Core and chore, or me and more disruptive thinking

This is the text of a post I was invited to contribute to the Institutional Web Managers Workshop (IWMW) Blog as a retrospective to a presentation that Joe gave at the Workshop in 2009.


When Joe Nicholls and I started our conversation back in 2007 on what the IT Services role should look like in the age of “disruptive technologies”, we had a vision that things were never going to be the same again. Indeed in a farewell valedictory at the Welsh Universities IT Services Gregynog Colloquium in 2010 I gave a talk entitled “So that’s it for IT Services … or is it?” after previously writing “We’re all doomed …“. Therefore when Brian invited me to reflect on the relevance of the talk “Servicing ‘Core’ and ‘Chore’” that we presented at IWMW 2009 to the institution today, it set up a whole stream of thoughts running – which have taken some time to commit to words.

First of all I’m extremely grateful for two recent posts by Derek Law (on this blog) and Martin Weller (on the Ed Techie blog) which gave me the courage to proceed when I was beginning to feel that I had no place, being now a number of years out of active institutional web and IT Services involvement, to express any views – let alone suggest they might be relevant! Apparently I’m not completely out of step.

Essentially “‘Core’ and ‘Chore'” is about giving a different perspective – in fact a users perspective – on what an IT Service function needs to deliver in terms of service offering. It is an explicitly user-centric view of IT Services, as it looks to provide the user with the tools THEY require, and with the support THEY need to make full use of them. This is what we have called enablement. As a precursor to enablement, you need to go through a process of envisioning the possibilities that are available and how they might be incorporated into a users’ way of working and then engagement with the user, and as a result of following this process in partnership with the user, you aspire to deliver excellent education. We presented these ideas in a paper at Eunis 2009.

Just words I hear you say, but look at a few of the slides from Joe’s slideset and then judge the relevance to your institution today.

Core_and_Chore_6.001

The individual researcher or student has a completely different view of what they want, and need, from an IT service offering. All they require are tools and training in their use to get the educational task done. This is core to them.

Core_and_Chore_5.001

For them the interaction with corporate systems is a chore, often an unpleasant diversion from getting things done!

Core_and_Chore_7.001

This leads into a conflict because much of what the individual requires is outside the institutional firewall, and by its placement “in the cloud” is “not controllable” by the organisation. I have discussed governance and security elsewhere and previously, and don’t intend to follow that up here. Suffice to say, both issues can be resolved, through trust and education. Working in partnership. Thus we arrive at this seeming impasse …

The ‘core’ services and activities to the institution are the ‘chore’ to the individual. The ‘core’ services and activities to the individual are often not identified by the institution as necessary, or at worst are actively prevented from happening.

I would love to be able to say that I am confident that what Joe and I presented back in 2009 at IWMW has now been committed to the Room 101 of institutional web history as having been acknowledged, accepted and actioned. I fear it hasn’t. In fact I know it hasn’t as the horror stories of failed collaboration across institutions, of difficulties in migrating content into, out of and between institutions, and the failure of the very seemingly straightforward task of ensuring proper archiving of digital content is accessible outside the institution, continue seemingly in an unremitting manner.

So I conclude with just one plea for institutional web managers. I realise that you will most certainly not be in a position to alter institutional strategy, but please just please remember the individual in your service offering. Be prepared to readily provide advice on setting up a personal web presence outside the institution – that means providing advice on getting personal or project domains. Be open to the probability that researchers will want to port content out of institutional systems when they move, or retire, and have a way that enables them to do that easily. Be aware that digital content only lasts as long as it is archived properly – boring I know but time spent now will prevent tears later on. Be an envisioned and engaged web manager, enabling the user to achieve their educational objectives. Your attendance at IWMW 20, suggests that you are well on the way to doing this.

 

Spams, scams, phishing and other annoyances

Scammer with Credit Card
Image from Which? April 2015

I know from my family and friends that there is nothing that worries the older IT user more than harming their computer by opening an email that starts a virus attack on their computer, or they are they are subjected to an email scam that will leave them short of money at best, and with compromised bank accounts at worst. I wanted to bring this excellent short article from April 2015 in Which? to your attention. It summarises the Top five UK email scams. Definitely ones to be on the look out for!
My golden rule as I mentioned in the previous post is “if it seems too good to be true, it probably is”.
Luckily these days the scammers and phishers have to rely on you actively letting them have access far more than used to be the case. Most (if not all) email programs and anti-virus software (as long as you keep it up to datevery important) are adept at picking out the genuinely evil messages which can do harm to your computer. So “you can look but you better not touch” to paraphrase the words from a Bruce Springsteen song. Just don’t click on a link – however inviting – in an email if you have any doubts, however small, of the sender’s authenticity!
I also wanted to tell you about this rather useful resource from Pat Howe which kept a running list of all known threats up until the end of 2014. He left his mail servers open to the possibility of threat to harvest all the attacks. All of them, or variants of them, are still around, so if you have any doubt about a message you receive, you can always check-it-out on Pat’s website.
An American resource that is also useful in defining the threats can be found at Stay Safe Online and their page on Spam and Phishing is worth a look, but for a UK slant (as mentioned in my last post) the best starting point is Get Safe Online and they have a page on Spam and Scam eMail which I also recommend looking at.
It’s a huge shame that we’re bedevilled with spam, scams and phishers, just as we’re hassled by cold telephone callers. Technology has brought us a load of benefits but with those it has also enabled those with a criminal, or just malicious, bent to make our lives a misery.
What you will learn hopefully from these blog posts is that good habits are our best hope for getting the most beneficial use from using IT. There’s nothing really to fear as long as you start from a naturally cautious stance, and you have reasonable organisational skills and a willingness to embrace a bit of logic :-).