The worldwide demand for higher education and lifelong learning has never been greater. Colleges and universities around the globe need to scale up their offerings to cater to a mass influx of students, for whom a degree is their passport to the 21st-century workforce.
You may have heard that the most popular show in the world during the 1990s was the bathing-beauty vehicle "Baywatch," but the current leader may come as a surprise.
The annual Educause conference is the premier teaching and technology showcase for higher education, and this year's expo, held in Dallas in October, was no exception.
You might call 2006 the year of the redesign for institutions of higher education. Duke University (N.C.), Brown University, Ball State University (Ind.), Humboldt State University (Calif.), Virginia Tech, and Centenary College (N.J.) are among the group of IHEs who redesigned their sites. Over the past few months, many other new website looks have been announced or unveiled.
Expect some opposition and criticism from staff, faculty, students, alumni, and even donors for changing "their" website.
If you haven't redesigned your site yet, chances are that process will come your way soon. Selected from the suggestions of a few higher ed web professionals behind recent successful website redesigns, the following tips should help in the endeavor.
Don't embark on a website redesign only to keep up with the neighbors. You should expect some vocal students, upset faculty and staff members, angry alumni, and even puzzled donors to criticize, oppose, and fight you for messing with "their" website. That's why you need to come up with quantifiable goals for your redesign. "Clearly define the purpose of the redesign, and put it in writing," advises Andrea Arbogast, web manager at Humboldt. She rolled out a redesign this August. "I have found a short document with the redesign's purpose to be invaluable. There is usually a very concrete reason for taking on a redesign, and being able to articulate it easily has saved me a lot of grief," adds Arbogast.
You wouldn't renovate your house without researching the city code, thinking about the needs of your family, or browsing magazines for inspiration. So, do your homework as well before jumping into a web redesign project. Find out as much as possible about the current state of your website by analyzing web traffic data and feedback from users. Also take the time to learn more about your target audiences' needs and expectations by setting up online surveys, focus groups, face-to-face interviews, or usability tests.
"Before we began any work on site architecture or design concepts, we devoted several months to research," explains Michael Dame, director of Web Communications at Virginia Tech. "We interviewed members of our primary audiences-students, faculty, staff, parents, and alumni-to find out how they use the university's website. Our findings informed later decisions regarding site architecture, navigation, and design."
If you plan to tear down the walls of your website, make sure you rebuild a compliant and functional web presence for your institution. Technologies, standards, and user expectations have changed a lot over the past few years. Section 508 of the Americans with Disabilities Act defines ground rules to assure your website is accessible to disabled users. Make sure your redesign is compliant.
A website redesign is a project and should be managed as such with a defined scope, a given budget, and a defined set of resources. Set up a realistic schedule and manage expectations. Aggressive timelines will force you to cut corners or bypass necessary consultation. "You need at least one person who is a wizard at organizing people, details, and workflow," says Lisa Cameron-Norfleet, program manager of developer relations for the Office of Web Communications at Cornell University, who worked on its 2004 web redesign.
A website redesign is the best time for a content audit. Once you know more about your users' expectations and needs, start to review and reorganize your website content. After auditing your web content, you'll be able to assess the gaps between the current state of your website and the information architecture that will best serve your users.
Any change in the design of your institution's website will get noticed. That's why it's so important to get as much buy-in as you can before and during the process. "Real transparency is key," says Ben Riseling, web operations manager at Duke. "Was this audience group consulted?" is the question that he heard repeated the most.
While communication and buy-in are critical to the success of these projects, redesigns by democracy or by committee should be avoided. They don't work most of the time. "Our redesign blog was a crucial tool in showing our audience what was in the works and establishing a conversation about the new site. You have to be careful to set the tone of such a blog, though. We made sure it was very clear that we would listen to all ideas, but that the site was not being built by a democracy," says Cameron-Norfleet.
Make sure that the new design works by having a few members of your target audiences test your ideas and layouts as soon as possible. Test your paper or interactive wireframes (the documents showing the information skeleton of your pages) before picking the fonts or the photos. Try to launch your redesigned home page in private or public beta first. "About six weeks before launch, we posted a 'sneak preview' section on the university's website to inform and solicit feedback. And, a month before launch, we opened up the staging site to all faculty, staff, and students for testing and further feedback," says Dame.
