Working in partnership with Haplo to build a Research Information Management System at the University of Westminster.
Jenni Evans, Head of Research and Scholarly Communications, University of Westminster
The University of Westminster have collaborated with Haplo since 2013 to build their Research Information Management System (also known as a Current Research Information System). The benefit of using Haplo's solution is that they not only include the management of the research lifecycle (pre-award and post-award) but they also enable management of the ethics review process and the PhD student journey. 2018 saw the Haplo Repository go live at Westminster, which includes the management of all research outputs (including publications, data and non-text outputs), and enables both open and managed access to data and 2019 has seen the development of functionality to support review exercises such as the Research Excellence Framework (REF). This system is known internally at Westminster as the Virtual Research Environment (or VRE) and is recognised as the place to manage most research related information. This showcase will address how this software is in use at Westminster, the benefits, risk and challenges of being a development partner and working with an emerging supplier, and how a combination of researcher involvement in development, an intuitive workflow based product with security embedded in the platform, and the combination of functionality has led to excellent buy-in from the research community.
Voice, Chat and Innovation with Students as Co-Producers
Chris Dixon, Head of IT Partnering and Innovation, Lancaster University
This session will demonstrate how Lancaster University makes use of students and student staff to produce innovative products. It will include information on its “Innovation Box” process and a demonstration of “L.U”, a voice and chat interface built in collaboration with Amazon Web Services, and launched at Lancaster University in March 2019 to give students unparalleled access to services, support and allowing them to experience a revolutionary digital friend
Moodle – A decade of ups and downs
Nadeem Ahmad, Head of ICT, TEL & Student Records, Hythrop College, UoL
A look at lessons learnt over a decade of implementation of a Moodle VLE, strategies to increase engagement, policies to enforce usage, student and staff benefits. Over the last decade Heythrop has leant many good things about how best to implement and encourage usage of a VLE, but along the way it fell down quite a few rabbit holes!
Getting to Cyber Essentials Plus and staying there
Robbie Walker, University of Portsmouth
Globally, there are over 1,000 published standards relating to cyber security in some form. The standards landscape is complex and there is no ‘one size fits all’ approach. So why do we need another standard like Cyber Essentials? Because it sets out a basic checklist of fundamental security must-do’s. No fluff, no complex management systems, no resource sapping “reporting lifecycles” or demands for supporting documents. It has a minimal overhead. Security doesn’t get any simpler - unless of course, you ignore it completely.
It’s not easy - but it gets easier. It takes commitment and engagement but there are more pros than cons. Cyber essentials doesn’t cover all requirements - it is simple but not too simple. It’s a sea change - not the be all and end all.
This presentation is about why we did it, how we did it, what obstacles we overcame. Remember - it’s called “Cyber Essentials” - not Cyber “Optionals” or Cyber “Nice-to-haves” or Cyber “I really should get around to it but I’m a bit tied up at the moment”
Enterprise Architecture in Education: From a Higher Education Reference Model (CAUDIT) towards a Reference Architecture
Andreas Hartmann, Professor, University of Applied Science & Telecommunications, Leipzig, Germany
CAUDIT provides a model including capabilities and data artefacts. However, the capabilities are not mapped to any software. There is no relationship between data artefacts and capabilities or functional components. Comparable to IT4IT, we expand the model with relationships and functional components, that can be mapped to real software tools.
Culture Change and Colleague Engagement
Rob Moore, IT Procurement Manager, Leeds Beckett University
A veteran of leading culture change in public, private and third sector organisations, Rob will be discussing how IT Services at Leeds Beckett are engaging with their staff and evolving their work culture. What has been changed, who has been leading this change, and how is it working across an eclectic work force
The Transformative Impact of BI
Gary Tindell and Simon Gill, Senior MI & BI Analyst Developers, University of East London
This presentation provides evidence of the transformative effect of business intelligence, both internally and externally. The main focus will be internally and the use of BI in analysing factors influencing student retention.
We will also provide case studies of external collaborations that have had a significant impact, locally and regionally
Projects to Programmes to Portfolio’s - The challenges, pitfalls and successes of an IT Portfolio Management Office
Clive Green, Global Head of IS Portfolio Management Office, University of Nottingham
Maturing the Information Services PMO. How we have evolved and grown the PMO function from passive to directive, from managing projects/programmes to introducing portfolio management, defining new processes, championing delivery excellence and implementing departmental wide resourcing and estimating toolkits
Cyber Resilience - Selling it to the wider University
Bruce Rodger, Head of IT Infrastructure Services, University of Strathclyde
In 2017, the University of Strathclyde invested an additional £1.2m in its cybersecurity activities, initiating a programme to raise the baseline across the University, and to ensure that its cyber posture was not a barrier to winning new business.
In 2019, the team formed under that programme won "Outstanding Cyber Team" at the Scottish Cyber Industry Awards.
This presentation will explore some of the challenges faced by that team in persuading the other areas of the University that a strong security culture is not only essential, but beneficial