![]() |
TLT-SWG Highly Moderated Listserver Since 1994 |
|
|
Related
Resources from TLT Group FACULTY/PROFESSIONAL DEVELOPMENT PROGRAM Dangerous Discussions Home Page IT Policy Documentation - Constructive Alternatives |
||
|
||
|
[Click here for simple set of recommended operating principles] Our colleges and universities have responded to the information technology revolution by devoting substantial resources to new staff, infrastructure, equipment and software. We delight in the transformative opportunities IT offers the academy, but struggle to cope with its challenge to traditional ways of getting things done. Virtually every IT task is collaborative: facilitating the work and learning of some and dependent on the effort and expertise of others. The central administrative challenge we place on our information technology-related departments is managing these collaborative relationships. I’d like to convince you that the acceptable use and other policy documentation proliferating like weeds throughout the higher education landscape[2] unnecessarily distract us from meeting that challenge. It is ironic (see Box 1) that most IT departments juxtapose mission statements celebrating partnership with the rest of the campus community with policies and procedures targeting the hackers, thieves, and other evildoers that one would think based on reading these documents must permeate higher education. I prefer to believe that the proliferation of policy documentation reflects less a perception of information technology users as Hobbesian savages,[3] than uncritical adoption of corporate models for managing information technology. Because these documents do nothing to promote institutional mission, it is past time to push back against the dominance of policy and shift our attention to managing IT-centered collaborations. The Dominance of Policy
The
result has been the proliferation of policies – acceptable use, copyright,
email, dorm networking and the like – that read like the licensing agreements
(SLA’s) that come with computer software and have about the same
relevance: Like SLA’s, no one reads
policy documents other than the authors (usually a committee, with a
committee’s gift for infelicitous prose) until caught in some quasi-legalistic
dispute over their enforcement. At
best, they distract from the academic mission; at worst, they threaten the
collaborative ties among faculty, students and staff that define higher
education. If someone tried to introduce
such documentation in more traditional areas of the academy, they would be
ridiculed or charged with threatening academic integrity (see
How can departmental goals to “empower members of the Community” and “build relationships” and “help” and “support” result in policy documents designed to keep Hobbesian savages at bay? Perhaps a clue comes from the Service Motto of Bucknell University’s Information Services and Resources department: “Our customer's success is our success.” Customer-seller, client-server vocabulary appears in much of the self-descriptive material for academic information technology departments. Many IT staff (and managers) are recruited from corporate settings. And it is easy for college presidents and other senior administrators to see IT departments (with networks and expensive hubs akin to electrical, plumbing and HVAC infrastructure) as similar to Buildings and Grounds, Payroll or other offices often seen as supporting rather participating in academic activities. It has become natural to view managing these support functions as similar to running a business, with contracts (often explicit) establishing mutual obligations, service requirements and performance standards. But, seeing IT departments in business or contractual terms is antithetical to the recognition that the information technology revolution has come to permeate the academy and is transforming what it means to teach and learn. The client-server model is no more helpful for understanding the linkages between IT staff and the rest of the college community than it would be if applied to the relationship between student and teacher, researcher and librarian or co-authors of a scholarly paper, each of which is better understood as a collaboration between colleagues sharing a common mission. Information Technology and
Collaboration But, for most members of the academic community most of the time, information, software and computing equipment are tools that serve work and learning; people think of these tools in the same way that they do the telephone, telephone book and pen. For them, the primary IT collaboration is based on obtaining or providing seamless access to these tools in the midst of teaching, learning and related administrative support activities. The distinction is helpful in understanding some of the stresses that arise in our IT collaborations. Jointly creating something strengthens collaborative ties. When a reference librarian and faculty colleague are on the hunt for a source, they are partners. The joy students, staff and faculty feel when they get a departmental Website to work as they’d hoped is intoxicating and leaves each participant with a sense of mutual respect and gratitude. But, when a collaborative role is primarily supportive or limited in scope, the sense of common purpose must compete with hierarchical or customer-server imagery that, while antithetical to the academic mission, we nonetheless bring from other aspects of our lives. Having a tool break in the midst of invigorating, demanding and time-sensitive work or learning is frustrating. Few of us have the moral fiber fully to protect colleagues, particularly those we call for help, from the heat of our frustration. Thus, collaboration by IT staff often requires the skills of the crisis counselor.[5]
A
shared sense of mission is all it takes to manage most collaborations
encountered in higher education. But,
because many IT-related collaborations involve one colleague supporting another
or cross departmental and administrative lines, something more is needed.
