EDUCAUSE Annual Conference
October 25–28, 2022 | Denver, CO: https://events.educause.edu/annual-conference
November 2–3, 2022 | Online: https://events.educause.edu/annual-conference/online-event
Program Tracks
- Teaching and Learning
- Leadership and Future Workforce
- Cybersecurity and Privacy
- Student Engagement and Success
- Innovation and Emerging Technologies
- Supporting Research Computing
- Infrastructure and Networking
- Policy and Law
Summary for HEIs
Powerpoint slides: kallberg_lehto_educause22_summary_for_HEIs.pptx
Recording from the summary webinar for HEIs: https://video.csc.fi/media/t/0_5dcr6um0
General Sessions
Noteworthy General Observations
- Two trends that are happening in 2023: More Digital Transformations and the Culture of Care – interaction of these two transformations is key in the future
- e.g. mental health is a major problem on campuses
Higher Education’s Top 10 IT Issues for 2023
- TOP 10: https://www.educause.edu/research-and-publications/research/top-10-it-issues-technologies-and-trends/2023
- TOP 10 one-pager: https://www.educause.edu/-/media/files/multimedia/2022/er224310infographic.pdf
- Article on which the presentation was based: https://er.educause.edu/articles/2022/10/top-10-it-issues-2023-foundation-models
- Presentation itself pending.
- Visit https://www.priyaparker.com/ for free (name and email dropping needed though) guides and materials on successful meetings and other gatherings, e.g. Virtual Meeting Guide: PP-VirtualGathering-V2 2022.pdf
EDUCAUSE Digital Transformation (Dx) Materials
- EDUCAUSE Digital Transformation website and the Dx journey framework: https://dx.educause.edu/
- including the definition of Dx: https://dx.educause.edu/steps/defining-dx
- Dx as a EDUCAUSE focus area: https://www.educause.edu/focus-areas-and-initiatives/digital-transformation
- Article / Getting Ready for Digital Transformation: https://er.educause.edu/articles/2019/7/getting-ready-for-digital-transformation-change-your-culture-workforce-and-technology
- Article / A Dx Roadmap for Leading the New Hybrid IT Workforce: https://er.educause.edu/articles/2022/5/a-dx-roadmap-for-leading-the-new-hybrid-it-workforce
- EDUCAUSE Special Report on Digital Transformation: https://er.educause.edu/toc/educause-review-special-report-digital-transformation
- Blog post on institutional Dx journeys: https://er.educause.edu/blogs/2019/10/digital-transformation-signals-is-your-institution-on-the-journey
- including the Dx checklist as a separate file: https://www.educause.edu/-/media/files/blogs/2019/10/er194420checklist.pdf
- A Pathway to Designing Your Dx Strategy:
Other EDUCAUSE Materials
2022 EDUCAUSE Horizon Report® Teaching and Learning Edition: https://library.educause.edu/-/media/files/library/2022/4/2022hrteachinglearning.pdf
Barriers to Adopting Technology: https://er.educause.edu/-/media/files/article-downloads/eqm0223.pdf
Identifying, Evaluating and Adopting New Teaching & Learning Technologies: https://er.educause.edu/articles/2020/8/identifying-evaluating-and-adopting-new-teaching-and-learning-technologies
A Framework for Student Success Analytics: https://library.educause.edu/resources/2022/5/a-framework-for-student-success-analytics
Saint Mary's University - Inclusive Learning Systems - Reflective Roadmap.pdf
Commercial Materials
TPaCK Framework: https://www.powerschool.com/blog/the-tpack-framework-explained-with-classroom-examples/
2022 State Of Student Success & Engagement in Higher Education: https://www.instructure.com/canvas/resources/higher-education/2022-state-of-student-success-engagement-in-higher-education (marketing info required)
POST-IT Wall / What are the greatest challenges and/or opportunities facing higher education?
Student experience
| Internal issues
| Externally imposed issues
|
|---|
Breakout Sessions
Session Topic: Cybersecurity
Countdown to Compliance CMMC in 2023
The Department of Defense's CMMC program is projected to become law in May 2023. This session focuses on a CMMC assessment timeline, with 12 key steps and the time it takes to achieve them. The goal is for your institution to be ready to bid for DoD research contracts by May 2023. Attendees receive an assessment timeline created based on panelists' expertise. Each institution can readily see where they are on the timeline and adjust their time, effort, and prioritization as needed.
