This article is also available as a download.
The issue of complaints and their resolution is a perennially
hot topic in the virtual world of TechRepublic, with views expressed about the peeves of an IT manager and a support tech and complaints about CIOs. But nowhere in all these discussions
have the most important people in our universe–our users–been given a voice.
In an attempt to redress this imbalance and put our own complaints
in perspective, I took the liberty of asking my users to provide me with their
complaints about us, the IT professionals. So here, in no particular order, are
my users’ grievances, together with a few thoughts about how they might be
addressed and/or how they could have been avoided.
#1: Applications and hardware that don’t work
Several users raised this issue, expressing frustration at
features of their applications they knew to be available but that didn’t appear
to work. Upon investigation of a few specific complaints, it became apparent
that although the issues were genuine, the cause of the problems was being
misrepresented. In most cases, the apparent application or hardware failure was
actually due to lack of knowledge on behalf of the user.
This is not to say that the complaints weren’t justifiable–quite
the contrary, as my department had been guilty of giving the users new
applications and peripherals without providing them with the knowledge to use
them. It was interesting that this issue came up most frequently in reference
to digital cameras and scanners, raising the further question of whose
responsibility it is to provide training for such devices. As more and more
devices become available, the issue of who in the company should be responsible
for managing the required training needs to be addressed to avoid both
frustrated users and overburdened IT departments.
#2: Inconsistency of WiFi configurations
With the
exception of a handful of the more computer literate users, this is a common
complaint among the road warriors. We strive to make the process of
establishing a remote connection with the corporate network as straightforward
as the necessary security measures will permit, but our users still routinely
encounter WiFi configurations we’ve neglected to prepare them for. Many late
nights are spent talking to the techs responsible for a hotel’s installation,
persuading them to add our VPN software to their permitted list or make other
modifications to their configuration. Although we rarely encounter resistance,
this is a time-consuming and frustrating process for both us and the user.
#3: Slow computer/network
Dealing with this complaint is an occupational hazard. Every
place I’ve worked, users have constantly complained about how long it takes
their computer to boot, load a page, open Word, copy a file, etc. I’m not sure
that such complaints can ever be completely eliminated, but a few steps can help
reduce them. For instance, we can ensure that users who frequently interact
and/or perform the same job function have identical, or very similar, computers.
This will prevent direct comparisons: “Fred’s computer runs the same report
five seconds faster than mine!” Computer performance complaints occur so
frequently, it’s tempting to dismiss them as unimportant. I would advocate a
different approach. Sometimes, simply showing users that you take them
seriously and acknowledge that their computer’s performance is less than
desirable will cut down on complaints, even if nothing is done to actually
improve the situation.
Of course, this is not to say that every complaint should be
dismissed as the user’s perception, particularly if the user reports a sudden
slowdown or a slowdown following a specific event. Performing the usual
procedures to check for spyware, adware, viruses, and other potential issues
not only lets users know that you are taking them seriously–it might unearth a
real problem. We had one user who absolutely refused to reboot his computer. Months
would go by without a reboot, while we would watch in fascination as he
struggled with steadily degrading system. In the end, it took a power outage to
cure him of his phobia.
#4: Frequently required password changes
Just when everyone has finally adapted to their new passwords,
the dreaded message pops up announcing the impending password change. For
several days, we reset passwords and remove the ubiquitous post-it notes that
start sprouting from monitors: “No, I’m sorry, it’s against company policy to
write your password down. No, sorry again, I’m afraid it really does require a
numeral or a nonalphabetic character, and yes, it really does have to be that
long.”
Having to remember a whole herd of passwords myself, I can
genuinely sympathize with the users’ distress over this issue and recognize it
to be a real problem. Even when a user can be made to understand the importance
of the policy, it doesn’t help them conjure up and remember new, sufficiently
complex, nonrepeating passwords every 90 days. The more we try to secure our
environment, the less convenient it is to use. Apart from sympathizing with
users and listening while they tell me just how much I’m increasing the stress
in their lives, I really can’t think of an appropriate solution to this very
real problem.
#5: Not being administrators of their machines
A primary goal of almost any IT department is to maximize
the availability of all computer systems, including personal computers. Unfortunately,
whether it’s through inadvertently changing settings or deliberately installing
unauthorized applications, the users themselves can present a major obstacle to
the attainment of this goal. For this reason, it makes perfect sense to give
users the minimum level of privilege necessary to perform their job function on
their personal computers. For obvious reasons, this approach is not generally
well-received–Big Brother is at it again.
Although
educating the users can go a long way toward increasing their acceptance of
such restrictions, perhaps a more creative approach is required. What if users,
through attending training, could earn the right for increased privilege? Perhaps
they should start out as an administrator of their computer and lose that
privilege only if they violate clearly stated corporate policies?
