SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
Americas Conference
on Information Systems,
AMCIS 2017,
Aug, 10th
A METHOD FOR EVALUATING
END-USER DEVELOPMENTTECHNOLOGIES
Prof. Dr. Claudia Melo, Dep. of Computer Science
Jonathan Moraes, Fac. of Software Engineering
Marcelo Ferreira, Fac. of Software Engineering
Prof. Dr. Rejane Figueiredo, Fac. of Software EngineeringUniversity of Brasília, Brazil
WHY ARE WE INVESTIGATING EUD TECHNOLOGY EVALUATION?
•# of end users > # of professional
so1ware developers
•> 50M end-user developers,
USA only (Burne9 and Myers,
2014)
• Li9le research has empirically examined so1ware package
evalua7on criteria and techniques in general, and in the end-user
development context in par7cular (Harnisch, 2014; Jadhav and
Sonar, 2009; Jadhav and Sonar, 2011; Misra and Mohanty, 2003)
• Success and failure of end-
user development within an
organizaOon ulOmately
depends on how effec7ve
so1ware packages are
chosen and used
2
• This research study is part of a partnership with the Ministry of
CommunicaOons, Science, and Technology, Brazil
• Plenty of EUD tools being offered in the market
• OrganizaOons sOll lost on how to take full advantage of EUD
(facing cultural, managerial and technological challenges). But
already buying soluOons!
INDUSTRY CONTEXT
3
Three different areas have important, but parOal, contribuOons to
our research purpose:
•So#ware package acquisi1on research;
•So#ware quality models & CSCW/HCI research, and
•Technology acceptance research.
LITERATURE REVIEW
4
WHAT WAS CONSIDERED AS A STARTING POINT?
The model should evaluate technologies that have:
•Essen1al quali1es that enable the end-user developer to manipulate the
tool and produce useful results in a certain applica1on domain
•from so]ware quality models and CSCW/HCI models;
•General quali1es inherent to so#ware packages
•from so]ware package acquisiOon models and technology acceptance models;
•Essen1al quali1es for management and technological governance
•from so]ware package acquisiOon models;
•An evalua1on method based on already-established and tested
techniques, even if they come from a different context
5
• Evalua1on criteria, characteris1cs, sub characteris1cs, and
aJributes
• Developed ques1ons and metrics from different points-of-
view (PoV).
STRUCTURING THE EVALUATION MODEL
6
THE EVALUATION METHOD
1. Functional characteristics:
○Functionality (3 questions, PoV:
Governance/Platform)
○Collaboration (13 questions, PoV:
EUD/Platform)
○Data Management (4 questions,
PoV: EUD/Platform & 4 questions,
PoV: Governance/Platform)
2. Cost and Benefit Characteristics (6
questions, PoV: Governance/Platform)
3.Vendor Characteristics (4
questions, PoV: Governance/Platform)
4. Software Quality Characteristics
○ Compatibility (6 questions, PoV: EUD / Platform)
○ Maintainability (6 questions, PoV: EUD / Platform)
○ Usability (212 questions, PoV: EUD / Platform)
○ Reliability (7 questions, PoV: IT Manager/Platform)
○ Performance Efficiency (6 questions, PoV: EUD / Platform)
○ Security (5 questions, PoV: Governance/Platform & 1 question, PoV:
EUD/Platform/Developed Application & 9 questions, PoV: EUD /
Platform)
5.Hardware & Software Configuration (8 questions)
The complete EUD technology evaluation model is available at: https://itrac.github.io/eud_technology_evaluation
7
EVALUATING EUD TECHNOLOGIES - STEPS
1. Determining the need, including high-level investigation of
software features and capabilities provided by vendors
August/2016 to October/2016 - literature review and contact
with leaders of public and private organizations to build a
general list of tools.
2. Short listing candidate packages and eliminating the
candidate packages that do not have the required feature We
shortlisted the most solid market offers (Forrester, 2016).
8
3. Using the proposed evaluation technique to evaluate
remaining packages and obtain a score
4. Pilot testing the tool in an appropriate environment (parallel
to 3) Fundamental to refine the model proposed (removing,
rewriting, and adding questions/metrics).
The evaluation model and the platform evaluation results
presented in this work are already the result from a second
evaluation iteration
EVALUATING EUD TECHNOLOGIES - RESEARCH STEPS
9
EXECUTION DETAILS
The platforms:
● OutSystems
● Oracle Apex
● Salesforce Lightning¹
● Zoho Creator¹
1 - The Salesforce Lightning and Zoho Creator evaluations are not described in the paper.
10
Testing:
• 3 software engineering students as testers;
• Each student performed the entire model for every platform
using four default scenarios (C-R-U-D)
• Either using the platform’s predefined templates or not.
• A researcher supervised the testers and validated the forms.
EXECUTION DETAILS
11
Results: Functional Characteristics
Functionality
Sub-Characteristics Oracle Apex OutSystems Salesforce Lightning Zoho Creator
Application Domain Database General-purpose General-purpose Database
Collaboration
Shareability ✔ ✔ ✔ ✔
Coordination of Actions ✔ ✔ ✔ ✘
Consequential
Communication
60% 60% 60% 80%
12
Results: Functional Characteristics
Collaboration
Sub-Characteristics Oracle Apex OutSystems Salesforce Lightning Zoho Creator
Finding Collaborators
and Establishing
Contact
75% 0% 50% 100%
Concurrent Protection 0% 50% 0% 50%
Data Management
Data Input and Output 100% 100% 100% 66%
Required Technical
Knowledge
33% 33% 33% 0%
13
Results: Cost and Benefit & Vendor Characteristic
Cost
Sub-Characteristics Oracle Apex OutSystems Salesforce Lightning Zoho Creator
License Cost $ 164,839.00 $ 2,072,601.74 $ 3,600.00 per user/
year
$ 1999.00 per month
Maintenance Cost N/A N/A N/A N/A
Vendor
Contract Dependency 100% 100% 100% 100%
Technology
Dependency
100% 0% 0% 100%
14
Results: Software Quality Characteristics
Compatibility
Sub-Characteristics Oracle Apex OutSystems Salesforce Lightning Zoho Creator
Technical Knowledge
Requirement
Advanced Advanced N/A Average
Data Exchangeability ✘ ✔ ✘ ✘
Connectivity With
External Component/
System
Possible Possible Impossible Possible
Reusability ✔ ✔ N/A ✔
15
Results: Software Quality Characteristics
Maintainability
Sub-Characteristics Oracle Apex OutSystems Salesforce Lightning Zoho Creator
Modifiability 100% 100% 50% 100%
Reusability Possible, Easy Possible, Easy Possible, Average Possible, Hard
Reliability
Availability N/A N/A N/A N/A
Vendor Support 0.41 fixes/day 0.43 fixes/day 0.12 fixes/day 0.73 fixes/day
16
Results: Software Quality Characteristics
Performance Efficiency
Sub-Characteristics Oracle Apex OutSystems Salesforce Lightning Zoho Creator
Response Time 100% 100% 100% 100%
Turnaround Time 50% 100% 75% 100%
Security
Access Behaviors 80% 60% 60% 20%
Developed Application
Security
100% 100% 100% 0%
17
Results: Software Quality Characteristics
Security
Sub-Characteristics Oracle Apex OutSystems Salesforce Lightning Zoho Creator
Update Behaviors 100% 50% 100% N/A
File Upload Security 100% 100% 100% 100%
Report Behaviors ✔ ✔ ✘ ✘
Security Algorithms 50% 100% 100% 50%
18
Results: Usability
19
CONCLUSION
● The major original contributions of the paper are:
○ A detailed method for evaluating EUD technologies that comprises 11
characteristics, 20 sub-characteristics, 30 attributes, 300 questions/metrics,
and
○ Evaluations using the method against 4 leading EUD platforms in the market
(we described only 2 in the paper)
○ Next steps: validation with real-world scenarios (e.g. action research) &
investigation of automation opportunities
20
Questions?
Thanks!
claudiam@unb.br
Claudia Melo 21
Acknowledgement: this research received support from
Fundação de Apoio a Pesquisa do Distrito Federal (FAP-DF)