Sponsor: https://www.preveil.com
- Simplify NIST 800-171, CMMC, ITAR
- CMMC: https://cyberab.org
- External audit
- 110 controls
- ITAR: https://research.mit.edu/integrity-and-compliance/export-control/information-documents/export-control-regulations
- DFARS 7019: https://www.acquisition.gov/dfars
- Internal audit
- 110 controls (same as CMMC)
- CMMC: https://cyberab.org
- HU:s are major target of cyber security attacks
- Universities are like small city, have also housing & energy infra
- Universities were build to share data, not to secure it
- There are nations that are interested of the data that researches have
- Universities have 16 different regulations, but if you look into more holistic they are mostly the same and axing for same thing
- 3 regulatory framework to protect unclassified information
- TImeline for compliance takes usually a year
- 5 ways to simplify
- NIST 800-171 foundation CUI Compliance https://csrc.nist.gov/publications/detail/sp/800-171/rev-2/final
- Inherit Compliance & Documentation from Cloud platforms to store and share CUI
- Use Cloud tools to implement security
- Compliance documentation from Cloud platform provider
- Simplifies the creation of the system security plan
- Use CMMC AB Certified consultant to augment in house specialist
- Adopt simple deployment and familiar user interface
- Implement Strong Zero Trust Security
- Encrypted Cloud file storage
- Encrypted messaging
- End to end Encryption simplifies security and compliance
- Encrytion
- ITAR 120.54 enables uses of cloud service
- All data is end to end encrypted
- With FIPS 140-2 or later Encryption
- Cloud service has no means to decrypt the data
- Get external Compliance Experience
- Network with different universities and colleges
- How to distribute chanes in compliance?
- 2 types of researches,
- People who work with army, who know what to do
- Easy, the want to do the right thing
- People who doesn't understand what it has to do with research
- Research steering groups
- Trying to find the right lingo and key people to talk with
- People who work with army, who know what to do
- 2 types of researches,
- Develop standard set up language and templates to help researches to write required documents.
- Do's and Don'ts
- Compliance takes a lot time, make sure that you prioritise the time
- Make sure that your document is ready before hand
- You need 2 pieces of evidence in all controls
- Practise interviews with who are envolved
- Make sure that you have filled all required documents before hand
- Make sure that you have strong support from leadership and security
- Make sure that compliance will become part of the research project plan
What's New in Research Cyber Security in 2022? Perspective from Trusted CI and ResearchSOC
This session covers recent lessons learned about the unique cybersecurity needs of research projects on campus from representatives of the NSF-funded Trusted CI and ResearchSOC centers. Topics include research data integrity, ransomware, Science DMZs, science gateways, software assurance, cybersecurity research transition to practice (TTP), and workforce development.
NSF Science and Compliance
- While many cybersecurity compliance programs exist, most NSF Research do not fall under any
- NSF Cybersecurity Governance
- Responsile is university
- https://www.nsf.gov/news/special_reports/cybersecurity/index.jsp
Trusted CI Framework
https://www.trustedci.org/framework
Best Cybersecurity practices
- Main pilars https://www.trustedci.org/framework/core
- Mission Aligment
- Governance
- Resources
- Controls
- Framework implementation guide for research cyberinfrastrucutute
- Growing Ransonmaware Risk to Science
- Download report
- http://hdl.handle.net/2022/26638
- Science Gateways Security
- Webservers are common target
- Number of recommendations available
- Science DMZ
- Create reusable template security documents related to Science DMZ
- Report/whitepaper https://hdl.handle.net/2022/27007
- Science OT
- Manytimes running very old software
- Also building HVAC
- At ship Example
- Cranes
- Winches
- Antenna Controllers
- Door controllers
- Study findings
- Security is missing element for OT procurement requiremenrts
- Organizonal Silos between IT and OT personel
- No OT security experts
- Newer OT is more and more software defined, same vulnerabilities than traditional IT services
OmniSOC
- https://omnisoc.iu.edu
- ResearchSOC is part of OmniSOC
- A community approach to defending research and higher education
- OmniSoc CORE
- 24/7 always watching
- Share monitoring capacity
- Project Liaisons
- Onboarding
- Soc - Plus
- Virtual Cyber Security Services (staffing)
ResearchSOC - tailored for open science
- OmniSOC Core Services
- Project Liaison
- Honeypots & vulnerability scanning
- Virtual Cyber Security Services (Staffing)
Organisational Trends
- Threath Landscape
- Cray Pigeons
- happened every day, quite common attacks
- Can be controller with good security controls
- Internet Noise
- if it on the internet, it is going to be targeted
- regular scanning and updating
- Ransomware
- Hot topic
- can be controller with:
- Network segmentation,
- network monitoring,
- basic security controls,
- educating staff is the best bet
- Workforce Retension
- It is really had because of covid and remote work
- Cray Pigeons
- Most of threats are coming lower on ladder
- Operationl Threads
- Flat networks
- Slow patch cycle
- Supply chain management
- Bad inventory
Security Night Live: Cybersecurity Training people want to attend
Cybersecurity starts with our end users, but our traditional training methods usually fly right past them. Discover how Notre Dame created a highly visible and entertaining way to engage thousands of people over a two-day event and gain tools you can use at your institution.
