SlideShare uma empresa Scribd logo
1 de 19
END USER COMPUTING
END USER COMPUTING


   In computing, End User Computing (EUC) refer to systems in
   which non-programmers can create working applications.



   EUC is a group of approaches to computing that aim at better
   integrating end users into the computing environment. These
   approaches attempt to realize the potential for high-end
   computing to perform in a trustworthy manner in problem
   solving of the highest order
END USER COMPUTING


     The term end-user computing has different meanings according
      to the context in which it is used. The following statements could
      all refer to end-user computing:
      ◦ all tools by which non-data-processing staff handle their own
         problems without professional programmers;
      ◦ creative use of data processing by non-data-processing experts;
      ◦ complex computing by non-data-processing professionals to
         answer organisational information needs;
      ◦ non-technical end-users using user-friendly, fourth-generation
         languages (4GLs) and PCs to generate reports or build decision
         support systems;
      ◦ the use of computer hardware and software by people in
         organisations whose jobs are usually classified as net users of
         information systems rather than net developers of information
         systems.
END USER COMPUTING

   Who are the End Users ?


      Non programming
      Command level
      End-user programmers
       (including senior management professionals)
      Functional support personnel
      End user computing support personnel
      DP Programmers
END USER COMPUTING


     End-user computing (EUC): All uses of computers
      by business people who are not information systems
      professionals.

     End-user development (EUD): Systems
      development and programming undertaken by non-IS
      staff.
END USER IS - Services

     End-user IS services: All services required to support
      end-users in running their PCs and developing and
      using applications

      1.   Provide a help-desk service.
      2.   Achieve standardisation of software.
      3.   Ensure network efficiency.
      4.   Provide training.
      5.   Delivering services to end-users cost-effectively.
END USER COMPUTING

   Advantages

    Systems tailored to users

    Enables creative use of IS

    Generates competitive advantage

    Puts users nearer the information

    Allows for variety

    Increases user awareness of IS

    Relieves work load of IT professional
END USER COMPUTING

   Disadvantages

    Produces inappropriate systems

    Causes duplication

    Takes users away from their real job

    Ignores long range and technical issues

    Causes integration problems
END USER COMPUTING
END USER COMPUTING
   •Service Desk – Global Service Desk handling 10mn trouble tickets and
   7mn service desk calls per annum in 20 languages. 17 Global delivery
   centers spread across the world with 7 near shore centers
   •Client Application Management services – Deliver Application
   Packaging, Imaging, Software Distribution and Patch Management
   services in a centralized factory construct. 5000+ Applications packaged
   and distributed annually.
   •Messaging & Collaboration Services – Build, operate and provide
   professional services on email and collaboration platforms like Microsoft
   Exchange, IBM Lotus Notes. Monitor and support more than 800,000
   mailboxes globally
   •Asset Management – Provide a complete Asset Management
   Lifecycle service right from ordering to ongoing management and tracking
   of client assets.
   •Client Support Services – Provide onsite support for Desktops,
   Laptops, Printers, Handheld devices at client locations spread
   globally. Global Network of Client support specialists supporting
   approximately 3 million client devices distributed globally.
   •Infrastructure Application – Build and Manage Infrastructrue
   Applications in customer environments. These services include Directory
   Services, File and Print services, Remote Access Managent, Application
   delivery using Citirix, Microsoft App-V etc.
END USER COMPUTING


     The three main types of end-user computing can be defined as:

      ◦ End-user-developed computer-based information systems for
        personal, departmental or organisation-wide use, where the end-
        user is a non-IT professional;


      ◦ End-user control of which hardware and package applications are
        purchased for use in their department;


      ◦ End-user use of existing information systems.
END USER - development

      End-user development of applications represents a major trend
       in the use of information technology in organisations.

