This document provides a communication plan for the Division of Information Technology at Western Carolina University. The plan's purpose is to establish a consistent framework for managing communication within IT and with campus stakeholders. Key elements of the plan include identifying target audiences, delegating responsibility for communication, establishing message standards, outlining various communication channels, and providing guidance on communication frequency, style, and emergency procedures. The overarching goal is to ensure IT provides relevant, accurate, and consistent information to support its mission and strategic goals.
The strategic plan outlines 3 strategic directions for the Division of Information Technology at Western Carolina University: 1) Enable and support the academic mission of the institution, 2) Enhance university business processes, and 3) Improve the university's technology foundation. The plan details goals and initiatives under each strategic direction to provide a secure, reliable infrastructure that supports the university's mission of engaged teaching and learning. Key initiatives include developing sustainable classroom technologies, providing continuous access to IT resources for teaching/learning, and being proactive in supporting research and evolving academic needs.
This document outlines an action plan for implementing instructional technology in a school district. It includes an organizational chart describing the roles and responsibilities of technology staff. It also discusses plans for professional development, including conducting needs assessments, ensuring training is job-embedded, and evaluating sessions. Evaluation of professional development and technology integration will be informed by guidelines that emphasize using multiple sources of data to assess impact on student learning.
This document outlines an action plan for technology integration and professional development in a school district. It includes:
1) An organizational chart describing the roles of technology staff like coordinators, specialists, and directors who oversee areas like instructional support, operations, and data management.
2) A plan for needs-based professional development focused on job-embedded training to help teachers implement technology in their instruction and analyze student data.
3) Guidelines for evaluating professional development based on analyzing its goals, context, potential to drive student outcomes, and gathering feedback from participants.
This document discusses monitoring and evaluation (M&E) as an important part of education transformation initiatives. It defines M&E and explains why M&E is important for documenting success, developing clear goals and outcomes, promoting stakeholder engagement, and helping programs stay on track. The document outlines the planning, management, and evaluation cycle used in results-based management. It also discusses outcomes-based planning and evaluation, noting the importance of defining desired results before planning activities. Examples are provided to illustrate M&E concepts.
Knowledge management tools in mobile networkingsaumyah Singh
This document summarizes a student project on knowledge management tools in mobile networking. It defines key terms like knowledge management, data, information, and knowledge. It discusses how knowledge management can be divided into two parts and the requirements of knowledge management tools. It also analyzes a case study of a Chinese telecommunications company that implemented a knowledge management system to improve customer service. The case study identified tools and strategies used, results achieved like reduced training time, and recommendations for future development.
IRJET- The Influence of Institutional Information Sharing for StudentsIRJET Journal
1) The document discusses a proposed knowledge sharing platform called Knowledge Barter that allows students to exchange knowledge without money. It aims to bridge gaps in students' knowledge by facilitating sharing of materials, guidance from experts, and exposure to new fields.
2) Key features of the platform include profile analysis to match students and mentors, material sharing, chatting, question and answer sessions, and updates on relevant seminars. Mentors can guide students in their career paths and interests based on their profiles.
3) The implementation involves creating student, mentor, and admin portals. Mentors are verified experts that monitor student communities and fields of interest. Students build profiles specifying interests to receive guidance from mentors on career opportunities
The Computer Services department at a university developed a 3-year strategic plan to address growing frustrations and meet expanding needs. The plan aims to improve communication, deliver reliable services, invest in staff training, acquire new resources, and increase campus-wide IT proficiency. Key goals include achieving predictability in issue response, enhancing collaboration between departments, adopting best practices like ITIL, and establishing centralized infrastructure.
Importance of the Project Management Information System (PMIS)mohamed fawzy
The Board of Directors has requested a proposal for a Project Management Information System (PMIS) to enhance organizational efficiency in project management. The proposed approach includes a centralized platform that facilitates information exchange and strengthens communication links across various project portfolios. The PMIS will consolidate data repositories, allowing immediate access and distribution of relevant project information. It will also feature robust features like document management, task scheduling, progress monitoring, and collaborative tools, making workflows more efficient and improving cooperation across different functions.
The plan goes beyond technology execution, and connects these tactics with the organization's culture, highlighting a mutually beneficial link between the PMIS and the company's values. The implementation tactics will be customized to comply with the organization's values, conventions, and communication preferences, promoting cultural alignment.
The strategy aims to integrate the PMIS into the organization's core values and practices by combining technology functions with the company's cultural fabric. The goal is to maximize information management and communication within the business. This strategy goes beyond conventional usage by transforming the PMIS into a catalyst that aligns with the company's cultural fabric, ensuring improved effectiveness and a complete overhaul of how information is handled and shared within the company.
The strategic plan outlines 3 strategic directions for the Division of Information Technology at Western Carolina University: 1) Enable and support the academic mission of the institution, 2) Enhance university business processes, and 3) Improve the university's technology foundation. The plan details goals and initiatives under each strategic direction to provide a secure, reliable infrastructure that supports the university's mission of engaged teaching and learning. Key initiatives include developing sustainable classroom technologies, providing continuous access to IT resources for teaching/learning, and being proactive in supporting research and evolving academic needs.
This document outlines an action plan for implementing instructional technology in a school district. It includes an organizational chart describing the roles and responsibilities of technology staff. It also discusses plans for professional development, including conducting needs assessments, ensuring training is job-embedded, and evaluating sessions. Evaluation of professional development and technology integration will be informed by guidelines that emphasize using multiple sources of data to assess impact on student learning.
This document outlines an action plan for technology integration and professional development in a school district. It includes:
1) An organizational chart describing the roles of technology staff like coordinators, specialists, and directors who oversee areas like instructional support, operations, and data management.
2) A plan for needs-based professional development focused on job-embedded training to help teachers implement technology in their instruction and analyze student data.
3) Guidelines for evaluating professional development based on analyzing its goals, context, potential to drive student outcomes, and gathering feedback from participants.
This document discusses monitoring and evaluation (M&E) as an important part of education transformation initiatives. It defines M&E and explains why M&E is important for documenting success, developing clear goals and outcomes, promoting stakeholder engagement, and helping programs stay on track. The document outlines the planning, management, and evaluation cycle used in results-based management. It also discusses outcomes-based planning and evaluation, noting the importance of defining desired results before planning activities. Examples are provided to illustrate M&E concepts.
Knowledge management tools in mobile networkingsaumyah Singh
This document summarizes a student project on knowledge management tools in mobile networking. It defines key terms like knowledge management, data, information, and knowledge. It discusses how knowledge management can be divided into two parts and the requirements of knowledge management tools. It also analyzes a case study of a Chinese telecommunications company that implemented a knowledge management system to improve customer service. The case study identified tools and strategies used, results achieved like reduced training time, and recommendations for future development.
IRJET- The Influence of Institutional Information Sharing for StudentsIRJET Journal
1) The document discusses a proposed knowledge sharing platform called Knowledge Barter that allows students to exchange knowledge without money. It aims to bridge gaps in students' knowledge by facilitating sharing of materials, guidance from experts, and exposure to new fields.
2) Key features of the platform include profile analysis to match students and mentors, material sharing, chatting, question and answer sessions, and updates on relevant seminars. Mentors can guide students in their career paths and interests based on their profiles.
3) The implementation involves creating student, mentor, and admin portals. Mentors are verified experts that monitor student communities and fields of interest. Students build profiles specifying interests to receive guidance from mentors on career opportunities
The Computer Services department at a university developed a 3-year strategic plan to address growing frustrations and meet expanding needs. The plan aims to improve communication, deliver reliable services, invest in staff training, acquire new resources, and increase campus-wide IT proficiency. Key goals include achieving predictability in issue response, enhancing collaboration between departments, adopting best practices like ITIL, and establishing centralized infrastructure.
Importance of the Project Management Information System (PMIS)mohamed fawzy
The Board of Directors has requested a proposal for a Project Management Information System (PMIS) to enhance organizational efficiency in project management. The proposed approach includes a centralized platform that facilitates information exchange and strengthens communication links across various project portfolios. The PMIS will consolidate data repositories, allowing immediate access and distribution of relevant project information. It will also feature robust features like document management, task scheduling, progress monitoring, and collaborative tools, making workflows more efficient and improving cooperation across different functions.
The plan goes beyond technology execution, and connects these tactics with the organization's culture, highlighting a mutually beneficial link between the PMIS and the company's values. The implementation tactics will be customized to comply with the organization's values, conventions, and communication preferences, promoting cultural alignment.