If you plan to fix your website information architecture, navigation, design, and content, you might want to kill two birds with one stone and couple your redesign with the implementation of a web content management system. "Getting a site on a good CMS makes it easier to maintain and also enables it to seamlessly syndicate content," says Riseling. Beyond the power of syndicated content, a good CMS will make your next redesign implementation a breeze by separating content from design. Next time around, you will be able to focus only on redesigning the templates used by the application to produce on the fly the thousand of pages composing your website.
When it comes to redesign, bigger isn't always better. Major overhauls often generate a lot of resistance from constituents and can even upset your most fervent users. That's why some major names on the web, such as Amazon and eBay, don't redesign their websites anymore. They prefer to roll out any major changes slowly. Small changes prevent these companies from disorienting or losing their customers. Another benefit of the incremental approach lies in the eyes of your budget holder: Most of the time, small changes can be implemented quickly by your team and cost less.
If you're looking for more tips, you can read all the information and advice gathered in preparation for this column at www.collegewebeditor.com/redesign.
The internet and e-mail are a blessing and curse. Both improve communication and access to information; they are the de facto communication and entertainment tools of modern life.
But when personal communication and entertainment cross into professional hours, the employer can suffer. Online shopping, gaming, and chatting are fairly innocuous ways to waste time.
Other network-based activities can be more problematic for colleges and universities. For example, if faculty or staff use the university network to gamble, download music, or view child pornography, it can harm the university's reputation or possibly result in a lawsuit. Any of the scenarios cost time and money. At the same time, higher ed operates with a sense of freedom unmatched in the corporate and K-12 arenas.
Objectionable content to the corporate or K-12 world can be considered academic research.
The business world has tapped into software solutions to help curb online behavior and catch those who fail to abide by policy. The Center for Business Ethics at Bentley College (Mass.) says 90 percent of employers observe electronic behavior. Virtual oversight can go several steps further. More than three-quarters of employers watch web surfing. "About one-third of large commercial enterprises monitor [or sift through] staff e-mail," says Craig Carpenter, senior director of corporate marketing with Mirapoint, an IT security company.
Higher ed has been slow to embrace high-tech surveillance tools. Monte Robertson, president and CEO of Software Security Solutions, surveyed the company's higher education customers and found that none scanned e-mail for content. Carpenter hypothesizes that higher ed is reluctant to deploy surveillance software because it smacks of censorship. Academic freedom is a right in the university environment, explains James Hammond, vice president of Information Technology at Winthrop University (S.C.).
Content that is objectionable in the corporate or K-12 environment can be considered academic research. For example, a faculty member may view child pornography websites to conduct research for a psychology or sociology course.
"Higher ed cannot draw too many lines in the sand because it encroaches on academic freedom," continues Hammond. Academic freedom can become a rallying cry for monitoring foes. The University of Southern Mississippi endured a firestorm when its president directed a lawyer to monitor some faculty e-mails during an internal investigation.
The ideal solution balances academic freedom and protection. Most colleges and universities do require faculty and staff to agree to policies about e-mail use. The typical policy specifies that the employee does not own e-mails and permits the employer to read e-mails.
At this point, however, few universities enforce these policies with monitoring software, says Carpenter. Is higher ed flirting with danger by not using surveillance solutions? "Absolutely," opines Carpenter. But the tide could turn as universities wrangle with compliance issues.
One reason behind the near-universal business use of surveillance technology is the need for regulatory compliance. Similarly, universities could begin to adopt technology to boost compliance. FERPA (Family Education Rights Protection Act) will influence universities, predicts Carpenter. "Universities have not gotten their arms around FERPA and need to develop an understanding of its requirements," he says.
Initially passed in 1974, FERPA protects the privacy of student information such as health records and grades. Surveillance technology could be used to identify FERPA breaches. Winthrop currently complies with FERPA through policies that describe how to handle and release sensitive information. In addition, software "flags" alert users to sensitive information and tell any employee how to view the information.
