Joint Information Systems Committee (JISC)

Document Sample
Joint Information Systems Committee (JISC) Powered By Docstoc
					Joint Information Systems Committee (JISC)

INVITATION TO TENDER

Developing Personalisation for the Information Environment (2)

Summary

1.        The JISC wishes to commission a project to identify how personalisation can be supported in its services
          in conjunction with federated access management. In particular, clear recommendations on how
          authorisation and attributes within federated architectures can support and encourage personalisation in
          the Information Environment (IE) are required.

2.        The aims and objectives of this project are:
           Scope which JISC services would be suitable to offer personalisation in relationship to identity
             management;
           Examine the transfer of personal information between systems, focusing on where user permission
             is explicitly or implicitly required and the feasibility of users having control over what is exposed to
             whom;
           Study current issues regarding anonymity and self disclosure on-line to establish the awareness and
             concerns of HE and FE users and whether this is changing with the growing use of web 2.0;
           Examine the interaction between authorisation and personalised content;
           Investigate the implications of initiatives such as the Liberty Alliance for the Information Environment
             in general, with a specific regard for personalisation;
           This work should build on “Developing Personalisation for the Information Environment (1)” project,
             the JISC Personalisation Studies and other relevant work;
           Specify candidate demonstrators and the associated technical requirements.

                                                                            th
3.        The deadline for receipt of tenders is 12 noon on Wednesday 17 October 2007. Funding of up to
          £90,000 (inclusive of VAT and related travel and subsistence) is available for the study.
                                                                   st
4.        The expected start date for the project is the Thursday 1 November 2007. This study should take place
          over a maximum period of eight months.

Background

5.     The Joint Information Systems Committee (JISC) is a committee of the UK further (FE) and higher (HE)
       education funding bodies that, through the funding of services and the management of development
       programmes, aims to help and facilitate institutions in their use of the Internet and other Information and
       Communications Technology (ICT) applications.

6.     One of the JISC’s key objectives is to build an online information environment that provides secure and
       convenient access to a comprehensive collection of scholarly and educational material. This is based on
                                                                 1
       the Information Environment (IE) Technical Architecture which specifies a set of standards and protocols
       that support resource discovery as part of learning, teaching, and research activities. JISC is developing
       components within this architecture to test out and promote the use of these standards and to help provide
       appropriate services to the community.




1
 JISC Information Environment Technical Architecture
http://www.ukoln.ac.uk/distributed-systems/jisc-ie/arch/



                                                                                                                     1
7.     Essentially the IE is about access to, and curation of resources. The diagram above depicts the high-level
       architecture that supports this. This study will inform how to implement personalisation/customisation
       throughout the Information Environment.

8.     The use of personal user information to help shape and tailor information is now a common activity among
       service providers. Major providers such as Amazon, Google and Yahoo commonly collect information
       about users in a variety of ways to be able to target both information and advertising that is deemed
       appropriate or relevant for the target user. Amazon has developed sophisticated 'attention' services that
       carefully analyse and compare user behaviour to power their successful recommendation and other user
       purchase services. All of these services inevitably rely on the service provider collecting and holding
       personal information. While providers are governed by the data protection act, there is increasing demand
       to find a process that will allow services to continue providing the benefits associated with these services
       without necessarily having control of personal data.

9.     A definition of personalisation developed for the JISC is “Personalisation should encompass both
       customisation and adaptive personalisation. Adaptive personalisation should be further broken down
       into two areas:
          Adaptive Personalisation based on data held elsewhere (e.g. in a personal preference service or
              directory) - APOD
          Adaptive Personalisation based on tracking of user activity – APUA.”
                                                                                    2



10.    This project will explore both the customisation and adaptive aspect of personalisation. Users may want to
       control aspects of their identity in relation to services offering personalisation and services may want to
       provide personalisation based on either user behaviour and/or personalisation based on preferences held
       at an institution.