Standardized procedures and rules are a natural response to the perception of being on the lower rungs of hierarchy and the desire to ration unpleasant or overwhelming demands. Acceptable use policies, widely adopted within corporations, seemingly offer a quick fix to the administrative headaches and potential legal entanglements our campuses have encountered in implementing new information technologies. The approach fails because the standardization, scale economies, and routinized procedures that drive IT departments in commercial settings are absent in higher education. Academia celebrates, indeed requires, unique endeavors and the diversity and idiosyncrasies of students, teachers and scholars. Hence, higher education requires information technology staff willing to be flexible, multidimensional, imaginative, diverse collaborators. And, it needs administrators capable of coping with the stresses that inevitably arise. Managing the
Information Technology Collaboration
The purpose, then,
of information technology documentation is to implement these operating
principles (see
Ideally, any member of the campus community will feel able to implement available strategies for resolving conflicts concerning the use of information technology resources. For the foreseeable future, most of the attention the chief information officer, director of computing or vice president for information technology devotes to facilitating collaboration is likely to take the form of anticipating and resolving conflict, defusing or coping with tensions that emerge from conflict and developing these skills in the team or department managers that report to her. Understanding the consequences of one’s actions, identifying alternative strategies, and resolving conflicting demands on information technology resources will enable members of the academic community to eliminate virtually all of the needs that have generated policy documentation in the past. But, what of individuals who choose not to support the institutional mission or who are unable to respect and accommodate the needs of others? Colleges and universities have always had to deal with these few individuals and have in place well established systems for coping with them. The information technology revolution does not require developing a new or parallel judicial system. Violations of privacy, intellectual dishonesty, misuse of campus facilities, harassment and mental or physical intimidation are inconsistent with institutional mission. Such behavior has long violated student honor or judicial codes and faculty and staff contractual obligations. All that is needed is the will among senior administrators and participation of knowledgeable community members to apply traditional standards and insights in novel contexts. We don’t need policy documents that itemize all the ways a few rogues and rascals could harm our academic communities. At most, we need to clarify how to direct into existing systems for protecting academic standards truly anti-social behavior that might remain after all efforts at education and conflict resolution have been exhausted. Our primary focus should be on affirming the role that new information technologies can play in facilitating our quests for learning, wisdom, and living together in community. Click here to return to top of Web page (beginning of document)
|
||
|
We recognize that our work and
priorities ultimately support the academic mission of the university. We are
proactive and visionary, anticipating the needs of our customers while planning
for new and improved services. We take advantage of every opportunity to build
relationships with our customers and help them to learn and grow.
Why then, do IT departments produce policy documents that start off with The use of [university] resources
is a privilege, not a right, and is granted under the conditions of appropriate
usage as stated in this policy. By using [our] network, computing facilities,
resources, and accounts, users agree to the guidelines contained herein. And why would the accompanying commentary on ethical use consist of a listing of eleven “Do Nots”? Click here to return to top of Web page (beginning of document)
|
||
|
Imagine if 20 years ago a new technology, the book, had been introduced in an academy previously organized around the Homeric and Socratic traditions. Imagine the policy document that, following the example of our response to the IT revolution, would have been drafted to govern use of the newly created Library: “Use of the Library is a
privilege, not a right, that depends on your agreeing to each of the following
rules and procedures.”
