08:09 AM
Lee Badman
Lee Badman
Connect Directly

When Colleges Use Twitter As Help Desk

Education IT leaders, your users are turning to Twitter to complain about the campus network and IT services. Are you responding effectively?

Educational 'Technology' Across the Ages
Educational 'Technology' Across the Ages
(click image for larger view and for slideshow)
Perhaps it's a generational thing, or maybe it's inevitable -- social media is changing the traditional help desk model in higher education.

You might not want to accept it, or perhaps you choose to cling to what has worked for years. That doesn't matter, because your customers are evolving how they cry out for help. If those cries go unheeded, everything -- from the credibility of the help desk operation to the metrics on tickets closed over a specific period -- becomes invalid.

So what's the change we're talking about? It's Twitter. In 140 characters or less, students are demanding assistance, crying for help, asking general technology questions and saying very unkind things about the IT organization that likely (hopefully) have no basis in truth. It's going on 24 hours a day, in increasing volume. It's what they do, and whether the "official" help desk plays along matters little.

Students can work themselves into froth when their devices don't seem to work properly on the campus network. Or they don't see as many "bars" on their wireless client devices as they think they should. Or when everyone in an auditorium has their wireless connectivity impacted by someone's personal hotspot. Or when an iOS update screws up something in their iPhone. It's all the network's fault, and you are getting repeated black eyes delivered by Twitter. Unless you jump in and meet fire with fire, and tweet with tweet, it only gets worse. Given that on a healthy network, almost 100% of perceived problems are individual client issues, you owe it your network and clients to engage in every way possible.

[ Want to know why Twitter's new security may not help large organizations prevent account takeovers? Read Twitter's Two-Factor Authentication: 5 Reasons To Avoid. ]

Sure, many universities are now savvy to spreading their brand around the Internet via Twitter. It's common for schools to have Twitter accounts for everything from student organizations to the public safety department, but these accounts typically push event-type information to followers and are not used as two-way conduits to ask for assistance. When it comes to client support, it's a whole different paradigm.

Those of us who have embraced social media professionally see the change in what students are willing to do to get help. They don't want to come to the counter. They refuse to fill out forms. What they want is to be able to tweet "the network sucks tonight and I have an important project to do!" from a fake name at an undisclosed location, and have it be magically acted on by the 24/7 staff of mind-readers that we all keep on hand for these cases. The more these laments go unanswered, the nastier the beating that our organizational reputation takes as the Twittersphere gets populated with negative snipes. And often we know nothing about it.

So how do we reconcile the legacy help desk ticket methodology of Web forms, phone calls and personal visits with the "help me now!" expectations of tweeters? Every school is different, so there's no template to recommend. At the same time, there are common-sense steps that we should all consider:

-- Create a help desk-specific Twitter account, publicize it and tap into what your clients are saying.

-- Explore options like HootSuite to let multiple users share the same account.

-- Even with shared account, have staff end each Tweet with their initials, or a two-digit identifier that tells managers who said what in the Twitter logs.

-- Take no offense at the sometimes biting messages that come in, as frustration can make users pretty crabby.

-- Set the expectations: let followers know that Twitter does not replace the help desk, the department is not open for business 24/7, but that all Tweets will be read.

-- Be empathetic and friendly in responses, but set limits on how far your team can go trying to work with clients via Twitter on specific problems.

-- Problems that can't be easily solved in a quick exchange will warrant a visit -- be consistent with that message and make the in-person visit process as painless as possible.

-- Do follow-ups to every late-night "I hate the network" squawk, but don't be surprised when many go unanswered.

-- Post maintenance notifications, tips and hints, and relevant client-related news (bug discovered in iOS, Win 8 known issue, etc.) occasionally, but without being so chatty that followers tune out.

-- Put definite limits on how the Twitter account can be used, stick with them and make sure that the help desk is in line with overall organizational Twitter guidelines.

Expect to evolve the Twitter-help desk pairing after you jump in, as it won't take long to find what's working and what's not. But jump in you must, or you risk becoming irrelevant.

Remember that Twitter is social media, so don't be surprised to see clients helping other clients via Twitter once you've helped them. When you get to that point, you'll know you're doing it right.

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
David F. Carr
David F. Carr,
User Rank: Apprentice
6/4/2013 | 1:53:24 PM
re: When Colleges Use Twitter As Help Desk
Is there a need to provide similar support on Facebook?
User Rank: Apprentice
6/4/2013 | 3:03:41 PM
re: When Colleges Use Twitter As Help Desk
Is a good, natural question- not sure I have a clean answer. As a minimum, a Facebook presence should be there for those who go looking for it, but from there is a matter of philosophy and ambition on what you use it for. Certainly could provide basic reflection of key information like how to get more info on services, hours of operation, etc, or could go nuts and and make it an actual part of the support operation. Regardless of how far you go with it, it needs to stay fresh and be done as professionally as possible. Is one of those paradigms where querying peer institutions of like size and staffing for what works and doesn't can save months of learning curve.
David F. Carr
David F. Carr,
User Rank: Apprentice
6/5/2013 | 3:06:34 PM
re: When Colleges Use Twitter As Help Desk
Tangential example from a university setting was a Jewish fraternity organization that built its student engagement program on social media using Facebook, including a Facebook app integrated with SugarCRM for logging contacts with prospective recruits.
Cara Latham
Cara Latham,
User Rank: Apprentice
6/17/2013 | 12:59:06 PM
re: When Colleges Use Twitter As Help Desk
I think the approach outlined here definitely allows universities and colleges to utilize Twitter to aid/supplement their Help Desk operations without actually replacing the Help Desk. Making that clear distinction, as noted in the article, is crucial to balancing the two functions.
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.