SlideShare a Scribd company logo
1 of 37
THE INDIVIDUAL IN
    THE INSTITUTION:
    INTEGRATING THE
    USER EXPERIENCE
    MICHAEL CLARKE
    THE CHARLESTON CONFERENCE
    NOVEMBER 4, 2011




1    Copyright © 2011 SILVERCHAIR Information Systems
MOBILE AUTHENTICATION:
    THE CHALLENGE OF
    INSTITUTIONS




2   Copyright © 2011 SILVERCHAIR Information Systems
Mobile Authentication & Institutional
    End Users
    ▶ Institutional users expect remote
      access to the institution’s subscribed
      content.
    ▶ Remote access via laptop/desktop
      once user is authenticated to the
      institution’s network (via IP address,
      VPN, Athens, Shibboleth).
    ▶ Most mobile use does not happen on
      the institution’s network.
3    Copyright © 2011 SILVERCHAIR Information Systems
Mobile Device
    Pairing or Vouchers




    Pairs an institutional
    license with particular
    mobile devices
4    Copyright © 2011 SILVERCHAIR Information Systems
Mobile Device
    Pairing or Vouchers




    Some systems require the
    user to request a pairing
    code
5    Copyright © 2011 SILVERCHAIR Information Systems
Mobile Device
    Pairing or Vouchers




    Other systems create a pairing
    automatically when the user
    connects a mobile device to
6   the institution’s WiFi
     Copyright © 2011 SILVERCHAIR Information Systems
Mobile Device
    Pairing or Vouchers




    A browser cookie maintains the
    pairing for a limited period
    of time (typically 30 – 90
7   days).
     Copyright © 2011 SILVERCHAIR Information Systems
Device Pairing Advantages

    ▶         Simple.
    ▶         Secure – code is good for a limited
              period of time.
    ▶         Ties device access to institutional usage
              reports.




8   Copyright © 2011 SILVERCHAIR Information Systems
Device Pairing Disadvantages

    ▶         User experience not integrated
    ▶         User settings/personalization does not
              carry to the device
    ▶         No information about who is using the
              device
    ▶         Challenges with users who are
              physically separated from institution at
              pairing setup/renewal.
9   Copyright © 2011 SILVERCHAIR Information Systems
Is there another
     solution?




     This is a rhetorical question.


10    Copyright © 2011 SILVERCHAIR Information Systems
Account-based mobile
     authentication




     Silverchair’s preferred
     method of mobile
     authentication.
11    Copyright © 2011 SILVERCHAIR Information Systems   11
TRADITIONAL REASONS WHY
     INSTITUTIONAL USERS
     CREATE INDIVIDUAL
     ACCOUNTS




12   Copyright © 2011 SILVERCHAIR Information Systems
Reasons why individuals authenticate

     ▶   To sign-up for/configure alerts
     ▶   To save/bookmark content
     ▶   Educational activities
     ▶   To save site configuration
     ▶   To receive better recommendations
     ▶   To submit an article
13   Copyright © 2011 SILVERCHAIR Information Systems
Reasons why individuals authenticate

     ▶   To sign-up for/configure alerts
     ▶   To save/bookmark content
     ▶   Educational activities
     ▶   To save site configuration
     ▶   To receive better recommendations
     ▶   To submit an article
15   Copyright © 2011 SILVERCHAIR Information Systems
16   Copyright © 2011 SILVERCHAIR Information Systems
Reasons why individuals authenticate

     ▶   To sign-up for/configure alerts
     ▶   To save/bookmark content
     ▶   Educational activities
     ▶   To save site configuration
     ▶   To receive better recommendations
     ▶   To submit an article
17   Copyright © 2011 SILVERCHAIR Information Systems
18   Copyright © 2011 SILVERCHAIR Information Systems
Reasons why individuals authenticate

     ▶   To sign-up for/configure alerts
     ▶   To save/bookmark content
     ▶   Educational activities
     ▶   To save site configuration
     ▶   To receive better recommendations
     ▶   To submit an article
19   Copyright © 2011 SILVERCHAIR Information Systems
20   Copyright © 2011 SILVERCHAIR Information Systems
Reasons why individuals authenticate