The strategy aims to integrate the PMIS into the organization's core values and practices by combining technology functions with the company's cultural fabric. The goal is to maximize information management and communication within the business. This strategy goes beyond conventional usage by transforming the PMIS into a catalyst that aligns with the company's cultural fabric, ensuring improved effectiveness and a complete overhaul of how information is handled and shared within the company.
Paper Writing Service - HelpWriting.net 👈
✅ Quality
You get an original and high-quality paper based on extensive research. The completed work will be correctly formatted, referenced and tailored to your level of study.
✅ Confidentiality
We value your privacy. We do not disclose your personal information to any third party without your consent. Your payment data is also safely handled as you process the payment through a secured and verified payment processor.
✅ Originality
Every single order we deliver is written from scratch according to your instructions. We have zero tolerance for plagiarism, so all completed papers are unique and checked for plagiarism using a leading plagiarism detector.
✅ On-time delivery
We strive to deliver quality custom written papers before the deadline. That's why you don't have to worry about missing the deadline for submitting your assignment.
✅ Free revisions
You can ask to revise your paper as many times as you need until you're completely satisfied with the result. Provide notes about what needs to be changed, and we'll change it right away.
✅ 24/7 Support
From answering simple questions to solving any possible issues, we're always here to help you in chat and on the phone. We've got you covered at any time, day or night.
Strategic Management Essay
Strategic Management
Introduction
To deal effectively with the wide array of factors affecting the ability of a business to grow and prosper, managers need advanced processes they feel will facilitate the optimal positioning of the business in its competitive environment. Such positioning is possible with strategic management because this process improves preparedness for unexpected internal or competitive demands.
Therefore, strategic management is an all encompassing approach for formulating, implementing and evaluating managerial decisions in a way that permits the business to reach its objectives.
For a strategic management plan to be successful, however, every manager should:
Clearly see the need for change
Be...show more content...John, 44 59).
Understandably, organizations with diverse operations due to multiple products, markets or technologies also tend to use more complex strategic management systems. Despite differences in detail and degree of formalization, the basic components of the models used to analyze strategic management operations are very similar.
The strategic management process is based on the belief that businesses should continually monitor internal and external events so timely changes can be made. To survive, firms must be able to identify and adapt to change. This involves timely planning, directing, organizing and controlling of the strategy related decisions and actions of the firm (Camerer, 195 219).
The strategic management process is sometimes improperly perceived as a unidirectional flow of objectives, strategies and decision parameters from management to the employees. In fact, the process should be highly interac
This document provides module descriptions for courses in the CTI Bachelor of Science in Information Technology degree program. It describes 15 modules that are part of the 3-year degree program, including introductory modules in the first year covering topics like business communication, computer skills, and programming. More advanced second year modules focus on areas such as data analysis and design, data structures and algorithms, and database design concepts. The module descriptions provide learning objectives and overview of topics covered in each module to give students information on the program curriculum.
The success of implementing technology and dealing business changes across the enterprise has never been more critical to a company’s market relevance, financial growth and employee productivity. As companies grow in either size, service and product offerings or complexity, the increased demand to deliver consistent high quality support becomes more and more challenging. Knowledge Management (KM) has the power to transform the way services are delivered and experienced by both the valued customer and the productive employee as business is conducted on a daily basis. Organizations continuing to struggle with measuring sustainable business benefits from implementing technology and business change will benefit greatly from the industry lessons learned from successful KM implementations. Peter McGarahan, a support industry analyst and expert, will share his experiences and thought leadership on successfully implementing KM to support and enable technology and business change across the enterprise. Peter will provide lessons learned and recommended practices from his Service Delivery and Knowledge Management (KM) consulting experience that will change your perspective on how to do Knowledge right! Attendees will gain valuable insights into the following aspects of the topic:
• How Service leaders can best position and leverage knowledge for any technology and business change
• How to best approach planning for your next enterprise technology and business rollout with the end-result in mind
• Assessing your organizational maturity, identifying and addressing the gaps in performance to deliver a consistently better customer experience for customers and employees
• Introducing Knowledge-Centered Support (KCS) best practices into your service and support environment to address resolving issues, answering questions and fulfilling requests
This seminar discussed the characteristics of IT graduate programs. The objectives were to explore IT programs and raise appreciation for IT's role in industry. IT programs aim to produce graduates who can select, apply, integrate and administer technologies to meet user needs. Key pillars of IT include abilities in areas like problem solving, teamwork, communication, and continuing professional development. The presentation recommended experiential learning like projects and internships to ease students' transition to industry. It concluded by referencing guidelines for IT undergraduate programs.
This seminar discussed the characteristics of IT graduate programs. The objectives were to explore IT programs and raise appreciation for IT's role in industry. IT programs aim to produce graduates who can select, apply, integrate and administer technologies to meet user needs. Key pillars of IT include abilities in areas like problem solving, teamwork, communication, and continuing professional development. The presentation recommended experiential learning like projects and internships to ease students' transition to industry. It concluded by referencing guidelines for IT undergraduate programs.
The document presents an updated strategic plan for information technology at Boston College. It discusses goals to improve support for learning and teaching through initiatives like the Canvas learning management system and a new student information system. It also aims to enhance support for research through high-performance computing resources and research services. Additionally, the plan focuses on improving customer service through an integrated, customer-centric support environment and a culture of continuous service improvement. The strategic plan was created through a collaborative process involving teams from across the university.
How can technology be used to improve the learner experience at points of tra...Becka Colley-Foster
Literature review, funded by the Higher Education Academy and Evidence Net, looking at whether online systems can support student engagement at points of transition. Review compiled by the University of Bradford in conjunction with ELESIG (http://elesig.ning.com). Review completed by Ruth Lefever and Becka Currant with help from Dr Lesley Diack.
This document provides ICT curricula for teachers and students in the school system. It aims to prepare youth to participate in establishing a knowledge society and to be globally competitive, as outlined in the National Policy on ICT in School Education.
The curriculum for teachers focuses on 6 learning strands: connecting with the world through online resources, connecting with each other, creating with ICT, interacting with ICT, possibilities of ICT in education, and reaching out/bridging divides. It includes 14 modules covering topics such as digital storytelling, data analysis, using ICT for teaching/learning/evaluation, documentation/communication, and subject-specific ICT tools.
The student curriculum spans 3 years with 3 sessions
This presentation provides an overview of the subjects, facilities, teachers, and grading at All Saints school. It discusses the various units taught in the IT course, including Communication & Employability, Computer Systems, E-commerce, Computer Networks, Information Systems, and Multimedia Design. For each unit, it outlines what is covered and how students will be assessed. It also shares positive feedback from an Ofsted report about the school's community and commitment to student welfare.
This presentation provides an overview of the subjects, facilities, teachers, and grading at All Saints school. It discusses the various units taught in the IT course, including Communication & Employability, Computer Systems, E-commerce, Computer Networks, Information Systems, and Multimedia Design. For each unit, it outlines what is covered and how students will be assessed. It also shares positive feedback from an Ofsted report about the school's community and commitment to student welfare.
The document provides an overview of the system architecture project for an education information systems company. It includes 10 sections that cover: an overview of the company and client case, requirements elicitation strategy, system components and design requirements, application development methodology, features and tradeoff analysis, milestones and deliverables, system architecture aligned with requirements, technical design document, design review checklist, and testing and deployment. The project aims to develop an information system for a higher education institution to allow secure sharing and storage of student and faculty data through a web-based interface.
Dynamic Curriculum & Its Implementation In Agora@MeritRenata Aquino
The document discusses curriculum development at AGORA Studio at MERIT, New Delhi to keep up with rapidly changing technology. It proposes a dynamic curriculum that evolves along with technological changes. AGORA Studio's vision is to create engineers and scientists for self-entrepreneurship through collaborative and individual projects exploring emerging technologies. A SWOT analysis of MERIT using a 4D model relates its strengths, weaknesses, opportunities, and threats across different modules like governance, budgeting, and access to information.
• Technology Leadership, Planning and Implementation: Specific Strategies fo...SchoolDude Editors
This document discusses strategies for technology leadership, planning, and implementation for small school districts. It identifies some of the common challenges small districts face, such as lack of budget, personnel, and expertise. It then outlines strategies small districts can take for essential skills like leadership and vision, planning and budgeting, team building, systems management, and communication. The document emphasizes developing a long-term technology plan, communicating effectively with stakeholders, and using data-driven decision making. It also introduces resources like a technology leadership wiki and total cost of ownership tool to help small districts.
Teacher Digital Literacy Framework (january-2023-draft)GeorgeMilliken2
The document outlines a teacher digital literacy framework to support teachers in developing skills for teaching and learning in a digital environment. It covers core skills like cyber resilience and data literacy, as well as skills for the workplace like communication and collaboration. The framework is based on existing models and is meant to help teachers gather evidence of competencies. It encourages an ongoing process of identifying gaps and developing skills over a teacher's career.
