SlideShare une entreprise Scribd logo
1  sur  19
END USER COMPUTING
END USER COMPUTING


   In computing, End User Computing (EUC) refer to systems in
   which non-programmers can create working applications.



   EUC is a group of approaches to computing that aim at better
   integrating end users into the computing environment. These
   approaches attempt to realize the potential for high-end
   computing to perform in a trustworthy manner in problem
   solving of the highest order
END USER COMPUTING


     The term end-user computing has different meanings according
      to the context in which it is used. The following statements could
      all refer to end-user computing:
      ◦ all tools by which non-data-processing staff handle their own
         problems without professional programmers;
      ◦ creative use of data processing by non-data-processing experts;
      ◦ complex computing by non-data-processing professionals to
         answer organisational information needs;
      ◦ non-technical end-users using user-friendly, fourth-generation
         languages (4GLs) and PCs to generate reports or build decision
         support systems;
      ◦ the use of computer hardware and software by people in
         organisations whose jobs are usually classified as net users of
         information systems rather than net developers of information
         systems.
END USER COMPUTING

   Who are the End Users ?


      Non programming
      Command level
      End-user programmers
       (including senior management professionals)
      Functional support personnel
      End user computing support personnel
      DP Programmers
END USER COMPUTING


     End-user computing (EUC): All uses of computers
      by business people who are not information systems
      professionals.

     End-user development (EUD): Systems
      development and programming undertaken by non-IS
      staff.
END USER IS - Services

     End-user IS services: All services required to support
      end-users in running their PCs and developing and
      using applications

      1.   Provide a help-desk service.
      2.   Achieve standardisation of software.
      3.   Ensure network efficiency.
      4.   Provide training.
      5.   Delivering services to end-users cost-effectively.
END USER COMPUTING

   Advantages

    Systems tailored to users

    Enables creative use of IS

    Generates competitive advantage

    Puts users nearer the information

    Allows for variety

    Increases user awareness of IS

    Relieves work load of IT professional
END USER COMPUTING

   Disadvantages

    Produces inappropriate systems

    Causes duplication

    Takes users away from their real job

    Ignores long range and technical issues

    Causes integration problems
END USER COMPUTING
END USER COMPUTING
   •Service Desk – Global Service Desk handling 10mn trouble tickets and
   7mn service desk calls per annum in 20 languages. 17 Global delivery
   centers spread across the world with 7 near shore centers
   •Client Application Management services – Deliver Application
   Packaging, Imaging, Software Distribution and Patch Management
   services in a centralized factory construct. 5000+ Applications packaged
   and distributed annually.
   •Messaging & Collaboration Services – Build, operate and provide
   professional services on email and collaboration platforms like Microsoft
   Exchange, IBM Lotus Notes. Monitor and support more than 800,000
   mailboxes globally
   •Asset Management – Provide a complete Asset Management
   Lifecycle service right from ordering to ongoing management and tracking
   of client assets.
   •Client Support Services – Provide onsite support for Desktops,
   Laptops, Printers, Handheld devices at client locations spread
   globally. Global Network of Client support specialists supporting
   approximately 3 million client devices distributed globally.
   •Infrastructure Application – Build and Manage Infrastructrue
   Applications in customer environments. These services include Directory
   Services, File and Print services, Remote Access Managent, Application
   delivery using Citirix, Microsoft App-V etc.
END USER COMPUTING


     The three main types of end-user computing can be defined as:

      ◦ End-user-developed computer-based information systems for
        personal, departmental or organisation-wide use, where the end-
        user is a non-IT professional;


      ◦ End-user control of which hardware and package applications are
        purchased for use in their department;


      ◦ End-user use of existing information systems.
END USER - development

      End-user development of applications represents a major trend
       in the use of information technology in organisations.

