Knowledge

End-user computing

Source đź“ť

22: 190:
In businesses, an end-user concept gives workers more flexibility, as well as more opportunities for better productivity and creativity. However, EUC will work only when leveraged correctly. That’s why it requires a full-fledged strategy. Any strategy should include all the tools users might need to
227:
Business owners should understand that every user-controlled app needs to be monitored and supervised. Otherwise, organization risk facing a lot of problems and losses if end-users don’t follow company policy or leave their job. In functions such as finance, accounting and regulated activities,
183:). These are the potential areas where EUC can play a major role. Then ASSIMPLER parameters should be applied to these white spaces to develop the EUC strategy. (ASSIMPLER stands for availability, scalability, security, interoperability, maintainability, performance, low 481:
How should the business services be designed in terms of availability, security, scalability, interoperability, maintenance, performance, lower cost, extendibility and reliability (ASSIMPLER) from end consumer
518: 551: 309: 90:
into the computing environment. These approaches attempt to realize the potential for high-end computing to perform problem-solving in a trustworthy manner.
566: 93:
End-user computing can range in complexity from users simply clicking a series of buttons, to citizen developers writing scripts in a controlled
101: 113: 374: 262:
Many companies elect to leverage software to manage their EUC risks. Software can provide many benefits to organizations, including:
382: 494: 421: 373:. ACM CHI 97 Human Factors in Computing Systems Conference. Los Angeles, Los Angeles County, California, United States of America: 461: 32: 176: 315: 180: 159:, configuration and maintenance. End-user computing allows more user-input into system affairs that can range from 175:
Strategy / IT Strategy should consider the white spaces in automation (enterprise functionality not automated by
141: 445: 172: 152: 320: 293: 335: 156: 148: 345: 325: 303: 171:
EUC applications should not be evolved by accident, but there should be a defined EUC strategy. Any
83: 298: 133: 94: 433: 429: 378: 184: 87: 425: 160: 117: 418: 340: 137: 43: 560: 228:
unmanaged EUC may expose the organization to regulatory compliance issues and fines.
155:
versus language interfaces, open versus closed, and others). Other issues relate to
405: 199:
End-user computing covers a broad range of user-facing resources, including:
366: 330: 129: 446:"Definition of Citizen Developer - Gartner Information Technology Glossary" 371:
CHI EA '97 CHI '97 Extended Abstracts on Human Factors in Computing Systems
406:
Towards User-Oriented control of End-User Computing in Large Organizations
86:. EUC is a group of approaches to computing that aim to better integrate 547:
EUSES Consortium, a collaboration that researches end-user computing.
105: 519:"End-user computing risk management solution of the year: Apparity" 231:
End-user computing operating and business risks may be driven by:
128:
Factors contributing to the need for further EUC research include
495:"What is end-user computing (EUC)? - Definition from WhatIs.com" 241:
lack of documentation and reliance on end-user who developed it;
82:) refers to systems in which non-programmers can create working 546: 209:
scripting languages such as robotic desktop automation or RDA;
109: 15: 462:"Business Value Assurance during the transformation journey" 55: 47: 147:
Some of the issues related to end-user computing concern
269:
reduction in manual effort required for manual controls;
51: 100:
Examples of end-user computing are systems built using
39: 97:, to being able to modify and execute code directly. 552:Relationship Between Leadership and EUC Efficiency 191:carry out their tasks and work more productively. 310:Journal of Organizational and End User Computing 8: 206:desktop operating systems and applications; 266:automation of risk management activities; 357: 279:Examples of EUC risk software include: 163:to full-fledged ownership of a system. 102:fourth-generation programming languages 33:instructions, advice, or how-to content 272:version controls for EUC applications; 114:fifth-generation programming languages 419:Advances in End User Computing Series 275:change controls for EUC applications. 