Mais conteúdo relacionado

Mais procurados

CSCM Chapter 7 supplier evaluation cscm
CSCM Chapter 7 supplier evaluation cscmCSCM Chapter 7 supplier evaluation cscm
CSCM Chapter 7 supplier evaluation cscmEst
 
Vendor evalu.nikhil 12mt07ind017
Vendor evalu.nikhil 12mt07ind017Vendor evalu.nikhil 12mt07ind017
Vendor evalu.nikhil 12mt07ind017Akash Maurya
 
Procedure for purchasing, purchasing orders, and selection of suppliers
Procedure for purchasing, purchasing orders, and selection of suppliersProcedure for purchasing, purchasing orders, and selection of suppliers
Procedure for purchasing, purchasing orders, and selection of suppliersQusi Alqarqaz
 
Suppliers selection in construction supply chain management
Suppliers selection in construction supply chain managementSuppliers selection in construction supply chain management
Suppliers selection in construction supply chain managementvishal kachwah
 
Vendor Selection Process
Vendor Selection ProcessVendor Selection Process
Vendor Selection Processgrinehart
 
shahank soni vendor evaluation presentation
shahank soni   vendor evaluation presentationshahank soni   vendor evaluation presentation
shahank soni vendor evaluation presentationAkash Maurya
 
Supplier evaluation criteria
Supplier evaluation criteriaSupplier evaluation criteria
Supplier evaluation criteriaArt Acosta
 
Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...
Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...
Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...FaHaD .H. NooR
 
Vendor selection
Vendor selectionVendor selection
Vendor selectionjanessa24
 
Consumer Behaviour: Supplier Evaluation Selection
Consumer Behaviour:   Supplier Evaluation Selection Consumer Behaviour:   Supplier Evaluation Selection
Consumer Behaviour: Supplier Evaluation Selection Snqobile Ndebele
 
Vendor Selection And Interaction
Vendor Selection And InteractionVendor Selection And Interaction
Vendor Selection And Interactionyashpal01
 