      McGill et al. (2003) explain that:

       ‘User-developed applications (UDAs) are computer based
         applications for which non-information systems professionals
         assume primary development responsibility.
       They support decision making and organizational processes in the
         majority of Organizations’
END USER - Applications

     Reports from a corporate database using standard enquiries defined by the IS/IT
      function
     Simple ad hoc queries to databases defined by the user. For someone in an
      airline, for example, these might include access to a frequent flier
      database, customer reservation system or crew rostering system to monitor
      performance of each
     What-if? analysis using tools such as spreadsheet models or more specialised tools
      such as risk or financial management packages or business intelligence
      software, used for monitoring sales and marketing performance of information
      stored in a data warehouse
     Writing company information for a company intranet
     Development of applications such as a job costing tool or production scheduling
      system, using easy-to-use, high-level tools such as application generators, PC
      database management systems such as Microsoft Access or Borland or visual
      programming environments such as Microsoft Visual Basic.
END USER COMPUTING



     Applications backlog: The demand for new applications by users exceeds the
      capacity of the IS department or IS outsourcing company to develop them.
     Improved toolsets such as Visual Basic for Applications
     The desire by users to query and analyse data and generate reports from
      information stored on databases available across the corporate network
     A trend to decentralisation of computing to user departments for systems to
      support departmental activities
     Reduced expense of application development when conducted by end-users
      (from departmental rather than information systems budget)
     Better fit between end-user-developed software and their requirements (since no
      requirements translation is needed between the users and third-party
      developers). End-users are also less likely to ‘over-engineer’ a solution to a basic
      problem than an IS professional who will want to treat every problem with rigour.
END USER COMPUTING




 Figure 16.6 A model of IS success that can be applied to end-user developed
 applications
END USER COMPUTING


    Isolation: A few scattered pioneers of EUD develop small-scale business      tools within their area.
     Initially, little support from central IS.
    Standalone: Larger-scale applications that may be of importance to a department are developed. At
     this stage, an information centre may be developed to support an increase in demand for user
     computing services.
    Manual integration: Here, different end-user applications need to exchange data. This happens
     through manual intervention, with files being transferred   by floppy disk or across the network or even
     with rekeying of information. Information centre development has continued to support the needs of
     these larger-scale applications by providing training and skills and specifying standards for
     hardware, software and the development process.
    Automated integration: Users start to link into corporate applications to gain seamless access to
     information.
    Distributed integration: At this stage of development, there is a good level of integration between
     different end-user applications and corporate systems. Good standards of metadata (or data describing
     data in a data dictionary) are required to help achieve this.
END USER COMPUTING



     Using information that is out of date

     Information requires export from other information systems before
      it can be analysed by the end-user application

     Corruption of centrally held data by uploading erroneous data

     Development of insecure systems without password control that
      are vulnerable to accidental and deliberate damage.
END USER COMPUTING


    Training: Provision of relevant training courses both in how to program and in how to approach systems
     development in a structured way (the second of these is often omitted). This happened at the Open
     University, where many of the end-users wanted to omit the analysis course.
    Suitability review: Authorisation of major end-user new developments by business and IS managers to check
     that they are necessary (this should not be necessary for smaller-scale developments since otherwise creativity
     may be stifled).
    Standards for development: Such standards will recommend that documentation and structured testing of all
     user-developed software occurs. Detailed standards might include clear data definitions, validation rules, backup
     and recovery routines and security measures.
    Guidance from end-user support personnel: IC or help-desk staff can provide training in techniques used to
     develop software.
    Software and data audits: Regular audits of software produced by end-users should occur for data and
     application quality. There is an apocryphal story of a company that had an end-user-developed spreadsheet for
     making investment decisions which had an error in a formula that lost the company millions of pounds each year!
    Ensuring corporate data security: Ensure that users are not permitted to enter data directly into central
     databases except via applications especially written for the purpose by the IS department which has the
     necessary validation rules to ensure data quality. For analysis of corporate data, data should regularly be
     downloaded from the central database to the PC for analysis, where they can be analysed without causing
     performance problems to the corporate system.
   Help desk: A central facility in an
    organisation which provides end-user help-
    desk services such as phone support for
    troubleshooting end-user software and
    hardware problems, training, guidance on
    end-user development and management of
    user information.

