22:
190:
In businesses, an end-user concept gives workers more flexibility, as well as more opportunities for better productivity and creativity. However, EUC will work only when leveraged correctly. That’s why it requires a full-fledged strategy. Any strategy should include all the tools users might need to
227:
Business owners should understand that every user-controlled app needs to be monitored and supervised. Otherwise, organization risk facing a lot of problems and losses if end-users don’t follow company policy or leave their job. In functions such as finance, accounting and regulated activities,
183:). These are the potential areas where EUC can play a major role. Then ASSIMPLER parameters should be applied to these white spaces to develop the EUC strategy. (ASSIMPLER stands for availability, scalability, security, interoperability, maintainability, performance, low
481:
How should the business services be designed in terms of availability, security, scalability, interoperability, maintenance, performance, lower cost, extendibility and reliability (ASSIMPLER) from end consumer
518:
551:
309:
90:
into the computing environment. These approaches attempt to realize the potential for high-end computing to perform problem-solving in a trustworthy manner.
566:
93:
End-user computing can range in complexity from users simply clicking a series of buttons, to citizen developers writing scripts in a controlled
101:
113:
374:
262:
Many companies elect to leverage software to manage their EUC risks. Software can provide many benefits to organizations, including:
382:
494:
421:
373:. ACM CHI 97 Human Factors in Computing Systems Conference. Los Angeles, Los Angeles County, California, United States of America:
461:
32:
176:
315:
180:
159:, configuration and maintenance. End-user computing allows more user-input into system affairs that can range from
175:
Strategy / IT Strategy should consider the white spaces in automation (enterprise functionality not automated by
141:
445:
172:
152:
320:
293:
335:
156:
148:
345:
325:
303:
171:
EUC applications should not be evolved by accident, but there should be a defined EUC strategy. Any
83:
298:
133:
94:
433:
429:
378:
184:
87:
425:
160:
117:
418:
340:
137:
43:
560:
228:
unmanaged EUC may expose the organization to regulatory compliance issues and fines.
155:
versus language interfaces, open versus closed, and others). Other issues relate to
405:
199:
End-user computing covers a broad range of user-facing resources, including:
366:
330:
129:
446:"Definition of Citizen Developer - Gartner Information Technology Glossary"
371:
CHI EA '97 CHI '97 Extended
Abstracts on Human Factors in Computing Systems
406:
Towards User-Oriented control of End-User
Computing in Large Organizations
86:. EUC is a group of approaches to computing that aim to better integrate
547:
EUSES Consortium, a collaboration that researches end-user computing.
105:
519:"End-user computing risk management solution of the year: Apparity"
231:
End-user computing operating and business risks may be driven by:
128:
Factors contributing to the need for further EUC research include
495:"What is end-user computing (EUC)? - Definition from WhatIs.com"
241:
lack of documentation and reliance on end-user who developed it;
82:) refers to systems in which non-programmers can create working
546:
209:
scripting languages such as robotic desktop automation or RDA;
109:
15:
462:"Business Value Assurance during the transformation journey"
55:
47:
147:
Some of the issues related to end-user computing concern
269:
reduction in manual effort required for manual controls;
51:
100:
Examples of end-user computing are systems built using
39:
97:, to being able to modify and execute code directly.
552:Relationship Between Leadership and EUC Efficiency
191:carry out their tasks and work more productively.
310:Journal of Organizational and End User Computing
8:
206:desktop operating systems and applications;
266:automation of risk management activities;
357:
279:Examples of EUC risk software include:
163:to full-fledged ownership of a system.
102:fourth-generation programming languages
33:instructions, advice, or how-to content
272:version controls for EUC applications;
114:fifth-generation programming languages
419:Advances in End User Computing Series
275:change controls for EUC applications.
238:lack of version & change control;
7:
375:Association for Computing Machinery
215:mobile, web and cloud applications;
42:so that it is more encyclopedic or
187:, extendibility and reliability.)
14:
218:virtual desktops and applications
253:overreliance on manual controls.
20:
203:desktop and notebook computers;
244:lack of maintenance processes;
1:
365:Goodall, Howie (March 1997).