Material online: https://oit.nd.edu/initiatives/nd-cybersecurity-carnival-presented-by-google/?utm_source=go&utm_medium=link&utm_campaign=cybersecuritycarnival22
Cybersecurity Carnival
- Creating games and attractions
- Go Phis -attaction
- Learning object regonize phishing
- Review and identity examples
- Throw stuff into stuff
- Password ring toss
- Password quality
- Learning what no to do
- Throw stuff onto stuff
- Cover the hopspot
- Secure home network
- Get tips and advise
- Slam Spam
- Reconizing common scamms
- Answer T/F questions
- Thro stuff on stuff
- Cybersecurity strongman
- Identity strong passwords
- Choose between 3 passwords
- Push stuff to make stuff ding
- Password poetry
- Desing a strong password
- Construct password from a. prompt
- Move magnetic stuff
- Always the winner
- Regonizr real prhishing
- Try to find the hacker card
- Lock picking workshop
- Pick a lock
- Workshop and hands on practice
- Prod stuff to open stuff
- Security night live
- Real security situations
- Sketh comedy and student actoris
- Laugh at and learn stuff
- Museum of mishaps
- Virtual presentation of cybersecurity gaffes
- Parodies of famous art
- Look at and laugh at stuff
- Go Phis -attaction
Zero Trust is a Hot Topic?
Zero Trust is one of the hottest topics in cybersecurity. It is also one of the most used and often abused buzzwords in cybersecurity these days. But if you understand it, you don't have to roll your eyes every time you hear it. This session will review the newly released article in the EDUCAUSE Review. We'll give you a brief overview of why ZTA is needed and where it came from. Then we'll cut through the hype and help you understand it based upon a simple definition from NIST SP800-207.
When I can protect Users, Data, devices when they are everywhere?
Deperimeterrization to Bordeless network to Zero Trust
- What if your all devices are connected to internet
- Everything can be compromised unless proven differently
Zero trust
Zero trust provides a collection of concepts and ideas designed to minimize uncertainty in enforcing accurate, least privilege per-request access decisions in information systems and services in the face of a network viewed as compromised. The goal is to prevent unauthorized access to data and services and make access control enforcement as granular as possible. Zero trust presents a shift from a location-centric model to a more data-centric approach for fine-grained security controls between users, systems, data and assets that change over time; for these reasons. This provides the visibility needed to support the development, implementation, enforcement, and evolution of security policies. More fundamentally, zero trust may require a change in an organization’s philosophy and culture around cybersecurity.
- National institute of standards and technology NIST publication 800-207 (Published 2020)
- CISA Zero Trust Maturity Model: https://www.cisa.gov/zero-trust-maturity-model
- Assume NO security perimeter, NO automatic access once "inside"
- Protection around every "asset", Trust must be earned for access to every asset, everytime
- You need to recognise what you need to protect, not just your own endpoints but also those endpoints that access your systems
- Not something you can buy, Combination of solutions, each protecting a particular dommain/pillar
- We need to re-frame our access policies/thinking = Trust comes from policies and policy inputs come from different sources, like SIEM, IDM, PKI, CDM, Activity Logs ....