Contenu connexe

Tendances

Executive support system (ess)
Executive support system (ess)Executive support system (ess)
Executive support system (ess)Saumya Singh
 
Transaction processing system (TPS)
Transaction processing system (TPS)Transaction processing system (TPS)
Transaction processing system (TPS)Jaisha Jaikishan
 
Gr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its ImportanceGr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its Importanceuniversity of education,Lahore
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
Sub systems of information system - MIS
Sub systems of information system - MISSub systems of information system - MIS
Sub systems of information system - MISSanaRiaz789
 
ERP and related technology
ERP and related technology ERP and related technology
ERP and related technology Usman Tariq
 
erp and related technologies
erp and related technologieserp and related technologies
erp and related technologiesMadan Kumawat
 
Information systems in Organizations
Information systems in OrganizationsInformation systems in Organizations
Information systems in Organizationsmulugetaa
 
TRANSACTION PROCESSING SYSTEM
TRANSACTION PROCESSING SYSTEMTRANSACTION PROCESSING SYSTEM
TRANSACTION PROCESSING SYSTEMUbaid ur Rehman
 
Management Information System - MIS - Application
Management Information System - MIS - ApplicationManagement Information System - MIS - Application
Management Information System - MIS - ApplicationFaHaD .H. NooR
 
Chapter Four IT infrastructure
Chapter Four IT infrastructureChapter Four IT infrastructure
Chapter Four IT infrastructureMohamed Madar
 
information system lecture notes
information system lecture notesinformation system lecture notes
information system lecture notesnaeem_mnm
 
Lesson 5: Information Systems Presentation
Lesson 5: Information Systems PresentationLesson 5: Information Systems Presentation
Lesson 5: Information Systems PresentationKereen Tatham
 
SSAD; TOOLS & TECHNIQUES
SSAD; TOOLS & TECHNIQUESSSAD; TOOLS & TECHNIQUES
SSAD; TOOLS & TECHNIQUESMalvika Bansal
 

Tendances (20)

Executive support system (ess)
Executive support system (ess)Executive support system (ess)
Executive support system (ess)
 
Transaction processing system (TPS)
Transaction processing system (TPS)Transaction processing system (TPS)
Transaction processing system (TPS)
 
Gr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its ImportanceGr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its Importance
 
Information systems in the enterprise
Information systems in the enterpriseInformation systems in the enterprise
Information systems in the enterprise
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Sub systems of information system - MIS
Sub systems of information system - MISSub systems of information system - MIS
Sub systems of information system - MIS
 
Knowledge Work System
Knowledge Work SystemKnowledge Work System
Knowledge Work System
 
ERP and related technology
ERP and related technology ERP and related technology
ERP and related technology
 
It infrastructure
It infrastructureIt infrastructure
It infrastructure
 
erp and related technologies
erp and related technologieserp and related technologies
erp and related technologies
 
Information systems in Organizations
Information systems in OrganizationsInformation systems in Organizations
Information systems in Organizations
 
TRANSACTION PROCESSING SYSTEM
TRANSACTION PROCESSING SYSTEMTRANSACTION PROCESSING SYSTEM
TRANSACTION PROCESSING SYSTEM
 
Management Information System - MIS - Application
Management Information System - MIS - ApplicationManagement Information System - MIS - Application
Management Information System - MIS - Application
 
Chapter Four IT infrastructure
Chapter Four IT infrastructureChapter Four IT infrastructure
Chapter Four IT infrastructure
 
information system lecture notes
information system lecture notesinformation system lecture notes
information system lecture notes
 
System dependability
System dependabilitySystem dependability
System dependability
 
Lesson 5: Information Systems Presentation
Lesson 5: Information Systems PresentationLesson 5: Information Systems Presentation
Lesson 5: Information Systems Presentation
 