      McGill et al. (2003) explain that:

       ‘User-developed applications (UDAs) are computer based
         applications for which non-information systems professionals
         assume primary development responsibility.
       They support decision making and organizational processes in the
         majority of Organizations’
END USER - Applications

     Reports from a corporate database using standard enquiries defined by the IS/IT
      function
     Simple ad hoc queries to databases defined by the user. For someone in an
      airline, for example, these might include access to a frequent flier
      database, customer reservation system or crew rostering system to monitor
      performance of each
     What-if? analysis using tools such as spreadsheet models or more specialised tools
      such as risk or financial management packages or business intelligence
      software, used for monitoring sales and marketing performance of information
      stored in a data warehouse
     Writing company information for a company intranet
     Development of applications such as a job costing tool or production scheduling
      system, using easy-to-use, high-level tools such as application generators, PC
      database management systems such as Microsoft Access or Borland or visual
      programming environments such as Microsoft Visual Basic.
END USER COMPUTING



     Applications backlog: The demand for new applications by users exceeds the
      capacity of the IS department or IS outsourcing company to develop them.
     Improved toolsets such as Visual Basic for Applications
     The desire by users to query and analyse data and generate reports from
      information stored on databases available across the corporate network
     A trend to decentralisation of computing to user departments for systems to
      support departmental activities
     Reduced expense of application development when conducted by end-users
      (from departmental rather than information systems budget)
     Better fit between end-user-developed software and their requirements (since no
      requirements translation is needed between the users and third-party
      developers). End-users are also less likely to ‘over-engineer’ a solution to a basic
      problem than an IS professional who will want to treat every problem with rigour.
END USER COMPUTING




 Figure 16.6 A model of IS success that can be applied to end-user developed
 applications
END USER COMPUTING


    Isolation: A few scattered pioneers of EUD develop small-scale business      tools within their area.
     Initially, little support from central IS.
    Standalone: Larger-scale applications that may be of importance to a department are developed. At
     this stage, an information centre may be developed to support an increase in demand for user
     computing services.
    Manual integration: Here, different end-user applications need to exchange data. This happens
     through manual intervention, with files being transferred   by floppy disk or across the network or even
     with rekeying of information. Information centre development has continued to support the needs of
     these larger-scale applications by providing training and skills and specifying standards for
     hardware, software and the development process.
    Automated integration: Users start to link into corporate applications to gain seamless access to
     information.
    Distributed integration: At this stage of development, there is a good level of integration between
     different end-user applications and corporate systems. Good standards of metadata (or data describing
     data in a data dictionary) are required to help achieve this.
END USER COMPUTING



     Using information that is out of date

     Information requires export from other information systems before
      it can be analysed by the end-user application

     Corruption of centrally held data by uploading erroneous data

     Development of insecure systems without password control that
      are vulnerable to accidental and deliberate damage.
END USER COMPUTING


    Training: Provision of relevant training courses both in how to program and in how to approach systems
     development in a structured way (the second of these is often omitted). This happened at the Open
     University, where many of the end-users wanted to omit the analysis course.
    Suitability review: Authorisation of major end-user new developments by business and IS managers to check
     that they are necessary (this should not be necessary for smaller-scale developments since otherwise creativity
     may be stifled).
    Standards for development: Such standards will recommend that documentation and structured testing of all
     user-developed software occurs. Detailed standards might include clear data definitions, validation rules, backup
     and recovery routines and security measures.
    Guidance from end-user support personnel: IC or help-desk staff can provide training in techniques used to
     develop software.
    Software and data audits: Regular audits of software produced by end-users should occur for data and
     application quality. There is an apocryphal story of a company that had an end-user-developed spreadsheet for
     making investment decisions which had an error in a formula that lost the company millions of pounds each year!
    Ensuring corporate data security: Ensure that users are not permitted to enter data directly into central
     databases except via applications especially written for the purpose by the IS department which has the
     necessary validation rules to ensure data quality. For analysis of corporate data, data should regularly be
     downloaded from the central database to the PC for analysis, where they can be analysed without causing
     performance problems to the corporate system.
   Help desk: A central facility in an
    organisation which provides end-user help-
    desk services such as phone support for
    troubleshooting end-user software and
    hardware problems, training, guidance on
    end-user development and management of
    user information.

