannot do IT leaders must be translators usingterminology that resonates with non-IT experts and connecting the dotsbetween the technology capabilities and the business needs Develop asmall set of short and simple stories about concrete ways in which tech-nology has improved the learning experience at the institution createdaccess to institutional resources strengthened affinity for the institutiongenerated revenue and streamlined operations Focus at least as much onhelping others see what is possible with technology as on showing howtechnology investments improve current institutional life

983150 Develop a service catalog to serve as a base for connecting the work of theIT organization to the larger institutional strategic objectives

983150 Implement a metrics program that can demonstrate the extent to which theIT organization is achieving its service-level goals customer-satisfaction

goals and financial goals and is delivering on strategic priorities983150 Ensure that IT leaders and IT staff understand what drives academic and

business value for the institution and can identify and articulate how tech-nology can deliver that value Consider attending non-technology confer-ences to learn how business officers faculty and academic leaders thinkabout technology and what their pressing problems are Be the translatorfor business strategy

983150 To reach the broader institutional community consider newslettersbrown-bag gatherings and roundtable discussions and take advantageof recurring events such as National Cyber Security Awareness Month(httpwwweducauseeduncsam) and start-of-the-semester gatherings

Issue 6Increasing the IT

Organizationrsquos Capacityfor Managing Change

Despite DifferingCommunity Needs

Priorities and Abilities

Change is the watchword todayand going forward In the 2011book Race against the Machine MIT economists Erik Bryn-jolfsson and Andrew McAfee

write ldquoAdvances like the Googleautonomous car Watson the Jeop-ardy champion supercomputer andhigh-quality instantaneous machinetranslation then can be seen as thefirst examples of the kinds of digitalinnovations wersquoll see as we move into the phase where exponentialgrowth yields jaw-dropping resultsrdquo10

When technology changes organiza-tions are always challenged to adapt tonew circumstances This is par ticularlytrue of the organizations tasked with

implementing and maintaining thetechnology itselfThe higher education community

is struggling not only with the pace ofchange in information technology butalso with the variety and sheer volumeof change Information technology isincreasingly important to and increas-ingly integrated with all aspects ofboth the strategic and the operationalfunctions of the campus The chal-

ldquoWe also add value by creating newways for those who know us less well to

develop affinity with our institutions Asmall MOOC my college offered made usknown to groups of prospective studentswho would never have paid a momentrsquosattention to any traditional advertisingmessages we might have sent By joiningtheir party first via our technologies weput ourselves in a much better position to

invite them to our partyrdquomdashJames Kulich

Vice President and Chief Information OfficerElmhurst College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

lenge is how to engage multiple areasof the institution and expand servicesin numerous simultaneous initiativesMeanwhile institutional informa-

tion technology is reengineering itsinfrastructure platforms and servicesThose change efforts are often additiveto the applications being introduced aspart of new business-area initiatives

Ideally the institutional stancetoward change is proactive and ITleaders have the vision and good senseto advocate to broker and to preparetheir various constituents for upcom-ing changes while sustaining ongo-ing operations In reality end users

vary widely in their predisposition to

technology As a group students andfaculty are positively disposed towardinformation technology but as indi-

viduals they run the gamut (see Figure8) And attitudes influence behaviorthe way faculty and students adopt and

FIGURE 8 Relationship between Faculty Attitudes toward Online Learningand Their Experience with Online Teaching

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014(Louisville CO ECAR July 2014)

Percentage of respondents who agree or strongly agree

No recent onlineteaching

Some recentonline teaching

50250 75 100

All respondents

Online learning helps students learn more effectively

Online learning will lead to pedagogical breakthroughs

Online learning will make higher education available to more students

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2035

30 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

use technology tends to reflect theirattitudes11

The IT organizationrsquos history of exe-cution can influence community open-ness toward future technology changesThe shadow cast by a deeply flawed ERPimplementation for example can last adecade or longer

Change management is preciselythat managing change rather than lettingchange happen on its own (see Figure 9)

Successful change management is notaccidental or organic It is intentionaland has multiple components Manyinstitutions adopt a specific approachto implementing changemdashapproachessuch as ADKAR Kurt Lewinrsquos changemanagement model and John Kot-terrsquos eight steps12 Regardless of the

model managing change requires astrategy in which the goals and focusof the change are clear to internal andexternal constituents For examplethe corporate consultant Glenn Llopisadvises being able to identify what thesuccessful implementation of a changestrategy would look like knowing whatthe change strategy is trying to solveand identifying the required resourcesand relationships to implement the

change management strategy

13

As theIT organization sifts through the differ-ent needs abilities and priorities of theinstitution and tries to adapt to changeit must avoid being caught in a viciouscircle of tactics with no purpose

A good change management strat-egy has multiple components which

include communications and inclu-siveness John Jones DeAnne Agu-irre and Matthew Calderone provideten sensible principles for managing

change by keeping the human elementat the center14 Involving every level ofan organization creating ownershipassessing the cultural landscape andcommunicating effectively are keyfactors Change always affects some-body somewheremdashboth internally andexternally IT organizations must doeverything possible to find engagedpeople who can advocate on behalf ofthe change strategy It helps to havechampions at all levels executiveswho can demonstrate the institutional

leadersrsquo commitment area leaders whocan reinforce commitment with theirworkforce and explain how the change

will benefit their part of the institu-tion and individual influencers whocan help determine success factorsidentify and address pain points andevangelize with their colleagues

But change management involves

more than communications and inclu-siveness A successful change is a fullydesigned change Too often institu-tional leaders conflate new initiativeswith new systems and fail to fully thinkthrough and execute on the business-end components The successfulintroduction of a new system mightrequire new or reengineered businessprocesses new roles and even differ-ent organizational structures Every

ldquoTechnology is now integrated into just about

every aspect of our colleges and universitiesThat allows us a myriad of opportunitiesto use technology to help students succeedacademically Using technology to helpstudents succeed is at the core of what we dordquo

mdashSteve FleagleChief Information Officer and Associate Vice President

The University of Iowa

FIGURE 9 Percentage of Institutions That Have Implemented the ITIL ChangeManagement Process

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

23

13

25

30

44

44

Source EDUCAUSE Core Data Service 2013

Involvingevery level of an

organization creatingownership assessing thecultural landscape and

communicating effectivelyare key factors Changealways affects somebody

somewhere

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 3: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 335

12 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Themes ofChange

Inflection PointChange Itrsquos a song thatrsquos been playingeverywhere the last several years Yoursquovebeen humming the tune perhaps danc-ing to its rhythm You may not knowall the words but everyone knowsthe refrain ldquoMobile-Cloud-Big Data-Business Value-Agile-Transformation-Social-Analytics-Online LearningrdquoSome people know just a verse or twosome know several and some are evenhelping to write new verses If change

has become a standard what is newabout 2015 Well nothing has changed

And everything has changed Informa-tion technology has reached an inflec-tion point

Mathematically an inflection pointis a point of change on a curve in whichthe concavity sign reverses Colloqui-ally the term is used to describe a turn-ing point that results in extraordinarychange Andy Grove Intelrsquos former CEOdescribed a strategic inflection point as ldquothat

which causes you to make a fundamentalchange in business strategyrdquo1 As Erik Brynjolf sson and Andrew

McAfee assert in The Second Machine Age this all comes back to Moorersquos Law whichposits a cyclical doubling of computingpower2 This doubling represents a rateof growth that is exponential Perhapsthe most vivid illustration of the powerof exponential growth is Ray Kurzweilrsquosconcept of the second half of the chess-board3 This concept is based on a legendabout the invention of chess When the

emperor asked the creator of chess toname his reward for having invented thegame the inventor requested that forthe first square of the board he wouldreceive one grain of wheat two for thesecond square four for the third squareand so forth doubling the amountfor each square Kurzweil noted thatalthough such an exponential growthpattern accrues only modest quantitiesat the beginning when the second half

FROM TECHNICAL TO BUSINESS

2 Optimizing the use of technology in teaching and learningin collaboration with academic leadership includingunderstanding the appropriate level of technology to use

3 Developing IT funding models that sustain core servicesupport innovation and facilitate growth

4 Improving student outcomes through an institutionalapproach that strategically leverages technology

5 Demonstrating the business value of informationtechnology and how the IT organization can help theinstitution achieve its goals

INFLECTION POINT

1 Hiring and retaining qualified staff and updating theknowledge and skills of existing technology staff

6 Increasing the IT organizations capacity for managing changedespite differing community needs priorities and abilities

9 Developing an enterprise IT architecture that can respond tochanging conditions and new opportunities

10 Balancing agility openness and security

FIGURE 1 Focus Areas of the 2015 Top 10 IT Issues

THE NEW NORMAL

7 Providing user support in the new normalmdashmobile onlineeducation cloud and BYOD environments

8 Developing mobile cloud and digital security policiesthat work for most of the institutional community

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 435

14 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

of the chessboard is reached the ensu-ing increases produce almost unimagin-ably large amounts Viewing the impactof Moorersquos Law from this perspective

we can see that technology will at somepoint reach the second half of thechessboard Brynjolfsson and McAfeeposit that this has already happenedand they call it the second machine ageldquoComputers and other digital advancesare doing for mental powermdashthe abil-ity to use our brains to understand andshape our environmentsmdashwhat thesteam engine and its descendants did formuscle powerrdquo4 Analytics cloud mobiledevices social media and online educa-tion might all be viewed as the fruits of

the second machine age IT architectureprocess optimization service manage-ment and risk management are efforts tomanage this overwhelming bounty

The second half of the chessboard isone reason for the inflection point wehave reached A second is related to thetechnology adoption curve Individu-als and institutions adopt technology atdifferent rates a few are on the bleedingedge a few are the last to change andmost fall somewhere in the comfortable

middle of the bell curve of adoptionThe higher education community isno exception (see Figure 2) In Crossingthe Chasm Geoffrey Moore describes apause or chasm between early adopt-ers and the mainstream5 An inflectionpoint in adoption is reached when main-stream adopters cross that chasm andbegin to enter a marketplace As Mooredescribes it they are motivated not bythe desire to innovate (which motivatesearly adopters) but by the need to solvea problem that their current solutions

cannot address a need that activates anotherwise cautious group When solu-tions become available that address theirparticular problems members of thatgroup will adopt new technologies

The present inflection point in highereducation information technology islikely due to improving solutions incloud analytics bandwidth and othertechnologies very real problems of costproductivity and student success and

1 Hiring and retaining qualified staff and updatingthe knowledge and skills of existing technologystaff

2 Optimizing the use of technology in teachingand learning in collaboration with academicleadership including understanding theappropriate level of technology to use

3 Developing IT funding models that sustain coreservice support innovation and facilitate growth

4 Improving student outcomes through aninstitutional approach that strategically leveragestechnology

5 Demonstrating the business value of informationtechnology and how technology and the ITorganization can help the institution achieveits goals

6 Increasing the IT organizationrsquos capacity formanaging change despite differing communityneeds priorities and abilities

7 Providing user support in the new normalmdashmobile online education cloud and BYODenvironments

8 Developing mobile cloud and digital securitypolicies that work for most of the institutionalcommunity

9 Developing an enterprise IT architecture thatcan respond to changing conditions and newopportunities

10 Balancing agility openness and security

Top 10 IT Issues 2015

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

the useful examples and learnings ofinnovators among our highly collegialcommunity This inflection point ishitting IT organizations hard As theystretch and struggle to help colleges anduniversities use technology to addresschallenges of student success afford-ability and accountability IT organiza-tions are retooling and restructuring toadapt to challenges of their own Thosechallenges include ensuring a stable

qualified and adaptable IT workforceand a clear and adaptable enterprisearchitecture In both cases ldquoadaptablerdquomeans the ongoing ability to respond tochanging technologies and solutionsThose changes are transforming both ITinfrastructure which is generally trans-parent to end users and IT services andsolutions which are very much on theminds of end users and in the strategiesof higher education leaders IT organiza-tions are struggling to manage both thepace and the volume of change on all

levels And anyone who has experienceda new system rollout knows how impor-tant good change management is to thesuccess of an initiative Managing infor-mation security in the light of ongoingnew technology opportunities for bothIT and higher education professionalspresents another set of challenges

Collectively IT leaders and profes-sionals may feel deluged by the volume

variety and pace of change In response

to that deluge many IT leaders areadopting a strategic approach to changethrough the use of frameworks for suchactivities as service management ven-dor management risk managementIT architecture information securitymanagement project managementprocess management and capabilitymaturity management On the surfaceframeworks may seem restrictive andbureaucratic which accounts for the

past reluctance by many in higher edu-cation to adopt them However at theirbest frameworks can provide stabilityin times of change by creating repli-cable and scalable environments that canadapt gracefully to new and changingcircumstances

From Technical to BusinessBridging the gap between technologysolutions and business problems is achallenge that many IT leaders are strug-gling to address Moving from the role

of technology leader to business leaderis the second major theme of the 2015EDUCAUSE Top 10 IT Issues

Perhaps most exciting this themehighlights the challenge of deliveringIT solutions that can address two of themost pressing issues in higher educationhow to apply technology to teaching andlearning and how to improve studentoutcomes To solve these strategic insti-tutional problems the IT and academic

communities need to collaborate andcocreate Each group has a different viewof the problem possesses different rele-

vant expertise and plays a different role

in the solution Further many solutionsthat were previously accessible only totechnologists are now available to endusers who are adopting applicationswith sometimes serious implications forinformation security data managementand IT architecture All this calls for theIT organization to recast its relationshipwith administrative and academic areas

This second theme is also relatedto the need to reach across the whitespace in the institutionrsquos organizationalchart so that the IT department better

understands the needs of the institutionand so that institutional leaders betterunderstand the exciting potential ofinformation technology and the timeresources and executive commitmentrequired to achieve that potential Thesuccess and perhaps even the survivalof higher education are more dependentthan ever on technology Members ofthe 2014 EDUCAUSE IT Issues Panelreport that many institutional leaders

believe that technology solutions areboth easier and less expensive than theyactually are Because those executivesare also increasingly interested in usingtechnology to achieve strategic goalsmany IT leaders are struggling to manageexpectations without losing credibilityor attention On the other hand some ITleaders are struggling with a different setof problems how to communicate moreeffectively with institutional leaders

FIGURE 2 Technology Adoption Curve for Higher Education Institutions

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

We are usually among the very firstto adoptnewtechnologies

3

43

We tend toadopt new technologiesafter our peersdo so

We tendto adoptnewtechnologiesat the paceof our peers

We strive to beearly adoptersof new technologieswhere we seeexceptionalbenefits

We are oneof the lastto adoptnewtechnologies

3

24

27

Movingfrom the role of

technology leaderto business leader is

the second majortheme of the

2015 EDUCAUSETop 10 IT Issues

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 635

16 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

and how to influence uninterestedleadership

Funding has made the EDUCAUSETop 10 list every year This year the chal-lenge with funding is to ensure that insti-tutional leaders understand the need tofund the entire IT portfolio so that theIT organization is capable of supportingthe aspirations ongoing operations andgrowth of the institution

The New NormalIn the midst of so much change chal-lenge and opportunity IT organiza-tions continue running core servicesand supporting end users IT staff stillgo into fire-fighting mode more oftenthan they would wish But even normaloperations are subject to the forces ofchange

Most notably bring-your-own-device

(BYOD) digitization and associated tech-nologies and opportunities are changingthe nature of user support and appropri-ate security policies In the first instancethe IT organization needs to retool andredefine its support strategy In the secondsecurity policies must comply with regu-latory requirements to protect data andprivacy without hamstringing academicsand administrators

Mark C Adams

Vice President for Information

Technology

Sam Houston State University

Mark I Berman

Chief Information Officer

Siena College

Christian Boniforti

Chief Information Officer

Lynn University

Michael Bourque

Vice President Information

Technology Services

Boston College

Karin Moyano Camihort

Dean of Online Learning and

Academic Initiatives

Holyoke Community College

Keelan Cleary

Director of Infrastructure andEnterprise Services

Marylhurst University

Jenny Crisp

QEP Director and Assistant

Professor of English

Dalton State College

Patrick Cronin

Vice President of Information

Technology

Bridgewater State University

Lisa M Davis

Vice President for Information

Services and ChiefInformation Officer

Georgetown University

Andrea Deau

Director of Information

Technology

University of Wisconsin

Extension

Patrick J Feehan

Director IT Policy and

Cybersecurity ComplianceMontgomery College

Steve Fleagle

Chief Information Officer and

Associate Vice President

The University of Iowa

Tom Haymes

Director Technology and

Instructional Computing

Houston Community College

Richard A Holmgren

Vice President for Information

Services and Assessment Allegheny College

Brad Judy

Director of Information

Security

University of Colorado System

James Kulich

Vice President and Chief

Information Officer

Elmhurst College

Jo Meyertons

Director Educational

Technology

Linfield College

Kevin Morooney

Vice Provost for Information

Technology and Chief

Information Officer

The Pennsylvania State

University

Angela Neria

Chief Information Officer

Pittsburg State University

Celeste M Schwartz

Vice President for InformationTechnology and College

Services

Montgomery County

Community College

Paul Sherlock

Chief Information Officer

University of South Australia

Francisca Yonekura

Associate Department Head

Center for DistributedLearning

University of Central Florida

EDUCAUSE IT Issues Panel Members

2014ndash2015

The EDUCAUSE IT Issues Panel comprises individuals from EDUCAUSE member institutions to provide quick feedback to EDUCAUSE on current issues problems andproposals across higher education information technology Panel members who are recruited from a randomly drawn and statistically valid sample to represent the EDUCAUSEmembership serve for eighteen months with staggered terms Panel members meet quarterly for ninety minutes via webinar or in person The meetings facilitated byEDUCAUSE Vice President Susan Grajek are designed as an ongoing dialogue to flesh out and refine an array of open-ended technology questions about the IT organizationthe institution and cross-institutional boundaries The members discuss refine and vote on the most relevant underlying issues or options

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Issue 1Hiring and Retaining

Qualified Staff andUpdating the Knowledge

and Skills of ExistingTechnology Staff

The long-held notion that infor-mation technology has threecritical dimensionsmdashpeopleprocess and technologymdashis stilltrue today Behind every suc-

cessful implementation of technology is

a group of talented people ensuring thateverything goes according to specifica-tions to meet the needs of the studentsand faculty Recruiting and retainingexceptional staff with the requiredknowledge skills and attitudes is not asmall feat Higher education competesfor talent in an extremely competitiveenvironment The technology fieldcurrently has very low and in someregions virtually no unemployment

As higher education competes with allindustries those of us in academe are

operating in an environment in whichchange comes quickly whether in tech-nology business disciplines or our coremissions of teaching and research Toattract maintain and retain the neces-sary talent higher education IT organi-zations need to adjust and adapt

Todayrsquos IT workforce needs are dif-ferent from needs in the past We need awide array of skill sets for roles that areevolving quickly The field of informa-

tion technology has always demandedthat professionals retrain and retoolto be able to design and support thelatest technologies Thus the ongoing

evolution of technical skills is not newHowever the very models for provid-ing and supporting technology-basedservices are in flux today This set ofchanges requires staff to be not onlyadept at retooling but also capable ofreinventing their roles And those rolesdemand entirely new skills To be ableto deliver the technology solutions thatstudents and faculty presently needwhile preparing themselves to lead theinstitution to adopt innovate or inventfuture technological advances IT staff

need such nontechnical qualities as ini-tiative grit adaptability and emotionalintelligence

Retaining talented staff requires aculture of teamwork that supports andencourages the growth of the individualand the team Management needs tofoster a vibrant workplace in whichdiversity is valued and individuals feelrespected Management must also rec-ognize that employeesrsquo views of satisfac-tion with their jobs are based on their

collective experiences ranging fromsalary to the culture of water-coolerdiscussions (see Figure 3) Leadersmust remember that every employeehas unique issues and methods of com-

municating so at times retention willcome down to one-on-one discussionsto understand employeesrsquo needs andto help employees understand their

role in the larger IT and institutionalstrategy Team members need to feelengaged with the organization and itsmission and they need to sense align-ment of their efforts with somethingimportant (eg mission) to have a senseof purpose With this sense of purposethey are more likely to be committed tothe institution But with such long-termcommitments also come the expecta-tion of ongoing skill development andcareer advancement opportunities

For performance management to

be successful it must become a criticaland continuous part of the operationsof the IT organization Managers mustensure that staff are aware of their fullbenefits packages and of leadershipefforts to provide a fulfilling and enjoy-able work environment Many institu-tions offer benefits and local area perksthat employees are not aware of

Augmenting the challenge o f hiringqualified staff is the exponential speedat which technology is continuously

changing In light of this new normalmany current roles and even profes-sions will not exist in the future Newroles and professions will arise toaddress changing technology delivery

FIGURE 3 Top Reasons IT Management and Staff Leave Their Jobs

CIOs MANAGERS STAFF

At high risk of leaving 1 in 8 1 in 6 1 in 5

Personal career goals are unattainable

Not recognized for value aside fromcompensation

No opportunities to learn and grow in the past year

Institutional mission does not make me feelmy job is important

Not compensated fairly

Based on rated importance of working in higher education combined with reported likelihood of pursuing opportunities outside theinstitution

Source Jacqueline Bichsel Todayrsquos Higher Education IT Workforce (Louisville CO ECAR January 2014)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 835

18 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

pedagogical and research methods and higher education business models

Not all staff will be able to recognize or adapt to these changes Managersneed to help staff recognize and prepare for new oppor tunities to minimizethe disruption Change affects not only the individuals who are disruptedbut also those staff who are bystanders witnessing the change and anticipat-ing the worst

Fortunately IT management is not without support That support b eginsby building a partnership with the Human Resources department (HR) Asuccess for the IT organization is a success for HR

Advice983150 Know how to sell the value of a career that contributes to the advance-

ment of higher education and its teaching learning and researchmissions983150 Develop a list of the nonmonetary benefits of working for the institution

and share that list with staff983150 Hire staff not just for their fit for the job but also for their emotional

intelligence and fit with the values and culture of the IT organization andthe institution At the same time remember that the strongest teams arethose that are most diverse so strive for a heterogeneous workforce thatshares a common set of core values

983150 Work with staff to select appropriate training Funding and facilitatingtime for training and travel is only part of the process Establish somedeliverables and accountability for the training so that employees returnto the office with the anticipated insights and skill set

983150 Work with HR to develop career paths for the major divisions of or rolesin central and distributed IT units Careers paths donrsquot have to stay withinthe IT organization consider lateral paths that can broaden someonersquosinstitutional or business experience Develop paths that reward knowl-edge work as well as managerial talent and understand that not everystaff member need aspire to leadership

983150 Create a talent plan for the IT organization itself Identify the skill setsand roles the organization will need to acquire and retire in the next oneto three years Create a roadmap to where the organization needs to headand begin working with HR now to implement the roadmap with as littledisruption as possible for individual staff and o perations

Issue 2Optimizing the Use

of Technology inTeaching and Learningin Collaboration with

Academic LeadershipIncluding Understandingthe Appropriate Level of

Technology to Use

C

olleges and universities con-tinue to invest in technologiesin support of teaching and

learning while struggling withways to help faculty understandthe value and potential impact of thesetechnologies An overlooked but criti-cal starting point is for an institutionto define its educational objectives andstrategy Institutions whose educationalculture is intentionally and predomi-nantly residential ones that serve manypart-time working commuters thosewith strong global outreach techno-logical institutes and institutions withstrong practicum orientations may all

grant similar degrees but will have verydifferent pedagogical strategies andtherefore different educational tech-nology needs Without a larger guiding

vision the application of technology toteaching and learning is neither strate-gic nor optimized it is instead a series ofendpoint solutions driven by individualfaculty requests and by the best (oftenuncoordinated) efforts of service pro-

viders throughout the institution

ldquoWe must be willing to combine someof the best benefits that business has to

offer (eg flexible work arrangements)with the strong selling points of a careerin higher education (eg connection withthe mission)rdquo

mdashMichael Bourque Vice President Information Technology Services

Boston College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

It is important to view technology asa supporting tool similar to earlier toolssuch as blackboardchalk Technolo-gies need to be carefully scrutinized

for their pedagogical implications Alt ho ug h on li ne co ur se s of fer th eallure of convenience and the opening(and thus increasing) of enrollments tostudents who might not otherwise beable to attend college in a traditionalmanner their pedagogical effectivenessshould be assessed as carefully as that oftraditional classroom courses Doing so

might identify gaps in overall pedagogi-cal assessment at an institution and thusimprove even face-to-face learning Thereal value of technologies is how facultyintegrate the technologies into theirteaching and learning and how they usethe technologies to further refine theircourse delivery and student engage-ment (see Figure 4)

If institutional leaders become moreintentional about their pedagogicalobjectives and assessment methodsthey will have the opportunity to influ-

ence the institutional technology mar-ketplace Todayrsquos solutions could bemuch more effective with better guid-ance from the leadership at colleges anduniversities

For example faculty often findthemselves overwhelmed with the vol-ume of new technologies and the ongo-ing upgrades of existing technologiesas they struggle to find time to researchhow to integrate the technologies into

their teaching Faculty new to onlinelearning will commonly try to replicatetheir physical classroom online butthis is a classic McLuhanesque mistake6

Optimizing the use of technology inteaching and learning depends on theability of the institutional and academicleadership to help faculty develop theirdigital competency and then to con-tinue to provide learning opportunitiesto keep their competencies currentFaculty need ongoing digital literacyopportunities that enable them to betterunderstand not only educational tech-nologies but also the social technolo-

gies that are affecting their everydaylives and the everyday lives of their stu-dents Those students expect engage-ment in their instruction Faculty need

to understand instructional narrativeand the implications of media as part oftheir technological introduction This ismore than just training on a particulartechnology It is as the saying goes thedifference between giving a man a fishand teaching him how to fish

The effective optimization ofinstructional technology also requiresrethinking reinforcing and clarifyingroles and relationships among faculty

ldquoFaculty armed with current understandingand research on the power and value

of technologies are more likely to usetechnology to enhance their pedagogicalapproachesrdquo

mdashCeleste M Schwartz Vice President for Information Technology and College Services

Montgomery County Community College

FIGURE 4 Integrating Technology into Courses

ldquoI could be a more effective faculty member if I were better skilled at integrating this technology

into my coursesrdquo

Percentage of respondents

3D printers

Non-keyboard or non-mouse computer interfacesSocial media as a teaching and learning tool

E-portfolios

Lecture capturerecordings

E-books or e-textbooks

Simulations or educational games

LMS

Online collaboration tools

Free web-based content

Agree Strongly agree

50250 75 100

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014 (Louisville CO ECAR July 2014)

The

real value oftechnologies is howfaculty integrate

technologies intoteaching and learning

and how they usetechnologies to further

refine course delivery andstudent engagement

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1035

20 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

librarians teaching and learn-ing center professionals and ITprofessionals They all need to

view themselves as colleag ues

and even partners in designingthe right infusion of technologyresources at the right time duringthe instructional process

Is all this a tall order Yes Butit is directed toward the primarymission of higher education andis thus well worth addressing Ifcollege and university leaders donot optimize the use of technol-ogy in teaching and learningexisting and emerging alterna-tives will almost certainly step

forward to fill the gap

Advice983150 Work with academic leader-

ship to articulate the institu-tional strategy for the use oftechnology in teaching andlearning to best fit the institu-tional culture and priorities

983150 Translate that strategy into ateaching and learning tech-

nology roadmap that pri-oritizes the technologies thatwill best achieve the institu-tional strategy and fit institu-tional resources

983150 Define and clarify roles insupporting instructionaltechnology to bring togetherall relevant institutionalparties as productively aspossible

983150 Move to a technology sup-port model that aligns tech-

nology integration supportand faculty professionaldevelopment that is courseprogram specific and basedon research that demonstratesimproved student engage-ment and success

983150 Ensure that faculty have suf-ficient support and releasetime to integrate the tech-nologies into their courses

Issue 3Developing IT Funding

Models That SustainCore Service

Support Innovation andFacilitate Growth

As governmental financial sup-port for higher educationcontinues to decline bothpublic and private institutionsare desperately trying to focus

scarce resources on strategically impor-

tant needsTo create funding models that willsustain IT operations IT leaders need toclarify to institutional leaders and boardsof trustees why IT services are strategi-cally important to the enterprise Articu-lating and making some of the toughstrategic choices explicit is fundamentalto developing a sustainable fundingmodel As the role of information tech-nology in higher education matures andas institutions are increasingly pressedto balance costs with tangible benefits

IT leaders will need to strengthen andleverage their relationships with gover-nance groups connect execution withstrategy and exploit funding models tiedto institutional strategy (see Figure 5)

EDUCAUSE defines gov ern anc e asldquohow a higher education institution isorganized for the purposes of decisionmaking and resource allocation andhow the varying parts are managed ina way that promotes the mission of the

institutionrdquo7 The distributed nature ofhigher education institutions thoughhighly effective in supporting innova-tion and meeting specialized needs can

be a roadblock to strategic investmentsand efficiency realization InstitutionalIT governance can help achieve andsupport a clear IT strategy When IT gov-ernance programs have influence over ashared pot of institutional resources andare able to prioritize strategic IT invest-ments IT leaders can support ongoinginnovation and growth across the entireinstitutional portfolio of functions Inthe absence of institutional IT gover-nance IT projects will be prioritizedaccording to which areas can most easily

secure funding for their priorities Inevi-tably worthy and even critical projectswill not be funded if they are not spon-sored by well-resourced areas

Capital funding is relatively easy tosecure obtaining additional operationalfunding is much more difficult Sincemost capital projects have an opera-tional impact the differential access tofunding streams can create significantproblems for budget managers To sat-isfy demand and remain competitive

leaders at higher education institutionshave allocated capital funds to coverthe development cost of new IT infra-structure yet they seldom incorporateplans for ongoing operational funding ofcapital projects As a consequence thereis a fundamental misunderstanding ofthe total cost of information technologyand often no culturally accepted billingmodels exist for one-time and full-life-cycle costs

To help governance groups under-stand and support funding for the real

cost of information technology IT lead-ers need to develop total cost of owner-ship (TCO) scenarios and vet them withappropriate groups before projects arefunded Higher education informationtechnology is dogged by cost-savingsexpectations that usually create a falsesense of expenditure reduction In somecases the benefit of the IT investmentderives from risk reduction or new func-tionality and cost savings are not to be

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

expected In other cases cost savingsare theoretically possible but difficultto achieve if non-IT changes such asbusiness process redesign are requiredto realize them Even if the project is

successfully completed funding mayneed to shift to derive real institutionalsavings For example an IT project thatintroduces efficiencies to academicdepartments or business units mayreduce costs for the departments or units

and also for the institution overall butthe project may increase IT costs To real-ize net savings for the institution budgetfunding needs to be withdrawn from thedepartment and a portion needs to be

directed to the IT organization to coverits increased costs with the balanceaccruing to the bottom line of the insti-tution When each department controlsits own budget those shifts and realloca-tions are very difficult to negotiate and

often fall apart eroding any potentialcost savings

Growth can be managed but doingso requires service management models

that are able to project and prepare forgrowth Those models need to includecost management to ensure that serviceproviders understand and budget forboth fixed and variable costs The pay-ing IT customersmdashwhether institutionalleaders or individual departmentsmdashneedto understand IT service cost drivers andhow they can help manage those driv-ers Funding for growth in variable costsis relatively easy to justify if IT servicemanagers have and can show data onboth growth and the associated costs

Funding for growth in fixed costs needsto be justified as well and that requiresdata on the cost increases and a justifi-cation of the risks that will be reducedthe functionality that will be added orenhanced or some other compelling

FIGURE 5 IT Spending on Institutional Activities

Institutionalgrowth

Running theinstitution

Transformativechange

1576 9

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1235

22 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

reason This approach also paves the way for discussions of tradeoffs that mightaccommodate growth without increasing funding such as service-level reduc-tions shared services or outsourcing

Supporting innovation is a key piece of IT resource justification Studentsexist in a digital ecosystem and expect educational institutions to interact withthem in the ways that they are used to interacting with each other and with thecommercial entities they deal with on a daily basis Banks retail stores andeven government services are available to them through a multiplying swarmof devices Institutional leaders are increasingly aware that higher educationneeds to deliver services in the same way and that the development of an ITarchitecture to do so takes resources To better afford the resources necessaryto keep institutions current the IT organization itself needs to be innovativein the way it is organized the way it delivers IT services and the way it workswith various institutional constituencies Recognizing that IT drivers andcore services in 2014 may not even remotely resemble those necessary in 2020

demands funding flexibility since too tight a correlation will act as a disincen-tive to improvement and will create technology lags greater than those of thelast decade

Different but rigorous strategies for IT core services growth and innovationwill help in the development of IT funding models that best fit these separateactivities and are aligned with the institution and its constituents Effective ITgovernance can tie these three activities together and prioritize the IT expensein ways that support existing operations ensure ongoing innovation andrespond to growth across the entire IT portfolio

Advice983150 Benchmark IT finances by participating in the EDUCAUSE Core Data

Service983150 Ensure that IT projects build models for ongoing operational funding into

project deliverables and expectations983150 Establish an institutional IT governance structure that is responsible for allo-

cating funding not just identifying IT priorities983150 Understand the costs and cost drivers of todayrsquos IT services983150 Help leadership understand both the costs and the benefits of information

technology Arguments for new IT initiatives should always include cost esti-mates as well as estimates of the costs of not innovating

983150 Build the costs of growth and maintenance into funding models for core ITservices

Issue 4Improving Student

Outcomes through anInstitutional Approach

That StrategicallyLeverages Technology

The benefits of completing acollege education are widelyknown They include higherlifetime earnings greater levelsof happiness increased civic

engagement and reduced health risks

There are also societal benefits as theproportion of college graduates in thepopulation increases So it is in our ownbest interests to help both individualsand society by improving the successof students at our higher educationinstitutions

There are few cases in which tech-nology by itself has helped studentssucceed However there are opportuni-ties for technology to support studentsuccess initiatives The first task for anyinstitution is to assess both the insti-

tutional needs and the most currentremedies for the pain points that areidentified Although this is a constantlyand rapidly evolving area some specificexamples include the following

983150 Developin g a training course (orworkshop) to help students under-stand the technology landscape ofthe institution and how they can usethose tools to succeed

ldquoWhen it comes to innovation is the ITfunding principle lsquoWe optimize new IT

investments for the entire institutionrsquo orlsquoWe optimize new IT investments for theindividual unitsdepartmentsrsquo or bothPricing models will emerge accordinglyrdquo

mdashKarin Moyano CamihortDean of Online Learning and Academic Initiatives

Holyoke Community College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Removing barriersmdashs uch as accessusability and lack of supportmdashto theeffective use of technology

983150 Using technology to recast large lec-

ture courses and support pedagogi-cal transformations

983150 Using technology to provide flex-ibility for students to match thecourse with their learning style

983150 Using technology to distributelearning content in multiple waysincluding lectures (live and archivedfor review) electronic texts andlearning management systems

983150 Using technology such as peertutoring discussion boards andg roup videoconferences (eg

Google hangouts) to facilitate syn-chronous and asynchronous inter-actions with others and to promotecollaborative learning

983150 Considering the emerging role oftools used traditionally by business(ie CRM) to manage the institu-tionrsquos relationship with the student

983150 Applying elements of what is beinglearned in competency-based edu-cation initiatives at an institutionallevel for traditional students

Institutional leaders continueto emphasize and pour resourcesinto improving student retentionand completion Technology can beapplied to develop the broad area oflearning analytics to provide feedbackto students on their behavior (both pastand predictive) to faculty on the effec-tiveness of the pedagogy employed inthe course to content providers (andfaculty who select the content) on theeffectiveness of the content used in the

course and to administrators on broadsystemic issues and trendsMany colleges and universities

have student success committees thatfocus on initiatives to improve coursecompletion program completion andstudent support services Examplesof initiatives can be found in the areasof teaching and learning and studentsupport services In the area of reme-dial education great strides have been

made in reducing time to completionfor remedial students and in increas-ing retention and completion rates Anexample of the work occurring in the

area of student success can be found onthe Achieving the Dream InterventionsShowcase website (httpachievingthedreamorgresourcesachieving-the-dream-interventions-showcase) withmany of those interventions strategi-cally leveraging technology

As data analytics tools have becomemore sophisticated institutionshave been better able to recognizestudentsrsquo challenges and track stu-dentsrsquo journeys With theimplementation of early

alert systems advisors andfaculty have been able toassist students with just-in-time intervention recom-mendations In addition itis becoming commonplacefor advisors to have access todata beyond the traditionalERP demographic and stu-dent gradesmdashdata such ascourse performance throughlearning management sys-

tems early alert informationtutoring participation andeducation planning informa-tion (see Figure 6) Systemslike these sometimes referred to asIntegrated Planning and AdvisingServices (IPAS)8 permit the advisor tosupport and coach students based ona comprehensive view of the studentsrsquoinformation throughout their educa-

tional journey In the area of onlineeducation too wraparound studentsupport services are mirroring the on-ground experience with some colleges

and universities implementing careercoaches with supporting technologiesto provide services to online studentsThe integration of technologies in eachof these areas has had a positive impacton improving student outcomes

A variety of existing tools many stillin the early development stages canhelp institutions gather data to identifystudentsrsquo success opportunities andtheir achievements This information

is only as good as the data however Tofind the low-hanging fruit IT leadersneed to begin the data conversationsto locate tools that may already begenerating useful data To capture rele-

vant aspects of the student experience

FIGURE 6 Technology for Supporting Education Planning Advising and Counseling and Early Alerts

Source EDUCAUSE Core Data Service 2013

46

66

73

Early alert systems

Education planningacademicprogress tracking

Academic advising

Percentage of institutions

Tocapture relevant aspects

of the student experienceleaders must think institutionally

and identify technologyresources that canbring together the

diverse and enormousdata sets that represent this

experience

(continued on page 26)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1435

To create sustainable IT funding models IT leaders need to

clarify to institutional leaders and boards of trustees why

IT services are strategically important to the enterprise

TOP 10 IT ISSUES

EVOLVING STAFFING MODELS

IMPROVING

STUDENT

OUTCOMES

OPTIMIZING TECHNOLOGY IN

TEACHING AND LEARNING

FUNDING IT STRATEGICALLY

soft skills

moreresources

professional development

clear goals networking

65

Technical proficiency is as important as ever

So skills are more important that ever before

higher education IT staff are not

satisfied with their current position

To be more effective IT

staff say they need

of students wish their

instructors would use

early-alert systems more

of central ITrsquos budgetis spent running the institution

is spent on growth

is spent on transformation

Students respond

positively to learning

analytics opportunities

not at allimportant

technical proficiencystrategic planning

effective communication

1

veryimportant

5

Top 3 motivators for faculty integration of technology

in the classroom

bull Clear indicationevidence that students will benefit

bull Release time to designredesign courses

bull Confidence that the technology will work as planned

1 in 4

Todayrsquos market for IT talent is competitive Hiring andretaining top talent requires engaged managers whopossess and know how to foster good communication skills

Faculty and students alike are

interested in learning analytics for

notifications on course progress

Although technology is omnipresent in the lives ofstudents leveraging technology to engage students in

meaningful ways and to enhance learning is still evolving

76

15

9

I think this is great

This sounds positive

I am neutral

This sounds negative

Irsquom totallyagainst this

Spending model

breakdown in the USdoes not differsignificantly by

Institution type

Size

Central IT staff size

CIO reporting line

25

0

50

75

100

E D U C

A U S E E

R E S

E A R C

H S N

A P S H

O T

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1535

A look into EDUCAUSE research on the 2015 list of the

most intriguing ideas in higher education IT

DEMONSTRATING

VALUE OF IT

DEVELOPING

SECURITY

POLICIES FOR

THE INSTITUTION

DEVELOPING ENTERPRISE IT

ARCHITECTURE

BALANCING INFORMATION

SECURITY AND OPENNESS

INCREASING CAPACITY

FOR CHANGE

PROVIDING USER SUPPORT

The gaps between effectiveness in and

importance of addressing risks are large

Percentage using the college or university help desk for support

Percentage looking to peers

Student Device Ownership

Between 2005 and 2014 there were 727 education-sector

data breachesmdashinvolving more than 14 million recordsmdashas

reported to the Privacy Rights Clearinghouse

locally integrate the

architectures of multiple

major systems

follow the architecture of a

primary system or suite

20142013

25

0

50

75

100

2015 projection

Smartphones

Tablets

86

47

31

76

58

90

Information security

Data privacyconfidentiality

Identityaccess management

66

66

84

82

79

70

36

1

33

29

The most important IT risks to

address concern security privacy

and access

In a world of increasing

complex security threats

institutions must move from

a reactive to a proactive security response

We are living in an era when readily

accessible technologies facilitate a

BYOD standard requiring institutions

to rethink user support

A well-defined enterprise IT architecture is instrumental to

optimizing opportunities and managing change effectively

The higher education community is

struggling with the pace variety and sheer volume

of change in information technology as well as the

corresponding risks

IT leaders need to draw the lines from

technology initiatives to their institutionsrsquo

changing strategic objectives and on to the

ultimate bottom lines of mission and means

OtherLossthestInternal threatsExternal threats

81of institutions

do notaddress IT risk

in their strategicplan

7357

69

22

Faculty

Students

effectiveness

importance

effectiveness

importance

effectiveness

importance

6 3 10 10

Breachcauses

53Administration

37Teaching

and learning

10Researchother

Percentage of IT spend by institutional mission

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1635

26 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

leaders must think institutionally and identify technology resources that

can bring together the diverse and enormous data sets that represent thisexperience

As was discussed last year when this was the 1 issue in the 2014 Top 10list looking at this data may raise privacy issues so leaders must rememberto include the appropriate individuals in these discussions to ensure compli-ance security and privacy

Advice983150 Keep in mind that students consider success from a holistic view of their

campus experience not necessarily their experience with just a courseor a semester To maximize the impact of technology identify the combi-

nation of data and tools that will encompass as much of the institutionalexperience as possible983150 Remember that results will be only as good as the data Take time in the

beginning to build a reliable strategic foundation by starting with conciseoutcome objectives and then develop t he data-driven questions that willultimately define actionable steps to influence success

983150 Work with key individuals from various institutional areas to identifydata that may be available at an individual student level and that could becombined with other values to establish an assessment point for the stu-dent Next consider comparing this assessment point with the studentrsquossuccess level and attempt to identify some trends Drill down to indica-tors that can be used as targets for predicting success and for identifyingearly warning signs

983150 Ensure that the project is embedded in a cross-institutional student suc-cess effort that includes all relevant parties Dedicated student successteams or cross-departmental governance structures can be the vehiclefor organizing consensus Donrsquot allow a perception of IT ownership todevelop

983150 Resolve problems in academic and business processes before implemen-tation donlsquot adapt applications to dysfunctional processes

983150 Define the role of faculty in improving student outcomes through thestrategic leveraging of technology

983150 Determine how much individualized student data should be shared withadvisors in supporting improved student outcomes

Issue 5Demonstrating the

Business Value ofInformation Technologyand How Technology

and the IT OrganizationCan Help the Institution

Achieve Its Goals

IT leaders need to continue to get bet-ter at drawing the lines from technol-ogy initiatives to their institutionsrsquochanging strategic objectives and on

to the ultimate bottom lines of mis-sion and means Successfully demon-strating the business value of informationtechnology to the institution begins withdeveloping a clear understanding of the

various ways in which technology as awhole and the IT department as a unitadd value to the institution Institutionalleadersrsquo struggle to respond to changingpublic perceptions of the value of highereducation itself is a complicating factorHerein lies an opportunity for IT profes-sionals not only to demonstrate the value

of the IT organizationrsquos particular offer-ings but also to create new and significant value for the institution This requiresthinking of technology strategy as both aconsequence and a driver of institutionalstrategy IT leaders who have the abilityto see the entire institutional landscapeand can offer strategic insights for movingthe institution forward have never beenmore important to the well-being of col-leges and universities

ldquoInstead of reacting to new technologiestop institutions seek out new technologies

as a strategic imperative leveraging theseinnovations to improve learning insideand outside the classroom with datadecision making enhanced pedagogy andbetter student outcomesrdquo

mdashLisa M Davis Vice President for Information Services and Chief Information Officer

Georgetown University

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

So in what ways do IT leaders add value They add value to the organizationby enhancing the core productmdashnamelythe learning experiences of students and

the teaching activities of faculty They add value very directly by creating new chan-nels through which students can accessinstitutional offerings The channels thatonline opportunities provide would notexist without the technologies deliveredand supported by the IT organizationFrom a business perspective this cre-ates new sources of revenue a criticalobjective for virtually all colleges anduniversities Drawing a clear line that con-nects specific technology initiatives withtangible revenue for the institution is a

powerful way to demonstrate the busi-ness value of technologymdashand of the ITorganization

And of course the yin of revenue isbalanced by the yang of cost reductionStories of expense reduction and effi-ciency are perhaps easier to identify andtell and they should be carefully and dili-gently told but IT leaders must be carefulto also emphasize the much larger poten-tial that a clear focus on the revenue sidecan provide Doing so can help to avoid

the impression that the value of informa-tion technology is limited to simple actsof automation and efficiency Part of thiswork entails ensuring that the institu-tional leadership understands what is andis not possible Many times the need tohave the value discussion in the first placeis because leaders are not inherently feel-ing the value Those in the IT organiza-tion must take the time to develop andprovide clear data-based informationabout the services they deliver and valuethey provide

One way to demonstrate value iswith well-constructed service portfoliosand service catalogs A service portfolioprovides a high-level overview of howfunds are spent on major institutionalstrategic and operational goals and isgeared toward institutional leaders Aservice catalog (see Figure 7) provides amore detailed view into how IT dollarsare spent on IT projects products andservices and is geared toward IT leaders

Combined the service portfolio and theservice catalog can be a useful tool forshowing the business value of the invest-ments that institutions make in informa-tion technology

Assembling a service portfolio andcatalog may be the IT organizationrsquos firstcomprehensive view into the actual valueit is bringing to the institution Depend-ing on that value IT leaders may first needto focus on quick fixes to better align theirservices with the institutional mission

Before IT leaders can advocate howinformation technology can be leveragedto drive the business the IT organiza-tion must be operationally effective andefficient Institutional and business unitleaders must view the IT organizationas providing operational excellence andoutstanding customer service before theywill consider it as a partner in deliveringbusiness value

The CIO and IT leadership teamsshould remember that they are the pri-mary marketing avenue for sharing the

value that information technology bringsto the institutional mission IT leadersspend about 10 percent of their time ongovernance and planning and on innova-tion with business and academic units9 IT leaders thus must be intentional aboutidentifying opportunities for communi-cating how the IT organization is help-ing the institution CIOs must establish

strong and trusting relationships withtheir peer business leadersSharing the value of information

technology begins with IT leadership butmust extend to the entire IT organization

All IT staff must understand how theirwork contributes to the institutional mis-sions and priorities They need to under-stand the IT organizationrsquos capabilitiesand priorities and how the organizationcan advance the institution the indi-

vidual business units and the faculty stu-dents and staff with whom they work IT

leaders can encourage and enable IT staffto learn the mission business processesand requirements of business units inorder to understand how informationtechnology can best be leveraged Get-ting to this point may require a culturechange within the IT organization At the

very least all IT staff should know boththe institutional and the IT priorities toensure that everyone is telling the samestory

FIGURE 7 Percentage of Institutions with a Service Catalog

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

32

17

29

40

56

62

Source EDUCAUSE Core Data Service 2013

IT leaders add value

to the organization byenhancing the core

productmdashnamely thelearning experiences of

students and the teachingactivities of faculty

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1835

28 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Advice983150 Map IT priorities to institutional priorities Find the points of intersection

with the business unit operations customers and technology Partnerwith the business unit to develop a roadmap and to align the business withthe IT architecture

983150 Donrsquot wait for an invitation to discuss business and customer impact Butdonrsquot try to boil the ocean keep focused and be clear about what the IT

organization can and cannot do IT leaders must be translators usingterminology that resonates with non-IT experts and connecting the dotsbetween the technology capabilities and the business needs Develop asmall set of short and simple stories about concrete ways in which tech-nology has improved the learning experience at the institution createdaccess to institutional resources strengthened affinity for the institutiongenerated revenue and streamlined operations Focus at least as much onhelping others see what is possible with technology as on showing howtechnology investments improve current institutional life

983150 Develop a service catalog to serve as a base for connecting the work of theIT organization to the larger institutional strategic objectives

983150 Implement a metrics program that can demonstrate the extent to which theIT organization is achieving its service-level goals customer-satisfaction

goals and financial goals and is delivering on strategic priorities983150 Ensure that IT leaders and IT staff understand what drives academic and

business value for the institution and can identify and articulate how tech-nology can deliver that value Consider attending non-technology confer-ences to learn how business officers faculty and academic leaders thinkabout technology and what their pressing problems are Be the translatorfor business strategy

983150 To reach the broader institutional community consider newslettersbrown-bag gatherings and roundtable discussions and take advantageof recurring events such as National Cyber Security Awareness Month(httpwwweducauseeduncsam) and start-of-the-semester gatherings

Issue 6Increasing the IT

Organizationrsquos Capacityfor Managing Change

Despite DifferingCommunity Needs

Priorities and Abilities

Change is the watchword todayand going forward In the 2011book Race against the Machine MIT economists Erik Bryn-jolfsson and Andrew McAfee

write ldquoAdvances like the Googleautonomous car Watson the Jeop-ardy champion supercomputer andhigh-quality instantaneous machinetranslation then can be seen as thefirst examples of the kinds of digitalinnovations wersquoll see as we move into the phase where exponentialgrowth yields jaw-dropping resultsrdquo10

When technology changes organiza-tions are always challenged to adapt tonew circumstances This is par ticularlytrue of the organizations tasked with

implementing and maintaining thetechnology itselfThe higher education community

is struggling not only with the pace ofchange in information technology butalso with the variety and sheer volumeof change Information technology isincreasingly important to and increas-ingly integrated with all aspects ofboth the strategic and the operationalfunctions of the campus The chal-

ldquoWe also add value by creating newways for those who know us less well to

develop affinity with our institutions Asmall MOOC my college offered made usknown to groups of prospective studentswho would never have paid a momentrsquosattention to any traditional advertisingmessages we might have sent By joiningtheir party first via our technologies weput ourselves in a much better position to

invite them to our partyrdquomdashJames Kulich

Vice President and Chief Information OfficerElmhurst College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

lenge is how to engage multiple areasof the institution and expand servicesin numerous simultaneous initiativesMeanwhile institutional informa-

tion technology is reengineering itsinfrastructure platforms and servicesThose change efforts are often additiveto the applications being introduced aspart of new business-area initiatives

Ideally the institutional stancetoward change is proactive and ITleaders have the vision and good senseto advocate to broker and to preparetheir various constituents for upcom-ing changes while sustaining ongo-ing operations In reality end users

vary widely in their predisposition to

technology As a group students andfaculty are positively disposed towardinformation technology but as indi-

viduals they run the gamut (see Figure8) And attitudes influence behaviorthe way faculty and students adopt and

FIGURE 8 Relationship between Faculty Attitudes toward Online Learningand Their Experience with Online Teaching

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014(Louisville CO ECAR July 2014)

Percentage of respondents who agree or strongly agree

No recent onlineteaching

Some recentonline teaching

50250 75 100

All respondents

Online learning helps students learn more effectively

Online learning will lead to pedagogical breakthroughs

Online learning will make higher education available to more students

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2035

30 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

use technology tends to reflect theirattitudes11

The IT organizationrsquos history of exe-cution can influence community open-ness toward future technology changesThe shadow cast by a deeply flawed ERPimplementation for example can last adecade or longer

Change management is preciselythat managing change rather than lettingchange happen on its own (see Figure 9)

Successful change management is notaccidental or organic It is intentionaland has multiple components Manyinstitutions adopt a specific approachto implementing changemdashapproachessuch as ADKAR Kurt Lewinrsquos changemanagement model and John Kot-terrsquos eight steps12 Regardless of the

model managing change requires astrategy in which the goals and focusof the change are clear to internal andexternal constituents For examplethe corporate consultant Glenn Llopisadvises being able to identify what thesuccessful implementation of a changestrategy would look like knowing whatthe change strategy is trying to solveand identifying the required resourcesand relationships to implement the

change management strategy

13

As theIT organization sifts through the differ-ent needs abilities and priorities of theinstitution and tries to adapt to changeit must avoid being caught in a viciouscircle of tactics with no purpose

A good change management strat-egy has multiple components which

include communications and inclu-siveness John Jones DeAnne Agu-irre and Matthew Calderone provideten sensible principles for managing

change by keeping the human elementat the center14 Involving every level ofan organization creating ownershipassessing the cultural landscape andcommunicating effectively are keyfactors Change always affects some-body somewheremdashboth internally andexternally IT organizations must doeverything possible to find engagedpeople who can advocate on behalf ofthe change strategy It helps to havechampions at all levels executiveswho can demonstrate the institutional

leadersrsquo commitment area leaders whocan reinforce commitment with theirworkforce and explain how the change

will benefit their part of the institu-tion and individual influencers whocan help determine success factorsidentify and address pain points andevangelize with their colleagues

But change management involves

more than communications and inclu-siveness A successful change is a fullydesigned change Too often institu-tional leaders conflate new initiativeswith new systems and fail to fully thinkthrough and execute on the business-end components The successfulintroduction of a new system mightrequire new or reengineered businessprocesses new roles and even differ-ent organizational structures Every

ldquoTechnology is now integrated into just about

every aspect of our colleges and universitiesThat allows us a myriad of opportunitiesto use technology to help students succeedacademically Using technology to helpstudents succeed is at the core of what we dordquo

mdashSteve FleagleChief Information Officer and Associate Vice President

The University of Iowa

FIGURE 9 Percentage of Institutions That Have Implemented the ITIL ChangeManagement Process

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

23

13

25

30

44

44

Source EDUCAUSE Core Data Service 2013

Involvingevery level of an

organization creatingownership assessing thecultural landscape and

communicating effectivelyare key factors Changealways affects somebody

somewhere

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 4: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 435

14 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

of the chessboard is reached the ensu-ing increases produce almost unimagin-ably large amounts Viewing the impactof Moorersquos Law from this perspective

we can see that technology will at somepoint reach the second half of thechessboard Brynjolfsson and McAfeeposit that this has already happenedand they call it the second machine ageldquoComputers and other digital advancesare doing for mental powermdashthe abil-ity to use our brains to understand andshape our environmentsmdashwhat thesteam engine and its descendants did formuscle powerrdquo4 Analytics cloud mobiledevices social media and online educa-tion might all be viewed as the fruits of

the second machine age IT architectureprocess optimization service manage-ment and risk management are efforts tomanage this overwhelming bounty

The second half of the chessboard isone reason for the inflection point wehave reached A second is related to thetechnology adoption curve Individu-als and institutions adopt technology atdifferent rates a few are on the bleedingedge a few are the last to change andmost fall somewhere in the comfortable

middle of the bell curve of adoptionThe higher education community isno exception (see Figure 2) In Crossingthe Chasm Geoffrey Moore describes apause or chasm between early adopt-ers and the mainstream5 An inflectionpoint in adoption is reached when main-stream adopters cross that chasm andbegin to enter a marketplace As Mooredescribes it they are motivated not bythe desire to innovate (which motivatesearly adopters) but by the need to solvea problem that their current solutions

cannot address a need that activates anotherwise cautious group When solu-tions become available that address theirparticular problems members of thatgroup will adopt new technologies

The present inflection point in highereducation information technology islikely due to improving solutions incloud analytics bandwidth and othertechnologies very real problems of costproductivity and student success and

1 Hiring and retaining qualified staff and updatingthe knowledge and skills of existing technologystaff

2 Optimizing the use of technology in teachingand learning in collaboration with academicleadership including understanding theappropriate level of technology to use

3 Developing IT funding models that sustain coreservice support innovation and facilitate growth

4 Improving student outcomes through aninstitutional approach that strategically leveragestechnology

5 Demonstrating the business value of informationtechnology and how technology and the ITorganization can help the institution achieveits goals

6 Increasing the IT organizationrsquos capacity formanaging change despite differing communityneeds priorities and abilities

7 Providing user support in the new normalmdashmobile online education cloud and BYODenvironments

8 Developing mobile cloud and digital securitypolicies that work for most of the institutionalcommunity

9 Developing an enterprise IT architecture thatcan respond to changing conditions and newopportunities

10 Balancing agility openness and security

Top 10 IT Issues 2015

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

the useful examples and learnings ofinnovators among our highly collegialcommunity This inflection point ishitting IT organizations hard As theystretch and struggle to help colleges anduniversities use technology to addresschallenges of student success afford-ability and accountability IT organiza-tions are retooling and restructuring toadapt to challenges of their own Thosechallenges include ensuring a stable

qualified and adaptable IT workforceand a clear and adaptable enterprisearchitecture In both cases ldquoadaptablerdquomeans the ongoing ability to respond tochanging technologies and solutionsThose changes are transforming both ITinfrastructure which is generally trans-parent to end users and IT services andsolutions which are very much on theminds of end users and in the strategiesof higher education leaders IT organiza-tions are struggling to manage both thepace and the volume of change on all

levels And anyone who has experienceda new system rollout knows how impor-tant good change management is to thesuccess of an initiative Managing infor-mation security in the light of ongoingnew technology opportunities for bothIT and higher education professionalspresents another set of challenges

Collectively IT leaders and profes-sionals may feel deluged by the volume

variety and pace of change In response

to that deluge many IT leaders areadopting a strategic approach to changethrough the use of frameworks for suchactivities as service management ven-dor management risk managementIT architecture information securitymanagement project managementprocess management and capabilitymaturity management On the surfaceframeworks may seem restrictive andbureaucratic which accounts for the

past reluctance by many in higher edu-cation to adopt them However at theirbest frameworks can provide stabilityin times of change by creating repli-cable and scalable environments that canadapt gracefully to new and changingcircumstances

From Technical to BusinessBridging the gap between technologysolutions and business problems is achallenge that many IT leaders are strug-gling to address Moving from the role

of technology leader to business leaderis the second major theme of the 2015EDUCAUSE Top 10 IT Issues

Perhaps most exciting this themehighlights the challenge of deliveringIT solutions that can address two of themost pressing issues in higher educationhow to apply technology to teaching andlearning and how to improve studentoutcomes To solve these strategic insti-tutional problems the IT and academic

communities need to collaborate andcocreate Each group has a different viewof the problem possesses different rele-

vant expertise and plays a different role

in the solution Further many solutionsthat were previously accessible only totechnologists are now available to endusers who are adopting applicationswith sometimes serious implications forinformation security data managementand IT architecture All this calls for theIT organization to recast its relationshipwith administrative and academic areas

This second theme is also relatedto the need to reach across the whitespace in the institutionrsquos organizationalchart so that the IT department better

understands the needs of the institutionand so that institutional leaders betterunderstand the exciting potential ofinformation technology and the timeresources and executive commitmentrequired to achieve that potential Thesuccess and perhaps even the survivalof higher education are more dependentthan ever on technology Members ofthe 2014 EDUCAUSE IT Issues Panelreport that many institutional leaders

believe that technology solutions areboth easier and less expensive than theyactually are Because those executivesare also increasingly interested in usingtechnology to achieve strategic goalsmany IT leaders are struggling to manageexpectations without losing credibilityor attention On the other hand some ITleaders are struggling with a different setof problems how to communicate moreeffectively with institutional leaders

FIGURE 2 Technology Adoption Curve for Higher Education Institutions

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

We are usually among the very firstto adoptnewtechnologies

3

43

We tend toadopt new technologiesafter our peersdo so

We tendto adoptnewtechnologiesat the paceof our peers

We strive to beearly adoptersof new technologieswhere we seeexceptionalbenefits

We are oneof the lastto adoptnewtechnologies

3

24

27

Movingfrom the role of

technology leaderto business leader is

the second majortheme of the

2015 EDUCAUSETop 10 IT Issues

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 635

16 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

and how to influence uninterestedleadership

Funding has made the EDUCAUSETop 10 list every year This year the chal-lenge with funding is to ensure that insti-tutional leaders understand the need tofund the entire IT portfolio so that theIT organization is capable of supportingthe aspirations ongoing operations andgrowth of the institution

The New NormalIn the midst of so much change chal-lenge and opportunity IT organiza-tions continue running core servicesand supporting end users IT staff stillgo into fire-fighting mode more oftenthan they would wish But even normaloperations are subject to the forces ofchange

Most notably bring-your-own-device

(BYOD) digitization and associated tech-nologies and opportunities are changingthe nature of user support and appropri-ate security policies In the first instancethe IT organization needs to retool andredefine its support strategy In the secondsecurity policies must comply with regu-latory requirements to protect data andprivacy without hamstringing academicsand administrators