Supplier evaluation and selection
Supplier evaluation and selectionSupplier evaluation and selection
Supplier evaluation and selectionAnish Gambhir
 
Agile Tour 2016 Chennai - Vendor selection an interactive process by Karthik...
Agile Tour 2016 Chennai - Vendor selection  an interactive process by Karthik...Agile Tour 2016 Chennai - Vendor selection  an interactive process by Karthik...
Agile Tour 2016 Chennai - Vendor selection an interactive process by Karthik...India Scrum Enthusiasts Community
 
SUPPLIER SELECTION AND EVALUATION
SUPPLIER SELECTION AND EVALUATIONSUPPLIER SELECTION AND EVALUATION
SUPPLIER SELECTION AND EVALUATIONZamri Yahya
 
Supplier Development Mexico
Supplier Development MexicoSupplier Development Mexico
Supplier Development MexicoPatNycum
 
Supplier selection process
Supplier selection processSupplier selection process
Supplier selection processFoods1975
 

Mais procurados (20)

PRODUCT SELECTION
PRODUCT SELECTIONPRODUCT SELECTION
PRODUCT SELECTION
 
CSCM Chapter 7 supplier evaluation cscm
CSCM Chapter 7 supplier evaluation cscmCSCM Chapter 7 supplier evaluation cscm
CSCM Chapter 7 supplier evaluation cscm
 
Supplier Approval And Assessment
Supplier Approval And AssessmentSupplier Approval And Assessment
Supplier Approval And Assessment
 
Vendor evalu.nikhil 12mt07ind017
Vendor evalu.nikhil 12mt07ind017Vendor evalu.nikhil 12mt07ind017
Vendor evalu.nikhil 12mt07ind017
 
Procedure for purchasing, purchasing orders, and selection of suppliers
Procedure for purchasing, purchasing orders, and selection of suppliersProcedure for purchasing, purchasing orders, and selection of suppliers
Procedure for purchasing, purchasing orders, and selection of suppliers
 
Suppliers selection in construction supply chain management
Suppliers selection in construction supply chain managementSuppliers selection in construction supply chain management
Suppliers selection in construction supply chain management
 
Vendor Selection Process
Vendor Selection ProcessVendor Selection Process
Vendor Selection Process
 
shahank soni vendor evaluation presentation
shahank soni   vendor evaluation presentationshahank soni   vendor evaluation presentation
shahank soni vendor evaluation presentation
 
Supplier evaluation criteria
Supplier evaluation criteriaSupplier evaluation criteria
Supplier evaluation criteria
 
Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...
Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...
Purchasing mangement - Puchasing Process - Make Or Buy Decisions - Supplier S...
 
Vendor selection
Vendor selectionVendor selection
Vendor selection
 
Consumer Behaviour: Supplier Evaluation Selection
Consumer Behaviour:   Supplier Evaluation Selection Consumer Behaviour:   Supplier Evaluation Selection
Consumer Behaviour: Supplier Evaluation Selection
 
Vendor Selection And Interaction
Vendor Selection And InteractionVendor Selection And Interaction
Vendor Selection And Interaction
 
Supplier evaluation & selection
Supplier evaluation & selection Supplier evaluation & selection
Supplier evaluation & selection
 
Supplier evaluation and selection
Supplier evaluation and selectionSupplier evaluation and selection
Supplier evaluation and selection
 
Outsourcing Decisions
Outsourcing DecisionsOutsourcing Decisions
Outsourcing Decisions
 
Agile Tour 2016 Chennai - Vendor selection an interactive process by Karthik...
Agile Tour 2016 Chennai - Vendor selection  an interactive process by Karthik...Agile Tour 2016 Chennai - Vendor selection  an interactive process by Karthik...
Agile Tour 2016 Chennai - Vendor selection an interactive process by Karthik...
 
SUPPLIER SELECTION AND EVALUATION
SUPPLIER SELECTION AND EVALUATIONSUPPLIER SELECTION AND EVALUATION
SUPPLIER SELECTION AND EVALUATION
 
Supplier Development Mexico
Supplier Development MexicoSupplier Development Mexico
Supplier Development Mexico
 
Supplier selection process
Supplier selection processSupplier selection process
Supplier selection process
 

Destaque

A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Riskamiable_indian
 
Strategic information system management
Strategic information system managementStrategic information system management
Strategic information system managementPragnya Sahoo
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain ManagementAnupam Basu
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)BPalmer13
 
Information risk management
Information risk managementInformation risk management
Information risk managementAkash Saraswat
 
Challenge of Outsourcing
Challenge of OutsourcingChallenge of Outsourcing
Challenge of OutsourcingNascenia IT
 
Characterization of strategic information systems
Characterization of strategic information systemsCharacterization of strategic information systems
Characterization of strategic information systemsSuresh Kumar
 
End user development
End user developmentEnd user development
End user developmentgavhays
 
Chapter 6 Information System-Critical Success Factor
Chapter 6 Information System-Critical Success FactorChapter 6 Information System-Critical Success Factor
Chapter 6 Information System-Critical Success FactorSanat Maharjan
 