11.    Access and Identity Management developments are of relevance in terms of where data is held about
       users, who controls it and how this information is released. Cross-over work includes the use of
                 3
       eduPerson attributes for storing personal information; institutionally-controlled role and privilege
                                              4         5          6             7
       management systems such as Signet , Grouper , PERMIS and SharpE ; identity management issues

2
  These definitions are taken from the JISC report “Investigation into Personalisation within Presentation Services”
http://www.jisc.ac.uk/whatwedo/programmes/programme_presentation/project_personalise.aspx and the subsequent Personalisation
workshop report which the programme manager will make available to prospective bidders.
3
  eduPerson: http://www.jisc.ac.uk/media/documents/techwatch/tsw0701.pdf.
4
  Signet: http://middleware.internet2.edu/signet/.
5
  Grouper: http://middleware.internet2.edu/dir/groups/grouper/.
6
  PERMIS: http://sec.cs.kent.ac.uk/permis/.

                                                                                                                               2
                                                               8
       within institutions and the JISC Identity Project ; federated identity management and applications such as
                                                                                               9             10
       the Liberty Alliance framework; personal identity management tools such as Autograph , and OpenID
       (subject to an upcoming JISC tender). Another area of research (subject to an upcoming JISC tender) will
                                                            11                    12
       be a review of identity management metasystems such as CardSpace and how they can help manage
       user authentication and authorisation for different resources.

12.    Bidders should note that this work is complimentary to the JISC ITT “Developing Personalisation for the
                                      13
       Information Environment (1)” . The aim of this study is to explore and determine the likelihood for the
       uptake of “wrapped” services from the education sector within Web 2.0 environments outside the
       education sector such as NetVibes, Facebook etc. Successful bidders will be expected to work closely
       with this project and to inform and be informed by this related work-stream.

Terms of Reference:

13.    The Terms of Reference for this project are:
         To explore practical and real world applications, toolkits and concerns in relation to the
            personalisation requirements of the Information Environment. The projects should build on the
            significant development work and desk research that has been carried out in this area as detailed in
            this ITT;
         To focus specifically on the definition of personalisation as outlined above and it’s relationship to the
            core issues of confidentiality/anonymity/authorisation/control in developing personalisation for the
            Information Environment;
         To scope which JISC services could benefit from providing personalisation services to increase
            awareness and use of resources/services;
         Examine the transfer of personal information between systems, focusing on where user permission
            is explicitly or implicitly required and the feasibility of users having control over what is exposed to
            whom. The term used for this is sometimes known as attention data which Amazon preference
            services employ for their personalisation;
         To focus on interoperability of standards that might support personalisation – e.g. the current IMS
            standards and their relationship to the standards in the information environment;
         Examine the interaction between authorisation and personalised content. For example eduPerson
            attributes and other role management systems in relation to adaptive personalisation;
         Study current issues regarding anonymity and self disclosure on-line to establish the awareness and
            concerns of HE and FE users and whether this is changing with the growing use of web 2.0;
         To explore how JISC services could provide personalisation based on user behaviour and how this
            information is tracked and handled/stored;
         Investigate the implications of initiatives such as the Liberty Alliance for the Information Environment
            in general, with a specific regard for personalisation;
         Explore the value of personalisation for users with disabilities, particularly in relation to the storing
            and presentation of personal information;
         Scope the available tools and applications to manage both customisation and adaptive
            personalisation;
         It is intended for this project to inform the development of small scale rapid demonstrators and
            therefore the project will need to identify candidate demonstrators and the associated technical
            requirements.

14.    This work should build on relevant studies and programmes:




7
  ShARPE: http://www.federation.org.au/twiki/bin/view/Federation/ShARPE.
8
  JISC Identity Project http://www.jisc.ac.uk/whatwedo/programmes/programme_einfrastructure/identity.aspx
9
  Autograph: http://www.federation.org.au/twiki/bin/view/Federation/AutographView.
10
   OpenID: http://openid.net/.
11
   See http://www.identityblog.com/?page_id=355
12
   CardSpace: http://cardspace.netfx3.com/.
13
   The contact for this project can be gained from Balviar Notay (JISC Programme Manager)

                                                                                                                   3
                        Investigation into Personalisation within Presentation Services Report and the subsequent
                                                           14
                         Personalisation Workshop report
                    