This document provides an overview of the Queensland Studies Authority Information Processing and Technology (IPT) Senior Syllabus from 2010, including:
- 6 core topics that make up the majority of the course (165-180 hours), with additional optional material that can expand on 4 of the topics
- General objectives focused on knowledge and application, analysis and synthesis, evaluation and communication, and attitudes and values
- Requirements for course organization, including a minimum of 55 hours per semester over 4 semesters, and flexibility for composite/mixed year level classes
- Details of the 6 core topics and some examples of additional material that can be covered
- Suggested learning experiences and assessment techniques.
Running Header 1APPLICATION DEVELOPMENT METHODS2.docxrtodd599
Running Header: 1
APPLICATION DEVELOPMENT METHODS 2
Unit 1 Group Project
Application Development Methods
Group 4
John Holmberg, Sean Austin, Christian Dillon, Charles Williams, Matthew Serdy, Frank Opoku
April 10, 2019
IT487 – IT Capstone 1
Nolyn Johnson
Table of Contents
Section 1 - Overview of Company and Client Business Case 3
Section 2 - Application Requirement Elicitation Strategy 5
Section 3 - System Components and Design Requirements 7
Section 4 - Methodology for Application Development Process 8
Section 5 - Complete Features and Trade-off Analysis 10
Section 6 - Milestones and Deliverables Based on Date and Dependencies 11
Section 7 - System Architecture Aligned with System Requirements 12
Section 8 - Technical Design Document 13
Section 9 - Design Review Checklist 14
Section 10 - Testing and Deployment 15
References 16
Section 1 - Overview of Company and Client Business Case
The company Education Information Systems. (EiS) is an information and management company that specializes in the creation and care of large-scale educational information and technology systems. EiS has implemented and managed systems ranging from the pre-K to 12th year primary school systems, and is developing larger scale systems to facilitate collegiate, graduate and post graduate educational institutions. EiS is a privately held organization that has the primary focus of providing the best possible systems to help grow the educational sector. Previous clients have implemented system wide software replacement and upgrades. With a stellar track record of previous educational institutions, and references, EiS has completed all the projects on time, and within budgetary guidelines. All problem issues or negative feedback from clients were handled in professional and timely manner that resulted in a completely satisfied client.
Moving toward post high school educational institutions, EiS is working with an extremely talented development team to move into the graduate and post graduate sector with ease. With new projects being developed, and more clients, EiS also works to recruit the best talent in the development, and technical aspects of information technology.
The information system to be developed by EiS for the institution will allow for all student, and faculty to store, share, and secure data. Utilizing a web-based UI, the information will be easily accessed, with the proper credentials. Data can be shared among staff, and students with preferences designed to mitigate corruption of data, loss of information, especially personal and financial information. All faculty and staff can be added to the application via an admin portal and all security is designated there. All remote access to the application will require a 2 factor
authentication system for another level of security to ensure that the proper access protocols are being followed. All information that is stored will be designed to the student or faculty member, and kept throughout the .
The strategic plan outlines key IT strategies for MD Anderson Cancer Center for fiscal year 2007 and beyond. It provides an overview of the vision, departments, budget, initiatives, issues, principles and recommendations for the Division of Information Services. The plan's goal is to inspire education, research and clinical services by providing secure and reliable data technologies to support the institution's mission.
The document discusses the ICT Profile, which is a framework that colleges can use to help students develop information, methodological, and technological skills. The ICT Profile consists of 5 skills: searching for information, processing information, presenting information, working in a network, and using ICTs efficiently and responsibly. It is a universal framework that can be adapted to any college program. Implementing the ICT Profile involves teachers integrating it into the curriculum with help from an ICT pedagogical advisor and ICT subcommittee.
The future of data analytics education is marked by diverse trends and innovations. Online learning, micro-credentials, and interdisciplinary approaches are democratizing access and specialization. Technology integration, such as AI and cloud-based labs, enhances learning experiences, while project-based and personalized learning foster practical skills and adaptability. Ethical considerations and industry collaboration are integrated, and interactive tools, gamification, and VR/AR provide engaging education. Challenges include content updates, equitable access, data privacy, and quality assurance. Overall, data analytics education is evolving to meet the demands of a data-driven world, emphasizing adaptability, inclusivity, and ethical practices.
UCISA Digital Futures Programme Presentation.pptxucisa
The Digital Futures Programme offers support and opportunities for people starting out in their IT careers.
It enables them to develop worthwhile learning opportunities that will hopefully lead to full time permanent employment either with their current or other employers.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Paper Writing Service - HelpWriting.net 👈
✅ Quality
You get an original and high-quality paper based on extensive research. The completed work will be correctly formatted, referenced and tailored to your level of study.
✅ Confidentiality
We value your privacy. We do not disclose your personal information to any third party without your consent. Your payment data is also safely handled as you process the payment through a secured and verified payment processor.
✅ Originality
Every single order we deliver is written from scratch according to your instructions. We have zero tolerance for plagiarism, so all completed papers are unique and checked for plagiarism using a leading plagiarism detector.
✅ On-time delivery
We strive to deliver quality custom written papers before the deadline. That's why you don't have to worry about missing the deadline for submitting your assignment.
✅ Free revisions
You can ask to revise your paper as many times as you need until you're completely satisfied with the result. Provide notes about what needs to be changed, and we'll change it right away.
✅ 24/7 Support
From answering simple questions to solving any possible issues, we're always here to help you in chat and on the phone. We've got you covered at any time, day or night.
Strategic Management Essay
Strategic Management
Introduction
To deal effectively with the wide array of factors affecting the ability of a business to grow and prosper, managers need advanced processes they feel will facilitate the optimal positioning of the business in its competitive environment. Such positioning is possible with strategic management because this process improves preparedness for unexpected internal or competitive demands.
Therefore, strategic management is an all encompassing approach for formulating, implementing and evaluating managerial decisions in a way that permits the business to reach its objectives.
For a strategic management plan to be successful, however, every manager should:
Clearly see the need for change
Be...show more content...John, 44 59).
Understandably, organizations with diverse operations due to multiple products, markets or technologies also tend to use more complex strategic management systems. Despite differences in detail and degree of formalization, the basic components of the models used to analyze strategic management operations are very similar.
The strategic management process is based on the belief that businesses should continually monitor internal and external events so timely changes can be made. To survive, firms must be able to identify and adapt to change. This involves timely planning, directing, organizing and controlling of the strategy related decisions and actions of the firm (Camerer, 195 219).
The strategic management process is sometimes improperly perceived as a unidirectional flow of objectives, strategies and decision parameters from management to the employees. In fact, the process should be highly interac
This document provides module descriptions for courses in the CTI Bachelor of Science in Information Technology degree program. It describes 15 modules that are part of the 3-year degree program, including introductory modules in the first year covering topics like business communication, computer skills, and programming. More advanced second year modules focus on areas such as data analysis and design, data structures and algorithms, and database design concepts. The module descriptions provide learning objectives and overview of topics covered in each module to give students information on the program curriculum.
The success of implementing technology and dealing business changes across the enterprise has never been more critical to a company’s market relevance, financial growth and employee productivity. As companies grow in either size, service and product offerings or complexity, the increased demand to deliver consistent high quality support becomes more and more challenging. Knowledge Management (KM) has the power to transform the way services are delivered and experienced by both the valued customer and the productive employee as business is conducted on a daily basis. Organizations continuing to struggle with measuring sustainable business benefits from implementing technology and business change will benefit greatly from the industry lessons learned from successful KM implementations. Peter McGarahan, a support industry analyst and expert, will share his experiences and thought leadership on successfully implementing KM to support and enable technology and business change across the enterprise. Peter will provide lessons learned and recommended practices from his Service Delivery and Knowledge Management (KM) consulting experience that will change your perspective on how to do Knowledge right! Attendees will gain valuable insights into the following aspects of the topic:
• How Service leaders can best position and leverage knowledge for any technology and business change
• How to best approach planning for your next enterprise technology and business rollout with the end-result in mind
• Assessing your organizational maturity, identifying and addressing the gaps in performance to deliver a consistently better customer experience for customers and employees
• Introducing Knowledge-Centered Support (KCS) best practices into your service and support environment to address resolving issues, answering questions and fulfilling requests
This seminar discussed the characteristics of IT graduate programs. The objectives were to explore IT programs and raise appreciation for IT's role in industry. IT programs aim to produce graduates who can select, apply, integrate and administer technologies to meet user needs. Key pillars of IT include abilities in areas like problem solving, teamwork, communication, and continuing professional development. The presentation recommended experiential learning like projects and internships to ease students' transition to industry. It concluded by referencing guidelines for IT undergraduate programs.
