Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

03:25 PM
Dark Reading
Dark Reading
Products and Releases

Ovum: Higher Ed must grow strategic role of IT

For Immediate Release

 Melbourne, 13 January 2016 – Factors such as rising costs, declining affordability, disruptive technologies, and for-profit competitors mean that now is the time for institutions to grow the strategic role of IT to differentiate themselves in the market. Institutions cannot remain static and expect to survive; they must assess the changing environment and take timely action in collaboration with IT when required, according to global analyst firm Ovum. 

 In the new 2016 Trends to Watch report on Education Technology, the independent technology analyst firm identifies a number of key trends that will impact the education technology market in 2016, including:

  • More thought will be given to how delivery models for teaching and learning will change.
  • Institutions will become more sophisticated in how they think about the student experience.
  • A serious discussion about next-generation IT strategy will continue.

 Navneet Johal, Research Analyst, Education Technology at Ovum and author of the report, said: “According to Ovum's 2015/16 ICT Enterprise Insights survey, increasing revenue and budget growth, improving operational efficiency, and reducing operating expenditure will be the top three business challenges for institutions over the next year.”

 Johal added: “It is unlikely that the higher education market will be substantially different in a year’s time, or even within the next few years. However, institutions must capitalize on change now, rather than being consumed by it later, to survive in the increasingly competitive higher education market.”

 First of all, capitalizing on change requires institutions to adapt to the new normal – the nontraditional learner.  “The demographics of the student population have changed.  Therefore, institutions must dedicate the same amount of energy and resources to nontraditional programs, including an institution-wide commitment to developing new academic programs and creating better administrative structures for nontraditional students,” asserted Johal.

 The report also highlights that with increasing pressure to improve student retention and outcomes, institutions will become more sophisticated in how they think about the student experience.  “Enterprise-wide deployments of constituent relationship management (CRM) systems and the overlapping of enterprise applications such as learning management systems (LMS) and student information systems (SIS) will grow to support student experience strategies,” said Johal.

 Additionally, the discussion about next-generation IT strategy will continue, with more institutions committing to cloud-hosted delivery and services. “Institutions need to focus on innovation to differentiate themselves in what is an increasingly competitive industry, and the IT department should be a key partner in driving this innovation. However, if the majority of the IT department’s time and budget is spent on maintenance of on-premise applications and services, this leaves little time for innovation. As a result, institutions will find it difficult to stay ahead of the curve,” concluded Johal. 

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-20
A CWE-200: Information Exposure vulnerability exists in Modicon Controllers (M340 CPUs, M340 communication modules, Premium CPUs, Premium communication modules, Quantum CPUs, Quantum communication modules - see security notification for specific versions), which could cause the disclosure of FTP har...
PUBLISHED: 2019-11-20
A CWE-79: Failure to Preserve Web Page Structure vulnerability exists in Andover Continuum (models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702) , which could enable a successful Cross-site Scripting (XSS attack) when using the products web server.
PUBLISHED: 2019-11-20
Cross-site Scripting (XSS) in Dolibarr ERP/CRM 3.3.1 allows remote attackers to inject arbitrary web script or HTML in functions.lib.php.
PUBLISHED: 2019-11-20
Dolibarr ERP/CRM 3.3.1 does not properly validate user input in viewimage.php and barcode.lib.php which allows remote attackers to execute arbitrary commands.
PUBLISHED: 2019-11-20
The snprintf implementation in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 does not properly handle system-call errors, which allows attackers to obtain sensitive information or have other unspecified impact via unknown vectors, as d...