                                                                                  15
                         Web 2.0 for Content Creation for Learning and Teaching
                    
                                                                                                16
                         What is Web 2.0 – Ideas, Technologies and Implications for Education
                    
                                                                                          17
                         Study on Information Behaviour of the Researcher of the Future
                        JISC Users and Innovation: Personalising Technologies Programme
                                                                                             18

                        The JISC e-Learning Team have funded several projects looking at personal learning
                                                                                                19
                         environments within the e-Learning Framework and Tools Programme

15.    The outcomes of the project will not only be relevant to JISC Services but also to universities and colleges
       more generally and therefore the findings should include guidelines for the JISC and wider Higher
       Education and Further Education sector.

Deliverables

16.    The deliverables of the project are:
           A detailed project plan.
           A final report with recommendations and an executive summary. The recommendations will also
               need to specifically identify candidate small scale rapid demonstrators for the Information
               Environment and the associated technical documentation.
           An interim report will also be required and the date of this will be agreed at the start of the project.
           Guidelines and tools for public dissemination as appropriate.

Terms and Conditions of Grant
                                                                                                              20
17.    Projects will be expected to follow the normal JISC project management guidelines adherence to good
       project management practices, regular reporting and participation in meetings as appropriate. JISC’s
                                        21
       Terms and Conditions of Grant should be adhered to by all projects. Bidders are advised to read these
       carefully prior to submitting a proposal.

18.    A general guide to bidding for JISC funds can be found at:
       (http://www.jisc.ac.uk/fundingopportunities/bidguide.aspx).

Reporting/ Management

19.    Responsibility for this project will lie with both Nicole Harris, JISC Senior Services Transition Manager
       (email: n.harris@jisc.ac.uk; tel: 020 3006 603) and Balviar Notay, JISC Information Environment
       Programme Manager (email: b.notay@jisc.ac.uk; tel: 020 3006 6053).

20.    The contractor will be expected to agree a programme of work and timetable with the Programme
       Manager.

Intellectual Property

21.    Funding is conditional upon the outputs of this work being made freely available for widespread
       dissemination by the JISC, in perpetuity. Suitable licensing arrangements for any software that is produced
       as part of the project will need to be agreed.

14
   JISC report “Investigation into Personalisation within Presentation Services”
http://www.jisc.ac.uk/whatwedo/programmes/programme_presentation/project_personalise.aspx and the subsequent Personalisation
Workshop Report which the programme manager will make available to prospective bidders.
15
   Please note that this report is not yet complete but the programme manager will provide the contact details for the prospective bidders
16
   JISC TechWatch Report: What is web 2.0 – Ideas, Technologies and Implications for Education
http://www.jisc.ac.uk/media/documents/techwatch/tsw0701bword.doc
17
   This study is being conducted by CIBER from UCL and the contact name can be gained from Balviar Notay (JISC Programme Manager)
18
   JISC Users and Innovation: Personalising Technologies Programme
http://www.jisc.ac.uk/whatwedo/programmes/programme_users_and_innovation.aspx
19
   JISC e-Learning Framework and Tools Programme: http://www.jisc.ac.uk/whatwedo/programmes/elearning_framework.aspx.
20
   JISC Project Management Guidelines http://www.jisc.ac.uk/proj_manguide.html
21
   JISC Terms and Conditions of Grant http://www.jisc.ac.uk/fundingopportunities/bidguide/proj_tocgrants.aspx

                                                                                                                                             4
Accessibility Issues

22.       In line with Government legislation and social exclusion initiatives, JISC is committed to providing
          resources that are accessible to a diverse range of users. In order to achieve this, all software and IT
          resources including the project web site should meet good practice standards and guidelines pertaining to
          the media in which they are produced. Advice and recommendations for ensuring that IT based systems,
          tools and resources are accessible by all can be found in the resource section of the Technology for
                                        22
          Disabilities Service (TechDis) . Further advice and consultancy available from the TechDis Centre itself.

Data Protection and Confidentiality of Data

23.       Project leaders must take account of the requirements of the Data Protection Act 1998 and should consult
          with their institutional Data Protection Officer regarding the possible implications of their proposed project.

