Institutional showcases

ucisa2020 Leadership Conference


Working in partnership with Haplo to build a Research Information Management System at the University of Westminster.

Jenni Evans, Head of Research and Scholarly Communications, University of Westminster

The University of Westminster have collaborated with Haplo since 2013 to build their Research Information Management System (also known as a Current Research Information System). The benefit of using Haplo's solution is that they not only include the management of the research lifecycle (pre-award and post-award) but they also enable management of the ethics review process and the PhD student journey. 2018 saw the Haplo Repository go live at Westminster, which includes the management of all research outputs (including publications, data and non-text outputs), and enables both open and managed access to data and 2019 has seen the development of functionality to support review exercises such as the Research Excellence Framework (REF). This system is known internally at Westminster as the Virtual Research Environment (or VRE) and is recognised as the place to manage most research related information. This showcase will address how this software is in use at Westminster, the benefits, risk and challenges of being a development partner and working with an emerging supplier, and how a combination of researcher involvement in development, an intuitive workflow based product with security embedded in the platform, and the combination of functionality has led to excellent buy-in from the research community.                            


Voice, Chat and Innovation with Students as Co-Producers

Chris Dixon, Head of IT Partnering and Innovation, Lancaster University            

This session will demonstrate how Lancaster University makes use of students and student staff to produce innovative products. It will include information on its “Innovation Box” process and a demonstration of “L.U”, a voice and chat interface built in collaboration with Amazon Web Services, and launched at Lancaster University in March 2019 to give students unparalleled access to services, support and allowing them to experience a revolutionary digital friend           


Moodle – A decade of ups and downs

Nadeem Ahmad, Head of ICT, TEL & Student Records, Hythrop College, UoL     

A look at lessons learnt over a decade of implementation of a Moodle VLE, strategies to increase engagement, policies to enforce usage, student and staff benefits. Over the last decade Heythrop has leant many good things about how best to implement and encourage usage of a VLE, but along the way it fell down quite a few rabbit holes!


Getting to Cyber Essentials Plus and staying there    

Robbie Walker, University of Portsmouth                   

Globally, there are over 1,000 published standards relating to cyber security in some form. The standards landscape is complex and there is no ‘one size fits all’ approach.   So why do we need another standard like Cyber Essentials? Because it sets out a basic checklist of fundamental security must-do’s. No fluff, no complex management systems, no resource sapping “reporting lifecycles” or demands for supporting documents.  It has a minimal overhead. Security doesn’t get any simpler - unless of course, you ignore it completely.

It’s not easy - but it gets easier.  It takes commitment and engagement but there are more pros than cons.   Cyber essentials doesn’t cover all requirements - it is simple but not too simple.  It’s a sea change - not the be all and end all.

This presentation is about why we did it, how we did it, what obstacles we overcame.  Remember - it’s called “Cyber Essentials” - not Cyber “Optionals” or Cyber “Nice-to-haves” or Cyber “I really should get around to it but I’m a bit tied up at the moment”               


Enterprise Architecture in Education: From a Higher Education Reference Model (CAUDIT) towards a Reference Architecture

Andreas Hartmann, Professor, University of Applied Science & Telecommunications, Leipzig, Germany    

CAUDIT provides a model including capabilities and data artefacts. However, the capabilities are not mapped to any software. There is no relationship between data artefacts and capabilities or functional components. Comparable to IT4IT, we expand the model with relationships and functional components, that can be mapped to real software tools.                 


Culture Change and Colleague Engagement               

Rob Moore, IT Procurement Manager, Leeds Beckett University          

A veteran of leading culture change in public, private and third sector organisations, Rob will be discussing how IT Services at Leeds Beckett are engaging with their staff and evolving their work culture. What has been changed, who has been leading this change, and how is it working across an eclectic work force    


The Transformative Impact of BI    

Gary Tindell and Simon Gill, Senior MI & BI Analyst Developers, University of East London           

This presentation provides evidence of the transformative effect of business intelligence, both internally and externally.  The main focus will be internally and the use of BI in analysing factors influencing student retention.


We will also provide case studies of external collaborations that have had a significant impact, locally and regionally              


Projects to Programmes to Portfolio’s  - The challenges, pitfalls and successes of an IT Portfolio Management Office

Clive Green, Global Head of IS Portfolio Management Office, University of Nottingham                

Maturing the Information Services PMO. How we have evolved and grown the PMO function from passive to directive, from managing projects/programmes to introducing portfolio management, defining new processes, championing delivery excellence and implementing departmental wide resourcing and estimating toolkits                            


Cyber Resilience - Selling it to the wider University  

Bruce Rodger, Head of IT Infrastructure Services, University of Strathclyde                       

In 2017, the University of Strathclyde invested an additional £1.2m in its cybersecurity activities, initiating a programme to raise the baseline across the University, and to ensure that its cyber posture was not a barrier to winning new business.

In 2019, the team formed under that programme won "Outstanding Cyber Team" at the Scottish Cyber Industry Awards.

This presentation will explore some of the challenges faced by that team in persuading the other areas of the University that a strong security culture is not only essential, but beneficial