“Wash and dry hands before
handling books.” “Books carried about during
inclement weather must be in protective containers certified by the Library
staff.” “Do not bend or crack the
binding of any book.” “Readers must not expose
books to excessive sunlight.” “Dog-earing a page is
strictly prohibited.” “Readers may not allow food
or drink to come within 10 feet of a book.” “Upon discovery of any pencil
mark or indentation in a book returned to the Library, staff may cancel circulation
privileges pending review by the appropriate campus judicial body, which will
in turn determine appropriate additional penalties.” I’m grateful not to be aware of any academic community that has a library policy document that contains any of these sentiments. But, virtually all of our colleges and universities have information technology policy documents with analogous phrases. Click here to return to top of Web page (beginning of document)
|
||
|
Good documentation anticipates individual needs, filling the void of an absent colleague. Good documentation should make it easier for faculty, students and staff to 1) Figure out how to do what one wants or needs to do: One turns to documentation for help; so the starting point for all documentation should be the message that help is forthcoming, that time spent with this documentation is likely to enable the reader to meet his or her goals. One advantage of Web pages over traditional text is that a clearly identified link to the relevant solution anywhere on the first visible screen will serve this purpose. 2) Determine what one must know or decide in order to do it: The emphasis of documentation should be informational rather than directive. The individual or team pursuing a particular goal is best positioned to figure out how to achieve it, but only if they have access to all relevant information. By clarifying the steps involved, identifying the pros and cons of alternative strategies, and modeling the process of using mission as a yardstick for evaluating actions, information technology-related departments can play a crucial role in helping the community make good choices in rapidly changing contexts. 3) Identify whom to contact for additional help: The more common and repetitive the task (e.g., printing, email, locating a book or journal), the more likely it is that documentation will provide all necessary support. However, the twin pillars of academia – learning and the pursuit of knowledge – guarantee that a high proportion of our undertakings will be novel, requiring imaginative and flexible mobilization of institutional resources. Hence, how-to documentation will meet fewer needs in an academic setting than would be true for most other enterprises; a leitmotif of effective information technology documentation in higher education will be identifying avenues for further assistance. 4) Understand the impact of what one wants to do on the ability of others to support the institution’s mission: The harm that one’s use of information technology imposes on others most commonly is inadvertent – the consequence of ignorance, error or inexperience. A poorly formatted document clogs a printer; I don’t realize that half the world is downloading my Herman’s Hermits collection, thereby squeezing campus Internet bandwidth; lacking the know-how to target the relevant audience, a secretary mass-emails notices of a highly specialized colloquium; a student’s civil disobedience against a corporate Web-server results in a law-enforcement response that threatens temporary disruption of the institution’s Internet connection. Our colleges and universities can eliminate most of the harm resulting from these sorts of behavior by providing better information about consequences and alternative means to accomplish desired ends. Even when tradeoffs among competing demands for information technology resources cannot be avoided, sharing information about the magnitude of the relevant tradeoffs and identifying the affected parties or interests is more effective than blanket prohibitions, rules and procedures in promoting outcomes consistent with institutional mission. Rationing services by fiat is a poor substitute for informed collective problem-solving when strategic vision is hobbled by limited resources. 5) Figure out how to resolve differences: Academics are passionate about their pursuit of learning and scholarship. And there is a long tradition of sharp contention of ideas in the seminar room, dorm-room bull sessions, and the committees and other governance forums that create and implement strategic vision. These occasions for strife (and other obstacles to meeting immediate goals) frequently strain collaborative ties; we lose the sense of our common commitment to institutional mission. Information technology documentation should echo the emphasis in other governance documents on civility and mutual respect in an academic community. It should describe available forums and strategies for resolving conflicts, reflecting an institutional faith that all differences must eventually yield to reflection and attentive conversation in the context of shared mission. And it should specify channels for coping (whom to call) when strife in collaboration threatens to become abusive. Click here to return to top of Web page (beginning of document)
|
||
|