This seminar discussed the characteristics of IT graduate programs. The objectives were to explore IT programs and raise appreciation for IT's role in industry. IT programs aim to produce graduates who can select, apply, integrate and administer technologies to meet user needs. Key pillars of IT include abilities in areas like problem solving, teamwork, communication, and continuing professional development. The presentation recommended experiential learning like projects and internships to ease students' transition to industry. It concluded by referencing guidelines for IT undergraduate programs.
The document presents an updated strategic plan for information technology at Boston College. It discusses goals to improve support for learning and teaching through initiatives like the Canvas learning management system and a new student information system. It also aims to enhance support for research through high-performance computing resources and research services. Additionally, the plan focuses on improving customer service through an integrated, customer-centric support environment and a culture of continuous service improvement. The strategic plan was created through a collaborative process involving teams from across the university.
How can technology be used to improve the learner experience at points of tra...Becka Colley-Foster
Literature review, funded by the Higher Education Academy and Evidence Net, looking at whether online systems can support student engagement at points of transition. Review compiled by the University of Bradford in conjunction with ELESIG (http://elesig.ning.com). Review completed by Ruth Lefever and Becka Currant with help from Dr Lesley Diack.
This document provides ICT curricula for teachers and students in the school system. It aims to prepare youth to participate in establishing a knowledge society and to be globally competitive, as outlined in the National Policy on ICT in School Education.
The curriculum for teachers focuses on 6 learning strands: connecting with the world through online resources, connecting with each other, creating with ICT, interacting with ICT, possibilities of ICT in education, and reaching out/bridging divides. It includes 14 modules covering topics such as digital storytelling, data analysis, using ICT for teaching/learning/evaluation, documentation/communication, and subject-specific ICT tools.
The student curriculum spans 3 years with 3 sessions
This presentation provides an overview of the subjects, facilities, teachers, and grading at All Saints school. It discusses the various units taught in the IT course, including Communication & Employability, Computer Systems, E-commerce, Computer Networks, Information Systems, and Multimedia Design. For each unit, it outlines what is covered and how students will be assessed. It also shares positive feedback from an Ofsted report about the school's community and commitment to student welfare.
This presentation provides an overview of the subjects, facilities, teachers, and grading at All Saints school. It discusses the various units taught in the IT course, including Communication & Employability, Computer Systems, E-commerce, Computer Networks, Information Systems, and Multimedia Design. For each unit, it outlines what is covered and how students will be assessed. It also shares positive feedback from an Ofsted report about the school's community and commitment to student welfare.
The document provides an overview of the system architecture project for an education information systems company. It includes 10 sections that cover: an overview of the company and client case, requirements elicitation strategy, system components and design requirements, application development methodology, features and tradeoff analysis, milestones and deliverables, system architecture aligned with requirements, technical design document, design review checklist, and testing and deployment. The project aims to develop an information system for a higher education institution to allow secure sharing and storage of student and faculty data through a web-based interface.
Dynamic Curriculum & Its Implementation In Agora@MeritRenata Aquino
The document discusses curriculum development at AGORA Studio at MERIT, New Delhi to keep up with rapidly changing technology. It proposes a dynamic curriculum that evolves along with technological changes. AGORA Studio's vision is to create engineers and scientists for self-entrepreneurship through collaborative and individual projects exploring emerging technologies. A SWOT analysis of MERIT using a 4D model relates its strengths, weaknesses, opportunities, and threats across different modules like governance, budgeting, and access to information.
• Technology Leadership, Planning and Implementation: Specific Strategies fo...SchoolDude Editors
This document discusses strategies for technology leadership, planning, and implementation for small school districts. It identifies some of the common challenges small districts face, such as lack of budget, personnel, and expertise. It then outlines strategies small districts can take for essential skills like leadership and vision, planning and budgeting, team building, systems management, and communication. The document emphasizes developing a long-term technology plan, communicating effectively with stakeholders, and using data-driven decision making. It also introduces resources like a technology leadership wiki and total cost of ownership tool to help small districts.
Teacher Digital Literacy Framework (january-2023-draft)GeorgeMilliken2
The document outlines a teacher digital literacy framework to support teachers in developing skills for teaching and learning in a digital environment. It covers core skills like cyber resilience and data literacy, as well as skills for the workplace like communication and collaboration. The framework is based on existing models and is meant to help teachers gather evidence of competencies. It encourages an ongoing process of identifying gaps and developing skills over a teacher's career.
This document provides an overview of the Queensland Studies Authority Information Processing and Technology (IPT) Senior Syllabus from 2010, including:
- 6 core topics that make up the majority of the course (165-180 hours), with additional optional material that can expand on 4 of the topics
- General objectives focused on knowledge and application, analysis and synthesis, evaluation and communication, and attitudes and values
- Requirements for course organization, including a minimum of 55 hours per semester over 4 semesters, and flexibility for composite/mixed year level classes
- Details of the 6 core topics and some examples of additional material that can be covered
- Suggested learning experiences and assessment techniques.
Running Header 1APPLICATION DEVELOPMENT METHODS2.docxrtodd599
Running Header: 1
APPLICATION DEVELOPMENT METHODS 2
Unit 1 Group Project
Application Development Methods
Group 4
John Holmberg, Sean Austin, Christian Dillon, Charles Williams, Matthew Serdy, Frank Opoku
April 10, 2019
IT487 – IT Capstone 1
Nolyn Johnson
Table of Contents
Section 1 - Overview of Company and Client Business Case 3
Section 2 - Application Requirement Elicitation Strategy 5
Section 3 - System Components and Design Requirements 7
Section 4 - Methodology for Application Development Process 8
Section 5 - Complete Features and Trade-off Analysis 10
Section 6 - Milestones and Deliverables Based on Date and Dependencies 11
Section 7 - System Architecture Aligned with System Requirements 12
Section 8 - Technical Design Document 13
Section 9 - Design Review Checklist 14
Section 10 - Testing and Deployment 15
References 16
Section 1 - Overview of Company and Client Business Case
The company Education Information Systems. (EiS) is an information and management company that specializes in the creation and care of large-scale educational information and technology systems. EiS has implemented and managed systems ranging from the pre-K to 12th year primary school systems, and is developing larger scale systems to facilitate collegiate, graduate and post graduate educational institutions. EiS is a privately held organization that has the primary focus of providing the best possible systems to help grow the educational sector. Previous clients have implemented system wide software replacement and upgrades. With a stellar track record of previous educational institutions, and references, EiS has completed all the projects on time, and within budgetary guidelines. All problem issues or negative feedback from clients were handled in professional and timely manner that resulted in a completely satisfied client.
Moving toward post high school educational institutions, EiS is working with an extremely talented development team to move into the graduate and post graduate sector with ease. With new projects being developed, and more clients, EiS also works to recruit the best talent in the development, and technical aspects of information technology.
The information system to be developed by EiS for the institution will allow for all student, and faculty to store, share, and secure data. Utilizing a web-based UI, the information will be easily accessed, with the proper credentials. Data can be shared among staff, and students with preferences designed to mitigate corruption of data, loss of information, especially personal and financial information. All faculty and staff can be added to the application via an admin portal and all security is designated there. All remote access to the application will require a 2 factor
authentication system for another level of security to ensure that the proper access protocols are being followed. All information that is stored will be designed to the student or faculty member, and kept throughout the .
The strategic plan outlines key IT strategies for MD Anderson Cancer Center for fiscal year 2007 and beyond. It provides an overview of the vision, departments, budget, initiatives, issues, principles and recommendations for the Division of Information Services. The plan's goal is to inspire education, research and clinical services by providing secure and reliable data technologies to support the institution's mission.
The document discusses the ICT Profile, which is a framework that colleges can use to help students develop information, methodological, and technological skills. The ICT Profile consists of 5 skills: searching for information, processing information, presenting information, working in a network, and using ICTs efficiently and responsibly. It is a universal framework that can be adapted to any college program. Implementing the ICT Profile involves teachers integrating it into the curriculum with help from an ICT pedagogical advisor and ICT subcommittee.
The future of data analytics education is marked by diverse trends and innovations. Online learning, micro-credentials, and interdisciplinary approaches are democratizing access and specialization. Technology integration, such as AI and cloud-based labs, enhances learning experiences, while project-based and personalized learning foster practical skills and adaptability. Ethical considerations and industry collaboration are integrated, and interactive tools, gamification, and VR/AR provide engaging education. Challenges include content updates, equitable access, data privacy, and quality assurance. Overall, data analytics education is evolving to meet the demands of a data-driven world, emphasizing adaptability, inclusivity, and ethical practices.