SSAD; TOOLS & TECHNIQUES
SSAD; TOOLS & TECHNIQUESSSAD; TOOLS & TECHNIQUES
SSAD; TOOLS & TECHNIQUES
 
Mis planning
Mis planningMis planning
Mis planning
 
Chapter 1 MIS
Chapter 1 MISChapter 1 MIS
Chapter 1 MIS
 

Similaire à Guide to End User Computing (EUC

Techniques for Developing Systems in IT Management System
Techniques for Developing Systems in IT Management SystemTechniques for Developing Systems in IT Management System
Techniques for Developing Systems in IT Management SystemGruppo Banca Sella
 
SE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software EngineeringSE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software EngineeringAmr E. Mohamed
 
Software engineering for IV sem BCA ,RCU Belgavi.Syllabus
Software engineering for IV sem BCA ,RCU Belgavi.SyllabusSoftware engineering for IV sem BCA ,RCU Belgavi.Syllabus
Software engineering for IV sem BCA ,RCU Belgavi.SyllabusNagaraj Hiremath
 
SE_Lec 01_ Introduction to Software Enginerring
SE_Lec 01_ Introduction to Software EnginerringSE_Lec 01_ Introduction to Software Enginerring
SE_Lec 01_ Introduction to Software EnginerringAmr E. Mohamed
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15Eric
 
Microsoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft Private Cloud
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSJournal For Research
 
Introduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information TechnologyIntroduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information TechnologyGaditek
 
SOFDESG 01 Introduction.pdf
SOFDESG 01 Introduction.pdfSOFDESG 01 Introduction.pdf
SOFDESG 01 Introduction.pdfJimCValencia1
 
mICF poster 4 (petteri) micf lean mvp design
mICF poster 4 (petteri) micf lean mvp designmICF poster 4 (petteri) micf lean mvp design
mICF poster 4 (petteri) micf lean mvp designStefanus Snyman
 
User Profiling and Technology
User Profiling and TechnologyUser Profiling and Technology
User Profiling and TechnologyJonathan Daniels
 

Similaire à Guide to End User Computing (EUC (20)

End User Computing
End User ComputingEnd User Computing
End User Computing
 
IT ppt.pptx
IT ppt.pptxIT ppt.pptx
IT ppt.pptx
 
Techniques for Developing Systems in IT Management System
Techniques for Developing Systems in IT Management SystemTechniques for Developing Systems in IT Management System
Techniques for Developing Systems in IT Management System
 
End User Computing .pdf
End User Computing .pdfEnd User Computing .pdf
End User Computing .pdf
 
SE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software EngineeringSE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software Engineering
 
Software engineering for IV sem BCA ,RCU Belgavi.Syllabus
Software engineering for IV sem BCA ,RCU Belgavi.SyllabusSoftware engineering for IV sem BCA ,RCU Belgavi.Syllabus
Software engineering for IV sem BCA ,RCU Belgavi.Syllabus
 
Class 6
Class 6Class 6
Class 6
 
SE_Lec 01_ Introduction to Software Enginerring
SE_Lec 01_ Introduction to Software EnginerringSE_Lec 01_ Introduction to Software Enginerring
SE_Lec 01_ Introduction to Software Enginerring
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15
 
Microsoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop Whitepaper
 
Infote groupwork 1
Infote groupwork 1Infote groupwork 1
Infote groupwork 1
 
MIS chap # 4.......
MIS chap # 4.......MIS chap # 4.......
MIS chap # 4.......
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
 
Introduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information TechnologyIntroduction to Software Engineering & Information Technology
Introduction to Software Engineering & Information Technology
 
SOFDESG 01 Introduction.pdf
SOFDESG 01 Introduction.pdfSOFDESG 01 Introduction.pdf
SOFDESG 01 Introduction.pdf
 
mICF poster 4 (petteri) micf lean mvp design
mICF poster 4 (petteri) micf lean mvp designmICF poster 4 (petteri) micf lean mvp design
mICF poster 4 (petteri) micf lean mvp design
 
mICF lean MVP design
mICF lean MVP designmICF lean MVP design
mICF lean MVP design
 