Mark C Adams

Vice President for Information

Technology

Sam Houston State University

Mark I Berman

Chief Information Officer

Siena College

Christian Boniforti

Chief Information Officer

Lynn University

Michael Bourque

Vice President Information

Technology Services

Boston College

Karin Moyano Camihort

Dean of Online Learning and

Academic Initiatives

Holyoke Community College

Keelan Cleary

Director of Infrastructure andEnterprise Services

Marylhurst University

Jenny Crisp

QEP Director and Assistant

Professor of English

Dalton State College

Patrick Cronin

Vice President of Information

Technology

Bridgewater State University

Lisa M Davis

Vice President for Information

Services and ChiefInformation Officer

Georgetown University

Andrea Deau

Director of Information

Technology

University of Wisconsin

Extension

Patrick J Feehan

Director IT Policy and

Cybersecurity ComplianceMontgomery College

Steve Fleagle

Chief Information Officer and

Associate Vice President

The University of Iowa

Tom Haymes

Director Technology and

Instructional Computing

Houston Community College

Richard A Holmgren

Vice President for Information

Services and Assessment Allegheny College

Brad Judy

Director of Information

Security

University of Colorado System

James Kulich

Vice President and Chief

Information Officer

Elmhurst College

Jo Meyertons

Director Educational

Technology

Linfield College

Kevin Morooney

Vice Provost for Information

Technology and Chief

Information Officer

The Pennsylvania State

University

Angela Neria

Chief Information Officer

Pittsburg State University

Celeste M Schwartz

Vice President for InformationTechnology and College

Services

Montgomery County

Community College

Paul Sherlock

Chief Information Officer

University of South Australia

Francisca Yonekura

Associate Department Head

Center for DistributedLearning

University of Central Florida

EDUCAUSE IT Issues Panel Members

2014ndash2015

The EDUCAUSE IT Issues Panel comprises individuals from EDUCAUSE member institutions to provide quick feedback to EDUCAUSE on current issues problems andproposals across higher education information technology Panel members who are recruited from a randomly drawn and statistically valid sample to represent the EDUCAUSEmembership serve for eighteen months with staggered terms Panel members meet quarterly for ninety minutes via webinar or in person The meetings facilitated byEDUCAUSE Vice President Susan Grajek are designed as an ongoing dialogue to flesh out and refine an array of open-ended technology questions about the IT organizationthe institution and cross-institutional boundaries The members discuss refine and vote on the most relevant underlying issues or options

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Issue 1Hiring and Retaining

Qualified Staff andUpdating the Knowledge

and Skills of ExistingTechnology Staff

The long-held notion that infor-mation technology has threecritical dimensionsmdashpeopleprocess and technologymdashis stilltrue today Behind every suc-

cessful implementation of technology is

a group of talented people ensuring thateverything goes according to specifica-tions to meet the needs of the studentsand faculty Recruiting and retainingexceptional staff with the requiredknowledge skills and attitudes is not asmall feat Higher education competesfor talent in an extremely competitiveenvironment The technology fieldcurrently has very low and in someregions virtually no unemployment

As higher education competes with allindustries those of us in academe are

operating in an environment in whichchange comes quickly whether in tech-nology business disciplines or our coremissions of teaching and research Toattract maintain and retain the neces-sary talent higher education IT organi-zations need to adjust and adapt

Todayrsquos IT workforce needs are dif-ferent from needs in the past We need awide array of skill sets for roles that areevolving quickly The field of informa-

tion technology has always demandedthat professionals retrain and retoolto be able to design and support thelatest technologies Thus the ongoing

evolution of technical skills is not newHowever the very models for provid-ing and supporting technology-basedservices are in flux today This set ofchanges requires staff to be not onlyadept at retooling but also capable ofreinventing their roles And those rolesdemand entirely new skills To be ableto deliver the technology solutions thatstudents and faculty presently needwhile preparing themselves to lead theinstitution to adopt innovate or inventfuture technological advances IT staff

need such nontechnical qualities as ini-tiative grit adaptability and emotionalintelligence

Retaining talented staff requires aculture of teamwork that supports andencourages the growth of the individualand the team Management needs tofoster a vibrant workplace in whichdiversity is valued and individuals feelrespected Management must also rec-ognize that employeesrsquo views of satisfac-tion with their jobs are based on their

collective experiences ranging fromsalary to the culture of water-coolerdiscussions (see Figure 3) Leadersmust remember that every employeehas unique issues and methods of com-

municating so at times retention willcome down to one-on-one discussionsto understand employeesrsquo needs andto help employees understand their

role in the larger IT and institutionalstrategy Team members need to feelengaged with the organization and itsmission and they need to sense align-ment of their efforts with somethingimportant (eg mission) to have a senseof purpose With this sense of purposethey are more likely to be committed tothe institution But with such long-termcommitments also come the expecta-tion of ongoing skill development andcareer advancement opportunities

For performance management to

be successful it must become a criticaland continuous part of the operationsof the IT organization Managers mustensure that staff are aware of their fullbenefits packages and of leadershipefforts to provide a fulfilling and enjoy-able work environment Many institu-tions offer benefits and local area perksthat employees are not aware of

Augmenting the challenge o f hiringqualified staff is the exponential speedat which technology is continuously

changing In light of this new normalmany current roles and even profes-sions will not exist in the future Newroles and professions will arise toaddress changing technology delivery

FIGURE 3 Top Reasons IT Management and Staff Leave Their Jobs

CIOs MANAGERS STAFF

At high risk of leaving 1 in 8 1 in 6 1 in 5

Personal career goals are unattainable

Not recognized for value aside fromcompensation

No opportunities to learn and grow in the past year

Institutional mission does not make me feelmy job is important

Not compensated fairly

Based on rated importance of working in higher education combined with reported likelihood of pursuing opportunities outside theinstitution

Source Jacqueline Bichsel Todayrsquos Higher Education IT Workforce (Louisville CO ECAR January 2014)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 835

18 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

pedagogical and research methods and higher education business models

Not all staff will be able to recognize or adapt to these changes Managersneed to help staff recognize and prepare for new oppor tunities to minimizethe disruption Change affects not only the individuals who are disruptedbut also those staff who are bystanders witnessing the change and anticipat-ing the worst

Fortunately IT management is not without support That support b eginsby building a partnership with the Human Resources department (HR) Asuccess for the IT organization is a success for HR

Advice983150 Know how to sell the value of a career that contributes to the advance-

ment of higher education and its teaching learning and researchmissions983150 Develop a list of the nonmonetary benefits of working for the institution

and share that list with staff983150 Hire staff not just for their fit for the job but also for their emotional

intelligence and fit with the values and culture of the IT organization andthe institution At the same time remember that the strongest teams arethose that are most diverse so strive for a heterogeneous workforce thatshares a common set of core values

983150 Work with staff to select appropriate training Funding and facilitatingtime for training and travel is only part of the process Establish somedeliverables and accountability for the training so that employees returnto the office with the anticipated insights and skill set

983150 Work with HR to develop career paths for the major divisions of or rolesin central and distributed IT units Careers paths donrsquot have to stay withinthe IT organization consider lateral paths that can broaden someonersquosinstitutional or business experience Develop paths that reward knowl-edge work as well as managerial talent and understand that not everystaff member need aspire to leadership

983150 Create a talent plan for the IT organization itself Identify the skill setsand roles the organization will need to acquire and retire in the next oneto three years Create a roadmap to where the organization needs to headand begin working with HR now to implement the roadmap with as littledisruption as possible for individual staff and o perations

Issue 2Optimizing the Use

of Technology inTeaching and Learningin Collaboration with

Academic LeadershipIncluding Understandingthe Appropriate Level of

Technology to Use

C

olleges and universities con-tinue to invest in technologiesin support of teaching and

learning while struggling withways to help faculty understandthe value and potential impact of thesetechnologies An overlooked but criti-cal starting point is for an institutionto define its educational objectives andstrategy Institutions whose educationalculture is intentionally and predomi-nantly residential ones that serve manypart-time working commuters thosewith strong global outreach techno-logical institutes and institutions withstrong practicum orientations may all

grant similar degrees but will have verydifferent pedagogical strategies andtherefore different educational tech-nology needs Without a larger guiding

vision the application of technology toteaching and learning is neither strate-gic nor optimized it is instead a series ofendpoint solutions driven by individualfaculty requests and by the best (oftenuncoordinated) efforts of service pro-

viders throughout the institution

ldquoWe must be willing to combine someof the best benefits that business has to

offer (eg flexible work arrangements)with the strong selling points of a careerin higher education (eg connection withthe mission)rdquo

mdashMichael Bourque Vice President Information Technology Services

Boston College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

It is important to view technology asa supporting tool similar to earlier toolssuch as blackboardchalk Technolo-gies need to be carefully scrutinized

for their pedagogical implications Alt ho ug h on li ne co ur se s of fer th eallure of convenience and the opening(and thus increasing) of enrollments tostudents who might not otherwise beable to attend college in a traditionalmanner their pedagogical effectivenessshould be assessed as carefully as that oftraditional classroom courses Doing so

might identify gaps in overall pedagogi-cal assessment at an institution and thusimprove even face-to-face learning Thereal value of technologies is how facultyintegrate the technologies into theirteaching and learning and how they usethe technologies to further refine theircourse delivery and student engage-ment (see Figure 4)

If institutional leaders become moreintentional about their pedagogicalobjectives and assessment methodsthey will have the opportunity to influ-

ence the institutional technology mar-ketplace Todayrsquos solutions could bemuch more effective with better guid-ance from the leadership at colleges anduniversities

For example faculty often findthemselves overwhelmed with the vol-ume of new technologies and the ongo-ing upgrades of existing technologiesas they struggle to find time to researchhow to integrate the technologies into

their teaching Faculty new to onlinelearning will commonly try to replicatetheir physical classroom online butthis is a classic McLuhanesque mistake6

Optimizing the use of technology inteaching and learning depends on theability of the institutional and academicleadership to help faculty develop theirdigital competency and then to con-tinue to provide learning opportunitiesto keep their competencies currentFaculty need ongoing digital literacyopportunities that enable them to betterunderstand not only educational tech-nologies but also the social technolo-

gies that are affecting their everydaylives and the everyday lives of their stu-dents Those students expect engage-ment in their instruction Faculty need

to understand instructional narrativeand the implications of media as part oftheir technological introduction This ismore than just training on a particulartechnology It is as the saying goes thedifference between giving a man a fishand teaching him how to fish

The effective optimization ofinstructional technology also requiresrethinking reinforcing and clarifyingroles and relationships among faculty

ldquoFaculty armed with current understandingand research on the power and value

of technologies are more likely to usetechnology to enhance their pedagogicalapproachesrdquo

mdashCeleste M Schwartz Vice President for Information Technology and College Services

Montgomery County Community College

FIGURE 4 Integrating Technology into Courses

ldquoI could be a more effective faculty member if I were better skilled at integrating this technology

into my coursesrdquo

Percentage of respondents

3D printers

Non-keyboard or non-mouse computer interfacesSocial media as a teaching and learning tool

E-portfolios

Lecture capturerecordings

E-books or e-textbooks

Simulations or educational games

LMS

Online collaboration tools

Free web-based content

Agree Strongly agree

50250 75 100

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014 (Louisville CO ECAR July 2014)

The

real value oftechnologies is howfaculty integrate

technologies intoteaching and learning

and how they usetechnologies to further

refine course delivery andstudent engagement

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1035

20 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

librarians teaching and learn-ing center professionals and ITprofessionals They all need to

view themselves as colleag ues

and even partners in designingthe right infusion of technologyresources at the right time duringthe instructional process

Is all this a tall order Yes Butit is directed toward the primarymission of higher education andis thus well worth addressing Ifcollege and university leaders donot optimize the use of technol-ogy in teaching and learningexisting and emerging alterna-tives will almost certainly step

forward to fill the gap

Advice983150 Work with academic leader-

ship to articulate the institu-tional strategy for the use oftechnology in teaching andlearning to best fit the institu-tional culture and priorities

983150 Translate that strategy into ateaching and learning tech-

nology roadmap that pri-oritizes the technologies thatwill best achieve the institu-tional strategy and fit institu-tional resources

983150 Define and clarify roles insupporting instructionaltechnology to bring togetherall relevant institutionalparties as productively aspossible

983150 Move to a technology sup-port model that aligns tech-

nology integration supportand faculty professionaldevelopment that is courseprogram specific and basedon research that demonstratesimproved student engage-ment and success

983150 Ensure that faculty have suf-ficient support and releasetime to integrate the tech-nologies into their courses

Issue 3Developing IT Funding

Models That SustainCore Service

Support Innovation andFacilitate Growth

As governmental financial sup-port for higher educationcontinues to decline bothpublic and private institutionsare desperately trying to focus

scarce resources on strategically impor-

tant needsTo create funding models that willsustain IT operations IT leaders need toclarify to institutional leaders and boardsof trustees why IT services are strategi-cally important to the enterprise Articu-lating and making some of the toughstrategic choices explicit is fundamentalto developing a sustainable fundingmodel As the role of information tech-nology in higher education matures andas institutions are increasingly pressedto balance costs with tangible benefits

IT leaders will need to strengthen andleverage their relationships with gover-nance groups connect execution withstrategy and exploit funding models tiedto institutional strategy (see Figure 5)

EDUCAUSE defines gov ern anc e asldquohow a higher education institution isorganized for the purposes of decisionmaking and resource allocation andhow the varying parts are managed ina way that promotes the mission of the

institutionrdquo7 The distributed nature ofhigher education institutions thoughhighly effective in supporting innova-tion and meeting specialized needs can

be a roadblock to strategic investmentsand efficiency realization InstitutionalIT governance can help achieve andsupport a clear IT strategy When IT gov-ernance programs have influence over ashared pot of institutional resources andare able to prioritize strategic IT invest-ments IT leaders can support ongoinginnovation and growth across the entireinstitutional portfolio of functions Inthe absence of institutional IT gover-nance IT projects will be prioritizedaccording to which areas can most easily

secure funding for their priorities Inevi-tably worthy and even critical projectswill not be funded if they are not spon-sored by well-resourced areas

Capital funding is relatively easy tosecure obtaining additional operationalfunding is much more difficult Sincemost capital projects have an opera-tional impact the differential access tofunding streams can create significantproblems for budget managers To sat-isfy demand and remain competitive

leaders at higher education institutionshave allocated capital funds to coverthe development cost of new IT infra-structure yet they seldom incorporateplans for ongoing operational funding ofcapital projects As a consequence thereis a fundamental misunderstanding ofthe total cost of information technologyand often no culturally accepted billingmodels exist for one-time and full-life-cycle costs

To help governance groups under-stand and support funding for the real

cost of information technology IT lead-ers need to develop total cost of owner-ship (TCO) scenarios and vet them withappropriate groups before projects arefunded Higher education informationtechnology is dogged by cost-savingsexpectations that usually create a falsesense of expenditure reduction In somecases the benefit of the IT investmentderives from risk reduction or new func-tionality and cost savings are not to be

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

expected In other cases cost savingsare theoretically possible but difficultto achieve if non-IT changes such asbusiness process redesign are requiredto realize them Even if the project is

successfully completed funding mayneed to shift to derive real institutionalsavings For example an IT project thatintroduces efficiencies to academicdepartments or business units mayreduce costs for the departments or units

and also for the institution overall butthe project may increase IT costs To real-ize net savings for the institution budgetfunding needs to be withdrawn from thedepartment and a portion needs to be

directed to the IT organization to coverits increased costs with the balanceaccruing to the bottom line of the insti-tution When each department controlsits own budget those shifts and realloca-tions are very difficult to negotiate and

often fall apart eroding any potentialcost savings

Growth can be managed but doingso requires service management models

that are able to project and prepare forgrowth Those models need to includecost management to ensure that serviceproviders understand and budget forboth fixed and variable costs The pay-ing IT customersmdashwhether institutionalleaders or individual departmentsmdashneedto understand IT service cost drivers andhow they can help manage those driv-ers Funding for growth in variable costsis relatively easy to justify if IT servicemanagers have and can show data onboth growth and the associated costs

Funding for growth in fixed costs needsto be justified as well and that requiresdata on the cost increases and a justifi-cation of the risks that will be reducedthe functionality that will be added orenhanced or some other compelling

FIGURE 5 IT Spending on Institutional Activities

Institutionalgrowth

Running theinstitution

Transformativechange

1576 9

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1235

22 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

reason This approach also paves the way for discussions of tradeoffs that mightaccommodate growth without increasing funding such as service-level reduc-tions shared services or outsourcing

Supporting innovation is a key piece of IT resource justification Studentsexist in a digital ecosystem and expect educational institutions to interact withthem in the ways that they are used to interacting with each other and with thecommercial entities they deal with on a daily basis Banks retail stores andeven government services are available to them through a multiplying swarmof devices Institutional leaders are increasingly aware that higher educationneeds to deliver services in the same way and that the development of an ITarchitecture to do so takes resources To better afford the resources necessaryto keep institutions current the IT organization itself needs to be innovativein the way it is organized the way it delivers IT services and the way it workswith various institutional constituencies Recognizing that IT drivers andcore services in 2014 may not even remotely resemble those necessary in 2020

demands funding flexibility since too tight a correlation will act as a disincen-tive to improvement and will create technology lags greater than those of thelast decade

Different but rigorous strategies for IT core services growth and innovationwill help in the development of IT funding models that best fit these separateactivities and are aligned with the institution and its constituents Effective ITgovernance can tie these three activities together and prioritize the IT expensein ways that support existing operations ensure ongoing innovation andrespond to growth across the entire IT portfolio

Advice983150 Benchmark IT finances by participating in the EDUCAUSE Core Data

Service983150 Ensure that IT projects build models for ongoing operational funding into

project deliverables and expectations983150 Establish an institutional IT governance structure that is responsible for allo-

cating funding not just identifying IT priorities983150 Understand the costs and cost drivers of todayrsquos IT services983150 Help leadership understand both the costs and the benefits of information

technology Arguments for new IT initiatives should always include cost esti-mates as well as estimates of the costs of not innovating

983150 Build the costs of growth and maintenance into funding models for core ITservices

Issue 4Improving Student

Outcomes through anInstitutional Approach

That StrategicallyLeverages Technology

The benefits of completing acollege education are widelyknown They include higherlifetime earnings greater levelsof happiness increased civic

engagement and reduced health risks

There are also societal benefits as theproportion of college graduates in thepopulation increases So it is in our ownbest interests to help both individualsand society by improving the successof students at our higher educationinstitutions

There are few cases in which tech-nology by itself has helped studentssucceed However there are opportuni-ties for technology to support studentsuccess initiatives The first task for anyinstitution is to assess both the insti-

tutional needs and the most currentremedies for the pain points that areidentified Although this is a constantlyand rapidly evolving area some specificexamples include the following

983150 Developin g a training course (orworkshop) to help students under-stand the technology landscape ofthe institution and how they can usethose tools to succeed

ldquoWhen it comes to innovation is the ITfunding principle lsquoWe optimize new IT

investments for the entire institutionrsquo orlsquoWe optimize new IT investments for theindividual unitsdepartmentsrsquo or bothPricing models will emerge accordinglyrdquo

mdashKarin Moyano CamihortDean of Online Learning and Academic Initiatives

Holyoke Community College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Removing barriersmdashs uch as accessusability and lack of supportmdashto theeffective use of technology

983150 Using technology to recast large lec-

ture courses and support pedagogi-cal transformations

983150 Using technology to provide flex-ibility for students to match thecourse with their learning style

983150 Using technology to distributelearning content in multiple waysincluding lectures (live and archivedfor review) electronic texts andlearning management systems

983150 Using technology such as peertutoring discussion boards andg roup videoconferences (eg

Google hangouts) to facilitate syn-chronous and asynchronous inter-actions with others and to promotecollaborative learning

983150 Considering the emerging role oftools used traditionally by business(ie CRM) to manage the institu-tionrsquos relationship with the student

983150 Applying elements of what is beinglearned in competency-based edu-cation initiatives at an institutionallevel for traditional students

Institutional leaders continueto emphasize and pour resourcesinto improving student retentionand completion Technology can beapplied to develop the broad area oflearning analytics to provide feedbackto students on their behavior (both pastand predictive) to faculty on the effec-tiveness of the pedagogy employed inthe course to content providers (andfaculty who select the content) on theeffectiveness of the content used in the

course and to administrators on broadsystemic issues and trendsMany colleges and universities

have student success committees thatfocus on initiatives to improve coursecompletion program completion andstudent support services Examplesof initiatives can be found in the areasof teaching and learning and studentsupport services In the area of reme-dial education great strides have been

made in reducing time to completionfor remedial students and in increas-ing retention and completion rates Anexample of the work occurring in the

area of student success can be found onthe Achieving the Dream InterventionsShowcase website (httpachievingthedreamorgresourcesachieving-the-dream-interventions-showcase) withmany of those interventions strategi-cally leveraging technology

As data analytics tools have becomemore sophisticated institutionshave been better able to recognizestudentsrsquo challenges and track stu-dentsrsquo journeys With theimplementation of early

alert systems advisors andfaculty have been able toassist students with just-in-time intervention recom-mendations In addition itis becoming commonplacefor advisors to have access todata beyond the traditionalERP demographic and stu-dent gradesmdashdata such ascourse performance throughlearning management sys-

tems early alert informationtutoring participation andeducation planning informa-tion (see Figure 6) Systemslike these sometimes referred to asIntegrated Planning and AdvisingServices (IPAS)8 permit the advisor tosupport and coach students based ona comprehensive view of the studentsrsquoinformation throughout their educa-

tional journey In the area of onlineeducation too wraparound studentsupport services are mirroring the on-ground experience with some colleges

and universities implementing careercoaches with supporting technologiesto provide services to online studentsThe integration of technologies in eachof these areas has had a positive impacton improving student outcomes

A variety of existing tools many stillin the early development stages canhelp institutions gather data to identifystudentsrsquo success opportunities andtheir achievements This information

is only as good as the data however Tofind the low-hanging fruit IT leadersneed to begin the data conversationsto locate tools that may already begenerating useful data To capture rele-

vant aspects of the student experience

FIGURE 6 Technology for Supporting Education Planning Advising and Counseling and Early Alerts

Source EDUCAUSE Core Data Service 2013

46

66

73

Early alert systems

Education planningacademicprogress tracking

Academic advising

Percentage of institutions

Tocapture relevant aspects

of the student experienceleaders must think institutionally

and identify technologyresources that canbring together the

diverse and enormousdata sets that represent this

experience

(continued on page 26)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1435

To create sustainable IT funding models IT leaders need to

clarify to institutional leaders and boards of trustees why

IT services are strategically important to the enterprise

TOP 10 IT ISSUES

EVOLVING STAFFING MODELS

IMPROVING

STUDENT

OUTCOMES

OPTIMIZING TECHNOLOGY IN

TEACHING AND LEARNING

FUNDING IT STRATEGICALLY

soft skills

moreresources

professional development

clear goals networking

65

Technical proficiency is as important as ever

So skills are more important that ever before

higher education IT staff are not

satisfied with their current position

To be more effective IT

staff say they need

of students wish their

instructors would use

early-alert systems more

of central ITrsquos budgetis spent running the institution

is spent on growth

is spent on transformation

Students respond

positively to learning

analytics opportunities

not at allimportant

technical proficiencystrategic planning

effective communication

1

veryimportant

5

Top 3 motivators for faculty integration of technology

in the classroom

bull Clear indicationevidence that students will benefit

bull Release time to designredesign courses

bull Confidence that the technology will work as planned

1 in 4

Todayrsquos market for IT talent is competitive Hiring andretaining top talent requires engaged managers whopossess and know how to foster good communication skills

Faculty and students alike are

interested in learning analytics for

notifications on course progress

Although technology is omnipresent in the lives ofstudents leveraging technology to engage students in

meaningful ways and to enhance learning is still evolving

76

15

9

I think this is great

This sounds positive

I am neutral

This sounds negative

Irsquom totallyagainst this

Spending model

breakdown in the USdoes not differsignificantly by

Institution type

Size

Central IT staff size

CIO reporting line

25

0

50

75

100

E D U C

A U S E E

R E S

E A R C

H S N

A P S H

O T

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1535

A look into EDUCAUSE research on the 2015 list of the

most intriguing ideas in higher education IT

DEMONSTRATING

VALUE OF IT

DEVELOPING

SECURITY

POLICIES FOR

THE INSTITUTION

DEVELOPING ENTERPRISE IT

ARCHITECTURE

BALANCING INFORMATION

SECURITY AND OPENNESS

INCREASING CAPACITY

FOR CHANGE

PROVIDING USER SUPPORT

The gaps between effectiveness in and

importance of addressing risks are large

Percentage using the college or university help desk for support

Percentage looking to peers

Student Device Ownership

Between 2005 and 2014 there were 727 education-sector

data breachesmdashinvolving more than 14 million recordsmdashas

reported to the Privacy Rights Clearinghouse

locally integrate the

architectures of multiple

major systems

follow the architecture of a

primary system or suite

20142013

25

0

50

75

100

2015 projection

Smartphones

Tablets

86

47

31

76

58

90

Information security

Data privacyconfidentiality

Identityaccess management

66

66

84

82

79

70

36

1

33

29

The most important IT risks to

address concern security privacy

and access

In a world of increasing

complex security threats

institutions must move from

a reactive to a proactive security response

We are living in an era when readily

accessible technologies facilitate a

BYOD standard requiring institutions

to rethink user support

A well-defined enterprise IT architecture is instrumental to

optimizing opportunities and managing change effectively

The higher education community is

struggling with the pace variety and sheer volume

of change in information technology as well as the

corresponding risks

IT leaders need to draw the lines from

technology initiatives to their institutionsrsquo

changing strategic objectives and on to the

ultimate bottom lines of mission and means

OtherLossthestInternal threatsExternal threats

81of institutions

do notaddress IT risk

in their strategicplan

7357

69

22

Faculty

Students

effectiveness

importance

effectiveness

importance

effectiveness

importance

6 3 10 10

Breachcauses

53Administration

37Teaching

and learning

10Researchother

Percentage of IT spend by institutional mission

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1635

26 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

leaders must think institutionally and identify technology resources that

can bring together the diverse and enormous data sets that represent thisexperience

As was discussed last year when this was the 1 issue in the 2014 Top 10list looking at this data may raise privacy issues so leaders must rememberto include the appropriate individuals in these discussions to ensure compli-ance security and privacy

Advice983150 Keep in mind that students consider success from a holistic view of their

campus experience not necessarily their experience with just a courseor a semester To maximize the impact of technology identify the combi-

nation of data and tools that will encompass as much of the institutionalexperience as possible983150 Remember that results will be only as good as the data Take time in the

beginning to build a reliable strategic foundation by starting with conciseoutcome objectives and then develop t he data-driven questions that willultimately define actionable steps to influence success

983150 Work with key individuals from various institutional areas to identifydata that may be available at an individual student level and that could becombined with other values to establish an assessment point for the stu-dent Next consider comparing this assessment point with the studentrsquossuccess level and attempt to identify some trends Drill down to indica-tors that can be used as targets for predicting success and for identifyingearly warning signs

983150 Ensure that the project is embedded in a cross-institutional student suc-cess effort that includes all relevant parties Dedicated student successteams or cross-departmental governance structures can be the vehiclefor organizing consensus Donrsquot allow a perception of IT ownership todevelop

983150 Resolve problems in academic and business processes before implemen-tation donlsquot adapt applications to dysfunctional processes

983150 Define the role of faculty in improving student outcomes through thestrategic leveraging of technology

983150 Determine how much individualized student data should be shared withadvisors in supporting improved student outcomes

Issue 5Demonstrating the

Business Value ofInformation Technologyand How Technology

and the IT OrganizationCan Help the Institution

Achieve Its Goals

IT leaders need to continue to get bet-ter at drawing the lines from technol-ogy initiatives to their institutionsrsquochanging strategic objectives and on

to the ultimate bottom lines of mis-sion and means Successfully demon-strating the business value of informationtechnology to the institution begins withdeveloping a clear understanding of the

various ways in which technology as awhole and the IT department as a unitadd value to the institution Institutionalleadersrsquo struggle to respond to changingpublic perceptions of the value of highereducation itself is a complicating factorHerein lies an opportunity for IT profes-sionals not only to demonstrate the value

of the IT organizationrsquos particular offer-ings but also to create new and significant value for the institution This requiresthinking of technology strategy as both aconsequence and a driver of institutionalstrategy IT leaders who have the abilityto see the entire institutional landscapeand can offer strategic insights for movingthe institution forward have never beenmore important to the well-being of col-leges and universities

ldquoInstead of reacting to new technologiestop institutions seek out new technologies

as a strategic imperative leveraging theseinnovations to improve learning insideand outside the classroom with datadecision making enhanced pedagogy andbetter student outcomesrdquo

mdashLisa M Davis Vice President for Information Services and Chief Information Officer

Georgetown University

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

So in what ways do IT leaders add value They add value to the organizationby enhancing the core productmdashnamelythe learning experiences of students and

the teaching activities of faculty They add value very directly by creating new chan-nels through which students can accessinstitutional offerings The channels thatonline opportunities provide would notexist without the technologies deliveredand supported by the IT organizationFrom a business perspective this cre-ates new sources of revenue a criticalobjective for virtually all colleges anduniversities Drawing a clear line that con-nects specific technology initiatives withtangible revenue for the institution is a

powerful way to demonstrate the busi-ness value of technologymdashand of the ITorganization

And of course the yin of revenue isbalanced by the yang of cost reductionStories of expense reduction and effi-ciency are perhaps easier to identify andtell and they should be carefully and dili-gently told but IT leaders must be carefulto also emphasize the much larger poten-tial that a clear focus on the revenue sidecan provide Doing so can help to avoid

the impression that the value of informa-tion technology is limited to simple actsof automation and efficiency Part of thiswork entails ensuring that the institu-tional leadership understands what is andis not possible Many times the need tohave the value discussion in the first placeis because leaders are not inherently feel-ing the value Those in the IT organiza-tion must take the time to develop andprovide clear data-based informationabout the services they deliver and valuethey provide

One way to demonstrate value iswith well-constructed service portfoliosand service catalogs A service portfolioprovides a high-level overview of howfunds are spent on major institutionalstrategic and operational goals and isgeared toward institutional leaders Aservice catalog (see Figure 7) provides amore detailed view into how IT dollarsare spent on IT projects products andservices and is geared toward IT leaders

Combined the service portfolio and theservice catalog can be a useful tool forshowing the business value of the invest-ments that institutions make in informa-tion technology

Assembling a service portfolio andcatalog may be the IT organizationrsquos firstcomprehensive view into the actual valueit is bringing to the institution Depend-ing on that value IT leaders may first needto focus on quick fixes to better align theirservices with the institutional mission

Before IT leaders can advocate howinformation technology can be leveragedto drive the business the IT organiza-tion must be operationally effective andefficient Institutional and business unitleaders must view the IT organizationas providing operational excellence andoutstanding customer service before theywill consider it as a partner in deliveringbusiness value

The CIO and IT leadership teamsshould remember that they are the pri-mary marketing avenue for sharing the

value that information technology bringsto the institutional mission IT leadersspend about 10 percent of their time ongovernance and planning and on innova-tion with business and academic units9 IT leaders thus must be intentional aboutidentifying opportunities for communi-cating how the IT organization is help-ing the institution CIOs must establish

strong and trusting relationships withtheir peer business leadersSharing the value of information

technology begins with IT leadership butmust extend to the entire IT organization

All IT staff must understand how theirwork contributes to the institutional mis-sions and priorities They need to under-stand the IT organizationrsquos capabilitiesand priorities and how the organizationcan advance the institution the indi-

vidual business units and the faculty stu-dents and staff with whom they work IT

leaders can encourage and enable IT staffto learn the mission business processesand requirements of business units inorder to understand how informationtechnology can best be leveraged Get-ting to this point may require a culturechange within the IT organization At the

very least all IT staff should know boththe institutional and the IT priorities toensure that everyone is telling the samestory

FIGURE 7 Percentage of Institutions with a Service Catalog

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

32

17

29

40

56

62

Source EDUCAUSE Core Data Service 2013

IT leaders add value

to the organization byenhancing the core

productmdashnamely thelearning experiences of

students and the teachingactivities of faculty

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1835

28 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Advice983150 Map IT priorities to institutional priorities Find the points of intersection

with the business unit operations customers and technology Partnerwith the business unit to develop a roadmap and to align the business withthe IT architecture

983150 Donrsquot wait for an invitation to discuss business and customer impact Butdonrsquot try to boil the ocean keep focused and be clear about what the IT

organization can and cannot do IT leaders must be translators usingterminology that resonates with non-IT experts and connecting the dotsbetween the technology capabilities and the business needs Develop asmall set of short and simple stories about concrete ways in which tech-nology has improved the learning experience at the institution createdaccess to institutional resources strengthened affinity for the institutiongenerated revenue and streamlined operations Focus at least as much onhelping others see what is possible with technology as on showing howtechnology investments improve current institutional life

983150 Develop a service catalog to serve as a base for connecting the work of theIT organization to the larger institutional strategic objectives

983150 Implement a metrics program that can demonstrate the extent to which theIT organization is achieving its service-level goals customer-satisfaction

goals and financial goals and is delivering on strategic priorities983150 Ensure that IT leaders and IT staff understand what drives academic and

business value for the institution and can identify and articulate how tech-nology can deliver that value Consider attending non-technology confer-ences to learn how business officers faculty and academic leaders thinkabout technology and what their pressing problems are Be the translatorfor business strategy

983150 To reach the broader institutional community consider newslettersbrown-bag gatherings and roundtable discussions and take advantageof recurring events such as National Cyber Security Awareness Month(httpwwweducauseeduncsam) and start-of-the-semester gatherings

Issue 6Increasing the IT

Organizationrsquos Capacityfor Managing Change

Despite DifferingCommunity Needs

Priorities and Abilities

Change is the watchword todayand going forward In the 2011book Race against the Machine MIT economists Erik Bryn-jolfsson and Andrew McAfee

write ldquoAdvances like the Googleautonomous car Watson the Jeop-ardy champion supercomputer andhigh-quality instantaneous machinetranslation then can be seen as thefirst examples of the kinds of digitalinnovations wersquoll see as we move into the phase where exponentialgrowth yields jaw-dropping resultsrdquo10

When technology changes organiza-tions are always challenged to adapt tonew circumstances This is par ticularlytrue of the organizations tasked with

implementing and maintaining thetechnology itselfThe higher education community

is struggling not only with the pace ofchange in information technology butalso with the variety and sheer volumeof change Information technology isincreasingly important to and increas-ingly integrated with all aspects ofboth the strategic and the operationalfunctions of the campus The chal-

ldquoWe also add value by creating newways for those who know us less well to

develop affinity with our institutions Asmall MOOC my college offered made usknown to groups of prospective studentswho would never have paid a momentrsquosattention to any traditional advertisingmessages we might have sent By joiningtheir party first via our technologies weput ourselves in a much better position to

invite them to our partyrdquomdashJames Kulich

Vice President and Chief Information OfficerElmhurst College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

lenge is how to engage multiple areasof the institution and expand servicesin numerous simultaneous initiativesMeanwhile institutional informa-

tion technology is reengineering itsinfrastructure platforms and servicesThose change efforts are often additiveto the applications being introduced aspart of new business-area initiatives

Ideally the institutional stancetoward change is proactive and ITleaders have the vision and good senseto advocate to broker and to preparetheir various constituents for upcom-ing changes while sustaining ongo-ing operations In reality end users

vary widely in their predisposition to

technology As a group students andfaculty are positively disposed towardinformation technology but as indi-

viduals they run the gamut (see Figure8) And attitudes influence behaviorthe way faculty and students adopt and

FIGURE 8 Relationship between Faculty Attitudes toward Online Learningand Their Experience with Online Teaching

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014(Louisville CO ECAR July 2014)

Percentage of respondents who agree or strongly agree

No recent onlineteaching

Some recentonline teaching

50250 75 100

All respondents

Online learning helps students learn more effectively

Online learning will lead to pedagogical breakthroughs

Online learning will make higher education available to more students

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2035

30 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

use technology tends to reflect theirattitudes11

The IT organizationrsquos history of exe-cution can influence community open-ness toward future technology changesThe shadow cast by a deeply flawed ERPimplementation for example can last adecade or longer

Change management is preciselythat managing change rather than lettingchange happen on its own (see Figure 9)

Successful change management is notaccidental or organic It is intentionaland has multiple components Manyinstitutions adopt a specific approachto implementing changemdashapproachessuch as ADKAR Kurt Lewinrsquos changemanagement model and John Kot-terrsquos eight steps12 Regardless of the

model managing change requires astrategy in which the goals and focusof the change are clear to internal andexternal constituents For examplethe corporate consultant Glenn Llopisadvises being able to identify what thesuccessful implementation of a changestrategy would look like knowing whatthe change strategy is trying to solveand identifying the required resourcesand relationships to implement the

change management strategy

13

As theIT organization sifts through the differ-ent needs abilities and priorities of theinstitution and tries to adapt to changeit must avoid being caught in a viciouscircle of tactics with no purpose

A good change management strat-egy has multiple components which

include communications and inclu-siveness John Jones DeAnne Agu-irre and Matthew Calderone provideten sensible principles for managing

change by keeping the human elementat the center14 Involving every level ofan organization creating ownershipassessing the cultural landscape andcommunicating effectively are keyfactors Change always affects some-body somewheremdashboth internally andexternally IT organizations must doeverything possible to find engagedpeople who can advocate on behalf ofthe change strategy It helps to havechampions at all levels executiveswho can demonstrate the institutional

leadersrsquo commitment area leaders whocan reinforce commitment with theirworkforce and explain how the change

will benefit their part of the institu-tion and individual influencers whocan help determine success factorsidentify and address pain points andevangelize with their colleagues

But change management involves

more than communications and inclu-siveness A successful change is a fullydesigned change Too often institu-tional leaders conflate new initiativeswith new systems and fail to fully thinkthrough and execute on the business-end components The successfulintroduction of a new system mightrequire new or reengineered businessprocesses new roles and even differ-ent organizational structures Every

ldquoTechnology is now integrated into just about

every aspect of our colleges and universitiesThat allows us a myriad of opportunitiesto use technology to help students succeedacademically Using technology to helpstudents succeed is at the core of what we dordquo

mdashSteve FleagleChief Information Officer and Associate Vice President

The University of Iowa

FIGURE 9 Percentage of Institutions That Have Implemented the ITIL ChangeManagement Process

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

23

13

25

30

44

44

Source EDUCAUSE Core Data Service 2013

Involvingevery level of an

organization creatingownership assessing thecultural landscape and

communicating effectivelyare key factors Changealways affects somebody

somewhere

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 5: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

the useful examples and learnings ofinnovators among our highly collegialcommunity This inflection point ishitting IT organizations hard As theystretch and struggle to help colleges anduniversities use technology to addresschallenges of student success afford-ability and accountability IT organiza-tions are retooling and restructuring toadapt to challenges of their own Thosechallenges include ensuring a stable

qualified and adaptable IT workforceand a clear and adaptable enterprisearchitecture In both cases ldquoadaptablerdquomeans the ongoing ability to respond tochanging technologies and solutionsThose changes are transforming both ITinfrastructure which is generally trans-parent to end users and IT services andsolutions which are very much on theminds of end users and in the strategiesof higher education leaders IT organiza-tions are struggling to manage both thepace and the volume of change on all

levels And anyone who has experienceda new system rollout knows how impor-tant good change management is to thesuccess of an initiative Managing infor-mation security in the light of ongoingnew technology opportunities for bothIT and higher education professionalspresents another set of challenges

Collectively IT leaders and profes-sionals may feel deluged by the volume

variety and pace of change In response

to that deluge many IT leaders areadopting a strategic approach to changethrough the use of frameworks for suchactivities as service management ven-dor management risk managementIT architecture information securitymanagement project managementprocess management and capabilitymaturity management On the surfaceframeworks may seem restrictive andbureaucratic which accounts for the

past reluctance by many in higher edu-cation to adopt them However at theirbest frameworks can provide stabilityin times of change by creating repli-cable and scalable environments that canadapt gracefully to new and changingcircumstances

From Technical to BusinessBridging the gap between technologysolutions and business problems is achallenge that many IT leaders are strug-gling to address Moving from the role

of technology leader to business leaderis the second major theme of the 2015EDUCAUSE Top 10 IT Issues

Perhaps most exciting this themehighlights the challenge of deliveringIT solutions that can address two of themost pressing issues in higher educationhow to apply technology to teaching andlearning and how to improve studentoutcomes To solve these strategic insti-tutional problems the IT and academic

communities need to collaborate andcocreate Each group has a different viewof the problem possesses different rele-

vant expertise and plays a different role

in the solution Further many solutionsthat were previously accessible only totechnologists are now available to endusers who are adopting applicationswith sometimes serious implications forinformation security data managementand IT architecture All this calls for theIT organization to recast its relationshipwith administrative and academic areas

This second theme is also relatedto the need to reach across the whitespace in the institutionrsquos organizationalchart so that the IT department better

understands the needs of the institutionand so that institutional leaders betterunderstand the exciting potential ofinformation technology and the timeresources and executive commitmentrequired to achieve that potential Thesuccess and perhaps even the survivalof higher education are more dependentthan ever on technology Members ofthe 2014 EDUCAUSE IT Issues Panelreport that many institutional leaders

believe that technology solutions areboth easier and less expensive than theyactually are Because those executivesare also increasingly interested in usingtechnology to achieve strategic goalsmany IT leaders are struggling to manageexpectations without losing credibilityor attention On the other hand some ITleaders are struggling with a different setof problems how to communicate moreeffectively with institutional leaders

FIGURE 2 Technology Adoption Curve for Higher Education Institutions

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

We are usually among the very firstto adoptnewtechnologies

3

43

We tend toadopt new technologiesafter our peersdo so

We tendto adoptnewtechnologiesat the paceof our peers

We strive to beearly adoptersof new technologieswhere we seeexceptionalbenefits

We are oneof the lastto adoptnewtechnologies

3

24

27

Movingfrom the role of

technology leaderto business leader is

the second majortheme of the

2015 EDUCAUSETop 10 IT Issues

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 635

16 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

and how to influence uninterestedleadership

Funding has made the EDUCAUSETop 10 list every year This year the chal-lenge with funding is to ensure that insti-tutional leaders understand the need tofund the entire IT portfolio so that theIT organization is capable of supportingthe aspirations ongoing operations andgrowth of the institution

The New NormalIn the midst of so much change chal-lenge and opportunity IT organiza-tions continue running core servicesand supporting end users IT staff stillgo into fire-fighting mode more oftenthan they would wish But even normaloperations are subject to the forces ofchange

Most notably bring-your-own-device

(BYOD) digitization and associated tech-nologies and opportunities are changingthe nature of user support and appropri-ate security policies In the first instancethe IT organization needs to retool andredefine its support strategy In the secondsecurity policies must comply with regu-latory requirements to protect data andprivacy without hamstringing academicsand administrators

Mark C Adams

Vice President for Information

Technology

Sam Houston State University

Mark I Berman

Chief Information Officer

Siena College

Christian Boniforti

Chief Information Officer

Lynn University

Michael Bourque

Vice President Information

Technology Services

Boston College

Karin Moyano Camihort

Dean of Online Learning and

Academic Initiatives

Holyoke Community College

Keelan Cleary

Director of Infrastructure andEnterprise Services

Marylhurst University

Jenny Crisp

QEP Director and Assistant

Professor of English

Dalton State College

Patrick Cronin

Vice President of Information

Technology

Bridgewater State University

Lisa M Davis

Vice President for Information

Services and ChiefInformation Officer

Georgetown University

Andrea Deau

Director of Information

Technology

University of Wisconsin

Extension

Patrick J Feehan

Director IT Policy and

Cybersecurity ComplianceMontgomery College

Steve Fleagle

Chief Information Officer and

Associate Vice President

The University of Iowa

Tom Haymes

Director Technology and

Instructional Computing

Houston Community College

Richard A Holmgren

Vice President for Information

Services and Assessment Allegheny College

Brad Judy

Director of Information

Security

University of Colorado System

James Kulich

Vice President and Chief

Information Officer

Elmhurst College

Jo Meyertons

Director Educational

Technology

Linfield College

Kevin Morooney

Vice Provost for Information

Technology and Chief

Information Officer

The Pennsylvania State

University

Angela Neria

Chief Information Officer

Pittsburg State University

Celeste M Schwartz

Vice President for InformationTechnology and College

Services

Montgomery County

Community College

Paul Sherlock

Chief Information Officer

University of South Australia

Francisca Yonekura

Associate Department Head

Center for DistributedLearning

University of Central Florida

EDUCAUSE IT Issues Panel Members

2014ndash2015

The EDUCAUSE IT Issues Panel comprises individuals from EDUCAUSE member institutions to provide quick feedback to EDUCAUSE on current issues problems andproposals across higher education information technology Panel members who are recruited from a randomly drawn and statistically valid sample to represent the EDUCAUSEmembership serve for eighteen months with staggered terms Panel members meet quarterly for ninety minutes via webinar or in person The meetings facilitated byEDUCAUSE Vice President Susan Grajek are designed as an ongoing dialogue to flesh out and refine an array of open-ended technology questions about the IT organizationthe institution and cross-institutional boundaries The members discuss refine and vote on the most relevant underlying issues or options

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Issue 1Hiring and Retaining

Qualified Staff andUpdating the Knowledge

and Skills of ExistingTechnology Staff

The long-held notion that infor-mation technology has threecritical dimensionsmdashpeopleprocess and technologymdashis stilltrue today Behind every suc-

cessful implementation of technology is

a group of talented people ensuring thateverything goes according to specifica-tions to meet the needs of the studentsand faculty Recruiting and retainingexceptional staff with the requiredknowledge skills and attitudes is not asmall feat Higher education competesfor talent in an extremely competitiveenvironment The technology fieldcurrently has very low and in someregions virtually no unemployment

As higher education competes with allindustries those of us in academe are

operating in an environment in whichchange comes quickly whether in tech-nology business disciplines or our coremissions of teaching and research Toattract maintain and retain the neces-sary talent higher education IT organi-zations need to adjust and adapt

Todayrsquos IT workforce needs are dif-ferent from needs in the past We need awide array of skill sets for roles that areevolving quickly The field of informa-

tion technology has always demandedthat professionals retrain and retoolto be able to design and support thelatest technologies Thus the ongoing

evolution of technical skills is not newHowever the very models for provid-ing and supporting technology-basedservices are in flux today This set ofchanges requires staff to be not onlyadept at retooling but also capable ofreinventing their roles And those rolesdemand entirely new skills To be ableto deliver the technology solutions thatstudents and faculty presently needwhile preparing themselves to lead theinstitution to adopt innovate or inventfuture technological advances IT staff

need such nontechnical qualities as ini-tiative grit adaptability and emotionalintelligence

Retaining talented staff requires aculture of teamwork that supports andencourages the growth of the individualand the team Management needs tofoster a vibrant workplace in whichdiversity is valued and individuals feelrespected Management must also rec-ognize that employeesrsquo views of satisfac-tion with their jobs are based on their

collective experiences ranging fromsalary to the culture of water-coolerdiscussions (see Figure 3) Leadersmust remember that every employeehas unique issues and methods of com-

municating so at times retention willcome down to one-on-one discussionsto understand employeesrsquo needs andto help employees understand their

role in the larger IT and institutionalstrategy Team members need to feelengaged with the organization and itsmission and they need to sense align-ment of their efforts with somethingimportant (eg mission) to have a senseof purpose With this sense of purposethey are more likely to be committed tothe institution But with such long-termcommitments also come the expecta-tion of ongoing skill development andcareer advancement opportunities

For performance management to

be successful it must become a criticaland continuous part of the operationsof the IT organization Managers mustensure that staff are aware of their fullbenefits packages and of leadershipefforts to provide a fulfilling and enjoy-able work environment Many institu-tions offer benefits and local area perksthat employees are not aware of

Augmenting the challenge o f hiringqualified staff is the exponential speedat which technology is continuously

changing In light of this new normalmany current roles and even profes-sions will not exist in the future Newroles and professions will arise toaddress changing technology delivery

FIGURE 3 Top Reasons IT Management and Staff Leave Their Jobs

CIOs MANAGERS STAFF

At high risk of leaving 1 in 8 1 in 6 1 in 5

Personal career goals are unattainable

Not recognized for value aside fromcompensation

No opportunities to learn and grow in the past year

Institutional mission does not make me feelmy job is important

Not compensated fairly

Based on rated importance of working in higher education combined with reported likelihood of pursuing opportunities outside theinstitution

Source Jacqueline Bichsel Todayrsquos Higher Education IT Workforce (Louisville CO ECAR January 2014)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 835

18 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

pedagogical and research methods and higher education business models

Not all staff will be able to recognize or adapt to these changes Managersneed to help staff recognize and prepare for new oppor tunities to minimizethe disruption Change affects not only the individuals who are disruptedbut also those staff who are bystanders witnessing the change and anticipat-ing the worst

Fortunately IT management is not without support That support b eginsby building a partnership with the Human Resources department (HR) Asuccess for the IT organization is a success for HR

Advice983150 Know how to sell the value of a career that contributes to the advance-

ment of higher education and its teaching learning and researchmissions983150 Develop a list of the nonmonetary benefits of working for the institution

and share that list with staff983150 Hire staff not just for their fit for the job but also for their emotional

intelligence and fit with the values and culture of the IT organization andthe institution At the same time remember that the strongest teams arethose that are most diverse so strive for a heterogeneous workforce thatshares a common set of core values

983150 Work with staff to select appropriate training Funding and facilitatingtime for training and travel is only part of the process Establish somedeliverables and accountability for the training so that employees returnto the office with the anticipated insights and skill set

983150 Work with HR to develop career paths for the major divisions of or rolesin central and distributed IT units Careers paths donrsquot have to stay withinthe IT organization consider lateral paths that can broaden someonersquosinstitutional or business experience Develop paths that reward knowl-edge work as well as managerial talent and understand that not everystaff member need aspire to leadership

983150 Create a talent plan for the IT organization itself Identify the skill setsand roles the organization will need to acquire and retire in the next oneto three years Create a roadmap to where the organization needs to headand begin working with HR now to implement the roadmap with as littledisruption as possible for individual staff and o perations

Issue 2Optimizing the Use

of Technology inTeaching and Learningin Collaboration with

Academic LeadershipIncluding Understandingthe Appropriate Level of

Technology to Use

C

olleges and universities con-tinue to invest in technologiesin support of teaching and

learning while struggling withways to help faculty understandthe value and potential impact of thesetechnologies An overlooked but criti-cal starting point is for an institutionto define its educational objectives andstrategy Institutions whose educationalculture is intentionally and predomi-nantly residential ones that serve manypart-time working commuters thosewith strong global outreach techno-logical institutes and institutions withstrong practicum orientations may all

grant similar degrees but will have verydifferent pedagogical strategies andtherefore different educational tech-nology needs Without a larger guiding

vision the application of technology toteaching and learning is neither strate-gic nor optimized it is instead a series ofendpoint solutions driven by individualfaculty requests and by the best (oftenuncoordinated) efforts of service pro-

viders throughout the institution

ldquoWe must be willing to combine someof the best benefits that business has to

offer (eg flexible work arrangements)with the strong selling points of a careerin higher education (eg connection withthe mission)rdquo

mdashMichael Bourque Vice President Information Technology Services

Boston College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

It is important to view technology asa supporting tool similar to earlier toolssuch as blackboardchalk Technolo-gies need to be carefully scrutinized

for their pedagogical implications Alt ho ug h on li ne co ur se s of fer th eallure of convenience and the opening(and thus increasing) of enrollments tostudents who might not otherwise beable to attend college in a traditionalmanner their pedagogical effectivenessshould be assessed as carefully as that oftraditional classroom courses Doing so

might identify gaps in overall pedagogi-cal assessment at an institution and thusimprove even face-to-face learning Thereal value of technologies is how facultyintegrate the technologies into theirteaching and learning and how they usethe technologies to further refine theircourse delivery and student engage-ment (see Figure 4)

If institutional leaders become moreintentional about their pedagogicalobjectives and assessment methodsthey will have the opportunity to influ-

ence the institutional technology mar-ketplace Todayrsquos solutions could bemuch more effective with better guid-ance from the leadership at colleges anduniversities

For example faculty often findthemselves overwhelmed with the vol-ume of new technologies and the ongo-ing upgrades of existing technologiesas they struggle to find time to researchhow to integrate the technologies into

their teaching Faculty new to onlinelearning will commonly try to replicatetheir physical classroom online butthis is a classic McLuhanesque mistake6

Optimizing the use of technology inteaching and learning depends on theability of the institutional and academicleadership to help faculty develop theirdigital competency and then to con-tinue to provide learning opportunitiesto keep their competencies currentFaculty need ongoing digital literacyopportunities that enable them to betterunderstand not only educational tech-nologies but also the social technolo-

gies that are affecting their everydaylives and the everyday lives of their stu-dents Those students expect engage-ment in their instruction Faculty need

to understand instructional narrativeand the implications of media as part oftheir technological introduction This ismore than just training on a particulartechnology It is as the saying goes thedifference between giving a man a fishand teaching him how to fish

The effective optimization ofinstructional technology also requiresrethinking reinforcing and clarifyingroles and relationships among faculty

ldquoFaculty armed with current understandingand research on the power and value

of technologies are more likely to usetechnology to enhance their pedagogicalapproachesrdquo

mdashCeleste M Schwartz Vice President for Information Technology and College Services

Montgomery County Community College

FIGURE 4 Integrating Technology into Courses

ldquoI could be a more effective faculty member if I were better skilled at integrating this technology

into my coursesrdquo

Percentage of respondents

3D printers

Non-keyboard or non-mouse computer interfacesSocial media as a teaching and learning tool

E-portfolios

Lecture capturerecordings

E-books or e-textbooks

Simulations or educational games

LMS

Online collaboration tools

Free web-based content

Agree Strongly agree

50250 75 100

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014 (Louisville CO ECAR July 2014)

The

real value oftechnologies is howfaculty integrate

technologies intoteaching and learning

and how they usetechnologies to further

refine course delivery andstudent engagement

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1035

20 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

librarians teaching and learn-ing center professionals and ITprofessionals They all need to

view themselves as colleag ues

and even partners in designingthe right infusion of technologyresources at the right time duringthe instructional process

Is all this a tall order Yes Butit is directed toward the primarymission of higher education andis thus well worth addressing Ifcollege and university leaders donot optimize the use of technol-ogy in teaching and learningexisting and emerging alterna-tives will almost certainly step

forward to fill the gap

Advice983150 Work with academic leader-

ship to articulate the institu-tional strategy for the use oftechnology in teaching andlearning to best fit the institu-tional culture and priorities

983150 Translate that strategy into ateaching and learning tech-

nology roadmap that pri-oritizes the technologies thatwill best achieve the institu-tional strategy and fit institu-tional resources

983150 Define and clarify roles insupporting instructionaltechnology to bring togetherall relevant institutionalparties as productively aspossible

983150 Move to a technology sup-port model that aligns tech-

nology integration supportand faculty professionaldevelopment that is courseprogram specific and basedon research that demonstratesimproved student engage-ment and success

983150 Ensure that faculty have suf-ficient support and releasetime to integrate the tech-nologies into their courses

Issue 3Developing IT Funding

Models That SustainCore Service

Support Innovation andFacilitate Growth

As governmental financial sup-port for higher educationcontinues to decline bothpublic and private institutionsare desperately trying to focus

scarce resources on strategically impor-

tant needsTo create funding models that willsustain IT operations IT leaders need toclarify to institutional leaders and boardsof trustees why IT services are strategi-cally important to the enterprise Articu-lating and making some of the toughstrategic choices explicit is fundamentalto developing a sustainable fundingmodel As the role of information tech-nology in higher education matures andas institutions are increasingly pressedto balance costs with tangible benefits

IT leaders will need to strengthen andleverage their relationships with gover-nance groups connect execution withstrategy and exploit funding models tiedto institutional strategy (see Figure 5)

EDUCAUSE defines gov ern anc e asldquohow a higher education institution isorganized for the purposes of decisionmaking and resource allocation andhow the varying parts are managed ina way that promotes the mission of the

institutionrdquo7 The distributed nature ofhigher education institutions thoughhighly effective in supporting innova-tion and meeting specialized needs can

be a roadblock to strategic investmentsand efficiency realization InstitutionalIT governance can help achieve andsupport a clear IT strategy When IT gov-ernance programs have influence over ashared pot of institutional resources andare able to prioritize strategic IT invest-ments IT leaders can support ongoinginnovation and growth across the entireinstitutional portfolio of functions Inthe absence of institutional IT gover-nance IT projects will be prioritizedaccording to which areas can most easily

secure funding for their priorities Inevi-tably worthy and even critical projectswill not be funded if they are not spon-sored by well-resourced areas

Capital funding is relatively easy tosecure obtaining additional operationalfunding is much more difficult Sincemost capital projects have an opera-tional impact the differential access tofunding streams can create significantproblems for budget managers To sat-isfy demand and remain competitive

leaders at higher education institutionshave allocated capital funds to coverthe development cost of new IT infra-structure yet they seldom incorporateplans for ongoing operational funding ofcapital projects As a consequence thereis a fundamental misunderstanding ofthe total cost of information technologyand often no culturally accepted billingmodels exist for one-time and full-life-cycle costs

To help governance groups under-stand and support funding for the real

cost of information technology IT lead-ers need to develop total cost of owner-ship (TCO) scenarios and vet them withappropriate groups before projects arefunded Higher education informationtechnology is dogged by cost-savingsexpectations that usually create a falsesense of expenditure reduction In somecases the benefit of the IT investmentderives from risk reduction or new func-tionality and cost savings are not to be

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

expected In other cases cost savingsare theoretically possible but difficultto achieve if non-IT changes such asbusiness process redesign are requiredto realize them Even if the project is

successfully completed funding mayneed to shift to derive real institutionalsavings For example an IT project thatintroduces efficiencies to academicdepartments or business units mayreduce costs for the departments or units

and also for the institution overall butthe project may increase IT costs To real-ize net savings for the institution budgetfunding needs to be withdrawn from thedepartment and a portion needs to be

directed to the IT organization to coverits increased costs with the balanceaccruing to the bottom line of the insti-tution When each department controlsits own budget those shifts and realloca-tions are very difficult to negotiate and

often fall apart eroding any potentialcost savings

Growth can be managed but doingso requires service management models

that are able to project and prepare forgrowth Those models need to includecost management to ensure that serviceproviders understand and budget forboth fixed and variable costs The pay-ing IT customersmdashwhether institutionalleaders or individual departmentsmdashneedto understand IT service cost drivers andhow they can help manage those driv-ers Funding for growth in variable costsis relatively easy to justify if IT servicemanagers have and can show data onboth growth and the associated costs

Funding for growth in fixed costs needsto be justified as well and that requiresdata on the cost increases and a justifi-cation of the risks that will be reducedthe functionality that will be added orenhanced or some other compelling

FIGURE 5 IT Spending on Institutional Activities

Institutionalgrowth

Running theinstitution

Transformativechange

1576 9

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1235

22 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

reason This approach also paves the way for discussions of tradeoffs that mightaccommodate growth without increasing funding such as service-level reduc-tions shared services or outsourcing

Supporting innovation is a key piece of IT resource justification Studentsexist in a digital ecosystem and expect educational institutions to interact withthem in the ways that they are used to interacting with each other and with thecommercial entities they deal with on a daily basis Banks retail stores andeven government services are available to them through a multiplying swarmof devices Institutional leaders are increasingly aware that higher educationneeds to deliver services in the same way and that the development of an ITarchitecture to do so takes resources To better afford the resources necessaryto keep institutions current the IT organization itself needs to be innovativein the way it is organized the way it delivers IT services and the way it workswith various institutional constituencies Recognizing that IT drivers andcore services in 2014 may not even remotely resemble those necessary in 2020

demands funding flexibility since too tight a correlation will act as a disincen-tive to improvement and will create technology lags greater than those of thelast decade

Different but rigorous strategies for IT core services growth and innovationwill help in the development of IT funding models that best fit these separateactivities and are aligned with the institution and its constituents Effective ITgovernance can tie these three activities together and prioritize the IT expensein ways that support existing operations ensure ongoing innovation andrespond to growth across the entire IT portfolio

Advice983150 Benchmark IT finances by participating in the EDUCAUSE Core Data

Service983150 Ensure that IT projects build models for ongoing operational funding into

project deliverables and expectations983150 Establish an institutional IT governance structure that is responsible for allo-

cating funding not just identifying IT priorities983150 Understand the costs and cost drivers of todayrsquos IT services983150 Help leadership understand both the costs and the benefits of information

technology Arguments for new IT initiatives should always include cost esti-mates as well as estimates of the costs of not innovating

983150 Build the costs of growth and maintenance into funding models for core ITservices

Issue 4Improving Student

Outcomes through anInstitutional Approach

That StrategicallyLeverages Technology

The benefits of completing acollege education are widelyknown They include higherlifetime earnings greater levelsof happiness increased civic

engagement and reduced health risks

There are also societal benefits as theproportion of college graduates in thepopulation increases So it is in our ownbest interests to help both individualsand society by improving the successof students at our higher educationinstitutions

There are few cases in which tech-nology by itself has helped studentssucceed However there are opportuni-ties for technology to support studentsuccess initiatives The first task for anyinstitution is to assess both the insti-

tutional needs and the most currentremedies for the pain points that areidentified Although this is a constantlyand rapidly evolving area some specificexamples include the following