     ▶   To sign-up for/configure alerts
     ▶   To save/bookmark content
     ▶   Educational activities
     ▶   To save site configuration
     ▶   To receive better recommendations
     ▶   To submit an article
21   Copyright © 2011 SILVERCHAIR Information Systems
22   Copyright © 2011 SILVERCHAIR Information Systems
23   Copyright © 2011 SILVERCHAIR Information Systems
Reasons why individuals authenticate

     ▶   To sign-up for/configure alerts
     ▶   To save/bookmark content
     ▶   Educational activities
     ▶   To save site configuration
     ▶   To receive better recommendations
     ▶   To submit an article
24   Copyright © 2011 SILVERCHAIR Information Systems
25   Copyright © 2011 SILVERCHAIR Information Systems
Reasons why individuals authenticate

     ▶   To sign-up for/configure alerts
     ▶   To save/bookmark content
     ▶   Educational activities
     ▶   To save site configuration
     ▶   To receive better recommendations
     ▶   To submit an article
26   Copyright © 2011 SILVERCHAIR Information Systems
Reasons why individuals authenticate

     ▶   To sign-up for/configure alerts
     ▶   To save/bookmark content is
             Account based authentication
           already commonplace. We are
     ▶ Educational activitiesmany users
         simply leveraging what
            are already doing to provide a
     ▶ Tomobile authentication that identifies
          save site configuration
          who the user is to provide a more
     ▶ To receive better recommendations
             integrated user experience.
     ▶   To submit an article
27   Copyright © 2011 SILVERCHAIR Information Systems
Account-based mobile
     authentication




      User: Robert Smith
      Institution: Psychiatric University
      Email/username: rsmith@psych.edu

28    Copyright © 2011 SILVERCHAIR Information Systems   28
On Institutional
                                                                    Network



                                                        tv




29   Copyright © 2011 SILVERCHAIR Information Systems
Account Affiliated
                                                                 to Institution



                                                        tv




30   Copyright © 2011 SILVERCHAIR Information Systems
Outside University
                                                                 Network




31   Copyright © 2011 SILVERCHAIR Information Systems
32   Copyright © 2011 SILVERCHAIR Information Systems   32
33   Copyright © 2011 SILVERCHAIR Information Systems
34   Copyright © 2011 SILVERCHAIR Information Systems
Account-Based Mobile Access
     Advantages
     ▶         Simple. Users are already using this
               authentication method for other purposes
     ▶         Secure – user must sign in to product
               periodically via institutional network
     ▶         Integrated user experience
     ▶         Usage rolls up under existing institutional
               usage statistics
     ▶         Users can set-up/renew account from
               anywhere (including remotely via VPN)
35       Copyright © 2011 SILVERCHAIR Information Systems
Account-Based Mobile Access
     Disadvantages
     ▶         Users that do not already have an account
               have to set one up
     ▶         You have to remember your user name
               and password occasionally (a cookie will
               store it for you after you log in the first
               time) or use the auto-retriever and we will
               e-mail to you instantly.


36       Copyright © 2011 SILVERCHAIR Information Systems
MICHAEL CLARKE
     EXECUTIVE VICE PRESIDENT

     MICHAELC@SILVERCHAIR.COM




37    Copyright © 2011 SILVERCHAIR Information Systems

More Related Content

Viewers also liked

If You Fund it, They Will Come: Leveraging Grants to Gain Faculty Collaboration
If You Fund it, They Will Come: Leveraging Grants to Gain Faculty CollaborationIf You Fund it, They Will Come: Leveraging Grants to Gain Faculty Collaboration
If You Fund it, They Will Come: Leveraging Grants to Gain Faculty CollaborationCharleston Conference
 
120 to 12: Reducing days to shelf with vendor services, cat-on-receipt and au...
120 to 12: Reducing days to shelf with vendor services, cat-on-receipt and au...120 to 12: Reducing days to shelf with vendor services, cat-on-receipt and au...
120 to 12: Reducing days to shelf with vendor services, cat-on-receipt and au...Charleston Conference
 