- Critical factors
- Culture and human factor
- Data encryption - at rest and transit
- Policy Creation and Access control
- Micro-segmenting
- One area/school/department/ down to individual device
- Automatic and integration
- Continuous visibility and enforcement
- Threath Intelligence
The University of North Carolina at Chapel Hill Policies, Procedures and Standards: https://policies.unc.edu/TDClient/2833/Portal/Home/
Educational institutions are a hot target for cybercriminals
In this presentation, Devin Bhatt, acting chief information security officer (CISO) at Federal Student Aid, U.S. Department of Education, will delve into the details of cybersecurity incidents that affect institutions of higher education every day. Discover the most common causes and surprising entry points of breaches, learn best practices for both prevention and mitigation, and explore how to effectively mitigate a cyberattack in progress.
https://fsapartners.ed.gov/title-iv-program-eligibility/cybersecurity
Agenda:
- Cyber risk
- Breaches made headlines and cause panic and lawsuites
- Behind these attacks are financial motives
- From heartland payment system breach 2008-2010 caused major credit card companies developed PCI standard
- Compliance doesn't mean that you can't be breached, you are just one change away from been able to be breached. You need to focus on continueind security
- Increasing ransomware thread, 2020-2021 is a major change
- Do the basic stuff, updates, close unused ports, good password, MFA etc
- Cybercriminals are now after for also for small companies
- If you have sensitive data than can be monetised, you are an target
- You can get ranson-ware as a service
- Insiders can cause significant breach
- Cybersecurity and risk management
- Governance, Risk and Compliance
- Outreach, Collaboration, information sharing
- Call for action
- IHA Cybersecurity newsletter
Session Topic: Digital Transformation and Future Visions
Demystifying Digital Transformation (Dx)
EDUCAUSE has been providing digital transformation resources and institutional self-assessments for nearly five years, and a case could be made demonstrating that elements of Dx have been around for decades. However, as busy leaders and practitioners in the throes of the complex educational technology landscape, many of us have not been able to observe the foundations of Dx. As education, technology, and the workforce continue to shift at breakneck speed, this session is designed to slow things down and to give participants an opportunity to understand Dx, to provide resources and use cases, and to celebrate the practices you may have already established at your institutions. Hear a panel of experts share how they have implemented Dx as part of their institutional culture and how the operational and human resource optimizations have changed the way they serve their students, faculty, and staff.
- three shifts needed in the digital transformation of higher education:
- culture
- how do we approach things, and which processes?
- orientation for swift change
- change management might need a change in management 🙂
- workforce
- roles, jobs, functions, training
thorough onboarding of new workforce facilitates change
- e.g. also those that have hands-on jobs work remotely once a week
- technology
- easiest
- culture
- digital transformation is a change model, also an intentional business strategy
- Dx has to be a deliberate process, seeing it through culturally essential
- metrics to back the process up
- collaborative activity as indicator for success – who is represented at the table? (library, HR, IT, etc.)
- adaptation cycle time also as a meter, Dx is a cycle of adaptation, the "continuous development" principle useful
- Dx should be more human-centred, even if the tech component is obligatory
- (none of the panelists actually use the term "digital transformation" of "Dx" in the work)
- small changes and relations are what create resilience, building resilience important (e.g. cyber security, more student graduations)
- what can be transformed and what cannot is the framework for Dx
the three lenses mentioned above should be utilised when figuring out the framework
percentages/importance of those three categories in different contexts
Tech Vision 2022: Emerging Trends and the Higher Ed Response
How are technology trends on the horizon going to transform higher education, and what might institutions do to prepare? How do we see these trends coming alive today? How might the role of IT need to evolve to help lead institutions through the coming transformation? And what technology do CIOs need to be considering today to be ready for the future? Our panel brings together Accenture's Tech Vision 2022 research with a panel of two university CIOs and Microsoft to discuss these perspectives . . . and more.
- vision: a continuum of seamless experience
- 2030 metaverse is not prepared by universities, so how to make most of it?
- challenges:
- how to evolve student experience, interactions
- how the university is experienced by stakeholders
- virtual and physical blurred, same result expected
Four trends:
WebMe: internet redesigned, web operated as traversed space, data interaction important for a seamless experience
Programmable World: bringing the digital into physical world
The Unreal: the synthetic into authentic, building trust, security essential
Computing: faster computing enables new kinds of collaboration and evolving research functions
Travis: exciting trends --> completely virtual campus at home university already
affordable higher education for anyone who wants it
new opportunities and higher education paths for new people outside degree studies
growth: 4000 students into 200 000 students
newest pivot designed: campus model turned into online model
different competences mapped to create individualised opportunities for students
more personalised, individualised experiences on the student life path
required: getting to know students, using data (also unstructured like sentiment analysis, also mining chat logs), identifying barriers and mindsets for learning, impostor syndrome cures
building context for one person
machine learning used for minimising relearning via shared taxonomy of actual teaching/course content, automatic recommendations for new courses for learnings
curriculum restructured, learned-centric model, not industry-centred anymore
John: IT organisation viewpoint
how these things land in different universities?