983150 Developin g a training course (orworkshop) to help students under-stand the technology landscape ofthe institution and how they can usethose tools to succeed

ldquoWhen it comes to innovation is the ITfunding principle lsquoWe optimize new IT

investments for the entire institutionrsquo orlsquoWe optimize new IT investments for theindividual unitsdepartmentsrsquo or bothPricing models will emerge accordinglyrdquo

mdashKarin Moyano CamihortDean of Online Learning and Academic Initiatives

Holyoke Community College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Removing barriersmdashs uch as accessusability and lack of supportmdashto theeffective use of technology

983150 Using technology to recast large lec-

ture courses and support pedagogi-cal transformations

983150 Using technology to provide flex-ibility for students to match thecourse with their learning style

983150 Using technology to distributelearning content in multiple waysincluding lectures (live and archivedfor review) electronic texts andlearning management systems

983150 Using technology such as peertutoring discussion boards andg roup videoconferences (eg

Google hangouts) to facilitate syn-chronous and asynchronous inter-actions with others and to promotecollaborative learning

983150 Considering the emerging role oftools used traditionally by business(ie CRM) to manage the institu-tionrsquos relationship with the student

983150 Applying elements of what is beinglearned in competency-based edu-cation initiatives at an institutionallevel for traditional students

Institutional leaders continueto emphasize and pour resourcesinto improving student retentionand completion Technology can beapplied to develop the broad area oflearning analytics to provide feedbackto students on their behavior (both pastand predictive) to faculty on the effec-tiveness of the pedagogy employed inthe course to content providers (andfaculty who select the content) on theeffectiveness of the content used in the

course and to administrators on broadsystemic issues and trendsMany colleges and universities

have student success committees thatfocus on initiatives to improve coursecompletion program completion andstudent support services Examplesof initiatives can be found in the areasof teaching and learning and studentsupport services In the area of reme-dial education great strides have been

made in reducing time to completionfor remedial students and in increas-ing retention and completion rates Anexample of the work occurring in the

area of student success can be found onthe Achieving the Dream InterventionsShowcase website (httpachievingthedreamorgresourcesachieving-the-dream-interventions-showcase) withmany of those interventions strategi-cally leveraging technology

As data analytics tools have becomemore sophisticated institutionshave been better able to recognizestudentsrsquo challenges and track stu-dentsrsquo journeys With theimplementation of early

alert systems advisors andfaculty have been able toassist students with just-in-time intervention recom-mendations In addition itis becoming commonplacefor advisors to have access todata beyond the traditionalERP demographic and stu-dent gradesmdashdata such ascourse performance throughlearning management sys-

tems early alert informationtutoring participation andeducation planning informa-tion (see Figure 6) Systemslike these sometimes referred to asIntegrated Planning and AdvisingServices (IPAS)8 permit the advisor tosupport and coach students based ona comprehensive view of the studentsrsquoinformation throughout their educa-

tional journey In the area of onlineeducation too wraparound studentsupport services are mirroring the on-ground experience with some colleges

and universities implementing careercoaches with supporting technologiesto provide services to online studentsThe integration of technologies in eachof these areas has had a positive impacton improving student outcomes

A variety of existing tools many stillin the early development stages canhelp institutions gather data to identifystudentsrsquo success opportunities andtheir achievements This information

is only as good as the data however Tofind the low-hanging fruit IT leadersneed to begin the data conversationsto locate tools that may already begenerating useful data To capture rele-

vant aspects of the student experience

FIGURE 6 Technology for Supporting Education Planning Advising and Counseling and Early Alerts

Source EDUCAUSE Core Data Service 2013

46

66

73

Early alert systems

Education planningacademicprogress tracking

Academic advising

Percentage of institutions

Tocapture relevant aspects

of the student experienceleaders must think institutionally

and identify technologyresources that canbring together the

diverse and enormousdata sets that represent this

experience

(continued on page 26)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1435

To create sustainable IT funding models IT leaders need to

clarify to institutional leaders and boards of trustees why

IT services are strategically important to the enterprise

TOP 10 IT ISSUES

EVOLVING STAFFING MODELS

IMPROVING

STUDENT

OUTCOMES

OPTIMIZING TECHNOLOGY IN

TEACHING AND LEARNING

FUNDING IT STRATEGICALLY

soft skills

moreresources

professional development

clear goals networking

65

Technical proficiency is as important as ever

So skills are more important that ever before

higher education IT staff are not

satisfied with their current position

To be more effective IT

staff say they need

of students wish their

instructors would use

early-alert systems more

of central ITrsquos budgetis spent running the institution

is spent on growth

is spent on transformation

Students respond

positively to learning

analytics opportunities

not at allimportant

technical proficiencystrategic planning

effective communication

1

veryimportant

5

Top 3 motivators for faculty integration of technology

in the classroom

bull Clear indicationevidence that students will benefit

bull Release time to designredesign courses

bull Confidence that the technology will work as planned

1 in 4

Todayrsquos market for IT talent is competitive Hiring andretaining top talent requires engaged managers whopossess and know how to foster good communication skills

Faculty and students alike are

interested in learning analytics for

notifications on course progress

Although technology is omnipresent in the lives ofstudents leveraging technology to engage students in

meaningful ways and to enhance learning is still evolving

76

15

9

I think this is great

This sounds positive

I am neutral

This sounds negative

Irsquom totallyagainst this

Spending model

breakdown in the USdoes not differsignificantly by

Institution type

Size

Central IT staff size

CIO reporting line

25

0

50

75

100

E D U C

A U S E E

R E S

E A R C

H S N

A P S H

O T

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1535

A look into EDUCAUSE research on the 2015 list of the

most intriguing ideas in higher education IT

DEMONSTRATING

VALUE OF IT

DEVELOPING

SECURITY

POLICIES FOR

THE INSTITUTION

DEVELOPING ENTERPRISE IT

ARCHITECTURE

BALANCING INFORMATION

SECURITY AND OPENNESS

INCREASING CAPACITY

FOR CHANGE

PROVIDING USER SUPPORT

The gaps between effectiveness in and

importance of addressing risks are large

Percentage using the college or university help desk for support

Percentage looking to peers

Student Device Ownership

Between 2005 and 2014 there were 727 education-sector

data breachesmdashinvolving more than 14 million recordsmdashas

reported to the Privacy Rights Clearinghouse

locally integrate the

architectures of multiple

major systems

follow the architecture of a

primary system or suite

20142013

25

0

50

75

100

2015 projection

Smartphones

Tablets

86

47

31

76

58

90

Information security

Data privacyconfidentiality

Identityaccess management

66

66

84

82

79

70

36

1

33

29

The most important IT risks to

address concern security privacy

and access

In a world of increasing

complex security threats

institutions must move from

a reactive to a proactive security response

We are living in an era when readily

accessible technologies facilitate a

BYOD standard requiring institutions

to rethink user support

A well-defined enterprise IT architecture is instrumental to

optimizing opportunities and managing change effectively

The higher education community is

struggling with the pace variety and sheer volume

of change in information technology as well as the

corresponding risks

IT leaders need to draw the lines from

technology initiatives to their institutionsrsquo

changing strategic objectives and on to the

ultimate bottom lines of mission and means

OtherLossthestInternal threatsExternal threats

81of institutions

do notaddress IT risk

in their strategicplan

7357

69

22

Faculty

Students

effectiveness

importance

effectiveness

importance

effectiveness

importance

6 3 10 10

Breachcauses

53Administration

37Teaching

and learning

10Researchother

Percentage of IT spend by institutional mission

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1635

26 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

leaders must think institutionally and identify technology resources that

can bring together the diverse and enormous data sets that represent thisexperience

As was discussed last year when this was the 1 issue in the 2014 Top 10list looking at this data may raise privacy issues so leaders must rememberto include the appropriate individuals in these discussions to ensure compli-ance security and privacy

Advice983150 Keep in mind that students consider success from a holistic view of their

campus experience not necessarily their experience with just a courseor a semester To maximize the impact of technology identify the combi-

nation of data and tools that will encompass as much of the institutionalexperience as possible983150 Remember that results will be only as good as the data Take time in the

beginning to build a reliable strategic foundation by starting with conciseoutcome objectives and then develop t he data-driven questions that willultimately define actionable steps to influence success

983150 Work with key individuals from various institutional areas to identifydata that may be available at an individual student level and that could becombined with other values to establish an assessment point for the stu-dent Next consider comparing this assessment point with the studentrsquossuccess level and attempt to identify some trends Drill down to indica-tors that can be used as targets for predicting success and for identifyingearly warning signs

983150 Ensure that the project is embedded in a cross-institutional student suc-cess effort that includes all relevant parties Dedicated student successteams or cross-departmental governance structures can be the vehiclefor organizing consensus Donrsquot allow a perception of IT ownership todevelop

983150 Resolve problems in academic and business processes before implemen-tation donlsquot adapt applications to dysfunctional processes

983150 Define the role of faculty in improving student outcomes through thestrategic leveraging of technology

983150 Determine how much individualized student data should be shared withadvisors in supporting improved student outcomes

Issue 5Demonstrating the

Business Value ofInformation Technologyand How Technology

and the IT OrganizationCan Help the Institution

Achieve Its Goals

IT leaders need to continue to get bet-ter at drawing the lines from technol-ogy initiatives to their institutionsrsquochanging strategic objectives and on

to the ultimate bottom lines of mis-sion and means Successfully demon-strating the business value of informationtechnology to the institution begins withdeveloping a clear understanding of the

various ways in which technology as awhole and the IT department as a unitadd value to the institution Institutionalleadersrsquo struggle to respond to changingpublic perceptions of the value of highereducation itself is a complicating factorHerein lies an opportunity for IT profes-sionals not only to demonstrate the value

of the IT organizationrsquos particular offer-ings but also to create new and significant value for the institution This requiresthinking of technology strategy as both aconsequence and a driver of institutionalstrategy IT leaders who have the abilityto see the entire institutional landscapeand can offer strategic insights for movingthe institution forward have never beenmore important to the well-being of col-leges and universities

ldquoInstead of reacting to new technologiestop institutions seek out new technologies

as a strategic imperative leveraging theseinnovations to improve learning insideand outside the classroom with datadecision making enhanced pedagogy andbetter student outcomesrdquo

mdashLisa M Davis Vice President for Information Services and Chief Information Officer

Georgetown University

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

So in what ways do IT leaders add value They add value to the organizationby enhancing the core productmdashnamelythe learning experiences of students and

the teaching activities of faculty They add value very directly by creating new chan-nels through which students can accessinstitutional offerings The channels thatonline opportunities provide would notexist without the technologies deliveredand supported by the IT organizationFrom a business perspective this cre-ates new sources of revenue a criticalobjective for virtually all colleges anduniversities Drawing a clear line that con-nects specific technology initiatives withtangible revenue for the institution is a

powerful way to demonstrate the busi-ness value of technologymdashand of the ITorganization

And of course the yin of revenue isbalanced by the yang of cost reductionStories of expense reduction and effi-ciency are perhaps easier to identify andtell and they should be carefully and dili-gently told but IT leaders must be carefulto also emphasize the much larger poten-tial that a clear focus on the revenue sidecan provide Doing so can help to avoid

the impression that the value of informa-tion technology is limited to simple actsof automation and efficiency Part of thiswork entails ensuring that the institu-tional leadership understands what is andis not possible Many times the need tohave the value discussion in the first placeis because leaders are not inherently feel-ing the value Those in the IT organiza-tion must take the time to develop andprovide clear data-based informationabout the services they deliver and valuethey provide

One way to demonstrate value iswith well-constructed service portfoliosand service catalogs A service portfolioprovides a high-level overview of howfunds are spent on major institutionalstrategic and operational goals and isgeared toward institutional leaders Aservice catalog (see Figure 7) provides amore detailed view into how IT dollarsare spent on IT projects products andservices and is geared toward IT leaders

Combined the service portfolio and theservice catalog can be a useful tool forshowing the business value of the invest-ments that institutions make in informa-tion technology

Assembling a service portfolio andcatalog may be the IT organizationrsquos firstcomprehensive view into the actual valueit is bringing to the institution Depend-ing on that value IT leaders may first needto focus on quick fixes to better align theirservices with the institutional mission

Before IT leaders can advocate howinformation technology can be leveragedto drive the business the IT organiza-tion must be operationally effective andefficient Institutional and business unitleaders must view the IT organizationas providing operational excellence andoutstanding customer service before theywill consider it as a partner in deliveringbusiness value

The CIO and IT leadership teamsshould remember that they are the pri-mary marketing avenue for sharing the

value that information technology bringsto the institutional mission IT leadersspend about 10 percent of their time ongovernance and planning and on innova-tion with business and academic units9 IT leaders thus must be intentional aboutidentifying opportunities for communi-cating how the IT organization is help-ing the institution CIOs must establish

strong and trusting relationships withtheir peer business leadersSharing the value of information

technology begins with IT leadership butmust extend to the entire IT organization

All IT staff must understand how theirwork contributes to the institutional mis-sions and priorities They need to under-stand the IT organizationrsquos capabilitiesand priorities and how the organizationcan advance the institution the indi-

vidual business units and the faculty stu-dents and staff with whom they work IT

leaders can encourage and enable IT staffto learn the mission business processesand requirements of business units inorder to understand how informationtechnology can best be leveraged Get-ting to this point may require a culturechange within the IT organization At the

very least all IT staff should know boththe institutional and the IT priorities toensure that everyone is telling the samestory

FIGURE 7 Percentage of Institutions with a Service Catalog

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

32

17

29

40

56

62

Source EDUCAUSE Core Data Service 2013

IT leaders add value

to the organization byenhancing the core

productmdashnamely thelearning experiences of

students and the teachingactivities of faculty

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1835

28 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Advice983150 Map IT priorities to institutional priorities Find the points of intersection

with the business unit operations customers and technology Partnerwith the business unit to develop a roadmap and to align the business withthe IT architecture

983150 Donrsquot wait for an invitation to discuss business and customer impact Butdonrsquot try to boil the ocean keep focused and be clear about what the IT

organization can and cannot do IT leaders must be translators usingterminology that resonates with non-IT experts and connecting the dotsbetween the technology capabilities and the business needs Develop asmall set of short and simple stories about concrete ways in which tech-nology has improved the learning experience at the institution createdaccess to institutional resources strengthened affinity for the institutiongenerated revenue and streamlined operations Focus at least as much onhelping others see what is possible with technology as on showing howtechnology investments improve current institutional life

983150 Develop a service catalog to serve as a base for connecting the work of theIT organization to the larger institutional strategic objectives

983150 Implement a metrics program that can demonstrate the extent to which theIT organization is achieving its service-level goals customer-satisfaction

goals and financial goals and is delivering on strategic priorities983150 Ensure that IT leaders and IT staff understand what drives academic and

business value for the institution and can identify and articulate how tech-nology can deliver that value Consider attending non-technology confer-ences to learn how business officers faculty and academic leaders thinkabout technology and what their pressing problems are Be the translatorfor business strategy

983150 To reach the broader institutional community consider newslettersbrown-bag gatherings and roundtable discussions and take advantageof recurring events such as National Cyber Security Awareness Month(httpwwweducauseeduncsam) and start-of-the-semester gatherings

Issue 6Increasing the IT

Organizationrsquos Capacityfor Managing Change

Despite DifferingCommunity Needs

Priorities and Abilities

Change is the watchword todayand going forward In the 2011book Race against the Machine MIT economists Erik Bryn-jolfsson and Andrew McAfee

write ldquoAdvances like the Googleautonomous car Watson the Jeop-ardy champion supercomputer andhigh-quality instantaneous machinetranslation then can be seen as thefirst examples of the kinds of digitalinnovations wersquoll see as we move into the phase where exponentialgrowth yields jaw-dropping resultsrdquo10

When technology changes organiza-tions are always challenged to adapt tonew circumstances This is par ticularlytrue of the organizations tasked with

implementing and maintaining thetechnology itselfThe higher education community

is struggling not only with the pace ofchange in information technology butalso with the variety and sheer volumeof change Information technology isincreasingly important to and increas-ingly integrated with all aspects ofboth the strategic and the operationalfunctions of the campus The chal-

ldquoWe also add value by creating newways for those who know us less well to

develop affinity with our institutions Asmall MOOC my college offered made usknown to groups of prospective studentswho would never have paid a momentrsquosattention to any traditional advertisingmessages we might have sent By joiningtheir party first via our technologies weput ourselves in a much better position to

invite them to our partyrdquomdashJames Kulich

Vice President and Chief Information OfficerElmhurst College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

lenge is how to engage multiple areasof the institution and expand servicesin numerous simultaneous initiativesMeanwhile institutional informa-

tion technology is reengineering itsinfrastructure platforms and servicesThose change efforts are often additiveto the applications being introduced aspart of new business-area initiatives

Ideally the institutional stancetoward change is proactive and ITleaders have the vision and good senseto advocate to broker and to preparetheir various constituents for upcom-ing changes while sustaining ongo-ing operations In reality end users

vary widely in their predisposition to

technology As a group students andfaculty are positively disposed towardinformation technology but as indi-

viduals they run the gamut (see Figure8) And attitudes influence behaviorthe way faculty and students adopt and

FIGURE 8 Relationship between Faculty Attitudes toward Online Learningand Their Experience with Online Teaching

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014(Louisville CO ECAR July 2014)

Percentage of respondents who agree or strongly agree

No recent onlineteaching

Some recentonline teaching

50250 75 100

All respondents

Online learning helps students learn more effectively

Online learning will lead to pedagogical breakthroughs

Online learning will make higher education available to more students

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2035

30 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

use technology tends to reflect theirattitudes11

The IT organizationrsquos history of exe-cution can influence community open-ness toward future technology changesThe shadow cast by a deeply flawed ERPimplementation for example can last adecade or longer

Change management is preciselythat managing change rather than lettingchange happen on its own (see Figure 9)

Successful change management is notaccidental or organic It is intentionaland has multiple components Manyinstitutions adopt a specific approachto implementing changemdashapproachessuch as ADKAR Kurt Lewinrsquos changemanagement model and John Kot-terrsquos eight steps12 Regardless of the

model managing change requires astrategy in which the goals and focusof the change are clear to internal andexternal constituents For examplethe corporate consultant Glenn Llopisadvises being able to identify what thesuccessful implementation of a changestrategy would look like knowing whatthe change strategy is trying to solveand identifying the required resourcesand relationships to implement the

change management strategy

13

As theIT organization sifts through the differ-ent needs abilities and priorities of theinstitution and tries to adapt to changeit must avoid being caught in a viciouscircle of tactics with no purpose

A good change management strat-egy has multiple components which

include communications and inclu-siveness John Jones DeAnne Agu-irre and Matthew Calderone provideten sensible principles for managing

change by keeping the human elementat the center14 Involving every level ofan organization creating ownershipassessing the cultural landscape andcommunicating effectively are keyfactors Change always affects some-body somewheremdashboth internally andexternally IT organizations must doeverything possible to find engagedpeople who can advocate on behalf ofthe change strategy It helps to havechampions at all levels executiveswho can demonstrate the institutional

leadersrsquo commitment area leaders whocan reinforce commitment with theirworkforce and explain how the change

will benefit their part of the institu-tion and individual influencers whocan help determine success factorsidentify and address pain points andevangelize with their colleagues

But change management involves

more than communications and inclu-siveness A successful change is a fullydesigned change Too often institu-tional leaders conflate new initiativeswith new systems and fail to fully thinkthrough and execute on the business-end components The successfulintroduction of a new system mightrequire new or reengineered businessprocesses new roles and even differ-ent organizational structures Every

ldquoTechnology is now integrated into just about

every aspect of our colleges and universitiesThat allows us a myriad of opportunitiesto use technology to help students succeedacademically Using technology to helpstudents succeed is at the core of what we dordquo

mdashSteve FleagleChief Information Officer and Associate Vice President

The University of Iowa

FIGURE 9 Percentage of Institutions That Have Implemented the ITIL ChangeManagement Process

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

23

13

25

30

44

44

Source EDUCAUSE Core Data Service 2013

Involvingevery level of an

organization creatingownership assessing thecultural landscape and

communicating effectivelyare key factors Changealways affects somebody

somewhere

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 6: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 635

16 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

and how to influence uninterestedleadership

Funding has made the EDUCAUSETop 10 list every year This year the chal-lenge with funding is to ensure that insti-tutional leaders understand the need tofund the entire IT portfolio so that theIT organization is capable of supportingthe aspirations ongoing operations andgrowth of the institution

The New NormalIn the midst of so much change chal-lenge and opportunity IT organiza-tions continue running core servicesand supporting end users IT staff stillgo into fire-fighting mode more oftenthan they would wish But even normaloperations are subject to the forces ofchange

Most notably bring-your-own-device

(BYOD) digitization and associated tech-nologies and opportunities are changingthe nature of user support and appropri-ate security policies In the first instancethe IT organization needs to retool andredefine its support strategy In the secondsecurity policies must comply with regu-latory requirements to protect data andprivacy without hamstringing academicsand administrators

Mark C Adams

Vice President for Information

Technology

Sam Houston State University

Mark I Berman

Chief Information Officer

Siena College

Christian Boniforti

Chief Information Officer

Lynn University

Michael Bourque

Vice President Information

Technology Services

Boston College

Karin Moyano Camihort

Dean of Online Learning and

Academic Initiatives

Holyoke Community College

Keelan Cleary

Director of Infrastructure andEnterprise Services

Marylhurst University

Jenny Crisp

QEP Director and Assistant

Professor of English

Dalton State College

Patrick Cronin

Vice President of Information

Technology

Bridgewater State University

Lisa M Davis

Vice President for Information

Services and ChiefInformation Officer

Georgetown University

Andrea Deau

Director of Information

Technology

University of Wisconsin

Extension

Patrick J Feehan

Director IT Policy and

Cybersecurity ComplianceMontgomery College

Steve Fleagle

Chief Information Officer and

Associate Vice President

The University of Iowa

Tom Haymes

Director Technology and

Instructional Computing

Houston Community College

Richard A Holmgren

Vice President for Information

Services and Assessment Allegheny College

Brad Judy

Director of Information

Security

University of Colorado System

James Kulich

Vice President and Chief

Information Officer

Elmhurst College

Jo Meyertons

Director Educational

Technology

Linfield College

Kevin Morooney

Vice Provost for Information

Technology and Chief

Information Officer

The Pennsylvania State

University

Angela Neria

Chief Information Officer

Pittsburg State University

Celeste M Schwartz

Vice President for InformationTechnology and College

Services

Montgomery County

Community College

Paul Sherlock

Chief Information Officer

University of South Australia

Francisca Yonekura

Associate Department Head

Center for DistributedLearning

University of Central Florida

EDUCAUSE IT Issues Panel Members

2014ndash2015

The EDUCAUSE IT Issues Panel comprises individuals from EDUCAUSE member institutions to provide quick feedback to EDUCAUSE on current issues problems andproposals across higher education information technology Panel members who are recruited from a randomly drawn and statistically valid sample to represent the EDUCAUSEmembership serve for eighteen months with staggered terms Panel members meet quarterly for ninety minutes via webinar or in person The meetings facilitated byEDUCAUSE Vice President Susan Grajek are designed as an ongoing dialogue to flesh out and refine an array of open-ended technology questions about the IT organizationthe institution and cross-institutional boundaries The members discuss refine and vote on the most relevant underlying issues or options

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Issue 1Hiring and Retaining

Qualified Staff andUpdating the Knowledge

and Skills of ExistingTechnology Staff

The long-held notion that infor-mation technology has threecritical dimensionsmdashpeopleprocess and technologymdashis stilltrue today Behind every suc-

cessful implementation of technology is

a group of talented people ensuring thateverything goes according to specifica-tions to meet the needs of the studentsand faculty Recruiting and retainingexceptional staff with the requiredknowledge skills and attitudes is not asmall feat Higher education competesfor talent in an extremely competitiveenvironment The technology fieldcurrently has very low and in someregions virtually no unemployment

As higher education competes with allindustries those of us in academe are

operating in an environment in whichchange comes quickly whether in tech-nology business disciplines or our coremissions of teaching and research Toattract maintain and retain the neces-sary talent higher education IT organi-zations need to adjust and adapt

Todayrsquos IT workforce needs are dif-ferent from needs in the past We need awide array of skill sets for roles that areevolving quickly The field of informa-

tion technology has always demandedthat professionals retrain and retoolto be able to design and support thelatest technologies Thus the ongoing

evolution of technical skills is not newHowever the very models for provid-ing and supporting technology-basedservices are in flux today This set ofchanges requires staff to be not onlyadept at retooling but also capable ofreinventing their roles And those rolesdemand entirely new skills To be ableto deliver the technology solutions thatstudents and faculty presently needwhile preparing themselves to lead theinstitution to adopt innovate or inventfuture technological advances IT staff

need such nontechnical qualities as ini-tiative grit adaptability and emotionalintelligence

Retaining talented staff requires aculture of teamwork that supports andencourages the growth of the individualand the team Management needs tofoster a vibrant workplace in whichdiversity is valued and individuals feelrespected Management must also rec-ognize that employeesrsquo views of satisfac-tion with their jobs are based on their

collective experiences ranging fromsalary to the culture of water-coolerdiscussions (see Figure 3) Leadersmust remember that every employeehas unique issues and methods of com-

municating so at times retention willcome down to one-on-one discussionsto understand employeesrsquo needs andto help employees understand their

role in the larger IT and institutionalstrategy Team members need to feelengaged with the organization and itsmission and they need to sense align-ment of their efforts with somethingimportant (eg mission) to have a senseof purpose With this sense of purposethey are more likely to be committed tothe institution But with such long-termcommitments also come the expecta-tion of ongoing skill development andcareer advancement opportunities

For performance management to

be successful it must become a criticaland continuous part of the operationsof the IT organization Managers mustensure that staff are aware of their fullbenefits packages and of leadershipefforts to provide a fulfilling and enjoy-able work environment Many institu-tions offer benefits and local area perksthat employees are not aware of

Augmenting the challenge o f hiringqualified staff is the exponential speedat which technology is continuously

changing In light of this new normalmany current roles and even profes-sions will not exist in the future Newroles and professions will arise toaddress changing technology delivery

FIGURE 3 Top Reasons IT Management and Staff Leave Their Jobs

CIOs MANAGERS STAFF

At high risk of leaving 1 in 8 1 in 6 1 in 5

Personal career goals are unattainable

Not recognized for value aside fromcompensation

No opportunities to learn and grow in the past year

Institutional mission does not make me feelmy job is important

Not compensated fairly

Based on rated importance of working in higher education combined with reported likelihood of pursuing opportunities outside theinstitution

Source Jacqueline Bichsel Todayrsquos Higher Education IT Workforce (Louisville CO ECAR January 2014)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 835

18 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

pedagogical and research methods and higher education business models

Not all staff will be able to recognize or adapt to these changes Managersneed to help staff recognize and prepare for new oppor tunities to minimizethe disruption Change affects not only the individuals who are disruptedbut also those staff who are bystanders witnessing the change and anticipat-ing the worst

Fortunately IT management is not without support That support b eginsby building a partnership with the Human Resources department (HR) Asuccess for the IT organization is a success for HR

Advice983150 Know how to sell the value of a career that contributes to the advance-

ment of higher education and its teaching learning and researchmissions983150 Develop a list of the nonmonetary benefits of working for the institution

and share that list with staff983150 Hire staff not just for their fit for the job but also for their emotional

intelligence and fit with the values and culture of the IT organization andthe institution At the same time remember that the strongest teams arethose that are most diverse so strive for a heterogeneous workforce thatshares a common set of core values

983150 Work with staff to select appropriate training Funding and facilitatingtime for training and travel is only part of the process Establish somedeliverables and accountability for the training so that employees returnto the office with the anticipated insights and skill set

983150 Work with HR to develop career paths for the major divisions of or rolesin central and distributed IT units Careers paths donrsquot have to stay withinthe IT organization consider lateral paths that can broaden someonersquosinstitutional or business experience Develop paths that reward knowl-edge work as well as managerial talent and understand that not everystaff member need aspire to leadership

983150 Create a talent plan for the IT organization itself Identify the skill setsand roles the organization will need to acquire and retire in the next oneto three years Create a roadmap to where the organization needs to headand begin working with HR now to implement the roadmap with as littledisruption as possible for individual staff and o perations

Issue 2Optimizing the Use

of Technology inTeaching and Learningin Collaboration with

Academic LeadershipIncluding Understandingthe Appropriate Level of

Technology to Use

C

olleges and universities con-tinue to invest in technologiesin support of teaching and

learning while struggling withways to help faculty understandthe value and potential impact of thesetechnologies An overlooked but criti-cal starting point is for an institutionto define its educational objectives andstrategy Institutions whose educationalculture is intentionally and predomi-nantly residential ones that serve manypart-time working commuters thosewith strong global outreach techno-logical institutes and institutions withstrong practicum orientations may all

grant similar degrees but will have verydifferent pedagogical strategies andtherefore different educational tech-nology needs Without a larger guiding

vision the application of technology toteaching and learning is neither strate-gic nor optimized it is instead a series ofendpoint solutions driven by individualfaculty requests and by the best (oftenuncoordinated) efforts of service pro-

viders throughout the institution

ldquoWe must be willing to combine someof the best benefits that business has to

offer (eg flexible work arrangements)with the strong selling points of a careerin higher education (eg connection withthe mission)rdquo

mdashMichael Bourque Vice President Information Technology Services

Boston College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

It is important to view technology asa supporting tool similar to earlier toolssuch as blackboardchalk Technolo-gies need to be carefully scrutinized

for their pedagogical implications Alt ho ug h on li ne co ur se s of fer th eallure of convenience and the opening(and thus increasing) of enrollments tostudents who might not otherwise beable to attend college in a traditionalmanner their pedagogical effectivenessshould be assessed as carefully as that oftraditional classroom courses Doing so

might identify gaps in overall pedagogi-cal assessment at an institution and thusimprove even face-to-face learning Thereal value of technologies is how facultyintegrate the technologies into theirteaching and learning and how they usethe technologies to further refine theircourse delivery and student engage-ment (see Figure 4)

If institutional leaders become moreintentional about their pedagogicalobjectives and assessment methodsthey will have the opportunity to influ-

ence the institutional technology mar-ketplace Todayrsquos solutions could bemuch more effective with better guid-ance from the leadership at colleges anduniversities

For example faculty often findthemselves overwhelmed with the vol-ume of new technologies and the ongo-ing upgrades of existing technologiesas they struggle to find time to researchhow to integrate the technologies into

their teaching Faculty new to onlinelearning will commonly try to replicatetheir physical classroom online butthis is a classic McLuhanesque mistake6

Optimizing the use of technology inteaching and learning depends on theability of the institutional and academicleadership to help faculty develop theirdigital competency and then to con-tinue to provide learning opportunitiesto keep their competencies currentFaculty need ongoing digital literacyopportunities that enable them to betterunderstand not only educational tech-nologies but also the social technolo-

gies that are affecting their everydaylives and the everyday lives of their stu-dents Those students expect engage-ment in their instruction Faculty need

to understand instructional narrativeand the implications of media as part oftheir technological introduction This ismore than just training on a particulartechnology It is as the saying goes thedifference between giving a man a fishand teaching him how to fish

The effective optimization ofinstructional technology also requiresrethinking reinforcing and clarifyingroles and relationships among faculty

ldquoFaculty armed with current understandingand research on the power and value

of technologies are more likely to usetechnology to enhance their pedagogicalapproachesrdquo

mdashCeleste M Schwartz Vice President for Information Technology and College Services

Montgomery County Community College

FIGURE 4 Integrating Technology into Courses

ldquoI could be a more effective faculty member if I were better skilled at integrating this technology

into my coursesrdquo

Percentage of respondents

3D printers

Non-keyboard or non-mouse computer interfacesSocial media as a teaching and learning tool

E-portfolios

Lecture capturerecordings

E-books or e-textbooks

Simulations or educational games

LMS

Online collaboration tools

Free web-based content

Agree Strongly agree

50250 75 100

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014 (Louisville CO ECAR July 2014)

The

real value oftechnologies is howfaculty integrate

technologies intoteaching and learning

and how they usetechnologies to further

refine course delivery andstudent engagement

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1035

20 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

librarians teaching and learn-ing center professionals and ITprofessionals They all need to

view themselves as colleag ues

and even partners in designingthe right infusion of technologyresources at the right time duringthe instructional process

Is all this a tall order Yes Butit is directed toward the primarymission of higher education andis thus well worth addressing Ifcollege and university leaders donot optimize the use of technol-ogy in teaching and learningexisting and emerging alterna-tives will almost certainly step

forward to fill the gap

Advice983150 Work with academic leader-

ship to articulate the institu-tional strategy for the use oftechnology in teaching andlearning to best fit the institu-tional culture and priorities

983150 Translate that strategy into ateaching and learning tech-

nology roadmap that pri-oritizes the technologies thatwill best achieve the institu-tional strategy and fit institu-tional resources

983150 Define and clarify roles insupporting instructionaltechnology to bring togetherall relevant institutionalparties as productively aspossible

983150 Move to a technology sup-port model that aligns tech-

nology integration supportand faculty professionaldevelopment that is courseprogram specific and basedon research that demonstratesimproved student engage-ment and success

983150 Ensure that faculty have suf-ficient support and releasetime to integrate the tech-nologies into their courses

Issue 3Developing IT Funding

Models That SustainCore Service

Support Innovation andFacilitate Growth

As governmental financial sup-port for higher educationcontinues to decline bothpublic and private institutionsare desperately trying to focus

scarce resources on strategically impor-

tant needsTo create funding models that willsustain IT operations IT leaders need toclarify to institutional leaders and boardsof trustees why IT services are strategi-cally important to the enterprise Articu-lating and making some of the toughstrategic choices explicit is fundamentalto developing a sustainable fundingmodel As the role of information tech-nology in higher education matures andas institutions are increasingly pressedto balance costs with tangible benefits

IT leaders will need to strengthen andleverage their relationships with gover-nance groups connect execution withstrategy and exploit funding models tiedto institutional strategy (see Figure 5)

EDUCAUSE defines gov ern anc e asldquohow a higher education institution isorganized for the purposes of decisionmaking and resource allocation andhow the varying parts are managed ina way that promotes the mission of the

institutionrdquo7 The distributed nature ofhigher education institutions thoughhighly effective in supporting innova-tion and meeting specialized needs can

be a roadblock to strategic investmentsand efficiency realization InstitutionalIT governance can help achieve andsupport a clear IT strategy When IT gov-ernance programs have influence over ashared pot of institutional resources andare able to prioritize strategic IT invest-ments IT leaders can support ongoinginnovation and growth across the entireinstitutional portfolio of functions Inthe absence of institutional IT gover-nance IT projects will be prioritizedaccording to which areas can most easily

secure funding for their priorities Inevi-tably worthy and even critical projectswill not be funded if they are not spon-sored by well-resourced areas

Capital funding is relatively easy tosecure obtaining additional operationalfunding is much more difficult Sincemost capital projects have an opera-tional impact the differential access tofunding streams can create significantproblems for budget managers To sat-isfy demand and remain competitive

leaders at higher education institutionshave allocated capital funds to coverthe development cost of new IT infra-structure yet they seldom incorporateplans for ongoing operational funding ofcapital projects As a consequence thereis a fundamental misunderstanding ofthe total cost of information technologyand often no culturally accepted billingmodels exist for one-time and full-life-cycle costs

To help governance groups under-stand and support funding for the real

cost of information technology IT lead-ers need to develop total cost of owner-ship (TCO) scenarios and vet them withappropriate groups before projects arefunded Higher education informationtechnology is dogged by cost-savingsexpectations that usually create a falsesense of expenditure reduction In somecases the benefit of the IT investmentderives from risk reduction or new func-tionality and cost savings are not to be

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

expected In other cases cost savingsare theoretically possible but difficultto achieve if non-IT changes such asbusiness process redesign are requiredto realize them Even if the project is

successfully completed funding mayneed to shift to derive real institutionalsavings For example an IT project thatintroduces efficiencies to academicdepartments or business units mayreduce costs for the departments or units

and also for the institution overall butthe project may increase IT costs To real-ize net savings for the institution budgetfunding needs to be withdrawn from thedepartment and a portion needs to be

directed to the IT organization to coverits increased costs with the balanceaccruing to the bottom line of the insti-tution When each department controlsits own budget those shifts and realloca-tions are very difficult to negotiate and

often fall apart eroding any potentialcost savings

Growth can be managed but doingso requires service management models

that are able to project and prepare forgrowth Those models need to includecost management to ensure that serviceproviders understand and budget forboth fixed and variable costs The pay-ing IT customersmdashwhether institutionalleaders or individual departmentsmdashneedto understand IT service cost drivers andhow they can help manage those driv-ers Funding for growth in variable costsis relatively easy to justify if IT servicemanagers have and can show data onboth growth and the associated costs

Funding for growth in fixed costs needsto be justified as well and that requiresdata on the cost increases and a justifi-cation of the risks that will be reducedthe functionality that will be added orenhanced or some other compelling

FIGURE 5 IT Spending on Institutional Activities

Institutionalgrowth

Running theinstitution

Transformativechange

1576 9

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1235

22 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

reason This approach also paves the way for discussions of tradeoffs that mightaccommodate growth without increasing funding such as service-level reduc-tions shared services or outsourcing

Supporting innovation is a key piece of IT resource justification Studentsexist in a digital ecosystem and expect educational institutions to interact withthem in the ways that they are used to interacting with each other and with thecommercial entities they deal with on a daily basis Banks retail stores andeven government services are available to them through a multiplying swarmof devices Institutional leaders are increasingly aware that higher educationneeds to deliver services in the same way and that the development of an ITarchitecture to do so takes resources To better afford the resources necessaryto keep institutions current the IT organization itself needs to be innovativein the way it is organized the way it delivers IT services and the way it workswith various institutional constituencies Recognizing that IT drivers andcore services in 2014 may not even remotely resemble those necessary in 2020

demands funding flexibility since too tight a correlation will act as a disincen-tive to improvement and will create technology lags greater than those of thelast decade

Different but rigorous strategies for IT core services growth and innovationwill help in the development of IT funding models that best fit these separateactivities and are aligned with the institution and its constituents Effective ITgovernance can tie these three activities together and prioritize the IT expensein ways that support existing operations ensure ongoing innovation andrespond to growth across the entire IT portfolio

Advice983150 Benchmark IT finances by participating in the EDUCAUSE Core Data

Service983150 Ensure that IT projects build models for ongoing operational funding into

project deliverables and expectations983150 Establish an institutional IT governance structure that is responsible for allo-

cating funding not just identifying IT priorities983150 Understand the costs and cost drivers of todayrsquos IT services983150 Help leadership understand both the costs and the benefits of information

technology Arguments for new IT initiatives should always include cost esti-mates as well as estimates of the costs of not innovating

983150 Build the costs of growth and maintenance into funding models for core ITservices

Issue 4Improving Student

Outcomes through anInstitutional Approach

That StrategicallyLeverages Technology

The benefits of completing acollege education are widelyknown They include higherlifetime earnings greater levelsof happiness increased civic

engagement and reduced health risks

There are also societal benefits as theproportion of college graduates in thepopulation increases So it is in our ownbest interests to help both individualsand society by improving the successof students at our higher educationinstitutions

There are few cases in which tech-nology by itself has helped studentssucceed However there are opportuni-ties for technology to support studentsuccess initiatives The first task for anyinstitution is to assess both the insti-

tutional needs and the most currentremedies for the pain points that areidentified Although this is a constantlyand rapidly evolving area some specificexamples include the following

983150 Developin g a training course (orworkshop) to help students under-stand the technology landscape ofthe institution and how they can usethose tools to succeed

ldquoWhen it comes to innovation is the ITfunding principle lsquoWe optimize new IT

investments for the entire institutionrsquo orlsquoWe optimize new IT investments for theindividual unitsdepartmentsrsquo or bothPricing models will emerge accordinglyrdquo

mdashKarin Moyano CamihortDean of Online Learning and Academic Initiatives

Holyoke Community College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Removing barriersmdashs uch as accessusability and lack of supportmdashto theeffective use of technology

983150 Using technology to recast large lec-

ture courses and support pedagogi-cal transformations

983150 Using technology to provide flex-ibility for students to match thecourse with their learning style

983150 Using technology to distributelearning content in multiple waysincluding lectures (live and archivedfor review) electronic texts andlearning management systems

983150 Using technology such as peertutoring discussion boards andg roup videoconferences (eg

Google hangouts) to facilitate syn-chronous and asynchronous inter-actions with others and to promotecollaborative learning

983150 Considering the emerging role oftools used traditionally by business(ie CRM) to manage the institu-tionrsquos relationship with the student

983150 Applying elements of what is beinglearned in competency-based edu-cation initiatives at an institutionallevel for traditional students

Institutional leaders continueto emphasize and pour resourcesinto improving student retentionand completion Technology can beapplied to develop the broad area oflearning analytics to provide feedbackto students on their behavior (both pastand predictive) to faculty on the effec-tiveness of the pedagogy employed inthe course to content providers (andfaculty who select the content) on theeffectiveness of the content used in the

course and to administrators on broadsystemic issues and trendsMany colleges and universities

have student success committees thatfocus on initiatives to improve coursecompletion program completion andstudent support services Examplesof initiatives can be found in the areasof teaching and learning and studentsupport services In the area of reme-dial education great strides have been

made in reducing time to completionfor remedial students and in increas-ing retention and completion rates Anexample of the work occurring in the

area of student success can be found onthe Achieving the Dream InterventionsShowcase website (httpachievingthedreamorgresourcesachieving-the-dream-interventions-showcase) withmany of those interventions strategi-cally leveraging technology

As data analytics tools have becomemore sophisticated institutionshave been better able to recognizestudentsrsquo challenges and track stu-dentsrsquo journeys With theimplementation of early

alert systems advisors andfaculty have been able toassist students with just-in-time intervention recom-mendations In addition itis becoming commonplacefor advisors to have access todata beyond the traditionalERP demographic and stu-dent gradesmdashdata such ascourse performance throughlearning management sys-

tems early alert informationtutoring participation andeducation planning informa-tion (see Figure 6) Systemslike these sometimes referred to asIntegrated Planning and AdvisingServices (IPAS)8 permit the advisor tosupport and coach students based ona comprehensive view of the studentsrsquoinformation throughout their educa-

tional journey In the area of onlineeducation too wraparound studentsupport services are mirroring the on-ground experience with some colleges

and universities implementing careercoaches with supporting technologiesto provide services to online studentsThe integration of technologies in eachof these areas has had a positive impacton improving student outcomes

A variety of existing tools many stillin the early development stages canhelp institutions gather data to identifystudentsrsquo success opportunities andtheir achievements This information

is only as good as the data however Tofind the low-hanging fruit IT leadersneed to begin the data conversationsto locate tools that may already begenerating useful data To capture rele-

vant aspects of the student experience

FIGURE 6 Technology for Supporting Education Planning Advising and Counseling and Early Alerts

Source EDUCAUSE Core Data Service 2013

46

66

73

Early alert systems

Education planningacademicprogress tracking

Academic advising

Percentage of institutions

Tocapture relevant aspects

of the student experienceleaders must think institutionally

and identify technologyresources that canbring together the

diverse and enormousdata sets that represent this

experience

(continued on page 26)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1435

To create sustainable IT funding models IT leaders need to

clarify to institutional leaders and boards of trustees why

IT services are strategically important to the enterprise

TOP 10 IT ISSUES

EVOLVING STAFFING MODELS

IMPROVING

STUDENT

OUTCOMES

OPTIMIZING TECHNOLOGY IN

TEACHING AND LEARNING

FUNDING IT STRATEGICALLY

soft skills

moreresources

professional development

clear goals networking

65

Technical proficiency is as important as ever

So skills are more important that ever before

higher education IT staff are not

satisfied with their current position

To be more effective IT

staff say they need

of students wish their

instructors would use

early-alert systems more

of central ITrsquos budgetis spent running the institution

is spent on growth

is spent on transformation

Students respond

positively to learning

analytics opportunities

not at allimportant

technical proficiencystrategic planning

effective communication

1

veryimportant

5

Top 3 motivators for faculty integration of technology

in the classroom

bull Clear indicationevidence that students will benefit

bull Release time to designredesign courses

bull Confidence that the technology will work as planned

1 in 4

Todayrsquos market for IT talent is competitive Hiring andretaining top talent requires engaged managers whopossess and know how to foster good communication skills

Faculty and students alike are

interested in learning analytics for

notifications on course progress

Although technology is omnipresent in the lives ofstudents leveraging technology to engage students in

meaningful ways and to enhance learning is still evolving

76

15

9

I think this is great

This sounds positive

I am neutral

This sounds negative

Irsquom totallyagainst this

Spending model

breakdown in the USdoes not differsignificantly by

Institution type

Size

Central IT staff size

CIO reporting line

25

0

50

75

100

E D U C

A U S E E

R E S

E A R C

H S N

A P S H

O T

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1535

A look into EDUCAUSE research on the 2015 list of the

most intriguing ideas in higher education IT

DEMONSTRATING

VALUE OF IT

DEVELOPING

SECURITY

POLICIES FOR

THE INSTITUTION

DEVELOPING ENTERPRISE IT

ARCHITECTURE

BALANCING INFORMATION

SECURITY AND OPENNESS

INCREASING CAPACITY

FOR CHANGE

PROVIDING USER SUPPORT

The gaps between effectiveness in and

importance of addressing risks are large

Percentage using the college or university help desk for support

Percentage looking to peers

Student Device Ownership

Between 2005 and 2014 there were 727 education-sector

data breachesmdashinvolving more than 14 million recordsmdashas

reported to the Privacy Rights Clearinghouse

locally integrate the

architectures of multiple

major systems

follow the architecture of a

primary system or suite

20142013

25

0

50

75

100

2015 projection

Smartphones

Tablets

86

47

31

76

58

90

Information security

Data privacyconfidentiality

Identityaccess management

66

66

84

82

79

70

36

1

33

29

The most important IT risks to

address concern security privacy

and access

In a world of increasing

complex security threats

institutions must move from

a reactive to a proactive security response

We are living in an era when readily

accessible technologies facilitate a

BYOD standard requiring institutions

to rethink user support

A well-defined enterprise IT architecture is instrumental to

optimizing opportunities and managing change effectively

The higher education community is

struggling with the pace variety and sheer volume

of change in information technology as well as the

corresponding risks

IT leaders need to draw the lines from

technology initiatives to their institutionsrsquo

changing strategic objectives and on to the

ultimate bottom lines of mission and means

OtherLossthestInternal threatsExternal threats

81of institutions

do notaddress IT risk

in their strategicplan

7357

69

22

Faculty

Students

effectiveness

importance

effectiveness

importance

effectiveness

importance

6 3 10 10

Breachcauses

53Administration

37Teaching

and learning

10Researchother

Percentage of IT spend by institutional mission

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1635

26 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

leaders must think institutionally and identify technology resources that

can bring together the diverse and enormous data sets that represent thisexperience

As was discussed last year when this was the 1 issue in the 2014 Top 10list looking at this data may raise privacy issues so leaders must rememberto include the appropriate individuals in these discussions to ensure compli-ance security and privacy

Advice983150 Keep in mind that students consider success from a holistic view of their

campus experience not necessarily their experience with just a courseor a semester To maximize the impact of technology identify the combi-

nation of data and tools that will encompass as much of the institutionalexperience as possible983150 Remember that results will be only as good as the data Take time in the

beginning to build a reliable strategic foundation by starting with conciseoutcome objectives and then develop t he data-driven questions that willultimately define actionable steps to influence success

983150 Work with key individuals from various institutional areas to identifydata that may be available at an individual student level and that could becombined with other values to establish an assessment point for the stu-dent Next consider comparing this assessment point with the studentrsquossuccess level and attempt to identify some trends Drill down to indica-tors that can be used as targets for predicting success and for identifyingearly warning signs

983150 Ensure that the project is embedded in a cross-institutional student suc-cess effort that includes all relevant parties Dedicated student successteams or cross-departmental governance structures can be the vehiclefor organizing consensus Donrsquot allow a perception of IT ownership todevelop

983150 Resolve problems in academic and business processes before implemen-tation donlsquot adapt applications to dysfunctional processes

983150 Define the role of faculty in improving student outcomes through thestrategic leveraging of technology

983150 Determine how much individualized student data should be shared withadvisors in supporting improved student outcomes

Issue 5Demonstrating the

Business Value ofInformation Technologyand How Technology

and the IT OrganizationCan Help the Institution

Achieve Its Goals

IT leaders need to continue to get bet-ter at drawing the lines from technol-ogy initiatives to their institutionsrsquochanging strategic objectives and on

to the ultimate bottom lines of mis-sion and means Successfully demon-strating the business value of informationtechnology to the institution begins withdeveloping a clear understanding of the

various ways in which technology as awhole and the IT department as a unitadd value to the institution Institutionalleadersrsquo struggle to respond to changingpublic perceptions of the value of highereducation itself is a complicating factorHerein lies an opportunity for IT profes-sionals not only to demonstrate the value

of the IT organizationrsquos particular offer-ings but also to create new and significant value for the institution This requiresthinking of technology strategy as both aconsequence and a driver of institutionalstrategy IT leaders who have the abilityto see the entire institutional landscapeand can offer strategic insights for movingthe institution forward have never beenmore important to the well-being of col-leges and universities

ldquoInstead of reacting to new technologiestop institutions seek out new technologies

as a strategic imperative leveraging theseinnovations to improve learning insideand outside the classroom with datadecision making enhanced pedagogy andbetter student outcomesrdquo

mdashLisa M Davis Vice President for Information Services and Chief Information Officer

Georgetown University

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

So in what ways do IT leaders add value They add value to the organizationby enhancing the core productmdashnamelythe learning experiences of students and

the teaching activities of faculty They add value very directly by creating new chan-nels through which students can accessinstitutional offerings The channels thatonline opportunities provide would notexist without the technologies deliveredand supported by the IT organizationFrom a business perspective this cre-ates new sources of revenue a criticalobjective for virtually all colleges anduniversities Drawing a clear line that con-nects specific technology initiatives withtangible revenue for the institution is a

powerful way to demonstrate the busi-ness value of technologymdashand of the ITorganization

And of course the yin of revenue isbalanced by the yang of cost reductionStories of expense reduction and effi-ciency are perhaps easier to identify andtell and they should be carefully and dili-gently told but IT leaders must be carefulto also emphasize the much larger poten-tial that a clear focus on the revenue sidecan provide Doing so can help to avoid

the impression that the value of informa-tion technology is limited to simple actsof automation and efficiency Part of thiswork entails ensuring that the institu-tional leadership understands what is andis not possible Many times the need tohave the value discussion in the first placeis because leaders are not inherently feel-ing the value Those in the IT organiza-tion must take the time to develop andprovide clear data-based informationabout the services they deliver and valuethey provide

One way to demonstrate value iswith well-constructed service portfoliosand service catalogs A service portfolioprovides a high-level overview of howfunds are spent on major institutionalstrategic and operational goals and isgeared toward institutional leaders Aservice catalog (see Figure 7) provides amore detailed view into how IT dollarsare spent on IT projects products andservices and is geared toward IT leaders

Combined the service portfolio and theservice catalog can be a useful tool forshowing the business value of the invest-ments that institutions make in informa-tion technology

Assembling a service portfolio andcatalog may be the IT organizationrsquos firstcomprehensive view into the actual valueit is bringing to the institution Depend-ing on that value IT leaders may first needto focus on quick fixes to better align theirservices with the institutional mission

Before IT leaders can advocate howinformation technology can be leveragedto drive the business the IT organiza-tion must be operationally effective andefficient Institutional and business unitleaders must view the IT organizationas providing operational excellence andoutstanding customer service before theywill consider it as a partner in deliveringbusiness value

The CIO and IT leadership teamsshould remember that they are the pri-mary marketing avenue for sharing the

value that information technology bringsto the institutional mission IT leadersspend about 10 percent of their time ongovernance and planning and on innova-tion with business and academic units9 IT leaders thus must be intentional aboutidentifying opportunities for communi-cating how the IT organization is help-ing the institution CIOs must establish

strong and trusting relationships withtheir peer business leadersSharing the value of information

technology begins with IT leadership butmust extend to the entire IT organization

All IT staff must understand how theirwork contributes to the institutional mis-sions and priorities They need to under-stand the IT organizationrsquos capabilitiesand priorities and how the organizationcan advance the institution the indi-

vidual business units and the faculty stu-dents and staff with whom they work IT

leaders can encourage and enable IT staffto learn the mission business processesand requirements of business units inorder to understand how informationtechnology can best be leveraged Get-ting to this point may require a culturechange within the IT organization At the

very least all IT staff should know boththe institutional and the IT priorities toensure that everyone is telling the samestory

FIGURE 7 Percentage of Institutions with a Service Catalog

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

32

17

29

40

56

62

Source EDUCAUSE Core Data Service 2013

IT leaders add value

to the organization byenhancing the core

productmdashnamely thelearning experiences of

students and the teachingactivities of faculty

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1835

28 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Advice983150 Map IT priorities to institutional priorities Find the points of intersection

with the business unit operations customers and technology Partnerwith the business unit to develop a roadmap and to align the business withthe IT architecture

983150 Donrsquot wait for an invitation to discuss business and customer impact Butdonrsquot try to boil the ocean keep focused and be clear about what the IT

organization can and cannot do IT leaders must be translators usingterminology that resonates with non-IT experts and connecting the dotsbetween the technology capabilities and the business needs Develop asmall set of short and simple stories about concrete ways in which tech-nology has improved the learning experience at the institution createdaccess to institutional resources strengthened affinity for the institutiongenerated revenue and streamlined operations Focus at least as much onhelping others see what is possible with technology as on showing howtechnology investments improve current institutional life

983150 Develop a service catalog to serve as a base for connecting the work of theIT organization to the larger institutional strategic objectives

983150 Implement a metrics program that can demonstrate the extent to which theIT organization is achieving its service-level goals customer-satisfaction

goals and financial goals and is delivering on strategic priorities983150 Ensure that IT leaders and IT staff understand what drives academic and

business value for the institution and can identify and articulate how tech-nology can deliver that value Consider attending non-technology confer-ences to learn how business officers faculty and academic leaders thinkabout technology and what their pressing problems are Be the translatorfor business strategy

983150 To reach the broader institutional community consider newslettersbrown-bag gatherings and roundtable discussions and take advantageof recurring events such as National Cyber Security Awareness Month(httpwwweducauseeduncsam) and start-of-the-semester gatherings

Issue 6Increasing the IT

Organizationrsquos Capacityfor Managing Change

Despite DifferingCommunity Needs

Priorities and Abilities

Change is the watchword todayand going forward In the 2011book Race against the Machine MIT economists Erik Bryn-jolfsson and Andrew McAfee

write ldquoAdvances like the Googleautonomous car Watson the Jeop-ardy champion supercomputer andhigh-quality instantaneous machinetranslation then can be seen as thefirst examples of the kinds of digitalinnovations wersquoll see as we move into the phase where exponentialgrowth yields jaw-dropping resultsrdquo10

When technology changes organiza-tions are always challenged to adapt tonew circumstances This is par ticularlytrue of the organizations tasked with

implementing and maintaining thetechnology itselfThe higher education community

is struggling not only with the pace ofchange in information technology butalso with the variety and sheer volumeof change Information technology isincreasingly important to and increas-ingly integrated with all aspects ofboth the strategic and the operationalfunctions of the campus The chal-

ldquoWe also add value by creating newways for those who know us less well to

develop affinity with our institutions Asmall MOOC my college offered made usknown to groups of prospective studentswho would never have paid a momentrsquosattention to any traditional advertisingmessages we might have sent By joiningtheir party first via our technologies weput ourselves in a much better position to

invite them to our partyrdquomdashJames Kulich

Vice President and Chief Information OfficerElmhurst College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

lenge is how to engage multiple areasof the institution and expand servicesin numerous simultaneous initiativesMeanwhile institutional informa-

tion technology is reengineering itsinfrastructure platforms and servicesThose change efforts are often additiveto the applications being introduced aspart of new business-area initiatives

Ideally the institutional stancetoward change is proactive and ITleaders have the vision and good senseto advocate to broker and to preparetheir various constituents for upcom-ing changes while sustaining ongo-ing operations In reality end users

vary widely in their predisposition to

technology As a group students andfaculty are positively disposed towardinformation technology but as indi-

viduals they run the gamut (see Figure8) And attitudes influence behaviorthe way faculty and students adopt and

FIGURE 8 Relationship between Faculty Attitudes toward Online Learningand Their Experience with Online Teaching

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014(Louisville CO ECAR July 2014)

Percentage of respondents who agree or strongly agree

No recent onlineteaching

Some recentonline teaching

50250 75 100

All respondents

Online learning helps students learn more effectively

Online learning will lead to pedagogical breakthroughs

Online learning will make higher education available to more students

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2035

30 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

use technology tends to reflect theirattitudes11

The IT organizationrsquos history of exe-cution can influence community open-ness toward future technology changesThe shadow cast by a deeply flawed ERPimplementation for example can last adecade or longer

Change management is preciselythat managing change rather than lettingchange happen on its own (see Figure 9)

Successful change management is notaccidental or organic It is intentionaland has multiple components Manyinstitutions adopt a specific approachto implementing changemdashapproachessuch as ADKAR Kurt Lewinrsquos changemanagement model and John Kot-terrsquos eight steps12 Regardless of the

model managing change requires astrategy in which the goals and focusof the change are clear to internal andexternal constituents For examplethe corporate consultant Glenn Llopisadvises being able to identify what thesuccessful implementation of a changestrategy would look like knowing whatthe change strategy is trying to solveand identifying the required resourcesand relationships to implement the

change management strategy

13

As theIT organization sifts through the differ-ent needs abilities and priorities of theinstitution and tries to adapt to changeit must avoid being caught in a viciouscircle of tactics with no purpose

A good change management strat-egy has multiple components which

include communications and inclu-siveness John Jones DeAnne Agu-irre and Matthew Calderone provideten sensible principles for managing

change by keeping the human elementat the center14 Involving every level ofan organization creating ownershipassessing the cultural landscape andcommunicating effectively are keyfactors Change always affects some-body somewheremdashboth internally andexternally IT organizations must doeverything possible to find engagedpeople who can advocate on behalf ofthe change strategy It helps to havechampions at all levels executiveswho can demonstrate the institutional

leadersrsquo commitment area leaders whocan reinforce commitment with theirworkforce and explain how the change

will benefit their part of the institu-tion and individual influencers whocan help determine success factorsidentify and address pain points andevangelize with their colleagues

But change management involves

more than communications and inclu-siveness A successful change is a fullydesigned change Too often institu-tional leaders conflate new initiativeswith new systems and fail to fully thinkthrough and execute on the business-end components The successfulintroduction of a new system mightrequire new or reengineered businessprocesses new roles and even differ-ent organizational structures Every

ldquoTechnology is now integrated into just about

every aspect of our colleges and universitiesThat allows us a myriad of opportunitiesto use technology to help students succeedacademically Using technology to helpstudents succeed is at the core of what we dordquo

mdashSteve FleagleChief Information Officer and Associate Vice President

The University of Iowa

FIGURE 9 Percentage of Institutions That Have Implemented the ITIL ChangeManagement Process

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

23

13

25

30

44

44

Source EDUCAUSE Core Data Service 2013

Involvingevery level of an

organization creatingownership assessing thecultural landscape and

communicating effectivelyare key factors Changealways affects somebody

somewhere

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 7: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Issue 1Hiring and Retaining

Qualified Staff andUpdating the Knowledge

and Skills of ExistingTechnology Staff

The long-held notion that infor-mation technology has threecritical dimensionsmdashpeopleprocess and technologymdashis stilltrue today Behind every suc-

cessful implementation of technology is

a group of talented people ensuring thateverything goes according to specifica-tions to meet the needs of the studentsand faculty Recruiting and retainingexceptional staff with the requiredknowledge skills and attitudes is not asmall feat Higher education competesfor talent in an extremely competitiveenvironment The technology fieldcurrently has very low and in someregions virtually no unemployment

As higher education competes with allindustries those of us in academe are

operating in an environment in whichchange comes quickly whether in tech-nology business disciplines or our coremissions of teaching and research Toattract maintain and retain the neces-sary talent higher education IT organi-zations need to adjust and adapt

Todayrsquos IT workforce needs are dif-ferent from needs in the past We need awide array of skill sets for roles that areevolving quickly The field of informa-

tion technology has always demandedthat professionals retrain and retoolto be able to design and support thelatest technologies Thus the ongoing

evolution of technical skills is not newHowever the very models for provid-ing and supporting technology-basedservices are in flux today This set ofchanges requires staff to be not onlyadept at retooling but also capable ofreinventing their roles And those rolesdemand entirely new skills To be ableto deliver the technology solutions thatstudents and faculty presently needwhile preparing themselves to lead theinstitution to adopt innovate or inventfuture technological advances IT staff

need such nontechnical qualities as ini-tiative grit adaptability and emotionalintelligence

Retaining talented staff requires aculture of teamwork that supports andencourages the growth of the individualand the team Management needs tofoster a vibrant workplace in whichdiversity is valued and individuals feelrespected Management must also rec-ognize that employeesrsquo views of satisfac-tion with their jobs are based on their

collective experiences ranging fromsalary to the culture of water-coolerdiscussions (see Figure 3) Leadersmust remember that every employeehas unique issues and methods of com-

municating so at times retention willcome down to one-on-one discussionsto understand employeesrsquo needs andto help employees understand their

role in the larger IT and institutionalstrategy Team members need to feelengaged with the organization and itsmission and they need to sense align-ment of their efforts with somethingimportant (eg mission) to have a senseof purpose With this sense of purposethey are more likely to be committed tothe institution But with such long-termcommitments also come the expecta-tion of ongoing skill development andcareer advancement opportunities