Similarly, the post-9/11 SEVIS (Student and Exchange Visitor Information System) requires all colleges and universities receiving government funding to monitor foreign students' e-mail communications and transmit student information to the Department of Homeland Security. Surveillance programs could help colleges comply with SEVIS by tracking and organizing online communication and activities, says Chronicle Solutions Chief Operating Officer Sophie Pibouin.
But sweeping changes and a draconian monitoring system may not fly at most colleges and universities. Instead, higher ed may be best served by adapting surveillance solutions and developing policies to meet their unique needs rather than simply mirroring corporate practices.
Colleges and universities do have a number of options for monitoring e-mail and internet use. In fact, some may already own options. A number of higher ed customers, for example, rely on Mirapoint's Email Server and Edge Security Appliance for protection against spam, viruses, worms, and hacker attacks. Those features comprise 95 percent of the product's functionality. The other 5 percent? E-mail surveillance. But few higher ed users opt to turn on the surveillance functionality.
One plus of the surveillance system is that it can be used on an as-needed basis. Winthrop University relies on Mirapoint's Email Server and Email Security Gateway for multiple purposes, including monitoring ingoing and outgoing mail for spam and viruses. University policy defines e-mail as private except in the case of an ongoing legal or internal policy investigation.
At Winthrop, if campus police present a valid request or an employee is suspected of violating policy, the university maintains the right to wiretap a mailbox. For example, if a full-time faculty member begins teaching at another university without securing appropriate approval, the university could launch an investigation and tap the employee's inbox. The university might turn on surveillance functionality if a faculty or staff member is engaged in activities that conflict with the university's mission.
"We monitor for investigative purposes only."- James Hammond, Winthrop University
In addition to e-mail monitoring, the system can create rules to scan for specific objectionable words or block attachments or certain addresses. "We don't monitor e-mail as a preventative measure, nor do we regulate objectionable words or contents. We monitor for investigative purposes only," says Hammond. The combination of policy and technology is a good fit for the university's needs.
Another software option is Chronicle Solutions' netReplay system. The company recently launched the network content recorder. The system plugs onto the network behind the firewall and can record all user digital communication, including e-mail, web pages, and chat messages. The netReplay system can also categorize communication to streamline network monitoring. For example, the system administrator can define policies and set the device to send an alert if a user accesses a child pornography site.
Some systems, such as Mirapoint's Email Server and Edge Security Appliance, wrap monitoring functionality into a larger package. Security, mail hardware, software, and support cost approximately $1.25 monthly for each user at a site with 10,000 users. Others, like netReplay, represent a new system. Its costs include the price of the appliance, a fee per user monitored, and an annual maintenance fee. Chronicle Solutions, a provider of network monitoring solutions, says it extends a significant higher education discount.
Employee surveillance can be a touchy subject. Poorly defined and communicated policies could have a negative impact on employee relations or lead a to a media fiasco. One need only recall the recent Hewlett-Packard corporate scandal to imagine the media and public relations nightmare that can occur in the wake of a poorly conceived surveillance program.
And like any technology, surveillance systems are not perfect. It is possible to increase the odds of a successful deployment. Insiders offer the following advice about optimizing a monitoring system:
Make sure surveillance tools are available. "Understand the local monitoring policy, or in the absence of a policy, make one," says Hammond.
Don't take faculty and staff by surprise, says Pibouin. The university needs to clearly define and communicate monitoring policies. It helps to market the system as a means of protecting employees and the university's reputation.
Be sure to research the system's accuracy and reliability, says Robertson. Calculate all costs, and investigate legal ramifications and requirements.
An online monitoring or surveillance policy that outlines the rights of the university is a 21st-century essential. Colleges and universities can tap into fairly new software solutions to support the policy and simplify the process of sifting through online communication if a need arises. The combination of a well-articulated policy and carefully deployed software need not impinge on academic freedom and can protect the university, staff, and students-without breaking the bank.
At Lamar University, Beaumont, Texas, the importance of enhancing e-learning services was heightened after the devastating effects of Hurricane Rita, which hit the Houston and Beaumont areas in September 2005. To date, the university has spent more than $30 million in recovery efforts.