User Profiling and Technology
User Profiling and TechnologyUser Profiling and Technology
User Profiling and Technology
 
SE Lecture 1.ppt
SE Lecture 1.pptSE Lecture 1.ppt
SE Lecture 1.ppt
 
SE Lecture 1.ppt
SE Lecture 1.pptSE Lecture 1.ppt
SE Lecture 1.ppt
 

Dernier

Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...ShrutiBose4
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 

Dernier (20)

Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 

Guide to End User Computing (EUC

  • 2. END USER COMPUTING In computing, End User Computing (EUC) refer to systems in which non-programmers can create working applications. EUC is a group of approaches to computing that aim at better integrating end users into the computing environment. These approaches attempt to realize the potential for high-end computing to perform in a trustworthy manner in problem solving of the highest order
  • 3. END USER COMPUTING  The term end-user computing has different meanings according to the context in which it is used. The following statements could all refer to end-user computing: ◦ all tools by which non-data-processing staff handle their own problems without professional programmers; ◦ creative use of data processing by non-data-processing experts; ◦ complex computing by non-data-processing professionals to answer organisational information needs; ◦ non-technical end-users using user-friendly, fourth-generation languages (4GLs) and PCs to generate reports or build decision support systems; ◦ the use of computer hardware and software by people in organisations whose jobs are usually classified as net users of information systems rather than net developers of information systems.
  • 4. END USER COMPUTING Who are the End Users ?  Non programming  Command level  End-user programmers (including senior management professionals)  Functional support personnel  End user computing support personnel  DP Programmers
  • 5. END USER COMPUTING  End-user computing (EUC): All uses of computers by business people who are not information systems professionals.  End-user development (EUD): Systems development and programming undertaken by non-IS staff.
  • 6. END USER IS - Services  End-user IS services: All services required to support end-users in running their PCs and developing and using applications 1. Provide a help-desk service. 2. Achieve standardisation of software. 3. Ensure network efficiency. 4. Provide training. 5. Delivering services to end-users cost-effectively.
  • 7. END USER COMPUTING Advantages  Systems tailored to users  Enables creative use of IS  Generates competitive advantage  Puts users nearer the information  Allows for variety  Increases user awareness of IS  Relieves work load of IT professional
  • 8. END USER COMPUTING Disadvantages  Produces inappropriate systems  Causes duplication  Takes users away from their real job  Ignores long range and technical issues  Causes integration problems
  • 10. END USER COMPUTING •Service Desk – Global Service Desk handling 10mn trouble tickets and 7mn service desk calls per annum in 20 languages. 17 Global delivery centers spread across the world with 7 near shore centers •Client Application Management services – Deliver Application Packaging, Imaging, Software Distribution and Patch Management services in a centralized factory construct. 5000+ Applications packaged and distributed annually. •Messaging & Collaboration Services – Build, operate and provide professional services on email and collaboration platforms like Microsoft Exchange, IBM Lotus Notes. Monitor and support more than 800,000 mailboxes globally •Asset Management – Provide a complete Asset Management Lifecycle service right from ordering to ongoing management and tracking of client assets. •Client Support Services – Provide onsite support for Desktops, Laptops, Printers, Handheld devices at client locations spread globally. Global Network of Client support specialists supporting approximately 3 million client devices distributed globally. •Infrastructure Application – Build and Manage Infrastructrue Applications in customer environments. These services include Directory Services, File and Print services, Remote Access Managent, Application delivery using Citirix, Microsoft App-V etc.
  • 11. END USER COMPUTING  The three main types of end-user computing can be defined as: ◦ End-user-developed computer-based information systems for personal, departmental or organisation-wide use, where the end- user is a non-IT professional; ◦ End-user control of which hardware and package applications are purchased for use in their department; ◦ End-user use of existing information systems.
  • 12. END USER - development  End-user development of applications represents a major trend in the use of information technology in organisations.  McGill et al. (2003) explain that: ‘User-developed applications (UDAs) are computer based applications for which non-information systems professionals assume primary development responsibility. They support decision making and organizational processes in the majority of Organizations’