For performance management to

be successful it must become a criticaland continuous part of the operationsof the IT organization Managers mustensure that staff are aware of their fullbenefits packages and of leadershipefforts to provide a fulfilling and enjoy-able work environment Many institu-tions offer benefits and local area perksthat employees are not aware of

Augmenting the challenge o f hiringqualified staff is the exponential speedat which technology is continuously

changing In light of this new normalmany current roles and even profes-sions will not exist in the future Newroles and professions will arise toaddress changing technology delivery

FIGURE 3 Top Reasons IT Management and Staff Leave Their Jobs

CIOs MANAGERS STAFF

At high risk of leaving 1 in 8 1 in 6 1 in 5

Personal career goals are unattainable

Not recognized for value aside fromcompensation

No opportunities to learn and grow in the past year

Institutional mission does not make me feelmy job is important

Not compensated fairly

Based on rated importance of working in higher education combined with reported likelihood of pursuing opportunities outside theinstitution

Source Jacqueline Bichsel Todayrsquos Higher Education IT Workforce (Louisville CO ECAR January 2014)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 835

18 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

pedagogical and research methods and higher education business models

Not all staff will be able to recognize or adapt to these changes Managersneed to help staff recognize and prepare for new oppor tunities to minimizethe disruption Change affects not only the individuals who are disruptedbut also those staff who are bystanders witnessing the change and anticipat-ing the worst

Fortunately IT management is not without support That support b eginsby building a partnership with the Human Resources department (HR) Asuccess for the IT organization is a success for HR

Advice983150 Know how to sell the value of a career that contributes to the advance-

ment of higher education and its teaching learning and researchmissions983150 Develop a list of the nonmonetary benefits of working for the institution

and share that list with staff983150 Hire staff not just for their fit for the job but also for their emotional

intelligence and fit with the values and culture of the IT organization andthe institution At the same time remember that the strongest teams arethose that are most diverse so strive for a heterogeneous workforce thatshares a common set of core values

983150 Work with staff to select appropriate training Funding and facilitatingtime for training and travel is only part of the process Establish somedeliverables and accountability for the training so that employees returnto the office with the anticipated insights and skill set

983150 Work with HR to develop career paths for the major divisions of or rolesin central and distributed IT units Careers paths donrsquot have to stay withinthe IT organization consider lateral paths that can broaden someonersquosinstitutional or business experience Develop paths that reward knowl-edge work as well as managerial talent and understand that not everystaff member need aspire to leadership

983150 Create a talent plan for the IT organization itself Identify the skill setsand roles the organization will need to acquire and retire in the next oneto three years Create a roadmap to where the organization needs to headand begin working with HR now to implement the roadmap with as littledisruption as possible for individual staff and o perations

Issue 2Optimizing the Use

of Technology inTeaching and Learningin Collaboration with

Academic LeadershipIncluding Understandingthe Appropriate Level of

Technology to Use

C

olleges and universities con-tinue to invest in technologiesin support of teaching and

learning while struggling withways to help faculty understandthe value and potential impact of thesetechnologies An overlooked but criti-cal starting point is for an institutionto define its educational objectives andstrategy Institutions whose educationalculture is intentionally and predomi-nantly residential ones that serve manypart-time working commuters thosewith strong global outreach techno-logical institutes and institutions withstrong practicum orientations may all

grant similar degrees but will have verydifferent pedagogical strategies andtherefore different educational tech-nology needs Without a larger guiding

vision the application of technology toteaching and learning is neither strate-gic nor optimized it is instead a series ofendpoint solutions driven by individualfaculty requests and by the best (oftenuncoordinated) efforts of service pro-

viders throughout the institution

ldquoWe must be willing to combine someof the best benefits that business has to

offer (eg flexible work arrangements)with the strong selling points of a careerin higher education (eg connection withthe mission)rdquo

mdashMichael Bourque Vice President Information Technology Services

Boston College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

It is important to view technology asa supporting tool similar to earlier toolssuch as blackboardchalk Technolo-gies need to be carefully scrutinized

for their pedagogical implications Alt ho ug h on li ne co ur se s of fer th eallure of convenience and the opening(and thus increasing) of enrollments tostudents who might not otherwise beable to attend college in a traditionalmanner their pedagogical effectivenessshould be assessed as carefully as that oftraditional classroom courses Doing so

might identify gaps in overall pedagogi-cal assessment at an institution and thusimprove even face-to-face learning Thereal value of technologies is how facultyintegrate the technologies into theirteaching and learning and how they usethe technologies to further refine theircourse delivery and student engage-ment (see Figure 4)

If institutional leaders become moreintentional about their pedagogicalobjectives and assessment methodsthey will have the opportunity to influ-

ence the institutional technology mar-ketplace Todayrsquos solutions could bemuch more effective with better guid-ance from the leadership at colleges anduniversities

For example faculty often findthemselves overwhelmed with the vol-ume of new technologies and the ongo-ing upgrades of existing technologiesas they struggle to find time to researchhow to integrate the technologies into

their teaching Faculty new to onlinelearning will commonly try to replicatetheir physical classroom online butthis is a classic McLuhanesque mistake6

Optimizing the use of technology inteaching and learning depends on theability of the institutional and academicleadership to help faculty develop theirdigital competency and then to con-tinue to provide learning opportunitiesto keep their competencies currentFaculty need ongoing digital literacyopportunities that enable them to betterunderstand not only educational tech-nologies but also the social technolo-

gies that are affecting their everydaylives and the everyday lives of their stu-dents Those students expect engage-ment in their instruction Faculty need

to understand instructional narrativeand the implications of media as part oftheir technological introduction This ismore than just training on a particulartechnology It is as the saying goes thedifference between giving a man a fishand teaching him how to fish

The effective optimization ofinstructional technology also requiresrethinking reinforcing and clarifyingroles and relationships among faculty

ldquoFaculty armed with current understandingand research on the power and value

of technologies are more likely to usetechnology to enhance their pedagogicalapproachesrdquo

mdashCeleste M Schwartz Vice President for Information Technology and College Services

Montgomery County Community College

FIGURE 4 Integrating Technology into Courses

ldquoI could be a more effective faculty member if I were better skilled at integrating this technology

into my coursesrdquo

Percentage of respondents

3D printers

Non-keyboard or non-mouse computer interfacesSocial media as a teaching and learning tool

E-portfolios

Lecture capturerecordings

E-books or e-textbooks

Simulations or educational games

LMS

Online collaboration tools

Free web-based content

Agree Strongly agree

50250 75 100

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014 (Louisville CO ECAR July 2014)

The

real value oftechnologies is howfaculty integrate

technologies intoteaching and learning

and how they usetechnologies to further

refine course delivery andstudent engagement

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1035

20 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

librarians teaching and learn-ing center professionals and ITprofessionals They all need to

view themselves as colleag ues

and even partners in designingthe right infusion of technologyresources at the right time duringthe instructional process

Is all this a tall order Yes Butit is directed toward the primarymission of higher education andis thus well worth addressing Ifcollege and university leaders donot optimize the use of technol-ogy in teaching and learningexisting and emerging alterna-tives will almost certainly step

forward to fill the gap

Advice983150 Work with academic leader-

ship to articulate the institu-tional strategy for the use oftechnology in teaching andlearning to best fit the institu-tional culture and priorities

983150 Translate that strategy into ateaching and learning tech-

nology roadmap that pri-oritizes the technologies thatwill best achieve the institu-tional strategy and fit institu-tional resources

983150 Define and clarify roles insupporting instructionaltechnology to bring togetherall relevant institutionalparties as productively aspossible

983150 Move to a technology sup-port model that aligns tech-

nology integration supportand faculty professionaldevelopment that is courseprogram specific and basedon research that demonstratesimproved student engage-ment and success

983150 Ensure that faculty have suf-ficient support and releasetime to integrate the tech-nologies into their courses

Issue 3Developing IT Funding

Models That SustainCore Service

Support Innovation andFacilitate Growth

As governmental financial sup-port for higher educationcontinues to decline bothpublic and private institutionsare desperately trying to focus

scarce resources on strategically impor-

tant needsTo create funding models that willsustain IT operations IT leaders need toclarify to institutional leaders and boardsof trustees why IT services are strategi-cally important to the enterprise Articu-lating and making some of the toughstrategic choices explicit is fundamentalto developing a sustainable fundingmodel As the role of information tech-nology in higher education matures andas institutions are increasingly pressedto balance costs with tangible benefits

IT leaders will need to strengthen andleverage their relationships with gover-nance groups connect execution withstrategy and exploit funding models tiedto institutional strategy (see Figure 5)

EDUCAUSE defines gov ern anc e asldquohow a higher education institution isorganized for the purposes of decisionmaking and resource allocation andhow the varying parts are managed ina way that promotes the mission of the

institutionrdquo7 The distributed nature ofhigher education institutions thoughhighly effective in supporting innova-tion and meeting specialized needs can

be a roadblock to strategic investmentsand efficiency realization InstitutionalIT governance can help achieve andsupport a clear IT strategy When IT gov-ernance programs have influence over ashared pot of institutional resources andare able to prioritize strategic IT invest-ments IT leaders can support ongoinginnovation and growth across the entireinstitutional portfolio of functions Inthe absence of institutional IT gover-nance IT projects will be prioritizedaccording to which areas can most easily

secure funding for their priorities Inevi-tably worthy and even critical projectswill not be funded if they are not spon-sored by well-resourced areas

Capital funding is relatively easy tosecure obtaining additional operationalfunding is much more difficult Sincemost capital projects have an opera-tional impact the differential access tofunding streams can create significantproblems for budget managers To sat-isfy demand and remain competitive

leaders at higher education institutionshave allocated capital funds to coverthe development cost of new IT infra-structure yet they seldom incorporateplans for ongoing operational funding ofcapital projects As a consequence thereis a fundamental misunderstanding ofthe total cost of information technologyand often no culturally accepted billingmodels exist for one-time and full-life-cycle costs

To help governance groups under-stand and support funding for the real

cost of information technology IT lead-ers need to develop total cost of owner-ship (TCO) scenarios and vet them withappropriate groups before projects arefunded Higher education informationtechnology is dogged by cost-savingsexpectations that usually create a falsesense of expenditure reduction In somecases the benefit of the IT investmentderives from risk reduction or new func-tionality and cost savings are not to be

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

expected In other cases cost savingsare theoretically possible but difficultto achieve if non-IT changes such asbusiness process redesign are requiredto realize them Even if the project is

successfully completed funding mayneed to shift to derive real institutionalsavings For example an IT project thatintroduces efficiencies to academicdepartments or business units mayreduce costs for the departments or units

and also for the institution overall butthe project may increase IT costs To real-ize net savings for the institution budgetfunding needs to be withdrawn from thedepartment and a portion needs to be

directed to the IT organization to coverits increased costs with the balanceaccruing to the bottom line of the insti-tution When each department controlsits own budget those shifts and realloca-tions are very difficult to negotiate and

often fall apart eroding any potentialcost savings

Growth can be managed but doingso requires service management models

that are able to project and prepare forgrowth Those models need to includecost management to ensure that serviceproviders understand and budget forboth fixed and variable costs The pay-ing IT customersmdashwhether institutionalleaders or individual departmentsmdashneedto understand IT service cost drivers andhow they can help manage those driv-ers Funding for growth in variable costsis relatively easy to justify if IT servicemanagers have and can show data onboth growth and the associated costs

Funding for growth in fixed costs needsto be justified as well and that requiresdata on the cost increases and a justifi-cation of the risks that will be reducedthe functionality that will be added orenhanced or some other compelling

FIGURE 5 IT Spending on Institutional Activities

Institutionalgrowth

Running theinstitution

Transformativechange

1576 9

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1235

22 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

reason This approach also paves the way for discussions of tradeoffs that mightaccommodate growth without increasing funding such as service-level reduc-tions shared services or outsourcing

Supporting innovation is a key piece of IT resource justification Studentsexist in a digital ecosystem and expect educational institutions to interact withthem in the ways that they are used to interacting with each other and with thecommercial entities they deal with on a daily basis Banks retail stores andeven government services are available to them through a multiplying swarmof devices Institutional leaders are increasingly aware that higher educationneeds to deliver services in the same way and that the development of an ITarchitecture to do so takes resources To better afford the resources necessaryto keep institutions current the IT organization itself needs to be innovativein the way it is organized the way it delivers IT services and the way it workswith various institutional constituencies Recognizing that IT drivers andcore services in 2014 may not even remotely resemble those necessary in 2020

demands funding flexibility since too tight a correlation will act as a disincen-tive to improvement and will create technology lags greater than those of thelast decade

Different but rigorous strategies for IT core services growth and innovationwill help in the development of IT funding models that best fit these separateactivities and are aligned with the institution and its constituents Effective ITgovernance can tie these three activities together and prioritize the IT expensein ways that support existing operations ensure ongoing innovation andrespond to growth across the entire IT portfolio

Advice983150 Benchmark IT finances by participating in the EDUCAUSE Core Data

Service983150 Ensure that IT projects build models for ongoing operational funding into

project deliverables and expectations983150 Establish an institutional IT governance structure that is responsible for allo-

cating funding not just identifying IT priorities983150 Understand the costs and cost drivers of todayrsquos IT services983150 Help leadership understand both the costs and the benefits of information

technology Arguments for new IT initiatives should always include cost esti-mates as well as estimates of the costs of not innovating

983150 Build the costs of growth and maintenance into funding models for core ITservices

Issue 4Improving Student

Outcomes through anInstitutional Approach

That StrategicallyLeverages Technology

The benefits of completing acollege education are widelyknown They include higherlifetime earnings greater levelsof happiness increased civic

engagement and reduced health risks

There are also societal benefits as theproportion of college graduates in thepopulation increases So it is in our ownbest interests to help both individualsand society by improving the successof students at our higher educationinstitutions

There are few cases in which tech-nology by itself has helped studentssucceed However there are opportuni-ties for technology to support studentsuccess initiatives The first task for anyinstitution is to assess both the insti-

tutional needs and the most currentremedies for the pain points that areidentified Although this is a constantlyand rapidly evolving area some specificexamples include the following

983150 Developin g a training course (orworkshop) to help students under-stand the technology landscape ofthe institution and how they can usethose tools to succeed

ldquoWhen it comes to innovation is the ITfunding principle lsquoWe optimize new IT

investments for the entire institutionrsquo orlsquoWe optimize new IT investments for theindividual unitsdepartmentsrsquo or bothPricing models will emerge accordinglyrdquo

mdashKarin Moyano CamihortDean of Online Learning and Academic Initiatives

Holyoke Community College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Removing barriersmdashs uch as accessusability and lack of supportmdashto theeffective use of technology

983150 Using technology to recast large lec-

ture courses and support pedagogi-cal transformations

983150 Using technology to provide flex-ibility for students to match thecourse with their learning style

983150 Using technology to distributelearning content in multiple waysincluding lectures (live and archivedfor review) electronic texts andlearning management systems

983150 Using technology such as peertutoring discussion boards andg roup videoconferences (eg

Google hangouts) to facilitate syn-chronous and asynchronous inter-actions with others and to promotecollaborative learning

983150 Considering the emerging role oftools used traditionally by business(ie CRM) to manage the institu-tionrsquos relationship with the student

983150 Applying elements of what is beinglearned in competency-based edu-cation initiatives at an institutionallevel for traditional students

Institutional leaders continueto emphasize and pour resourcesinto improving student retentionand completion Technology can beapplied to develop the broad area oflearning analytics to provide feedbackto students on their behavior (both pastand predictive) to faculty on the effec-tiveness of the pedagogy employed inthe course to content providers (andfaculty who select the content) on theeffectiveness of the content used in the

course and to administrators on broadsystemic issues and trendsMany colleges and universities

have student success committees thatfocus on initiatives to improve coursecompletion program completion andstudent support services Examplesof initiatives can be found in the areasof teaching and learning and studentsupport services In the area of reme-dial education great strides have been

made in reducing time to completionfor remedial students and in increas-ing retention and completion rates Anexample of the work occurring in the

area of student success can be found onthe Achieving the Dream InterventionsShowcase website (httpachievingthedreamorgresourcesachieving-the-dream-interventions-showcase) withmany of those interventions strategi-cally leveraging technology

As data analytics tools have becomemore sophisticated institutionshave been better able to recognizestudentsrsquo challenges and track stu-dentsrsquo journeys With theimplementation of early

alert systems advisors andfaculty have been able toassist students with just-in-time intervention recom-mendations In addition itis becoming commonplacefor advisors to have access todata beyond the traditionalERP demographic and stu-dent gradesmdashdata such ascourse performance throughlearning management sys-

tems early alert informationtutoring participation andeducation planning informa-tion (see Figure 6) Systemslike these sometimes referred to asIntegrated Planning and AdvisingServices (IPAS)8 permit the advisor tosupport and coach students based ona comprehensive view of the studentsrsquoinformation throughout their educa-

tional journey In the area of onlineeducation too wraparound studentsupport services are mirroring the on-ground experience with some colleges

and universities implementing careercoaches with supporting technologiesto provide services to online studentsThe integration of technologies in eachof these areas has had a positive impacton improving student outcomes

A variety of existing tools many stillin the early development stages canhelp institutions gather data to identifystudentsrsquo success opportunities andtheir achievements This information

is only as good as the data however Tofind the low-hanging fruit IT leadersneed to begin the data conversationsto locate tools that may already begenerating useful data To capture rele-

vant aspects of the student experience

FIGURE 6 Technology for Supporting Education Planning Advising and Counseling and Early Alerts

Source EDUCAUSE Core Data Service 2013

46

66

73

Early alert systems

Education planningacademicprogress tracking

Academic advising

Percentage of institutions

Tocapture relevant aspects

of the student experienceleaders must think institutionally

and identify technologyresources that canbring together the

diverse and enormousdata sets that represent this

experience

(continued on page 26)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1435

To create sustainable IT funding models IT leaders need to

clarify to institutional leaders and boards of trustees why

IT services are strategically important to the enterprise

TOP 10 IT ISSUES

EVOLVING STAFFING MODELS

IMPROVING

STUDENT

OUTCOMES

OPTIMIZING TECHNOLOGY IN

TEACHING AND LEARNING

FUNDING IT STRATEGICALLY

soft skills

moreresources

professional development

clear goals networking

65

Technical proficiency is as important as ever

So skills are more important that ever before

higher education IT staff are not

satisfied with their current position

To be more effective IT

staff say they need

of students wish their

instructors would use

early-alert systems more

of central ITrsquos budgetis spent running the institution

is spent on growth

is spent on transformation

Students respond

positively to learning

analytics opportunities

not at allimportant

technical proficiencystrategic planning

effective communication

1

veryimportant

5

Top 3 motivators for faculty integration of technology

in the classroom

bull Clear indicationevidence that students will benefit

bull Release time to designredesign courses

bull Confidence that the technology will work as planned

1 in 4

Todayrsquos market for IT talent is competitive Hiring andretaining top talent requires engaged managers whopossess and know how to foster good communication skills

Faculty and students alike are

interested in learning analytics for

notifications on course progress

Although technology is omnipresent in the lives ofstudents leveraging technology to engage students in

meaningful ways and to enhance learning is still evolving

76

15

9

I think this is great

This sounds positive

I am neutral

This sounds negative

Irsquom totallyagainst this

Spending model

breakdown in the USdoes not differsignificantly by

Institution type

Size

Central IT staff size

CIO reporting line

25

0

50

75

100

E D U C

A U S E E

R E S

E A R C

H S N

A P S H

O T

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1535

A look into EDUCAUSE research on the 2015 list of the

most intriguing ideas in higher education IT

DEMONSTRATING

VALUE OF IT

DEVELOPING

SECURITY

POLICIES FOR

THE INSTITUTION

DEVELOPING ENTERPRISE IT

ARCHITECTURE

BALANCING INFORMATION

SECURITY AND OPENNESS

INCREASING CAPACITY

FOR CHANGE

PROVIDING USER SUPPORT

The gaps between effectiveness in and

importance of addressing risks are large

Percentage using the college or university help desk for support

Percentage looking to peers

Student Device Ownership

Between 2005 and 2014 there were 727 education-sector

data breachesmdashinvolving more than 14 million recordsmdashas

reported to the Privacy Rights Clearinghouse

locally integrate the

architectures of multiple

major systems

follow the architecture of a

primary system or suite

20142013

25

0

50

75

100

2015 projection

Smartphones

Tablets

86

47

31

76

58

90

Information security

Data privacyconfidentiality

Identityaccess management

66

66

84

82

79

70

36

1

33

29

The most important IT risks to

address concern security privacy

and access

In a world of increasing

complex security threats

institutions must move from

a reactive to a proactive security response

We are living in an era when readily

accessible technologies facilitate a

BYOD standard requiring institutions

to rethink user support

A well-defined enterprise IT architecture is instrumental to

optimizing opportunities and managing change effectively

The higher education community is

struggling with the pace variety and sheer volume

of change in information technology as well as the

corresponding risks

IT leaders need to draw the lines from

technology initiatives to their institutionsrsquo

changing strategic objectives and on to the

ultimate bottom lines of mission and means

OtherLossthestInternal threatsExternal threats

81of institutions

do notaddress IT risk

in their strategicplan

7357

69

22

Faculty

Students

effectiveness

importance

effectiveness

importance

effectiveness

importance

6 3 10 10

Breachcauses

53Administration

37Teaching

and learning

10Researchother

Percentage of IT spend by institutional mission

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1635

26 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

leaders must think institutionally and identify technology resources that

can bring together the diverse and enormous data sets that represent thisexperience

As was discussed last year when this was the 1 issue in the 2014 Top 10list looking at this data may raise privacy issues so leaders must rememberto include the appropriate individuals in these discussions to ensure compli-ance security and privacy

Advice983150 Keep in mind that students consider success from a holistic view of their

campus experience not necessarily their experience with just a courseor a semester To maximize the impact of technology identify the combi-

nation of data and tools that will encompass as much of the institutionalexperience as possible983150 Remember that results will be only as good as the data Take time in the

beginning to build a reliable strategic foundation by starting with conciseoutcome objectives and then develop t he data-driven questions that willultimately define actionable steps to influence success

983150 Work with key individuals from various institutional areas to identifydata that may be available at an individual student level and that could becombined with other values to establish an assessment point for the stu-dent Next consider comparing this assessment point with the studentrsquossuccess level and attempt to identify some trends Drill down to indica-tors that can be used as targets for predicting success and for identifyingearly warning signs

983150 Ensure that the project is embedded in a cross-institutional student suc-cess effort that includes all relevant parties Dedicated student successteams or cross-departmental governance structures can be the vehiclefor organizing consensus Donrsquot allow a perception of IT ownership todevelop

983150 Resolve problems in academic and business processes before implemen-tation donlsquot adapt applications to dysfunctional processes

983150 Define the role of faculty in improving student outcomes through thestrategic leveraging of technology

983150 Determine how much individualized student data should be shared withadvisors in supporting improved student outcomes

Issue 5Demonstrating the

Business Value ofInformation Technologyand How Technology

and the IT OrganizationCan Help the Institution

Achieve Its Goals

IT leaders need to continue to get bet-ter at drawing the lines from technol-ogy initiatives to their institutionsrsquochanging strategic objectives and on

to the ultimate bottom lines of mis-sion and means Successfully demon-strating the business value of informationtechnology to the institution begins withdeveloping a clear understanding of the

various ways in which technology as awhole and the IT department as a unitadd value to the institution Institutionalleadersrsquo struggle to respond to changingpublic perceptions of the value of highereducation itself is a complicating factorHerein lies an opportunity for IT profes-sionals not only to demonstrate the value

of the IT organizationrsquos particular offer-ings but also to create new and significant value for the institution This requiresthinking of technology strategy as both aconsequence and a driver of institutionalstrategy IT leaders who have the abilityto see the entire institutional landscapeand can offer strategic insights for movingthe institution forward have never beenmore important to the well-being of col-leges and universities

ldquoInstead of reacting to new technologiestop institutions seek out new technologies

as a strategic imperative leveraging theseinnovations to improve learning insideand outside the classroom with datadecision making enhanced pedagogy andbetter student outcomesrdquo

mdashLisa M Davis Vice President for Information Services and Chief Information Officer

Georgetown University

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

So in what ways do IT leaders add value They add value to the organizationby enhancing the core productmdashnamelythe learning experiences of students and

the teaching activities of faculty They add value very directly by creating new chan-nels through which students can accessinstitutional offerings The channels thatonline opportunities provide would notexist without the technologies deliveredand supported by the IT organizationFrom a business perspective this cre-ates new sources of revenue a criticalobjective for virtually all colleges anduniversities Drawing a clear line that con-nects specific technology initiatives withtangible revenue for the institution is a

powerful way to demonstrate the busi-ness value of technologymdashand of the ITorganization

And of course the yin of revenue isbalanced by the yang of cost reductionStories of expense reduction and effi-ciency are perhaps easier to identify andtell and they should be carefully and dili-gently told but IT leaders must be carefulto also emphasize the much larger poten-tial that a clear focus on the revenue sidecan provide Doing so can help to avoid

the impression that the value of informa-tion technology is limited to simple actsof automation and efficiency Part of thiswork entails ensuring that the institu-tional leadership understands what is andis not possible Many times the need tohave the value discussion in the first placeis because leaders are not inherently feel-ing the value Those in the IT organiza-tion must take the time to develop andprovide clear data-based informationabout the services they deliver and valuethey provide

One way to demonstrate value iswith well-constructed service portfoliosand service catalogs A service portfolioprovides a high-level overview of howfunds are spent on major institutionalstrategic and operational goals and isgeared toward institutional leaders Aservice catalog (see Figure 7) provides amore detailed view into how IT dollarsare spent on IT projects products andservices and is geared toward IT leaders

Combined the service portfolio and theservice catalog can be a useful tool forshowing the business value of the invest-ments that institutions make in informa-tion technology

Assembling a service portfolio andcatalog may be the IT organizationrsquos firstcomprehensive view into the actual valueit is bringing to the institution Depend-ing on that value IT leaders may first needto focus on quick fixes to better align theirservices with the institutional mission

Before IT leaders can advocate howinformation technology can be leveragedto drive the business the IT organiza-tion must be operationally effective andefficient Institutional and business unitleaders must view the IT organizationas providing operational excellence andoutstanding customer service before theywill consider it as a partner in deliveringbusiness value

The CIO and IT leadership teamsshould remember that they are the pri-mary marketing avenue for sharing the

value that information technology bringsto the institutional mission IT leadersspend about 10 percent of their time ongovernance and planning and on innova-tion with business and academic units9 IT leaders thus must be intentional aboutidentifying opportunities for communi-cating how the IT organization is help-ing the institution CIOs must establish

strong and trusting relationships withtheir peer business leadersSharing the value of information

technology begins with IT leadership butmust extend to the entire IT organization

All IT staff must understand how theirwork contributes to the institutional mis-sions and priorities They need to under-stand the IT organizationrsquos capabilitiesand priorities and how the organizationcan advance the institution the indi-

vidual business units and the faculty stu-dents and staff with whom they work IT

leaders can encourage and enable IT staffto learn the mission business processesand requirements of business units inorder to understand how informationtechnology can best be leveraged Get-ting to this point may require a culturechange within the IT organization At the

very least all IT staff should know boththe institutional and the IT priorities toensure that everyone is telling the samestory

FIGURE 7 Percentage of Institutions with a Service Catalog

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

32

17

29

40

56

62

Source EDUCAUSE Core Data Service 2013

IT leaders add value

to the organization byenhancing the core

productmdashnamely thelearning experiences of

students and the teachingactivities of faculty

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1835

28 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Advice983150 Map IT priorities to institutional priorities Find the points of intersection

with the business unit operations customers and technology Partnerwith the business unit to develop a roadmap and to align the business withthe IT architecture

983150 Donrsquot wait for an invitation to discuss business and customer impact Butdonrsquot try to boil the ocean keep focused and be clear about what the IT

organization can and cannot do IT leaders must be translators usingterminology that resonates with non-IT experts and connecting the dotsbetween the technology capabilities and the business needs Develop asmall set of short and simple stories about concrete ways in which tech-nology has improved the learning experience at the institution createdaccess to institutional resources strengthened affinity for the institutiongenerated revenue and streamlined operations Focus at least as much onhelping others see what is possible with technology as on showing howtechnology investments improve current institutional life

983150 Develop a service catalog to serve as a base for connecting the work of theIT organization to the larger institutional strategic objectives

983150 Implement a metrics program that can demonstrate the extent to which theIT organization is achieving its service-level goals customer-satisfaction

goals and financial goals and is delivering on strategic priorities983150 Ensure that IT leaders and IT staff understand what drives academic and

business value for the institution and can identify and articulate how tech-nology can deliver that value Consider attending non-technology confer-ences to learn how business officers faculty and academic leaders thinkabout technology and what their pressing problems are Be the translatorfor business strategy

983150 To reach the broader institutional community consider newslettersbrown-bag gatherings and roundtable discussions and take advantageof recurring events such as National Cyber Security Awareness Month(httpwwweducauseeduncsam) and start-of-the-semester gatherings

Issue 6Increasing the IT

Organizationrsquos Capacityfor Managing Change

Despite DifferingCommunity Needs

Priorities and Abilities

Change is the watchword todayand going forward In the 2011book Race against the Machine MIT economists Erik Bryn-jolfsson and Andrew McAfee

write ldquoAdvances like the Googleautonomous car Watson the Jeop-ardy champion supercomputer andhigh-quality instantaneous machinetranslation then can be seen as thefirst examples of the kinds of digitalinnovations wersquoll see as we move into the phase where exponentialgrowth yields jaw-dropping resultsrdquo10

When technology changes organiza-tions are always challenged to adapt tonew circumstances This is par ticularlytrue of the organizations tasked with

implementing and maintaining thetechnology itselfThe higher education community

is struggling not only with the pace ofchange in information technology butalso with the variety and sheer volumeof change Information technology isincreasingly important to and increas-ingly integrated with all aspects ofboth the strategic and the operationalfunctions of the campus The chal-

ldquoWe also add value by creating newways for those who know us less well to

develop affinity with our institutions Asmall MOOC my college offered made usknown to groups of prospective studentswho would never have paid a momentrsquosattention to any traditional advertisingmessages we might have sent By joiningtheir party first via our technologies weput ourselves in a much better position to

invite them to our partyrdquomdashJames Kulich

Vice President and Chief Information OfficerElmhurst College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

lenge is how to engage multiple areasof the institution and expand servicesin numerous simultaneous initiativesMeanwhile institutional informa-

tion technology is reengineering itsinfrastructure platforms and servicesThose change efforts are often additiveto the applications being introduced aspart of new business-area initiatives

Ideally the institutional stancetoward change is proactive and ITleaders have the vision and good senseto advocate to broker and to preparetheir various constituents for upcom-ing changes while sustaining ongo-ing operations In reality end users

vary widely in their predisposition to

technology As a group students andfaculty are positively disposed towardinformation technology but as indi-

viduals they run the gamut (see Figure8) And attitudes influence behaviorthe way faculty and students adopt and

FIGURE 8 Relationship between Faculty Attitudes toward Online Learningand Their Experience with Online Teaching

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014(Louisville CO ECAR July 2014)

Percentage of respondents who agree or strongly agree

No recent onlineteaching

Some recentonline teaching

50250 75 100

All respondents

Online learning helps students learn more effectively

Online learning will lead to pedagogical breakthroughs

Online learning will make higher education available to more students

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2035

30 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

use technology tends to reflect theirattitudes11

The IT organizationrsquos history of exe-cution can influence community open-ness toward future technology changesThe shadow cast by a deeply flawed ERPimplementation for example can last adecade or longer

Change management is preciselythat managing change rather than lettingchange happen on its own (see Figure 9)

Successful change management is notaccidental or organic It is intentionaland has multiple components Manyinstitutions adopt a specific approachto implementing changemdashapproachessuch as ADKAR Kurt Lewinrsquos changemanagement model and John Kot-terrsquos eight steps12 Regardless of the

model managing change requires astrategy in which the goals and focusof the change are clear to internal andexternal constituents For examplethe corporate consultant Glenn Llopisadvises being able to identify what thesuccessful implementation of a changestrategy would look like knowing whatthe change strategy is trying to solveand identifying the required resourcesand relationships to implement the

change management strategy

13

As theIT organization sifts through the differ-ent needs abilities and priorities of theinstitution and tries to adapt to changeit must avoid being caught in a viciouscircle of tactics with no purpose

A good change management strat-egy has multiple components which

include communications and inclu-siveness John Jones DeAnne Agu-irre and Matthew Calderone provideten sensible principles for managing

change by keeping the human elementat the center14 Involving every level ofan organization creating ownershipassessing the cultural landscape andcommunicating effectively are keyfactors Change always affects some-body somewheremdashboth internally andexternally IT organizations must doeverything possible to find engagedpeople who can advocate on behalf ofthe change strategy It helps to havechampions at all levels executiveswho can demonstrate the institutional

leadersrsquo commitment area leaders whocan reinforce commitment with theirworkforce and explain how the change

will benefit their part of the institu-tion and individual influencers whocan help determine success factorsidentify and address pain points andevangelize with their colleagues

But change management involves

more than communications and inclu-siveness A successful change is a fullydesigned change Too often institu-tional leaders conflate new initiativeswith new systems and fail to fully thinkthrough and execute on the business-end components The successfulintroduction of a new system mightrequire new or reengineered businessprocesses new roles and even differ-ent organizational structures Every

ldquoTechnology is now integrated into just about

every aspect of our colleges and universitiesThat allows us a myriad of opportunitiesto use technology to help students succeedacademically Using technology to helpstudents succeed is at the core of what we dordquo

mdashSteve FleagleChief Information Officer and Associate Vice President

The University of Iowa

FIGURE 9 Percentage of Institutions That Have Implemented the ITIL ChangeManagement Process

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

23

13

25

30

44

44

Source EDUCAUSE Core Data Service 2013

Involvingevery level of an

organization creatingownership assessing thecultural landscape and

communicating effectivelyare key factors Changealways affects somebody

somewhere

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 8: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 835

18 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

pedagogical and research methods and higher education business models

Not all staff will be able to recognize or adapt to these changes Managersneed to help staff recognize and prepare for new oppor tunities to minimizethe disruption Change affects not only the individuals who are disruptedbut also those staff who are bystanders witnessing the change and anticipat-ing the worst

Fortunately IT management is not without support That support b eginsby building a partnership with the Human Resources department (HR) Asuccess for the IT organization is a success for HR

Advice983150 Know how to sell the value of a career that contributes to the advance-

ment of higher education and its teaching learning and researchmissions983150 Develop a list of the nonmonetary benefits of working for the institution

and share that list with staff983150 Hire staff not just for their fit for the job but also for their emotional

intelligence and fit with the values and culture of the IT organization andthe institution At the same time remember that the strongest teams arethose that are most diverse so strive for a heterogeneous workforce thatshares a common set of core values

983150 Work with staff to select appropriate training Funding and facilitatingtime for training and travel is only part of the process Establish somedeliverables and accountability for the training so that employees returnto the office with the anticipated insights and skill set

983150 Work with HR to develop career paths for the major divisions of or rolesin central and distributed IT units Careers paths donrsquot have to stay withinthe IT organization consider lateral paths that can broaden someonersquosinstitutional or business experience Develop paths that reward knowl-edge work as well as managerial talent and understand that not everystaff member need aspire to leadership

983150 Create a talent plan for the IT organization itself Identify the skill setsand roles the organization will need to acquire and retire in the next oneto three years Create a roadmap to where the organization needs to headand begin working with HR now to implement the roadmap with as littledisruption as possible for individual staff and o perations

Issue 2Optimizing the Use

of Technology inTeaching and Learningin Collaboration with

Academic LeadershipIncluding Understandingthe Appropriate Level of

Technology to Use

C

olleges and universities con-tinue to invest in technologiesin support of teaching and

learning while struggling withways to help faculty understandthe value and potential impact of thesetechnologies An overlooked but criti-cal starting point is for an institutionto define its educational objectives andstrategy Institutions whose educationalculture is intentionally and predomi-nantly residential ones that serve manypart-time working commuters thosewith strong global outreach techno-logical institutes and institutions withstrong practicum orientations may all

grant similar degrees but will have verydifferent pedagogical strategies andtherefore different educational tech-nology needs Without a larger guiding

vision the application of technology toteaching and learning is neither strate-gic nor optimized it is instead a series ofendpoint solutions driven by individualfaculty requests and by the best (oftenuncoordinated) efforts of service pro-

viders throughout the institution

ldquoWe must be willing to combine someof the best benefits that business has to

offer (eg flexible work arrangements)with the strong selling points of a careerin higher education (eg connection withthe mission)rdquo

mdashMichael Bourque Vice President Information Technology Services

Boston College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

It is important to view technology asa supporting tool similar to earlier toolssuch as blackboardchalk Technolo-gies need to be carefully scrutinized

for their pedagogical implications Alt ho ug h on li ne co ur se s of fer th eallure of convenience and the opening(and thus increasing) of enrollments tostudents who might not otherwise beable to attend college in a traditionalmanner their pedagogical effectivenessshould be assessed as carefully as that oftraditional classroom courses Doing so

might identify gaps in overall pedagogi-cal assessment at an institution and thusimprove even face-to-face learning Thereal value of technologies is how facultyintegrate the technologies into theirteaching and learning and how they usethe technologies to further refine theircourse delivery and student engage-ment (see Figure 4)

If institutional leaders become moreintentional about their pedagogicalobjectives and assessment methodsthey will have the opportunity to influ-

ence the institutional technology mar-ketplace Todayrsquos solutions could bemuch more effective with better guid-ance from the leadership at colleges anduniversities

For example faculty often findthemselves overwhelmed with the vol-ume of new technologies and the ongo-ing upgrades of existing technologiesas they struggle to find time to researchhow to integrate the technologies into

their teaching Faculty new to onlinelearning will commonly try to replicatetheir physical classroom online butthis is a classic McLuhanesque mistake6

Optimizing the use of technology inteaching and learning depends on theability of the institutional and academicleadership to help faculty develop theirdigital competency and then to con-tinue to provide learning opportunitiesto keep their competencies currentFaculty need ongoing digital literacyopportunities that enable them to betterunderstand not only educational tech-nologies but also the social technolo-

gies that are affecting their everydaylives and the everyday lives of their stu-dents Those students expect engage-ment in their instruction Faculty need

to understand instructional narrativeand the implications of media as part oftheir technological introduction This ismore than just training on a particulartechnology It is as the saying goes thedifference between giving a man a fishand teaching him how to fish

The effective optimization ofinstructional technology also requiresrethinking reinforcing and clarifyingroles and relationships among faculty

ldquoFaculty armed with current understandingand research on the power and value

of technologies are more likely to usetechnology to enhance their pedagogicalapproachesrdquo

mdashCeleste M Schwartz Vice President for Information Technology and College Services

Montgomery County Community College

FIGURE 4 Integrating Technology into Courses

ldquoI could be a more effective faculty member if I were better skilled at integrating this technology

into my coursesrdquo

Percentage of respondents

3D printers

Non-keyboard or non-mouse computer interfacesSocial media as a teaching and learning tool

E-portfolios

Lecture capturerecordings

E-books or e-textbooks

Simulations or educational games

LMS

Online collaboration tools

Free web-based content

Agree Strongly agree

50250 75 100

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014 (Louisville CO ECAR July 2014)

The

real value oftechnologies is howfaculty integrate

technologies intoteaching and learning

and how they usetechnologies to further

refine course delivery andstudent engagement

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1035

20 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

librarians teaching and learn-ing center professionals and ITprofessionals They all need to

view themselves as colleag ues

and even partners in designingthe right infusion of technologyresources at the right time duringthe instructional process

Is all this a tall order Yes Butit is directed toward the primarymission of higher education andis thus well worth addressing Ifcollege and university leaders donot optimize the use of technol-ogy in teaching and learningexisting and emerging alterna-tives will almost certainly step

forward to fill the gap

Advice983150 Work with academic leader-

ship to articulate the institu-tional strategy for the use oftechnology in teaching andlearning to best fit the institu-tional culture and priorities

983150 Translate that strategy into ateaching and learning tech-

nology roadmap that pri-oritizes the technologies thatwill best achieve the institu-tional strategy and fit institu-tional resources

983150 Define and clarify roles insupporting instructionaltechnology to bring togetherall relevant institutionalparties as productively aspossible

983150 Move to a technology sup-port model that aligns tech-

nology integration supportand faculty professionaldevelopment that is courseprogram specific and basedon research that demonstratesimproved student engage-ment and success

983150 Ensure that faculty have suf-ficient support and releasetime to integrate the tech-nologies into their courses

Issue 3Developing IT Funding

Models That SustainCore Service

Support Innovation andFacilitate Growth

As governmental financial sup-port for higher educationcontinues to decline bothpublic and private institutionsare desperately trying to focus

scarce resources on strategically impor-

tant needsTo create funding models that willsustain IT operations IT leaders need toclarify to institutional leaders and boardsof trustees why IT services are strategi-cally important to the enterprise Articu-lating and making some of the toughstrategic choices explicit is fundamentalto developing a sustainable fundingmodel As the role of information tech-nology in higher education matures andas institutions are increasingly pressedto balance costs with tangible benefits

IT leaders will need to strengthen andleverage their relationships with gover-nance groups connect execution withstrategy and exploit funding models tiedto institutional strategy (see Figure 5)

EDUCAUSE defines gov ern anc e asldquohow a higher education institution isorganized for the purposes of decisionmaking and resource allocation andhow the varying parts are managed ina way that promotes the mission of the

institutionrdquo7 The distributed nature ofhigher education institutions thoughhighly effective in supporting innova-tion and meeting specialized needs can

be a roadblock to strategic investmentsand efficiency realization InstitutionalIT governance can help achieve andsupport a clear IT strategy When IT gov-ernance programs have influence over ashared pot of institutional resources andare able to prioritize strategic IT invest-ments IT leaders can support ongoinginnovation and growth across the entireinstitutional portfolio of functions Inthe absence of institutional IT gover-nance IT projects will be prioritizedaccording to which areas can most easily

secure funding for their priorities Inevi-tably worthy and even critical projectswill not be funded if they are not spon-sored by well-resourced areas

Capital funding is relatively easy tosecure obtaining additional operationalfunding is much more difficult Sincemost capital projects have an opera-tional impact the differential access tofunding streams can create significantproblems for budget managers To sat-isfy demand and remain competitive

leaders at higher education institutionshave allocated capital funds to coverthe development cost of new IT infra-structure yet they seldom incorporateplans for ongoing operational funding ofcapital projects As a consequence thereis a fundamental misunderstanding ofthe total cost of information technologyand often no culturally accepted billingmodels exist for one-time and full-life-cycle costs

To help governance groups under-stand and support funding for the real

cost of information technology IT lead-ers need to develop total cost of owner-ship (TCO) scenarios and vet them withappropriate groups before projects arefunded Higher education informationtechnology is dogged by cost-savingsexpectations that usually create a falsesense of expenditure reduction In somecases the benefit of the IT investmentderives from risk reduction or new func-tionality and cost savings are not to be

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

expected In other cases cost savingsare theoretically possible but difficultto achieve if non-IT changes such asbusiness process redesign are requiredto realize them Even if the project is

successfully completed funding mayneed to shift to derive real institutionalsavings For example an IT project thatintroduces efficiencies to academicdepartments or business units mayreduce costs for the departments or units

and also for the institution overall butthe project may increase IT costs To real-ize net savings for the institution budgetfunding needs to be withdrawn from thedepartment and a portion needs to be

directed to the IT organization to coverits increased costs with the balanceaccruing to the bottom line of the insti-tution When each department controlsits own budget those shifts and realloca-tions are very difficult to negotiate and

often fall apart eroding any potentialcost savings

Growth can be managed but doingso requires service management models

that are able to project and prepare forgrowth Those models need to includecost management to ensure that serviceproviders understand and budget forboth fixed and variable costs The pay-ing IT customersmdashwhether institutionalleaders or individual departmentsmdashneedto understand IT service cost drivers andhow they can help manage those driv-ers Funding for growth in variable costsis relatively easy to justify if IT servicemanagers have and can show data onboth growth and the associated costs

Funding for growth in fixed costs needsto be justified as well and that requiresdata on the cost increases and a justifi-cation of the risks that will be reducedthe functionality that will be added orenhanced or some other compelling

FIGURE 5 IT Spending on Institutional Activities

Institutionalgrowth

Running theinstitution

Transformativechange

1576 9

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1235

22 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

reason This approach also paves the way for discussions of tradeoffs that mightaccommodate growth without increasing funding such as service-level reduc-tions shared services or outsourcing

Supporting innovation is a key piece of IT resource justification Studentsexist in a digital ecosystem and expect educational institutions to interact withthem in the ways that they are used to interacting with each other and with thecommercial entities they deal with on a daily basis Banks retail stores andeven government services are available to them through a multiplying swarmof devices Institutional leaders are increasingly aware that higher educationneeds to deliver services in the same way and that the development of an ITarchitecture to do so takes resources To better afford the resources necessaryto keep institutions current the IT organization itself needs to be innovativein the way it is organized the way it delivers IT services and the way it workswith various institutional constituencies Recognizing that IT drivers andcore services in 2014 may not even remotely resemble those necessary in 2020

demands funding flexibility since too tight a correlation will act as a disincen-tive to improvement and will create technology lags greater than those of thelast decade

Different but rigorous strategies for IT core services growth and innovationwill help in the development of IT funding models that best fit these separateactivities and are aligned with the institution and its constituents Effective ITgovernance can tie these three activities together and prioritize the IT expensein ways that support existing operations ensure ongoing innovation andrespond to growth across the entire IT portfolio

Advice983150 Benchmark IT finances by participating in the EDUCAUSE Core Data

Service983150 Ensure that IT projects build models for ongoing operational funding into

project deliverables and expectations983150 Establish an institutional IT governance structure that is responsible for allo-

cating funding not just identifying IT priorities983150 Understand the costs and cost drivers of todayrsquos IT services983150 Help leadership understand both the costs and the benefits of information

technology Arguments for new IT initiatives should always include cost esti-mates as well as estimates of the costs of not innovating

983150 Build the costs of growth and maintenance into funding models for core ITservices

Issue 4Improving Student

Outcomes through anInstitutional Approach

That StrategicallyLeverages Technology

The benefits of completing acollege education are widelyknown They include higherlifetime earnings greater levelsof happiness increased civic

engagement and reduced health risks

There are also societal benefits as theproportion of college graduates in thepopulation increases So it is in our ownbest interests to help both individualsand society by improving the successof students at our higher educationinstitutions

There are few cases in which tech-nology by itself has helped studentssucceed However there are opportuni-ties for technology to support studentsuccess initiatives The first task for anyinstitution is to assess both the insti-

tutional needs and the most currentremedies for the pain points that areidentified Although this is a constantlyand rapidly evolving area some specificexamples include the following

983150 Developin g a training course (orworkshop) to help students under-stand the technology landscape ofthe institution and how they can usethose tools to succeed

ldquoWhen it comes to innovation is the ITfunding principle lsquoWe optimize new IT

investments for the entire institutionrsquo orlsquoWe optimize new IT investments for theindividual unitsdepartmentsrsquo or bothPricing models will emerge accordinglyrdquo

mdashKarin Moyano CamihortDean of Online Learning and Academic Initiatives

Holyoke Community College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Removing barriersmdashs uch as accessusability and lack of supportmdashto theeffective use of technology

983150 Using technology to recast large lec-

ture courses and support pedagogi-cal transformations

983150 Using technology to provide flex-ibility for students to match thecourse with their learning style

983150 Using technology to distributelearning content in multiple waysincluding lectures (live and archivedfor review) electronic texts andlearning management systems

983150 Using technology such as peertutoring discussion boards andg roup videoconferences (eg

Google hangouts) to facilitate syn-chronous and asynchronous inter-actions with others and to promotecollaborative learning

983150 Considering the emerging role oftools used traditionally by business(ie CRM) to manage the institu-tionrsquos relationship with the student

983150 Applying elements of what is beinglearned in competency-based edu-cation initiatives at an institutionallevel for traditional students

Institutional leaders continueto emphasize and pour resourcesinto improving student retentionand completion Technology can beapplied to develop the broad area oflearning analytics to provide feedbackto students on their behavior (both pastand predictive) to faculty on the effec-tiveness of the pedagogy employed inthe course to content providers (andfaculty who select the content) on theeffectiveness of the content used in the

course and to administrators on broadsystemic issues and trendsMany colleges and universities

have student success committees thatfocus on initiatives to improve coursecompletion program completion andstudent support services Examplesof initiatives can be found in the areasof teaching and learning and studentsupport services In the area of reme-dial education great strides have been

made in reducing time to completionfor remedial students and in increas-ing retention and completion rates Anexample of the work occurring in the

area of student success can be found onthe Achieving the Dream InterventionsShowcase website (httpachievingthedreamorgresourcesachieving-the-dream-interventions-showcase) withmany of those interventions strategi-cally leveraging technology

As data analytics tools have becomemore sophisticated institutionshave been better able to recognizestudentsrsquo challenges and track stu-dentsrsquo journeys With theimplementation of early

alert systems advisors andfaculty have been able toassist students with just-in-time intervention recom-mendations In addition itis becoming commonplacefor advisors to have access todata beyond the traditionalERP demographic and stu-dent gradesmdashdata such ascourse performance throughlearning management sys-

tems early alert informationtutoring participation andeducation planning informa-tion (see Figure 6) Systemslike these sometimes referred to asIntegrated Planning and AdvisingServices (IPAS)8 permit the advisor tosupport and coach students based ona comprehensive view of the studentsrsquoinformation throughout their educa-

tional journey In the area of onlineeducation too wraparound studentsupport services are mirroring the on-ground experience with some colleges

and universities implementing careercoaches with supporting technologiesto provide services to online studentsThe integration of technologies in eachof these areas has had a positive impacton improving student outcomes

A variety of existing tools many stillin the early development stages canhelp institutions gather data to identifystudentsrsquo success opportunities andtheir achievements This information

is only as good as the data however Tofind the low-hanging fruit IT leadersneed to begin the data conversationsto locate tools that may already begenerating useful data To capture rele-

vant aspects of the student experience

FIGURE 6 Technology for Supporting Education Planning Advising and Counseling and Early Alerts

Source EDUCAUSE Core Data Service 2013

46

66

73

Early alert systems

Education planningacademicprogress tracking

Academic advising

Percentage of institutions

Tocapture relevant aspects

of the student experienceleaders must think institutionally

and identify technologyresources that canbring together the

diverse and enormousdata sets that represent this

experience

(continued on page 26)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1435

To create sustainable IT funding models IT leaders need to

clarify to institutional leaders and boards of trustees why

IT services are strategically important to the enterprise

TOP 10 IT ISSUES

EVOLVING STAFFING MODELS

IMPROVING

STUDENT

OUTCOMES

OPTIMIZING TECHNOLOGY IN

TEACHING AND LEARNING

FUNDING IT STRATEGICALLY

soft skills

moreresources

professional development

clear goals networking

65

Technical proficiency is as important as ever

So skills are more important that ever before

higher education IT staff are not

satisfied with their current position

To be more effective IT

staff say they need

of students wish their

instructors would use

early-alert systems more

of central ITrsquos budgetis spent running the institution

is spent on growth

is spent on transformation

Students respond

positively to learning

analytics opportunities

not at allimportant

technical proficiencystrategic planning

effective communication

1

veryimportant

5

Top 3 motivators for faculty integration of technology

in the classroom

bull Clear indicationevidence that students will benefit

bull Release time to designredesign courses

bull Confidence that the technology will work as planned

1 in 4

Todayrsquos market for IT talent is competitive Hiring andretaining top talent requires engaged managers whopossess and know how to foster good communication skills

Faculty and students alike are

interested in learning analytics for

notifications on course progress

Although technology is omnipresent in the lives ofstudents leveraging technology to engage students in

meaningful ways and to enhance learning is still evolving

76

15

9

I think this is great

This sounds positive

I am neutral

This sounds negative

Irsquom totallyagainst this

Spending model

breakdown in the USdoes not differsignificantly by

Institution type

Size

Central IT staff size

CIO reporting line

25

0

50

75

100

E D U C

A U S E E

R E S

E A R C

H S N

A P S H

O T

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1535

A look into EDUCAUSE research on the 2015 list of the

most intriguing ideas in higher education IT

DEMONSTRATING

VALUE OF IT

DEVELOPING

SECURITY

POLICIES FOR

THE INSTITUTION

DEVELOPING ENTERPRISE IT

ARCHITECTURE

BALANCING INFORMATION

SECURITY AND OPENNESS

INCREASING CAPACITY

FOR CHANGE

PROVIDING USER SUPPORT

The gaps between effectiveness in and

importance of addressing risks are large

Percentage using the college or university help desk for support

Percentage looking to peers

Student Device Ownership

Between 2005 and 2014 there were 727 education-sector

data breachesmdashinvolving more than 14 million recordsmdashas

reported to the Privacy Rights Clearinghouse

locally integrate the

architectures of multiple

major systems

follow the architecture of a

primary system or suite

20142013

25

0

50

75

100

2015 projection

Smartphones

Tablets

86

47

31

76

58

90

Information security

Data privacyconfidentiality

Identityaccess management

66

66

84

82

79

70

36

1

33

29

The most important IT risks to

address concern security privacy

and access

In a world of increasing

complex security threats

institutions must move from

a reactive to a proactive security response

We are living in an era when readily

accessible technologies facilitate a

BYOD standard requiring institutions

to rethink user support

A well-defined enterprise IT architecture is instrumental to

optimizing opportunities and managing change effectively

The higher education community is

struggling with the pace variety and sheer volume

of change in information technology as well as the

corresponding risks

IT leaders need to draw the lines from

technology initiatives to their institutionsrsquo

changing strategic objectives and on to the

ultimate bottom lines of mission and means

OtherLossthestInternal threatsExternal threats

81of institutions

do notaddress IT risk

in their strategicplan

7357

69

22

Faculty

Students

effectiveness

importance

effectiveness

importance

effectiveness

importance

6 3 10 10

Breachcauses

53Administration

37Teaching

and learning

10Researchother

Percentage of IT spend by institutional mission

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1635

26 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

leaders must think institutionally and identify technology resources that

can bring together the diverse and enormous data sets that represent thisexperience

As was discussed last year when this was the 1 issue in the 2014 Top 10list looking at this data may raise privacy issues so leaders must rememberto include the appropriate individuals in these discussions to ensure compli-ance security and privacy

Advice983150 Keep in mind that students consider success from a holistic view of their

campus experience not necessarily their experience with just a courseor a semester To maximize the impact of technology identify the combi-

nation of data and tools that will encompass as much of the institutionalexperience as possible983150 Remember that results will be only as good as the data Take time in the

beginning to build a reliable strategic foundation by starting with conciseoutcome objectives and then develop t he data-driven questions that willultimately define actionable steps to influence success

983150 Work with key individuals from various institutional areas to identifydata that may be available at an individual student level and that could becombined with other values to establish an assessment point for the stu-dent Next consider comparing this assessment point with the studentrsquossuccess level and attempt to identify some trends Drill down to indica-tors that can be used as targets for predicting success and for identifyingearly warning signs

983150 Ensure that the project is embedded in a cross-institutional student suc-cess effort that includes all relevant parties Dedicated student successteams or cross-departmental governance structures can be the vehiclefor organizing consensus Donrsquot allow a perception of IT ownership todevelop

983150 Resolve problems in academic and business processes before implemen-tation donlsquot adapt applications to dysfunctional processes

983150 Define the role of faculty in improving student outcomes through thestrategic leveraging of technology

983150 Determine how much individualized student data should be shared withadvisors in supporting improved student outcomes

Issue 5Demonstrating the

Business Value ofInformation Technologyand How Technology

and the IT OrganizationCan Help the Institution

Achieve Its Goals

IT leaders need to continue to get bet-ter at drawing the lines from technol-ogy initiatives to their institutionsrsquochanging strategic objectives and on

to the ultimate bottom lines of mis-sion and means Successfully demon-strating the business value of informationtechnology to the institution begins withdeveloping a clear understanding of the

various ways in which technology as awhole and the IT department as a unitadd value to the institution Institutionalleadersrsquo struggle to respond to changingpublic perceptions of the value of highereducation itself is a complicating factorHerein lies an opportunity for IT profes-sionals not only to demonstrate the value

of the IT organizationrsquos particular offer-ings but also to create new and significant value for the institution This requiresthinking of technology strategy as both aconsequence and a driver of institutionalstrategy IT leaders who have the abilityto see the entire institutional landscapeand can offer strategic insights for movingthe institution forward have never beenmore important to the well-being of col-leges and universities

ldquoInstead of reacting to new technologiestop institutions seek out new technologies

as a strategic imperative leveraging theseinnovations to improve learning insideand outside the classroom with datadecision making enhanced pedagogy andbetter student outcomesrdquo

mdashLisa M Davis Vice President for Information Services and Chief Information Officer

Georgetown University

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

So in what ways do IT leaders add value They add value to the organizationby enhancing the core productmdashnamelythe learning experiences of students and

the teaching activities of faculty They add value very directly by creating new chan-nels through which students can accessinstitutional offerings The channels thatonline opportunities provide would notexist without the technologies deliveredand supported by the IT organizationFrom a business perspective this cre-ates new sources of revenue a criticalobjective for virtually all colleges anduniversities Drawing a clear line that con-nects specific technology initiatives withtangible revenue for the institution is a

powerful way to demonstrate the busi-ness value of technologymdashand of the ITorganization

And of course the yin of revenue isbalanced by the yang of cost reductionStories of expense reduction and effi-ciency are perhaps easier to identify andtell and they should be carefully and dili-gently told but IT leaders must be carefulto also emphasize the much larger poten-tial that a clear focus on the revenue sidecan provide Doing so can help to avoid

the impression that the value of informa-tion technology is limited to simple actsof automation and efficiency Part of thiswork entails ensuring that the institu-tional leadership understands what is andis not possible Many times the need tohave the value discussion in the first placeis because leaders are not inherently feel-ing the value Those in the IT organiza-tion must take the time to develop andprovide clear data-based informationabout the services they deliver and valuethey provide

One way to demonstrate value iswith well-constructed service portfoliosand service catalogs A service portfolioprovides a high-level overview of howfunds are spent on major institutionalstrategic and operational goals and isgeared toward institutional leaders Aservice catalog (see Figure 7) provides amore detailed view into how IT dollarsare spent on IT projects products andservices and is geared toward IT leaders

Combined the service portfolio and theservice catalog can be a useful tool forshowing the business value of the invest-ments that institutions make in informa-tion technology

Assembling a service portfolio andcatalog may be the IT organizationrsquos firstcomprehensive view into the actual valueit is bringing to the institution Depend-ing on that value IT leaders may first needto focus on quick fixes to better align theirservices with the institutional mission

Before IT leaders can advocate howinformation technology can be leveragedto drive the business the IT organiza-tion must be operationally effective andefficient Institutional and business unitleaders must view the IT organizationas providing operational excellence andoutstanding customer service before theywill consider it as a partner in deliveringbusiness value

The CIO and IT leadership teamsshould remember that they are the pri-mary marketing avenue for sharing the

value that information technology bringsto the institutional mission IT leadersspend about 10 percent of their time ongovernance and planning and on innova-tion with business and academic units9 IT leaders thus must be intentional aboutidentifying opportunities for communi-cating how the IT organization is help-ing the institution CIOs must establish

strong and trusting relationships withtheir peer business leadersSharing the value of information

technology begins with IT leadership butmust extend to the entire IT organization

All IT staff must understand how theirwork contributes to the institutional mis-sions and priorities They need to under-stand the IT organizationrsquos capabilitiesand priorities and how the organizationcan advance the institution the indi-

vidual business units and the faculty stu-dents and staff with whom they work IT

leaders can encourage and enable IT staffto learn the mission business processesand requirements of business units inorder to understand how informationtechnology can best be leveraged Get-ting to this point may require a culturechange within the IT organization At the

very least all IT staff should know boththe institutional and the IT priorities toensure that everyone is telling the samestory

FIGURE 7 Percentage of Institutions with a Service Catalog

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

32

17

29

40

56

62

Source EDUCAUSE Core Data Service 2013

IT leaders add value

to the organization byenhancing the core

productmdashnamely thelearning experiences of

students and the teachingactivities of faculty

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1835

28 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Advice983150 Map IT priorities to institutional priorities Find the points of intersection

with the business unit operations customers and technology Partnerwith the business unit to develop a roadmap and to align the business withthe IT architecture

983150 Donrsquot wait for an invitation to discuss business and customer impact Butdonrsquot try to boil the ocean keep focused and be clear about what the IT

organization can and cannot do IT leaders must be translators usingterminology that resonates with non-IT experts and connecting the dotsbetween the technology capabilities and the business needs Develop asmall set of short and simple stories about concrete ways in which tech-nology has improved the learning experience at the institution createdaccess to institutional resources strengthened affinity for the institutiongenerated revenue and streamlined operations Focus at least as much onhelping others see what is possible with technology as on showing howtechnology investments improve current institutional life