faculty-driven esp. in research
when IT support is needed to explore new tech and when traction is gained?
tech will not be a limiting factor, but challenges will come in
making process repeatable
admin functions
project managements
campus coordination
goals vs. strategy
process design
fragmented experiences
personalisation requires understanding individuals, the "human-person"
Rob: tech point of view -- what is coming?
the "why" of tech begins at skill gaps in education
enabling new skillsets and new more fair access
the "X gap", experience vs. expectations
the true value of higher education should be dug up
discover the personas of the segments you serve
demand for agility has shifted from vendors to universities in the last 20 years
tech should be seen as enabler to recognise and serve the diverse groups and individuals of students
Travis:
aim at blending synchronised and non-synchronised learning
also enabling flexible schedules and life stages
new support functions
e.g. automated features for disabled students
Rob: e.g. use of avatars in front of cameras
John:
bigger universities cannot scale up like a small one
covid helped to open up teachers' minds
accessibility enhanced through contractual demands
Rob: diversity is a mindset
Further articles about tech trends available at: https://www.accenture.com/hk-en/insights/voices
Friends, Not Foes: Why Institutions and Corporations Need True Partnership to Transform
We’ve all seen it: the cold sales call where the rep is selling a solution your institution doesn’t need, using buzzwords galore to keep the conversation going. When you spend painstaking hours completing an RFP and getting your formatting just right, only to find that the institution has decided not to award the proposal. We’re all tired of square-peg/round hole implementations. In transactional buyer versus seller relationships where institutions are unwilling to share their challenges, and corporations are unwilling to develop solutions around institutional needs, everyone loses.
In this session, EDUCAUSE Showcase Series corporate sponsors will join institutions to discuss true partnership, collaboration, and how to co-create solutions together. Get ready to challenge your thinking of how institutions and corporations interact and dream of a future where both groups can solve big issues – together.
Learning Outcomes:
- Take away strategies for navigating partnership conversations with confidence
- Learn about exemplar collaborative projects that benefitted both institutions and corporations
- Provide feedback on how EDUCAUSE can facilitate better corporate-institution partnerships
key challenges in higher ed:
in-person/hybrid
cost, covid funding gone
enrollment, not enough physical space for students
Erfan/Berkeley:
security, privacy, accessibility, vetting tools before purchase
too many tools and platforms, aiming for a standardized experience while having flexibility for instructors
Jordan: dichotomy of assessment; learning to think vs. job training
Mary:
trust via teamwork
shared investment to actually development of universities
tailored solutions seen through
workforce requirements changed and will change more rapidly
tech solutions to facilitate transitions to corporate world
long-term partnerships
Jordan: shared life-cycle understanding
new company more agile than more mature companies
end-user conversations important
realistic expectations from the university
Mary: students expect a tech-enhanced experience because of their use of the technology in. their private lives
Jordan: common challenge is the roll-out of a solution
train the trainer model doesn't work because of workload of key instructors
virtual training by the vendor helps in the beginning
Mary: professional development included in the tech service brings much value
Erfan/Berkeley: symbiotic relationships last the best
Jordan: feedback loop should be as direct as possible from the end-user, things get lost in translation via the home organisation
Erfan/Berkeley, when have things gone wrong?
making changes without informing
partnerships directly with instructors kills long-term development
"buying something and that it is" can be ok, if the problem is simple and acute
Jordan:
partner mentality is identifying the problem together (problem first)
sales mentality is ramming solutions down the universities' throat (solution first)
EDUCAUSE's point of view:
product discovery through events
discussion and research for companies
needs match-making service/portal could be good, a portal that would tell the companies what the universities need
inherited partnerships / transitions:
connect to the product team in the company, bring your own goals forward
personality and/or process, which is it -- identify the problems
don't hesitate to escalate
A question to Erfan/Berkeley: if you had a third actor in these partnerships, like a fasilitator of a kind, what would you like them to do?
- compliance issues are a headache without a consortium / service integrator
match-making between universities and vendors to bring forward universities's needs
a portal for match-making: better preparation before the purchase
possibility to discuss and figure out the real need before buying
uni/vendor match-making
uni/uni match-making
transparency
Session Topic: Service Management
Playing a Symphony without an Orchestra? Implementing and Maintaining ITSM with Little to no Dedicated ITSM Staff
Wesleyan and Bentley University have implemented ITSM with tools designed for large markets. ITSM processes and the tools that support them assume the presence of roles that don't exist in most small to mid-size institutions.—Yet ITSM has value regardless of organization size. These two institutions will share their journeys and how they have effectively matured their organizations.