          Funding available

24.       The funding available for the study is a maximum of £90,000 or (including VAT, travel and subsistence).

25.       Bidders who are eligible to apply full economic costs (fEC) to their proposals are permitted to do so, but
          JISC’s total contribution to the study will not exceed £90,000.

Timescale for the project
                                                                         st
26.       The awarded project should commence work on Thursday 1 November 2007. The timescale for the
          project is up to 8 months. The project completion date should be no later than the end of July 2008.

Format of Proposals

27.       The proposals should clearly identify:
            the scope of the project;
            background and rationale for the proposal with explanations of the key elements involved;
            the proposed methodology(ies) to be used throughout the project including management structures;
            a detailed work plan with milestones and deliverables (this should address the requirements set out
               above as well as clear dissemination plans and risk analysis);
            the organisations involved in the bid, identifying the lead institution/organisation (in the case of a
               consortium bid) and the proposed contribution and responsibilities of each partner;
            the staff to be used in the main areas of work, together with detail of their relevant expertise and
               experience. Please note that bidders need to demonstrate expertise is user behaviour and in
               technical interoperability;
            the costs of the project, broken down into different phases as appropriate and outlining the relevant
               rates and time commitment for each member of the team to be employed on the project,
            confirmation of the proposed project timetable and start date; and
            a completed cover sheet (see Annex A) including full contact details for the project leader.

28.       Bids should propose a methodology that addresses these issues realistically and in sufficient detail within
          the time and financial limitations.

Criteria for evaluation of tenders

29.       Selection will be based on the following criteria (in no particular order):
            Clarity and feasibility of the project plan;
            Suitability of proposed methods;
            Commitment to work with JISC during the project;
            Compliance with and understanding of the statement of requirements;


22
     TechDis http://www.techdis.ac.uk

                                                                                                                        5
           Quality of solution offered;
           Relevant experience of the tendering organisation and proposed personnel;
           Awareness of current and past relevant JISC developments;
           Analysis of risks to successful completion;
           Value for money.

Submission of Proposals

30.   Proposals of no more than 10 single-sided A4 sheets, typeset in Arial or a similar font at 10 point size,
      should be submitted, as an electronic copy, in Word or Rich Text Format, via email as one file or a zipped
                                                                               th
      folder. The deadline for submissions is 1200 noon on Wednesday 17 October 2007. Proposals
      must include the completed cover sheet (see Annex A) in addition to the 10 page limit. CVs may be
      attached as appendices to the proposal and should be no longer than 2 sides of A4 each.

31.   Faxed proposals, or late proposals, will not be accepted.

32.   If the bid exceeds the page limit guidance, evaluators will be advised to disregard information provided
      beyond the indicated page limit.

33.   Each bid must be accompanied by letters of support from an authorised senior manager at each
      institution/organisation named in a bid. The support letters do not count towards the 10-page limit.

34.   The electronic copy of the bid including appendices and letters of support must be received by the
      deadline stated. Proposals must be sent to: Amy Laws (tel: 0117 931 7451; email: a.laws@jisc.ac.uk).

Enquiries

35.   General enquiries about this invitation to tender should be addressed to Nicole Harris (tel: 020 3006 603
      email: n.harris@jisc.ac.uk) or Balviar Notay (tel: 020 3006 6053) email: b.notay@jisc.ac.uk).

36.   Enquiries regarding the bidding process should be addressed to Amy Laws (tel: 0117 931 7451; email:
      a.laws@jisc.ac.uk).




                                                                                                                  6
Annex A

Cover sheet for proposals               JISC Invitation to Tender:
                                        Developing Personalisation for the
(NB: All sections must be completed)    Information Environment (2)




Name of lead institution/organisation

List consultants/partners, if any




Full contact details for primary contact

Name:
Position:
Email:
Address:




Tel:
Fax:

Length of project and Total cost to JISC over its life:

Proposed project start and end dates:

Outline proposal description




                                                                             7

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:4
posted:10/1/2012
language:English
pages:7