Shared E-books from Coast to Coast: Consortial Programs in Florida and the Pa...
Shared E-books from Coast to Coast: Consortial Programs in Florida and the Pa...Shared E-books from Coast to Coast: Consortial Programs in Florida and the Pa...
Shared E-books from Coast to Coast: Consortial Programs in Florida and the Pa...Charleston Conference
 
Electronic Resources Management: Functional Integration in Technical Services
Electronic Resources Management: Functional Integration in Technical ServicesElectronic Resources Management: Functional Integration in Technical Services
Electronic Resources Management: Functional Integration in Technical ServicesCharleston Conference
 
Rebuilding the Plane While Flying: Library/Vendor Strategies for Approval Pla...
Rebuilding the Plane While Flying: Library/Vendor Strategies for Approval Pla...Rebuilding the Plane While Flying: Library/Vendor Strategies for Approval Pla...
Rebuilding the Plane While Flying: Library/Vendor Strategies for Approval Pla...Charleston Conference
 
Mobile Access, by Mark Johnson, Highwire
Mobile Access, by Mark Johnson, HighwireMobile Access, by Mark Johnson, Highwire
Mobile Access, by Mark Johnson, HighwireCharleston Conference
 
You Have a DDA E-book Plan, Now How Do You Manage It?: Streamlining Individua...
You Have a DDA E-book Plan, Now How Do You Manage It?: Streamlining Individua...You Have a DDA E-book Plan, Now How Do You Manage It?: Streamlining Individua...
You Have a DDA E-book Plan, Now How Do You Manage It?: Streamlining Individua...Charleston Conference
 
Handouts how to use microsoft access to combine cost and usage data for ejour...
Handouts how to use microsoft access to combine cost and usage data for ejour...Handouts how to use microsoft access to combine cost and usage data for ejour...
Handouts how to use microsoft access to combine cost and usage data for ejour...Charleston Conference
 
Meeting User Needs & Expectations: A Library’s Quest for Discovery
Meeting User Needs & Expectations: A Library’s Quest for DiscoveryMeeting User Needs & Expectations: A Library’s Quest for Discovery
Meeting User Needs & Expectations: A Library’s Quest for DiscoveryCharleston Conference
 
Offthe shelfe bookforacademiclibrarians
Offthe shelfe bookforacademiclibrariansOffthe shelfe bookforacademiclibrarians
Offthe shelfe bookforacademiclibrariansCharleston Conference
 
The Road Oft Traveled: Collection Analysis and Developmet in a Modern Academi...
The Road Oft Traveled: Collection Analysis and Developmet in a Modern Academi...The Road Oft Traveled: Collection Analysis and Developmet in a Modern Academi...
The Road Oft Traveled: Collection Analysis and Developmet in a Modern Academi...Charleston Conference
 
Alphorm.com Formation Implémenter une PKI avec ADCS 2012 R2
Alphorm.com Formation Implémenter une PKI avec ADCS 2012 R2 Alphorm.com Formation Implémenter une PKI avec ADCS 2012 R2
Alphorm.com Formation Implémenter une PKI avec ADCS 2012 R2 Alphorm
 

Viewers also liked (13)

If You Fund it, They Will Come: Leveraging Grants to Gain Faculty Collaboration
If You Fund it, They Will Come: Leveraging Grants to Gain Faculty CollaborationIf You Fund it, They Will Come: Leveraging Grants to Gain Faculty Collaboration
If You Fund it, They Will Come: Leveraging Grants to Gain Faculty Collaboration
 
Acquisitions for Newbies
Acquisitions for NewbiesAcquisitions for Newbies
Acquisitions for Newbies
 
120 to 12: Reducing days to shelf with vendor services, cat-on-receipt and au...
120 to 12: Reducing days to shelf with vendor services, cat-on-receipt and au...120 to 12: Reducing days to shelf with vendor services, cat-on-receipt and au...
120 to 12: Reducing days to shelf with vendor services, cat-on-receipt and au...
 
Shared E-books from Coast to Coast: Consortial Programs in Florida and the Pa...
Shared E-books from Coast to Coast: Consortial Programs in Florida and the Pa...Shared E-books from Coast to Coast: Consortial Programs in Florida and the Pa...
Shared E-books from Coast to Coast: Consortial Programs in Florida and the Pa...
 
