08:09 AM
Lee Badman
Lee Badman
Connect Directly

When Colleges Use Twitter As Help Desk

Education IT leaders, your users are turning to Twitter to complain about the campus network and IT services. Are you responding effectively?

Educational 'Technology' Across the Ages
Educational 'Technology' Across the Ages
(click image for larger view and for slideshow)
Perhaps it's a generational thing, or maybe it's inevitable -- social media is changing the traditional help desk model in higher education.

You might not want to accept it, or perhaps you choose to cling to what has worked for years. That doesn't matter, because your customers are evolving how they cry out for help. If those cries go unheeded, everything -- from the credibility of the help desk operation to the metrics on tickets closed over a specific period -- becomes invalid.

So what's the change we're talking about? It's Twitter. In 140 characters or less, students are demanding assistance, crying for help, asking general technology questions and saying very unkind things about the IT organization that likely (hopefully) have no basis in truth. It's going on 24 hours a day, in increasing volume. It's what they do, and whether the "official" help desk plays along matters little.

Students can work themselves into froth when their devices don't seem to work properly on the campus network. Or they don't see as many "bars" on their wireless client devices as they think they should. Or when everyone in an auditorium has their wireless connectivity impacted by someone's personal hotspot. Or when an iOS update screws up something in their iPhone. It's all the network's fault, and you are getting repeated black eyes delivered by Twitter. Unless you jump in and meet fire with fire, and tweet with tweet, it only gets worse. Given that on a healthy network, almost 100% of perceived problems are individual client issues, you owe it your network and clients to engage in every way possible.

[ Want to know why Twitter's new security may not help large organizations prevent account takeovers? Read Twitter's Two-Factor Authentication: 5 Reasons To Avoid. ]

Sure, many universities are now savvy to spreading their brand around the Internet via Twitter. It's common for schools to have Twitter accounts for everything from student organizations to the public safety department, but these accounts typically push event-type information to followers and are not used as two-way conduits to ask for assistance. When it comes to client support, it's a whole different paradigm.

Those of us who have embraced social media professionally see the change in what students are willing to do to get help. They don't want to come to the counter. They refuse to fill out forms. What they want is to be able to tweet "the network sucks tonight and I have an important project to do!" from a fake name at an undisclosed location, and have it be magically acted on by the 24/7 staff of mind-readers that we all keep on hand for these cases. The more these laments go unanswered, the nastier the beating that our organizational reputation takes as the Twittersphere gets populated with negative snipes. And often we know nothing about it.

So how do we reconcile the legacy help desk ticket methodology of Web forms, phone calls and personal visits with the "help me now!" expectations of tweeters? Every school is different, so there's no template to recommend. At the same time, there are common-sense steps that we should all consider:

-- Create a help desk-specific Twitter account, publicize it and tap into what your clients are saying.

-- Explore options like HootSuite to let multiple users share the same account.

-- Even with shared account, have staff end each Tweet with their initials, or a two-digit identifier that tells managers who said what in the Twitter logs.

-- Take no offense at the sometimes biting messages that come in, as frustration can make users pretty crabby.

-- Set the expectations: let followers know that Twitter does not replace the help desk, the department is not open for business 24/7, but that all Tweets will be read.

-- Be empathetic and friendly in responses, but set limits on how far your team can go trying to work with clients via Twitter on specific problems.

-- Problems that can't be easily solved in a quick exchange will warrant a visit -- be consistent with that message and make the in-person visit process as painless as possible.

-- Do follow-ups to every late-night "I hate the network" squawk, but don't be surprised when many go unanswered.

-- Post maintenance notifications, tips and hints, and relevant client-related news (bug discovered in iOS, Win 8 known issue, etc.) occasionally, but without being so chatty that followers tune out.

-- Put definite limits on how the Twitter account can be used, stick with them and make sure that the help desk is in line with overall organizational Twitter guidelines.

Expect to evolve the Twitter-help desk pairing after you jump in, as it won't take long to find what's working and what's not. But jump in you must, or you risk becoming irrelevant.

Remember that Twitter is social media, so don't be surprised to see clients helping other clients via Twitter once you've helped them. When you get to that point, you'll know you're doing it right.

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
David F. Carr
David F. Carr,
User Rank: Apprentice
6/4/2013 | 1:53:24 PM
re: When Colleges Use Twitter As Help Desk
Is there a need to provide similar support on Facebook?
User Rank: Apprentice
6/4/2013 | 3:03:41 PM
re: When Colleges Use Twitter As Help Desk
Is a good, natural question- not sure I have a clean answer. As a minimum, a Facebook presence should be there for those who go looking for it, but from there is a matter of philosophy and ambition on what you use it for. Certainly could provide basic reflection of key information like how to get more info on services, hours of operation, etc, or could go nuts and and make it an actual part of the support operation. Regardless of how far you go with it, it needs to stay fresh and be done as professionally as possible. Is one of those paradigms where querying peer institutions of like size and staffing for what works and doesn't can save months of learning curve.
David F. Carr
David F. Carr,
User Rank: Apprentice
6/5/2013 | 3:06:34 PM
re: When Colleges Use Twitter As Help Desk
Tangential example from a university setting was a Jewish fraternity organization that built its student engagement program on social media using Facebook, including a Facebook app integrated with SugarCRM for logging contacts with prospective recruits.
Cara Latham
Cara Latham,
User Rank: Apprentice
6/17/2013 | 12:59:06 PM
re: When Colleges Use Twitter As Help Desk
I think the approach outlined here definitely allows universities and colleges to utilize Twitter to aid/supplement their Help Desk operations without actually replacing the Help Desk. Making that clear distinction, as noted in the article, is crucial to balancing the two functions.
Register for Dark Reading Newsletters
White Papers
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.