Break free: Go beyond the traditional learning (Part 4)

no responses

by Anita Vinod & Teena Thimothy  on 19 May ’15

Recap:

  • Instant messaging technologies available in the market today
  • Fundamental understanding of the pros and cons in implementing learning through instant messaging

While instant messaging has taken the world by storm, there always lurk few questions regarding its viability as an effective platform for learning.

The foremost question being is Data Confidentiality. Information that is transmitted through Instant Messenger pass through servers and networks that may or may not be secure, so there is no guarantee that the information you send is 100% secure. Further, Instant Messaging services often contain file sharing programs which can leave confidential information on the server even after you terminate the session.

How can we conduct effective learning if we are constantly worried about losing proprietary information to cyber miscreants?

Keeping in mind that the concern is inherent with most instant messaging apps, there are a few workarounds. The situation may change fairly rapidly since most apps are undergoing updates at very regular frequencies.

  1. Keep It Simple: Let’s not have proprietary information in instant messaging apps. Simple? Yes! Doable? Oh yes! We recommend looking within your learning portfolio. There are a large number of courses which are generic and have no proprietary information whatsoever. But the organizations spend hours trying to conduct those courses using traditional methods. Why not switch to SLIM?
  2. Switch to the Unconventional: Making a statement that instant messaging apps do not offer data security may be misrepresenting the facts. There are quite a few apps out there which do offer a fairly high degree of data security. They are not as popular, but the features have been tuned to a point where, basis the organizations appetite for data confidentiality they can pick and choose the preferred app. However, the learners need to be guided and encouraged to use an unfamiliar app.
  3. If you don’t have it; Build it: It’s the day and age when creating an app to suit the customer’s specific needs is not the stuff of dreams. So go ahead, build a secure app and learn away!!
  4. Attack the Hardware: More often than not, the concern stems from the fact that the shared content is downloadable and shareable. Hit the root cause of the issue. Limit the smart phones capability to share the information depending on the level of confidentiality of the content in question.

Stay tuned to learn more about SLIM as a service and how it will benefit your employees

Leave a Reply

Your email address will not be published. Required fields are marked *