Strategic information system
Strategic information system Strategic information system
Strategic information system Megha_pareek
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security controlCheng Olayvar
 
Outsourcing introduction & issues
Outsourcing introduction & issuesOutsourcing introduction & issues
Outsourcing introduction & issuesnishant_ns
 

Destaque (20)

Outsourcing
OutsourcingOutsourcing
Outsourcing
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Risk
 
Strategic information system management
Strategic information system managementStrategic information system management
Strategic information system management
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain Management
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
 
Outsource
OutsourceOutsource
Outsource
 
Make or Buy
Make or BuyMake or Buy
Make or Buy
 
Information systems risk assessment frame workisraf 130215042410-phpapp01
Information systems risk assessment frame workisraf 130215042410-phpapp01Information systems risk assessment frame workisraf 130215042410-phpapp01
Information systems risk assessment frame workisraf 130215042410-phpapp01
 
Information risk management
Information risk managementInformation risk management
Information risk management
 
Make or buy diagram
Make or buy diagramMake or buy diagram
Make or buy diagram
 
Challenge of Outsourcing
Challenge of OutsourcingChallenge of Outsourcing
Challenge of Outsourcing
 
Characterization of strategic information systems
Characterization of strategic information systemsCharacterization of strategic information systems
Characterization of strategic information systems
 
End user development
End user developmentEnd user development
End user development
 
Chapter 6 Information System-Critical Success Factor
Chapter 6 Information System-Critical Success FactorChapter 6 Information System-Critical Success Factor
Chapter 6 Information System-Critical Success Factor
 
End user development
End user developmentEnd user development
End user development
 
Strategic information system
Strategic information system Strategic information system
Strategic information system
 
Outsourcing Ppt 1
Outsourcing Ppt 1Outsourcing Ppt 1
Outsourcing Ppt 1
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security control
 
Outsourcing introduction & issues
Outsourcing introduction & issuesOutsourcing introduction & issues
Outsourcing introduction & issues
 

Semelhante a A Method for Evaluating End-User Development Technologies

Performance Continuous Integration
Performance Continuous IntegrationPerformance Continuous Integration
Performance Continuous IntegrationAlmudena Vivanco
 
Resume_AnujTiwari
Resume_AnujTiwariResume_AnujTiwari
Resume_AnujTiwariAnuj Tiwari
 
Software Operation Knowledge
Software Operation KnowledgeSoftware Operation Knowledge
Software Operation KnowledgeDevnology
 
_VoicePPT_QA_Testing_Training_4_Days_Schedule.ppt
_VoicePPT_QA_Testing_Training_4_Days_Schedule.ppt_VoicePPT_QA_Testing_Training_4_Days_Schedule.ppt
_VoicePPT_QA_Testing_Training_4_Days_Schedule.pptAnilKumarARS
 
vnd.openxmlformats-officedocument.presentationml.presentation&rendition=1.pptx
vnd.openxmlformats-officedocument.presentationml.presentation&rendition=1.pptxvnd.openxmlformats-officedocument.presentationml.presentation&rendition=1.pptx
vnd.openxmlformats-officedocument.presentationml.presentation&rendition=1.pptxKrishna20539
 
Software Testing Training : Tonex Training
Software Testing Training : Tonex TrainingSoftware Testing Training : Tonex Training
Software Testing Training : Tonex TrainingBryan Len
 
renita lobo-CV-Automation
renita lobo-CV-Automationrenita lobo-CV-Automation
renita lobo-CV-AutomationRenita Lobo
 
Webinar app testing and distribution
Webinar app testing and distribution Webinar app testing and distribution
Webinar app testing and distribution Service2Media
 
КАТЕРИНА АБЗЯТОВА «Тестування мобільних додатків: Як створити виграшну страте...
КАТЕРИНА АБЗЯТОВА «Тестування мобільних додатків: Як створити виграшну страте...КАТЕРИНА АБЗЯТОВА «Тестування мобільних додатків: Як створити виграшну страте...
КАТЕРИНА АБЗЯТОВА «Тестування мобільних додатків: Як створити виграшну страте...GoQA
 
MIT521 software testing (2012) v2
MIT521   software testing  (2012) v2MIT521   software testing  (2012) v2
MIT521 software testing (2012) v2Yudep Apoi
 
Software Development Life Cycle (SDLC )
Software Development Life Cycle (SDLC )Software Development Life Cycle (SDLC )
Software Development Life Cycle (SDLC )eshtiyak
 
Aim (A).pptx
Aim (A).pptxAim (A).pptx
Aim (A).pptx14941
 
Software Testing Training : Tonex Training
Software Testing Training : Tonex TrainingSoftware Testing Training : Tonex Training
Software Testing Training : Tonex TrainingBryan Len
 
Unit Testing Software Market Size, Share.pdf
Unit Testing Software Market Size, Share.pdfUnit Testing Software Market Size, Share.pdf
Unit Testing Software Market Size, Share.pdfshreyaporekar9
 

Semelhante a A Method for Evaluating End-User Development Technologies (20)