181:Enterprise Grade Applications
258:EUC risk management software
316:Knowledge-based engineering
583:
567:Human–computer interaction
428:University of Texas, USA,
212:smartphones and wearables;
235:lack of rigorous testing;
142:interactive visualization
173:Application Architecture
321:Situational application
294:Decentralized computing
499:SearchMobileComputing
336:Usability engineering
157:intellectual property
149:software architecture
367:"End-user computing"
346:User-centered design
326:Software engineering
304:End-user development
250:lack of audit trail;
299:Defensive computing
134:pervasive computing
40:rewrite the content
424:2007-01-29 at the
95:scripting language
76:End-user computing
460:Vanarse, Mandar.
247:lack of security;
185:cost of ownership
73:
72:
574:
534:
533:
531:
529:
515:
509:
508:
506:
505:
491:
485:
484:
478:
476:
466:
456:
450:
449:
442:
436:
415:
409:
404:McBride, Neil, "
402:
396:
395:
393:
391:
362:
223:EUC risk drivers
144:, and the like.
112:, or one of the
68:
65:
59:
24:
23:
16:
582:
581:
577:
576:
575:
573:
572:
571:
557:
556:
543:
538:
537:
527:
525:
517:
516:
512:
503:
501:
493:
492:
488:
474:
472:
471:. Wipro Limited
464:
459:
457:
453:
444:
443:
439:
426:Wayback Machine
417:Mahmood, Adam,
416:
412:
403:
399:
389:
387:
385:
377:. p. 132.
364:
363:
359:
354:
290:
260:
225:
169:
161:personalization
126:
69:
63:
60:
37:
25:
21:
12:
11:
5:
580:
578:
570:
569:
559:
558:
555:
554:
549:
542:
541:External links
539:
536:
535:
510:
486:
451:
437:
410:
397:
383:
356:
355:
353:
350:
349:
348:
343:
341:User interface
338:
333:
328:
323:
318:
313:
306:
301:
296:
289:
286:
285:
284:
277:
276:
273:
270:
267:
259:
256:
255:
254:
251:
248:
245:
242:
239:
236:
224:
221:
220:
219:
216:
213:
210:
207:
204:
168:
165:
125:
122:
71:
70:
28:
26:
19:
13:
10:
9:
6:
4:
3:
2:
579:
568:
565:
564:
562:
553:
550:
548:
545:
544:
540:
524:
520:
514:
511:
500:
496:
490:
487:
483:
470:
463:
455:
452:
447:
441:
438:
435:
431:
427:
423:
420:
414:
411:
407:
401:
398:
386:
384:0-89791-926-2
380:
376:
372:
368:
361:
358:
351:
347:
344:
342:
339:
337:
334:
332:
329:
327:
324:
322:
319:
317:
314:
312:
311:
307:
305:
302:
300:
297:
295:
292:
291:
287:
282:
281:
280:
274:
271:
268:
265:
264:
263:
257:
252:
249:
246:
243:
240:
237:
234:
233:
232:
229:
222:
217:
214:
211:
208:
205:
202:
201:
200:
197:
196:
192:
188:
186:
182:
178:
174:
166:
164:
162:
158:
154:
150:
145:
143:
139:
135:
131:
123:
121:
119:
115:
111:
107:
103:
98:
96:
91:
89:
85:
81:
77:
67:
57:
53:
49:
45:
41:
35:
34:
29:This article
27:
18:
17:
526:. Retrieved
523:InsuranceERM
522:
513:
502:. Retrieved
498:
489:
482:perspective?
480:
473:. Retrieved
468:
454:
440:
413:
400:
388:. Retrieved
370:
360:
308:
278:
261:
230:
226:
198:
195:Types of EUC
194:
193:
189:
170:
167:EUC strategy
146:
136:, issues of
132:processing,
127:
99:
92:
84:applications
79:
75:
74:
61:
38:Please help
30:
390:30 December
48:Wikiversity
504:2019-12-04
352:References
116:, such as
104:, such as
56:Wikivoyage
458:Compare:
434:1537-9310
331:Usability
130:knowledge
88:end users
64:July 2021
52:Wikibooks
31:contains
561:Category
422:Archived
288:See also
283:apparity
138:ontology
475:26 July
124:Factors
432:
381:
153:iconic
106:MAPPER
46:it to
528:2 May
469:Wipro
465:(PDF)
54:, or
530:2023
477:2015
430:ISSN
392:2015
379:ISBN
118:ICAD
44:move
177:ERP
110:SQL
108:or
80:EUC
563::
521:.
497:.
479:.
467:.
369:.
179:/
140:,
120:.
50:,
532:.
507:.
448:.
408:"
394:.
151:(
78:(
66:)
62:(
58:.
36:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.