UCISA Digital Futures Programme Presentation.pptxucisa
The Digital Futures Programme offers support and opportunities for people starting out in their IT careers.
It enables them to develop worthwhile learning opportunities that will hopefully lead to full time permanent employment either with their current or other employers.
Similar to Wcu division of it communication plan (20)
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
2. Table of Contents
1
Executive Summary .............................................................................................. 3
2
Purpose ................................................................................................................... 4
3
Goals and Objectives ............................................................................................ 4
4
Assumptions .......................................................................................................... 5
5
Audiences ............................................................................................................... 8
6
Communication Responsibility ........................................................................... 8
7
Communication Expectations for All IT Division Staff .................................. 8
8
Messages ............................................................................................................... 11
9
Communication Channels .................................................................................. 12
9.1
Websites ............................................................................................................... 13
9.2
Online Newsletters and RSS Feed .................................................................... 14
9.3
IT Collaboration Tool ........................................................................................ 14
9.4
Email and Voicemail ........................................................................................... 14
10
Internal IT Communication............................................................................... 16
10.1
Events and Meetings........................................................................................... 16
11
Frequency ............................................................................................................. 17
12
Communication Matrix ...................................................................................... 18
13
Communication Standards ................................................................................. 19
13.1
Style and Branding .............................................................................................. 19
13.2
Audience............................................................................................................... 20
14
General Guidelines ............................................................................................. 22
14.1
IT Emergency Messages..................................................................................... 22
14.2
IT Web Guidelines .............................................................................................. 23
14.3
WCU Electronic Mail Policy ............................................................................. 23
15
Conclusion ........................................................................................................... 24
Page 2 of 24
3. 1
Executive Summary
Developing a clear and consistent message is essential to effective communication in any
organization. This Communication Plan presents a framework for managing and
coordinating communication for Western Carolina University’s Division of Information
Technology.
Successful communication results from a committed effort by each IT unit and employee
in using the channels and guidelines presented in this plan. Such a commitment ensures that
IT provides relevant, accurate, and consistent information to its service community.
Primary areas addressed in this plan include:
Audiences to be addressed
Delegation of responsibility
Message standards
Channels to be used
Frequency of communication
Communication matrix
Communication standards and guidelines
The goal of this plan is to provide a framework for creating a consistent, customer-centric
message in all communication with campus populations, while incorporating IT’s core values
and guiding principles of the IT Strategic Plan. This plan serves as a guide for developing
tactical communication plans. It is a living document that will be modified when necessary.
Page 3 of 24
4. 2 Purpose
This Communication Plan was developed by the IT Strategic Communication Team for the
Division of Information Technology (IT) in 2013. Its purpose is to provide an overall framework
for managing and coordinating communication within the Division of IT.
This plan identifies audiences, communication channels, frequency, messages, feedback, and
standards. The framework ensures that IT provides relevant, accurate, and consistent information
while increasing awareness of information technology at Western Carolina University (WCU).
Communication is a shared responsibility in IT; it is imperative that the Information Technology
Leadership Counci (ITLC) and managers collaborate on communication within the organization. In
addition, the Director of Academic Engagement and IT Governance measures the effectiveness of
this plan and makes appropriate adjustments when necessary.
3 Goals and Objectives
The goal of this plan is to provide a framework for creating a consistent, customer-centric message
in all communication with campus populations. It promotes the dissemination of accurate
information to the campus in a manner that is professional, informative, user-friendly, and that
contributes to the ongoing culture of IT.
The following objectives support this goal:
Ensure understanding and use of communication framework.
Ensure clear and consistent communication to recipients.
Contribute to IT culture by providing multiple points of entry to information and
services.
Educate constituents on information technology.
Solicit feedback.
These goals and objectives are accomplished by:
Designing, writing, and distributing up-to-date information in support of IT.
Maintaining a standard IT identity for all written materials.
Creating announcements of new services.
Collaborating with the University Communication and Marketing offices by
providing relevant information that impacts the campus-at-large.
Participating in special events to promote IT.
Identifying IT employees who are available and willing to be guest speakers at
events and conferences.
Maintaining relevant information in all communication channels.
Maintaining procedures for executing short-term, mid-term, and ad hoc project
tactical communication plans.
Page 4 of 24
5. 4 Assumptions
The success of this plan is based on the following assumptions:
IT leadership, directors and managers and IT units participate in the
communication process using the channels and guidelines presented in this plan.
IT communicates consistent, informative messages in line with the core values and
guiding principles of the IT Strategic Plan (see below).
IT is committed to open and honest communication.
IT communication balances the needs of the campus community with the goals of
the organization.
Page 5 of 24
6. WESTERN CAROLINA UNIVERSITY
DIVISION OF INFORMATION TECHNOLOGY
STRATEGIC PLAN
Vision
The IT Division will be a national model for the strategic and effective use of information technology among
regional comprehensive universities committed to engaged teaching and learning which enables the WCU
Community to excel.
Mission
The Division of Information Technology supports the university’s mission by providing and maintaining a
secure, reliable and supportable information technology infrastructure and cultivating a knowledgeable and
effective staff to embrace WCU’s distinctive engaged learning approach, educational outreach, research,
community services, and business operations.
Our Guiding Principles (What Guides and Inspires Us)
Our integrity must be above reproach.
We comprehend the important strategic value and responsibility being placed by WCU on the
Division of Information Technology with respect to achieving the university’s teaching, learning,
research, community engagement, and business operational needs and objectives. We are committed
to enabling technology that empowers faculty, staff, and students to achieve their objectives and
augments their successes.
We are committed to excellence in IT client satisfaction and critical system stability.
We will invest in our people to meet current and planned technology changes and advancements in
alignment with WCU needs and strategic plans.
We will never be complacent and commit to continuous improvement and learning, growing, and
challenging ourselves, teams, and processes as technology and WCU objectives change and adapt.
We will work collaboratively across our teams and are committed to achieving shared goals.
We are firmly rooted in a culture of being proactive, focused on process improvement, and the
prevention of issues and recurring problems.
We are committed to transparent communication, partnership, and decision making with
stakeholders.
We will effectively and appropriately manage and communicate risk, including data security risk,
associated with academic and operational needs.
We are committed to delivering cost effective solutions and managing funds as if they were our own.
We will buy solutions before building custom systems and use hosted solutions and services that
provide the university cost effective and/or strategic advantages. We will minimize customizations
to purchased solutions.
Our Core Values
Integrity
Integrity is the foundation of IT's reputation. We earn the respect and trust of people internal and external to
the university with behavior that is honest, decent, and fair.
Page 6 of 24
7. Excellence
Excellence is the guiding principle of the way we approach our work. It requires each of us, individually and
in teams, to understand, anticipate, and surpass the expectations of our IT clients. Excellence demands
continuous improvement in all our processes, systems, and services. Our success depends on our ability to
learn from experience, to embrace change, and to achieve the full involvement of all our IT team members.
Accountability
Meeting our commitments is imperative to building trust and delivering our part in meeting WCU’s objectives
and goals. It requires us to focus first on WCU’s success and to hold ourselves and our teammates
accountable. This requires that we allocate our resources effectively and efficiently and maintain an
appropriate balance between today and the future.
Innovation
We share a deep belief in the power of technology to enhance the life and mission of our university. This is
not technology for technology’s sake; this is using technology in innovative ways to enable and achieve
WCU’s objectives and goals. We seek new levels of employee and stakeholder participation, embrace the
opportunities inherent in change, and are confident in our ability to help shape the future.
Transparency
Being transparent within the division and with our university colleagues and organizations on our plans,
priorities, metrics, projects, decision making, and budgets enhances trust and builds effective professional
relationships. Transparency demonstrates that IT is not working for IT, but truly working to enable the
mission of the university. This includes being open and frequent in our communication.
Valuing Team Members
We know that in the end, the commitment and contribution of IT team members will determine IT’s
success. Our success is enhanced by having a rich mixture of people. We believe in the fundamental dignity
of the individual and value the unique ability of each individual to contribute. We desire that every team
member have the opportunity to participate fully, to grow professionally, and to develop to his or her highest
potential
Page 7 of 24
8. 5 Audiences
IT communicates with two primary audiences: the first is internal to the division and the second
includes clients and other external constituencies.
These audiences include, but are not limited to:
IT staff and student employees
Senior leadership (faculty and staff).