Performance Continuous Integration
Performance Continuous IntegrationPerformance Continuous Integration
Performance Continuous Integration
 
Slcm sharbani bhattacharya
Slcm sharbani bhattacharyaSlcm sharbani bhattacharya
Slcm sharbani bhattacharya
 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
 
Resume_AnujTiwari
Resume_AnujTiwariResume_AnujTiwari
Resume_AnujTiwari
 
Software Operation Knowledge
Software Operation KnowledgeSoftware Operation Knowledge
Software Operation Knowledge
 
Navin Latest
Navin LatestNavin Latest
Navin Latest
 
_VoicePPT_QA_Testing_Training_4_Days_Schedule.ppt
_VoicePPT_QA_Testing_Training_4_Days_Schedule.ppt_VoicePPT_QA_Testing_Training_4_Days_Schedule.ppt
_VoicePPT_QA_Testing_Training_4_Days_Schedule.ppt
 
vnd.openxmlformats-officedocument.presentationml.presentation&rendition=1.pptx
vnd.openxmlformats-officedocument.presentationml.presentation&rendition=1.pptxvnd.openxmlformats-officedocument.presentationml.presentation&rendition=1.pptx
vnd.openxmlformats-officedocument.presentationml.presentation&rendition=1.pptx
 
Software Testing Training : Tonex Training
Software Testing Training : Tonex TrainingSoftware Testing Training : Tonex Training
Software Testing Training : Tonex Training
 
Sdpl1
Sdpl1Sdpl1
Sdpl1
 
Musharraf_Syed_Resume
Musharraf_Syed_ResumeMusharraf_Syed_Resume
Musharraf_Syed_Resume
 
renita lobo-CV-Automation
renita lobo-CV-Automationrenita lobo-CV-Automation
renita lobo-CV-Automation
 
Webinar app testing and distribution
Webinar app testing and distribution Webinar app testing and distribution
Webinar app testing and distribution
 
КАТЕРИНА АБЗЯТОВА «Тестування мобільних додатків: Як створити виграшну страте...
КАТЕРИНА АБЗЯТОВА «Тестування мобільних додатків: Як створити виграшну страте...КАТЕРИНА АБЗЯТОВА «Тестування мобільних додатків: Як створити виграшну страте...
КАТЕРИНА АБЗЯТОВА «Тестування мобільних додатків: Як створити виграшну страте...
 
MIT521 software testing (2012) v2
MIT521   software testing  (2012) v2MIT521   software testing  (2012) v2
MIT521 software testing (2012) v2
 
Software Development Life Cycle (SDLC )
Software Development Life Cycle (SDLC )Software Development Life Cycle (SDLC )
Software Development Life Cycle (SDLC )
 
Nasrin
NasrinNasrin
Nasrin
 
Aim (A).pptx
Aim (A).pptxAim (A).pptx
Aim (A).pptx
 
Software Testing Training : Tonex Training
Software Testing Training : Tonex TrainingSoftware Testing Training : Tonex Training
Software Testing Training : Tonex Training
 
Unit Testing Software Market Size, Share.pdf
Unit Testing Software Market Size, Share.pdfUnit Testing Software Market Size, Share.pdf
Unit Testing Software Market Size, Share.pdf
 

Mais de Claudia Melo

Ethical Decisions in a Wicked World: The Role of Technologists, Entrepreneurs...
Ethical Decisions in a Wicked World: The Role of Technologists, Entrepreneurs...Ethical Decisions in a Wicked World: The Role of Technologists, Entrepreneurs...
Ethical Decisions in a Wicked World: The Role of Technologists, Entrepreneurs...Claudia Melo
 
Introdução à Qualidade e Testes Ágeis de Software
Introdução à Qualidade e Testes Ágeis de SoftwareIntrodução à Qualidade e Testes Ágeis de Software
Introdução à Qualidade e Testes Ágeis de SoftwareClaudia Melo
 
Introdução a Métodos Ágeis
Introdução a Métodos ÁgeisIntrodução a Métodos Ágeis
Introdução a Métodos ÁgeisClaudia Melo
 
Gerência de configuração ágil
Gerência de configuração ágilGerência de configuração ágil
Gerência de configuração ágilClaudia Melo
 
Requisitos ágeis - Parte 1
Requisitos ágeis - Parte 1Requisitos ágeis - Parte 1
Requisitos ágeis - Parte 1Claudia Melo
 
Introdução à Programação Extrema (Extreme Programming - XP)
Introdução à Programação Extrema (Extreme Programming - XP)Introdução à Programação Extrema (Extreme Programming - XP)
Introdução à Programação Extrema (Extreme Programming - XP)Claudia Melo
 
Introdução à Engenharia de Software
Introdução à Engenharia de SoftwareIntrodução à Engenharia de Software
Introdução à Engenharia de SoftwareClaudia Melo
 
O ideal feminino e a computação v2.0
O ideal feminino e a computação v2.0O ideal feminino e a computação v2.0
O ideal feminino e a computação v2.0Claudia Melo
 