  • 13. END USER - Applications  Reports from a corporate database using standard enquiries defined by the IS/IT function  Simple ad hoc queries to databases defined by the user. For someone in an airline, for example, these might include access to a frequent flier database, customer reservation system or crew rostering system to monitor performance of each  What-if? analysis using tools such as spreadsheet models or more specialised tools such as risk or financial management packages or business intelligence software, used for monitoring sales and marketing performance of information stored in a data warehouse  Writing company information for a company intranet  Development of applications such as a job costing tool or production scheduling system, using easy-to-use, high-level tools such as application generators, PC database management systems such as Microsoft Access or Borland or visual programming environments such as Microsoft Visual Basic.
  • 14. END USER COMPUTING  Applications backlog: The demand for new applications by users exceeds the capacity of the IS department or IS outsourcing company to develop them.  Improved toolsets such as Visual Basic for Applications  The desire by users to query and analyse data and generate reports from information stored on databases available across the corporate network  A trend to decentralisation of computing to user departments for systems to support departmental activities  Reduced expense of application development when conducted by end-users (from departmental rather than information systems budget)  Better fit between end-user-developed software and their requirements (since no requirements translation is needed between the users and third-party developers). End-users are also less likely to ‘over-engineer’ a solution to a basic problem than an IS professional who will want to treat every problem with rigour.
  • 15. END USER COMPUTING Figure 16.6 A model of IS success that can be applied to end-user developed applications
  • 16. END USER COMPUTING  Isolation: A few scattered pioneers of EUD develop small-scale business tools within their area. Initially, little support from central IS.  Standalone: Larger-scale applications that may be of importance to a department are developed. At this stage, an information centre may be developed to support an increase in demand for user computing services.  Manual integration: Here, different end-user applications need to exchange data. This happens through manual intervention, with files being transferred by floppy disk or across the network or even with rekeying of information. Information centre development has continued to support the needs of these larger-scale applications by providing training and skills and specifying standards for hardware, software and the development process.  Automated integration: Users start to link into corporate applications to gain seamless access to information.  Distributed integration: At this stage of development, there is a good level of integration between different end-user applications and corporate systems. Good standards of metadata (or data describing data in a data dictionary) are required to help achieve this.
  • 17. END USER COMPUTING  Using information that is out of date  Information requires export from other information systems before it can be analysed by the end-user application  Corruption of centrally held data by uploading erroneous data  Development of insecure systems without password control that are vulnerable to accidental and deliberate damage.
  • 18. END USER COMPUTING  Training: Provision of relevant training courses both in how to program and in how to approach systems development in a structured way (the second of these is often omitted). This happened at the Open University, where many of the end-users wanted to omit the analysis course.  Suitability review: Authorisation of major end-user new developments by business and IS managers to check that they are necessary (this should not be necessary for smaller-scale developments since otherwise creativity may be stifled).  Standards for development: Such standards will recommend that documentation and structured testing of all user-developed software occurs. Detailed standards might include clear data definitions, validation rules, backup and recovery routines and security measures.  Guidance from end-user support personnel: IC or help-desk staff can provide training in techniques used to develop software.  Software and data audits: Regular audits of software produced by end-users should occur for data and application quality. There is an apocryphal story of a company that had an end-user-developed spreadsheet for making investment decisions which had an error in a formula that lost the company millions of pounds each year!  Ensuring corporate data security: Ensure that users are not permitted to enter data directly into central databases except via applications especially written for the purpose by the IS department which has the necessary validation rules to ensure data quality. For analysis of corporate data, data should regularly be downloaded from the central database to the PC for analysis, where they can be analysed without causing performance problems to the corporate system.
  • 19. Help desk: A central facility in an organisation which provides end-user help- desk services such as phone support for troubleshooting end-user software and hardware problems, training, guidance on end-user development and management of user information.