983150 Develop a service catalog to serve as a base for connecting the work of theIT organization to the larger institutional strategic objectives

983150 Implement a metrics program that can demonstrate the extent to which theIT organization is achieving its service-level goals customer-satisfaction

goals and financial goals and is delivering on strategic priorities983150 Ensure that IT leaders and IT staff understand what drives academic and

business value for the institution and can identify and articulate how tech-nology can deliver that value Consider attending non-technology confer-ences to learn how business officers faculty and academic leaders thinkabout technology and what their pressing problems are Be the translatorfor business strategy

983150 To reach the broader institutional community consider newslettersbrown-bag gatherings and roundtable discussions and take advantageof recurring events such as National Cyber Security Awareness Month(httpwwweducauseeduncsam) and start-of-the-semester gatherings

Issue 6Increasing the IT

Organizationrsquos Capacityfor Managing Change

Despite DifferingCommunity Needs

Priorities and Abilities

Change is the watchword todayand going forward In the 2011book Race against the Machine MIT economists Erik Bryn-jolfsson and Andrew McAfee

write ldquoAdvances like the Googleautonomous car Watson the Jeop-ardy champion supercomputer andhigh-quality instantaneous machinetranslation then can be seen as thefirst examples of the kinds of digitalinnovations wersquoll see as we move into the phase where exponentialgrowth yields jaw-dropping resultsrdquo10

When technology changes organiza-tions are always challenged to adapt tonew circumstances This is par ticularlytrue of the organizations tasked with

implementing and maintaining thetechnology itselfThe higher education community

is struggling not only with the pace ofchange in information technology butalso with the variety and sheer volumeof change Information technology isincreasingly important to and increas-ingly integrated with all aspects ofboth the strategic and the operationalfunctions of the campus The chal-

ldquoWe also add value by creating newways for those who know us less well to

develop affinity with our institutions Asmall MOOC my college offered made usknown to groups of prospective studentswho would never have paid a momentrsquosattention to any traditional advertisingmessages we might have sent By joiningtheir party first via our technologies weput ourselves in a much better position to

invite them to our partyrdquomdashJames Kulich

Vice President and Chief Information OfficerElmhurst College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

lenge is how to engage multiple areasof the institution and expand servicesin numerous simultaneous initiativesMeanwhile institutional informa-

tion technology is reengineering itsinfrastructure platforms and servicesThose change efforts are often additiveto the applications being introduced aspart of new business-area initiatives

Ideally the institutional stancetoward change is proactive and ITleaders have the vision and good senseto advocate to broker and to preparetheir various constituents for upcom-ing changes while sustaining ongo-ing operations In reality end users

vary widely in their predisposition to

technology As a group students andfaculty are positively disposed towardinformation technology but as indi-

viduals they run the gamut (see Figure8) And attitudes influence behaviorthe way faculty and students adopt and

FIGURE 8 Relationship between Faculty Attitudes toward Online Learningand Their Experience with Online Teaching

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014(Louisville CO ECAR July 2014)

Percentage of respondents who agree or strongly agree

No recent onlineteaching

Some recentonline teaching

50250 75 100

All respondents

Online learning helps students learn more effectively

Online learning will lead to pedagogical breakthroughs

Online learning will make higher education available to more students

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2035

30 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

use technology tends to reflect theirattitudes11

The IT organizationrsquos history of exe-cution can influence community open-ness toward future technology changesThe shadow cast by a deeply flawed ERPimplementation for example can last adecade or longer

Change management is preciselythat managing change rather than lettingchange happen on its own (see Figure 9)

Successful change management is notaccidental or organic It is intentionaland has multiple components Manyinstitutions adopt a specific approachto implementing changemdashapproachessuch as ADKAR Kurt Lewinrsquos changemanagement model and John Kot-terrsquos eight steps12 Regardless of the

model managing change requires astrategy in which the goals and focusof the change are clear to internal andexternal constituents For examplethe corporate consultant Glenn Llopisadvises being able to identify what thesuccessful implementation of a changestrategy would look like knowing whatthe change strategy is trying to solveand identifying the required resourcesand relationships to implement the

change management strategy

13

As theIT organization sifts through the differ-ent needs abilities and priorities of theinstitution and tries to adapt to changeit must avoid being caught in a viciouscircle of tactics with no purpose

A good change management strat-egy has multiple components which

include communications and inclu-siveness John Jones DeAnne Agu-irre and Matthew Calderone provideten sensible principles for managing

change by keeping the human elementat the center14 Involving every level ofan organization creating ownershipassessing the cultural landscape andcommunicating effectively are keyfactors Change always affects some-body somewheremdashboth internally andexternally IT organizations must doeverything possible to find engagedpeople who can advocate on behalf ofthe change strategy It helps to havechampions at all levels executiveswho can demonstrate the institutional

leadersrsquo commitment area leaders whocan reinforce commitment with theirworkforce and explain how the change

will benefit their part of the institu-tion and individual influencers whocan help determine success factorsidentify and address pain points andevangelize with their colleagues

But change management involves

more than communications and inclu-siveness A successful change is a fullydesigned change Too often institu-tional leaders conflate new initiativeswith new systems and fail to fully thinkthrough and execute on the business-end components The successfulintroduction of a new system mightrequire new or reengineered businessprocesses new roles and even differ-ent organizational structures Every

ldquoTechnology is now integrated into just about

every aspect of our colleges and universitiesThat allows us a myriad of opportunitiesto use technology to help students succeedacademically Using technology to helpstudents succeed is at the core of what we dordquo

mdashSteve FleagleChief Information Officer and Associate Vice President

The University of Iowa

FIGURE 9 Percentage of Institutions That Have Implemented the ITIL ChangeManagement Process

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

23

13

25

30

44

44

Source EDUCAUSE Core Data Service 2013

Involvingevery level of an

organization creatingownership assessing thecultural landscape and

communicating effectivelyare key factors Changealways affects somebody

somewhere

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 9: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

It is important to view technology asa supporting tool similar to earlier toolssuch as blackboardchalk Technolo-gies need to be carefully scrutinized

for their pedagogical implications Alt ho ug h on li ne co ur se s of fer th eallure of convenience and the opening(and thus increasing) of enrollments tostudents who might not otherwise beable to attend college in a traditionalmanner their pedagogical effectivenessshould be assessed as carefully as that oftraditional classroom courses Doing so

might identify gaps in overall pedagogi-cal assessment at an institution and thusimprove even face-to-face learning Thereal value of technologies is how facultyintegrate the technologies into theirteaching and learning and how they usethe technologies to further refine theircourse delivery and student engage-ment (see Figure 4)

If institutional leaders become moreintentional about their pedagogicalobjectives and assessment methodsthey will have the opportunity to influ-

ence the institutional technology mar-ketplace Todayrsquos solutions could bemuch more effective with better guid-ance from the leadership at colleges anduniversities

For example faculty often findthemselves overwhelmed with the vol-ume of new technologies and the ongo-ing upgrades of existing technologiesas they struggle to find time to researchhow to integrate the technologies into

their teaching Faculty new to onlinelearning will commonly try to replicatetheir physical classroom online butthis is a classic McLuhanesque mistake6

Optimizing the use of technology inteaching and learning depends on theability of the institutional and academicleadership to help faculty develop theirdigital competency and then to con-tinue to provide learning opportunitiesto keep their competencies currentFaculty need ongoing digital literacyopportunities that enable them to betterunderstand not only educational tech-nologies but also the social technolo-

gies that are affecting their everydaylives and the everyday lives of their stu-dents Those students expect engage-ment in their instruction Faculty need

to understand instructional narrativeand the implications of media as part oftheir technological introduction This ismore than just training on a particulartechnology It is as the saying goes thedifference between giving a man a fishand teaching him how to fish

The effective optimization ofinstructional technology also requiresrethinking reinforcing and clarifyingroles and relationships among faculty

ldquoFaculty armed with current understandingand research on the power and value

of technologies are more likely to usetechnology to enhance their pedagogicalapproachesrdquo

mdashCeleste M Schwartz Vice President for Information Technology and College Services

Montgomery County Community College

FIGURE 4 Integrating Technology into Courses

ldquoI could be a more effective faculty member if I were better skilled at integrating this technology

into my coursesrdquo

Percentage of respondents

3D printers

Non-keyboard or non-mouse computer interfacesSocial media as a teaching and learning tool

E-portfolios

Lecture capturerecordings

E-books or e-textbooks

Simulations or educational games

LMS

Online collaboration tools

Free web-based content

Agree Strongly agree

50250 75 100

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014 (Louisville CO ECAR July 2014)

The

real value oftechnologies is howfaculty integrate

technologies intoteaching and learning

and how they usetechnologies to further

refine course delivery andstudent engagement

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1035

20 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

librarians teaching and learn-ing center professionals and ITprofessionals They all need to

view themselves as colleag ues

and even partners in designingthe right infusion of technologyresources at the right time duringthe instructional process

Is all this a tall order Yes Butit is directed toward the primarymission of higher education andis thus well worth addressing Ifcollege and university leaders donot optimize the use of technol-ogy in teaching and learningexisting and emerging alterna-tives will almost certainly step

forward to fill the gap

Advice983150 Work with academic leader-

ship to articulate the institu-tional strategy for the use oftechnology in teaching andlearning to best fit the institu-tional culture and priorities

983150 Translate that strategy into ateaching and learning tech-

nology roadmap that pri-oritizes the technologies thatwill best achieve the institu-tional strategy and fit institu-tional resources

983150 Define and clarify roles insupporting instructionaltechnology to bring togetherall relevant institutionalparties as productively aspossible

983150 Move to a technology sup-port model that aligns tech-

nology integration supportand faculty professionaldevelopment that is courseprogram specific and basedon research that demonstratesimproved student engage-ment and success

983150 Ensure that faculty have suf-ficient support and releasetime to integrate the tech-nologies into their courses

Issue 3Developing IT Funding

Models That SustainCore Service

Support Innovation andFacilitate Growth

As governmental financial sup-port for higher educationcontinues to decline bothpublic and private institutionsare desperately trying to focus

scarce resources on strategically impor-

tant needsTo create funding models that willsustain IT operations IT leaders need toclarify to institutional leaders and boardsof trustees why IT services are strategi-cally important to the enterprise Articu-lating and making some of the toughstrategic choices explicit is fundamentalto developing a sustainable fundingmodel As the role of information tech-nology in higher education matures andas institutions are increasingly pressedto balance costs with tangible benefits

IT leaders will need to strengthen andleverage their relationships with gover-nance groups connect execution withstrategy and exploit funding models tiedto institutional strategy (see Figure 5)

EDUCAUSE defines gov ern anc e asldquohow a higher education institution isorganized for the purposes of decisionmaking and resource allocation andhow the varying parts are managed ina way that promotes the mission of the

institutionrdquo7 The distributed nature ofhigher education institutions thoughhighly effective in supporting innova-tion and meeting specialized needs can

be a roadblock to strategic investmentsand efficiency realization InstitutionalIT governance can help achieve andsupport a clear IT strategy When IT gov-ernance programs have influence over ashared pot of institutional resources andare able to prioritize strategic IT invest-ments IT leaders can support ongoinginnovation and growth across the entireinstitutional portfolio of functions Inthe absence of institutional IT gover-nance IT projects will be prioritizedaccording to which areas can most easily

secure funding for their priorities Inevi-tably worthy and even critical projectswill not be funded if they are not spon-sored by well-resourced areas

Capital funding is relatively easy tosecure obtaining additional operationalfunding is much more difficult Sincemost capital projects have an opera-tional impact the differential access tofunding streams can create significantproblems for budget managers To sat-isfy demand and remain competitive

leaders at higher education institutionshave allocated capital funds to coverthe development cost of new IT infra-structure yet they seldom incorporateplans for ongoing operational funding ofcapital projects As a consequence thereis a fundamental misunderstanding ofthe total cost of information technologyand often no culturally accepted billingmodels exist for one-time and full-life-cycle costs

To help governance groups under-stand and support funding for the real

cost of information technology IT lead-ers need to develop total cost of owner-ship (TCO) scenarios and vet them withappropriate groups before projects arefunded Higher education informationtechnology is dogged by cost-savingsexpectations that usually create a falsesense of expenditure reduction In somecases the benefit of the IT investmentderives from risk reduction or new func-tionality and cost savings are not to be

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

expected In other cases cost savingsare theoretically possible but difficultto achieve if non-IT changes such asbusiness process redesign are requiredto realize them Even if the project is

successfully completed funding mayneed to shift to derive real institutionalsavings For example an IT project thatintroduces efficiencies to academicdepartments or business units mayreduce costs for the departments or units

and also for the institution overall butthe project may increase IT costs To real-ize net savings for the institution budgetfunding needs to be withdrawn from thedepartment and a portion needs to be

directed to the IT organization to coverits increased costs with the balanceaccruing to the bottom line of the insti-tution When each department controlsits own budget those shifts and realloca-tions are very difficult to negotiate and

often fall apart eroding any potentialcost savings

Growth can be managed but doingso requires service management models

that are able to project and prepare forgrowth Those models need to includecost management to ensure that serviceproviders understand and budget forboth fixed and variable costs The pay-ing IT customersmdashwhether institutionalleaders or individual departmentsmdashneedto understand IT service cost drivers andhow they can help manage those driv-ers Funding for growth in variable costsis relatively easy to justify if IT servicemanagers have and can show data onboth growth and the associated costs

Funding for growth in fixed costs needsto be justified as well and that requiresdata on the cost increases and a justifi-cation of the risks that will be reducedthe functionality that will be added orenhanced or some other compelling

FIGURE 5 IT Spending on Institutional Activities

Institutionalgrowth

Running theinstitution

Transformativechange

1576 9

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1235

22 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

reason This approach also paves the way for discussions of tradeoffs that mightaccommodate growth without increasing funding such as service-level reduc-tions shared services or outsourcing

Supporting innovation is a key piece of IT resource justification Studentsexist in a digital ecosystem and expect educational institutions to interact withthem in the ways that they are used to interacting with each other and with thecommercial entities they deal with on a daily basis Banks retail stores andeven government services are available to them through a multiplying swarmof devices Institutional leaders are increasingly aware that higher educationneeds to deliver services in the same way and that the development of an ITarchitecture to do so takes resources To better afford the resources necessaryto keep institutions current the IT organization itself needs to be innovativein the way it is organized the way it delivers IT services and the way it workswith various institutional constituencies Recognizing that IT drivers andcore services in 2014 may not even remotely resemble those necessary in 2020

demands funding flexibility since too tight a correlation will act as a disincen-tive to improvement and will create technology lags greater than those of thelast decade

Different but rigorous strategies for IT core services growth and innovationwill help in the development of IT funding models that best fit these separateactivities and are aligned with the institution and its constituents Effective ITgovernance can tie these three activities together and prioritize the IT expensein ways that support existing operations ensure ongoing innovation andrespond to growth across the entire IT portfolio

Advice983150 Benchmark IT finances by participating in the EDUCAUSE Core Data

Service983150 Ensure that IT projects build models for ongoing operational funding into

project deliverables and expectations983150 Establish an institutional IT governance structure that is responsible for allo-

cating funding not just identifying IT priorities983150 Understand the costs and cost drivers of todayrsquos IT services983150 Help leadership understand both the costs and the benefits of information

technology Arguments for new IT initiatives should always include cost esti-mates as well as estimates of the costs of not innovating

983150 Build the costs of growth and maintenance into funding models for core ITservices

Issue 4Improving Student

Outcomes through anInstitutional Approach

That StrategicallyLeverages Technology

The benefits of completing acollege education are widelyknown They include higherlifetime earnings greater levelsof happiness increased civic

engagement and reduced health risks

There are also societal benefits as theproportion of college graduates in thepopulation increases So it is in our ownbest interests to help both individualsand society by improving the successof students at our higher educationinstitutions

There are few cases in which tech-nology by itself has helped studentssucceed However there are opportuni-ties for technology to support studentsuccess initiatives The first task for anyinstitution is to assess both the insti-

tutional needs and the most currentremedies for the pain points that areidentified Although this is a constantlyand rapidly evolving area some specificexamples include the following

983150 Developin g a training course (orworkshop) to help students under-stand the technology landscape ofthe institution and how they can usethose tools to succeed

ldquoWhen it comes to innovation is the ITfunding principle lsquoWe optimize new IT

investments for the entire institutionrsquo orlsquoWe optimize new IT investments for theindividual unitsdepartmentsrsquo or bothPricing models will emerge accordinglyrdquo

mdashKarin Moyano CamihortDean of Online Learning and Academic Initiatives

Holyoke Community College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Removing barriersmdashs uch as accessusability and lack of supportmdashto theeffective use of technology

983150 Using technology to recast large lec-

ture courses and support pedagogi-cal transformations

983150 Using technology to provide flex-ibility for students to match thecourse with their learning style

983150 Using technology to distributelearning content in multiple waysincluding lectures (live and archivedfor review) electronic texts andlearning management systems

983150 Using technology such as peertutoring discussion boards andg roup videoconferences (eg

Google hangouts) to facilitate syn-chronous and asynchronous inter-actions with others and to promotecollaborative learning

983150 Considering the emerging role oftools used traditionally by business(ie CRM) to manage the institu-tionrsquos relationship with the student

983150 Applying elements of what is beinglearned in competency-based edu-cation initiatives at an institutionallevel for traditional students

Institutional leaders continueto emphasize and pour resourcesinto improving student retentionand completion Technology can beapplied to develop the broad area oflearning analytics to provide feedbackto students on their behavior (both pastand predictive) to faculty on the effec-tiveness of the pedagogy employed inthe course to content providers (andfaculty who select the content) on theeffectiveness of the content used in the

course and to administrators on broadsystemic issues and trendsMany colleges and universities

have student success committees thatfocus on initiatives to improve coursecompletion program completion andstudent support services Examplesof initiatives can be found in the areasof teaching and learning and studentsupport services In the area of reme-dial education great strides have been

made in reducing time to completionfor remedial students and in increas-ing retention and completion rates Anexample of the work occurring in the

area of student success can be found onthe Achieving the Dream InterventionsShowcase website (httpachievingthedreamorgresourcesachieving-the-dream-interventions-showcase) withmany of those interventions strategi-cally leveraging technology

As data analytics tools have becomemore sophisticated institutionshave been better able to recognizestudentsrsquo challenges and track stu-dentsrsquo journeys With theimplementation of early

alert systems advisors andfaculty have been able toassist students with just-in-time intervention recom-mendations In addition itis becoming commonplacefor advisors to have access todata beyond the traditionalERP demographic and stu-dent gradesmdashdata such ascourse performance throughlearning management sys-

tems early alert informationtutoring participation andeducation planning informa-tion (see Figure 6) Systemslike these sometimes referred to asIntegrated Planning and AdvisingServices (IPAS)8 permit the advisor tosupport and coach students based ona comprehensive view of the studentsrsquoinformation throughout their educa-

tional journey In the area of onlineeducation too wraparound studentsupport services are mirroring the on-ground experience with some colleges

and universities implementing careercoaches with supporting technologiesto provide services to online studentsThe integration of technologies in eachof these areas has had a positive impacton improving student outcomes

A variety of existing tools many stillin the early development stages canhelp institutions gather data to identifystudentsrsquo success opportunities andtheir achievements This information

is only as good as the data however Tofind the low-hanging fruit IT leadersneed to begin the data conversationsto locate tools that may already begenerating useful data To capture rele-

vant aspects of the student experience

FIGURE 6 Technology for Supporting Education Planning Advising and Counseling and Early Alerts

Source EDUCAUSE Core Data Service 2013

46

66

73

Early alert systems

Education planningacademicprogress tracking

Academic advising

Percentage of institutions

Tocapture relevant aspects

of the student experienceleaders must think institutionally

and identify technologyresources that canbring together the

diverse and enormousdata sets that represent this

experience

(continued on page 26)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1435

To create sustainable IT funding models IT leaders need to

clarify to institutional leaders and boards of trustees why

IT services are strategically important to the enterprise

TOP 10 IT ISSUES

EVOLVING STAFFING MODELS

IMPROVING

STUDENT

OUTCOMES

OPTIMIZING TECHNOLOGY IN

TEACHING AND LEARNING

FUNDING IT STRATEGICALLY

soft skills

moreresources

professional development

clear goals networking

65

Technical proficiency is as important as ever

So skills are more important that ever before

higher education IT staff are not

satisfied with their current position

To be more effective IT

staff say they need

of students wish their

instructors would use

early-alert systems more

of central ITrsquos budgetis spent running the institution

is spent on growth

is spent on transformation

Students respond

positively to learning

analytics opportunities

not at allimportant

technical proficiencystrategic planning

effective communication

1

veryimportant

5

Top 3 motivators for faculty integration of technology

in the classroom

bull Clear indicationevidence that students will benefit

bull Release time to designredesign courses

bull Confidence that the technology will work as planned

1 in 4

Todayrsquos market for IT talent is competitive Hiring andretaining top talent requires engaged managers whopossess and know how to foster good communication skills

Faculty and students alike are

interested in learning analytics for

notifications on course progress

Although technology is omnipresent in the lives ofstudents leveraging technology to engage students in

meaningful ways and to enhance learning is still evolving

76

15

9

I think this is great

This sounds positive

I am neutral

This sounds negative

Irsquom totallyagainst this

Spending model

breakdown in the USdoes not differsignificantly by

Institution type

Size

Central IT staff size

CIO reporting line

25

0

50

75

100

E D U C

A U S E E

R E S

E A R C

H S N

A P S H

O T

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1535

A look into EDUCAUSE research on the 2015 list of the

most intriguing ideas in higher education IT

DEMONSTRATING

VALUE OF IT

DEVELOPING

SECURITY

POLICIES FOR

THE INSTITUTION

DEVELOPING ENTERPRISE IT

ARCHITECTURE

BALANCING INFORMATION

SECURITY AND OPENNESS

INCREASING CAPACITY

FOR CHANGE

PROVIDING USER SUPPORT

The gaps between effectiveness in and

importance of addressing risks are large

Percentage using the college or university help desk for support

Percentage looking to peers

Student Device Ownership

Between 2005 and 2014 there were 727 education-sector

data breachesmdashinvolving more than 14 million recordsmdashas

reported to the Privacy Rights Clearinghouse

locally integrate the

architectures of multiple

major systems

follow the architecture of a

primary system or suite

20142013

25

0

50

75

100

2015 projection

Smartphones

Tablets

86

47

31

76

58

90

Information security

Data privacyconfidentiality

Identityaccess management

66

66

84

82

79

70

36

1

33

29

The most important IT risks to

address concern security privacy

and access

In a world of increasing

complex security threats

institutions must move from

a reactive to a proactive security response

We are living in an era when readily

accessible technologies facilitate a

BYOD standard requiring institutions

to rethink user support

A well-defined enterprise IT architecture is instrumental to

optimizing opportunities and managing change effectively

The higher education community is

struggling with the pace variety and sheer volume

of change in information technology as well as the

corresponding risks

IT leaders need to draw the lines from

technology initiatives to their institutionsrsquo

changing strategic objectives and on to the

ultimate bottom lines of mission and means

OtherLossthestInternal threatsExternal threats

81of institutions

do notaddress IT risk

in their strategicplan

7357

69

22

Faculty

Students

effectiveness

importance

effectiveness

importance

effectiveness

importance

6 3 10 10

Breachcauses

53Administration

37Teaching

and learning

10Researchother

Percentage of IT spend by institutional mission

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1635

26 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

leaders must think institutionally and identify technology resources that

can bring together the diverse and enormous data sets that represent thisexperience

As was discussed last year when this was the 1 issue in the 2014 Top 10list looking at this data may raise privacy issues so leaders must rememberto include the appropriate individuals in these discussions to ensure compli-ance security and privacy

Advice983150 Keep in mind that students consider success from a holistic view of their

campus experience not necessarily their experience with just a courseor a semester To maximize the impact of technology identify the combi-

nation of data and tools that will encompass as much of the institutionalexperience as possible983150 Remember that results will be only as good as the data Take time in the

beginning to build a reliable strategic foundation by starting with conciseoutcome objectives and then develop t he data-driven questions that willultimately define actionable steps to influence success

983150 Work with key individuals from various institutional areas to identifydata that may be available at an individual student level and that could becombined with other values to establish an assessment point for the stu-dent Next consider comparing this assessment point with the studentrsquossuccess level and attempt to identify some trends Drill down to indica-tors that can be used as targets for predicting success and for identifyingearly warning signs

983150 Ensure that the project is embedded in a cross-institutional student suc-cess effort that includes all relevant parties Dedicated student successteams or cross-departmental governance structures can be the vehiclefor organizing consensus Donrsquot allow a perception of IT ownership todevelop

983150 Resolve problems in academic and business processes before implemen-tation donlsquot adapt applications to dysfunctional processes

983150 Define the role of faculty in improving student outcomes through thestrategic leveraging of technology

983150 Determine how much individualized student data should be shared withadvisors in supporting improved student outcomes

Issue 5Demonstrating the

Business Value ofInformation Technologyand How Technology

and the IT OrganizationCan Help the Institution

Achieve Its Goals

IT leaders need to continue to get bet-ter at drawing the lines from technol-ogy initiatives to their institutionsrsquochanging strategic objectives and on

to the ultimate bottom lines of mis-sion and means Successfully demon-strating the business value of informationtechnology to the institution begins withdeveloping a clear understanding of the

various ways in which technology as awhole and the IT department as a unitadd value to the institution Institutionalleadersrsquo struggle to respond to changingpublic perceptions of the value of highereducation itself is a complicating factorHerein lies an opportunity for IT profes-sionals not only to demonstrate the value

of the IT organizationrsquos particular offer-ings but also to create new and significant value for the institution This requiresthinking of technology strategy as both aconsequence and a driver of institutionalstrategy IT leaders who have the abilityto see the entire institutional landscapeand can offer strategic insights for movingthe institution forward have never beenmore important to the well-being of col-leges and universities

ldquoInstead of reacting to new technologiestop institutions seek out new technologies

as a strategic imperative leveraging theseinnovations to improve learning insideand outside the classroom with datadecision making enhanced pedagogy andbetter student outcomesrdquo

mdashLisa M Davis Vice President for Information Services and Chief Information Officer

Georgetown University

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

So in what ways do IT leaders add value They add value to the organizationby enhancing the core productmdashnamelythe learning experiences of students and

the teaching activities of faculty They add value very directly by creating new chan-nels through which students can accessinstitutional offerings The channels thatonline opportunities provide would notexist without the technologies deliveredand supported by the IT organizationFrom a business perspective this cre-ates new sources of revenue a criticalobjective for virtually all colleges anduniversities Drawing a clear line that con-nects specific technology initiatives withtangible revenue for the institution is a

powerful way to demonstrate the busi-ness value of technologymdashand of the ITorganization

And of course the yin of revenue isbalanced by the yang of cost reductionStories of expense reduction and effi-ciency are perhaps easier to identify andtell and they should be carefully and dili-gently told but IT leaders must be carefulto also emphasize the much larger poten-tial that a clear focus on the revenue sidecan provide Doing so can help to avoid

the impression that the value of informa-tion technology is limited to simple actsof automation and efficiency Part of thiswork entails ensuring that the institu-tional leadership understands what is andis not possible Many times the need tohave the value discussion in the first placeis because leaders are not inherently feel-ing the value Those in the IT organiza-tion must take the time to develop andprovide clear data-based informationabout the services they deliver and valuethey provide

One way to demonstrate value iswith well-constructed service portfoliosand service catalogs A service portfolioprovides a high-level overview of howfunds are spent on major institutionalstrategic and operational goals and isgeared toward institutional leaders Aservice catalog (see Figure 7) provides amore detailed view into how IT dollarsare spent on IT projects products andservices and is geared toward IT leaders

Combined the service portfolio and theservice catalog can be a useful tool forshowing the business value of the invest-ments that institutions make in informa-tion technology

Assembling a service portfolio andcatalog may be the IT organizationrsquos firstcomprehensive view into the actual valueit is bringing to the institution Depend-ing on that value IT leaders may first needto focus on quick fixes to better align theirservices with the institutional mission

Before IT leaders can advocate howinformation technology can be leveragedto drive the business the IT organiza-tion must be operationally effective andefficient Institutional and business unitleaders must view the IT organizationas providing operational excellence andoutstanding customer service before theywill consider it as a partner in deliveringbusiness value

The CIO and IT leadership teamsshould remember that they are the pri-mary marketing avenue for sharing the

value that information technology bringsto the institutional mission IT leadersspend about 10 percent of their time ongovernance and planning and on innova-tion with business and academic units9 IT leaders thus must be intentional aboutidentifying opportunities for communi-cating how the IT organization is help-ing the institution CIOs must establish

strong and trusting relationships withtheir peer business leadersSharing the value of information

technology begins with IT leadership butmust extend to the entire IT organization

All IT staff must understand how theirwork contributes to the institutional mis-sions and priorities They need to under-stand the IT organizationrsquos capabilitiesand priorities and how the organizationcan advance the institution the indi-

vidual business units and the faculty stu-dents and staff with whom they work IT

leaders can encourage and enable IT staffto learn the mission business processesand requirements of business units inorder to understand how informationtechnology can best be leveraged Get-ting to this point may require a culturechange within the IT organization At the

very least all IT staff should know boththe institutional and the IT priorities toensure that everyone is telling the samestory

FIGURE 7 Percentage of Institutions with a Service Catalog

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

32

17

29

40

56

62

Source EDUCAUSE Core Data Service 2013

IT leaders add value

to the organization byenhancing the core

productmdashnamely thelearning experiences of

students and the teachingactivities of faculty

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1835

28 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Advice983150 Map IT priorities to institutional priorities Find the points of intersection

with the business unit operations customers and technology Partnerwith the business unit to develop a roadmap and to align the business withthe IT architecture

983150 Donrsquot wait for an invitation to discuss business and customer impact Butdonrsquot try to boil the ocean keep focused and be clear about what the IT

organization can and cannot do IT leaders must be translators usingterminology that resonates with non-IT experts and connecting the dotsbetween the technology capabilities and the business needs Develop asmall set of short and simple stories about concrete ways in which tech-nology has improved the learning experience at the institution createdaccess to institutional resources strengthened affinity for the institutiongenerated revenue and streamlined operations Focus at least as much onhelping others see what is possible with technology as on showing howtechnology investments improve current institutional life

983150 Develop a service catalog to serve as a base for connecting the work of theIT organization to the larger institutional strategic objectives

983150 Implement a metrics program that can demonstrate the extent to which theIT organization is achieving its service-level goals customer-satisfaction

goals and financial goals and is delivering on strategic priorities983150 Ensure that IT leaders and IT staff understand what drives academic and

business value for the institution and can identify and articulate how tech-nology can deliver that value Consider attending non-technology confer-ences to learn how business officers faculty and academic leaders thinkabout technology and what their pressing problems are Be the translatorfor business strategy

983150 To reach the broader institutional community consider newslettersbrown-bag gatherings and roundtable discussions and take advantageof recurring events such as National Cyber Security Awareness Month(httpwwweducauseeduncsam) and start-of-the-semester gatherings

Issue 6Increasing the IT

Organizationrsquos Capacityfor Managing Change

Despite DifferingCommunity Needs

Priorities and Abilities

Change is the watchword todayand going forward In the 2011book Race against the Machine MIT economists Erik Bryn-jolfsson and Andrew McAfee

write ldquoAdvances like the Googleautonomous car Watson the Jeop-ardy champion supercomputer andhigh-quality instantaneous machinetranslation then can be seen as thefirst examples of the kinds of digitalinnovations wersquoll see as we move into the phase where exponentialgrowth yields jaw-dropping resultsrdquo10

When technology changes organiza-tions are always challenged to adapt tonew circumstances This is par ticularlytrue of the organizations tasked with

implementing and maintaining thetechnology itselfThe higher education community

is struggling not only with the pace ofchange in information technology butalso with the variety and sheer volumeof change Information technology isincreasingly important to and increas-ingly integrated with all aspects ofboth the strategic and the operationalfunctions of the campus The chal-

ldquoWe also add value by creating newways for those who know us less well to

develop affinity with our institutions Asmall MOOC my college offered made usknown to groups of prospective studentswho would never have paid a momentrsquosattention to any traditional advertisingmessages we might have sent By joiningtheir party first via our technologies weput ourselves in a much better position to

invite them to our partyrdquomdashJames Kulich

Vice President and Chief Information OfficerElmhurst College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

lenge is how to engage multiple areasof the institution and expand servicesin numerous simultaneous initiativesMeanwhile institutional informa-

tion technology is reengineering itsinfrastructure platforms and servicesThose change efforts are often additiveto the applications being introduced aspart of new business-area initiatives

Ideally the institutional stancetoward change is proactive and ITleaders have the vision and good senseto advocate to broker and to preparetheir various constituents for upcom-ing changes while sustaining ongo-ing operations In reality end users

vary widely in their predisposition to

technology As a group students andfaculty are positively disposed towardinformation technology but as indi-

viduals they run the gamut (see Figure8) And attitudes influence behaviorthe way faculty and students adopt and

FIGURE 8 Relationship between Faculty Attitudes toward Online Learningand Their Experience with Online Teaching

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014(Louisville CO ECAR July 2014)

Percentage of respondents who agree or strongly agree

No recent onlineteaching

Some recentonline teaching

50250 75 100

All respondents

Online learning helps students learn more effectively

Online learning will lead to pedagogical breakthroughs

Online learning will make higher education available to more students

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2035

30 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

use technology tends to reflect theirattitudes11

The IT organizationrsquos history of exe-cution can influence community open-ness toward future technology changesThe shadow cast by a deeply flawed ERPimplementation for example can last adecade or longer

Change management is preciselythat managing change rather than lettingchange happen on its own (see Figure 9)

Successful change management is notaccidental or organic It is intentionaland has multiple components Manyinstitutions adopt a specific approachto implementing changemdashapproachessuch as ADKAR Kurt Lewinrsquos changemanagement model and John Kot-terrsquos eight steps12 Regardless of the

model managing change requires astrategy in which the goals and focusof the change are clear to internal andexternal constituents For examplethe corporate consultant Glenn Llopisadvises being able to identify what thesuccessful implementation of a changestrategy would look like knowing whatthe change strategy is trying to solveand identifying the required resourcesand relationships to implement the

change management strategy

13

As theIT organization sifts through the differ-ent needs abilities and priorities of theinstitution and tries to adapt to changeit must avoid being caught in a viciouscircle of tactics with no purpose

A good change management strat-egy has multiple components which

include communications and inclu-siveness John Jones DeAnne Agu-irre and Matthew Calderone provideten sensible principles for managing

change by keeping the human elementat the center14 Involving every level ofan organization creating ownershipassessing the cultural landscape andcommunicating effectively are keyfactors Change always affects some-body somewheremdashboth internally andexternally IT organizations must doeverything possible to find engagedpeople who can advocate on behalf ofthe change strategy It helps to havechampions at all levels executiveswho can demonstrate the institutional

leadersrsquo commitment area leaders whocan reinforce commitment with theirworkforce and explain how the change

will benefit their part of the institu-tion and individual influencers whocan help determine success factorsidentify and address pain points andevangelize with their colleagues

But change management involves

more than communications and inclu-siveness A successful change is a fullydesigned change Too often institu-tional leaders conflate new initiativeswith new systems and fail to fully thinkthrough and execute on the business-end components The successfulintroduction of a new system mightrequire new or reengineered businessprocesses new roles and even differ-ent organizational structures Every

ldquoTechnology is now integrated into just about

every aspect of our colleges and universitiesThat allows us a myriad of opportunitiesto use technology to help students succeedacademically Using technology to helpstudents succeed is at the core of what we dordquo

mdashSteve FleagleChief Information Officer and Associate Vice President

The University of Iowa

FIGURE 9 Percentage of Institutions That Have Implemented the ITIL ChangeManagement Process

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

23

13

25

30

44

44

Source EDUCAUSE Core Data Service 2013

Involvingevery level of an

organization creatingownership assessing thecultural landscape and

communicating effectivelyare key factors Changealways affects somebody

somewhere

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 10: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1035

20 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

librarians teaching and learn-ing center professionals and ITprofessionals They all need to

view themselves as colleag ues

and even partners in designingthe right infusion of technologyresources at the right time duringthe instructional process

Is all this a tall order Yes Butit is directed toward the primarymission of higher education andis thus well worth addressing Ifcollege and university leaders donot optimize the use of technol-ogy in teaching and learningexisting and emerging alterna-tives will almost certainly step

forward to fill the gap

Advice983150 Work with academic leader-

ship to articulate the institu-tional strategy for the use oftechnology in teaching andlearning to best fit the institu-tional culture and priorities

983150 Translate that strategy into ateaching and learning tech-

nology roadmap that pri-oritizes the technologies thatwill best achieve the institu-tional strategy and fit institu-tional resources

983150 Define and clarify roles insupporting instructionaltechnology to bring togetherall relevant institutionalparties as productively aspossible

983150 Move to a technology sup-port model that aligns tech-

nology integration supportand faculty professionaldevelopment that is courseprogram specific and basedon research that demonstratesimproved student engage-ment and success

983150 Ensure that faculty have suf-ficient support and releasetime to integrate the tech-nologies into their courses

Issue 3Developing IT Funding

Models That SustainCore Service

Support Innovation andFacilitate Growth

As governmental financial sup-port for higher educationcontinues to decline bothpublic and private institutionsare desperately trying to focus

scarce resources on strategically impor-

tant needsTo create funding models that willsustain IT operations IT leaders need toclarify to institutional leaders and boardsof trustees why IT services are strategi-cally important to the enterprise Articu-lating and making some of the toughstrategic choices explicit is fundamentalto developing a sustainable fundingmodel As the role of information tech-nology in higher education matures andas institutions are increasingly pressedto balance costs with tangible benefits

IT leaders will need to strengthen andleverage their relationships with gover-nance groups connect execution withstrategy and exploit funding models tiedto institutional strategy (see Figure 5)

EDUCAUSE defines gov ern anc e asldquohow a higher education institution isorganized for the purposes of decisionmaking and resource allocation andhow the varying parts are managed ina way that promotes the mission of the

institutionrdquo7 The distributed nature ofhigher education institutions thoughhighly effective in supporting innova-tion and meeting specialized needs can

be a roadblock to strategic investmentsand efficiency realization InstitutionalIT governance can help achieve andsupport a clear IT strategy When IT gov-ernance programs have influence over ashared pot of institutional resources andare able to prioritize strategic IT invest-ments IT leaders can support ongoinginnovation and growth across the entireinstitutional portfolio of functions Inthe absence of institutional IT gover-nance IT projects will be prioritizedaccording to which areas can most easily

secure funding for their priorities Inevi-tably worthy and even critical projectswill not be funded if they are not spon-sored by well-resourced areas

Capital funding is relatively easy tosecure obtaining additional operationalfunding is much more difficult Sincemost capital projects have an opera-tional impact the differential access tofunding streams can create significantproblems for budget managers To sat-isfy demand and remain competitive

leaders at higher education institutionshave allocated capital funds to coverthe development cost of new IT infra-structure yet they seldom incorporateplans for ongoing operational funding ofcapital projects As a consequence thereis a fundamental misunderstanding ofthe total cost of information technologyand often no culturally accepted billingmodels exist for one-time and full-life-cycle costs

To help governance groups under-stand and support funding for the real

cost of information technology IT lead-ers need to develop total cost of owner-ship (TCO) scenarios and vet them withappropriate groups before projects arefunded Higher education informationtechnology is dogged by cost-savingsexpectations that usually create a falsesense of expenditure reduction In somecases the benefit of the IT investmentderives from risk reduction or new func-tionality and cost savings are not to be

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

expected In other cases cost savingsare theoretically possible but difficultto achieve if non-IT changes such asbusiness process redesign are requiredto realize them Even if the project is

successfully completed funding mayneed to shift to derive real institutionalsavings For example an IT project thatintroduces efficiencies to academicdepartments or business units mayreduce costs for the departments or units

and also for the institution overall butthe project may increase IT costs To real-ize net savings for the institution budgetfunding needs to be withdrawn from thedepartment and a portion needs to be

directed to the IT organization to coverits increased costs with the balanceaccruing to the bottom line of the insti-tution When each department controlsits own budget those shifts and realloca-tions are very difficult to negotiate and

often fall apart eroding any potentialcost savings

Growth can be managed but doingso requires service management models

that are able to project and prepare forgrowth Those models need to includecost management to ensure that serviceproviders understand and budget forboth fixed and variable costs The pay-ing IT customersmdashwhether institutionalleaders or individual departmentsmdashneedto understand IT service cost drivers andhow they can help manage those driv-ers Funding for growth in variable costsis relatively easy to justify if IT servicemanagers have and can show data onboth growth and the associated costs

Funding for growth in fixed costs needsto be justified as well and that requiresdata on the cost increases and a justifi-cation of the risks that will be reducedthe functionality that will be added orenhanced or some other compelling

FIGURE 5 IT Spending on Institutional Activities

Institutionalgrowth

Running theinstitution

Transformativechange

1576 9

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1235

22 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

reason This approach also paves the way for discussions of tradeoffs that mightaccommodate growth without increasing funding such as service-level reduc-tions shared services or outsourcing

Supporting innovation is a key piece of IT resource justification Studentsexist in a digital ecosystem and expect educational institutions to interact withthem in the ways that they are used to interacting with each other and with thecommercial entities they deal with on a daily basis Banks retail stores andeven government services are available to them through a multiplying swarmof devices Institutional leaders are increasingly aware that higher educationneeds to deliver services in the same way and that the development of an ITarchitecture to do so takes resources To better afford the resources necessaryto keep institutions current the IT organization itself needs to be innovativein the way it is organized the way it delivers IT services and the way it workswith various institutional constituencies Recognizing that IT drivers andcore services in 2014 may not even remotely resemble those necessary in 2020

demands funding flexibility since too tight a correlation will act as a disincen-tive to improvement and will create technology lags greater than those of thelast decade

Different but rigorous strategies for IT core services growth and innovationwill help in the development of IT funding models that best fit these separateactivities and are aligned with the institution and its constituents Effective ITgovernance can tie these three activities together and prioritize the IT expensein ways that support existing operations ensure ongoing innovation andrespond to growth across the entire IT portfolio

Advice983150 Benchmark IT finances by participating in the EDUCAUSE Core Data

Service983150 Ensure that IT projects build models for ongoing operational funding into

project deliverables and expectations983150 Establish an institutional IT governance structure that is responsible for allo-

cating funding not just identifying IT priorities983150 Understand the costs and cost drivers of todayrsquos IT services983150 Help leadership understand both the costs and the benefits of information

technology Arguments for new IT initiatives should always include cost esti-mates as well as estimates of the costs of not innovating

983150 Build the costs of growth and maintenance into funding models for core ITservices

Issue 4Improving Student

Outcomes through anInstitutional Approach

That StrategicallyLeverages Technology

The benefits of completing acollege education are widelyknown They include higherlifetime earnings greater levelsof happiness increased civic

engagement and reduced health risks

There are also societal benefits as theproportion of college graduates in thepopulation increases So it is in our ownbest interests to help both individualsand society by improving the successof students at our higher educationinstitutions

There are few cases in which tech-nology by itself has helped studentssucceed However there are opportuni-ties for technology to support studentsuccess initiatives The first task for anyinstitution is to assess both the insti-

tutional needs and the most currentremedies for the pain points that areidentified Although this is a constantlyand rapidly evolving area some specificexamples include the following

983150 Developin g a training course (orworkshop) to help students under-stand the technology landscape ofthe institution and how they can usethose tools to succeed

ldquoWhen it comes to innovation is the ITfunding principle lsquoWe optimize new IT

investments for the entire institutionrsquo orlsquoWe optimize new IT investments for theindividual unitsdepartmentsrsquo or bothPricing models will emerge accordinglyrdquo

mdashKarin Moyano CamihortDean of Online Learning and Academic Initiatives

Holyoke Community College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Removing barriersmdashs uch as accessusability and lack of supportmdashto theeffective use of technology

983150 Using technology to recast large lec-

ture courses and support pedagogi-cal transformations

983150 Using technology to provide flex-ibility for students to match thecourse with their learning style

983150 Using technology to distributelearning content in multiple waysincluding lectures (live and archivedfor review) electronic texts andlearning management systems

983150 Using technology such as peertutoring discussion boards andg roup videoconferences (eg

Google hangouts) to facilitate syn-chronous and asynchronous inter-actions with others and to promotecollaborative learning

983150 Considering the emerging role oftools used traditionally by business(ie CRM) to manage the institu-tionrsquos relationship with the student

983150 Applying elements of what is beinglearned in competency-based edu-cation initiatives at an institutionallevel for traditional students

Institutional leaders continueto emphasize and pour resourcesinto improving student retentionand completion Technology can beapplied to develop the broad area oflearning analytics to provide feedbackto students on their behavior (both pastand predictive) to faculty on the effec-tiveness of the pedagogy employed inthe course to content providers (andfaculty who select the content) on theeffectiveness of the content used in the

course and to administrators on broadsystemic issues and trendsMany colleges and universities

have student success committees thatfocus on initiatives to improve coursecompletion program completion andstudent support services Examplesof initiatives can be found in the areasof teaching and learning and studentsupport services In the area of reme-dial education great strides have been

made in reducing time to completionfor remedial students and in increas-ing retention and completion rates Anexample of the work occurring in the

area of student success can be found onthe Achieving the Dream InterventionsShowcase website (httpachievingthedreamorgresourcesachieving-the-dream-interventions-showcase) withmany of those interventions strategi-cally leveraging technology

As data analytics tools have becomemore sophisticated institutionshave been better able to recognizestudentsrsquo challenges and track stu-dentsrsquo journeys With theimplementation of early

alert systems advisors andfaculty have been able toassist students with just-in-time intervention recom-mendations In addition itis becoming commonplacefor advisors to have access todata beyond the traditionalERP demographic and stu-dent gradesmdashdata such ascourse performance throughlearning management sys-

tems early alert informationtutoring participation andeducation planning informa-tion (see Figure 6) Systemslike these sometimes referred to asIntegrated Planning and AdvisingServices (IPAS)8 permit the advisor tosupport and coach students based ona comprehensive view of the studentsrsquoinformation throughout their educa-

tional journey In the area of onlineeducation too wraparound studentsupport services are mirroring the on-ground experience with some colleges

and universities implementing careercoaches with supporting technologiesto provide services to online studentsThe integration of technologies in eachof these areas has had a positive impacton improving student outcomes

A variety of existing tools many stillin the early development stages canhelp institutions gather data to identifystudentsrsquo success opportunities andtheir achievements This information

is only as good as the data however Tofind the low-hanging fruit IT leadersneed to begin the data conversationsto locate tools that may already begenerating useful data To capture rele-

vant aspects of the student experience

FIGURE 6 Technology for Supporting Education Planning Advising and Counseling and Early Alerts

Source EDUCAUSE Core Data Service 2013

46

66

73

Early alert systems

Education planningacademicprogress tracking

Academic advising

Percentage of institutions

Tocapture relevant aspects

of the student experienceleaders must think institutionally

and identify technologyresources that canbring together the

diverse and enormousdata sets that represent this

experience

(continued on page 26)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1435

To create sustainable IT funding models IT leaders need to

clarify to institutional leaders and boards of trustees why

IT services are strategically important to the enterprise

TOP 10 IT ISSUES

EVOLVING STAFFING MODELS

IMPROVING

STUDENT

OUTCOMES

OPTIMIZING TECHNOLOGY IN

TEACHING AND LEARNING

FUNDING IT STRATEGICALLY

soft skills

moreresources

professional development

clear goals networking

65

Technical proficiency is as important as ever

So skills are more important that ever before

higher education IT staff are not

satisfied with their current position

To be more effective IT

staff say they need

of students wish their

instructors would use

early-alert systems more

of central ITrsquos budgetis spent running the institution

is spent on growth

is spent on transformation

Students respond

positively to learning

analytics opportunities

not at allimportant

technical proficiencystrategic planning

effective communication

1

veryimportant

5

Top 3 motivators for faculty integration of technology

in the classroom

bull Clear indicationevidence that students will benefit

bull Release time to designredesign courses

bull Confidence that the technology will work as planned

1 in 4

Todayrsquos market for IT talent is competitive Hiring andretaining top talent requires engaged managers whopossess and know how to foster good communication skills

Faculty and students alike are

interested in learning analytics for

notifications on course progress

Although technology is omnipresent in the lives ofstudents leveraging technology to engage students in

meaningful ways and to enhance learning is still evolving

76

15

9

I think this is great

This sounds positive

I am neutral

This sounds negative

Irsquom totallyagainst this

Spending model

breakdown in the USdoes not differsignificantly by

Institution type

Size

Central IT staff size

CIO reporting line

25

0

50

75

100

E D U C

A U S E E

R E S

E A R C

H S N

A P S H

O T

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1535

A look into EDUCAUSE research on the 2015 list of the

most intriguing ideas in higher education IT

DEMONSTRATING

VALUE OF IT

DEVELOPING

SECURITY

POLICIES FOR

THE INSTITUTION

DEVELOPING ENTERPRISE IT

ARCHITECTURE

BALANCING INFORMATION

SECURITY AND OPENNESS

INCREASING CAPACITY

FOR CHANGE

PROVIDING USER SUPPORT

The gaps between effectiveness in and

importance of addressing risks are large

Percentage using the college or university help desk for support

Percentage looking to peers

Student Device Ownership

Between 2005 and 2014 there were 727 education-sector

data breachesmdashinvolving more than 14 million recordsmdashas

reported to the Privacy Rights Clearinghouse

locally integrate the

architectures of multiple

major systems

follow the architecture of a

primary system or suite

20142013

25

0

50

75

100

2015 projection

Smartphones

Tablets

86

47

31

76

58

90

Information security

Data privacyconfidentiality

Identityaccess management

66

66

84

82

79

70

36

1

33

29

The most important IT risks to

address concern security privacy

and access

In a world of increasing

complex security threats

institutions must move from

a reactive to a proactive security response

We are living in an era when readily

accessible technologies facilitate a

BYOD standard requiring institutions

to rethink user support

A well-defined enterprise IT architecture is instrumental to

optimizing opportunities and managing change effectively

The higher education community is

struggling with the pace variety and sheer volume

of change in information technology as well as the

corresponding risks

IT leaders need to draw the lines from

technology initiatives to their institutionsrsquo

changing strategic objectives and on to the

ultimate bottom lines of mission and means

OtherLossthestInternal threatsExternal threats

81of institutions

do notaddress IT risk

in their strategicplan

7357

69

22

Faculty

Students

effectiveness

importance

effectiveness

importance

effectiveness

importance

6 3 10 10

Breachcauses

53Administration

37Teaching

and learning

10Researchother

Percentage of IT spend by institutional mission

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1635

26 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

leaders must think institutionally and identify technology resources that

can bring together the diverse and enormous data sets that represent thisexperience

As was discussed last year when this was the 1 issue in the 2014 Top 10list looking at this data may raise privacy issues so leaders must rememberto include the appropriate individuals in these discussions to ensure compli-ance security and privacy

Advice983150 Keep in mind that students consider success from a holistic view of their

campus experience not necessarily their experience with just a courseor a semester To maximize the impact of technology identify the combi-

nation of data and tools that will encompass as much of the institutionalexperience as possible983150 Remember that results will be only as good as the data Take time in the

beginning to build a reliable strategic foundation by starting with conciseoutcome objectives and then develop t he data-driven questions that willultimately define actionable steps to influence success

983150 Work with key individuals from various institutional areas to identifydata that may be available at an individual student level and that could becombined with other values to establish an assessment point for the stu-dent Next consider comparing this assessment point with the studentrsquossuccess level and attempt to identify some trends Drill down to indica-tors that can be used as targets for predicting success and for identifyingearly warning signs

983150 Ensure that the project is embedded in a cross-institutional student suc-cess effort that includes all relevant parties Dedicated student successteams or cross-departmental governance structures can be the vehiclefor organizing consensus Donrsquot allow a perception of IT ownership todevelop

983150 Resolve problems in academic and business processes before implemen-tation donlsquot adapt applications to dysfunctional processes

983150 Define the role of faculty in improving student outcomes through thestrategic leveraging of technology

983150 Determine how much individualized student data should be shared withadvisors in supporting improved student outcomes

Issue 5Demonstrating the

Business Value ofInformation Technologyand How Technology

and the IT OrganizationCan Help the Institution

Achieve Its Goals

IT leaders need to continue to get bet-ter at drawing the lines from technol-ogy initiatives to their institutionsrsquochanging strategic objectives and on

to the ultimate bottom lines of mis-sion and means Successfully demon-strating the business value of informationtechnology to the institution begins withdeveloping a clear understanding of the

various ways in which technology as awhole and the IT department as a unitadd value to the institution Institutionalleadersrsquo struggle to respond to changingpublic perceptions of the value of highereducation itself is a complicating factorHerein lies an opportunity for IT profes-sionals not only to demonstrate the value

of the IT organizationrsquos particular offer-ings but also to create new and significant value for the institution This requiresthinking of technology strategy as both aconsequence and a driver of institutionalstrategy IT leaders who have the abilityto see the entire institutional landscapeand can offer strategic insights for movingthe institution forward have never beenmore important to the well-being of col-leges and universities

ldquoInstead of reacting to new technologiestop institutions seek out new technologies

as a strategic imperative leveraging theseinnovations to improve learning insideand outside the classroom with datadecision making enhanced pedagogy andbetter student outcomesrdquo

mdashLisa M Davis Vice President for Information Services and Chief Information Officer

Georgetown University

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

So in what ways do IT leaders add value They add value to the organizationby enhancing the core productmdashnamelythe learning experiences of students and

the teaching activities of faculty They add value very directly by creating new chan-nels through which students can accessinstitutional offerings The channels thatonline opportunities provide would notexist without the technologies deliveredand supported by the IT organizationFrom a business perspective this cre-ates new sources of revenue a criticalobjective for virtually all colleges anduniversities Drawing a clear line that con-nects specific technology initiatives withtangible revenue for the institution is a

powerful way to demonstrate the busi-ness value of technologymdashand of the ITorganization

And of course the yin of revenue isbalanced by the yang of cost reductionStories of expense reduction and effi-ciency are perhaps easier to identify andtell and they should be carefully and dili-gently told but IT leaders must be carefulto also emphasize the much larger poten-tial that a clear focus on the revenue sidecan provide Doing so can help to avoid

the impression that the value of informa-tion technology is limited to simple actsof automation and efficiency Part of thiswork entails ensuring that the institu-tional leadership understands what is andis not possible Many times the need tohave the value discussion in the first placeis because leaders are not inherently feel-ing the value Those in the IT organiza-tion must take the time to develop andprovide clear data-based informationabout the services they deliver and valuethey provide

One way to demonstrate value iswith well-constructed service portfoliosand service catalogs A service portfolioprovides a high-level overview of howfunds are spent on major institutionalstrategic and operational goals and isgeared toward institutional leaders Aservice catalog (see Figure 7) provides amore detailed view into how IT dollarsare spent on IT projects products andservices and is geared toward IT leaders

Combined the service portfolio and theservice catalog can be a useful tool forshowing the business value of the invest-ments that institutions make in informa-tion technology

Assembling a service portfolio andcatalog may be the IT organizationrsquos firstcomprehensive view into the actual valueit is bringing to the institution Depend-ing on that value IT leaders may first needto focus on quick fixes to better align theirservices with the institutional mission

Before IT leaders can advocate howinformation technology can be leveragedto drive the business the IT organiza-tion must be operationally effective andefficient Institutional and business unitleaders must view the IT organizationas providing operational excellence andoutstanding customer service before theywill consider it as a partner in deliveringbusiness value

The CIO and IT leadership teamsshould remember that they are the pri-mary marketing avenue for sharing the

value that information technology bringsto the institutional mission IT leadersspend about 10 percent of their time ongovernance and planning and on innova-tion with business and academic units9 IT leaders thus must be intentional aboutidentifying opportunities for communi-cating how the IT organization is help-ing the institution CIOs must establish

strong and trusting relationships withtheir peer business leadersSharing the value of information

technology begins with IT leadership butmust extend to the entire IT organization

All IT staff must understand how theirwork contributes to the institutional mis-sions and priorities They need to under-stand the IT organizationrsquos capabilitiesand priorities and how the organizationcan advance the institution the indi-

vidual business units and the faculty stu-dents and staff with whom they work IT

leaders can encourage and enable IT staffto learn the mission business processesand requirements of business units inorder to understand how informationtechnology can best be leveraged Get-ting to this point may require a culturechange within the IT organization At the

very least all IT staff should know boththe institutional and the IT priorities toensure that everyone is telling the samestory

FIGURE 7 Percentage of Institutions with a Service Catalog

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

32

17

29

40

56

62

Source EDUCAUSE Core Data Service 2013

IT leaders add value

to the organization byenhancing the core

productmdashnamely thelearning experiences of

students and the teachingactivities of faculty

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1835

28 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Advice983150 Map IT priorities to institutional priorities Find the points of intersection

with the business unit operations customers and technology Partnerwith the business unit to develop a roadmap and to align the business withthe IT architecture

983150 Donrsquot wait for an invitation to discuss business and customer impact Butdonrsquot try to boil the ocean keep focused and be clear about what the IT

organization can and cannot do IT leaders must be translators usingterminology that resonates with non-IT experts and connecting the dotsbetween the technology capabilities and the business needs Develop asmall set of short and simple stories about concrete ways in which tech-nology has improved the learning experience at the institution createdaccess to institutional resources strengthened affinity for the institutiongenerated revenue and streamlined operations Focus at least as much onhelping others see what is possible with technology as on showing howtechnology investments improve current institutional life

983150 Develop a service catalog to serve as a base for connecting the work of theIT organization to the larger institutional strategic objectives

983150 Implement a metrics program that can demonstrate the extent to which theIT organization is achieving its service-level goals customer-satisfaction

goals and financial goals and is delivering on strategic priorities983150 Ensure that IT leaders and IT staff understand what drives academic and

business value for the institution and can identify and articulate how tech-nology can deliver that value Consider attending non-technology confer-ences to learn how business officers faculty and academic leaders thinkabout technology and what their pressing problems are Be the translatorfor business strategy

983150 To reach the broader institutional community consider newslettersbrown-bag gatherings and roundtable discussions and take advantageof recurring events such as National Cyber Security Awareness Month(httpwwweducauseeduncsam) and start-of-the-semester gatherings

Issue 6Increasing the IT

Organizationrsquos Capacityfor Managing Change

Despite DifferingCommunity Needs

Priorities and Abilities

Change is the watchword todayand going forward In the 2011book Race against the Machine MIT economists Erik Bryn-jolfsson and Andrew McAfee

write ldquoAdvances like the Googleautonomous car Watson the Jeop-ardy champion supercomputer andhigh-quality instantaneous machinetranslation then can be seen as thefirst examples of the kinds of digitalinnovations wersquoll see as we move into the phase where exponentialgrowth yields jaw-dropping resultsrdquo10

When technology changes organiza-tions are always challenged to adapt tonew circumstances This is par ticularlytrue of the organizations tasked with

implementing and maintaining thetechnology itselfThe higher education community

is struggling not only with the pace ofchange in information technology butalso with the variety and sheer volumeof change Information technology isincreasingly important to and increas-ingly integrated with all aspects ofboth the strategic and the operationalfunctions of the campus The chal-

ldquoWe also add value by creating newways for those who know us less well to

develop affinity with our institutions Asmall MOOC my college offered made usknown to groups of prospective studentswho would never have paid a momentrsquosattention to any traditional advertisingmessages we might have sent By joiningtheir party first via our technologies weput ourselves in a much better position to

invite them to our partyrdquomdashJames Kulich

Vice President and Chief Information OfficerElmhurst College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

lenge is how to engage multiple areasof the institution and expand servicesin numerous simultaneous initiativesMeanwhile institutional informa-

tion technology is reengineering itsinfrastructure platforms and servicesThose change efforts are often additiveto the applications being introduced aspart of new business-area initiatives

Ideally the institutional stancetoward change is proactive and ITleaders have the vision and good senseto advocate to broker and to preparetheir various constituents for upcom-ing changes while sustaining ongo-ing operations In reality end users

vary widely in their predisposition to

technology As a group students andfaculty are positively disposed towardinformation technology but as indi-

viduals they run the gamut (see Figure8) And attitudes influence behaviorthe way faculty and students adopt and

FIGURE 8 Relationship between Faculty Attitudes toward Online Learningand Their Experience with Online Teaching

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014(Louisville CO ECAR July 2014)

Percentage of respondents who agree or strongly agree

No recent onlineteaching

Some recentonline teaching

50250 75 100

All respondents

Online learning helps students learn more effectively

Online learning will lead to pedagogical breakthroughs

Online learning will make higher education available to more students

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2035

30 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

use technology tends to reflect theirattitudes11

The IT organizationrsquos history of exe-cution can influence community open-ness toward future technology changesThe shadow cast by a deeply flawed ERPimplementation for example can last adecade or longer

Change management is preciselythat managing change rather than lettingchange happen on its own (see Figure 9)

