Title: Facilitating
1CHAPTER 11
- Facilitating
- User Computing
2END-USER COMPUTING
- HANDS-ON USE OF COMPUTERS BY EMPLOYEES
- ENTER DATA
- MAKE INQUIRIES
- PREPARE REPORTS
- PERFORM STATISTICAL ANALYSIS
- ANALYZE PROBLEMS
- DEVELOP WEB PAGES
3PRIMARY DRIVERS
- AVAILABILITY OF LOW-COST MICROCOMPUTERS
- HIGH-LEVEL LANGUAGES
- COMPUTER LITERACY AMONG COLLEGE GRADUATES,
PROFESSIONALS - INCREASED USER FRUSTRATIONS ABOUT NEW PROJECT
BACKLOGS
4USER APPLICATION DEVELOPMENT
- USE OF COMPUTER TOOLS
- DEVELOP BUSINESS APPLICATIONS
- USERS ARE NOT IS SPECIALISTS
- INVOLVES APPLICATION, TOOL DEVELOPER
5USER-DEVELOPED APPLICATIONSADVANTAGES
- INCREASED USER CONTROL OVER PROJECT
- INCREASED USER ACCEPTANCE OF SOLUTION
- FREES IS RESOURCES
- INCREASES USERS KNOWLEDGE OF IT
-
6USER-DEVELOPED APPLICATIONSDISADVANTAGES
- LOSS OF QUALITY CONTROL
- INCREASES OPERATIONAL RISKS DUE TO DEVELOPED
TURNOVER - POTENTIAL LABOR/TIME INEFFICIENCIES
- LOSS OF INTEGRATION OPPORTUNITIES/CAPABILITIES
7CHARACTERISTICS
- APPLICATION
- SCOPE Personal, departmental, organizational
- CRITICALITY/IMPACT Risk exposure
- SIZE USAGE One-time, periodic, ongoing
- PROBLEM COMPLEXITY Structure, how common is
task?
8CHARACTERISTICS
- TOOL
- SOPHISTICATION, COMPLEXITY
- INTERCONNECTEDNESS
- DEVELOPER
- USER SKILLS, EXPERIENCE, AVAILABILITY
- IS SPECIALIST SKILLS, EXPERIENCE, AVAILABILITY
9EXTENT OF INTERCONNECTEDNESSSTAGE EXTENT OF
INTERCONNECTEDNESS
- ISOLATION Application does not use or create
data for another application - STAND-ALONE Application uses manually entered
computer-generated data from reports, printouts - MANUAL INTEGRATION Data electronically
transferred from another application, manually
(e.g., file on disk)
Adapted from Huff, Munro Martin, 1988
10EXTENT OF INTERCONNECTEDNESSSTAGE EXTENT OF
INTERCONNECTEDNESS
- AUTOMATED INTEGRATION Application electronically
connected with one or more databases/applications
using automated scripts - DISTRIBUTED INTEGRATION Application uses data
created, stored, maintained by organizations
systems under control of IS specialists
Adapted from Huff, Munro Martin, 1988
11GUIDELINES FOR CHOOSING DEVELOPMENT PROCESS
1. SDLC OR PROTOTYPING, DISCIPLINED APPROACH TO
DEFINITION IMPLEMENTATION 2. SDLC, CLEAR
HANDS-OFF BETWEEN PHASES 3. COLLAPSED LIFE
CYCLE 4. DISCIPLINED, ITERATIVE DEVELOPMENT
12LEVERAGING END-USER COMPUTING
Based on Branceau Brown, 1993
13ORGANIZATIONAL LEVEL
- STRATEGY Strategic objectives and approach to
end-user computing - TECHNOLOGY Range accessibility of end-user
tools - SUPPORT CONTROL ACTIONS Support services,
control policies procedures
14EXPANSION/CONTROL MATRIX
EXPANSION
CONTROL
Based on Monroe et al., 1987-1988 Brancheau
Amoroso, 1990
15EVOLUTION OF INFORMATION CENTERSTAGE ONE
- REACTIVE SERVICES
- INDIVIDUAL SOLUTIONS
- PRODUCT TRAINING
- ALL NEEDS SUPPORTED
- COMPUTER LITERACY TRAINING
- ONE-WAY RELATIONSHIPS
16EVOLUTION OF INFORMATION CENTERSTAGE TWO
- PROACTIVE SERVICES
- DEPARTMENTAL SOLUTIONS
- BUSINESS PROBLEM-SOLVING
- HIGH-PAYOFF NEEDS SUPPORTED
- INFORMATION LITERACY EDUCATION
- ALLIANCE IS/USER ALLIANCE
17COMMON SUPPORT SERVICES
- TROUBLESHOOTING
- CONSULTING
- TRAINING IS EDUCATION
- PRODUCT RESEARCH EVALUATION
- INFORMATION SHARING
- TOOL SELECTION PURCHASING
- TOOL INSTALLATION, MAINTENANCE UPGRADING
-
18COMMON POLICIES PROCEDURES
- PRODUCT STANDARDS
- ERGONOMICS
- PRODUCT PURCHASES
- INVENTORY CONTROL
- UPGRADE PROCEDURES
- QUALITY REVIEW
- IDENTIFYING CRITICAL APPLICATIONS DATA
19COMMON POLICIES PROCEDURES
- DATA ACCESS
- BACKUP PROCEDURES
- AUDIT TRAILS
- DOCUMENTATION STANDARDS
- UNAUTHORIZED ACCESS
- UNAUTHORIZED SOFTWARE COPYING
- VIRUS PROTECTION
20CHAPTER 11
- Facilitating
- User Computing