1 / 20

CHAPTER 11

CHAPTER 11. Facilitating User Computing. END-USER COMPUTING. HANDS-ON USE OF COMPUTERS BY EMPLOYEES ENTER DATA MAKE INQUIRIES PREPARE REPORTS PERFORM STATISTICAL ANALYSIS ANALYZE PROBLEMS DEVELOP WEB PAGES *. PRIMARY DRIVERS. AVAILABILITY OF LOW-COST MICROCOMPUTERS:

andrew
Download Presentation

CHAPTER 11

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CHAPTER 11 Facilitating User Computing

  2. END-USER COMPUTING • HANDS-ON USE OF COMPUTERS BY EMPLOYEES • ENTER DATA • MAKE INQUIRIES • PREPARE REPORTS • PERFORM STATISTICAL ANALYSIS • ANALYZE PROBLEMS • DEVELOP WEB PAGES *

  3. PRIMARY DRIVERS • AVAILABILITY OF LOW-COST MICROCOMPUTERS: • HIGH-LEVEL LANGUAGES • COMPUTER LITERACY AMONG COLLEGE GRADUATES, PROFESSIONALS • INCREASED USER FRUSTRATIONS ABOUT NEW PROJECT BACKLOGS *

  4. USER APPLICATION DEVELOPMENT • USE OF COMPUTER TOOLS • DEVELOP BUSINESS APPLICATIONS • USERS ARE NOT IS SPECIALISTS • INVOLVES APPLICATION, TOOL & DEVELOPER *

  5. USER-DEVELOPED APPLICATIONSADVANTAGES • INCREASED USER CONTROL OVER PROJECT • INCREASED USER ACCEPTANCE OF SOLUTION • FREES IS RESOURCES • INCREASES USERS’ KNOWLEDGE OF IT *

  6. USER-DEVELOPED APPLICATIONSDISADVANTAGES • LOSS OF QUALITY CONTROL • INCREASES OPERATIONAL RISKS DUE TO DEVELOPED TURNOVER • POTENTIAL LABOR/TIME INEFFICIENCIES • LOSS OF INTEGRATION OPPORTUNITIES/CAPABILITIES *

  7. CHARACTERISTICS • APPLICATION: • SCOPE: Personal, departmental, organizational • CRITICALITY/IMPACT: Risk exposure • SIZE & USAGE: One-time, periodic, ongoing • PROBLEM COMPLEXITY: Structure, how common is task? *

  8. CHARACTERISTICS • TOOL: • SOPHISTICATION, COMPLEXITY • INTERCONNECTEDNESS • DEVELOPER: • USER SKILLS, EXPERIENCE, AVAILABILITY • IS SPECIALIST SKILLS, EXPERIENCE, AVAILABILITY *

  9. EXTENT OF INTERCONNECTEDNESS*STAGE EXTENT OF INTERCONNECTEDNESS • ISOLATION: Application does not use or create data for another application • STAND-ALONE: Application uses manually entered computer-generated data from reports, printouts • MANUAL INTEGRATION: Data electronically transferred from another application, manually (e.g., file on disk) * * Adapted from Huff, Munro & Martin, 1988

  10. EXTENT OF INTERCONNECTEDNESS*STAGE EXTENT OF INTERCONNECTEDNESS • AUTOMATED INTEGRATION: Application electronically connected with one or more databases/applications using automated scripts • DISTRIBUTED INTEGRATION: Application uses data created, stored, maintained by organization’s systems under control of IS specialists * * Adapted from Huff, Munro & Martin, 1988

  11. DEVELOPED FOR OTHER USERS DEVELOPED FOR SELF USER ONLY SMALL, SIMPLE LARGE, COMPLEX GUIDELINES FOR CHOOSING DEVELOPMENT PROCESS 1. SDLC OR PROTOTYPING, DISCIPLINED APPROACH TO DEFINITION & IMPLEMENTATION 2. SDLC, CLEAR “HANDS-OFF” BETWEEN PHASES 3. “COLLAPSED” LIFE CYCLE 4. DISCIPLINED, ITERATIVE DEVELOPMENT

  12. ORGANIZATION LEVEL CONTEXT: ORGANIZATIONAL LEVEL FACTORS DEPARTMENTAL LEVEL FACTORS STATUS OF IS/USER PARTNERSHIP STRATEGY SUPPORT & CONTROL ACTIONS TECHNOLOGY INDIVIDUAL LEVEL USER DEVELOPER DEVELOPMENT PROCESS TASK TOOL LEVERAGING END-USER COMPUTING* *Based on Branceau & Brown, 1993

  13. ORGANIZATIONAL LEVEL • STRATEGY: Strategic objectives and approach to end-user computing • TECHNOLOGY: Range & accessibility of end-user tools • SUPPORT & CONTROL ACTIONS: Support services, control policies & procedures *

  14. HIGH LOW LOW HIGH EXPANSION/CONTROL MATRIX* EXPANSION CONTROL *Based on Monroe et al., 1987-1988; Brancheau & Amoroso, 1990

  15. EVOLUTION OF INFORMATION CENTERSTAGE ONE: • REACTIVE SERVICES • INDIVIDUAL SOLUTIONS • PRODUCT TRAINING • ALL NEEDS SUPPORTED • COMPUTER LITERACY TRAINING • ONE-WAY RELATIONSHIPS *

  16. EVOLUTION OF INFORMATION CENTERSTAGE TWO: • PROACTIVE SERVICES • DEPARTMENTAL SOLUTIONS • BUSINESS PROBLEM-SOLVING • HIGH-PAYOFF NEEDS SUPPORTED • INFORMATION LITERACY EDUCATION • ALLIANCE: IS/USER ALLIANCE *

  17. COMMON SUPPORT SERVICES • TROUBLESHOOTING • CONSULTING • TRAINING & IS EDUCATION • PRODUCT RESEARCH & EVALUATION • INFORMATION SHARING • TOOL SELECTION & PURCHASING • TOOL INSTALLATION, MAINTENANCE & UPGRADING *

  18. COMMON POLICIES & PROCEDURES • PRODUCT STANDARDS • ERGONOMICS • PRODUCT PURCHASES • INVENTORY CONTROL • UPGRADE PROCEDURES • QUALITY REVIEW • IDENTIFYING CRITICAL APPLICATIONS & DATA *

  19. COMMON POLICIES & PROCEDURES • DATA ACCESS • BACKUP PROCEDURES • AUDIT TRAILS • DOCUMENTATION STANDARDS • UNAUTHORIZED ACCESS • UNAUTHORIZED SOFTWARE COPYING • VIRUS PROTECTION *

  20. CHAPTER 11 Facilitating User Computing

More Related