O papel da Agilidade na Economia Digital Descrição, Agile Day, Scopus
O papel da Agilidade na Economia Digital Descrição, Agile Day, ScopusO papel da Agilidade na Economia Digital Descrição, Agile Day, Scopus
O papel da Agilidade na Economia Digital Descrição, Agile Day, ScopusClaudia Melo
 
Diálogo TCU: Governos em Transformação Digital
Diálogo TCU: Governos em Transformação DigitalDiálogo TCU: Governos em Transformação Digital
Diálogo TCU: Governos em Transformação DigitalClaudia Melo
 
Ethics and Sustainability for Techies and Entrepreneurs
Ethics and Sustainability for Techies and EntrepreneursEthics and Sustainability for Techies and Entrepreneurs
Ethics and Sustainability for Techies and EntrepreneursClaudia Melo
 
CSBC'2017 - Diversidade de Gênero na Computação
CSBC'2017 - Diversidade de Gênero na Computação CSBC'2017 - Diversidade de Gênero na Computação
CSBC'2017 - Diversidade de Gênero na Computação Claudia Melo
 
Ethics and sustainability for techies
Ethics and sustainability for techiesEthics and sustainability for techies
Ethics and sustainability for techiesClaudia Melo
 
Princípios da Gestão Ágil
Princípios da Gestão ÁgilPrincípios da Gestão Ágil
Princípios da Gestão ÁgilClaudia Melo
 
Exploring the frontiers of Agile Development in the Digital Era
 Exploring the frontiers of Agile Development in the Digital Era Exploring the frontiers of Agile Development in the Digital Era
Exploring the frontiers of Agile Development in the Digital EraClaudia Melo
 
The Web of Gendered Innovations
The Web of Gendered InnovationsThe Web of Gendered Innovations
The Web of Gendered InnovationsClaudia Melo
 
9 Maneiras de Falhar com KPIs
9 Maneiras de Falhar com KPIs9 Maneiras de Falhar com KPIs
9 Maneiras de Falhar com KPIsClaudia Melo
 
Ser ágil no mundo de tecnologia
Ser ágil no mundo de tecnologiaSer ágil no mundo de tecnologia
Ser ágil no mundo de tecnologiaClaudia Melo
 
Governos em transformação digital: novas tecnologias e métodos, velhos desafi...
Governos em transformação digital: novas tecnologias e métodos, velhos desafi...Governos em transformação digital: novas tecnologias e métodos, velhos desafi...
Governos em transformação digital: novas tecnologias e métodos, velhos desafi...Claudia Melo
 
Minicurso: Uma Introdução ao Desenvolvimento de Software Lean
Minicurso: Uma Introdução ao Desenvolvimento de Software LeanMinicurso: Uma Introdução ao Desenvolvimento de Software Lean
Minicurso: Uma Introdução ao Desenvolvimento de Software LeanClaudia Melo
 

Mais de Claudia Melo (20)

Ethical Decisions in a Wicked World: The Role of Technologists, Entrepreneurs...
Ethical Decisions in a Wicked World: The Role of Technologists, Entrepreneurs...Ethical Decisions in a Wicked World: The Role of Technologists, Entrepreneurs...
Ethical Decisions in a Wicked World: The Role of Technologists, Entrepreneurs...
 
Introdução à Qualidade e Testes Ágeis de Software
Introdução à Qualidade e Testes Ágeis de SoftwareIntrodução à Qualidade e Testes Ágeis de Software
Introdução à Qualidade e Testes Ágeis de Software
 
Introdução a Métodos Ágeis
Introdução a Métodos ÁgeisIntrodução a Métodos Ágeis
Introdução a Métodos Ágeis
 
Gerência de configuração ágil
Gerência de configuração ágilGerência de configuração ágil
Gerência de configuração ágil
 
Requisitos ágeis - Parte 1
Requisitos ágeis - Parte 1Requisitos ágeis - Parte 1
Requisitos ágeis - Parte 1
 
Introdução à Programação Extrema (Extreme Programming - XP)
Introdução à Programação Extrema (Extreme Programming - XP)Introdução à Programação Extrema (Extreme Programming - XP)
Introdução à Programação Extrema (Extreme Programming - XP)
 
Introdução à Engenharia de Software
Introdução à Engenharia de SoftwareIntrodução à Engenharia de Software
Introdução à Engenharia de Software
 
O ideal feminino e a computação v2.0
O ideal feminino e a computação v2.0O ideal feminino e a computação v2.0
O ideal feminino e a computação v2.0
 
O papel da Agilidade na Economia Digital Descrição, Agile Day, Scopus
O papel da Agilidade na Economia Digital Descrição, Agile Day, ScopusO papel da Agilidade na Economia Digital Descrição, Agile Day, Scopus
O papel da Agilidade na Economia Digital Descrição, Agile Day, Scopus
 
Diálogo TCU: Governos em Transformação Digital
Diálogo TCU: Governos em Transformação DigitalDiálogo TCU: Governos em Transformação Digital
Diálogo TCU: Governos em Transformação Digital
 