238:lack of version & change control; 7: 375:Association for Computing Machinery 215:mobile, web and cloud applications; 42:so that it is more encyclopedic or 187:, extendibility and reliability.) 14: 218:virtual desktops and applications 253:overreliance on manual controls. 20: 203:desktop and notebook computers; 244:lack of maintenance processes; 1: 365:Goodall, Howie (March 1997). 181:Enterprise Grade Applications 258:EUC risk management software 316:Knowledge-based engineering 583: 567:Human–computer interaction 428:University of Texas, USA, 212:smartphones and wearables; 235:lack of rigorous testing; 142:interactive visualization 173:Application Architecture 321:Situational application 294:Decentralized computing 499:SearchMobileComputing 336:Usability engineering 157:intellectual property 149:software architecture 367:"End-user computing" 346:User-centered design 326:Software engineering 304:End-user development 250:lack of audit trail; 299:Defensive computing 134:pervasive computing 40:rewrite the content 424:2007-01-29 at the 95:scripting language 76:End-user computing 460:Vanarse, Mandar. 247:lack of security; 185:cost of ownership 73: 72: 574: 534: 533: 531: 529: 515: 509: 508: 506: 505: 491: 485: 484: 478: 476: 466: 456: 450: 449: 442: 436: 415: 409: 404:McBride, Neil, " 402: 396: 395: 393: 391: 362: 223:EUC risk drivers 144:, and the like. 112:, or one of the 68: 65: 59: 24: 23: 16: 582: 581: 577: 576: 575: 573: 572: 571: 557: 556: 543: 538: 537: 527: 525: 517: 516: 512: 503: 501: 493: 492: 488: 474: 472: 471:. Wipro Limited 464: 459: 457: 453: 444: 443: 439: 426:Wayback Machine 417:Mahmood, Adam, 416: 412: 403: 399: 389: 387: 385: 377:. p. 132. 364: 363: 359: 354: 290: 260: 225: 169: 161:personalization 126: 69: 63: 60: 37: 25: 21: 12: 11: 5: 580: 578: 570: 569: 559: 558: 555: 554: 549: 542: 541:External links 539: 536: 535: 510: 486: 451: 437: 410: 397: 383: 356: 355: 353: 350: 349: 348: 343: 341:User interface 338: 333: 328: 323: 318: 313: 306: 301: 296: 289: 286: 285: 284: 277: 276: 273: 270: 267: 259: 256: 255: 254: 251: 248: 245: 242: 239: 236: 224: 221: 220: 219: 216: 213: 210: 207: 204: 168: 165: 125: 122: 71: 70: 28: 26: 19: 13: 10: 9: 6: 4: 3: 2: 579: 568: 565: 564: 562: 553: 550: 548: 545: 544: 540: 524: 520: 514: 511: 500: 496: 490: 487: 483: 470: 463: 455: 452: 447: 441: 438: 435: 431: 427: 423: 420: 414: 411: 407: 401: 398: 386: 384:0-89791-926-2 380: 376: 372: 368: 361: 358: 351: 347: 344: 342: 339: 337: 334: 332: 329: 327: 324: 322: 319: 317: 314: 312: 311: 307: 305: 302: 300: 297: 295: 292: 291: 287: 282: 281: 280: 274: 271: 268: 265: 264: 263: 257: 252: 249: 246: 243: 240: 237: 234: 233: 232: 229: 222: 217: 214: 211: 208: 205: 202: 201: 200: 197: 196: 192: 188: 186: 182: 178: 174: 166: 164: 162: 158: 154: 150: 145: 143: 139: 135: 131: 123: 121: 119: 115: 111: 107: 103: 98: 96: 91: 89: 85: 81: 77: 67: 57: 53: 49: 45: 41: 35: 34: 29:This article 27: 18: 17: 526:. Retrieved 523:InsuranceERM 522: 513: 502:. Retrieved 498: 489: 482:perspective? 480: 473:. Retrieved 468: 454: 440: 413: 400: 388:. Retrieved 370: 360: 308: 278: 261: 230: 226: 198: 195:Types of EUC 194: 193: 189: 170: 167:EUC strategy 146: 136:, issues of 132:processing, 127: 99: 92: 84:applications 79: 75: 74: 61: 38:Please help 30: 390:30 December 48:Wikiversity 504:2019-12-04 352:References 116:, such as 104:, such as 56:Wikivoyage 458:Compare: 434:1537-9310 331:Usability 130:knowledge 88:end users 64:July 2021 52:Wikibooks 31:contains 561:Category 422:Archived 288:See also 283:apparity 138:ontology 475:26 July 124:Factors 432:  381:  153:iconic 106:MAPPER 46:it to 528:2 May 469:Wipro 465:(PDF) 54:, or 530:2023 477:2015 430:ISSN 392:2015 379:ISBN 118:ICAD 44:move 177:ERP 110:SQL 108:or 80:EUC 563:: 521:. 497:. 479:. 467:. 369:. 179:/ 140:, 120:. 50:, 532:. 507:. 448:. 408:" 394:. 151:( 78:( 66:) 62:( 58:. 36:.

Index

instructions, advice, or how-to content
rewrite the content
move
Wikiversity
Wikibooks
Wikivoyage
applications
end users
scripting language
fourth-generation programming languages
MAPPER
SQL
fifth-generation programming languages
ICAD
knowledge
pervasive computing
ontology
interactive visualization
software architecture
iconic
intellectual property
personalization
Application Architecture
ERP
Enterprise Grade Applications
cost of ownership
Decentralized computing
Defensive computing
End-user development
Journal of Organizational and End User Computing

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