Mais conteúdo relacionado

Mais procurados

Transaction processing system (TPS)
Transaction processing system (TPS)Transaction processing system (TPS)
Transaction processing system (TPS)Jaisha Jaikishan
 
FORMAL & INFORMAL INFORMATION SYSTEM
FORMAL & INFORMAL  INFORMATION SYSTEMFORMAL & INFORMAL  INFORMATION SYSTEM
FORMAL & INFORMAL INFORMATION SYSTEMZahid Parvez
 
MIS practical file
MIS practical fileMIS practical file
MIS practical fileAnkit Dixit
 
Decision Making and Information Systems
Decision Making and  Information SystemsDecision Making and  Information Systems
Decision Making and Information SystemsAriful Saimon
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing systemanjana1994
 
Mis system analysis and system design
Mis   system analysis and system designMis   system analysis and system design
Mis system analysis and system designRahul Hedau
 
Six major types of information systems
Six major types of information systemsSix major types of information systems
Six major types of information systemsMohanraj V
 
Management information system ( MIS )
Management information system ( MIS )Management information system ( MIS )
Management information system ( MIS )QualitativeIn
 
Introduction to management information system
Introduction to management information systemIntroduction to management information system
Introduction to management information systemOnline
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information systemPROF.JITENDRA PATEL
 
DEVELOPMENT PROCESS OF MIS
DEVELOPMENT PROCESS OF MISDEVELOPMENT PROCESS OF MIS
DEVELOPMENT PROCESS OF MISHiren Selani
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerceNishant Pahad
 
Executive Support System (ESS)
Executive Support System (ESS)Executive Support System (ESS)
Executive Support System (ESS)Arun Savera
 
MIS-executive information system
MIS-executive information systemMIS-executive information system
MIS-executive information systemRohit Raina
 

Mais procurados (20)

Lecture 1 Information System
Lecture 1  Information SystemLecture 1  Information System
Lecture 1 Information System
 
Transaction processing system (TPS)
Transaction processing system (TPS)Transaction processing system (TPS)
Transaction processing system (TPS)
 
Office automation sysmtems
Office automation sysmtemsOffice automation sysmtems
Office automation sysmtems
 
FORMAL & INFORMAL INFORMATION SYSTEM
FORMAL & INFORMAL  INFORMATION SYSTEMFORMAL & INFORMAL  INFORMATION SYSTEM
FORMAL & INFORMAL INFORMATION SYSTEM
 
MIS practical file
MIS practical fileMIS practical file
MIS practical file
 
INFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESSINFORMATION TECHNOLOGY FOR BUSINESS
INFORMATION TECHNOLOGY FOR BUSINESS
 
Decision Making and Information Systems
Decision Making and  Information SystemsDecision Making and  Information Systems
Decision Making and Information Systems
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 
Mis system analysis and system design
Mis   system analysis and system designMis   system analysis and system design
Mis system analysis and system design
 
Six major types of information systems
Six major types of information systemsSix major types of information systems
Six major types of information systems
 
Management information system ( MIS )
Management information system ( MIS )Management information system ( MIS )
Management information system ( MIS )
 
Introduction to management information system
Introduction to management information systemIntroduction to management information system
Introduction to management information system
 
Information Systems (Lecture 1)
Information Systems (Lecture 1)Information Systems (Lecture 1)
Information Systems (Lecture 1)
 
Information system
Information systemInformation system
Information system
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information system
 
DEVELOPMENT PROCESS OF MIS
DEVELOPMENT PROCESS OF MISDEVELOPMENT PROCESS OF MIS
DEVELOPMENT PROCESS OF MIS
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerce
 
Executive Support System (ESS)
Executive Support System (ESS)Executive Support System (ESS)
Executive Support System (ESS)
 