Ethics and Sustainability for Techies and Entrepreneurs
Ethics and Sustainability for Techies and EntrepreneursEthics and Sustainability for Techies and Entrepreneurs
Ethics and Sustainability for Techies and Entrepreneurs
 
CSBC'2017 - Diversidade de Gênero na Computação
CSBC'2017 - Diversidade de Gênero na Computação CSBC'2017 - Diversidade de Gênero na Computação
CSBC'2017 - Diversidade de Gênero na Computação
 
Ethics and sustainability for techies
Ethics and sustainability for techiesEthics and sustainability for techies
Ethics and sustainability for techies
 
Princípios da Gestão Ágil
Princípios da Gestão ÁgilPrincípios da Gestão Ágil
Princípios da Gestão Ágil
 
Exploring the frontiers of Agile Development in the Digital Era
 Exploring the frontiers of Agile Development in the Digital Era Exploring the frontiers of Agile Development in the Digital Era
Exploring the frontiers of Agile Development in the Digital Era
 
The Web of Gendered Innovations
The Web of Gendered InnovationsThe Web of Gendered Innovations
The Web of Gendered Innovations
 
9 Maneiras de Falhar com KPIs
9 Maneiras de Falhar com KPIs9 Maneiras de Falhar com KPIs
9 Maneiras de Falhar com KPIs
 
Ser ágil no mundo de tecnologia
Ser ágil no mundo de tecnologiaSer ágil no mundo de tecnologia
Ser ágil no mundo de tecnologia
 
Governos em transformação digital: novas tecnologias e métodos, velhos desafi...
Governos em transformação digital: novas tecnologias e métodos, velhos desafi...Governos em transformação digital: novas tecnologias e métodos, velhos desafi...
Governos em transformação digital: novas tecnologias e métodos, velhos desafi...
 
Minicurso: Uma Introdução ao Desenvolvimento de Software Lean
Minicurso: Uma Introdução ao Desenvolvimento de Software LeanMinicurso: Uma Introdução ao Desenvolvimento de Software Lean
Minicurso: Uma Introdução ao Desenvolvimento de Software Lean
 

Último

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Último (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