#6: Spam filtering
This complaint is another one that falls into the Big
Brother category. The degree to which my company watches and controls the
users’ interactions with their computers has dramatically increased in recent
years. Until approximately two years ago, we had no company policies governing
the use of the corporate e-mail system. Users became accustomed to using their
SMTP addresses for personal contacts, Boy Scout mailing lists, Shakespeare
Sonnet of the Day, exchanging movies and pictures with friends, and so on. Before
long, spam accounted for more than 90 percent of inbound mail, mailboxes grew
to unmanageable sizes, and files you wouldn’t want your grandmother to see were
being backed up to tape and archived. Something clearly had to be done.
We purchased
and implemented an antispam solution and established a corporate policy banning
the storage of personal mail. Mail identified as spam was held for seven days
and then eradicated. Users were told to send an e-mail to the help desk if they
did not receive mail they were expecting, so that the sender’s address could be
white-listed. The users were not happy, to say the least. The complaints and
general discontent were completely understandable, as the users’ e-mail
environment had been radically restricted without obtaining their buy-in.
Although it wasn’t inappropriate for the IT department to recommend spam
filtering, management should have been given the opportunity to first understand
the problem and–more important–participate in the solution. Now we’re left
dealing with discontented users who feel as though they’re being punished by
having a privilege revoked and are being watched by the prying eyes of the IT
department.
#7: Restricted Web access
This is probably the most frequently heard complaint. Cries
of “Why can’t I order from Victoria’s Secret?”; “Why should you get to decide what’s ‘tasteless’?”; “A
site I order parts from has suddenly been restricted”; and “Why can I use e-bay
for only 30 minutes a day? How do you know that I’m not using it for business
purposes?” echo throughout the building.
This
situation parallels the problem with spam filtering. Both e-mail and Web access
were introduced at the same time with no thought given to how they should be
used. After a few years of completely unrestricted use, the IT department made
the decision to implement certain restrictions because of the understandable
burden this freedom placed on IT resources. Once again, the IT department was
compelled to act unilaterally, and as a result, now has to deal with an unhappy,
confused, and threatened user population. Although I don’t question the need to
exercise some controls over Internet access, the IT department should be in the
role of an advisor, implementer, and administrator and not the sole policy
maker and enforcer.
#8: Not being allowed to use company computers for personal use
This is a common complaint of the notebook users, especially
those who spend days at a time living out of hotels and sitting in airports and
on planes. We do not have a clearly defined policy on this issue, but in
general, although we don’t mind the computers being used to watch movies while
on the road or to create the occasional personal document, we do have a
complete ban on installing unauthorized applications, storing personal
documents, or attaching personal devices. This is probably our most abused
policy. Even those users who don’t abuse it aren’t hesitant to express their
discontent, frequently citing the example of other companies that allow their
employees to install games or any other applications they desire.
I understand
the users’ point of view, but having spent hours rebuilding systems due to user
abuse, I would be reluctant to completely relax the policy. Perhaps instead of
declaring war on the users, it might be possible to reach a compromise by
providing certain games, allocating an amount of disk space for personal use,
and supplying a list of approved devices that may be attached. But I don’t know
whether this approach would resolve the issue or merely open the door for more
abuse.
#9: Unresponsiveness of the IT department
I can run reports until I’m blue in the face to prove to
users that 99 percent of their problems are resolved within an hour of being
reported, but it is always the 1 percent
they remember. What accounts for this difference in perception? To a certain
extent it’s just human nature. The time the doctor kept us waiting for half a
day will always figure more dominantly in our memory than the 27 times we were
seen on or before our appointed time.
This
tendency probably can’t be changed, but we can do a few things to improve matters:
(1) Communicate with users, acknowledging that their problem has been received
and immediately issuing an ETA; (2) Ask users to sign off on a completed work
order; (3) Send users a follow-up e-mail to solicit their feedback after a work
order has been completed. Constantly communicating with users and keeping them
informed lets them know their problem is important to us, so they’ll have less
reason to accuse us of being unresponsive.
#10: Arrogance of the IT department
We don’t have to directly tell a user he or she is stupid to
be guilty of this. Less overt signs, such as rolling our eyes, tutting under
our breath, or a taking on a certain look still tells the user that we think he
or she is stupid. This can also be a problem with the wording of our memos. If we
send out memos written in Geeklish instead of the user’s native tongue, it
alienates them and makes them feel ignorant. The memo becomes useless because
nothing meaningful is communicated.
We do this
in more subtle ways, too, such as impatiently fixing a simple computer problem
instead of teaching users how to do it for themselves. In effect, we’re saying,
“You are too stupid to perform this simple task, which takes me about 20 seconds.” For a look at these and other miscommunication problems, see “The 10 worst ways to communicate with end users.”