Expert system (mis)
Expert system (mis)Expert system (mis)
Expert system (mis)
 
MIS-executive information system
MIS-executive information systemMIS-executive information system
MIS-executive information system
 

Semelhante a Guide to End User Computing (EUC

Techniques for Developing Systems in IT Management System
Techniques for Developing Systems in IT Management SystemTechniques for Developing Systems in IT Management System
Techniques for Developing Systems in IT Management SystemGruppo Banca Sella
 
SE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software EngineeringSE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software EngineeringAmr E. Mohamed
 
Software engineering for IV sem BCA ,RCU Belgavi.Syllabus
Software engineering for IV sem BCA ,RCU Belgavi.SyllabusSoftware engineering for IV sem BCA ,RCU Belgavi.Syllabus
Software engineering for IV sem BCA ,RCU Belgavi.SyllabusNagaraj Hiremath
 
SE_Lec 01_ Introduction to Software Enginerring
SE_Lec 01_ Introduction to Software EnginerringSE_Lec 01_ Introduction to Software Enginerring
SE_Lec 01_ Introduction to Software EnginerringAmr E. Mohamed
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15Eric
 
Microsoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft Private Cloud
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSJournal For Research
 
Introduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information TechnologyIntroduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information TechnologyGaditek
 
SOFDESG 01 Introduction.pdf
SOFDESG 01 Introduction.pdfSOFDESG 01 Introduction.pdf
SOFDESG 01 Introduction.pdfJimCValencia1
 
mICF poster 4 (petteri) micf lean mvp design
mICF poster 4 (petteri) micf lean mvp designmICF poster 4 (petteri) micf lean mvp design
mICF poster 4 (petteri) micf lean mvp designStefanus Snyman
 
User Profiling and Technology
User Profiling and TechnologyUser Profiling and Technology
User Profiling and TechnologyJonathan Daniels
 

Semelhante a Guide to End User Computing (EUC (20)

End User Computing
End User ComputingEnd User Computing
End User Computing
 
IT ppt.pptx
IT ppt.pptxIT ppt.pptx
IT ppt.pptx
 
Techniques for Developing Systems in IT Management System
Techniques for Developing Systems in IT Management SystemTechniques for Developing Systems in IT Management System
Techniques for Developing Systems in IT Management System
 
End User Computing .pdf
End User Computing .pdfEnd User Computing .pdf
End User Computing .pdf
 
SE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software EngineeringSE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software Engineering
 
Software engineering for IV sem BCA ,RCU Belgavi.Syllabus
Software engineering for IV sem BCA ,RCU Belgavi.SyllabusSoftware engineering for IV sem BCA ,RCU Belgavi.Syllabus
Software engineering for IV sem BCA ,RCU Belgavi.Syllabus
 
Class 6
Class 6Class 6
Class 6
 
SE_Lec 01_ Introduction to Software Enginerring
SE_Lec 01_ Introduction to Software EnginerringSE_Lec 01_ Introduction to Software Enginerring
SE_Lec 01_ Introduction to Software Enginerring
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15
 
Microsoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop Whitepaper
 
Infote groupwork 1
Infote groupwork 1Infote groupwork 1
Infote groupwork 1
 
MIS chap # 4.......
MIS chap # 4.......MIS chap # 4.......
MIS chap # 4.......
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
 
Introduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information TechnologyIntroduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information Technology
 
SOFDESG 01 Introduction.pdf
SOFDESG 01 Introduction.pdfSOFDESG 01 Introduction.pdf
SOFDESG 01 Introduction.pdf
 
mICF poster 4 (petteri) micf lean mvp design
mICF poster 4 (petteri) micf lean mvp designmICF poster 4 (petteri) micf lean mvp design
mICF poster 4 (petteri) micf lean mvp design
 
mICF lean MVP design
mICF lean MVP designmICF lean MVP design
mICF lean MVP design
 