Successful change management is notaccidental or organic It is intentionaland has multiple components Manyinstitutions adopt a specific approachto implementing changemdashapproachessuch as ADKAR Kurt Lewinrsquos changemanagement model and John Kot-terrsquos eight steps12 Regardless of the

model managing change requires astrategy in which the goals and focusof the change are clear to internal andexternal constituents For examplethe corporate consultant Glenn Llopisadvises being able to identify what thesuccessful implementation of a changestrategy would look like knowing whatthe change strategy is trying to solveand identifying the required resourcesand relationships to implement the

change management strategy

13

As theIT organization sifts through the differ-ent needs abilities and priorities of theinstitution and tries to adapt to changeit must avoid being caught in a viciouscircle of tactics with no purpose

A good change management strat-egy has multiple components which

include communications and inclu-siveness John Jones DeAnne Agu-irre and Matthew Calderone provideten sensible principles for managing

change by keeping the human elementat the center14 Involving every level ofan organization creating ownershipassessing the cultural landscape andcommunicating effectively are keyfactors Change always affects some-body somewheremdashboth internally andexternally IT organizations must doeverything possible to find engagedpeople who can advocate on behalf ofthe change strategy It helps to havechampions at all levels executiveswho can demonstrate the institutional

leadersrsquo commitment area leaders whocan reinforce commitment with theirworkforce and explain how the change

will benefit their part of the institu-tion and individual influencers whocan help determine success factorsidentify and address pain points andevangelize with their colleagues

But change management involves

more than communications and inclu-siveness A successful change is a fullydesigned change Too often institu-tional leaders conflate new initiativeswith new systems and fail to fully thinkthrough and execute on the business-end components The successfulintroduction of a new system mightrequire new or reengineered businessprocesses new roles and even differ-ent organizational structures Every

ldquoTechnology is now integrated into just about

every aspect of our colleges and universitiesThat allows us a myriad of opportunitiesto use technology to help students succeedacademically Using technology to helpstudents succeed is at the core of what we dordquo

mdashSteve FleagleChief Information Officer and Associate Vice President

The University of Iowa

FIGURE 9 Percentage of Institutions That Have Implemented the ITIL ChangeManagement Process

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

23

13

25

30

44

44

Source EDUCAUSE Core Data Service 2013

Involvingevery level of an

organization creatingownership assessing thecultural landscape and

communicating effectivelyare key factors Changealways affects somebody

somewhere

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 11: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

expected In other cases cost savingsare theoretically possible but difficultto achieve if non-IT changes such asbusiness process redesign are requiredto realize them Even if the project is

successfully completed funding mayneed to shift to derive real institutionalsavings For example an IT project thatintroduces efficiencies to academicdepartments or business units mayreduce costs for the departments or units

and also for the institution overall butthe project may increase IT costs To real-ize net savings for the institution budgetfunding needs to be withdrawn from thedepartment and a portion needs to be

directed to the IT organization to coverits increased costs with the balanceaccruing to the bottom line of the insti-tution When each department controlsits own budget those shifts and realloca-tions are very difficult to negotiate and

often fall apart eroding any potentialcost savings

Growth can be managed but doingso requires service management models

that are able to project and prepare forgrowth Those models need to includecost management to ensure that serviceproviders understand and budget forboth fixed and variable costs The pay-ing IT customersmdashwhether institutionalleaders or individual departmentsmdashneedto understand IT service cost drivers andhow they can help manage those driv-ers Funding for growth in variable costsis relatively easy to justify if IT servicemanagers have and can show data onboth growth and the associated costs

Funding for growth in fixed costs needsto be justified as well and that requiresdata on the cost increases and a justifi-cation of the risks that will be reducedthe functionality that will be added orenhanced or some other compelling

FIGURE 5 IT Spending on Institutional Activities

Institutionalgrowth

Running theinstitution

Transformativechange

1576 9

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1235

22 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

reason This approach also paves the way for discussions of tradeoffs that mightaccommodate growth without increasing funding such as service-level reduc-tions shared services or outsourcing

Supporting innovation is a key piece of IT resource justification Studentsexist in a digital ecosystem and expect educational institutions to interact withthem in the ways that they are used to interacting with each other and with thecommercial entities they deal with on a daily basis Banks retail stores andeven government services are available to them through a multiplying swarmof devices Institutional leaders are increasingly aware that higher educationneeds to deliver services in the same way and that the development of an ITarchitecture to do so takes resources To better afford the resources necessaryto keep institutions current the IT organization itself needs to be innovativein the way it is organized the way it delivers IT services and the way it workswith various institutional constituencies Recognizing that IT drivers andcore services in 2014 may not even remotely resemble those necessary in 2020

demands funding flexibility since too tight a correlation will act as a disincen-tive to improvement and will create technology lags greater than those of thelast decade

Different but rigorous strategies for IT core services growth and innovationwill help in the development of IT funding models that best fit these separateactivities and are aligned with the institution and its constituents Effective ITgovernance can tie these three activities together and prioritize the IT expensein ways that support existing operations ensure ongoing innovation andrespond to growth across the entire IT portfolio

Advice983150 Benchmark IT finances by participating in the EDUCAUSE Core Data

Service983150 Ensure that IT projects build models for ongoing operational funding into

project deliverables and expectations983150 Establish an institutional IT governance structure that is responsible for allo-

cating funding not just identifying IT priorities983150 Understand the costs and cost drivers of todayrsquos IT services983150 Help leadership understand both the costs and the benefits of information

technology Arguments for new IT initiatives should always include cost esti-mates as well as estimates of the costs of not innovating

983150 Build the costs of growth and maintenance into funding models for core ITservices

Issue 4Improving Student

Outcomes through anInstitutional Approach

That StrategicallyLeverages Technology

The benefits of completing acollege education are widelyknown They include higherlifetime earnings greater levelsof happiness increased civic

engagement and reduced health risks

There are also societal benefits as theproportion of college graduates in thepopulation increases So it is in our ownbest interests to help both individualsand society by improving the successof students at our higher educationinstitutions

There are few cases in which tech-nology by itself has helped studentssucceed However there are opportuni-ties for technology to support studentsuccess initiatives The first task for anyinstitution is to assess both the insti-

tutional needs and the most currentremedies for the pain points that areidentified Although this is a constantlyand rapidly evolving area some specificexamples include the following

983150 Developin g a training course (orworkshop) to help students under-stand the technology landscape ofthe institution and how they can usethose tools to succeed

ldquoWhen it comes to innovation is the ITfunding principle lsquoWe optimize new IT

investments for the entire institutionrsquo orlsquoWe optimize new IT investments for theindividual unitsdepartmentsrsquo or bothPricing models will emerge accordinglyrdquo

mdashKarin Moyano CamihortDean of Online Learning and Academic Initiatives

Holyoke Community College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Removing barriersmdashs uch as accessusability and lack of supportmdashto theeffective use of technology

983150 Using technology to recast large lec-

ture courses and support pedagogi-cal transformations

983150 Using technology to provide flex-ibility for students to match thecourse with their learning style

983150 Using technology to distributelearning content in multiple waysincluding lectures (live and archivedfor review) electronic texts andlearning management systems

983150 Using technology such as peertutoring discussion boards andg roup videoconferences (eg

Google hangouts) to facilitate syn-chronous and asynchronous inter-actions with others and to promotecollaborative learning

983150 Considering the emerging role oftools used traditionally by business(ie CRM) to manage the institu-tionrsquos relationship with the student

983150 Applying elements of what is beinglearned in competency-based edu-cation initiatives at an institutionallevel for traditional students

Institutional leaders continueto emphasize and pour resourcesinto improving student retentionand completion Technology can beapplied to develop the broad area oflearning analytics to provide feedbackto students on their behavior (both pastand predictive) to faculty on the effec-tiveness of the pedagogy employed inthe course to content providers (andfaculty who select the content) on theeffectiveness of the content used in the

course and to administrators on broadsystemic issues and trendsMany colleges and universities

have student success committees thatfocus on initiatives to improve coursecompletion program completion andstudent support services Examplesof initiatives can be found in the areasof teaching and learning and studentsupport services In the area of reme-dial education great strides have been

made in reducing time to completionfor remedial students and in increas-ing retention and completion rates Anexample of the work occurring in the

area of student success can be found onthe Achieving the Dream InterventionsShowcase website (httpachievingthedreamorgresourcesachieving-the-dream-interventions-showcase) withmany of those interventions strategi-cally leveraging technology

As data analytics tools have becomemore sophisticated institutionshave been better able to recognizestudentsrsquo challenges and track stu-dentsrsquo journeys With theimplementation of early

alert systems advisors andfaculty have been able toassist students with just-in-time intervention recom-mendations In addition itis becoming commonplacefor advisors to have access todata beyond the traditionalERP demographic and stu-dent gradesmdashdata such ascourse performance throughlearning management sys-

tems early alert informationtutoring participation andeducation planning informa-tion (see Figure 6) Systemslike these sometimes referred to asIntegrated Planning and AdvisingServices (IPAS)8 permit the advisor tosupport and coach students based ona comprehensive view of the studentsrsquoinformation throughout their educa-

tional journey In the area of onlineeducation too wraparound studentsupport services are mirroring the on-ground experience with some colleges

and universities implementing careercoaches with supporting technologiesto provide services to online studentsThe integration of technologies in eachof these areas has had a positive impacton improving student outcomes

A variety of existing tools many stillin the early development stages canhelp institutions gather data to identifystudentsrsquo success opportunities andtheir achievements This information

is only as good as the data however Tofind the low-hanging fruit IT leadersneed to begin the data conversationsto locate tools that may already begenerating useful data To capture rele-

vant aspects of the student experience

FIGURE 6 Technology for Supporting Education Planning Advising and Counseling and Early Alerts

Source EDUCAUSE Core Data Service 2013

46

66

73

Early alert systems

Education planningacademicprogress tracking

Academic advising

Percentage of institutions

Tocapture relevant aspects

of the student experienceleaders must think institutionally

and identify technologyresources that canbring together the

diverse and enormousdata sets that represent this

experience

(continued on page 26)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1435

To create sustainable IT funding models IT leaders need to

clarify to institutional leaders and boards of trustees why

IT services are strategically important to the enterprise

TOP 10 IT ISSUES

EVOLVING STAFFING MODELS

IMPROVING

STUDENT

OUTCOMES

OPTIMIZING TECHNOLOGY IN

TEACHING AND LEARNING

FUNDING IT STRATEGICALLY

soft skills

moreresources

professional development

clear goals networking

65

Technical proficiency is as important as ever

So skills are more important that ever before

higher education IT staff are not

satisfied with their current position

To be more effective IT

staff say they need

of students wish their

instructors would use

early-alert systems more

of central ITrsquos budgetis spent running the institution

is spent on growth

is spent on transformation

Students respond

positively to learning

analytics opportunities

not at allimportant

technical proficiencystrategic planning

effective communication

1

veryimportant

5

Top 3 motivators for faculty integration of technology

in the classroom

bull Clear indicationevidence that students will benefit

bull Release time to designredesign courses

bull Confidence that the technology will work as planned

1 in 4

Todayrsquos market for IT talent is competitive Hiring andretaining top talent requires engaged managers whopossess and know how to foster good communication skills

Faculty and students alike are

interested in learning analytics for

notifications on course progress

Although technology is omnipresent in the lives ofstudents leveraging technology to engage students in

meaningful ways and to enhance learning is still evolving

76

15

9

I think this is great

This sounds positive

I am neutral

This sounds negative

Irsquom totallyagainst this

Spending model

breakdown in the USdoes not differsignificantly by

Institution type

Size

Central IT staff size

CIO reporting line

25

0

50

75

100

E D U C

A U S E E

R E S

E A R C

H S N

A P S H

O T

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1535

A look into EDUCAUSE research on the 2015 list of the

most intriguing ideas in higher education IT

DEMONSTRATING

VALUE OF IT

DEVELOPING

SECURITY

POLICIES FOR

THE INSTITUTION

DEVELOPING ENTERPRISE IT

ARCHITECTURE

BALANCING INFORMATION

SECURITY AND OPENNESS

INCREASING CAPACITY

FOR CHANGE

PROVIDING USER SUPPORT

The gaps between effectiveness in and

importance of addressing risks are large

Percentage using the college or university help desk for support

Percentage looking to peers

Student Device Ownership

Between 2005 and 2014 there were 727 education-sector

data breachesmdashinvolving more than 14 million recordsmdashas

reported to the Privacy Rights Clearinghouse

locally integrate the

architectures of multiple

major systems

follow the architecture of a

primary system or suite

20142013

25

0

50

75

100

2015 projection

Smartphones

Tablets

86

47

31

76

58

90

Information security

Data privacyconfidentiality

Identityaccess management

66

66

84

82

79

70

36

1

33

29

The most important IT risks to

address concern security privacy

and access

In a world of increasing

complex security threats

institutions must move from

a reactive to a proactive security response

We are living in an era when readily

accessible technologies facilitate a

BYOD standard requiring institutions

to rethink user support

A well-defined enterprise IT architecture is instrumental to

optimizing opportunities and managing change effectively

The higher education community is

struggling with the pace variety and sheer volume

of change in information technology as well as the

corresponding risks

IT leaders need to draw the lines from

technology initiatives to their institutionsrsquo

changing strategic objectives and on to the

ultimate bottom lines of mission and means

OtherLossthestInternal threatsExternal threats

81of institutions

do notaddress IT risk

in their strategicplan

7357

69

22

Faculty

Students

effectiveness

importance

effectiveness

importance

effectiveness

importance

6 3 10 10

Breachcauses

53Administration

37Teaching

and learning

10Researchother

Percentage of IT spend by institutional mission

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1635

26 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

leaders must think institutionally and identify technology resources that

can bring together the diverse and enormous data sets that represent thisexperience

As was discussed last year when this was the 1 issue in the 2014 Top 10list looking at this data may raise privacy issues so leaders must rememberto include the appropriate individuals in these discussions to ensure compli-ance security and privacy

Advice983150 Keep in mind that students consider success from a holistic view of their

campus experience not necessarily their experience with just a courseor a semester To maximize the impact of technology identify the combi-

nation of data and tools that will encompass as much of the institutionalexperience as possible983150 Remember that results will be only as good as the data Take time in the

beginning to build a reliable strategic foundation by starting with conciseoutcome objectives and then develop t he data-driven questions that willultimately define actionable steps to influence success

983150 Work with key individuals from various institutional areas to identifydata that may be available at an individual student level and that could becombined with other values to establish an assessment point for the stu-dent Next consider comparing this assessment point with the studentrsquossuccess level and attempt to identify some trends Drill down to indica-tors that can be used as targets for predicting success and for identifyingearly warning signs

983150 Ensure that the project is embedded in a cross-institutional student suc-cess effort that includes all relevant parties Dedicated student successteams or cross-departmental governance structures can be the vehiclefor organizing consensus Donrsquot allow a perception of IT ownership todevelop

983150 Resolve problems in academic and business processes before implemen-tation donlsquot adapt applications to dysfunctional processes

983150 Define the role of faculty in improving student outcomes through thestrategic leveraging of technology

983150 Determine how much individualized student data should be shared withadvisors in supporting improved student outcomes

Issue 5Demonstrating the

Business Value ofInformation Technologyand How Technology

and the IT OrganizationCan Help the Institution

Achieve Its Goals

IT leaders need to continue to get bet-ter at drawing the lines from technol-ogy initiatives to their institutionsrsquochanging strategic objectives and on

to the ultimate bottom lines of mis-sion and means Successfully demon-strating the business value of informationtechnology to the institution begins withdeveloping a clear understanding of the

various ways in which technology as awhole and the IT department as a unitadd value to the institution Institutionalleadersrsquo struggle to respond to changingpublic perceptions of the value of highereducation itself is a complicating factorHerein lies an opportunity for IT profes-sionals not only to demonstrate the value

of the IT organizationrsquos particular offer-ings but also to create new and significant value for the institution This requiresthinking of technology strategy as both aconsequence and a driver of institutionalstrategy IT leaders who have the abilityto see the entire institutional landscapeand can offer strategic insights for movingthe institution forward have never beenmore important to the well-being of col-leges and universities

ldquoInstead of reacting to new technologiestop institutions seek out new technologies

as a strategic imperative leveraging theseinnovations to improve learning insideand outside the classroom with datadecision making enhanced pedagogy andbetter student outcomesrdquo

mdashLisa M Davis Vice President for Information Services and Chief Information Officer

Georgetown University

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

So in what ways do IT leaders add value They add value to the organizationby enhancing the core productmdashnamelythe learning experiences of students and

the teaching activities of faculty They add value very directly by creating new chan-nels through which students can accessinstitutional offerings The channels thatonline opportunities provide would notexist without the technologies deliveredand supported by the IT organizationFrom a business perspective this cre-ates new sources of revenue a criticalobjective for virtually all colleges anduniversities Drawing a clear line that con-nects specific technology initiatives withtangible revenue for the institution is a

powerful way to demonstrate the busi-ness value of technologymdashand of the ITorganization

And of course the yin of revenue isbalanced by the yang of cost reductionStories of expense reduction and effi-ciency are perhaps easier to identify andtell and they should be carefully and dili-gently told but IT leaders must be carefulto also emphasize the much larger poten-tial that a clear focus on the revenue sidecan provide Doing so can help to avoid

the impression that the value of informa-tion technology is limited to simple actsof automation and efficiency Part of thiswork entails ensuring that the institu-tional leadership understands what is andis not possible Many times the need tohave the value discussion in the first placeis because leaders are not inherently feel-ing the value Those in the IT organiza-tion must take the time to develop andprovide clear data-based informationabout the services they deliver and valuethey provide

One way to demonstrate value iswith well-constructed service portfoliosand service catalogs A service portfolioprovides a high-level overview of howfunds are spent on major institutionalstrategic and operational goals and isgeared toward institutional leaders Aservice catalog (see Figure 7) provides amore detailed view into how IT dollarsare spent on IT projects products andservices and is geared toward IT leaders

Combined the service portfolio and theservice catalog can be a useful tool forshowing the business value of the invest-ments that institutions make in informa-tion technology

Assembling a service portfolio andcatalog may be the IT organizationrsquos firstcomprehensive view into the actual valueit is bringing to the institution Depend-ing on that value IT leaders may first needto focus on quick fixes to better align theirservices with the institutional mission

Before IT leaders can advocate howinformation technology can be leveragedto drive the business the IT organiza-tion must be operationally effective andefficient Institutional and business unitleaders must view the IT organizationas providing operational excellence andoutstanding customer service before theywill consider it as a partner in deliveringbusiness value

The CIO and IT leadership teamsshould remember that they are the pri-mary marketing avenue for sharing the

value that information technology bringsto the institutional mission IT leadersspend about 10 percent of their time ongovernance and planning and on innova-tion with business and academic units9 IT leaders thus must be intentional aboutidentifying opportunities for communi-cating how the IT organization is help-ing the institution CIOs must establish

strong and trusting relationships withtheir peer business leadersSharing the value of information

technology begins with IT leadership butmust extend to the entire IT organization

All IT staff must understand how theirwork contributes to the institutional mis-sions and priorities They need to under-stand the IT organizationrsquos capabilitiesand priorities and how the organizationcan advance the institution the indi-

vidual business units and the faculty stu-dents and staff with whom they work IT

leaders can encourage and enable IT staffto learn the mission business processesand requirements of business units inorder to understand how informationtechnology can best be leveraged Get-ting to this point may require a culturechange within the IT organization At the

very least all IT staff should know boththe institutional and the IT priorities toensure that everyone is telling the samestory

FIGURE 7 Percentage of Institutions with a Service Catalog

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

32

17

29

40

56

62

Source EDUCAUSE Core Data Service 2013

IT leaders add value

to the organization byenhancing the core

productmdashnamely thelearning experiences of

students and the teachingactivities of faculty

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1835

28 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Advice983150 Map IT priorities to institutional priorities Find the points of intersection

with the business unit operations customers and technology Partnerwith the business unit to develop a roadmap and to align the business withthe IT architecture

983150 Donrsquot wait for an invitation to discuss business and customer impact Butdonrsquot try to boil the ocean keep focused and be clear about what the IT

organization can and cannot do IT leaders must be translators usingterminology that resonates with non-IT experts and connecting the dotsbetween the technology capabilities and the business needs Develop asmall set of short and simple stories about concrete ways in which tech-nology has improved the learning experience at the institution createdaccess to institutional resources strengthened affinity for the institutiongenerated revenue and streamlined operations Focus at least as much onhelping others see what is possible with technology as on showing howtechnology investments improve current institutional life

983150 Develop a service catalog to serve as a base for connecting the work of theIT organization to the larger institutional strategic objectives

983150 Implement a metrics program that can demonstrate the extent to which theIT organization is achieving its service-level goals customer-satisfaction

goals and financial goals and is delivering on strategic priorities983150 Ensure that IT leaders and IT staff understand what drives academic and

business value for the institution and can identify and articulate how tech-nology can deliver that value Consider attending non-technology confer-ences to learn how business officers faculty and academic leaders thinkabout technology and what their pressing problems are Be the translatorfor business strategy

983150 To reach the broader institutional community consider newslettersbrown-bag gatherings and roundtable discussions and take advantageof recurring events such as National Cyber Security Awareness Month(httpwwweducauseeduncsam) and start-of-the-semester gatherings

Issue 6Increasing the IT

Organizationrsquos Capacityfor Managing Change

Despite DifferingCommunity Needs

Priorities and Abilities

Change is the watchword todayand going forward In the 2011book Race against the Machine MIT economists Erik Bryn-jolfsson and Andrew McAfee

write ldquoAdvances like the Googleautonomous car Watson the Jeop-ardy champion supercomputer andhigh-quality instantaneous machinetranslation then can be seen as thefirst examples of the kinds of digitalinnovations wersquoll see as we move into the phase where exponentialgrowth yields jaw-dropping resultsrdquo10

When technology changes organiza-tions are always challenged to adapt tonew circumstances This is par ticularlytrue of the organizations tasked with

implementing and maintaining thetechnology itselfThe higher education community

is struggling not only with the pace ofchange in information technology butalso with the variety and sheer volumeof change Information technology isincreasingly important to and increas-ingly integrated with all aspects ofboth the strategic and the operationalfunctions of the campus The chal-

ldquoWe also add value by creating newways for those who know us less well to

develop affinity with our institutions Asmall MOOC my college offered made usknown to groups of prospective studentswho would never have paid a momentrsquosattention to any traditional advertisingmessages we might have sent By joiningtheir party first via our technologies weput ourselves in a much better position to

invite them to our partyrdquomdashJames Kulich

Vice President and Chief Information OfficerElmhurst College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

lenge is how to engage multiple areasof the institution and expand servicesin numerous simultaneous initiativesMeanwhile institutional informa-

tion technology is reengineering itsinfrastructure platforms and servicesThose change efforts are often additiveto the applications being introduced aspart of new business-area initiatives

Ideally the institutional stancetoward change is proactive and ITleaders have the vision and good senseto advocate to broker and to preparetheir various constituents for upcom-ing changes while sustaining ongo-ing operations In reality end users

vary widely in their predisposition to

technology As a group students andfaculty are positively disposed towardinformation technology but as indi-

viduals they run the gamut (see Figure8) And attitudes influence behaviorthe way faculty and students adopt and

FIGURE 8 Relationship between Faculty Attitudes toward Online Learningand Their Experience with Online Teaching

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014(Louisville CO ECAR July 2014)

Percentage of respondents who agree or strongly agree

No recent onlineteaching

Some recentonline teaching

50250 75 100

All respondents

Online learning helps students learn more effectively

Online learning will lead to pedagogical breakthroughs

Online learning will make higher education available to more students

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2035

30 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

use technology tends to reflect theirattitudes11

The IT organizationrsquos history of exe-cution can influence community open-ness toward future technology changesThe shadow cast by a deeply flawed ERPimplementation for example can last adecade or longer

Change management is preciselythat managing change rather than lettingchange happen on its own (see Figure 9)

Successful change management is notaccidental or organic It is intentionaland has multiple components Manyinstitutions adopt a specific approachto implementing changemdashapproachessuch as ADKAR Kurt Lewinrsquos changemanagement model and John Kot-terrsquos eight steps12 Regardless of the

model managing change requires astrategy in which the goals and focusof the change are clear to internal andexternal constituents For examplethe corporate consultant Glenn Llopisadvises being able to identify what thesuccessful implementation of a changestrategy would look like knowing whatthe change strategy is trying to solveand identifying the required resourcesand relationships to implement the

change management strategy

13

As theIT organization sifts through the differ-ent needs abilities and priorities of theinstitution and tries to adapt to changeit must avoid being caught in a viciouscircle of tactics with no purpose

A good change management strat-egy has multiple components which

include communications and inclu-siveness John Jones DeAnne Agu-irre and Matthew Calderone provideten sensible principles for managing

change by keeping the human elementat the center14 Involving every level ofan organization creating ownershipassessing the cultural landscape andcommunicating effectively are keyfactors Change always affects some-body somewheremdashboth internally andexternally IT organizations must doeverything possible to find engagedpeople who can advocate on behalf ofthe change strategy It helps to havechampions at all levels executiveswho can demonstrate the institutional

leadersrsquo commitment area leaders whocan reinforce commitment with theirworkforce and explain how the change

will benefit their part of the institu-tion and individual influencers whocan help determine success factorsidentify and address pain points andevangelize with their colleagues

But change management involves

more than communications and inclu-siveness A successful change is a fullydesigned change Too often institu-tional leaders conflate new initiativeswith new systems and fail to fully thinkthrough and execute on the business-end components The successfulintroduction of a new system mightrequire new or reengineered businessprocesses new roles and even differ-ent organizational structures Every

ldquoTechnology is now integrated into just about

every aspect of our colleges and universitiesThat allows us a myriad of opportunitiesto use technology to help students succeedacademically Using technology to helpstudents succeed is at the core of what we dordquo

mdashSteve FleagleChief Information Officer and Associate Vice President

The University of Iowa

FIGURE 9 Percentage of Institutions That Have Implemented the ITIL ChangeManagement Process

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

23

13

25

30

44

44

Source EDUCAUSE Core Data Service 2013

Involvingevery level of an

organization creatingownership assessing thecultural landscape and

communicating effectivelyare key factors Changealways affects somebody

somewhere

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 12: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1235

22 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

reason This approach also paves the way for discussions of tradeoffs that mightaccommodate growth without increasing funding such as service-level reduc-tions shared services or outsourcing

Supporting innovation is a key piece of IT resource justification Studentsexist in a digital ecosystem and expect educational institutions to interact withthem in the ways that they are used to interacting with each other and with thecommercial entities they deal with on a daily basis Banks retail stores andeven government services are available to them through a multiplying swarmof devices Institutional leaders are increasingly aware that higher educationneeds to deliver services in the same way and that the development of an ITarchitecture to do so takes resources To better afford the resources necessaryto keep institutions current the IT organization itself needs to be innovativein the way it is organized the way it delivers IT services and the way it workswith various institutional constituencies Recognizing that IT drivers andcore services in 2014 may not even remotely resemble those necessary in 2020

demands funding flexibility since too tight a correlation will act as a disincen-tive to improvement and will create technology lags greater than those of thelast decade

Different but rigorous strategies for IT core services growth and innovationwill help in the development of IT funding models that best fit these separateactivities and are aligned with the institution and its constituents Effective ITgovernance can tie these three activities together and prioritize the IT expensein ways that support existing operations ensure ongoing innovation andrespond to growth across the entire IT portfolio

Advice983150 Benchmark IT finances by participating in the EDUCAUSE Core Data

Service983150 Ensure that IT projects build models for ongoing operational funding into

project deliverables and expectations983150 Establish an institutional IT governance structure that is responsible for allo-

cating funding not just identifying IT priorities983150 Understand the costs and cost drivers of todayrsquos IT services983150 Help leadership understand both the costs and the benefits of information

technology Arguments for new IT initiatives should always include cost esti-mates as well as estimates of the costs of not innovating

983150 Build the costs of growth and maintenance into funding models for core ITservices

Issue 4Improving Student

Outcomes through anInstitutional Approach

That StrategicallyLeverages Technology

The benefits of completing acollege education are widelyknown They include higherlifetime earnings greater levelsof happiness increased civic

engagement and reduced health risks

There are also societal benefits as theproportion of college graduates in thepopulation increases So it is in our ownbest interests to help both individualsand society by improving the successof students at our higher educationinstitutions

There are few cases in which tech-nology by itself has helped studentssucceed However there are opportuni-ties for technology to support studentsuccess initiatives The first task for anyinstitution is to assess both the insti-

tutional needs and the most currentremedies for the pain points that areidentified Although this is a constantlyand rapidly evolving area some specificexamples include the following

983150 Developin g a training course (orworkshop) to help students under-stand the technology landscape ofthe institution and how they can usethose tools to succeed

ldquoWhen it comes to innovation is the ITfunding principle lsquoWe optimize new IT

investments for the entire institutionrsquo orlsquoWe optimize new IT investments for theindividual unitsdepartmentsrsquo or bothPricing models will emerge accordinglyrdquo

mdashKarin Moyano CamihortDean of Online Learning and Academic Initiatives

Holyoke Community College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Removing barriersmdashs uch as accessusability and lack of supportmdashto theeffective use of technology

983150 Using technology to recast large lec-

ture courses and support pedagogi-cal transformations

983150 Using technology to provide flex-ibility for students to match thecourse with their learning style

983150 Using technology to distributelearning content in multiple waysincluding lectures (live and archivedfor review) electronic texts andlearning management systems

983150 Using technology such as peertutoring discussion boards andg roup videoconferences (eg

Google hangouts) to facilitate syn-chronous and asynchronous inter-actions with others and to promotecollaborative learning

983150 Considering the emerging role oftools used traditionally by business(ie CRM) to manage the institu-tionrsquos relationship with the student

983150 Applying elements of what is beinglearned in competency-based edu-cation initiatives at an institutionallevel for traditional students

Institutional leaders continueto emphasize and pour resourcesinto improving student retentionand completion Technology can beapplied to develop the broad area oflearning analytics to provide feedbackto students on their behavior (both pastand predictive) to faculty on the effec-tiveness of the pedagogy employed inthe course to content providers (andfaculty who select the content) on theeffectiveness of the content used in the

course and to administrators on broadsystemic issues and trendsMany colleges and universities

have student success committees thatfocus on initiatives to improve coursecompletion program completion andstudent support services Examplesof initiatives can be found in the areasof teaching and learning and studentsupport services In the area of reme-dial education great strides have been

made in reducing time to completionfor remedial students and in increas-ing retention and completion rates Anexample of the work occurring in the

area of student success can be found onthe Achieving the Dream InterventionsShowcase website (httpachievingthedreamorgresourcesachieving-the-dream-interventions-showcase) withmany of those interventions strategi-cally leveraging technology

As data analytics tools have becomemore sophisticated institutionshave been better able to recognizestudentsrsquo challenges and track stu-dentsrsquo journeys With theimplementation of early

alert systems advisors andfaculty have been able toassist students with just-in-time intervention recom-mendations In addition itis becoming commonplacefor advisors to have access todata beyond the traditionalERP demographic and stu-dent gradesmdashdata such ascourse performance throughlearning management sys-

tems early alert informationtutoring participation andeducation planning informa-tion (see Figure 6) Systemslike these sometimes referred to asIntegrated Planning and AdvisingServices (IPAS)8 permit the advisor tosupport and coach students based ona comprehensive view of the studentsrsquoinformation throughout their educa-

tional journey In the area of onlineeducation too wraparound studentsupport services are mirroring the on-ground experience with some colleges

and universities implementing careercoaches with supporting technologiesto provide services to online studentsThe integration of technologies in eachof these areas has had a positive impacton improving student outcomes

A variety of existing tools many stillin the early development stages canhelp institutions gather data to identifystudentsrsquo success opportunities andtheir achievements This information

is only as good as the data however Tofind the low-hanging fruit IT leadersneed to begin the data conversationsto locate tools that may already begenerating useful data To capture rele-

vant aspects of the student experience

FIGURE 6 Technology for Supporting Education Planning Advising and Counseling and Early Alerts

Source EDUCAUSE Core Data Service 2013

46

66

73

Early alert systems

Education planningacademicprogress tracking

Academic advising

Percentage of institutions

Tocapture relevant aspects

of the student experienceleaders must think institutionally

and identify technologyresources that canbring together the

diverse and enormousdata sets that represent this

experience

(continued on page 26)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1435

To create sustainable IT funding models IT leaders need to

clarify to institutional leaders and boards of trustees why

IT services are strategically important to the enterprise

TOP 10 IT ISSUES

EVOLVING STAFFING MODELS

IMPROVING

STUDENT

OUTCOMES

OPTIMIZING TECHNOLOGY IN

TEACHING AND LEARNING

FUNDING IT STRATEGICALLY

soft skills

moreresources

professional development

clear goals networking

65

Technical proficiency is as important as ever

So skills are more important that ever before

higher education IT staff are not

satisfied with their current position

To be more effective IT

staff say they need

of students wish their

instructors would use

early-alert systems more

of central ITrsquos budgetis spent running the institution

is spent on growth

is spent on transformation

Students respond

positively to learning

analytics opportunities

not at allimportant

technical proficiencystrategic planning

effective communication

1

veryimportant

5

Top 3 motivators for faculty integration of technology

in the classroom

bull Clear indicationevidence that students will benefit

bull Release time to designredesign courses

bull Confidence that the technology will work as planned

1 in 4

Todayrsquos market for IT talent is competitive Hiring andretaining top talent requires engaged managers whopossess and know how to foster good communication skills

Faculty and students alike are

interested in learning analytics for

notifications on course progress

Although technology is omnipresent in the lives ofstudents leveraging technology to engage students in

meaningful ways and to enhance learning is still evolving

76

15

9

I think this is great

This sounds positive

I am neutral

This sounds negative

Irsquom totallyagainst this

Spending model

breakdown in the USdoes not differsignificantly by

Institution type

Size

Central IT staff size

CIO reporting line

25

0

50

75

100

E D U C

A U S E E

R E S

E A R C

H S N

A P S H

O T

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1535

A look into EDUCAUSE research on the 2015 list of the

most intriguing ideas in higher education IT

DEMONSTRATING

VALUE OF IT

DEVELOPING

SECURITY

POLICIES FOR

THE INSTITUTION

DEVELOPING ENTERPRISE IT

ARCHITECTURE

BALANCING INFORMATION

SECURITY AND OPENNESS

INCREASING CAPACITY

FOR CHANGE

PROVIDING USER SUPPORT

The gaps between effectiveness in and

importance of addressing risks are large

Percentage using the college or university help desk for support

Percentage looking to peers

Student Device Ownership

Between 2005 and 2014 there were 727 education-sector

data breachesmdashinvolving more than 14 million recordsmdashas

reported to the Privacy Rights Clearinghouse

locally integrate the

architectures of multiple

major systems

follow the architecture of a

primary system or suite

20142013

25

0

50

75

100

2015 projection

Smartphones

Tablets

86

47

31

76

58

90

Information security

Data privacyconfidentiality

Identityaccess management

66

66

84

82

79

70

36

1

33

29

The most important IT risks to

address concern security privacy

and access

In a world of increasing

complex security threats

institutions must move from

a reactive to a proactive security response

We are living in an era when readily

accessible technologies facilitate a

BYOD standard requiring institutions

to rethink user support

A well-defined enterprise IT architecture is instrumental to

optimizing opportunities and managing change effectively

The higher education community is

struggling with the pace variety and sheer volume

of change in information technology as well as the

corresponding risks

IT leaders need to draw the lines from

technology initiatives to their institutionsrsquo

changing strategic objectives and on to the

ultimate bottom lines of mission and means

OtherLossthestInternal threatsExternal threats

81of institutions

do notaddress IT risk

in their strategicplan

7357

69

22

Faculty

Students

effectiveness

importance

effectiveness

importance

effectiveness

importance

6 3 10 10

Breachcauses

53Administration

37Teaching

and learning

10Researchother

Percentage of IT spend by institutional mission

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1635

26 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

leaders must think institutionally and identify technology resources that

can bring together the diverse and enormous data sets that represent thisexperience

As was discussed last year when this was the 1 issue in the 2014 Top 10list looking at this data may raise privacy issues so leaders must rememberto include the appropriate individuals in these discussions to ensure compli-ance security and privacy

Advice983150 Keep in mind that students consider success from a holistic view of their

campus experience not necessarily their experience with just a courseor a semester To maximize the impact of technology identify the combi-

nation of data and tools that will encompass as much of the institutionalexperience as possible983150 Remember that results will be only as good as the data Take time in the

beginning to build a reliable strategic foundation by starting with conciseoutcome objectives and then develop t he data-driven questions that willultimately define actionable steps to influence success

983150 Work with key individuals from various institutional areas to identifydata that may be available at an individual student level and that could becombined with other values to establish an assessment point for the stu-dent Next consider comparing this assessment point with the studentrsquossuccess level and attempt to identify some trends Drill down to indica-tors that can be used as targets for predicting success and for identifyingearly warning signs

983150 Ensure that the project is embedded in a cross-institutional student suc-cess effort that includes all relevant parties Dedicated student successteams or cross-departmental governance structures can be the vehiclefor organizing consensus Donrsquot allow a perception of IT ownership todevelop

983150 Resolve problems in academic and business processes before implemen-tation donlsquot adapt applications to dysfunctional processes

983150 Define the role of faculty in improving student outcomes through thestrategic leveraging of technology

983150 Determine how much individualized student data should be shared withadvisors in supporting improved student outcomes

Issue 5Demonstrating the

Business Value ofInformation Technologyand How Technology

and the IT OrganizationCan Help the Institution

Achieve Its Goals

IT leaders need to continue to get bet-ter at drawing the lines from technol-ogy initiatives to their institutionsrsquochanging strategic objectives and on

to the ultimate bottom lines of mis-sion and means Successfully demon-strating the business value of informationtechnology to the institution begins withdeveloping a clear understanding of the

various ways in which technology as awhole and the IT department as a unitadd value to the institution Institutionalleadersrsquo struggle to respond to changingpublic perceptions of the value of highereducation itself is a complicating factorHerein lies an opportunity for IT profes-sionals not only to demonstrate the value

of the IT organizationrsquos particular offer-ings but also to create new and significant value for the institution This requiresthinking of technology strategy as both aconsequence and a driver of institutionalstrategy IT leaders who have the abilityto see the entire institutional landscapeand can offer strategic insights for movingthe institution forward have never beenmore important to the well-being of col-leges and universities

ldquoInstead of reacting to new technologiestop institutions seek out new technologies

as a strategic imperative leveraging theseinnovations to improve learning insideand outside the classroom with datadecision making enhanced pedagogy andbetter student outcomesrdquo

mdashLisa M Davis Vice President for Information Services and Chief Information Officer

Georgetown University

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

So in what ways do IT leaders add value They add value to the organizationby enhancing the core productmdashnamelythe learning experiences of students and

the teaching activities of faculty They add value very directly by creating new chan-nels through which students can accessinstitutional offerings The channels thatonline opportunities provide would notexist without the technologies deliveredand supported by the IT organizationFrom a business perspective this cre-ates new sources of revenue a criticalobjective for virtually all colleges anduniversities Drawing a clear line that con-nects specific technology initiatives withtangible revenue for the institution is a

powerful way to demonstrate the busi-ness value of technologymdashand of the ITorganization

And of course the yin of revenue isbalanced by the yang of cost reductionStories of expense reduction and effi-ciency are perhaps easier to identify andtell and they should be carefully and dili-gently told but IT leaders must be carefulto also emphasize the much larger poten-tial that a clear focus on the revenue sidecan provide Doing so can help to avoid

the impression that the value of informa-tion technology is limited to simple actsof automation and efficiency Part of thiswork entails ensuring that the institu-tional leadership understands what is andis not possible Many times the need tohave the value discussion in the first placeis because leaders are not inherently feel-ing the value Those in the IT organiza-tion must take the time to develop andprovide clear data-based informationabout the services they deliver and valuethey provide

One way to demonstrate value iswith well-constructed service portfoliosand service catalogs A service portfolioprovides a high-level overview of howfunds are spent on major institutionalstrategic and operational goals and isgeared toward institutional leaders Aservice catalog (see Figure 7) provides amore detailed view into how IT dollarsare spent on IT projects products andservices and is geared toward IT leaders

Combined the service portfolio and theservice catalog can be a useful tool forshowing the business value of the invest-ments that institutions make in informa-tion technology

Assembling a service portfolio andcatalog may be the IT organizationrsquos firstcomprehensive view into the actual valueit is bringing to the institution Depend-ing on that value IT leaders may first needto focus on quick fixes to better align theirservices with the institutional mission

Before IT leaders can advocate howinformation technology can be leveragedto drive the business the IT organiza-tion must be operationally effective andefficient Institutional and business unitleaders must view the IT organizationas providing operational excellence andoutstanding customer service before theywill consider it as a partner in deliveringbusiness value

The CIO and IT leadership teamsshould remember that they are the pri-mary marketing avenue for sharing the

value that information technology bringsto the institutional mission IT leadersspend about 10 percent of their time ongovernance and planning and on innova-tion with business and academic units9 IT leaders thus must be intentional aboutidentifying opportunities for communi-cating how the IT organization is help-ing the institution CIOs must establish

strong and trusting relationships withtheir peer business leadersSharing the value of information

technology begins with IT leadership butmust extend to the entire IT organization

All IT staff must understand how theirwork contributes to the institutional mis-sions and priorities They need to under-stand the IT organizationrsquos capabilitiesand priorities and how the organizationcan advance the institution the indi-

vidual business units and the faculty stu-dents and staff with whom they work IT

leaders can encourage and enable IT staffto learn the mission business processesand requirements of business units inorder to understand how informationtechnology can best be leveraged Get-ting to this point may require a culturechange within the IT organization At the

very least all IT staff should know boththe institutional and the IT priorities toensure that everyone is telling the samestory

FIGURE 7 Percentage of Institutions with a Service Catalog

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

32

17

29

40

56

62

Source EDUCAUSE Core Data Service 2013

IT leaders add value

to the organization byenhancing the core

productmdashnamely thelearning experiences of

students and the teachingactivities of faculty

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1835

28 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Advice983150 Map IT priorities to institutional priorities Find the points of intersection

with the business unit operations customers and technology Partnerwith the business unit to develop a roadmap and to align the business withthe IT architecture

983150 Donrsquot wait for an invitation to discuss business and customer impact Butdonrsquot try to boil the ocean keep focused and be clear about what the IT

organization can and cannot do IT leaders must be translators usingterminology that resonates with non-IT experts and connecting the dotsbetween the technology capabilities and the business needs Develop asmall set of short and simple stories about concrete ways in which tech-nology has improved the learning experience at the institution createdaccess to institutional resources strengthened affinity for the institutiongenerated revenue and streamlined operations Focus at least as much onhelping others see what is possible with technology as on showing howtechnology investments improve current institutional life

983150 Develop a service catalog to serve as a base for connecting the work of theIT organization to the larger institutional strategic objectives

983150 Implement a metrics program that can demonstrate the extent to which theIT organization is achieving its service-level goals customer-satisfaction

goals and financial goals and is delivering on strategic priorities983150 Ensure that IT leaders and IT staff understand what drives academic and

business value for the institution and can identify and articulate how tech-nology can deliver that value Consider attending non-technology confer-ences to learn how business officers faculty and academic leaders thinkabout technology and what their pressing problems are Be the translatorfor business strategy

983150 To reach the broader institutional community consider newslettersbrown-bag gatherings and roundtable discussions and take advantageof recurring events such as National Cyber Security Awareness Month(httpwwweducauseeduncsam) and start-of-the-semester gatherings

Issue 6Increasing the IT

Organizationrsquos Capacityfor Managing Change

Despite DifferingCommunity Needs

Priorities and Abilities

Change is the watchword todayand going forward In the 2011book Race against the Machine MIT economists Erik Bryn-jolfsson and Andrew McAfee

write ldquoAdvances like the Googleautonomous car Watson the Jeop-ardy champion supercomputer andhigh-quality instantaneous machinetranslation then can be seen as thefirst examples of the kinds of digitalinnovations wersquoll see as we move into the phase where exponentialgrowth yields jaw-dropping resultsrdquo10

When technology changes organiza-tions are always challenged to adapt tonew circumstances This is par ticularlytrue of the organizations tasked with

implementing and maintaining thetechnology itselfThe higher education community

is struggling not only with the pace ofchange in information technology butalso with the variety and sheer volumeof change Information technology isincreasingly important to and increas-ingly integrated with all aspects ofboth the strategic and the operationalfunctions of the campus The chal-

ldquoWe also add value by creating newways for those who know us less well to

develop affinity with our institutions Asmall MOOC my college offered made usknown to groups of prospective studentswho would never have paid a momentrsquosattention to any traditional advertisingmessages we might have sent By joiningtheir party first via our technologies weput ourselves in a much better position to

invite them to our partyrdquomdashJames Kulich

Vice President and Chief Information OfficerElmhurst College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

lenge is how to engage multiple areasof the institution and expand servicesin numerous simultaneous initiativesMeanwhile institutional informa-

tion technology is reengineering itsinfrastructure platforms and servicesThose change efforts are often additiveto the applications being introduced aspart of new business-area initiatives

Ideally the institutional stancetoward change is proactive and ITleaders have the vision and good senseto advocate to broker and to preparetheir various constituents for upcom-ing changes while sustaining ongo-ing operations In reality end users

vary widely in their predisposition to

technology As a group students andfaculty are positively disposed towardinformation technology but as indi-

viduals they run the gamut (see Figure8) And attitudes influence behaviorthe way faculty and students adopt and

FIGURE 8 Relationship between Faculty Attitudes toward Online Learningand Their Experience with Online Teaching

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014(Louisville CO ECAR July 2014)

Percentage of respondents who agree or strongly agree

No recent onlineteaching

Some recentonline teaching

50250 75 100

All respondents

Online learning helps students learn more effectively

Online learning will lead to pedagogical breakthroughs

Online learning will make higher education available to more students

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2035

30 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

use technology tends to reflect theirattitudes11

The IT organizationrsquos history of exe-cution can influence community open-ness toward future technology changesThe shadow cast by a deeply flawed ERPimplementation for example can last adecade or longer

Change management is preciselythat managing change rather than lettingchange happen on its own (see Figure 9)

Successful change management is notaccidental or organic It is intentionaland has multiple components Manyinstitutions adopt a specific approachto implementing changemdashapproachessuch as ADKAR Kurt Lewinrsquos changemanagement model and John Kot-terrsquos eight steps12 Regardless of the

model managing change requires astrategy in which the goals and focusof the change are clear to internal andexternal constituents For examplethe corporate consultant Glenn Llopisadvises being able to identify what thesuccessful implementation of a changestrategy would look like knowing whatthe change strategy is trying to solveand identifying the required resourcesand relationships to implement the

change management strategy

13

As theIT organization sifts through the differ-ent needs abilities and priorities of theinstitution and tries to adapt to changeit must avoid being caught in a viciouscircle of tactics with no purpose

A good change management strat-egy has multiple components which

include communications and inclu-siveness John Jones DeAnne Agu-irre and Matthew Calderone provideten sensible principles for managing

change by keeping the human elementat the center14 Involving every level ofan organization creating ownershipassessing the cultural landscape andcommunicating effectively are keyfactors Change always affects some-body somewheremdashboth internally andexternally IT organizations must doeverything possible to find engagedpeople who can advocate on behalf ofthe change strategy It helps to havechampions at all levels executiveswho can demonstrate the institutional

leadersrsquo commitment area leaders whocan reinforce commitment with theirworkforce and explain how the change

will benefit their part of the institu-tion and individual influencers whocan help determine success factorsidentify and address pain points andevangelize with their colleagues

But change management involves

more than communications and inclu-siveness A successful change is a fullydesigned change Too often institu-tional leaders conflate new initiativeswith new systems and fail to fully thinkthrough and execute on the business-end components The successfulintroduction of a new system mightrequire new or reengineered businessprocesses new roles and even differ-ent organizational structures Every

ldquoTechnology is now integrated into just about

every aspect of our colleges and universitiesThat allows us a myriad of opportunitiesto use technology to help students succeedacademically Using technology to helpstudents succeed is at the core of what we dordquo

mdashSteve FleagleChief Information Officer and Associate Vice President

The University of Iowa

FIGURE 9 Percentage of Institutions That Have Implemented the ITIL ChangeManagement Process

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

23

13

25

30

44

44

Source EDUCAUSE Core Data Service 2013

Involvingevery level of an

organization creatingownership assessing thecultural landscape and

communicating effectivelyare key factors Changealways affects somebody

somewhere

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 13: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Removing barriersmdashs uch as accessusability and lack of supportmdashto theeffective use of technology

983150 Using technology to recast large lec-

ture courses and support pedagogi-cal transformations

983150 Using technology to provide flex-ibility for students to match thecourse with their learning style

983150 Using technology to distributelearning content in multiple waysincluding lectures (live and archivedfor review) electronic texts andlearning management systems

983150 Using technology such as peertutoring discussion boards andg roup videoconferences (eg

Google hangouts) to facilitate syn-chronous and asynchronous inter-actions with others and to promotecollaborative learning

983150 Considering the emerging role oftools used traditionally by business(ie CRM) to manage the institu-tionrsquos relationship with the student

983150 Applying elements of what is beinglearned in competency-based edu-cation initiatives at an institutionallevel for traditional students

Institutional leaders continueto emphasize and pour resourcesinto improving student retentionand completion Technology can beapplied to develop the broad area oflearning analytics to provide feedbackto students on their behavior (both pastand predictive) to faculty on the effec-tiveness of the pedagogy employed inthe course to content providers (andfaculty who select the content) on theeffectiveness of the content used in the

course and to administrators on broadsystemic issues and trendsMany colleges and universities

have student success committees thatfocus on initiatives to improve coursecompletion program completion andstudent support services Examplesof initiatives can be found in the areasof teaching and learning and studentsupport services In the area of reme-dial education great strides have been

made in reducing time to completionfor remedial students and in increas-ing retention and completion rates Anexample of the work occurring in the

area of student success can be found onthe Achieving the Dream InterventionsShowcase website (httpachievingthedreamorgresourcesachieving-the-dream-interventions-showcase) withmany of those interventions strategi-cally leveraging technology

As data analytics tools have becomemore sophisticated institutionshave been better able to recognizestudentsrsquo challenges and track stu-dentsrsquo journeys With theimplementation of early

alert systems advisors andfaculty have been able toassist students with just-in-time intervention recom-mendations In addition itis becoming commonplacefor advisors to have access todata beyond the traditionalERP demographic and stu-dent gradesmdashdata such ascourse performance throughlearning management sys-

tems early alert informationtutoring participation andeducation planning informa-tion (see Figure 6) Systemslike these sometimes referred to asIntegrated Planning and AdvisingServices (IPAS)8 permit the advisor tosupport and coach students based ona comprehensive view of the studentsrsquoinformation throughout their educa-

tional journey In the area of onlineeducation too wraparound studentsupport services are mirroring the on-ground experience with some colleges

and universities implementing careercoaches with supporting technologiesto provide services to online studentsThe integration of technologies in eachof these areas has had a positive impacton improving student outcomes

A variety of existing tools many stillin the early development stages canhelp institutions gather data to identifystudentsrsquo success opportunities andtheir achievements This information

is only as good as the data however Tofind the low-hanging fruit IT leadersneed to begin the data conversationsto locate tools that may already begenerating useful data To capture rele-

vant aspects of the student experience

FIGURE 6 Technology for Supporting Education Planning Advising and Counseling and Early Alerts

Source EDUCAUSE Core Data Service 2013

46

66

73

Early alert systems

Education planningacademicprogress tracking

Academic advising

Percentage of institutions

Tocapture relevant aspects

of the student experienceleaders must think institutionally

and identify technologyresources that canbring together the

diverse and enormousdata sets that represent this

experience

(continued on page 26)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1435

To create sustainable IT funding models IT leaders need to

clarify to institutional leaders and boards of trustees why

IT services are strategically important to the enterprise

TOP 10 IT ISSUES

EVOLVING STAFFING MODELS

IMPROVING

STUDENT

OUTCOMES

OPTIMIZING TECHNOLOGY IN

TEACHING AND LEARNING

FUNDING IT STRATEGICALLY

soft skills

moreresources

professional development

clear goals networking

65

Technical proficiency is as important as ever

So skills are more important that ever before

higher education IT staff are not

satisfied with their current position

To be more effective IT

staff say they need

of students wish their

instructors would use

early-alert systems more

of central ITrsquos budgetis spent running the institution

is spent on growth

is spent on transformation

Students respond

positively to learning

analytics opportunities

not at allimportant

technical proficiencystrategic planning

effective communication

1

veryimportant

5

Top 3 motivators for faculty integration of technology

in the classroom

bull Clear indicationevidence that students will benefit

bull Release time to designredesign courses

bull Confidence that the technology will work as planned

1 in 4

Todayrsquos market for IT talent is competitive Hiring andretaining top talent requires engaged managers whopossess and know how to foster good communication skills

Faculty and students alike are

interested in learning analytics for

notifications on course progress

Although technology is omnipresent in the lives ofstudents leveraging technology to engage students in

meaningful ways and to enhance learning is still evolving

76

15

9

I think this is great

This sounds positive

I am neutral

This sounds negative

Irsquom totallyagainst this

Spending model

breakdown in the USdoes not differsignificantly by

Institution type

Size

Central IT staff size

CIO reporting line

25

0

50

75

100

E D U C

A U S E E

R E S

E A R C

H S N

A P S H

O T

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1535

A look into EDUCAUSE research on the 2015 list of the

most intriguing ideas in higher education IT

DEMONSTRATING

VALUE OF IT

DEVELOPING

SECURITY

POLICIES FOR

THE INSTITUTION

DEVELOPING ENTERPRISE IT

ARCHITECTURE

BALANCING INFORMATION

SECURITY AND OPENNESS

INCREASING CAPACITY

FOR CHANGE

PROVIDING USER SUPPORT

The gaps between effectiveness in and

importance of addressing risks are large

Percentage using the college or university help desk for support

Percentage looking to peers

Student Device Ownership

Between 2005 and 2014 there were 727 education-sector

data breachesmdashinvolving more than 14 million recordsmdashas

reported to the Privacy Rights Clearinghouse

locally integrate the

architectures of multiple

major systems

follow the architecture of a

primary system or suite

20142013

25

0

50

75

100

2015 projection

Smartphones

Tablets

86

47

31

76

58

90

Information security

Data privacyconfidentiality

Identityaccess management

66

66

84

82

79

70

36

1

33

29

The most important IT risks to

address concern security privacy

and access

In a world of increasing

complex security threats

institutions must move from

a reactive to a proactive security response

We are living in an era when readily

accessible technologies facilitate a

BYOD standard requiring institutions

to rethink user support

A well-defined enterprise IT architecture is instrumental to

optimizing opportunities and managing change effectively

The higher education community is

struggling with the pace variety and sheer volume

of change in information technology as well as the

corresponding risks

IT leaders need to draw the lines from

technology initiatives to their institutionsrsquo

changing strategic objectives and on to the

ultimate bottom lines of mission and means

OtherLossthestInternal threatsExternal threats

81of institutions

do notaddress IT risk

in their strategicplan

7357

69

22

Faculty

Students

effectiveness

importance

effectiveness

importance

effectiveness

importance

6 3 10 10

Breachcauses

53Administration

37Teaching

and learning

10Researchother

Percentage of IT spend by institutional mission

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1635

26 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

leaders must think institutionally and identify technology resources that

can bring together the diverse and enormous data sets that represent thisexperience

As was discussed last year when this was the 1 issue in the 2014 Top 10list looking at this data may raise privacy issues so leaders must rememberto include the appropriate individuals in these discussions to ensure compli-ance security and privacy

Advice983150 Keep in mind that students consider success from a holistic view of their

campus experience not necessarily their experience with just a courseor a semester To maximize the impact of technology identify the combi-

nation of data and tools that will encompass as much of the institutionalexperience as possible983150 Remember that results will be only as good as the data Take time in the

beginning to build a reliable strategic foundation by starting with conciseoutcome objectives and then develop t he data-driven questions that willultimately define actionable steps to influence success

983150 Work with key individuals from various institutional areas to identifydata that may be available at an individual student level and that could becombined with other values to establish an assessment point for the stu-dent Next consider comparing this assessment point with the studentrsquossuccess level and attempt to identify some trends Drill down to indica-tors that can be used as targets for predicting success and for identifyingearly warning signs

983150 Ensure that the project is embedded in a cross-institutional student suc-cess effort that includes all relevant parties Dedicated student successteams or cross-departmental governance structures can be the vehiclefor organizing consensus Donrsquot allow a perception of IT ownership todevelop

983150 Resolve problems in academic and business processes before implemen-tation donlsquot adapt applications to dysfunctional processes

983150 Define the role of faculty in improving student outcomes through thestrategic leveraging of technology

983150 Determine how much individualized student data should be shared withadvisors in supporting improved student outcomes

Issue 5Demonstrating the

Business Value ofInformation Technologyand How Technology

and the IT OrganizationCan Help the Institution

Achieve Its Goals

IT leaders need to continue to get bet-ter at drawing the lines from technol-ogy initiatives to their institutionsrsquochanging strategic objectives and on

to the ultimate bottom lines of mis-sion and means Successfully demon-strating the business value of informationtechnology to the institution begins withdeveloping a clear understanding of the

various ways in which technology as awhole and the IT department as a unitadd value to the institution Institutionalleadersrsquo struggle to respond to changingpublic perceptions of the value of highereducation itself is a complicating factorHerein lies an opportunity for IT profes-sionals not only to demonstrate the value

of the IT organizationrsquos particular offer-ings but also to create new and significant value for the institution This requiresthinking of technology strategy as both aconsequence and a driver of institutionalstrategy IT leaders who have the abilityto see the entire institutional landscapeand can offer strategic insights for movingthe institution forward have never beenmore important to the well-being of col-leges and universities

ldquoInstead of reacting to new technologiestop institutions seek out new technologies

as a strategic imperative leveraging theseinnovations to improve learning insideand outside the classroom with datadecision making enhanced pedagogy andbetter student outcomesrdquo

mdashLisa M Davis Vice President for Information Services and Chief Information Officer

Georgetown University

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

So in what ways do IT leaders add value They add value to the organizationby enhancing the core productmdashnamelythe learning experiences of students and

the teaching activities of faculty They add value very directly by creating new chan-nels through which students can accessinstitutional offerings The channels thatonline opportunities provide would notexist without the technologies deliveredand supported by the IT organizationFrom a business perspective this cre-ates new sources of revenue a criticalobjective for virtually all colleges anduniversities Drawing a clear line that con-nects specific technology initiatives withtangible revenue for the institution is a

powerful way to demonstrate the busi-ness value of technologymdashand of the ITorganization

And of course the yin of revenue isbalanced by the yang of cost reductionStories of expense reduction and effi-ciency are perhaps easier to identify andtell and they should be carefully and dili-gently told but IT leaders must be carefulto also emphasize the much larger poten-tial that a clear focus on the revenue sidecan provide Doing so can help to avoid

the impression that the value of informa-tion technology is limited to simple actsof automation and efficiency Part of thiswork entails ensuring that the institu-tional leadership understands what is andis not possible Many times the need tohave the value discussion in the first placeis because leaders are not inherently feel-ing the value Those in the IT organiza-tion must take the time to develop andprovide clear data-based informationabout the services they deliver and valuethey provide

One way to demonstrate value iswith well-constructed service portfoliosand service catalogs A service portfolioprovides a high-level overview of howfunds are spent on major institutionalstrategic and operational goals and isgeared toward institutional leaders Aservice catalog (see Figure 7) provides amore detailed view into how IT dollarsare spent on IT projects products andservices and is geared toward IT leaders

Combined the service portfolio and theservice catalog can be a useful tool forshowing the business value of the invest-ments that institutions make in informa-tion technology

Assembling a service portfolio andcatalog may be the IT organizationrsquos firstcomprehensive view into the actual valueit is bringing to the institution Depend-ing on that value IT leaders may first needto focus on quick fixes to better align theirservices with the institutional mission

Before IT leaders can advocate howinformation technology can be leveragedto drive the business the IT organiza-tion must be operationally effective andefficient Institutional and business unitleaders must view the IT organizationas providing operational excellence andoutstanding customer service before theywill consider it as a partner in deliveringbusiness value

The CIO and IT leadership teamsshould remember that they are the pri-mary marketing avenue for sharing the

value that information technology bringsto the institutional mission IT leadersspend about 10 percent of their time ongovernance and planning and on innova-tion with business and academic units9 IT leaders thus must be intentional aboutidentifying opportunities for communi-cating how the IT organization is help-ing the institution CIOs must establish

strong and trusting relationships withtheir peer business leadersSharing the value of information

technology begins with IT leadership butmust extend to the entire IT organization

All IT staff must understand how theirwork contributes to the institutional mis-sions and priorities They need to under-stand the IT organizationrsquos capabilitiesand priorities and how the organizationcan advance the institution the indi-

vidual business units and the faculty stu-dents and staff with whom they work IT

leaders can encourage and enable IT staffto learn the mission business processesand requirements of business units inorder to understand how informationtechnology can best be leveraged Get-ting to this point may require a culturechange within the IT organization At the

very least all IT staff should know boththe institutional and the IT priorities toensure that everyone is telling the samestory