Electronic Resources Management: Functional Integration in Technical Services
Electronic Resources Management: Functional Integration in Technical ServicesElectronic Resources Management: Functional Integration in Technical Services
Electronic Resources Management: Functional Integration in Technical Services
 
Rebuilding the Plane While Flying: Library/Vendor Strategies for Approval Pla...
Rebuilding the Plane While Flying: Library/Vendor Strategies for Approval Pla...Rebuilding the Plane While Flying: Library/Vendor Strategies for Approval Pla...
Rebuilding the Plane While Flying: Library/Vendor Strategies for Approval Pla...
 
Mobile Access, by Mark Johnson, Highwire
Mobile Access, by Mark Johnson, HighwireMobile Access, by Mark Johnson, Highwire
Mobile Access, by Mark Johnson, Highwire
 
You Have a DDA E-book Plan, Now How Do You Manage It?: Streamlining Individua...
You Have a DDA E-book Plan, Now How Do You Manage It?: Streamlining Individua...You Have a DDA E-book Plan, Now How Do You Manage It?: Streamlining Individua...
You Have a DDA E-book Plan, Now How Do You Manage It?: Streamlining Individua...
 
Handouts how to use microsoft access to combine cost and usage data for ejour...
Handouts how to use microsoft access to combine cost and usage data for ejour...Handouts how to use microsoft access to combine cost and usage data for ejour...
Handouts how to use microsoft access to combine cost and usage data for ejour...
 
Meeting User Needs & Expectations: A Library’s Quest for Discovery
Meeting User Needs & Expectations: A Library’s Quest for DiscoveryMeeting User Needs & Expectations: A Library’s Quest for Discovery
Meeting User Needs & Expectations: A Library’s Quest for Discovery
 
Offthe shelfe bookforacademiclibrarians
Offthe shelfe bookforacademiclibrariansOffthe shelfe bookforacademiclibrarians
Offthe shelfe bookforacademiclibrarians
 
The Road Oft Traveled: Collection Analysis and Developmet in a Modern Academi...
The Road Oft Traveled: Collection Analysis and Developmet in a Modern Academi...The Road Oft Traveled: Collection Analysis and Developmet in a Modern Academi...
The Road Oft Traveled: Collection Analysis and Developmet in a Modern Academi...
 
Alphorm.com Formation Implémenter une PKI avec ADCS 2012 R2
Alphorm.com Formation Implémenter une PKI avec ADCS 2012 R2 Alphorm.com Formation Implémenter une PKI avec ADCS 2012 R2
Alphorm.com Formation Implémenter une PKI avec ADCS 2012 R2
 

Similar to The Individual in the Institution: Integrating the User Experience by Michael Clarke, Silverchair

Complying with the California Consumer Privacy Act (CCPA)
Complying with the California Consumer Privacy Act (CCPA)Complying with the California Consumer Privacy Act (CCPA)
Complying with the California Consumer Privacy Act (CCPA)Seclore
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCloudIDSummit
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
Auth on the web: better authentication
Auth on the web: better authenticationAuth on the web: better authentication
Auth on the web: better authenticationKelley Robinson
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecuritySmartCompliance
 
Basc presentation on security and application architecture
Basc presentation on security and application architectureBasc presentation on security and application architecture
Basc presentation on security and application architecturewbjwilliams3
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Five Common Causes of Data Breaches
Five Common Causes of Data Breaches Five Common Causes of Data Breaches
Five Common Causes of Data Breaches Seclore
 
Emulating an Adversary with Imperfect Intelligence
Emulating an Adversary with Imperfect IntelligenceEmulating an Adversary with Imperfect Intelligence
Emulating an Adversary with Imperfect IntelligenceAdam Pennington
 
9 Best Practices for Ensuring Long-Term Reliability of Aadhar Enabled Biometr...
9 Best Practices for Ensuring Long-Term Reliability of Aadhar Enabled Biometr...9 Best Practices for Ensuring Long-Term Reliability of Aadhar Enabled Biometr...
9 Best Practices for Ensuring Long-Term Reliability of Aadhar Enabled Biometr...Brihaspathi Technologies Pvt. Ltd.
 