A student arrives on campus wanting to set up her personal computer. When she turns to available documentation, she reads Computing Services will provide
you a direct connection from your dorm room if
1. you live in a networked dorm
2. you have the hardware and software needed to connect to the
network; and
3. you agree to adhere to our network usage
policies Whose needs does this address? Not the student wondering what advantages
connecting her computer has over, say, relying on public labs; not the student
with an Ethernet cable in hand wondering what to do next; not the student with
a laptop looking for wireless connections; not the student living
off-campus. Yet, this is how the old
Student Dorm Networking policy document at
The old first page went on to discuss the advantages of networking, but ended with legal disclaimers, including “Computing Services can not guarantee that every computer will connect properly to our network, even if it seems to meet all the criteria listed.” Nothing on this page was false; but is this how one responds to a new colleague, someone we are welcoming into collaboration? Helpful colleagues welcome newcomers by seeking to meet their needs. That a new student is joining our community surely signals that she shares our mission.[7] Why then would we set as the price for our cooperation All those receiving a dorm
network connection must read and agree to the following Policies and
Guidelines. Registration for a dorm network connection is an indication of
agreement to abide by all
The revised documentation addresses
most of the concerns that prompted the old “Dorm Network Policy” through the
link “Getting the Most Out of Your Networked Computer,” which is introduced by
the following text: Because many of the services we
provide are similar to those of an Internet Service Provider or other
commercial entity, it is easy for both of us to fall into the trap of viewing
our collaboration in terms of the buyer-seller relationships we encounter in
other settings. This can lead to
confusion and misunderstandings. As
members of a diverse and democratic academic community[8], we trust one another
and draw on our comparative strengths to keep the campus network functioning
smoothly.
If you have any questions (after
reviewing this documentation) about the commitments we in Information Services
make to you and the assistance we need from you in order to make the campus
network support the mission of the College, please contact any of us, for
example by…. Students see this link in the context of others that address how to connect from dorm rooms, via wireless, or from off campus; the case for networking; suggestions for buying a personal computer; and services available through networked computers.
Today, the greatest management
challenge emerging from dorm networks is the impact on the community of
peer-to-peer file sharing. Traditional
policy documentation addresses this with a series of prohibitions. The revised documentation follows a helpful
example from
Click here to return to top of Web page (beginning of document)
|
||
|
Footnotes
[1] Associate professor of
economics at [2] Gateways to collections of information technology policies and procedures are provided by “EDUCAUSE/Cornell Institute for Computer Policy and Law Home” at http://www.educause.edu/icpl/; “NITLE Policy Library” http://www.nitle.org/resources/policy.htm; and “Policy for Internet Users: A CSU Academic Repository” http://www.csudh.edu/CSU_Policy/default.htm. [3] In Leviathan, Thomas Hobbes famously writes of the need for society to develop a rule of laws to protect itself from the savages that otherwise would inhabit the “state of nature” where lives are "solitary, poor, nasty, brutish, and short."
[4] The Recording Industry
Association of America, which represents companies accounting for 90 percent of
all sound recordings legally sold in the [5] These tensions can arise within IT-related departments as well as among colleagues across department lines: A frozen desktop computer is just as frustrating for a library cataloger as for a student. A network outage inconveniences a desktop specialist just as much as it does someone in Admissions. [6] I could have used virtually any college or university. This example happens to be drawn from Bucknell University’s mission statement (http://www.bucknell.edu/Academics/Course_Catalog/Mission_Statement.html), Information Services & Resources Service Philosophy (http://www.isr.bucknell.edu/About_ISR/Our_Service_Philosophy.html), and Acceptable Use Policy (http://www.isr.bucknell.edu/Policies_and_Guidelines/AUP.html), all accessed September 2004. Using this example in no way diminishes my admiration for the strides Bucknell has made in facilitating IT-related collaborations among faculty, students and staff. [7] It might even be reasonable to presume that as a newcomer she embraces our mission with more fervor and optimism than we veterans who have struggled with the complications and tensions of living and working in community. [8] A direct reference to the Bryn Mawr mission statement. http://www.brynmawr.edu/about/mission.shtml [9] See “Advice on Peer-to-Peer File Sharing,” http://www.mtholyoke.edu/lits/network/p2p/filesharing.shtml, which includes a discussion of the circumstances under which the IT department might have to quarantine a student computer. Click here to return to top of Web page (beginning of document)
|
||
|
|
||