- session about ITSM challenges from the point of view of small universities
- ServiceNow, full-time SNow staff 0-1 per uni
Past: disparate
- systems
- communication
- understanding of services
→ immature system
- vision important, what ITSM means for our institution?
- correcting processes to break down silos and processes, not IT systems
- aiming for common understanding
- Snow as a purpose-built space – complexity and size were daunting
- Wesleyan: cmdb seen as a foundation for other development work
- cmdb team was the core process team for SNow
- Bentley: important players identified first, fitting the current processes to SNow, partner approach
- distributed roles important, knowledge base was to shared as widely as possible
Where are we now?
internal adoption expansion
Bentley: still some "project-to-project" development silos, security group cooperation better
Wesleyan: from 2014 onwards no emails allowed for support requests, nowadays positive feedback is the norm
- ITSM is now clearly institutionally beneficial, not just IT enhancing!
- bringing new things (even non-IT things) under the umbrella of SNow (for tracking etc.)
ITSM Community Group (CG) Meeting
- ITSM Community Group—more than just an email list! Join us for a time of community building and networking. Learn about the ways the CG can support your professional development as we share all the resources we have to offer and the exciting things planned for the future.
Resource for service management needs: https://bit.ly/ITSM-CG-Wiki
Join the Slack group at https://bit.ly/ITSM-CG-Slack
- ESM = Enterprise SM, basically SM without the IT
next paradigm!
the customer (enduser for CSC) doesn't need to know who mounts a monitor on the wall
iPass: good tool for asset management
definitions of assets
how assets can be identified
people responsible of assets
sub-services, service requests
one portal app, universal portal also for EMS
different ticketing systems below the hood ok
start with the service catalogue
foundation for ticketing
people have to acknowledge, especially the leadership, that their work impacts others' work
only then it is possible to do service management
service owners, product owners, product managers all aboard
feedback loops important, of course
- Question: what would your university want to hand over to a service integrator?
- Answer: service catalogue standards (portfolio mg) and facilitating a consortium of sharing knowledge
- about sharing knowledge between universities
different attributes in repositories of knowledge
start within the service management context, then expand
open sharing, but also demands IDM and access mg
FitSM processes: continual service improvement mg, change management, etc.
- about sharing knowledge between universities
- Answer: service catalogue standards (portfolio mg) and facilitating a consortium of sharing knowledge
Session Topic: Learning Analytics
Continuous Course Improvement with Learning Analytics Dashboards
Learning analytics dashboards have helped our course designers refine and personalize suggestions while reviewing and designing courses. They've also surfaced opportunities to sustain design conversations and encourage continuous improvement. In this session, we'll share our dashboards, discuss the relationship building involved in their design, construction, and distribution, and share specifics regarding their successful use in the course review, design, implementation, and iteration process.
- about analytics for supporting courses that repeat
- aim: targeted conversation after the first implementation of the course
building trust with the faculty, listening (survey model might work as well)
aligning design work goals
demonstrating your expertise to the instructor
dashboards were created one dataset at a time, not by showing everything to the teacher at once
first present easy-to-understand data, teachers' questions guide the next steps
- also non-pedagogic challenges appear in the data, e.g. grades for assignments are not on time, grades don't appear in the grade books etc.
marketing course:
fluctiation in 3, 4, 6
reason: thursday turn-ins for assignments
business course:
hybrid class, bad grades from outside of the class assignments
videos were not easily available
context for different assignments
math course:
grading happened only after the first test, so there was no feedback for students on the the first three quizzes
Dashboards are a good communicational tool -- a "soft" approach -- when discussing changes in teaching.
Sharing information more broadly to support the design of courses important.
Co-Pilot monitors data and and inteferes non-intrusively.
The process enables a light way to provide a way to reach out to teachers to need support.
More teachers can be reached (15-20%) , not just the 5% in development semesters.
Later recommendations can be shared for 100% of the teachers, design suggestions for continuous class development.