Campus community (faculty, staff, and students).
External constituents (affiliates, peers in higher education, service organizations,
vendors) and the general public.
6 Communication Responsibility
The Chief Information Officer (CIO) assigns responsibility for message management within each
IT unit to the ITLC, managers, or the Director of Academic Engagement and IT Governance.
These people regularly review divisional activities and provide communication direction using the
framework outlined in this document.
The Director of Academic Engagement and IT Governance writes, reviews and edits all IT campus
messages (with the exception of global outage messages from the Help Desk) for accurate
information to the campus in a manner that is professional, informative, user-friendly, and that
contributes to the ongoing culture of IT. The IT Weekly Update from the CIO is created under the
direction of the CIO’s executive assistant and incorporates outages approved by the Change
Approval Board of which the campus needs to be aware. In cases of emergency, this responsibility
can be delegated to the manager of the Help Desk. In the event of a major outage, directors
and their designees must call the CIO immediately.
Directors are responsible for cascading messages- seeing that information from ITLC reaches all IT
employees. All department meetings must occur weekly or bi-weekly and must have an agenda,
minutes, and action items. Directors and managers are responsible for authentic performance
assessment with employees.
7 Communication Expectations for All IT Division Staff
Respond to email and voice mail within 8 working hours. If it is a simple
acknowledgement that you have seen or heard the message, when appropriate, also
include a time frame as to when you will be able to address the question more fully.
If you are on vacation or out of the office for the day, be certain your calendar
reflects this and an automatic out-of-office message is sent.
Use the appropriate technology and communications means. There are times when
Page 8 of 24
9. email is the most appropriate and times when the telephone is more appropriate.
Urgent matters require phone calls. Then there are times when the situation truly
requires face- to-face conversation. For example, if too many emails or voice mails
are going back and forth on an issue, it is time for a face- to- face conversation.
Set up your campus voice mail so callers know they have reached the correct
person. Use the Personal Verification feature to record your name.
All IT calendars must be shared with the entire IT Staff with the exception of
confidential appointments. Keep your Outlook calendar up to date, especially with
information about your not being available for ½ or more of a work day. If you are
working remotely, put that on your calendar and include a phone number that can
be used to reach you. When you are working remotely, you must be available either
by phone or virtual conferencing for meetings. Be sure that your calendar accurately
reflects your availability.
o Calendar events should correctly display your availability. Appointments,
Meetings and All Day Events have a setting option titled “Show As.” This
option reflects how the meeting appears on your calendar. The options
listed include Free, Tentative, Busy and Out of Office. Appointments and
Meetings default to the ‘Busy’ setting but All Day events default to ‘Free’.
If an All Day Event option is used to reflect vacation time, work from
home time, etc. “Show As” should reflect ‘Out of the Office’. (Please
note: Including your supervisor or fellow co-worker as an invitee on an
“All Day Event” set to show time as ‘Out of the Office’ will publish the
same status on their calendars!)
o
All staff are asked to mark meeting invitations as Accept, Tentative, or Decline. If the
reply is tentative, please update this prior to the meeting. As a courtesy to the meeting
organizer, please let him/her know if you will be attending remotely. If you have
accepted an appointment and find you are unable to attend, please change the
appointment to decline.
Follow IT Processes! Remember to follow the expectations that are part of the IT
Incident Process Manual.
o
o
o
o
o
o
o
o
o
o
Listen to the customer.
All tickets are to be logged.
Follow the process.
Document work as it is performed or as soon as possible if urgency or
workload precludes documenting work as it is performed.
Insure proper handoffs (quality control).
Focus should be on seamless incident handling from one unit to another.
Please do not “pass the buck” by re-assigning incidents to other areas
without proper consideration and research. The customer should not be
penalized by the mishandling of incidents by IT.
Professional courtesy.
Resolution focused.
Communication – internally and externally.
Act as the client’s advocate.
Page 9 of 24
10. o Reinforce the Help Desk as the IPOC (initial point of contact).
Be Proactive! Don’t wait to be asked, but open a problem ticket to alert your
colleagues to potential issues or changes made as soon as you become aware of
them. While seemingly counter-intuitive, this is especially true in crisis situations.
Give your colleagues respect and benefit of the doubt. Treat others as you wish to
be treated. While you may see an issue as a high priority, until you communicate
with the other person, you do not know what else they may be dealing with at that
moment. It may be a higher priority.
Expectations for availability: The nature of working in IT is that because our work
is so critical to the university, we must be able to contact IT staff at any time. This
is especially critical in the event of a disaster. Phone contact information (home and
cell) is required for all employees irresprective of eligibility for or receipt of Mobile
Communication Device allowance. Refer to our after hours support policy for ongoing everyday coverage. (This policy is forthcoming.
As of December 1, 2013, all IT Staff are expected to use Microsoft Lync for instant
communications. For training, please access the following resources:
Our Microsoft eLearning subscription at http://business.microsoftelearning.com/
offers two online courses in MS Lync 2013:
Course 70149: Microsoft Lync 2013 Essentials: 1 hour
Course 70135: Make the Switch to Lync 2013: 30 minutes
If you have not used our eLearning subscription before, contact Dawn Brown for the
activation and login information.
Microsoft also offers some free tutorials in Lync 2013 at:
http://office.microsoft.com/en-us/lync-help/training-courses-for-lync-2013HA104032084.aspx
For Best Practices for a Lync Meeting, click here.
IT Division staff who participated in the Lync pilot offer the following tips:
“For work from home/telecommute folks, it’s much easier for me to contact
them.
When it shows a green status, there’s a good chance that person is in their
office. I can easily ping them, ask if they have a minute to chat, and walk over to
their office for face to face if available
If a person doesn’t answer, it emails the missed conversation – and it’s nice to
get those when I see the missed call via smartphone.”
“When Lync does not run after you open it…
Open task manager, look for all applications running as
“communicator.exe”. (You will probably see several.)
Page 10 of 24
11. Delete all these entries.
Attempt to open Lync; it ought to work.
If you work on campus and off campus, using VPN..
I recommend that you manually sign in & sign off each time, rather than let Lync
automatically do that. (I have found this to be less problematic.)”
All IT staff will be required to use the project management tool, Team Dynamix
when working on projects. Training will be provided.
Each employee is expected to keep university personal Banner information up to
date. The form is found on the WCU Hub at
https://wcuhub.wcu.edu/humanresources/SitePages/Human%20Resources%20an
d%20Payroll%20Forms.aspx. Directory information must be kept current as well
and may be updated at this site: http://www.wcu.edu/contact-wcu/faculty/staffdirectory.asp
IT employees are expected to know and interact with each other. Please take
opportunities to get out of your building to interact with other IT staff members.
8 Messages
Official campus and Division of IT messages from CIO contain authoritative content and should
not be altered unless appropriate to do so. IT messages may be forwarded to other campus groups
as needed.
Effective messages are short, clearly written, and presented in a consistent manner regardless of the
media used. IT maintains communication and editorial standards that exemplify these traits and
that are as jargon free as possible.
In addition to specific content, messages increase awareness of services and support, strengthen IT
identity within the campus community, and expand information technology efforts.
The following are examples of the kinds of IT messages:
Accomplishments and project updates.
Service announcements.
Urgent service, security and system outage notices
Organization changes.
Page 11 of 24
12. 9 Communication Channels
This plan defines the following communication channels used by IT:
Website doit.wcu.edu
DoIT News and RSS feeds for the IT Training Calendar and the IT Weekly Update
WCU IT Self Service
The WCU Hub Division of IT Site
Events
Email
Voicemail
Meetings
Feedback
Blackboard Mobile
Technology Commons Facebook page, Twitter and Four Square
Coulter Faculty Commons Facebook page, Twitter and Four Square
Project Management Tool (TeamDynamixHE)
Cherwell Surveys and Change Requests
Page 12 of 24
13. 9.1
Websites
9.1.1
IT Website
IT keeps the campus well informed of policies, strategies, services and support,
projects, and general news through the divisional website. This site is updated
frequently to reflect current information and known issues. All IT messages to the
campus should end with a reference to the website h t t p : / / d o i t .w c u .e d u as well as
the IT WCU Hub site: wcuhub.wcu.edu
9.1.2
WCU IT Self-Service
WCU IT Self-Service is a web-based tool designed to offer technical support to the
campus. It provides an easy way for the campus to request IT services, find answers to
IT questions, and help resolve computing problems. WCU IT Self-Service also allows
faculty, staff and students to c heck the status of an open Incident request, add
notes to an Incident, and see any notes technicians have added. h t t p s :/ / h e lp . w c u . e d u
9.1.3 WCU Website
The WCU website links to Information Technology services from the Faculty and
Staff link by locating the Computing section. It serves as a resource for
information of high value to the campus community. http://www.wcu.edu
9.1.4 My Cat
My Cat allows students, faculty, and staff secure access to self-service and
associated campus links including registration and student records, student billing
and account information, financial aid, grades, class schedule, enrollment, course
catalogs, and class rosters. In addition, My Cat provides campus quick links and
campus messages. My Cat is owned by the Banner Users Group, led by the
Registrar. http://mycat.wcu.edu
9.1.5 Blackboard
Resources for instructors and students are located within the Blackboard LMS environment
under tabs indicated for these purposes. Announcements, updates, outages, and other
information that affects Blackboard users appear regularly on both the Blackboard home
page (blackboard.wcu.edu) and within the Blackboard environment. Blackboard offers
communication channels through various tools, including announcements, information tabs,
and Blackboard informational module.