User Profiling and Technology
User Profiling and TechnologyUser Profiling and Technology
User Profiling and Technology
 
SE Lecture 1.ppt
SE Lecture 1.pptSE Lecture 1.ppt
SE Lecture 1.ppt
 
SE Lecture 1.ppt
SE Lecture 1.pptSE Lecture 1.ppt
SE Lecture 1.ppt
 

Último

Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 

Último (20)

Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 

Guide to End User Computing (EUC

  • 2. END USER COMPUTING In computing, End User Computing (EUC) refer to systems in which non-programmers can create working applications. EUC is a group of approaches to computing that aim at better integrating end users into the computing environment. These approaches attempt to realize the potential for high-end computing to perform in a trustworthy manner in problem solving of the highest order
  • 3. END USER COMPUTING  The term end-user computing has different meanings according to the context in which it is used. The following statements could all refer to end-user computing: ◦ all tools by which non-data-processing staff handle their own problems without professional programmers; ◦ creative use of data processing by non-data-processing experts; ◦ complex computing by non-data-processing professionals to answer organisational information needs; ◦ non-technical end-users using user-friendly, fourth-generation languages (4GLs) and PCs to generate reports or build decision support systems; ◦ the use of computer hardware and software by people in organisations whose jobs are usually classified as net users of information systems rather than net developers of information systems.
  • 4. END USER COMPUTING Who are the End Users ?  Non programming  Command level  End-user programmers (including senior management professionals)  Functional support personnel  End user computing support personnel  DP Programmers
  • 5. END USER COMPUTING  End-user computing (EUC): All uses of computers by business people who are not information systems professionals.  End-user development (EUD): Systems development and programming undertaken by non-IS staff.
  • 6. END USER IS - Services  End-user IS services: All services required to support end-users in running their PCs and developing and using applications 1. Provide a help-desk service. 2. Achieve standardisation of software. 3. Ensure network efficiency. 4. Provide training. 5. Delivering services to end-users cost-effectively.
  • 7. END USER COMPUTING Advantages  Systems tailored to users  Enables creative use of IS  Generates competitive advantage  Puts users nearer the information  Allows for variety  Increases user awareness of IS  Relieves work load of IT professional
  • 8. END USER COMPUTING Disadvantages  Produces inappropriate systems  Causes duplication  Takes users away from their real job  Ignores long range and technical issues  Causes integration problems
  • 10. END USER COMPUTING •Service Desk – Global Service Desk handling 10mn trouble tickets and 7mn service desk calls per annum in 20 languages. 17 Global delivery centers spread across the world with 7 near shore centers •Client Application Management services – Deliver Application Packaging, Imaging, Software Distribution and Patch Management services in a centralized factory construct. 5000+ Applications packaged and distributed annually. •Messaging & Collaboration Services – Build, operate and provide professional services on email and collaboration platforms like Microsoft Exchange, IBM Lotus Notes. Monitor and support more than 800,000 mailboxes globally •Asset Management – Provide a complete Asset Management Lifecycle service right from ordering to ongoing management and tracking of client assets. •Client Support Services – Provide onsite support for Desktops, Laptops, Printers, Handheld devices at client locations spread globally. Global Network of Client support specialists supporting approximately 3 million client devices distributed globally. •Infrastructure Application – Build and Manage Infrastructrue Applications in customer environments. These services include Directory Services, File and Print services, Remote Access Managent, Application delivery using Citirix, Microsoft App-V etc.
  • 11. END USER COMPUTING  The three main types of end-user computing can be defined as: ◦ End-user-developed computer-based information systems for personal, departmental or organisation-wide use, where the end- user is a non-IT professional; ◦ End-user control of which hardware and package applications are purchased for use in their department; ◦ End-user use of existing information systems.
  • 12. END USER - development  End-user development of applications represents a major trend in the use of information technology in organisations.  McGill et al. (2003) explain that: ‘User-developed applications (UDAs) are computer based applications for which non-information systems professionals assume primary development responsibility. They support decision making and organizational processes in the majority of Organizations’