Seclore Internal Document Security Control with DRM
Seclore Internal Document Security Control with DRMSeclore Internal Document Security Control with DRM
Seclore Internal Document Security Control with DRMSeclore
 
A review of new capabilities at C3i
A review of new capabilities at C3iA review of new capabilities at C3i
A review of new capabilities at C3iKevin Shea
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla IsolationCybryx
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanNetIQ
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationDomenico Catalano
 
Issues and Solutions for Enterprise Email Security.pptx
Issues and Solutions for Enterprise Email Security.pptxIssues and Solutions for Enterprise Email Security.pptx
Issues and Solutions for Enterprise Email Security.pptxSeclore
 

Similar to The Individual in the Institution: Integrating the User Experience by Michael Clarke, Silverchair (20)

Complying with the California Consumer Privacy Act (CCPA)
Complying with the California Consumer Privacy Act (CCPA)Complying with the California Consumer Privacy Act (CCPA)
Complying with the California Consumer Privacy Act (CCPA)
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
 
2012 ah emea deploying byod
2012 ah emea   deploying byod2012 ah emea   deploying byod
2012 ah emea deploying byod
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity Services
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Auth on the web: better authentication
Auth on the web: better authenticationAuth on the web: better authentication
Auth on the web: better authentication
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
Basc presentation on security and application architecture
Basc presentation on security and application architectureBasc presentation on security and application architecture
Basc presentation on security and application architecture
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Five Common Causes of Data Breaches
Five Common Causes of Data Breaches Five Common Causes of Data Breaches
Five Common Causes of Data Breaches
 
Emulating an Adversary with Imperfect Intelligence
Emulating an Adversary with Imperfect IntelligenceEmulating an Adversary with Imperfect Intelligence
Emulating an Adversary with Imperfect Intelligence
 
9 Best Practices for Ensuring Long-Term Reliability of Aadhar Enabled Biometr...
9 Best Practices for Ensuring Long-Term Reliability of Aadhar Enabled Biometr...9 Best Practices for Ensuring Long-Term Reliability of Aadhar Enabled Biometr...
9 Best Practices for Ensuring Long-Term Reliability of Aadhar Enabled Biometr...
 
Seclore Internal Document Security Control with DRM
Seclore Internal Document Security Control with DRMSeclore Internal Document Security Control with DRM
Seclore Internal Document Security Control with DRM
 
A review of new capabilities at C3i
A review of new capabilities at C3iA review of new capabilities at C3i
A review of new capabilities at C3i
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Issues and Solutions for Enterprise Email Security.pptx
Issues and Solutions for Enterprise Email Security.pptxIssues and Solutions for Enterprise Email Security.pptx
Issues and Solutions for Enterprise Email Security.pptx
 

Recently uploaded

BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 

Recently uploaded (20)

BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 

The Individual in the Institution: Integrating the User Experience by Michael Clarke, Silverchair