Page 13 of 24
14. 9.2
Online Newsletters and RSS Feed
9.2.1 IT Online Newsletter DoIT News
The IT online newsletter DoIT News engages the campus in discussion about IT news and
events, key accomplishments, information about services and technology, as well as updates
on major IT projects. The newsletter is dynamic and updated frequently. The newsletter is
web-based and reaches multiple audiences with Internet access. IT staff are encouraged to
submit articles for publication to the Director of Academic Engagement and IT
Governance.
9.2.2 RSS Feed
Really Simple Syndication (RSS) feed is an additional format used to publish the DoIT
News.
9.2.3 The Reporter Online Newsletter
The Reporter presents campus news every other week to faculty and staff. IT
submits articles to The Reporter on a project- or announcement-needed basis to
communicate to the broader campus community audience.
9.2.4 CFC Newsletter
The Coulter Faculty Commons newsletter is sent weekly to faculty and staff in the Division
of IT, Academic Affairs, and Student Affairs and to selected community partners. It contains
news, information, updates, and opportunities related to teaching and learning, including
instructional technology. CFC newsletters are archived and available at sandbox.wcu.edu.
9.3
IT Collaboration Tool
IT’s collaboration tool for the university is the WCU HUB, a SharePoint based intranet
found at https://wcuhub.wcu.edu/SitePages/Home.aspx for WCU faculty and staff to
share to share information, and documents within a work group, service team, or unit. The Division
of IT maintains its own SharePoint site with information for the campus such as IT policies.
9.4
Email and Voicemail
9.4.1 Weekly Update
In order to communicate with the campus in the most efficient manner possible, The IT
Weekly Update is IT’s official communication for non-emergency information. This
consolidated email is sent on Mondays to the campus from the CIO. It features upcoming
outages, training opportunities and important announcements. It may also feature links to
stories in the DoIT News. A separate weekly update may be sent by the CIO to the
Division staff on Monday containing announcements of importance only to the Division.
Page 14 of 24
15. 9.4.2 Broadcast Email
Broadcast email is a mechanism for distributing important messages and/or
announcements to WCU faculty, staff, and students and is rarely used. All broadcast
email to the campus from IT must be IT technology or service related. The CIO
approves and sends all of these with the e xception of Global Proble m
emails from the IT Help Desk.(See university policy 93, Electronic Mail:
http://www.wcu.edu/about -wcu/leadership/office -of-thechancellor/university -policies/numerical -index/university -policy -93.asp)
9.4.3 Service and Time-Sensitive Announcements
Service announcements and other time-sensitive messages, including outage notices, are
broadcasted through email from the IT Help Desk on an as-needed basis. Each message
directs the audience to the IT website at http://doit.wcu.edu and the IT WCU Hub
site as the primary sources of information. My Cat is used as well, especially for
students.
9.4.4 IT Mailing Lists
IT has several mailing lists or sources that provide an additional level of communication
internally and externally to the division. The Active Directory global address book contains
distribution lists for groups all across campus. IT staff may use these lists to communicate
directly with a specific IT or other campus division, college, department or unit. For any
technical issue, please start with the Help Desk first.
These lists are maintained and managed by the Active Directory and Messaging Manager
within the Application and Systems unit. The Cherwell Service Desk system contains
business processes that communicate alerts on system, network or application issues to the
entire IT Division upon problem discovery and resolution. Cherwell administrators and
the incident process owner are responsible for ensuring this line of communication is
available and the text included is informational and understandable.
Mailing lists specific to the IT Division include:
SysOps@email.wcu.edu
o ERPServices@email.wcu.edu
o helpdesk@email.wcu.edu
o integrationservices@email.wcu.edu
o operations@email.wcu.edu
o sysengineering@email.wcu.edu
o webteam@email.wcu.edu
CoulterFacultyCommons@email.wcu.edu
ITManagers@email.wcu.edu
ITLC@email.wcu.edu
AcademicEngagementandITGovernance@email.wcu.edu
Page 15 of 24
16. InstructionalTechnologyandDesktopServices@email.wcu.edu
Networking@email.wcu.edu
9.4.5 Emergency Notification Systems
The following systems are part of the WCU Emergency Notification System. These systems
are only used in case of an emergency. The systems include:
Cat Tracker
Cat Tracker is a system that allows students, faculty, staff and parents to receive a message
in case of emergency. Messages can be sent to e-mail, cell phone or home phone. Sign up
for Cat Tracker today!
Alertus Desktop Popup Software
Campus Computer Emergency Notification: This is a system that allows WCU-owned
computers connected to the campus network to receive full-screen alert messages from the
Police & Emergency Management Department. These messages can be customized to suit
the situation and allow near-instant communication.
IP Intercom
In the event of an emergency, the IP Intercom system in WCU standardized classrooms
allows WCU Emergency personnel to broadcast distributed messages to the classrooms.
This messages can be grouped by buildings, floors, or any other combination. Public Safety
can have their team send out a pre-recorded, situation specific message, or broadcast a live
message based upon the need of the exact situation at hand.
10 Internal IT Communication
10.1 Events and Meetings
10.1.1 General Staff Meeting
All staff members of the IT Division meet every other month to discuss key technology
issues and receive announcements from the CIO. Every quarter, IT presents the Triple P
Award to an outstanding member of the staff who exemplifies excellent work through
either being proactive, contributing to process, or preventing problems. All IT staff are
expected to attend unless excused by a director or manager.
10.1.2 IT Brown Bag with the CIO and Special Events
IT Brown Bags with the CIO offer an agenda-free opportunity for randomly
Page 16 of 24
17. selected IT staff to meet once a month with the CIO. Every spring, IT holds its
traditional picnic to which IT staff and their families are invited. IT staff gather before the
Thanksgiving Holiday to enjoy a potluck before the General Staff meeting. In the fall, the
Division honors the Quarterly Triple P Award winners and the Yearly winner with a special
reception.
10.1.3 Other IT Meetings
IT meetings with the CIO and the entire division occur every other month. The
CIO meets with a department on the off month. The CIO meets weekly with the
Information Technology Leadership Council (ITLC) and monthly, the IT
Managers Group joins the ITLC following a project review meetings.
10.1.4 IT Division Announcements
Official IT announcements and other time-sensitive messages for the IT staff are
broadcasted through email to the entire division on an as-needed basis from the CIO, the
IT Help Desk, and the Director of Academic Engagement and IT Governance. In addition,
the CIO sends an IT Weekly update designed just for IT staff.
10.1.5 Feedback
Closure of IT incidents and service requests provide an opportunity for client feedback.
Feedback is gathered via an email request for overall ticket satisfaction or through the HDI
CSI survey request. Negative responses are forwarded to the IT Quality Manager and the
IT Help Desk Manager for review and investigation purposes. This is valuable information
which assists IT in determining additional training needs; reviewing internal processes for
creation, improvement, and modification; identifying customer service issues along with any
communication improvements or modifications that may be necessary.
11 Frequency
Communication is regular and as needed to ensure that all audiences are aware of critical and
important information on a timely basis. For example, the IT website, the IT WCU Hub site and
IT Request ticket system are updated regularly to communicate the most current service
information; DoIT News is published as needed. The IT Weekly Update from the CIO is sent every
Monday.
Page 17 of 24
18. 12 Communication Matrix
The Communication Matrix serves as a guide to the “who,” “what,” and “when” of
communication. This matrix displays a specific audience, channels, and delivery
timetable.