Reaching Students Where They Are: The Power of Data and Analytics
Today, the backbone of the college experience isn't solely the physical campus but also the digital environment. An institution must "reach learners where they are"—sensing and responding to students' needs with custom-tailored learning experiences. This panel session examines factors contributing to recent declining enrollment and graduation rates, and provides strategic guidance on using data and analytics to personalize the college experience to move away from a one-size-fits-all approach.
data and AI can be used as a voice for the students, so students do not have to realise their challenges themselves
Georgia State covid data:
no new equity gaps
graduation numbers up
BUT those that started studies during Covid have done really badly
non-passing up 40-50%
engagement down
national dip coming in graduation!
Georgia State: tracking students for years
March 2020: logging on to LMS as a metric
30000 outreaches during that year
by capturing signs of academic inactivity, personal and technical problems surface
chatbots may discover crises via trigger words and connect the student with a human
tech requires us to understand our organisation better
- even automatic "nudges" can have a large impact in making sure dipping students pass a course
away with the silos!
chatbots should answer all kinds of questions, not just e.g. one department's themes
tech has to be seamless throughout the campuses, ways of working have to change
technology should not make the call, but help the person do it --> more agency to instructors, not less
then technology can create trust between the faculty and students
(even automated) feedback makes it easier for students to resist negative factors
transparency relating to students' future -- where they are and where they are going
right major at the end of the first year is a great indicator for graduation on time
alumni positions, salary info etc. can and should be shared with beginning students, not later during the third year
- what is coming next:
- personalised education --> better relation of graduation
- 70% better graduation rate through leveraging data during the last decade
- personalised education also gaps equity gaps
transforming the learning experience to what "study" was 500 years ago – passion-based – demands doing the basic "knowledge pouring" faster --> more time to cultivate the passion of the learner
Other Breakout Sessions
Institutional Resilience: What it is and why higher Education needs it right now
The term “resilience” is being used a lot these days in connection with recovery from the pandemic and post-pandemic higher education. But exactly what is resilience, why is it important, and what do institutions need to do to become more resilient? In August, EDUCAUSE convened an expert panel of CIOs and CISOs, as well as risk, HR, and business officers, to define institutional resilience for higher education and identify the activities and resources that could help advance institutional knowledge and practice. Join us to learn more about resilience and how it applies to higher education.
It is really hard to see what is in the future?
- World is different and difficult place, work, sosio economy, politics, climate change is effecting people
- Higer ED is in burning platform, we must change or die
- Small colleges have to do same things than large universiusities does
- US (and Finland) birth rate is going down, means there will be enrolment issues
- People doesn't value higher education
- Pandemic and economy is affecting students
- Institutional resilience
- There is a standard for institutional resilience (released 2017): https://www.iso.org/obp/ui#iso:std:iso:22316:ed-1:v1:en
- There have been a panel that has been defining educates institutional resilience and make recommendations for EDUCAUSE
- institutions are responsible for institutional resilience
- What did the panel look up to make the definition, the work is not ready yet, it is in early stage
- They look what was already released (ISO standard 22316:2017) and studies
- Outcomes:
- Restoration vs transformation
- Point of resilience is not to go back to old, but to transform
Overcoming Market Challenges in Higher Education IT Organization Design and Operation
The higher education IT landscape is more complicated than ever before. IT budgets are shrinking, security threats are on the rise, and finding talent is increasingly difficult. In this session, we explore some field-tested strategies to position your technology organization for success despite these challenges.
Higher education challenges covered in this session:
Challenge 1. Enrollment decreasing
Challenge 2. Data breaches (multiple systems --> multiple potential weaknesses)
Challenge 3. Vendor prices are increasing
Cloud investment:
less threat surfaces
automation
find advocates among teachers
bring forward the successes and savings
- Recruitment
- consider non-IT people
- emphasis on training programmes, higher retention that way too
- Data tip: ETL options coming in a few years
Poster Sessions
Experiences implementing a Learning Management System through the lens of Digital Transformation
At its heart, digital transformation requires intentional shifts in culture, workforce, and technology, and it is the marriage of these shifts that provides the mechanism for achieving and sustaining desired transformations. Join us to hear how a midsize college successfully leveraged the EDUCAUSE Dx framework to transform the way it approaches teaching and learning through the selection and implementation of a new learning management platform in less than one year.
Ascending the Mountain of Digital Transformation: Views from Base Camp
The Big Ten Academic Alliance is on a digital transformation journey to expand access for our stakeholders' collaboration that reaches across more than 650,000 students and faculty at our institutions. We are striving to enhance diversity and equity among peer groups and major stakeholders alike. We must think differently and be agile, assess current resources, and creatively fill open positions with different skills and backgrounds supporting this transformation. The risk of inaction is far too great.