FIGURE 7 Percentage of Institutions with a Service Catalog

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

32

17

29

40

56

62

Source EDUCAUSE Core Data Service 2013

IT leaders add value

to the organization byenhancing the core

productmdashnamely thelearning experiences of

students and the teachingactivities of faculty

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1835

28 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Advice983150 Map IT priorities to institutional priorities Find the points of intersection

with the business unit operations customers and technology Partnerwith the business unit to develop a roadmap and to align the business withthe IT architecture

983150 Donrsquot wait for an invitation to discuss business and customer impact Butdonrsquot try to boil the ocean keep focused and be clear about what the IT

organization can and cannot do IT leaders must be translators usingterminology that resonates with non-IT experts and connecting the dotsbetween the technology capabilities and the business needs Develop asmall set of short and simple stories about concrete ways in which tech-nology has improved the learning experience at the institution createdaccess to institutional resources strengthened affinity for the institutiongenerated revenue and streamlined operations Focus at least as much onhelping others see what is possible with technology as on showing howtechnology investments improve current institutional life

983150 Develop a service catalog to serve as a base for connecting the work of theIT organization to the larger institutional strategic objectives

983150 Implement a metrics program that can demonstrate the extent to which theIT organization is achieving its service-level goals customer-satisfaction

goals and financial goals and is delivering on strategic priorities983150 Ensure that IT leaders and IT staff understand what drives academic and

business value for the institution and can identify and articulate how tech-nology can deliver that value Consider attending non-technology confer-ences to learn how business officers faculty and academic leaders thinkabout technology and what their pressing problems are Be the translatorfor business strategy

983150 To reach the broader institutional community consider newslettersbrown-bag gatherings and roundtable discussions and take advantageof recurring events such as National Cyber Security Awareness Month(httpwwweducauseeduncsam) and start-of-the-semester gatherings

Issue 6Increasing the IT

Organizationrsquos Capacityfor Managing Change

Despite DifferingCommunity Needs

Priorities and Abilities

Change is the watchword todayand going forward In the 2011book Race against the Machine MIT economists Erik Bryn-jolfsson and Andrew McAfee

write ldquoAdvances like the Googleautonomous car Watson the Jeop-ardy champion supercomputer andhigh-quality instantaneous machinetranslation then can be seen as thefirst examples of the kinds of digitalinnovations wersquoll see as we move into the phase where exponentialgrowth yields jaw-dropping resultsrdquo10

When technology changes organiza-tions are always challenged to adapt tonew circumstances This is par ticularlytrue of the organizations tasked with

implementing and maintaining thetechnology itselfThe higher education community

is struggling not only with the pace ofchange in information technology butalso with the variety and sheer volumeof change Information technology isincreasingly important to and increas-ingly integrated with all aspects ofboth the strategic and the operationalfunctions of the campus The chal-

ldquoWe also add value by creating newways for those who know us less well to

develop affinity with our institutions Asmall MOOC my college offered made usknown to groups of prospective studentswho would never have paid a momentrsquosattention to any traditional advertisingmessages we might have sent By joiningtheir party first via our technologies weput ourselves in a much better position to

invite them to our partyrdquomdashJames Kulich

Vice President and Chief Information OfficerElmhurst College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

lenge is how to engage multiple areasof the institution and expand servicesin numerous simultaneous initiativesMeanwhile institutional informa-

tion technology is reengineering itsinfrastructure platforms and servicesThose change efforts are often additiveto the applications being introduced aspart of new business-area initiatives

Ideally the institutional stancetoward change is proactive and ITleaders have the vision and good senseto advocate to broker and to preparetheir various constituents for upcom-ing changes while sustaining ongo-ing operations In reality end users

vary widely in their predisposition to

technology As a group students andfaculty are positively disposed towardinformation technology but as indi-

viduals they run the gamut (see Figure8) And attitudes influence behaviorthe way faculty and students adopt and

FIGURE 8 Relationship between Faculty Attitudes toward Online Learningand Their Experience with Online Teaching

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014(Louisville CO ECAR July 2014)

Percentage of respondents who agree or strongly agree

No recent onlineteaching

Some recentonline teaching

50250 75 100

All respondents

Online learning helps students learn more effectively

Online learning will lead to pedagogical breakthroughs

Online learning will make higher education available to more students

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2035

30 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

use technology tends to reflect theirattitudes11

The IT organizationrsquos history of exe-cution can influence community open-ness toward future technology changesThe shadow cast by a deeply flawed ERPimplementation for example can last adecade or longer

Change management is preciselythat managing change rather than lettingchange happen on its own (see Figure 9)

Successful change management is notaccidental or organic It is intentionaland has multiple components Manyinstitutions adopt a specific approachto implementing changemdashapproachessuch as ADKAR Kurt Lewinrsquos changemanagement model and John Kot-terrsquos eight steps12 Regardless of the

model managing change requires astrategy in which the goals and focusof the change are clear to internal andexternal constituents For examplethe corporate consultant Glenn Llopisadvises being able to identify what thesuccessful implementation of a changestrategy would look like knowing whatthe change strategy is trying to solveand identifying the required resourcesand relationships to implement the

change management strategy

13

As theIT organization sifts through the differ-ent needs abilities and priorities of theinstitution and tries to adapt to changeit must avoid being caught in a viciouscircle of tactics with no purpose

A good change management strat-egy has multiple components which

include communications and inclu-siveness John Jones DeAnne Agu-irre and Matthew Calderone provideten sensible principles for managing

change by keeping the human elementat the center14 Involving every level ofan organization creating ownershipassessing the cultural landscape andcommunicating effectively are keyfactors Change always affects some-body somewheremdashboth internally andexternally IT organizations must doeverything possible to find engagedpeople who can advocate on behalf ofthe change strategy It helps to havechampions at all levels executiveswho can demonstrate the institutional

leadersrsquo commitment area leaders whocan reinforce commitment with theirworkforce and explain how the change

will benefit their part of the institu-tion and individual influencers whocan help determine success factorsidentify and address pain points andevangelize with their colleagues

But change management involves

more than communications and inclu-siveness A successful change is a fullydesigned change Too often institu-tional leaders conflate new initiativeswith new systems and fail to fully thinkthrough and execute on the business-end components The successfulintroduction of a new system mightrequire new or reengineered businessprocesses new roles and even differ-ent organizational structures Every

ldquoTechnology is now integrated into just about

every aspect of our colleges and universitiesThat allows us a myriad of opportunitiesto use technology to help students succeedacademically Using technology to helpstudents succeed is at the core of what we dordquo

mdashSteve FleagleChief Information Officer and Associate Vice President

The University of Iowa

FIGURE 9 Percentage of Institutions That Have Implemented the ITIL ChangeManagement Process

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

23

13

25

30

44

44

Source EDUCAUSE Core Data Service 2013

Involvingevery level of an

organization creatingownership assessing thecultural landscape and

communicating effectivelyare key factors Changealways affects somebody

somewhere

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 14: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1435

To create sustainable IT funding models IT leaders need to

clarify to institutional leaders and boards of trustees why

IT services are strategically important to the enterprise

TOP 10 IT ISSUES

EVOLVING STAFFING MODELS

IMPROVING

STUDENT

OUTCOMES

OPTIMIZING TECHNOLOGY IN

TEACHING AND LEARNING

FUNDING IT STRATEGICALLY

soft skills

moreresources

professional development

clear goals networking

65

Technical proficiency is as important as ever

So skills are more important that ever before

higher education IT staff are not

satisfied with their current position

To be more effective IT

staff say they need

of students wish their

instructors would use

early-alert systems more

of central ITrsquos budgetis spent running the institution

is spent on growth

is spent on transformation

Students respond

positively to learning

analytics opportunities

not at allimportant

technical proficiencystrategic planning

effective communication

1

veryimportant

5

Top 3 motivators for faculty integration of technology

in the classroom

bull Clear indicationevidence that students will benefit

bull Release time to designredesign courses

bull Confidence that the technology will work as planned

1 in 4

Todayrsquos market for IT talent is competitive Hiring andretaining top talent requires engaged managers whopossess and know how to foster good communication skills

Faculty and students alike are

interested in learning analytics for

notifications on course progress

Although technology is omnipresent in the lives ofstudents leveraging technology to engage students in

meaningful ways and to enhance learning is still evolving

76

15

9

I think this is great

This sounds positive

I am neutral

This sounds negative

Irsquom totallyagainst this

Spending model

breakdown in the USdoes not differsignificantly by

Institution type

Size

Central IT staff size

CIO reporting line

25

0

50

75

100

E D U C

A U S E E

R E S

E A R C

H S N

A P S H

O T

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1535

A look into EDUCAUSE research on the 2015 list of the

most intriguing ideas in higher education IT

DEMONSTRATING

VALUE OF IT

DEVELOPING

SECURITY

POLICIES FOR

THE INSTITUTION

DEVELOPING ENTERPRISE IT

ARCHITECTURE

BALANCING INFORMATION

SECURITY AND OPENNESS

INCREASING CAPACITY

FOR CHANGE

PROVIDING USER SUPPORT

The gaps between effectiveness in and

importance of addressing risks are large

Percentage using the college or university help desk for support

Percentage looking to peers

Student Device Ownership

Between 2005 and 2014 there were 727 education-sector

data breachesmdashinvolving more than 14 million recordsmdashas

reported to the Privacy Rights Clearinghouse

locally integrate the

architectures of multiple

major systems

follow the architecture of a

primary system or suite

20142013

25

0

50

75

100

2015 projection

Smartphones

Tablets

86

47

31

76

58

90

Information security

Data privacyconfidentiality

Identityaccess management

66

66

84

82

79

70

36

1

33

29

The most important IT risks to

address concern security privacy

and access

In a world of increasing

complex security threats

institutions must move from

a reactive to a proactive security response

We are living in an era when readily

accessible technologies facilitate a

BYOD standard requiring institutions

to rethink user support

A well-defined enterprise IT architecture is instrumental to

optimizing opportunities and managing change effectively

The higher education community is

struggling with the pace variety and sheer volume

of change in information technology as well as the

corresponding risks

IT leaders need to draw the lines from

technology initiatives to their institutionsrsquo

changing strategic objectives and on to the

ultimate bottom lines of mission and means

OtherLossthestInternal threatsExternal threats

81of institutions

do notaddress IT risk

in their strategicplan

7357

69

22

Faculty

Students

effectiveness

importance

effectiveness

importance

effectiveness

importance

6 3 10 10

Breachcauses

53Administration

37Teaching

and learning

10Researchother

Percentage of IT spend by institutional mission

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1635

26 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

leaders must think institutionally and identify technology resources that

can bring together the diverse and enormous data sets that represent thisexperience

As was discussed last year when this was the 1 issue in the 2014 Top 10list looking at this data may raise privacy issues so leaders must rememberto include the appropriate individuals in these discussions to ensure compli-ance security and privacy

Advice983150 Keep in mind that students consider success from a holistic view of their

campus experience not necessarily their experience with just a courseor a semester To maximize the impact of technology identify the combi-

nation of data and tools that will encompass as much of the institutionalexperience as possible983150 Remember that results will be only as good as the data Take time in the

beginning to build a reliable strategic foundation by starting with conciseoutcome objectives and then develop t he data-driven questions that willultimately define actionable steps to influence success

983150 Work with key individuals from various institutional areas to identifydata that may be available at an individual student level and that could becombined with other values to establish an assessment point for the stu-dent Next consider comparing this assessment point with the studentrsquossuccess level and attempt to identify some trends Drill down to indica-tors that can be used as targets for predicting success and for identifyingearly warning signs

983150 Ensure that the project is embedded in a cross-institutional student suc-cess effort that includes all relevant parties Dedicated student successteams or cross-departmental governance structures can be the vehiclefor organizing consensus Donrsquot allow a perception of IT ownership todevelop

983150 Resolve problems in academic and business processes before implemen-tation donlsquot adapt applications to dysfunctional processes

983150 Define the role of faculty in improving student outcomes through thestrategic leveraging of technology

983150 Determine how much individualized student data should be shared withadvisors in supporting improved student outcomes

Issue 5Demonstrating the

Business Value ofInformation Technologyand How Technology

and the IT OrganizationCan Help the Institution

Achieve Its Goals

IT leaders need to continue to get bet-ter at drawing the lines from technol-ogy initiatives to their institutionsrsquochanging strategic objectives and on

to the ultimate bottom lines of mis-sion and means Successfully demon-strating the business value of informationtechnology to the institution begins withdeveloping a clear understanding of the

various ways in which technology as awhole and the IT department as a unitadd value to the institution Institutionalleadersrsquo struggle to respond to changingpublic perceptions of the value of highereducation itself is a complicating factorHerein lies an opportunity for IT profes-sionals not only to demonstrate the value

of the IT organizationrsquos particular offer-ings but also to create new and significant value for the institution This requiresthinking of technology strategy as both aconsequence and a driver of institutionalstrategy IT leaders who have the abilityto see the entire institutional landscapeand can offer strategic insights for movingthe institution forward have never beenmore important to the well-being of col-leges and universities

ldquoInstead of reacting to new technologiestop institutions seek out new technologies

as a strategic imperative leveraging theseinnovations to improve learning insideand outside the classroom with datadecision making enhanced pedagogy andbetter student outcomesrdquo

mdashLisa M Davis Vice President for Information Services and Chief Information Officer

Georgetown University

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

So in what ways do IT leaders add value They add value to the organizationby enhancing the core productmdashnamelythe learning experiences of students and

the teaching activities of faculty They add value very directly by creating new chan-nels through which students can accessinstitutional offerings The channels thatonline opportunities provide would notexist without the technologies deliveredand supported by the IT organizationFrom a business perspective this cre-ates new sources of revenue a criticalobjective for virtually all colleges anduniversities Drawing a clear line that con-nects specific technology initiatives withtangible revenue for the institution is a

powerful way to demonstrate the busi-ness value of technologymdashand of the ITorganization

And of course the yin of revenue isbalanced by the yang of cost reductionStories of expense reduction and effi-ciency are perhaps easier to identify andtell and they should be carefully and dili-gently told but IT leaders must be carefulto also emphasize the much larger poten-tial that a clear focus on the revenue sidecan provide Doing so can help to avoid

the impression that the value of informa-tion technology is limited to simple actsof automation and efficiency Part of thiswork entails ensuring that the institu-tional leadership understands what is andis not possible Many times the need tohave the value discussion in the first placeis because leaders are not inherently feel-ing the value Those in the IT organiza-tion must take the time to develop andprovide clear data-based informationabout the services they deliver and valuethey provide

One way to demonstrate value iswith well-constructed service portfoliosand service catalogs A service portfolioprovides a high-level overview of howfunds are spent on major institutionalstrategic and operational goals and isgeared toward institutional leaders Aservice catalog (see Figure 7) provides amore detailed view into how IT dollarsare spent on IT projects products andservices and is geared toward IT leaders

Combined the service portfolio and theservice catalog can be a useful tool forshowing the business value of the invest-ments that institutions make in informa-tion technology

Assembling a service portfolio andcatalog may be the IT organizationrsquos firstcomprehensive view into the actual valueit is bringing to the institution Depend-ing on that value IT leaders may first needto focus on quick fixes to better align theirservices with the institutional mission

Before IT leaders can advocate howinformation technology can be leveragedto drive the business the IT organiza-tion must be operationally effective andefficient Institutional and business unitleaders must view the IT organizationas providing operational excellence andoutstanding customer service before theywill consider it as a partner in deliveringbusiness value

The CIO and IT leadership teamsshould remember that they are the pri-mary marketing avenue for sharing the

value that information technology bringsto the institutional mission IT leadersspend about 10 percent of their time ongovernance and planning and on innova-tion with business and academic units9 IT leaders thus must be intentional aboutidentifying opportunities for communi-cating how the IT organization is help-ing the institution CIOs must establish

strong and trusting relationships withtheir peer business leadersSharing the value of information

technology begins with IT leadership butmust extend to the entire IT organization

All IT staff must understand how theirwork contributes to the institutional mis-sions and priorities They need to under-stand the IT organizationrsquos capabilitiesand priorities and how the organizationcan advance the institution the indi-

vidual business units and the faculty stu-dents and staff with whom they work IT

leaders can encourage and enable IT staffto learn the mission business processesand requirements of business units inorder to understand how informationtechnology can best be leveraged Get-ting to this point may require a culturechange within the IT organization At the

very least all IT staff should know boththe institutional and the IT priorities toensure that everyone is telling the samestory

FIGURE 7 Percentage of Institutions with a Service Catalog

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

32

17

29

40

56

62

Source EDUCAUSE Core Data Service 2013

IT leaders add value

to the organization byenhancing the core

productmdashnamely thelearning experiences of

students and the teachingactivities of faculty

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1835

28 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Advice983150 Map IT priorities to institutional priorities Find the points of intersection

with the business unit operations customers and technology Partnerwith the business unit to develop a roadmap and to align the business withthe IT architecture

983150 Donrsquot wait for an invitation to discuss business and customer impact Butdonrsquot try to boil the ocean keep focused and be clear about what the IT

organization can and cannot do IT leaders must be translators usingterminology that resonates with non-IT experts and connecting the dotsbetween the technology capabilities and the business needs Develop asmall set of short and simple stories about concrete ways in which tech-nology has improved the learning experience at the institution createdaccess to institutional resources strengthened affinity for the institutiongenerated revenue and streamlined operations Focus at least as much onhelping others see what is possible with technology as on showing howtechnology investments improve current institutional life

983150 Develop a service catalog to serve as a base for connecting the work of theIT organization to the larger institutional strategic objectives

983150 Implement a metrics program that can demonstrate the extent to which theIT organization is achieving its service-level goals customer-satisfaction

goals and financial goals and is delivering on strategic priorities983150 Ensure that IT leaders and IT staff understand what drives academic and

business value for the institution and can identify and articulate how tech-nology can deliver that value Consider attending non-technology confer-ences to learn how business officers faculty and academic leaders thinkabout technology and what their pressing problems are Be the translatorfor business strategy

983150 To reach the broader institutional community consider newslettersbrown-bag gatherings and roundtable discussions and take advantageof recurring events such as National Cyber Security Awareness Month(httpwwweducauseeduncsam) and start-of-the-semester gatherings

Issue 6Increasing the IT

Organizationrsquos Capacityfor Managing Change

Despite DifferingCommunity Needs

Priorities and Abilities

Change is the watchword todayand going forward In the 2011book Race against the Machine MIT economists Erik Bryn-jolfsson and Andrew McAfee

write ldquoAdvances like the Googleautonomous car Watson the Jeop-ardy champion supercomputer andhigh-quality instantaneous machinetranslation then can be seen as thefirst examples of the kinds of digitalinnovations wersquoll see as we move into the phase where exponentialgrowth yields jaw-dropping resultsrdquo10

When technology changes organiza-tions are always challenged to adapt tonew circumstances This is par ticularlytrue of the organizations tasked with

implementing and maintaining thetechnology itselfThe higher education community

is struggling not only with the pace ofchange in information technology butalso with the variety and sheer volumeof change Information technology isincreasingly important to and increas-ingly integrated with all aspects ofboth the strategic and the operationalfunctions of the campus The chal-

ldquoWe also add value by creating newways for those who know us less well to

develop affinity with our institutions Asmall MOOC my college offered made usknown to groups of prospective studentswho would never have paid a momentrsquosattention to any traditional advertisingmessages we might have sent By joiningtheir party first via our technologies weput ourselves in a much better position to

invite them to our partyrdquomdashJames Kulich

Vice President and Chief Information OfficerElmhurst College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

lenge is how to engage multiple areasof the institution and expand servicesin numerous simultaneous initiativesMeanwhile institutional informa-

tion technology is reengineering itsinfrastructure platforms and servicesThose change efforts are often additiveto the applications being introduced aspart of new business-area initiatives

Ideally the institutional stancetoward change is proactive and ITleaders have the vision and good senseto advocate to broker and to preparetheir various constituents for upcom-ing changes while sustaining ongo-ing operations In reality end users

vary widely in their predisposition to

technology As a group students andfaculty are positively disposed towardinformation technology but as indi-

viduals they run the gamut (see Figure8) And attitudes influence behaviorthe way faculty and students adopt and

FIGURE 8 Relationship between Faculty Attitudes toward Online Learningand Their Experience with Online Teaching

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014(Louisville CO ECAR July 2014)

Percentage of respondents who agree or strongly agree

No recent onlineteaching

Some recentonline teaching

50250 75 100

All respondents

Online learning helps students learn more effectively

Online learning will lead to pedagogical breakthroughs

Online learning will make higher education available to more students

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2035

30 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

use technology tends to reflect theirattitudes11

The IT organizationrsquos history of exe-cution can influence community open-ness toward future technology changesThe shadow cast by a deeply flawed ERPimplementation for example can last adecade or longer

Change management is preciselythat managing change rather than lettingchange happen on its own (see Figure 9)

Successful change management is notaccidental or organic It is intentionaland has multiple components Manyinstitutions adopt a specific approachto implementing changemdashapproachessuch as ADKAR Kurt Lewinrsquos changemanagement model and John Kot-terrsquos eight steps12 Regardless of the

model managing change requires astrategy in which the goals and focusof the change are clear to internal andexternal constituents For examplethe corporate consultant Glenn Llopisadvises being able to identify what thesuccessful implementation of a changestrategy would look like knowing whatthe change strategy is trying to solveand identifying the required resourcesand relationships to implement the

change management strategy

13

As theIT organization sifts through the differ-ent needs abilities and priorities of theinstitution and tries to adapt to changeit must avoid being caught in a viciouscircle of tactics with no purpose

A good change management strat-egy has multiple components which

include communications and inclu-siveness John Jones DeAnne Agu-irre and Matthew Calderone provideten sensible principles for managing

change by keeping the human elementat the center14 Involving every level ofan organization creating ownershipassessing the cultural landscape andcommunicating effectively are keyfactors Change always affects some-body somewheremdashboth internally andexternally IT organizations must doeverything possible to find engagedpeople who can advocate on behalf ofthe change strategy It helps to havechampions at all levels executiveswho can demonstrate the institutional

leadersrsquo commitment area leaders whocan reinforce commitment with theirworkforce and explain how the change

will benefit their part of the institu-tion and individual influencers whocan help determine success factorsidentify and address pain points andevangelize with their colleagues

But change management involves

more than communications and inclu-siveness A successful change is a fullydesigned change Too often institu-tional leaders conflate new initiativeswith new systems and fail to fully thinkthrough and execute on the business-end components The successfulintroduction of a new system mightrequire new or reengineered businessprocesses new roles and even differ-ent organizational structures Every

ldquoTechnology is now integrated into just about

every aspect of our colleges and universitiesThat allows us a myriad of opportunitiesto use technology to help students succeedacademically Using technology to helpstudents succeed is at the core of what we dordquo

mdashSteve FleagleChief Information Officer and Associate Vice President

The University of Iowa

FIGURE 9 Percentage of Institutions That Have Implemented the ITIL ChangeManagement Process

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

23

13

25

30

44

44

Source EDUCAUSE Core Data Service 2013

Involvingevery level of an

organization creatingownership assessing thecultural landscape and

communicating effectivelyare key factors Changealways affects somebody

somewhere

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 15: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1535

A look into EDUCAUSE research on the 2015 list of the

most intriguing ideas in higher education IT

DEMONSTRATING

VALUE OF IT

DEVELOPING

SECURITY

POLICIES FOR

THE INSTITUTION

DEVELOPING ENTERPRISE IT

ARCHITECTURE

BALANCING INFORMATION

SECURITY AND OPENNESS

INCREASING CAPACITY

FOR CHANGE

PROVIDING USER SUPPORT

The gaps between effectiveness in and

importance of addressing risks are large

Percentage using the college or university help desk for support

Percentage looking to peers

Student Device Ownership

Between 2005 and 2014 there were 727 education-sector

data breachesmdashinvolving more than 14 million recordsmdashas

reported to the Privacy Rights Clearinghouse

locally integrate the

architectures of multiple

major systems

follow the architecture of a

primary system or suite

20142013

25

0

50

75

100

2015 projection

Smartphones

Tablets

86

47

31

76

58

90

Information security

Data privacyconfidentiality

Identityaccess management

66

66

84

82

79

70

36

1

33

29

The most important IT risks to

address concern security privacy

and access

In a world of increasing

complex security threats

institutions must move from

a reactive to a proactive security response

We are living in an era when readily

accessible technologies facilitate a

BYOD standard requiring institutions

to rethink user support

A well-defined enterprise IT architecture is instrumental to

optimizing opportunities and managing change effectively

The higher education community is

struggling with the pace variety and sheer volume

of change in information technology as well as the

corresponding risks

IT leaders need to draw the lines from

technology initiatives to their institutionsrsquo

changing strategic objectives and on to the

ultimate bottom lines of mission and means

OtherLossthestInternal threatsExternal threats

81of institutions

do notaddress IT risk

in their strategicplan

7357

69

22

Faculty

Students

effectiveness

importance

effectiveness

importance

effectiveness

importance

6 3 10 10

Breachcauses

53Administration

37Teaching

and learning

10Researchother

Percentage of IT spend by institutional mission

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1635

26 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

leaders must think institutionally and identify technology resources that

can bring together the diverse and enormous data sets that represent thisexperience

As was discussed last year when this was the 1 issue in the 2014 Top 10list looking at this data may raise privacy issues so leaders must rememberto include the appropriate individuals in these discussions to ensure compli-ance security and privacy

Advice983150 Keep in mind that students consider success from a holistic view of their

campus experience not necessarily their experience with just a courseor a semester To maximize the impact of technology identify the combi-

nation of data and tools that will encompass as much of the institutionalexperience as possible983150 Remember that results will be only as good as the data Take time in the

beginning to build a reliable strategic foundation by starting with conciseoutcome objectives and then develop t he data-driven questions that willultimately define actionable steps to influence success

983150 Work with key individuals from various institutional areas to identifydata that may be available at an individual student level and that could becombined with other values to establish an assessment point for the stu-dent Next consider comparing this assessment point with the studentrsquossuccess level and attempt to identify some trends Drill down to indica-tors that can be used as targets for predicting success and for identifyingearly warning signs

983150 Ensure that the project is embedded in a cross-institutional student suc-cess effort that includes all relevant parties Dedicated student successteams or cross-departmental governance structures can be the vehiclefor organizing consensus Donrsquot allow a perception of IT ownership todevelop

983150 Resolve problems in academic and business processes before implemen-tation donlsquot adapt applications to dysfunctional processes

983150 Define the role of faculty in improving student outcomes through thestrategic leveraging of technology

983150 Determine how much individualized student data should be shared withadvisors in supporting improved student outcomes

Issue 5Demonstrating the

Business Value ofInformation Technologyand How Technology

and the IT OrganizationCan Help the Institution

Achieve Its Goals

IT leaders need to continue to get bet-ter at drawing the lines from technol-ogy initiatives to their institutionsrsquochanging strategic objectives and on

to the ultimate bottom lines of mis-sion and means Successfully demon-strating the business value of informationtechnology to the institution begins withdeveloping a clear understanding of the

various ways in which technology as awhole and the IT department as a unitadd value to the institution Institutionalleadersrsquo struggle to respond to changingpublic perceptions of the value of highereducation itself is a complicating factorHerein lies an opportunity for IT profes-sionals not only to demonstrate the value

of the IT organizationrsquos particular offer-ings but also to create new and significant value for the institution This requiresthinking of technology strategy as both aconsequence and a driver of institutionalstrategy IT leaders who have the abilityto see the entire institutional landscapeand can offer strategic insights for movingthe institution forward have never beenmore important to the well-being of col-leges and universities

ldquoInstead of reacting to new technologiestop institutions seek out new technologies

as a strategic imperative leveraging theseinnovations to improve learning insideand outside the classroom with datadecision making enhanced pedagogy andbetter student outcomesrdquo

mdashLisa M Davis Vice President for Information Services and Chief Information Officer

Georgetown University

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

So in what ways do IT leaders add value They add value to the organizationby enhancing the core productmdashnamelythe learning experiences of students and

the teaching activities of faculty They add value very directly by creating new chan-nels through which students can accessinstitutional offerings The channels thatonline opportunities provide would notexist without the technologies deliveredand supported by the IT organizationFrom a business perspective this cre-ates new sources of revenue a criticalobjective for virtually all colleges anduniversities Drawing a clear line that con-nects specific technology initiatives withtangible revenue for the institution is a

powerful way to demonstrate the busi-ness value of technologymdashand of the ITorganization

And of course the yin of revenue isbalanced by the yang of cost reductionStories of expense reduction and effi-ciency are perhaps easier to identify andtell and they should be carefully and dili-gently told but IT leaders must be carefulto also emphasize the much larger poten-tial that a clear focus on the revenue sidecan provide Doing so can help to avoid

the impression that the value of informa-tion technology is limited to simple actsof automation and efficiency Part of thiswork entails ensuring that the institu-tional leadership understands what is andis not possible Many times the need tohave the value discussion in the first placeis because leaders are not inherently feel-ing the value Those in the IT organiza-tion must take the time to develop andprovide clear data-based informationabout the services they deliver and valuethey provide

One way to demonstrate value iswith well-constructed service portfoliosand service catalogs A service portfolioprovides a high-level overview of howfunds are spent on major institutionalstrategic and operational goals and isgeared toward institutional leaders Aservice catalog (see Figure 7) provides amore detailed view into how IT dollarsare spent on IT projects products andservices and is geared toward IT leaders

Combined the service portfolio and theservice catalog can be a useful tool forshowing the business value of the invest-ments that institutions make in informa-tion technology

Assembling a service portfolio andcatalog may be the IT organizationrsquos firstcomprehensive view into the actual valueit is bringing to the institution Depend-ing on that value IT leaders may first needto focus on quick fixes to better align theirservices with the institutional mission

Before IT leaders can advocate howinformation technology can be leveragedto drive the business the IT organiza-tion must be operationally effective andefficient Institutional and business unitleaders must view the IT organizationas providing operational excellence andoutstanding customer service before theywill consider it as a partner in deliveringbusiness value

The CIO and IT leadership teamsshould remember that they are the pri-mary marketing avenue for sharing the

value that information technology bringsto the institutional mission IT leadersspend about 10 percent of their time ongovernance and planning and on innova-tion with business and academic units9 IT leaders thus must be intentional aboutidentifying opportunities for communi-cating how the IT organization is help-ing the institution CIOs must establish

strong and trusting relationships withtheir peer business leadersSharing the value of information

technology begins with IT leadership butmust extend to the entire IT organization

All IT staff must understand how theirwork contributes to the institutional mis-sions and priorities They need to under-stand the IT organizationrsquos capabilitiesand priorities and how the organizationcan advance the institution the indi-

vidual business units and the faculty stu-dents and staff with whom they work IT

leaders can encourage and enable IT staffto learn the mission business processesand requirements of business units inorder to understand how informationtechnology can best be leveraged Get-ting to this point may require a culturechange within the IT organization At the

very least all IT staff should know boththe institutional and the IT priorities toensure that everyone is telling the samestory

FIGURE 7 Percentage of Institutions with a Service Catalog

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

32

17

29

40

56

62

Source EDUCAUSE Core Data Service 2013

IT leaders add value

to the organization byenhancing the core

productmdashnamely thelearning experiences of

students and the teachingactivities of faculty

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1835

28 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Advice983150 Map IT priorities to institutional priorities Find the points of intersection

with the business unit operations customers and technology Partnerwith the business unit to develop a roadmap and to align the business withthe IT architecture

983150 Donrsquot wait for an invitation to discuss business and customer impact Butdonrsquot try to boil the ocean keep focused and be clear about what the IT

organization can and cannot do IT leaders must be translators usingterminology that resonates with non-IT experts and connecting the dotsbetween the technology capabilities and the business needs Develop asmall set of short and simple stories about concrete ways in which tech-nology has improved the learning experience at the institution createdaccess to institutional resources strengthened affinity for the institutiongenerated revenue and streamlined operations Focus at least as much onhelping others see what is possible with technology as on showing howtechnology investments improve current institutional life

983150 Develop a service catalog to serve as a base for connecting the work of theIT organization to the larger institutional strategic objectives

983150 Implement a metrics program that can demonstrate the extent to which theIT organization is achieving its service-level goals customer-satisfaction

goals and financial goals and is delivering on strategic priorities983150 Ensure that IT leaders and IT staff understand what drives academic and

business value for the institution and can identify and articulate how tech-nology can deliver that value Consider attending non-technology confer-ences to learn how business officers faculty and academic leaders thinkabout technology and what their pressing problems are Be the translatorfor business strategy

983150 To reach the broader institutional community consider newslettersbrown-bag gatherings and roundtable discussions and take advantageof recurring events such as National Cyber Security Awareness Month(httpwwweducauseeduncsam) and start-of-the-semester gatherings

Issue 6Increasing the IT

Organizationrsquos Capacityfor Managing Change

Despite DifferingCommunity Needs

Priorities and Abilities

Change is the watchword todayand going forward In the 2011book Race against the Machine MIT economists Erik Bryn-jolfsson and Andrew McAfee

write ldquoAdvances like the Googleautonomous car Watson the Jeop-ardy champion supercomputer andhigh-quality instantaneous machinetranslation then can be seen as thefirst examples of the kinds of digitalinnovations wersquoll see as we move into the phase where exponentialgrowth yields jaw-dropping resultsrdquo10

When technology changes organiza-tions are always challenged to adapt tonew circumstances This is par ticularlytrue of the organizations tasked with

implementing and maintaining thetechnology itselfThe higher education community

is struggling not only with the pace ofchange in information technology butalso with the variety and sheer volumeof change Information technology isincreasingly important to and increas-ingly integrated with all aspects ofboth the strategic and the operationalfunctions of the campus The chal-

ldquoWe also add value by creating newways for those who know us less well to

develop affinity with our institutions Asmall MOOC my college offered made usknown to groups of prospective studentswho would never have paid a momentrsquosattention to any traditional advertisingmessages we might have sent By joiningtheir party first via our technologies weput ourselves in a much better position to

invite them to our partyrdquomdashJames Kulich

Vice President and Chief Information OfficerElmhurst College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

lenge is how to engage multiple areasof the institution and expand servicesin numerous simultaneous initiativesMeanwhile institutional informa-

tion technology is reengineering itsinfrastructure platforms and servicesThose change efforts are often additiveto the applications being introduced aspart of new business-area initiatives

Ideally the institutional stancetoward change is proactive and ITleaders have the vision and good senseto advocate to broker and to preparetheir various constituents for upcom-ing changes while sustaining ongo-ing operations In reality end users

vary widely in their predisposition to

technology As a group students andfaculty are positively disposed towardinformation technology but as indi-

viduals they run the gamut (see Figure8) And attitudes influence behaviorthe way faculty and students adopt and

FIGURE 8 Relationship between Faculty Attitudes toward Online Learningand Their Experience with Online Teaching

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014(Louisville CO ECAR July 2014)

Percentage of respondents who agree or strongly agree

No recent onlineteaching

Some recentonline teaching

50250 75 100

All respondents

Online learning helps students learn more effectively

Online learning will lead to pedagogical breakthroughs

Online learning will make higher education available to more students

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2035

30 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

use technology tends to reflect theirattitudes11

The IT organizationrsquos history of exe-cution can influence community open-ness toward future technology changesThe shadow cast by a deeply flawed ERPimplementation for example can last adecade or longer

Change management is preciselythat managing change rather than lettingchange happen on its own (see Figure 9)

Successful change management is notaccidental or organic It is intentionaland has multiple components Manyinstitutions adopt a specific approachto implementing changemdashapproachessuch as ADKAR Kurt Lewinrsquos changemanagement model and John Kot-terrsquos eight steps12 Regardless of the

model managing change requires astrategy in which the goals and focusof the change are clear to internal andexternal constituents For examplethe corporate consultant Glenn Llopisadvises being able to identify what thesuccessful implementation of a changestrategy would look like knowing whatthe change strategy is trying to solveand identifying the required resourcesand relationships to implement the

change management strategy

13

As theIT organization sifts through the differ-ent needs abilities and priorities of theinstitution and tries to adapt to changeit must avoid being caught in a viciouscircle of tactics with no purpose

A good change management strat-egy has multiple components which

include communications and inclu-siveness John Jones DeAnne Agu-irre and Matthew Calderone provideten sensible principles for managing

change by keeping the human elementat the center14 Involving every level ofan organization creating ownershipassessing the cultural landscape andcommunicating effectively are keyfactors Change always affects some-body somewheremdashboth internally andexternally IT organizations must doeverything possible to find engagedpeople who can advocate on behalf ofthe change strategy It helps to havechampions at all levels executiveswho can demonstrate the institutional

leadersrsquo commitment area leaders whocan reinforce commitment with theirworkforce and explain how the change

will benefit their part of the institu-tion and individual influencers whocan help determine success factorsidentify and address pain points andevangelize with their colleagues

But change management involves

more than communications and inclu-siveness A successful change is a fullydesigned change Too often institu-tional leaders conflate new initiativeswith new systems and fail to fully thinkthrough and execute on the business-end components The successfulintroduction of a new system mightrequire new or reengineered businessprocesses new roles and even differ-ent organizational structures Every

ldquoTechnology is now integrated into just about

every aspect of our colleges and universitiesThat allows us a myriad of opportunitiesto use technology to help students succeedacademically Using technology to helpstudents succeed is at the core of what we dordquo

mdashSteve FleagleChief Information Officer and Associate Vice President

The University of Iowa

FIGURE 9 Percentage of Institutions That Have Implemented the ITIL ChangeManagement Process

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

23

13

25

30

44

44

Source EDUCAUSE Core Data Service 2013

Involvingevery level of an

organization creatingownership assessing thecultural landscape and

communicating effectivelyare key factors Changealways affects somebody

somewhere

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 16: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1635

26 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

leaders must think institutionally and identify technology resources that

can bring together the diverse and enormous data sets that represent thisexperience

As was discussed last year when this was the 1 issue in the 2014 Top 10list looking at this data may raise privacy issues so leaders must rememberto include the appropriate individuals in these discussions to ensure compli-ance security and privacy

Advice983150 Keep in mind that students consider success from a holistic view of their

campus experience not necessarily their experience with just a courseor a semester To maximize the impact of technology identify the combi-

nation of data and tools that will encompass as much of the institutionalexperience as possible983150 Remember that results will be only as good as the data Take time in the

beginning to build a reliable strategic foundation by starting with conciseoutcome objectives and then develop t he data-driven questions that willultimately define actionable steps to influence success

983150 Work with key individuals from various institutional areas to identifydata that may be available at an individual student level and that could becombined with other values to establish an assessment point for the stu-dent Next consider comparing this assessment point with the studentrsquossuccess level and attempt to identify some trends Drill down to indica-tors that can be used as targets for predicting success and for identifyingearly warning signs

983150 Ensure that the project is embedded in a cross-institutional student suc-cess effort that includes all relevant parties Dedicated student successteams or cross-departmental governance structures can be the vehiclefor organizing consensus Donrsquot allow a perception of IT ownership todevelop

983150 Resolve problems in academic and business processes before implemen-tation donlsquot adapt applications to dysfunctional processes

983150 Define the role of faculty in improving student outcomes through thestrategic leveraging of technology

983150 Determine how much individualized student data should be shared withadvisors in supporting improved student outcomes

Issue 5Demonstrating the

Business Value ofInformation Technologyand How Technology

and the IT OrganizationCan Help the Institution

Achieve Its Goals

IT leaders need to continue to get bet-ter at drawing the lines from technol-ogy initiatives to their institutionsrsquochanging strategic objectives and on

to the ultimate bottom lines of mis-sion and means Successfully demon-strating the business value of informationtechnology to the institution begins withdeveloping a clear understanding of the

various ways in which technology as awhole and the IT department as a unitadd value to the institution Institutionalleadersrsquo struggle to respond to changingpublic perceptions of the value of highereducation itself is a complicating factorHerein lies an opportunity for IT profes-sionals not only to demonstrate the value

of the IT organizationrsquos particular offer-ings but also to create new and significant value for the institution This requiresthinking of technology strategy as both aconsequence and a driver of institutionalstrategy IT leaders who have the abilityto see the entire institutional landscapeand can offer strategic insights for movingthe institution forward have never beenmore important to the well-being of col-leges and universities

ldquoInstead of reacting to new technologiestop institutions seek out new technologies

as a strategic imperative leveraging theseinnovations to improve learning insideand outside the classroom with datadecision making enhanced pedagogy andbetter student outcomesrdquo

mdashLisa M Davis Vice President for Information Services and Chief Information Officer

Georgetown University

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

So in what ways do IT leaders add value They add value to the organizationby enhancing the core productmdashnamelythe learning experiences of students and

the teaching activities of faculty They add value very directly by creating new chan-nels through which students can accessinstitutional offerings The channels thatonline opportunities provide would notexist without the technologies deliveredand supported by the IT organizationFrom a business perspective this cre-ates new sources of revenue a criticalobjective for virtually all colleges anduniversities Drawing a clear line that con-nects specific technology initiatives withtangible revenue for the institution is a

powerful way to demonstrate the busi-ness value of technologymdashand of the ITorganization

And of course the yin of revenue isbalanced by the yang of cost reductionStories of expense reduction and effi-ciency are perhaps easier to identify andtell and they should be carefully and dili-gently told but IT leaders must be carefulto also emphasize the much larger poten-tial that a clear focus on the revenue sidecan provide Doing so can help to avoid

the impression that the value of informa-tion technology is limited to simple actsof automation and efficiency Part of thiswork entails ensuring that the institu-tional leadership understands what is andis not possible Many times the need tohave the value discussion in the first placeis because leaders are not inherently feel-ing the value Those in the IT organiza-tion must take the time to develop andprovide clear data-based informationabout the services they deliver and valuethey provide

One way to demonstrate value iswith well-constructed service portfoliosand service catalogs A service portfolioprovides a high-level overview of howfunds are spent on major institutionalstrategic and operational goals and isgeared toward institutional leaders Aservice catalog (see Figure 7) provides amore detailed view into how IT dollarsare spent on IT projects products andservices and is geared toward IT leaders

Combined the service portfolio and theservice catalog can be a useful tool forshowing the business value of the invest-ments that institutions make in informa-tion technology

Assembling a service portfolio andcatalog may be the IT organizationrsquos firstcomprehensive view into the actual valueit is bringing to the institution Depend-ing on that value IT leaders may first needto focus on quick fixes to better align theirservices with the institutional mission

Before IT leaders can advocate howinformation technology can be leveragedto drive the business the IT organiza-tion must be operationally effective andefficient Institutional and business unitleaders must view the IT organizationas providing operational excellence andoutstanding customer service before theywill consider it as a partner in deliveringbusiness value

The CIO and IT leadership teamsshould remember that they are the pri-mary marketing avenue for sharing the

value that information technology bringsto the institutional mission IT leadersspend about 10 percent of their time ongovernance and planning and on innova-tion with business and academic units9 IT leaders thus must be intentional aboutidentifying opportunities for communi-cating how the IT organization is help-ing the institution CIOs must establish

strong and trusting relationships withtheir peer business leadersSharing the value of information

technology begins with IT leadership butmust extend to the entire IT organization

All IT staff must understand how theirwork contributes to the institutional mis-sions and priorities They need to under-stand the IT organizationrsquos capabilitiesand priorities and how the organizationcan advance the institution the indi-

vidual business units and the faculty stu-dents and staff with whom they work IT

leaders can encourage and enable IT staffto learn the mission business processesand requirements of business units inorder to understand how informationtechnology can best be leveraged Get-ting to this point may require a culturechange within the IT organization At the

very least all IT staff should know boththe institutional and the IT priorities toensure that everyone is telling the samestory

FIGURE 7 Percentage of Institutions with a Service Catalog

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

32

17

29

40

56

62

Source EDUCAUSE Core Data Service 2013

IT leaders add value

to the organization byenhancing the core

productmdashnamely thelearning experiences of

students and the teachingactivities of faculty

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1835

28 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Advice983150 Map IT priorities to institutional priorities Find the points of intersection

with the business unit operations customers and technology Partnerwith the business unit to develop a roadmap and to align the business withthe IT architecture

983150 Donrsquot wait for an invitation to discuss business and customer impact Butdonrsquot try to boil the ocean keep focused and be clear about what the IT

organization can and cannot do IT leaders must be translators usingterminology that resonates with non-IT experts and connecting the dotsbetween the technology capabilities and the business needs Develop asmall set of short and simple stories about concrete ways in which tech-nology has improved the learning experience at the institution createdaccess to institutional resources strengthened affinity for the institutiongenerated revenue and streamlined operations Focus at least as much onhelping others see what is possible with technology as on showing howtechnology investments improve current institutional life

983150 Develop a service catalog to serve as a base for connecting the work of theIT organization to the larger institutional strategic objectives

983150 Implement a metrics program that can demonstrate the extent to which theIT organization is achieving its service-level goals customer-satisfaction

goals and financial goals and is delivering on strategic priorities983150 Ensure that IT leaders and IT staff understand what drives academic and

business value for the institution and can identify and articulate how tech-nology can deliver that value Consider attending non-technology confer-ences to learn how business officers faculty and academic leaders thinkabout technology and what their pressing problems are Be the translatorfor business strategy

983150 To reach the broader institutional community consider newslettersbrown-bag gatherings and roundtable discussions and take advantageof recurring events such as National Cyber Security Awareness Month(httpwwweducauseeduncsam) and start-of-the-semester gatherings

Issue 6Increasing the IT

Organizationrsquos Capacityfor Managing Change

Despite DifferingCommunity Needs

Priorities and Abilities

Change is the watchword todayand going forward In the 2011book Race against the Machine MIT economists Erik Bryn-jolfsson and Andrew McAfee

write ldquoAdvances like the Googleautonomous car Watson the Jeop-ardy champion supercomputer andhigh-quality instantaneous machinetranslation then can be seen as thefirst examples of the kinds of digitalinnovations wersquoll see as we move into the phase where exponentialgrowth yields jaw-dropping resultsrdquo10

When technology changes organiza-tions are always challenged to adapt tonew circumstances This is par ticularlytrue of the organizations tasked with

implementing and maintaining thetechnology itselfThe higher education community

is struggling not only with the pace ofchange in information technology butalso with the variety and sheer volumeof change Information technology isincreasingly important to and increas-ingly integrated with all aspects ofboth the strategic and the operationalfunctions of the campus The chal-

ldquoWe also add value by creating newways for those who know us less well to

develop affinity with our institutions Asmall MOOC my college offered made usknown to groups of prospective studentswho would never have paid a momentrsquosattention to any traditional advertisingmessages we might have sent By joiningtheir party first via our technologies weput ourselves in a much better position to

invite them to our partyrdquomdashJames Kulich

Vice President and Chief Information OfficerElmhurst College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

lenge is how to engage multiple areasof the institution and expand servicesin numerous simultaneous initiativesMeanwhile institutional informa-

tion technology is reengineering itsinfrastructure platforms and servicesThose change efforts are often additiveto the applications being introduced aspart of new business-area initiatives

Ideally the institutional stancetoward change is proactive and ITleaders have the vision and good senseto advocate to broker and to preparetheir various constituents for upcom-ing changes while sustaining ongo-ing operations In reality end users

vary widely in their predisposition to

technology As a group students andfaculty are positively disposed towardinformation technology but as indi-

viduals they run the gamut (see Figure8) And attitudes influence behaviorthe way faculty and students adopt and

FIGURE 8 Relationship between Faculty Attitudes toward Online Learningand Their Experience with Online Teaching

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014(Louisville CO ECAR July 2014)

Percentage of respondents who agree or strongly agree

No recent onlineteaching

Some recentonline teaching

50250 75 100

All respondents

Online learning helps students learn more effectively

Online learning will lead to pedagogical breakthroughs

Online learning will make higher education available to more students

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2035

30 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

use technology tends to reflect theirattitudes11

The IT organizationrsquos history of exe-cution can influence community open-ness toward future technology changesThe shadow cast by a deeply flawed ERPimplementation for example can last adecade or longer

Change management is preciselythat managing change rather than lettingchange happen on its own (see Figure 9)

Successful change management is notaccidental or organic It is intentionaland has multiple components Manyinstitutions adopt a specific approachto implementing changemdashapproachessuch as ADKAR Kurt Lewinrsquos changemanagement model and John Kot-terrsquos eight steps12 Regardless of the

model managing change requires astrategy in which the goals and focusof the change are clear to internal andexternal constituents For examplethe corporate consultant Glenn Llopisadvises being able to identify what thesuccessful implementation of a changestrategy would look like knowing whatthe change strategy is trying to solveand identifying the required resourcesand relationships to implement the

change management strategy

13

As theIT organization sifts through the differ-ent needs abilities and priorities of theinstitution and tries to adapt to changeit must avoid being caught in a viciouscircle of tactics with no purpose

A good change management strat-egy has multiple components which

include communications and inclu-siveness John Jones DeAnne Agu-irre and Matthew Calderone provideten sensible principles for managing

change by keeping the human elementat the center14 Involving every level ofan organization creating ownershipassessing the cultural landscape andcommunicating effectively are keyfactors Change always affects some-body somewheremdashboth internally andexternally IT organizations must doeverything possible to find engagedpeople who can advocate on behalf ofthe change strategy It helps to havechampions at all levels executiveswho can demonstrate the institutional

leadersrsquo commitment area leaders whocan reinforce commitment with theirworkforce and explain how the change

will benefit their part of the institu-tion and individual influencers whocan help determine success factorsidentify and address pain points andevangelize with their colleagues

But change management involves

more than communications and inclu-siveness A successful change is a fullydesigned change Too often institu-tional leaders conflate new initiativeswith new systems and fail to fully thinkthrough and execute on the business-end components The successfulintroduction of a new system mightrequire new or reengineered businessprocesses new roles and even differ-ent organizational structures Every

ldquoTechnology is now integrated into just about

every aspect of our colleges and universitiesThat allows us a myriad of opportunitiesto use technology to help students succeedacademically Using technology to helpstudents succeed is at the core of what we dordquo

mdashSteve FleagleChief Information Officer and Associate Vice President

The University of Iowa

FIGURE 9 Percentage of Institutions That Have Implemented the ITIL ChangeManagement Process

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

23

13

25

30

44

44

Source EDUCAUSE Core Data Service 2013

Involvingevery level of an

organization creatingownership assessing thecultural landscape and

communicating effectivelyare key factors Changealways affects somebody

somewhere

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 17: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

So in what ways do IT leaders add value They add value to the organizationby enhancing the core productmdashnamelythe learning experiences of students and

the teaching activities of faculty They add value very directly by creating new chan-nels through which students can accessinstitutional offerings The channels thatonline opportunities provide would notexist without the technologies deliveredand supported by the IT organizationFrom a business perspective this cre-ates new sources of revenue a criticalobjective for virtually all colleges anduniversities Drawing a clear line that con-nects specific technology initiatives withtangible revenue for the institution is a

powerful way to demonstrate the busi-ness value of technologymdashand of the ITorganization

And of course the yin of revenue isbalanced by the yang of cost reductionStories of expense reduction and effi-ciency are perhaps easier to identify andtell and they should be carefully and dili-gently told but IT leaders must be carefulto also emphasize the much larger poten-tial that a clear focus on the revenue sidecan provide Doing so can help to avoid

the impression that the value of informa-tion technology is limited to simple actsof automation and efficiency Part of thiswork entails ensuring that the institu-tional leadership understands what is andis not possible Many times the need tohave the value discussion in the first placeis because leaders are not inherently feel-ing the value Those in the IT organiza-tion must take the time to develop andprovide clear data-based informationabout the services they deliver and valuethey provide

One way to demonstrate value iswith well-constructed service portfoliosand service catalogs A service portfolioprovides a high-level overview of howfunds are spent on major institutionalstrategic and operational goals and isgeared toward institutional leaders Aservice catalog (see Figure 7) provides amore detailed view into how IT dollarsare spent on IT projects products andservices and is geared toward IT leaders

Combined the service portfolio and theservice catalog can be a useful tool forshowing the business value of the invest-ments that institutions make in informa-tion technology

Assembling a service portfolio andcatalog may be the IT organizationrsquos firstcomprehensive view into the actual valueit is bringing to the institution Depend-ing on that value IT leaders may first needto focus on quick fixes to better align theirservices with the institutional mission

Before IT leaders can advocate howinformation technology can be leveragedto drive the business the IT organiza-tion must be operationally effective andefficient Institutional and business unitleaders must view the IT organizationas providing operational excellence andoutstanding customer service before theywill consider it as a partner in deliveringbusiness value

The CIO and IT leadership teamsshould remember that they are the pri-mary marketing avenue for sharing the

value that information technology bringsto the institutional mission IT leadersspend about 10 percent of their time ongovernance and planning and on innova-tion with business and academic units9 IT leaders thus must be intentional aboutidentifying opportunities for communi-cating how the IT organization is help-ing the institution CIOs must establish

strong and trusting relationships withtheir peer business leadersSharing the value of information

technology begins with IT leadership butmust extend to the entire IT organization

All IT staff must understand how theirwork contributes to the institutional mis-sions and priorities They need to under-stand the IT organizationrsquos capabilitiesand priorities and how the organizationcan advance the institution the indi-

vidual business units and the faculty stu-dents and staff with whom they work IT

leaders can encourage and enable IT staffto learn the mission business processesand requirements of business units inorder to understand how informationtechnology can best be leveraged Get-ting to this point may require a culturechange within the IT organization At the

very least all IT staff should know boththe institutional and the IT priorities toensure that everyone is telling the samestory

FIGURE 7 Percentage of Institutions with a Service Catalog

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

32

17

29

40

56

62

Source EDUCAUSE Core Data Service 2013

IT leaders add value

to the organization byenhancing the core

productmdashnamely thelearning experiences of

students and the teachingactivities of faculty

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1835

28 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Advice983150 Map IT priorities to institutional priorities Find the points of intersection

with the business unit operations customers and technology Partnerwith the business unit to develop a roadmap and to align the business withthe IT architecture

983150 Donrsquot wait for an invitation to discuss business and customer impact Butdonrsquot try to boil the ocean keep focused and be clear about what the IT

organization can and cannot do IT leaders must be translators usingterminology that resonates with non-IT experts and connecting the dotsbetween the technology capabilities and the business needs Develop asmall set of short and simple stories about concrete ways in which tech-nology has improved the learning experience at the institution createdaccess to institutional resources strengthened affinity for the institutiongenerated revenue and streamlined operations Focus at least as much onhelping others see what is possible with technology as on showing howtechnology investments improve current institutional life

983150 Develop a service catalog to serve as a base for connecting the work of theIT organization to the larger institutional strategic objectives

983150 Implement a metrics program that can demonstrate the extent to which theIT organization is achieving its service-level goals customer-satisfaction

goals and financial goals and is delivering on strategic priorities983150 Ensure that IT leaders and IT staff understand what drives academic and

business value for the institution and can identify and articulate how tech-nology can deliver that value Consider attending non-technology confer-ences to learn how business officers faculty and academic leaders thinkabout technology and what their pressing problems are Be the translatorfor business strategy

983150 To reach the broader institutional community consider newslettersbrown-bag gatherings and roundtable discussions and take advantageof recurring events such as National Cyber Security Awareness Month(httpwwweducauseeduncsam) and start-of-the-semester gatherings

Issue 6Increasing the IT

Organizationrsquos Capacityfor Managing Change

Despite DifferingCommunity Needs

Priorities and Abilities

Change is the watchword todayand going forward In the 2011book Race against the Machine MIT economists Erik Bryn-jolfsson and Andrew McAfee

write ldquoAdvances like the Googleautonomous car Watson the Jeop-ardy champion supercomputer andhigh-quality instantaneous machinetranslation then can be seen as thefirst examples of the kinds of digitalinnovations wersquoll see as we move into the phase where exponentialgrowth yields jaw-dropping resultsrdquo10

When technology changes organiza-tions are always challenged to adapt tonew circumstances This is par ticularlytrue of the organizations tasked with

implementing and maintaining thetechnology itselfThe higher education community

is struggling not only with the pace ofchange in information technology butalso with the variety and sheer volumeof change Information technology isincreasingly important to and increas-ingly integrated with all aspects ofboth the strategic and the operationalfunctions of the campus The chal-

ldquoWe also add value by creating newways for those who know us less well to

develop affinity with our institutions Asmall MOOC my college offered made usknown to groups of prospective studentswho would never have paid a momentrsquosattention to any traditional advertisingmessages we might have sent By joiningtheir party first via our technologies weput ourselves in a much better position to

invite them to our partyrdquomdashJames Kulich

Vice President and Chief Information OfficerElmhurst College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

lenge is how to engage multiple areasof the institution and expand servicesin numerous simultaneous initiativesMeanwhile institutional informa-

tion technology is reengineering itsinfrastructure platforms and servicesThose change efforts are often additiveto the applications being introduced aspart of new business-area initiatives

Ideally the institutional stancetoward change is proactive and ITleaders have the vision and good senseto advocate to broker and to preparetheir various constituents for upcom-ing changes while sustaining ongo-ing operations In reality end users

vary widely in their predisposition to

technology As a group students andfaculty are positively disposed towardinformation technology but as indi-

viduals they run the gamut (see Figure8) And attitudes influence behaviorthe way faculty and students adopt and

FIGURE 8 Relationship between Faculty Attitudes toward Online Learningand Their Experience with Online Teaching

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014(Louisville CO ECAR July 2014)

Percentage of respondents who agree or strongly agree

No recent onlineteaching

Some recentonline teaching

50250 75 100

All respondents

Online learning helps students learn more effectively

Online learning will lead to pedagogical breakthroughs

Online learning will make higher education available to more students

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2035

30 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

use technology tends to reflect theirattitudes11

The IT organizationrsquos history of exe-cution can influence community open-ness toward future technology changesThe shadow cast by a deeply flawed ERPimplementation for example can last adecade or longer

Change management is preciselythat managing change rather than lettingchange happen on its own (see Figure 9)

Successful change management is notaccidental or organic It is intentionaland has multiple components Manyinstitutions adopt a specific approachto implementing changemdashapproachessuch as ADKAR Kurt Lewinrsquos changemanagement model and John Kot-terrsquos eight steps12 Regardless of the

model managing change requires astrategy in which the goals and focusof the change are clear to internal andexternal constituents For examplethe corporate consultant Glenn Llopisadvises being able to identify what thesuccessful implementation of a changestrategy would look like knowing whatthe change strategy is trying to solveand identifying the required resourcesand relationships to implement the

change management strategy

13

As theIT organization sifts through the differ-ent needs abilities and priorities of theinstitution and tries to adapt to changeit must avoid being caught in a viciouscircle of tactics with no purpose

A good change management strat-egy has multiple components which

include communications and inclu-siveness John Jones DeAnne Agu-irre and Matthew Calderone provideten sensible principles for managing

change by keeping the human elementat the center14 Involving every level ofan organization creating ownershipassessing the cultural landscape andcommunicating effectively are keyfactors Change always affects some-body somewheremdashboth internally andexternally IT organizations must doeverything possible to find engagedpeople who can advocate on behalf ofthe change strategy It helps to havechampions at all levels executiveswho can demonstrate the institutional

leadersrsquo commitment area leaders whocan reinforce commitment with theirworkforce and explain how the change

will benefit their part of the institu-tion and individual influencers whocan help determine success factorsidentify and address pain points andevangelize with their colleagues

But change management involves

more than communications and inclu-siveness A successful change is a fullydesigned change Too often institu-tional leaders conflate new initiativeswith new systems and fail to fully thinkthrough and execute on the business-end components The successfulintroduction of a new system mightrequire new or reengineered businessprocesses new roles and even differ-ent organizational structures Every

ldquoTechnology is now integrated into just about

every aspect of our colleges and universitiesThat allows us a myriad of opportunitiesto use technology to help students succeedacademically Using technology to helpstudents succeed is at the core of what we dordquo

mdashSteve FleagleChief Information Officer and Associate Vice President

The University of Iowa

FIGURE 9 Percentage of Institutions That Have Implemented the ITIL ChangeManagement Process

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

23

13

25

30

44

44

Source EDUCAUSE Core Data Service 2013

Involvingevery level of an

organization creatingownership assessing thecultural landscape and

communicating effectivelyare key factors Changealways affects somebody

somewhere

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 18: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1835

28 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Advice983150 Map IT priorities to institutional priorities Find the points of intersection

with the business unit operations customers and technology Partnerwith the business unit to develop a roadmap and to align the business withthe IT architecture

983150 Donrsquot wait for an invitation to discuss business and customer impact Butdonrsquot try to boil the ocean keep focused and be clear about what the IT

organization can and cannot do IT leaders must be translators usingterminology that resonates with non-IT experts and connecting the dotsbetween the technology capabilities and the business needs Develop asmall set of short and simple stories about concrete ways in which tech-nology has improved the learning experience at the institution createdaccess to institutional resources strengthened affinity for the institutiongenerated revenue and streamlined operations Focus at least as much onhelping others see what is possible with technology as on showing howtechnology investments improve current institutional life

983150 Develop a service catalog to serve as a base for connecting the work of theIT organization to the larger institutional strategic objectives