A Method for Evaluating End-User Development Technologies

  • 1. Americas Conference on Information Systems, AMCIS 2017, Aug, 10th A METHOD FOR EVALUATING END-USER DEVELOPMENTTECHNOLOGIES Prof. Dr. Claudia Melo, Dep. of Computer Science Jonathan Moraes, Fac. of Software Engineering Marcelo Ferreira, Fac. of Software Engineering Prof. Dr. Rejane Figueiredo, Fac. of Software EngineeringUniversity of Brasília, Brazil
  • 2. WHY ARE WE INVESTIGATING EUD TECHNOLOGY EVALUATION? •# of end users > # of professional so1ware developers •> 50M end-user developers, USA only (Burne9 and Myers, 2014) • Li9le research has empirically examined so1ware package evalua7on criteria and techniques in general, and in the end-user development context in par7cular (Harnisch, 2014; Jadhav and Sonar, 2009; Jadhav and Sonar, 2011; Misra and Mohanty, 2003) • Success and failure of end- user development within an organizaOon ulOmately depends on how effec7ve so1ware packages are chosen and used 2
  • 3. • This research study is part of a partnership with the Ministry of CommunicaOons, Science, and Technology, Brazil • Plenty of EUD tools being offered in the market • OrganizaOons sOll lost on how to take full advantage of EUD (facing cultural, managerial and technological challenges). But already buying soluOons! INDUSTRY CONTEXT 3
  • 4. Three different areas have important, but parOal, contribuOons to our research purpose: •So#ware package acquisi1on research; •So#ware quality models & CSCW/HCI research, and •Technology acceptance research. LITERATURE REVIEW 4
  • 5. WHAT WAS CONSIDERED AS A STARTING POINT? The model should evaluate technologies that have: •Essen1al quali1es that enable the end-user developer to manipulate the tool and produce useful results in a certain applica1on domain •from so]ware quality models and CSCW/HCI models; •General quali1es inherent to so#ware packages •from so]ware package acquisiOon models and technology acceptance models; •Essen1al quali1es for management and technological governance •from so]ware package acquisiOon models; •An evalua1on method based on already-established and tested techniques, even if they come from a different context 5
  • 6. • Evalua1on criteria, characteris1cs, sub characteris1cs, and aJributes • Developed ques1ons and metrics from different points-of- view (PoV). STRUCTURING THE EVALUATION MODEL 6
  • 7. THE EVALUATION METHOD 1. Functional characteristics: ○Functionality (3 questions, PoV: Governance/Platform) ○Collaboration (13 questions, PoV: EUD/Platform) ○Data Management (4 questions, PoV: EUD/Platform & 4 questions, PoV: Governance/Platform) 2. Cost and Benefit Characteristics (6 questions, PoV: Governance/Platform) 3.Vendor Characteristics (4 questions, PoV: Governance/Platform) 4. Software Quality Characteristics ○ Compatibility (6 questions, PoV: EUD / Platform) ○ Maintainability (6 questions, PoV: EUD / Platform) ○ Usability (212 questions, PoV: EUD / Platform) ○ Reliability (7 questions, PoV: IT Manager/Platform) ○ Performance Efficiency (6 questions, PoV: EUD / Platform) ○ Security (5 questions, PoV: Governance/Platform & 1 question, PoV: EUD/Platform/Developed Application & 9 questions, PoV: EUD / Platform) 5.Hardware & Software Configuration (8 questions) The complete EUD technology evaluation model is available at: https://itrac.github.io/eud_technology_evaluation 7
  • 8. EVALUATING EUD TECHNOLOGIES - STEPS 1. Determining the need, including high-level investigation of software features and capabilities provided by vendors August/2016 to October/2016 - literature review and contact with leaders of public and private organizations to build a general list of tools. 2. Short listing candidate packages and eliminating the candidate packages that do not have the required feature We shortlisted the most solid market offers (Forrester, 2016). 8
  • 9. 3. Using the proposed evaluation technique to evaluate remaining packages and obtain a score 4. Pilot testing the tool in an appropriate environment (parallel to 3) Fundamental to refine the model proposed (removing, rewriting, and adding questions/metrics). The evaluation model and the platform evaluation results presented in this work are already the result from a second evaluation iteration EVALUATING EUD TECHNOLOGIES - RESEARCH STEPS 9
  • 10. EXECUTION DETAILS The platforms: ● OutSystems ● Oracle Apex ● Salesforce Lightning¹ ● Zoho Creator¹ 1 - The Salesforce Lightning and Zoho Creator evaluations are not described in the paper. 10
  • 11. Testing: • 3 software engineering students as testers; • Each student performed the entire model for every platform using four default scenarios (C-R-U-D) • Either using the platform’s predefined templates or not. • A researcher supervised the testers and validated the forms. EXECUTION DETAILS 11
  • 12. Results: Functional Characteristics Functionality Sub-Characteristics Oracle Apex OutSystems Salesforce Lightning Zoho Creator Application Domain Database General-purpose General-purpose Database Collaboration Shareability ✔ ✔ ✔ ✔ Coordination of Actions ✔ ✔ ✔ ✘ Consequential Communication 60% 60% 60% 80% 12
  • 13. Results: Functional Characteristics Collaboration Sub-Characteristics Oracle Apex OutSystems Salesforce Lightning Zoho Creator Finding Collaborators and Establishing Contact 75% 0% 50% 100% Concurrent Protection 0% 50% 0% 50% Data Management Data Input and Output 100% 100% 100% 66% Required Technical Knowledge 33% 33% 33% 0% 13
  • 14. Results: Cost and Benefit & Vendor Characteristic Cost Sub-Characteristics Oracle Apex OutSystems Salesforce Lightning Zoho Creator License Cost $ 164,839.00 $ 2,072,601.74 $ 3,600.00 per user/ year $ 1999.00 per month Maintenance Cost N/A N/A N/A N/A Vendor Contract Dependency 100% 100% 100% 100% Technology Dependency 100% 0% 0% 100% 14
  • 15. Results: Software Quality Characteristics Compatibility Sub-Characteristics Oracle Apex OutSystems Salesforce Lightning Zoho Creator Technical Knowledge Requirement Advanced Advanced N/A Average Data Exchangeability ✘ ✔ ✘ ✘ Connectivity With External Component/ System Possible Possible Impossible Possible Reusability ✔ ✔ N/A ✔ 15
  • 16. Results: Software Quality Characteristics Maintainability Sub-Characteristics Oracle Apex OutSystems Salesforce Lightning Zoho Creator Modifiability 100% 100% 50% 100% Reusability Possible, Easy Possible, Easy Possible, Average Possible, Hard Reliability Availability N/A N/A N/A N/A Vendor Support 0.41 fixes/day 0.43 fixes/day 0.12 fixes/day 0.73 fixes/day 16
  • 17. Results: Software Quality Characteristics Performance Efficiency Sub-Characteristics Oracle Apex OutSystems Salesforce Lightning Zoho Creator Response Time 100% 100% 100% 100% Turnaround Time 50% 100% 75% 100% Security Access Behaviors 80% 60% 60% 20% Developed Application Security 100% 100% 100% 0% 17
  • 18. Results: Software Quality Characteristics Security Sub-Characteristics Oracle Apex OutSystems Salesforce Lightning Zoho Creator Update Behaviors 100% 50% 100% N/A File Upload Security 100% 100% 100% 100% Report Behaviors ✔ ✔ ✘ ✘ Security Algorithms 50% 100% 100% 50% 18
  • 20. CONCLUSION ● The major original contributions of the paper are: ○ A detailed method for evaluating EUD technologies that comprises 11 characteristics, 20 sub-characteristics, 30 attributes, 300 questions/metrics, and ○ Evaluations using the method against 4 leading EUD platforms in the market (we described only 2 in the paper) ○ Next steps: validation with real-world scenarios (e.g. action research) & investigation of automation opportunities 20
  • 21. Questions? Thanks! claudiam@unb.br Claudia Melo 21 Acknowledgement: this research received support from Fundação de Apoio a Pesquisa do Distrito Federal (FAP-DF)