  • 1. THE INDIVIDUAL IN THE INSTITUTION: INTEGRATING THE USER EXPERIENCE MICHAEL CLARKE THE CHARLESTON CONFERENCE NOVEMBER 4, 2011 1 Copyright © 2011 SILVERCHAIR Information Systems
  • 2. MOBILE AUTHENTICATION: THE CHALLENGE OF INSTITUTIONS 2 Copyright © 2011 SILVERCHAIR Information Systems
  • 3. Mobile Authentication & Institutional End Users ▶ Institutional users expect remote access to the institution’s subscribed content. ▶ Remote access via laptop/desktop once user is authenticated to the institution’s network (via IP address, VPN, Athens, Shibboleth). ▶ Most mobile use does not happen on the institution’s network. 3 Copyright © 2011 SILVERCHAIR Information Systems
  • 4. Mobile Device Pairing or Vouchers Pairs an institutional license with particular mobile devices 4 Copyright © 2011 SILVERCHAIR Information Systems
  • 5. Mobile Device Pairing or Vouchers Some systems require the user to request a pairing code 5 Copyright © 2011 SILVERCHAIR Information Systems
  • 6. Mobile Device Pairing or Vouchers Other systems create a pairing automatically when the user connects a mobile device to 6 the institution’s WiFi Copyright © 2011 SILVERCHAIR Information Systems
  • 7. Mobile Device Pairing or Vouchers A browser cookie maintains the pairing for a limited period of time (typically 30 – 90 7 days). Copyright © 2011 SILVERCHAIR Information Systems
  • 8. Device Pairing Advantages ▶ Simple. ▶ Secure – code is good for a limited period of time. ▶ Ties device access to institutional usage reports. 8 Copyright © 2011 SILVERCHAIR Information Systems
  • 9. Device Pairing Disadvantages ▶ User experience not integrated ▶ User settings/personalization does not carry to the device ▶ No information about who is using the device ▶ Challenges with users who are physically separated from institution at pairing setup/renewal. 9 Copyright © 2011 SILVERCHAIR Information Systems
  • 10. Is there another solution? This is a rhetorical question. 10 Copyright © 2011 SILVERCHAIR Information Systems
  • 11. Account-based mobile authentication Silverchair’s preferred method of mobile authentication. 11 Copyright © 2011 SILVERCHAIR Information Systems 11
  • 12. TRADITIONAL REASONS WHY INSTITUTIONAL USERS CREATE INDIVIDUAL ACCOUNTS 12 Copyright © 2011 SILVERCHAIR Information Systems
  • 13. Reasons why individuals authenticate ▶ To sign-up for/configure alerts ▶ To save/bookmark content ▶ Educational activities ▶ To save site configuration ▶ To receive better recommendations ▶ To submit an article 13 Copyright © 2011 SILVERCHAIR Information Systems
  • 14.
  • 15. Reasons why individuals authenticate ▶ To sign-up for/configure alerts ▶ To save/bookmark content ▶ Educational activities ▶ To save site configuration ▶ To receive better recommendations ▶ To submit an article 15 Copyright © 2011 SILVERCHAIR Information Systems
  • 16. 16 Copyright © 2011 SILVERCHAIR Information Systems
  • 17. Reasons why individuals authenticate ▶ To sign-up for/configure alerts ▶ To save/bookmark content ▶ Educational activities ▶ To save site configuration ▶ To receive better recommendations ▶ To submit an article 17 Copyright © 2011 SILVERCHAIR Information Systems
  • 18. 18 Copyright © 2011 SILVERCHAIR Information Systems
  • 19. Reasons why individuals authenticate ▶ To sign-up for/configure alerts ▶ To save/bookmark content ▶ Educational activities ▶ To save site configuration ▶ To receive better recommendations ▶ To submit an article 19 Copyright © 2011 SILVERCHAIR Information Systems
  • 20. 20 Copyright © 2011 SILVERCHAIR Information Systems
  • 21. Reasons why individuals authenticate ▶ To sign-up for/configure alerts ▶ To save/bookmark content ▶ Educational activities ▶ To save site configuration ▶ To receive better recommendations ▶ To submit an article 21 Copyright © 2011 SILVERCHAIR Information Systems
  • 22. 22 Copyright © 2011 SILVERCHAIR Information Systems
  • 23. 23 Copyright © 2011 SILVERCHAIR Information Systems
  • 24. Reasons why individuals authenticate ▶ To sign-up for/configure alerts ▶ To save/bookmark content ▶ Educational activities ▶ To save site configuration ▶ To receive better recommendations ▶ To submit an article 24 Copyright © 2011 SILVERCHAIR Information Systems
  • 25. 25 Copyright © 2011 SILVERCHAIR Information Systems
  • 26. Reasons why individuals authenticate ▶ To sign-up for/configure alerts ▶ To save/bookmark content ▶ Educational activities ▶ To save site configuration ▶ To receive better recommendations ▶ To submit an article 26 Copyright © 2011 SILVERCHAIR Information Systems
  • 27. Reasons why individuals authenticate ▶ To sign-up for/configure alerts ▶ To save/bookmark content is Account based authentication already commonplace. We are ▶ Educational activitiesmany users simply leveraging what are already doing to provide a ▶ Tomobile authentication that identifies save site configuration who the user is to provide a more ▶ To receive better recommendations integrated user experience. ▶ To submit an article 27 Copyright © 2011 SILVERCHAIR Information Systems
  • 28. Account-based mobile authentication User: Robert Smith Institution: Psychiatric University Email/username: rsmith@psych.edu 28 Copyright © 2011 SILVERCHAIR Information Systems 28
  • 29. On Institutional Network tv 29 Copyright © 2011 SILVERCHAIR Information Systems
  • 30. Account Affiliated to Institution tv 30 Copyright © 2011 SILVERCHAIR Information Systems
  • 31. Outside University Network 31 Copyright © 2011 SILVERCHAIR Information Systems
  • 32. 32 Copyright © 2011 SILVERCHAIR Information Systems 32
  • 33. 33 Copyright © 2011 SILVERCHAIR Information Systems
  • 34. 34 Copyright © 2011 SILVERCHAIR Information Systems
  • 35. Account-Based Mobile Access Advantages ▶ Simple. Users are already using this authentication method for other purposes ▶ Secure – user must sign in to product periodically via institutional network ▶ Integrated user experience ▶ Usage rolls up under existing institutional usage statistics ▶ Users can set-up/renew account from anywhere (including remotely via VPN) 35 Copyright © 2011 SILVERCHAIR Information Systems
  • 36. Account-Based Mobile Access Disadvantages ▶ Users that do not already have an account have to set one up ▶ You have to remember your user name and password occasionally (a cookie will store it for you after you log in the first time) or use the auto-retriever and we will e-mail to you instantly. 36 Copyright © 2011 SILVERCHAIR Information Systems
  • 37. MICHAEL CLARKE EXECUTIVE VICE PRESIDENT MICHAELC@SILVERCHAIR.COM 37 Copyright © 2011 SILVERCHAIR Information Systems