983150 Implement a metrics program that can demonstrate the extent to which theIT organization is achieving its service-level goals customer-satisfaction

goals and financial goals and is delivering on strategic priorities983150 Ensure that IT leaders and IT staff understand what drives academic and

business value for the institution and can identify and articulate how tech-nology can deliver that value Consider attending non-technology confer-ences to learn how business officers faculty and academic leaders thinkabout technology and what their pressing problems are Be the translatorfor business strategy

983150 To reach the broader institutional community consider newslettersbrown-bag gatherings and roundtable discussions and take advantageof recurring events such as National Cyber Security Awareness Month(httpwwweducauseeduncsam) and start-of-the-semester gatherings

Issue 6Increasing the IT

Organizationrsquos Capacityfor Managing Change

Despite DifferingCommunity Needs

Priorities and Abilities

Change is the watchword todayand going forward In the 2011book Race against the Machine MIT economists Erik Bryn-jolfsson and Andrew McAfee

write ldquoAdvances like the Googleautonomous car Watson the Jeop-ardy champion supercomputer andhigh-quality instantaneous machinetranslation then can be seen as thefirst examples of the kinds of digitalinnovations wersquoll see as we move into the phase where exponentialgrowth yields jaw-dropping resultsrdquo10

When technology changes organiza-tions are always challenged to adapt tonew circumstances This is par ticularlytrue of the organizations tasked with

implementing and maintaining thetechnology itselfThe higher education community

is struggling not only with the pace ofchange in information technology butalso with the variety and sheer volumeof change Information technology isincreasingly important to and increas-ingly integrated with all aspects ofboth the strategic and the operationalfunctions of the campus The chal-

ldquoWe also add value by creating newways for those who know us less well to

develop affinity with our institutions Asmall MOOC my college offered made usknown to groups of prospective studentswho would never have paid a momentrsquosattention to any traditional advertisingmessages we might have sent By joiningtheir party first via our technologies weput ourselves in a much better position to

invite them to our partyrdquomdashJames Kulich

Vice President and Chief Information OfficerElmhurst College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

lenge is how to engage multiple areasof the institution and expand servicesin numerous simultaneous initiativesMeanwhile institutional informa-

tion technology is reengineering itsinfrastructure platforms and servicesThose change efforts are often additiveto the applications being introduced aspart of new business-area initiatives

Ideally the institutional stancetoward change is proactive and ITleaders have the vision and good senseto advocate to broker and to preparetheir various constituents for upcom-ing changes while sustaining ongo-ing operations In reality end users

vary widely in their predisposition to

technology As a group students andfaculty are positively disposed towardinformation technology but as indi-

viduals they run the gamut (see Figure8) And attitudes influence behaviorthe way faculty and students adopt and

FIGURE 8 Relationship between Faculty Attitudes toward Online Learningand Their Experience with Online Teaching

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014(Louisville CO ECAR July 2014)

Percentage of respondents who agree or strongly agree

No recent onlineteaching

Some recentonline teaching

50250 75 100

All respondents

Online learning helps students learn more effectively

Online learning will lead to pedagogical breakthroughs

Online learning will make higher education available to more students

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2035

30 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

use technology tends to reflect theirattitudes11

The IT organizationrsquos history of exe-cution can influence community open-ness toward future technology changesThe shadow cast by a deeply flawed ERPimplementation for example can last adecade or longer

Change management is preciselythat managing change rather than lettingchange happen on its own (see Figure 9)

Successful change management is notaccidental or organic It is intentionaland has multiple components Manyinstitutions adopt a specific approachto implementing changemdashapproachessuch as ADKAR Kurt Lewinrsquos changemanagement model and John Kot-terrsquos eight steps12 Regardless of the

model managing change requires astrategy in which the goals and focusof the change are clear to internal andexternal constituents For examplethe corporate consultant Glenn Llopisadvises being able to identify what thesuccessful implementation of a changestrategy would look like knowing whatthe change strategy is trying to solveand identifying the required resourcesand relationships to implement the

change management strategy

13

As theIT organization sifts through the differ-ent needs abilities and priorities of theinstitution and tries to adapt to changeit must avoid being caught in a viciouscircle of tactics with no purpose

A good change management strat-egy has multiple components which

include communications and inclu-siveness John Jones DeAnne Agu-irre and Matthew Calderone provideten sensible principles for managing

change by keeping the human elementat the center14 Involving every level ofan organization creating ownershipassessing the cultural landscape andcommunicating effectively are keyfactors Change always affects some-body somewheremdashboth internally andexternally IT organizations must doeverything possible to find engagedpeople who can advocate on behalf ofthe change strategy It helps to havechampions at all levels executiveswho can demonstrate the institutional

leadersrsquo commitment area leaders whocan reinforce commitment with theirworkforce and explain how the change

will benefit their part of the institu-tion and individual influencers whocan help determine success factorsidentify and address pain points andevangelize with their colleagues

But change management involves

more than communications and inclu-siveness A successful change is a fullydesigned change Too often institu-tional leaders conflate new initiativeswith new systems and fail to fully thinkthrough and execute on the business-end components The successfulintroduction of a new system mightrequire new or reengineered businessprocesses new roles and even differ-ent organizational structures Every

ldquoTechnology is now integrated into just about

every aspect of our colleges and universitiesThat allows us a myriad of opportunitiesto use technology to help students succeedacademically Using technology to helpstudents succeed is at the core of what we dordquo

mdashSteve FleagleChief Information Officer and Associate Vice President

The University of Iowa

FIGURE 9 Percentage of Institutions That Have Implemented the ITIL ChangeManagement Process

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

23

13

25

30

44

44

Source EDUCAUSE Core Data Service 2013

Involvingevery level of an

organization creatingownership assessing thecultural landscape and

communicating effectivelyare key factors Changealways affects somebody

somewhere

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 19: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 1935

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

lenge is how to engage multiple areasof the institution and expand servicesin numerous simultaneous initiativesMeanwhile institutional informa-

tion technology is reengineering itsinfrastructure platforms and servicesThose change efforts are often additiveto the applications being introduced aspart of new business-area initiatives

Ideally the institutional stancetoward change is proactive and ITleaders have the vision and good senseto advocate to broker and to preparetheir various constituents for upcom-ing changes while sustaining ongo-ing operations In reality end users

vary widely in their predisposition to

technology As a group students andfaculty are positively disposed towardinformation technology but as indi-

viduals they run the gamut (see Figure8) And attitudes influence behaviorthe way faculty and students adopt and

FIGURE 8 Relationship between Faculty Attitudes toward Online Learningand Their Experience with Online Teaching

Source Eden Dahlstrom and D Christopher Brooks ECAR Study of Faculty and Information Technology 2014(Louisville CO ECAR July 2014)

Percentage of respondents who agree or strongly agree

No recent onlineteaching

Some recentonline teaching

50250 75 100

All respondents

Online learning helps students learn more effectively

Online learning will lead to pedagogical breakthroughs

Online learning will make higher education available to more students

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2035

30 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

use technology tends to reflect theirattitudes11

The IT organizationrsquos history of exe-cution can influence community open-ness toward future technology changesThe shadow cast by a deeply flawed ERPimplementation for example can last adecade or longer

Change management is preciselythat managing change rather than lettingchange happen on its own (see Figure 9)

Successful change management is notaccidental or organic It is intentionaland has multiple components Manyinstitutions adopt a specific approachto implementing changemdashapproachessuch as ADKAR Kurt Lewinrsquos changemanagement model and John Kot-terrsquos eight steps12 Regardless of the

model managing change requires astrategy in which the goals and focusof the change are clear to internal andexternal constituents For examplethe corporate consultant Glenn Llopisadvises being able to identify what thesuccessful implementation of a changestrategy would look like knowing whatthe change strategy is trying to solveand identifying the required resourcesand relationships to implement the

change management strategy

13

As theIT organization sifts through the differ-ent needs abilities and priorities of theinstitution and tries to adapt to changeit must avoid being caught in a viciouscircle of tactics with no purpose

A good change management strat-egy has multiple components which

include communications and inclu-siveness John Jones DeAnne Agu-irre and Matthew Calderone provideten sensible principles for managing

change by keeping the human elementat the center14 Involving every level ofan organization creating ownershipassessing the cultural landscape andcommunicating effectively are keyfactors Change always affects some-body somewheremdashboth internally andexternally IT organizations must doeverything possible to find engagedpeople who can advocate on behalf ofthe change strategy It helps to havechampions at all levels executiveswho can demonstrate the institutional

leadersrsquo commitment area leaders whocan reinforce commitment with theirworkforce and explain how the change

will benefit their part of the institu-tion and individual influencers whocan help determine success factorsidentify and address pain points andevangelize with their colleagues

But change management involves

more than communications and inclu-siveness A successful change is a fullydesigned change Too often institu-tional leaders conflate new initiativeswith new systems and fail to fully thinkthrough and execute on the business-end components The successfulintroduction of a new system mightrequire new or reengineered businessprocesses new roles and even differ-ent organizational structures Every

ldquoTechnology is now integrated into just about

every aspect of our colleges and universitiesThat allows us a myriad of opportunitiesto use technology to help students succeedacademically Using technology to helpstudents succeed is at the core of what we dordquo

mdashSteve FleagleChief Information Officer and Associate Vice President

The University of Iowa

FIGURE 9 Percentage of Institutions That Have Implemented the ITIL ChangeManagement Process

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

23

13

25

30

44

44

Source EDUCAUSE Core Data Service 2013

Involvingevery level of an

organization creatingownership assessing thecultural landscape and

communicating effectivelyare key factors Changealways affects somebody

somewhere

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 20: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2035

30 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

use technology tends to reflect theirattitudes11

The IT organizationrsquos history of exe-cution can influence community open-ness toward future technology changesThe shadow cast by a deeply flawed ERPimplementation for example can last adecade or longer

Change management is preciselythat managing change rather than lettingchange happen on its own (see Figure 9)

Successful change management is notaccidental or organic It is intentionaland has multiple components Manyinstitutions adopt a specific approachto implementing changemdashapproachessuch as ADKAR Kurt Lewinrsquos changemanagement model and John Kot-terrsquos eight steps12 Regardless of the

model managing change requires astrategy in which the goals and focusof the change are clear to internal andexternal constituents For examplethe corporate consultant Glenn Llopisadvises being able to identify what thesuccessful implementation of a changestrategy would look like knowing whatthe change strategy is trying to solveand identifying the required resourcesand relationships to implement the

change management strategy

13

As theIT organization sifts through the differ-ent needs abilities and priorities of theinstitution and tries to adapt to changeit must avoid being caught in a viciouscircle of tactics with no purpose

A good change management strat-egy has multiple components which

include communications and inclu-siveness John Jones DeAnne Agu-irre and Matthew Calderone provideten sensible principles for managing

change by keeping the human elementat the center14 Involving every level ofan organization creating ownershipassessing the cultural landscape andcommunicating effectively are keyfactors Change always affects some-body somewheremdashboth internally andexternally IT organizations must doeverything possible to find engagedpeople who can advocate on behalf ofthe change strategy It helps to havechampions at all levels executiveswho can demonstrate the institutional

leadersrsquo commitment area leaders whocan reinforce commitment with theirworkforce and explain how the change

will benefit their part of the institu-tion and individual influencers whocan help determine success factorsidentify and address pain points andevangelize with their colleagues

But change management involves

more than communications and inclu-siveness A successful change is a fullydesigned change Too often institu-tional leaders conflate new initiativeswith new systems and fail to fully thinkthrough and execute on the business-end components The successfulintroduction of a new system mightrequire new or reengineered businessprocesses new roles and even differ-ent organizational structures Every

ldquoTechnology is now integrated into just about

every aspect of our colleges and universitiesThat allows us a myriad of opportunitiesto use technology to help students succeedacademically Using technology to helpstudents succeed is at the core of what we dordquo

mdashSteve FleagleChief Information Officer and Associate Vice President

The University of Iowa

FIGURE 9 Percentage of Institutions That Have Implemented the ITIL ChangeManagement Process

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

23

13

25

30

44

44

Source EDUCAUSE Core Data Service 2013

Involvingevery level of an

organization creatingownership assessing thecultural landscape and

communicating effectivelyare key factors Changealways affects somebody

somewhere

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 21: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

change also demands a goodsupport strategy Rollouts are

vie wed as smo oth when endusers are already familiar with

the new system when theyhave job aids training andother practical tools and whenthey know where to go forhelp and receive it promptlyand effectively Changes affectthe IT organization as well asbusiness units A change man-agement plan needs to includeboth sets of changes The mul-tiple components of change aresubstantial and need to be builtinto project plans timelines

and budgetsChang e manag ement is

challenging on a good day Astechnology changes increasein pace variety and volumechang e manag ement chal-lenges multiply Change man-agement needs to be become acore capability of the IT organi-zation and a core competencyof the institution overall

Advice983150 Create a change manage-

ment role to ensure thatsomeone is expert in andable to lead and supportchange management efforts

983150 Adopt a change manage-ment methodology and useit to develop a change man-agement process and toolkitto support change manage-ment efforts

983150 Review IT policies to seew h e t h e r t h e y s u p p o r tchange while protecting thelegitimate interests of pri-

vacy and security983150 Have separate but linked

innovation and operationsactivities and budgets tounleash the innovationwork without burdening theoperations work

Providing IT support has alwaysbeen challenging Faculty staffand students with myriad needshave different requirementsof technology different levels

of expertise different communicationstyles and different service expectations

Technical issues can be sporadic andseem often to appear only when the ITsupport person is not present to iden-tify them Root-cause analysis within acomplex infrastructure can sometimesdevolve to trial and error And users wanttheir problems solved now now now

The ldquonew normalrdquo of mobile onlinelearning bring-your-own-everythingand cloud computing is the latest stepin the gradual migration of institutionalsystems from a tightly controlled environ-ment to a very diverse environment that is

out of the direct control of the institutionTen years ago most college and universitysystems were hosted on institutionallyowned servers and were delivered acrossinstitutionally owned networks ontoinstitutionally owned computers Thiscomputing environment was relativelyhomogeneous and the support responsi-bilities were clear Supporting MacintoshPCs or multiple versions of Windowsoperating systems was among the major

challenges of the day PDAs were nichedevices and phones still werenrsquot verysmart How easy that seems in retrospect

Today faculty staff and students

expect to use institutional systems and toaccess transmit and store data anytimeand anywhere using a wide variety ofpersonal and work devices and applica-tions Institutional applications haveburgeoned and integration points haveincreased exponentially The complexityof IT support has increased accordingly

Because faculty staff and studentsalready use mobile technology in theirpersonal lives theyrsquore likely more profi-cient with it than they would be if forcedto use a single platform for work Unfor-

tunately this variety that helps enableand free faculty students and staff alsomeans that IT support staff must becomeproficient with a much wider variety ofplatforms and systems The ldquonew normalrdquoalso presents new opportunities and newchallenges In a BYOD environmentend users may be more skilled with theirdevices than previously At the same timehowever IT professionals must becomemore skilled with a wide variety of tech-nologies and platforms

The rising popularity of cloud com-puting raises issues not just for providingsupport for a wide variety of platforms butalso for ensuring data security Even insti-tutions that arrange for secure cloud com-puting for institutional services have toconsider the risk that end users will chooseto use alternative cloud computing ser-

vices Another challenge of cloud comput-ing is when IT support staff find that theirability to troubleshoot and diagnose userproblems is curtailed because their accessto cloud-based infrastructure platforms

and services is more limited than theiraccess to campus-based technologiesIn many ways issues surrounding

user support do not change in the newnormal Many of the challenges remainthe same Fortunately many of the bestpractices in IT support also apply and canbe more useful than ever

It is very important for the ITorganization to clearly define the amountof support that faculty staff and students

Issue 7Providing User Support in

the New NormalmdashMobileOnline Education Cloudand BYOD Environments

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 22: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2235

32 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

can expect Service level agreements(SLAs) exist to provide clear informationabout what the IT organization can sup-portmdashas well as when where and how

quicklymdashand about end usersrsquo responsi-bilities SLAs define the limits of supportThey also commit the IT organization to acertain base level of service and describethe metrics that the IT organization willuse to measure its ability to achieve thatbaseline The best SLAs are a negotia-tion between the IT organization and thebusiness units ensuring that the IT sup-port end users need is within the boundsof what the IT organization is actuallycapable of delivering with its currentfunding levels

SLAs should be regularly renegoti-ated In the new normal this providesthe IT organization an opportunity tounderstand current support needs andto negotiate either new concrete limits orfunding increases to support increaseddemand IT organizations have com-

monly set priorities for IT support toclarify which applications devices andenvironments will receive full supportbest-effort support or no support It canbe just as important for the organizationto document and communicate the con-

figurations and combinations that donrsquotwork with institutional resources or thatconstitute special security risks

Effective repeatable processes can helpIT support become more efficient To datethe focus has been on ITIL processes such

FIGURE 10 Percentage of Institutions That Have Implemented Self-ServiceSupport

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

59

66

67

74

80

89

Source EDUCAUSE Core Data Service 2013

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 23: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

as incident management and request management These are still excellent pathsto efficient IT support With these service management processes in place ITorganizations can consider moving beyond managing the support transaction tomanaging the customer Customer relationship management (CRM) applications

in higher education are most commonly applied to student applicants or alumniUsing a CRM to support the institutional community can help IT support movefrom a problem-oriented service to a value-oriented service

Escalation paths have always enabled IT support staff to easily and quicklydetermine who where and how to escalate support issues Now escalation pathswill increasingly leave the institution Tracking support tickets can become par-ticularly challenging

Knowledge management is key Providing support in the new normal is anincentive for institutions to invest in or expand knowledge bases or self-supportportals Self-service support is the least-expensive form of IT support and canalso provide better support 247 solutions that are documented and a consis-tent searchable database (see Figure 10) Self-service support documentationprovided by the IT organization can be augmented with moderated community

solutions to extend the efficiency and expertise of the IT support professionalsIT professionals who can communicate clearly and personably with end users

are still the most valuable resources an IT staff can have A certain level of empa-thy is useful not only for increasing user satisfaction but also for being able toaddress questions well The ability to put oneself in the place of an end user whodoes not spend all of hisher time steeped in the details of technology is a valu-able skill and one that should be fostered whenever possible

Advice983150 Help designers and faculty ensure accessibility and ADA compliance in

online education983150

Develop a data security governancestorage policy so that end users knowwhich data is appropriate for mobile and cloud services983150 If mobile support is currently at a ldquobest effortrdquo level consider making at least

some aspects of it ldquomission criticalrdquo983150 Consider a mobile device management (MDM) solution for mobile devices

that access institutional data983150 Audit the management of IT support to determine whether such practices as

SLAs ITIL processes and a service catalog are in place983150 Invest in knowledge management Begin with a knowledge management tool

for IT support staff Then expand the capability to provide end users withself-support resources extending to self-provisioning if possible

Issue 8Developing Mobile

Cloud and DigitalSecurity Policies ThatWork for Most of the

Institutional Community

Historically higher education insti-tutions have been in full controlof both the computers and theservices storing collegeuniversitydata We now find ourselves in

a world where faculty students and staff

access campus data with a wide variety ofdevices and servicesmdashmany of which areoutside the control of the institution Theproliferation of mobile devices and the useof cloud services create new questions forIT policy makers about information secu-rity and data management Employees andstudents alike are using personally ownedmobile devices to access institutionalresources E-mail is the most obviousbut with shared institutional data resid-ing in the cloud through services such asMicrosoft Office 365 and Google Apps for

Education people are accessing data inthe form of spreadsheets and reports froma variety of mobile devices from different

vendors most of whom offer to back updata from the mobile device into their owncloud-based storage With this confusionof services and profusion of providers(most of whom the institution has not con-tracted with for protecting the data) man-aging institutional data becomes more andmore difficult

ldquoThe explosion of online education ofcourse also increases the demand for 247supportmdashsupport that may be difficultor impossible for resource-limited ITdepartments to providerdquo

mdashJenny CrispQEP Director and Assistant Professor of English

Dalton State College

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 24: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2435

34 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

The risks of doing nothing are clear When institutional data can easily andaccidentally migrate outside of the controlof the institution it becomes critical forthe IT organization to develop clear infor-mation and data-governance policies thatdefine and spell out the appropriate waysto store and access campus data

The dynamic and rapidly evolvingnature of technology and its use can provechallenging for institutions whose securitypolicies and procedures may be geared fortraditional information systems At mostinstitutions students and faculty are freeto explore and use emerging technologies

(in some cases even to create them) Infor-mation security policies must addressboth this need for exploration and the riskappetite of the institution (see Figure 11)

The specific cases of mobile devicesand cloud computing can be addressedunder a general framework for adapt-ing policies and processes to focus on

protecting data rather than for makingchanges in technology Informationsecurity policies and standards establisha base threshold for risk tolerance as wellas parameters that surround acceptedrisk (risk mitigation and containment) Awell-crafted information security policy

is focused on broad responsibilities thatdonrsquot change with new technologies

Increasingly policies have moved awayfrom technologies users or networks and

have become focused on information (anddata governance) This approach providesan opportunity to create risk- and security-focused controls that are largely unaffectedby changing technologies In this mannermobile and cloud policies can dovetail withdata-governance efforts (see Figure 12)Data governance as a framework addresseskey issues of information (eg availabilityintegrity security and privacy) regardless ofthe location and technology

Because data security requires thecooperation of every person who comes

in contact with institutional data the mereexistence of policies is not enough Onething that can help is a well-developedinformation security awareness and train-ing program Goals would be to incorpo-rate the program into the new employeeonboarding process and ultimately tomake its completion required of all mem-bers of the institutional community (stu-dents faculty staff and other affiliates)Even with those goals institutions will needto find ways to enforce policy at least for

institutionally owned devices Technology-based solutions like mobile device manage-ment (MDM) software are becoming morecommon (see Figure 13) Still that addressesonly a small fraction of all the devices thatare being used to access sensitive datameaning that policy and awareness remainour most important tools

Advice983150 Clarify the institutional approach to

emerging security issues to determine

when the institution should try to ldquogetaheadrdquo of emerging issues or when itshould ldquowait and seerdquo how the issuesaffect peer institutions

983150 Strengthen ties to the higher educationinformation security community byparticipating in the Higher EducationInformation Security Council (HEISC)and the Research and Education Net-working Information Sharing and

Analysis Center REN-ISAC

FIGURE 11 Distribution of Balance between IT Risk Control and Functionality Openness

5

10

15

20

0 100

50Balance

is our priorityFunctionalityopenness

is our priorityRisk controlis our priority

mean 56

P e r c e n t a g e

o f i n s t i t u t i o n s

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

FIGURE 12 Institutional Data Security Practices

Source Jacqueline Bichsel and Patrick Feehan Getting Your Ducks in a Row IT Governance Risk and CompliancePrograms in Higher Education (Louisville CO ECAR June 2014)

Institutions that assessIT risks related to cloud-

computing activities

IT organizations that havethe authority to manageor control decentralized

(end-user) actions that

involve release of dataor security breaches

Percentage of respondents

67

54

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 25: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2535

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

983150 Review the overall institutional approach to creating policies to ensurethat they are sufficiently broad and technology-agnostic to accommodatechanges in new technologies

983150 Decide which policies should address all constituents in the same mannerand which should be adapted to various groups such as students facultystaff and affiliates

983150 Ensure that information-focused policies like data governance are tech-nology-independent However regularly track changes in the technologylandscape to review potential implications for and impact on policy

983150 Ensure that mobile and cloud policies are enforceable983150 Develop a communications and enforcement plan to ensure that members

of the institutional community understand and adhere to policies

Issue 9Developing an EnterpriseIT Architecture That Can

Respond to ChangingConditions and New

Opportunities

How higher education willrespond to the acceleration ofchange remains a top issue for2015 Using agility as a watch-word IT professionals have

often tried to predict or respond tochange by emulating a successful effortat another institution Yet the velocity ofchange in 2015 and beyond skews pastformulaic response Agility now requiresinstitutions to learn grow respondand become self-sustaining in shorteramounts of time

Enterprise IT architecture is the over-all structure within which the institu-tionrsquos information technology functionsand interrelates An effective enterpriseIT architecture is intentional and scal-

able ensuring that IT systems servicesand data flows can work together and aredesigned to support business processesand to advance business strategy Astechnology environments and optionscontinue to expand they present newopportunities to provide value to highereducation Without a clear IT architec-ture as an anchoring reference thosenew opportunities can easily burden aninstitution with a marvelous set of point

ldquoThose of us whose job it is to think aboutthese things understand the issues andtechnologies and with some thought (andsome long conversations with collegecounsel and risk management personnel)can come up with a strategy for addressing

the situation Developing policy languagethat will explain the problem and thestrategy for dealing with it in ways that areunderstandable to the bulk of the collegecommunity is infinitely more difficultrdquo

mdashMark I Berman Chief Information Officer

Siena College

FIGURE 13 Mobile Device Management Practices

Not in place

Being tracked

Being planned

Being implemented

In place at institutions

3

26

27

18

16

10

Respondents donrsquotknow what mobile device

management is

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 26: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2635

36 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

solutions that interoperate only with greatinitial and ongoing effort (and expenseand risk)

For many IT professionals the appealof working in academia is the opportunityfor new learning experiences through therich interplay of academic communitiestechnology research and collaborationHowever budget constraints and con-flicting priorities within higher educa-tion subcultures have often challenged

the feasibility of an IT architecture thattruly works for the entire institution Theldquoenterpriserdquo in enterprise IT architecturesrefers to a set of IT solutions that servethe entire institution The most effectiveIT architecture is one that works for thewhole enterprise rather than being aglove-fit for several individual areas

Emerging and maturing technolo-gies are presenting new conditions thatenterprise IT architects should considerThey include mobile multiple layers ofcloud solutions BYOD increasing digiti-

zation of the higher education missionsand the Internet of everything All thesetrends generate data streams and sourcesthat higher education is just beginningto value and use toadvance institutionalstrategy An effectiveenterprise IT architec-ture that can put all thepieces together cost-effectively and in ser-

vice to the enterprisecan truly become acompetitive advantagefor institutions (seeFigure 14)

For example ascloud and SaaS appli-cations proliferatethrough campusesthe integration of thoseapplications into the enterprise IT archi-tecture becomes a major concern anda major risk Applications that are not

integrated into the overarching IT archi-tecture cannot contribute their data tothe ldquoBig Picturerdquo They become islands ofdata that may be useful to the individual

department but can create a blind spot inthe top-level view of the institution

The creation or development of anIT architecture that can easily adapt andabsorb this quickly growing collection ofindependent software services is criticallyimportant to maintaining a comprehen-sive picture of the enterprise We have allheard the term big data and understandthat big rewards can be reaped from thecollation and analysis of all the smallpieces of information collected through-out our organizations An IT architecture

that can easily incorporate new applica-tions is going to be better able to presenta clear picture of what is going on andbetter able to inform strategic decisionmaking

Centralizing and standardizing fur-ther simplifies the ability to respondquickly to changes If a single platform

is used in multiple instances often achange can be made once and thenquickly duplicated to similar resourcesCentralized approaches for servicesminimize instances that would needto be changed so that when needed asingle change can provide enterpriseimpact

Good enterprise IT architecturecan make the IT organization and theinstitution more effective The obverse

ldquoTaking time to plan ahead with newprocurements will provide you a keystonefor future successrdquo

mdashMark C Adams Vice President for Information Technology

Sam Houston State University

FIGURE 14 Institutional IT Architecture Approaches

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

I donrsquot understand this question

We have local IT architecturestandards and conform ourlocal and vendor systems to

that architecture

We locally integrate thearchitectures of multiple

major systems

We follow the architectureof a primary system or suite 32

56

10

2

A neffective enterprise

IT architectureis intentional and scalable

ensuring that IT systems servicesand data flows

can work togetherand are designed to support

business processes andto advance business strategy

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 27: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2735

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

is also true A recent Gartner warningapplies to more than just applicationsIn the absence of an architectureldquoapplications are built with little regard

for structure fitness for purpose ormaintainability And a lack of invest-ment in application architectureseriously compromises the ability todevelop composite applications andbusiness process management solu-tionsmdashboth of which rely on the abil-ity to readily integrate heterogeneousapplications and data sources Finallyan old or accidental application archi-tecture results in systems that are dif-ficult to change and difficult to debugdriving up costs budget risk and sched-

ule uncertaintyrdquo15

A well-defined enterprise IT archi-tecture will be instrumental for manag-ing change and optimizing opportuni-ties To sustain and grow a dynamicIT architecture IT leaders must not

Advice983150 Determine the extent to which the institutional culture will support a standardized

environment and enterprise-wide architecture Take a strategic and staged approachto implementing enterprise architecture rather than trying to accommodate theentire institution at once Work with receptive institutional partners to develop achange management strategy to accelerate effective adoption

983150 Remember that a dynamic enterprise architecture requires high-level continuousplanning and review Within the IT organization establish staff roles that are respon-sible for enterprise architecture

983150 Consider applying agile methodology concepts to culture and operations as well asto development to help the IT organization respond nimbly and quickly to changes

983150 Whenever possible select andor design systems as configurable rather than as fixedsingle-use resources

983150 Develop standards for classifying data in a systematic and consistent manner acrossall institutional and departmental systems including those in the cloud

overlook the importance of the ITorganizational culture Great ideasor future roadblocks will arise fromthe daily decisions of IT staff Leaders

should educate and encourage staff toconsider flexibility and adaptability indaily decision making Additionally the

IT culture should adhere to a philoso-phy of collaboration with institutionalpartners A culture of collaborationwill facilitate the gathering of more

reliable scope definitions for new proj-ects ultimately simplifying the changeprocess

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 28: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2835

38 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

Issue 10Balancing Agility

Openness and Security

The delicate act of balancing thecomplex needs for opennessand freedom in higher educa-tion against the backdrop of anestimated 822 million records

breached worldwide remains a fore-front issue16 In a world of increasingand complex security threats highereducation institutions must move from

a reactive to a proactive response intheir IT security infrastructure Protect-ing data and networks while maintain-ing openness and agility requires abalanced and open approach The chal-lenges abound

Perhaps the biggest of these chal-lenges is the human element Facultystudents and staff should be preparedand empowered to conduct themselvessafely securely and ethically in thecyberworld Tools and programs suchas the HEISC Information Security Guide

and the Stay Safe Online program of theNational Cyber Security Alliance canprove very useful in helping to meetthis need17 To balance agility opennessand security IT leaders must increas-ingly push auditable accountability outto users and their managers

In addition as the interest in analyt-ics continues to grow daily operationsthroughout the academy are becominghighly dependent on access to data

needed to support and safeguard col-laborative research across disciplinesinstitutions and organizations Feder-ated identity is providing a first step for

access to institutional services (see Fig-ure 15) but more is needed especiallyin areas such as intellectual propertycopyright and export control

Still another challenge is the needfor agility in the delivery of technology-based solutions and services This is adriving force in the evolution towardcloud-based services The IT organiza-tion needs to be architecting services

and solutions that can be introducedand modified and even retired inrapid fashion This is no different fromthe situation in many other industries

This is a paradoxical and importantissue for higher education in 2015 asthe penalties and costs of data breachesgrow the value of the data to be used

and leveraged in the academic missionis also growing Student outcomes areincreasingly tied to the brand of an insti-tution as prospective students and theirparents try to search for value metricsto help select a college or universityMetrics of real value entail an increaseduse of available datamdashand that portendsrisk IT organizations must have a strat-egy to allow access to adequate secureand appropriate datafor more entities inthe higher education

ecosystem while alsotak ing the utmostcare for the privacy ofindividuals

An ot he r ar ea ofchallenge concernsthe research missionM u c h r e s e a r c h i sconducted with pro-totypes or special-ized technology thatinstitutional IT staff

neither support norare aware of Howshould the IT organization handle theunknowns in this scenario Further-more in an era of participatory andldquocrowdrdquo culture improvements are

FIGURE 15 Percentage of Institutions with Federated Identity Management inPlace

33

7

15

15

5

11

8

24

14

38

19

57

Implementing

In place

Associatersquos

Bachelorrsquos

Masterrsquos Private

Masterrsquos Public

Doctoral Private

Doctoral Public

Source Susan Grajek Higher Educationrsquos Top 10 Strategic Technologies in 2015 research report (Louisville CO ECARJanuary 2015)

ITorganizations must havea strategy to allow access

to adequate secureand appropriate data

for more entitiesin the higher education

ecosystem while also takingthe utmost care for theprivacy of individuals

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 29: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 2935

40 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

Top 10 IT Issues 2015

and in society in general Securinginstitutional data in the cloud becomesan accountability that institutionsmust share with both end users and

solution providers Security strate-gies are becoming more fine-grainedand dependent on cooperation with

vendorsNot all cloud sourcing is done by

the central IT organization Vendorsare going directly to end users and vice

versa If the IT organization cannot beagile enough in its review and imple-mentation of cloud services the path ofleast resistance for users may be to workindependently with vendors perhapswithout effective security safeguards

Agility and openness are not dia-metrically opposed to security They

are sometimes interpreted in this waybecause agility and openness oftenmean accepting certain business risksInstitutions may find themselves simul-taneously accepting more risk with new

agile business practices and working toreduce the risk of information breachesand system outages Where these risksoverlap well-defined and effective pro-cesses can help maintain a balance

Agility can imply acceptance of therisk of spending less time in thoroughplanning and execution of a project orit can imply leveraging a suite of exist-ing well-defined and vetted compo-nents to build something new This is a

ldquoHaving the infrastructure and technologiesis manageable to a great degree The human

element is perhaps the biggest challenge inthis equationrdquomdashFrancisca Yonekura

Associate Department Head Center for Distributed LearningUniversity of Central Florida

Open dialogue is the key to bal-ancing risks Candid conversationsbetween CIOs and Chief InformationSecurity Officers (CISOs) Chief Pri-

vacy Officers (CPOs) and stakeholdersare crucial If parties are amenable todiscussions about goals those conver-sations can lead to a greater understand-ing among participants and can openadditional doors to accomplishingthose goals within the risk tolerance ofthe institution

A gilitycan imply acceptance

of the risk of spendingless time in

thorough planning andexecution of a project

or it can imply leveraging asuite of existingwell-defined and

vetted components tobuild something new

Advice983150 Develop a risk profile for both established and new technologies to determine

the appropriate level of risk983150 Educate faculty staff and students to understand the consequences of risk to the

institution in addition to themselves and the steps they should take to minimizethat risk

983150 Brief senior leaders and the board of directors on the current threat environment983150 Develop a security framework and educate community members on how the IT

organization is protecting their data intellectual property and the network983150 Upgrade security tools to enable a proactive response Participate in the EDU-

CAUSE Core Data Survey to benchmark specific security practices and tools983150 Develop a strong partnership among institutional leaders functional leaders

(eg academics research administration) and information security leaders Work in partnership to lead by example

983150 Consider taking a ldquomake it work unless it doesnrsquotrdquo approach in which risks are

identified and addressed instead of automatically avoided983150 Establish a process for identifying assessing and documenting risks to supportdecisions of risk mitigationacceptanceavoidancetransference

983150 Develop data-governance policies and practices983150 Determine the ways in which faculty and institutional leaders need to collaborate

with colleagues at other institutions corporations and government Review theimplications for security and develop an approach that will support collabora-tion and safeguard institutional data

method for mitigating the risks of rapidaction

Openness sounds to many peoplelike exposure to risk but defining the

scope of openness and acting proac-tively can enable open data access withminimal risk Even data protected byregulations such as the Health Insur-ance Portability and Accountability

Act (HIPAA) can be more accessible toresearchers if proper de-identificationand review has occurred

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 30: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3035

42 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

An Administrative IT Perspective on the Top 10 IT IssuesBetsy Tippens Reinitz

T

hree of the EDUCAUSE Top 10 IT Issues for 2015offer a useful lens for viewing administrative ITprograms at higher education institutions Takentogether these three issues can serve as a roadmap for

administrative IT strategy

983150 First determine the costs of administrative services andusing that information work to gain efficiencies in thedelivery of those services potentially freeing up resourcesthat can be reallocated to areas that enable growth andinnovation (Issue 3)

983150 Next prepare for the future by developing an effectivesourcing strategy that promotes flexibility and agility(Issue 9)

983150 Finally demonstrate the business value of administra-tive information technology by using its data for businessintelligence and analytics initiatives in support of the

institutional mission (Issue 5)

Issue 3 Developing IT Funding Models That SustainCore Service Support Innovation and Facilitate GrowthUnderstanding the full costs of providing administrativeIT services is a necessary first step in developing this kindof funding model But these costs are difficult to calculateThey are a combination of one-time and ongoing costs andthey use both capital and operating funds They involve staffresources software licenses hardware expenses and long-and short-term contracts They also include hidden costssuch as energy and facility expenses Although understand-

ing these costs is essential calculating these costs can be anoverwhelming task If resources for this costing work are lim-ited IT leaders can still make progress by getting an approxi-mation of costs as a starting point

Once costs are better understood IT leaders should lookfor ways to be more efficient keeping in mind that mostadministrative IT services though essential to operations donot significantly differentiate one institution from anotherMany administrative systems are heavily customized in waysthat may contribute to the cost of the service without adding

value IT leaders should work with functional units to gainefficiencies through standardization and redesign of businessprocesses in order to decrease customizations and align pro-cesses The resulting reduced or avoided costs may allow for

the reallocation of resources from a focus on the operation ofthe institution to a focus on its growth or transformation

IT leaders should also consider looking outside their orga-nizations for innovation opportunities For example decen-tralized IT units may be able to foster growth and innovationin ways not possible within the central IT organization

Issue 9 Developing an Enterprise IT ArchitectureThat Can Respond to Changing Conditions and NewOpportunitiesIT leaders need to be ready for potentially big changes in howthey architect and deliver administrative IT services With thegrowth of cloud services an enterprise architecture that fol-

lows one primary system or suite is becoming less practicalwhile the integration of architecture and data from multiplesystems is becoming more common

As the IT focus shifts away from the delivery of technol-

ogy to the delivery of services IT leaders need to consider theimportance of flexibility for future data integration And asmore administrative services are moved to hosted solutionsinstitutional leaders need to develop strategies for data flowbetween campus-hosted and off-site systems Staff skill setsmay also need to evolve as data integration and contract man-agement become more important

To set direction IT leaders should develop criteria fordecision making about the hosting and managing of admin-istrative services It is important to think of the services

IT leaders need to educate their institutionsabout the importance of data in furtheringinstitutional goals and they need to play aleadership role in developing an analyticsstrategy that supports those goals

Institutional DifferencesThe EDUCAUSE Top 10 IT Issues for2015 reflect the aggregate priorities ofhigher education institutions Someissues were more or less important forcertain types of institutions18 Respon-dents to the Top 10 IT Issues surveycould choose from a total of eighteenissues Of the eight issues that did notmake the overall Top 10 list five were inthe Top 10 of certain types of institution

983150 Sourcing technologies and services at scaleto reduce costs (via cloud greater centraliza-tion of IT cross-institutional collabora-tions and so forth) was a Top 10 IT issuefor community colleges public mas-terrsquos universities doctoral universi-ties and large institutions (those with8000 or more students)

983150 Managing data across systems (data governance) was a Top 10 IT issue forprivate masterrsquos universities doctoral

Discussionand

Conclusions

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 31: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3135

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

themselves as the focus of the decisionrather than the technology used toprovide the services Decision criteriawill vary depending on campus culture

available resources and long-termgoals but may include issues related tothe recovery and retention of data themanagement of institutional risk andthe ability to conform to applicableregulations and laws Many institutionsare considering a cloud-first strategy inwhich a cloud solution is favored when-ever feasible Cloud solutions can offerscalability and flexibility not availablethrough on-premise hosting as well asfaster deployments and upgrades

Issue 5 Demonstrating theBusiness Value of InformationTechnology and How the ITOrganization Can Help the Institution

Achieve Its Goals Although the operational aspects ofadministrative IT systems are critical toinstitutional goals the business value ofinformation technology can be demon-strated most clearly through the use ofanalytics and business intelligence

Administrative data serves as an important institutional

asset but the strategic value of administrative informationtechnology is sometimes under-realized IT leaders need toeducate their institutions about the importance of data infurthering institutional goals and they need to play a leader-ship role in developing an analytics strategy that supportsthose goals Components of this enterprise strategy shouldinclude a shared vision for the use of analytics and businessintelligence a shared governance model an effective data-management plan and common data definitions As part ofthis work IT leaders should develop partnerships across the

enterprise build alliances with func-tional units and enlist others to helptell the IT tale Developing strategiesfor using administrative IT data for

analytics and business intelligence isan important way in which institutionscan optimize the value of informationtechnology

The Administrative IT Value Administrative information technol-ogy represents a significant expensebut it is also an important asset forhigher education institutions IT lead-ers should work to gain efficiencies intheir administrative IT areas in orderto free up resources that can be reallo-

cated for growth and transformationinitiatives for their institutions Theyshould strive to build administrativeservices to be as flexible and adaptableas possible making use of the evolv-ing variety of sourcing options in a waythat is appropriate for their culture andresources Those efforts will allow col-leges and universities to reach beyondoperational efficiency with administra-

tive information technology adding strategic value throughanalytics and business intelligence

copy 2015 Betsy Tippens Reinitz The text of this article is licensed under the CreativeCommons Attribution-NonCommercial-NoDerivatives 40 International License

(httpcreative commonsorglicensesby-nc-nd40)

ISSUE 3Developing IT funding models that sustain

core service support innovationand facilitate growth

Definecosts

Gainefficiencies

Reallocateresources

ISSUE 9

Developing an enterprise IT architecturethat can respond to changing conditions

and new opportunities

Build a sourcingstrategy

Aim for flexibilityand agility

ISSUE 5

Demonstrating the business valueof information technology and how theIT organization can help the institution

achieve its goals

Use data for business intelligenceand analytics

Betsy Tippens Reinitz

(breinitzeducauseedu)

is Director of Administrative IT

Programs EDUCAUSE

institutions and very small (fewerthan 2000 FTEs) and very large insti-tutions (greater than 15000 FTEs)

983150 Developing a strategy for implementinganalytics was a Top 10 IT issue for pub-lic doctoral universities

983150 Balancing time and resources spent on inno-vation with those spent on execution was aTop 10 IT issue for institutions with2000ndash3999 FTEs

983150 Responding to and maximizing oppor-

tunities from the combination of changesin higher education and in informationtechnology was a Top 10 IT issue forinstitutions with 4000ndash7999 FTEs

Common ThreadsMany of the issues are intertwined Forexample Developing an enterprise IT archi-tecture (issue 9) can help enable Balanc-ing agility openness and security (issue 10)Issue 8 (Developing mobile cloud and digital

security policies) is arguably a specificinstance of issue 10 (Balancing agilityopenness and security)

The data in applicationsmdashwhetherresearch financials HR records spaceassignments student records or e-mailmessagesmdashwas once largely incidentalto the job of the IT organization Nowthe IT organization is acutely aware of itsresponsibilities for managing leverag-ing and securing the data in the systems

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 32: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3235

44 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

T

he EDUCAUSE Top 10 IT Issues list presents a yearly lookat the issues facing higher education institutions This

year the EDUCAUSE IT Issues Panel invited the HigherEducation Information Security Council (HEISC) to iden-

tify the top strategic issues facing campus informationsecurity departments By responding to a brief survey members ofthe higher education information security communitymdashincludingChief Information Officers (CIOs) Chief Information SecurityOfficers (CISOs) IT directors and managers and IT staff mem-bersmdashidentified and selected their top three issues

1 Developing an effective information security strategy thatresponds to institutional organization and culture and that ele-

vates information security concerns to institutional leadership2 Ensuring that members of the institutional community (stu-

dents faculty and staff) receive information security educationand training

3 Developing security policies for mobile cloud and digitalresources (including issues of data handlingprotection accesscontrol and end-user awareness)

Underpinning these strategic issues is the notion of address-ing institutional risks and employing enterprise risk managementpractices ldquoAll of the issues identified on an institutionrsquos list shouldbe there based on an institutional risk assessmentrdquo said Melissa

Woo the CIO and Vice Provost for Information Services at theUniversity of Oregon and a HEISC co-chair Mature informationsecurity programs in higher education have a strong history ofusing well-established risk management concepts which help an

institution identify the unique information security risks that itfaces Woo added ldquoNot every institution will address the identified

risks in the same waymdashyou have to respond to them in a way thatmakes sense for the institutionrsquos organization and culturerdquo

Developing an effective information security strategy was the top issueidentified by the information security community Developing

such a strategy is the first step in establishing information securityas an institutional strategic partner rather than an operational con-cern An information security strategic plan is a high-level set ofpriorities for achieving information security goals and objectivesIt is more than a recitation of the types of technologies to imple-ment in order to help keep institutional data and resources securein addition it is a forward-looking document that relates infor-mation security goals and objectives to the overall institutionalmission An information security strategic plan must be flexiblein response to emerging information security issues and chang-ing regulatory environments It also should contain short-termand long-term objectives performance targets and metrics Theinformation security strategic plan is the vehicle that helps elevate

important information security concerns to leadershipEnsuring that members of the institutional community receive informa-

tion security education and training was the second issue identifiedby the information security community Members of the institu-tional community use information technology systems and thedata in those systems daily Making sure that students faculty andstaff have adequate training on how to use and protect the dataentrusted to and generated by the institution is of critical impor-tance From 2005 to 2013 unintentional human error (eg postingsensitive information on a website or otherwise mishandling data)and insider threats (eg an intentional breach of information bysomeone with legitimate access) accounted for 33 percent of data

breaches in higher education as compiled from a data set drawnfrom data breach information reported by the Privacy Rights

The Top 3 Strategic Information Security IssuesJoanna Lyn Grama and Valerie Vogel

and applications it manages This data isincreasingly useful regulated and vul-nerable The strategic advantage of dataused in analytics is common to Improv-ing student outcomes (issue 4) and Dem-onstrating the business value of informationtechnology (issue 5) Data governance isanother common thread that binds sev-

eral issues Lack of institutional controlover data is a challenge for Providing usersupport in the new normal (issue 7) Devel-oping mobile cloud and digital security policies (issue 8) and Balancing agility opennessand security (issue 10) The need to safe-guard institutional data is germane to allthose issues as well

Some technologies are particularlyrelevant this year Cloud computing influ-ences most issues the IT organization

funding models user support securityarchitecture and IT staffing Mobile com-puting is another strong thread one thatin fact dominates the 2015 Top 10 StrategicTechnologies list19

Institutions are struggling to achievea balance between openness andindividualdepartmental autonomy on

the one hand andsecurity and cost-effectiveness onthe other Highereducation has longplaced autonomyahead of controlto provide faculty with an environmentconducive to scholarship and discoveryThe tradition of distinguishing betweenand separating academic and admin-

istrative technologies and systems is atleast in part a strategy to support two

very different institutional lines of busi-ness In theory this separation providesfaculty with the freedom to use the tech-nologies and establish the collaborationsbest suited to their work while enablingadministrators to adopt strong controls

and efficient business practices And yet academic autonomy has permeatedadministrative units and processesresulting in duplicative and extensively

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 33: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3335

JA N UA R Y FE B R UA R Y 201 5 E DU C A U S E r e v i e wwww edu ca u se edu e r o

Clearinghouse (httpswwwprivacy rightsorg)1 ldquoOur commu-nity has noted the importance of a strategy to promote and expandinformation security awareness and education Informationsecurity is everyonersquos responsibilityrdquo said Peter Murray the CIOand Vice President for Information Technology at the Universityof Maryland Baltimore ldquoWe know that risks are reduced wheninformation security becomes an integral part of an institutionrsquosculturerdquo

Finally the information security community identified devel-oping security policies for mobile cloud and digital resources as the thirdinformation security strategic issue for 2015 This issue is also rep-resented on the 2015 EDUCAUSE Top 10 IT Issues list (8) high-lighting that the information security community and the largerIT community both recognize the importance of security policiesthat protect institutional data no matter where it is stored or how itis accessed The proliferation of cloud services and mobile devicesis forcing institutions to move beyond frameworks that rely onspecific technologies and to instead focus on data governanceand data management issues that are technology-agnostic Themove to the cloud and usersrsquo mobile access to cloud resourcesalso force institutions to rethink already established institutional

policies ldquoIncident response policies are also impacted by themove to mobile access and cloud servicesrdquo said Elias Eldayrie the

Vice President and CIO at the University of Florida and a HEISCCo-Chair ldquoWe have to quickly learn about incidents that affectthird-party service providers and we need to be able to rely on

vendors to implement or recommend fixes so that we can protectinstitutional datardquo

EDUCAUSE has a number of resources that colleges and uni- versities can consult for their information security activitiesincluding resources on developing strategies promoting trainingand awareness and developing policies and procedures TheHEISC Information Security Guide Effective Practices and Solutions for

Higher Education (httpwwweducauseedusecurity guide) is theonly resource developed by higher education information security

practitioners for higher education information security practitio-ners The guide features toolkits case studies best practices andrecommendations to help jump-start campus information secu-rity initiatives Another resource is the annual EDUCAUSE Secu-rity Professionals Conference which will be held in Minneapolisin May 2015 The conference showcases information securitythought leadership and offers numerous professional develop-ment activities for information security professionals at all career

levels We hope these resources will be useful in helping campusinformation security departments successfully address the topthree strategic information security issues

Note

1 See Figure 6 Types of Data Breaches in Higher Education 2005ndash2013 inJoanna L Grama ldquoJust in Time Research Data Breaches in Higher EducationrdquoEDUCAUSE Center for Analysis and Research (ECAR) research report May20 2014 httpwwweducauseedulibraryresourcesjust-time-research-data-breaches-higher-education

copy 2015 Joanna Lyn Grama and Valerie Vogel The text of this article is licensed

under the Creative Commons Attribution-NonCommercial-NoDerivatives 40

International License (httpcreative commonsorglicensesby-nc-nd40)

customized business systems In themeantime the lines between adminis-trative and academic technologies andusers have blurred Faculty have bothacademic and administrative roles TheLMS is an academic application withadministrative uses Or vice versa Insti-tutions are reassessing their choices

in light of budget constraints securitychallenges opportunities providedby new technologies and the desireto apply analytics techniques to data

housed across disparate systems Theefforts of higher education institutionsto centralize and standardize withoutimpeding innovation or academicautonomy are playing out at least looselyin almost every one of the 2015 EDU-CAUSE Top 10 IT Issues

Collaboration is another common

thread Centraland distributedIT organizationsneed to collaboratemore to achievean enterprise ITarchitecture that

works for the entire institution to opti-mize the use of technology in teachingand learning to retain and develop thebest technology staff and to manage

change The IT organization and busi-ness units need to collaborate more tooptimize the use of technology in teach-ing and learning to ensure that informa-tion technology is delivering the best

value to standardize and optimize pro-cesses to implement change to developeffective IT funding models to use

institutional data most effectively and topromote good information security TheIT organization and end users need tocollaborate more on end-user comput-ing needs and effective security

Collaboration extends beyond theinstitution for both faculty and ITorganizations Research and scholarlyactivities depend on cross-institutionaland international collaborations that IT

Joanna Lyn Grama (jgrama

educauseedu) is IT GRC and

Cybersecurity Program Director

EDUCAUSE

Valerie Vogel (vvogeleducause

edu) is Program Manager

EDUCAUSE

(continued on page 48)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 34: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3435

46 E DU C A U S E r e v i e w J A N UA R Y F E BR UA R Y 201 5

I

n his 2004 book The Wisdom of Crowds James Surowiecki wroteldquoUnder the right circumstances groups are remarkably intel-ligent and are often smarter than the smartest people in them when our imperfect judgments are aggregated in the right

way our collective intelligence is often excellentrdquo1 Taking heedof Surowieckirsquos insight the EDUCAUSE Learning Initiative (ELI)has been surveying the teaching and learning community annu-ally since 2011 to gain collective insight into the key issuesin higher education teaching and learning The product of thatconsultation is the ELI Content Anchor Project (httpwwweducauseedueliinitiativescontent-anchors)

The EDUCAUSE Top 10 IT Issues and the ELI Content AnchorSurvey converge on key areas bringing together complementaryperspectives The Top 10 IT Issues focus on information technol-ogy viewed through the lens of the institutional IT organizationunder a CIO The ELI content anchors represent the teachingand learning perspective which views technology as a strategic

enabler while also focusing on teaching andlearning as a broad intracampus practiceThe two themes on which these perspec-tives coincide and intersect are of specialimportance the convergence flags broadagreement about the significance of thoseissues

The first intersecting theme is improv-ing student outcomes which has been on theEDUCAUSE Top 10 IT Issues list for the pastthree years (2 in 2013 1 in 2014 and now4 in 2015) and which appeared as assessment

of student learning in the ELI content anchors(1 in 2014) Fundamentally both lists arepointing to the same thing the improve-ment of student learning outcomes throughthe creative use of technology which in turnsupports greater overall student success The issue has also beenhighly ranked in both listsmdashstrong evidence that student successand student learning are broadly relevant across all of higher edu-cation today

An example of this theme is the use of learning analytics as away to leverage technology to improve student outcomes Ana-lytics can be a key technology tool that if used effectively canlead to measurable improvements in student success and hence

to increased completion rates A learning analytics strategymdashembedded into a campus technology architecture that integratescurricular applications data and key institutional perspectivesmdashcan enable success for students throughout their educationalexperience

Another ELI content anchor connected to this theme of stu-dent learning outcomes is evaluating technology-based instructionalinnovations (6 in 2014) Both the Top 10 IT Issue and this contentanchor stress the need for strategically leveraging technology and theimportance of assessing the impact of innovations Most impor-tant this content anchor calls for an emphasis on effective peda-

gogical practice that is supported by technology as well as on anexploration of new course models

The second intersection is between the Top 10 IT Issue of opti-mizing the use of technology in teaching and learning in collaboration with

academic leadership (2 in 2015) and several ELI content anchors fac-ulty development (3 in 2014) academic transformation (4 in2014) and working with emerging technology (in the top 4 since2012) The ldquoTop 10 IT Issues 2015rdquo article describes how impor-tant it is to involve academic leadership especially the faculty inthis process of optimization The article notes that the mostimportant way to achieve this optimization is to help faculty insuccessfully integrating technology into their pedagogy in directsupport of course objectives This emphasis on faculty engage-ment and development is no accident faculty developmentremains a perennial issue with the teaching and learningcommunity

The perspectives evident in the EDUCAUSE Top 10 IT Issues

and the ELI Content Anchors Project present technology as a stra-tegic enabler of the teaching and learning enterprise on the onehand and reveal teaching and learning as a key area of emphasisfor the campus IT organization on the other When these twoperspectives converge the essential issues and themes come intorelief Given the complementary nature of their perspectivesthe Top 10 IT Issues and the ELI Content Anchors Project cantogether serve as reference points and as points of departure forcampus discussions and as a planning framework for develop-ment days and workshops On a broader level they can be used asa tool for campus strategic planning not only providing contextbut also helping to ensure that strategic plans address the full

spectrum of institutional issues and opportunities

ELI will announce the results of the survey for the 2015 content anchors atits annual meeting February 9ndash11 2015

Note

1 James Surowiecki The Wisdom of Crowds Why the Many Are Smarter than the Fewand How Collective Wisdom Shapes Business Economies Societies and Nations (New York Doubleday 2004) xiii-xiv

copy 2015 Veronica Diaz and Malcolm Brown The text of this article is licensed under

the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-nd40)

The Top 10 IT Issues and the ELI Content Anchors ConvergenceVeronica Diaz and Malcolm Brown

The ELIcontentanchorsrepresentthe teachingand learningperspectivewhich viewstechnologyas a strategicenabler

Veronica Diaz (vdiazeducause

edu) is Associate Director ELI

and Director of Online Programs

EDUCAUSE

Malcolm Brown (mbrown

educuaseedu) is Director ELI

EDUCAUSE

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article

Page 35: Top 10 IT Issues, 2015: Inflection Point (252489129)

8102019 Top 10 IT Issues 2015 Inflection Point (252489129)

httpslidepdfcomreaderfulltop-10-it-issues-2015-inflection-point-252489129 3535

Top 10 IT Issues 2015

organizations must support effectivelyand securely IT organizations need tocollaborate with vendors on relation-ships that are far less transactional andfar more interdependent

The IT organization is at the intersec-

tion of two fields at inflection pointshigher education and information tech-nology At this time of change peril andinnovation the collaborations among ITleaders across higher education and theecosystem that supports them will bemost important of all Collectively thosein the profession of information technol-ogy in higher education can co-discoverco-create and co-lead higher educationto optimize its use of technology at thispivotal time 983150

Notes1 Andrew W Grove keynote address Academy

of Management Annual Meeting San DiegoCA August 9 1998 httpwwwintelcompressroomarchivespeechesag080998htm

2 The cycle of Moorersquos Law from Intel cofounderGordon Moore is generally accepted to beeighteen months although predictions haveranged from as few as six months to three years or more Moorersquos original prediction wasf i d i b h l h i

Computers Exceed Human Intelligence (New York Viking Penguin 1999)

4 Erik Brynjolfsson and Andrew McAfee TheSecond Machine Age Work Progress and Prosperityin a Time of Brilliant Technologies (New York WWNorton amp Company 2014) 7ndash8

5 Geoffrey A Moore Crossing the Chasm Marketingand Selling Technology Products to MainstreamCustomers (New York HarperBusiness 1991)

6 Reference to Marshall McLuhanrsquos famous quoteldquothe medium is the messagerdquo from UnderstandingMedia The Extensions of Man (1964)

7 Jacqueline Bichsel and Patrick Feehan GettingYour Ducks in a Row IT Governance Risk andCompliance Programs in Higher Education researchreport (Louisville CO ECAR June 2014) 7

8 For more on Integrated Planning and AdvisingServices (IPAS) research see the ECAR IPAS Hubhttpwwweducauseedulibraryresourcesintegrated-planning-and-advising-services-research

9 Jacqueline Bichsel Todayrsquos Higher Education ITWorkforce (Louisville CO ECAR January 2014)

10 Erik Brynjolfsson and Andrew McAfee Raceagainst the Machine How the Digital Revolution

Is Accelerating Innovation Driving Productivityand Irreversibly Transforming Employment and theEconomy (Lexington MA Digital Frontier Press2011) 20

11 Eden Dahlstrom and D Christopher BrooksECAR Study of Faculty and Information Technology2014 (Louisville CO ECAR July 2014) EdenDahlstrom and Jacqueline Bichsel ECAR Studyof Undergraduate Students and Information Technology2014 (Louisville CO ECAR October 2014)

12 J ff M Hi tt ADKAR A M d l f Ch

Group Dynamicsrdquo in Dorwin Cartwright edField Theory in Social Science (New York Harperamp Row 1951) John P Kotter ldquo Leading Change Why Transformation Efforts Failrdquo HarvardBusiness Review March-April 1995 1ndash10

13 Glenn Llopis ldquoChange Management RequiresLeadership Clarity and Alignme ntrdquo Forbescom June 30 2014 httpwwwforbescomsitesglennllopis20140630change-management-requires-leadership-clarity-and-alignment

14 John Jones DeAnne Aguirre and Matthew Calderone ldquo10 Principles of ChangeManagementrdquo strategy+business April 15 2004httpwwwstrategy-businesscomarticlerr00006pg=all

15 Ross Altman W Roy Schulte Yefim V NatisMassimo Pezzini Mark Driver CathleenE Blanton Nathan Wilson and Gordon Van Huizen Agenda Overview for Applicatio n Architecture 2014 Gartner G00261571 January 102014

16 The number of records breached is from 2013See Risk Based Security and Open SecurityFoundation Data Breach QuickView An ExecutiversquosGuide to 2013 Data Breach Trends February2014 htt pswwwriskbasedsecuritycomreports2013-DataBreachQuickViewpdf

17 Higher Education Information SecurityCouncil (HEISC) Information Security GuideEffective Practices and Solutions for Higher Education httpwwweducauseedulibraryresourcesinformation-security-guide-effective-practices-and-solutions-higher-education National CyberSecurity Alliance Stay Safe Online website httpwwwstaysafeonlineorg

18 For Top 10 IT Issues lists for different typesof institutions (based on Carnegie Class sizeand approach to technology adoption) see theEDUCAUSE Top 10 IT Issues website httpwwweducauseeduresearch-and-publicationsresearchtop-10-it-issues

19 Susan Grajek Higher Educationrsquos Top 10Strategic Technologies in 2015 research report(Louisville CO ECAR January 2015) ldquoStrategictechnologiesrdquo are defined as relatively newtechnologies that institutions will be spendingthe most time implementing planning andtracking in 2015

Susan Grajek (sgrajek

educauseedu) is EDUCAUSE

Vice President for Data

Research and Analytics

copy 2015 Susan Grajek and the 2014ndash2015

EDUCAUSE IT Issues Panel The text of this article

is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 40 International

License (httpcreativecommonsorglicensesby-nc-

nd40)

The EDUCAUSE Top 10IT Issues Website

(httpwwweducauseeduITissues)

offers the following resources983150 A video summary of the Top 10 IT issues

983150 Recommended readings and EDUCAUSE resources for each of theTop 10 IT issues

983150 Interactive graphics depicting issues trends year-to-year and by institutional characteristics

983150 IT Issues lists by institutional type

983150 Top 10 IT Issues presentation at the EDUCAUSE 2014 AnnualConference

983150 HTML and PDF links to this EDUCAUSE Review article