EDUCAUSE poster: https://btaa.org/docs/default-source/default-document-library/btaa-educause-dx-poster.pdf?sfvrsn=dcdab348_3
Accelerating Organizational Agility and IT Velocity with DevOps and Change-Enabled Release Teams
Research suggests organizations that adopt a DevOps culture with well-defined practices based on ITIL are more likely to have better outcomes versus organizations that implement DevOps alone. Many organizations struggle integrating DevOps and the ITIL Change Enablement practice. We will present a proposed circular model for the cultural and seamless integration of DevOps practices with Change Enablement by shifting the practice and process of change approval to the start of DevOps workflows.
EDUCAUSE article: https://www.educause.edu/working-groups/papers/2022/accelerating-organizational-agility-and-it-velocity-with-devops-and-change-enabled-release-teams
IT Service Foundations: Integrating Strategic Initiatives to Deliver Business Value
Is the delivery of your IT services built on a solid foundation of standard delivery with service insights and financial transparency? This poster session will highlight how enterprise architecture and strategic planning activities enabled collateral benefits through the alignment of the following strategic initiatives: IT financial management, hardware asset management, application of service standards, service catalog alignment, and adoption of service management roles.
Is Your Organization Ready for IAM? 10 Steps to a Successful IAM Implementation
More than 50% of IAM implementations are not successful, and even more do not deliver the promised value. A significant number of unsuccessful IAM implementations are because the organization was not "ready" for an IAM program. Our presentation provides the top 10 steps that Higher education organizations should take to make themselves ready for an IAM program and guarantee a successful implementation that delivers its promised value.
Ch-ch-ch-ch-changes, Turn and Face the Change: Maximizing LMS and Technology Support Transitions
Is your institution in the midst of making some major technology or technology support team changes? If so, join us to learn how a new instructional design and technology team at an R1 university successfully led their organization through an LMS transition in the middle of an academic year. This presentation will highlight how they came together as a new team and used transitions to develop unique training experiences and foster continued growth.
Maintaining Your Sanity and Your Survey Data: How to Build Clean and Functional Longitudinal Datasets
Building clean and functional longitudinal datasets from messy student survey data can seems like a daunting and time-consuming challenge, but there are ways to make it easier! In this demo, you'll learn tips and tricks for generating a spotless dataset by normalizing data at the point of collection, minimizing duplication when collecting multiple submissions per respondent, eliminating unwanted outliers, and transforming wide datasets to long formats for easier visualization and reporting.
Ethical Use of Student Data in Predictive Analytics and Interventions
Do you gather, use, or share quantitative or qualitative student data in predictive analytics or for targeted interventions? How do you ensure that data is being used in ways that provide benefit without doing harm? Human subjects' data protection goes beyond IT security. Come join this discussion about ethics, privacy concerns, and responsible, mindful use of students' personal data in higher education contexts, and help develop a list of best ethical practices for your next project.
Using the NIST Cybersecurity Framework for Information Security Program Strategic Planning
WTC Consulting, Inc. (WTC) worked with a university client’s Information Security Office to develop a five-year information security program strategic plan. WTC first assessed the client’s information security program utilizing the NIST Cybersecurity Framework (CSF), identifying areas of strength and gaps in maturity levels and associated risks. WTC worked with the client to develop 35 initiatives to improve maturity levels in targeted security controls and planned the implementation time frames and cost requirements associated with the initiatives. WTC projected improvements to the information security program maturity levels referencing the NIST CSF.
User Experience and Service Design Practice Community Group (CG)
Want to learn how other campuses are leveraging User Experience and Customer Experience techniques to measure value and align their IT services to meet customer needs? Are you looking for peers on your journey to becoming a service design practitioner? Come join our emerging community!
Design Thinking Infograph
EDUCAUSE Community Groups
We understand the power of leveraging community to solve your professional challenges. Stop by our poster session to learn about the personal and professional benefits of participating in EDUCAUSE Community Groups (CGs) and working groups.



















































































