Editor's Notes

  1. The web, and the information on it, is certainly an early iteration of the networked environment. incunabula<1501. Web 1.0 was really about the metaphor of the printed page. Web 2.0 about the metaphor of the coffee house. Social. Web 3.0 according to Tim Berners Lee will be about the semantic web – which was really his original aim: linked data.
  2. The web, and the information on it, is certainly an early iteration of the networked environment. incunabula<1501. Web 1.0 was really about the metaphor of the printed page. Web 2.0 about the metaphor of the coffee house. Social. Web 3.0 according to Tim Berners Lee will be about the semantic web – which was really his original aim: linked data.
  3. The web, and the information on it, is certainly an early iteration of the networked environment. incunabula<1501. Web 1.0 was really about the metaphor of the printed page. Web 2.0 about the metaphor of the coffee house. Social. Web 3.0 according to Tim Berners Lee will be about the semantic web – which was really his original aim: linked data.
  4. The web, and the information on it, is certainly an early iteration of the networked environment. incunabula<1501. Web 1.0 was really about the metaphor of the printed page. Web 2.0 about the metaphor of the coffee house. Social. Web 3.0 according to Tim Berners Lee will be about the semantic web – which was really his original aim: linked data.
  5. The web, and the information on it, is certainly an early iteration of the networked environment. incunabula<1501. Web 1.0 was really about the metaphor of the printed page. Web 2.0 about the metaphor of the coffee house. Social. Web 3.0 according to Tim Berners Lee will be about the semantic web – which was really his original aim: linked data.
  6. The web, and the information on it, is certainly an early iteration of the networked environment. incunabula<1501. Web 1.0 was really about the metaphor of the printed page. Web 2.0 about the metaphor of the coffee house. Social. Web 3.0 according to Tim Berners Lee will be about the semantic web – which was really his original aim: linked data.
  7. The web, and the information on it, is certainly an early iteration of the networked environment. incunabula<1501. Web 1.0 was really about the metaphor of the printed page. Web 2.0 about the metaphor of the coffee house. Social. Web 3.0 according to Tim Berners Lee will be about the semantic web – which was really his original aim: linked data.
  8. The web, and the information on it, is certainly an early iteration of the networked environment. incunabula<1501. Web 1.0 was really about the metaphor of the printed page. Web 2.0 about the metaphor of the coffee house. Social. Web 3.0 according to Tim Berners Lee will be about the semantic web – which was really his original aim: linked data.