  • 13. END USER - Applications  Reports from a corporate database using standard enquiries defined by the IS/IT function  Simple ad hoc queries to databases defined by the user. For someone in an airline, for example, these might include access to a frequent flier database, customer reservation system or crew rostering system to monitor performance of each  What-if? analysis using tools such as spreadsheet models or more specialised tools such as risk or financial management packages or business intelligence software, used for monitoring sales and marketing performance of information stored in a data warehouse  Writing company information for a company intranet  Development of applications such as a job costing tool or production scheduling system, using easy-to-use, high-level tools such as application generators, PC database management systems such as Microsoft Access or Borland or visual programming environments such as Microsoft Visual Basic.
  • 14. END USER COMPUTING  Applications backlog: The demand for new applications by users exceeds the capacity of the IS department or IS outsourcing company to develop them.  Improved toolsets such as Visual Basic for Applications  The desire by users to query and analyse data and generate reports from information stored on databases available across the corporate network  A trend to decentralisation of computing to user departments for systems to support departmental activities  Reduced expense of application development when conducted by end-users (from departmental rather than information systems budget)  Better fit between end-user-developed software and their requirements (since no requirements translation is needed between the users and third-party developers). End-users are also less likely to ‘over-engineer’ a solution to a basic problem than an IS professional who will want to treat every problem with rigour.
  • 15. END USER COMPUTING Figure 16.6 A model of IS success that can be applied to end-user developed applications
  • 16. END USER COMPUTING  Isolation: A few scattered pioneers of EUD develop small-scale business tools within their area. Initially, little support from central IS.  Standalone: Larger-scale applications that may be of importance to a department are developed. At this stage, an information centre may be developed to support an increase in demand for user computing services.  Manual integration: Here, different end-user applications need to exchange data. This happens through manual intervention, with files being transferred by floppy disk or across the network or even with rekeying of information. Information centre development has continued to support the needs of these larger-scale applications by providing training and skills and specifying standards for hardware, software and the development process.  Automated integration: Users start to link into corporate applications to gain seamless access to information.  Distributed integration: At this stage of development, there is a good level of integration between different end-user applications and corporate systems. Good standards of metadata (or data describing data in a data dictionary) are required to help achieve this.
  • 17. END USER COMPUTING  Using information that is out of date  Information requires export from other information systems before it can be analysed by the end-user application  Corruption of centrally held data by uploading erroneous data  Development of insecure systems without password control that are vulnerable to accidental and deliberate damage.
  • 18. END USER COMPUTING  Training: Provision of relevant training courses both in how to program and in how to approach systems development in a structured way (the second of these is often omitted). This happened at the Open University, where many of the end-users wanted to omit the analysis course.  Suitability review: Authorisation of major end-user new developments by business and IS managers to check that they are necessary (this should not be necessary for smaller-scale developments since otherwise creativity may be stifled).  Standards for development: Such standards will recommend that documentation and structured testing of all user-developed software occurs. Detailed standards might include clear data definitions, validation rules, backup and recovery routines and security measures.  Guidance from end-user support personnel: IC or help-desk staff can provide training in techniques used to develop software.  Software and data audits: Regular audits of software produced by end-users should occur for data and application quality. There is an apocryphal story of a company that had an end-user-developed spreadsheet for making investment decisions which had an error in a formula that lost the company millions of pounds each year!  Ensuring corporate data security: Ensure that users are not permitted to enter data directly into central databases except via applications especially written for the purpose by the IS department which has the necessary validation rules to ensure data quality. For analysis of corporate data, data should regularly be downloaded from the central database to the PC for analysis, where they can be analysed without causing performance problems to the corporate system.
  • 19. Help desk: A central facility in an organisation which provides end-user help- desk services such as phone support for troubleshooting end-user software and hardware problems, training, guidance on end-user development and management of user information.