Audience
All IT Staff
Channel
Frequency
IT website
Updated as needed
DoIT News & IT Weekly Update
Updated as needed each Monday
IT WCU Hub site
Updated as needed
Brown Bag with CIO
Monthly
Division meeting
Every other month
IT request ticket system
As needed
IT Division staff, Academic Affairs, Student
Affairs, Community Partners (selected)
Coulter Faculty Commons Newsletter
Weekly (except major holidays)
IT – CIO
Email
Weekly
Meetings
Every other month
Feedback
Monthly
Email
As needed
Meetings
Weekly
Feedback
As needed
Email
As needed
Meetings
Once a month with managers
Feedback
As needed
Email
As needed
Meetings
As needed
Governance committees, IT Campus Liaisons,
IT/Facilities Management
Meetings
Monthly
Ongoing Projects with Human Resources &
Finance
Meetings
Every two weeks as needed
Faculty and Staff
IT Weekly Update
Weekly
Email (broadcast email)
As needed
IT website
Updated as needed
IT WCU Hub Site
Updated as needed
DoIT News
As needed
IT Weekly Update
Weekly as needed
Email (broadcast email)
As needed
IT Website
Updated as needed
My Cat
Updated as needed
Blackboard
Updated as needed
Extended Community (alumni, prospects, donors,
parents, vendors)
IT website
Updated as needed
All IT Staff and project requestors
Team Dynamix HE
Updated as needed
IT Directors
IT Managers
Chancellor, Executive Council
Students
Page 18 of 24
19. 13 Communication Standards
A succinct, focused communication aims to clarify a few points rather than to cover an
unlimited range of issues. The following five questions help determine what to include in a
message and what to forego:
1.
2.
3.
4.
5.
What is the purpose?
Who is the audience?
When does it need to go out?
What is the most direct way to say it?
What action is required on the part of the reader?
13.1 Style and Branding
Style is the approach an organization uses to present its image through the written word. It
is a set of guidelines that standardize the use of terminology and grammar to make messages
and materials the most applicable to all audiences. This plan also supports and recommends
that the IT Division use the WCU Style Manual specific branding, web and visual guidelines,
and project and general templates. The WCU Style Manual is available online at:
http://www.wcu.edu/WebFiles/PDFs/WCU_stylemanual.pdf
13.1.1 Templates Using the WCU Brand
This plan supports and recommends the use of the following templates to reinforce the
WCU brand.
PowerPoint Presentation
Memo (fillable PDF form)
Memo without lines (fillable PDF form)
Fax (fillable PDF form)
IT letterhead is used for official written communication and may be obtained
from the CIO’s executive assistant.
Page 19 of 24
20. 13.2 Audience
13.2.1 Faculty
Faculty communications should reflect academic standards of professional
writing.
Address faculty by title and last name (if unsure, Professor [insert
name] should be the default).
Avoid the use of colloquial expressions, slang, emoticons, internet
slang or acronyms.
Spell out acronyms on first usage, and then use abbreviation for
each subsequent usage.
Spell and grammar check, or use other methods to ensure quality
of language usage.
If uncertain, it is generally advisable to write more formally rather
than less.
Faculty Communications should reflect sensitivity to the academic calendar.
Faculty do not always work set schedules and so response times
vary accordingly.
Class sessions extend past regular business hours, including nights
and weekends.
Faculty members are usually busiest during the beginning and end
of each semester.
Other calendar items that affect faculty communication: academic
breaks, Advising Day, exam weeks, and faculty evaluation cycles.
Faculty Communications should be as efficient as possible.
Faculty workloads keep them very busy. Email and other
communications should be short and informative.
Faculty members receive a great deal of email. If possible, keep
communications with faculty to the fewest number possible.
Faculty members expect to spend as little time as possible
searching for the information that they need.
13.2.2 Staff
Staff communications should reflect academic standards of professional writing.
Some staff have doctorates. Address staff by title and last name.
Avoid the use of colloquial expressions, slang, emoticons, internet
slang or acronyms.
Spell out acronyms on first usage, and then use abbreviation for
each subsequent usage.
Spell and grammar check, or use other methods to ensure quality
of language usage.
Page 20 of 24
21.
If uncertain, it is generally advisable to write more formally rather
than less.
Staff Communications should be as efficient as possible.
Staff workloads keep them very busy. Email and other
communications should be short and informative.
Staff members receive a great deal of email. If possible, keep
communications with staff to the fewest number possible.
Staff members expect to spend as little time as possible searching
for the information that they need.
13.2.3 Student
Student Communications should reflect academic standards of professional
writing with an engaging tone.
Avoid the use of colloquial expressions, slang, emoticons, internet
sland or acronyms.
Spell out acronyms on first usage, and then use abbreviations for
each subsequent usage.
Spell and grammar check, or use other methods to ensure quality
of language usage.
Remember that students should be addressed as adults.
Student Communications should reflect sensitivity to the academic calendar.
Students are not always available at set schedules and so response
times vary accordingly.
Class sessions extend past regular business hours, including nights
and weekends.
Students are usually busiest during the beginning and end of each
semester.
Other calendar items that affect student communication:
academic breaks, Advising Day, and exam weeks.
Student Communications should be as efficient as possible.
Student workloads keep them very busy. Email and other
communications should be short and informative.
Students may receive a great deal of email. If possible, keep
communications with student to the fewest number possible.
Students expect to spend as little time as possible searching for
the information that they need.
Page 21 of 24
22. 14 General Guidelines
Each communication fits the technical level of the intended audience, avoiding acronyms and
definitions that may not be clear. Communication focuses on conveying a positive message
and identifying a knowledgeable resource for follow up or questions. Follow the
communication standards outlined in this plan including the WCU templates for reports,
memos, and presentations.
This plan suggests that all IT campus messages, including service announcements, are approved
and reviewed by the communication manager before distribution.
General guidelines for communicating with the groups identified in this plan are as follows:
Establish a clear, consistent, and easily recognizable message
State any necessary action at the beginning of each message
Direct message to the audience
Include unit name, contact information, closing statement, and provide a link to the IT
website
Educate about IT services when appropriate
Use all appropriate and available communication channels
Ensure timely and meaningful communication
Listen and act on feedback
14.1 IT Emergency Messages
As determined by the Chief Information Officer and the IT Leadership Council as required,
emergency messages that relate to IT technology and services are transmitted via broadcast
email to the entire campus community as needed. The Help Desk manager is responsible for
managing all emergency messages distributed by t h e IT Help Desk to campus.
General format for communicating an emergency message:
From: IT Help Desk
Sent:
Subject: Unscheduled Outage:
Services:
Alert:
Reason:
Impact:
Date/Time:
Please contact the IT Help Desk for any questions or concerns.
Thank you,
IT Help Desk
doit.wcu.edu
227-7487 (local)
866-928-7487 (toll free)
Available weekdays 8 a.m.-5 p.m. EST
As a reminder, IT will never ask you to confirm account information, such as username and password, through email.
Page 22 of 24
23. General format for communicating t h e r e s o l u t i o n o f an emergency message:
From: IT Help Desk
Sent:
Subject: RESTORED:
Services:
Resolution State:
Date/Time:
Please contact the IT Help Desk for any questions or concerns.
Thank you,
IT Help Desk
doit.wcu.edu
227-7487 (local)
866-928-7487 (toll free)
Available weekdays 8 a.m.-5 p.m. EST
As a reminder, IT will never ask you to confirm account information, such as username and password, through email.
14.2 IT Web Guidelines
Website guidelines and campus template design are established for web pages within IT in
accordance with WC U We bsite Standa rds and Guide line s. The campus standard web
templates are used for all IT web pages.
These guidelines are found at the following link:
http://www.wcu.edu/WebFiles/PDFs/WCU_Website_Standards_Guidelines_MASTER.pdf
For assistance creating IT web pages, contact Web Services.
14.3 WCU Electronic Mail Policy Policy 93
University electronic mail accounts are provided and supported by the State of North Carolina to
support the missions of the University.
The purpose of this policy is to ensure the appropriate use of the University’s Electronic Mail
System by its students, faculty, and staff. The Electronic Mail System is provided by the University
as one of its primary means of official communication. Users have the responsibility to use these
resources in an efficient, effective, ethical, and lawful manner. Use of the University’s electronic mail
system evidences the user’s agreement to be bound by this Policy. Violations of this Policy may
result in restriction of access to the University email system and/or other appropriate disciplinary
action.
The policy may be found at this link: http://www.wcu.edu/25376.asp
Page 23 of 24
24. Conclusion
The Communication Plan serves as an overall framework for communication within the
Division of IT. Successful communication results from a committed effort from each IT staff
member in using the channels and guidelines presented in this plan. Such a commitment
ensures that IT provides relevant, accurate, and consistent information to its service
community. This is a living document that will change to meet the needs of the university and
the Division and will be reviewed every year.
Page 24 of 24