Facilitating - PowerPoint PPT Presentation

1 / 20
About This Presentation
Title:

Facilitating

Description:

chapter 11 facilitating user computing end-user computing hands-on use of computers by employees enter data make inquiries prepare reports perform statistical ... – PowerPoint PPT presentation

Number of Views:127
Avg rating:3.0/5.0
Slides: 21
Provided by: academicR9
Category:

less

Transcript and Presenter's Notes

Title: Facilitating


1
CHAPTER 11
  • Facilitating
  • User Computing

2
END-USER COMPUTING
  • HANDS-ON USE OF COMPUTERS BY EMPLOYEES
  • ENTER DATA
  • MAKE INQUIRIES
  • PREPARE REPORTS
  • PERFORM STATISTICAL ANALYSIS
  • ANALYZE PROBLEMS
  • DEVELOP WEB PAGES

3
PRIMARY DRIVERS
  • AVAILABILITY OF LOW-COST MICROCOMPUTERS
  • HIGH-LEVEL LANGUAGES
  • COMPUTER LITERACY AMONG COLLEGE GRADUATES,
    PROFESSIONALS
  • INCREASED USER FRUSTRATIONS ABOUT NEW PROJECT
    BACKLOGS

4
USER APPLICATION DEVELOPMENT
  • USE OF COMPUTER TOOLS
  • DEVELOP BUSINESS APPLICATIONS
  • USERS ARE NOT IS SPECIALISTS
  • INVOLVES APPLICATION, TOOL DEVELOPER

5
USER-DEVELOPED APPLICATIONSADVANTAGES
  • INCREASED USER CONTROL OVER PROJECT
  • INCREASED USER ACCEPTANCE OF SOLUTION
  • FREES IS RESOURCES
  • INCREASES USERS KNOWLEDGE OF IT

6
USER-DEVELOPED APPLICATIONSDISADVANTAGES
  • LOSS OF QUALITY CONTROL
  • INCREASES OPERATIONAL RISKS DUE TO DEVELOPED
    TURNOVER
  • POTENTIAL LABOR/TIME INEFFICIENCIES
  • LOSS OF INTEGRATION OPPORTUNITIES/CAPABILITIES

7
CHARACTERISTICS
  • APPLICATION
  • SCOPE Personal, departmental, organizational
  • CRITICALITY/IMPACT Risk exposure
  • SIZE USAGE One-time, periodic, ongoing
  • PROBLEM COMPLEXITY Structure, how common is
    task?

8
CHARACTERISTICS
  • TOOL
  • SOPHISTICATION, COMPLEXITY
  • INTERCONNECTEDNESS
  • DEVELOPER
  • USER SKILLS, EXPERIENCE, AVAILABILITY
  • IS SPECIALIST SKILLS, EXPERIENCE, AVAILABILITY

9
EXTENT OF INTERCONNECTEDNESSSTAGE EXTENT OF
INTERCONNECTEDNESS
  • ISOLATION Application does not use or create
    data for another application
  • STAND-ALONE Application uses manually entered
    computer-generated data from reports, printouts
  • MANUAL INTEGRATION Data electronically
    transferred from another application, manually
    (e.g., file on disk)

Adapted from Huff, Munro Martin, 1988
10
EXTENT OF INTERCONNECTEDNESSSTAGE EXTENT OF
INTERCONNECTEDNESS
  • AUTOMATED INTEGRATION Application electronically
    connected with one or more databases/applications
    using automated scripts
  • DISTRIBUTED INTEGRATION Application uses data
    created, stored, maintained by organizations
    systems under control of IS specialists

Adapted from Huff, Munro Martin, 1988
11
GUIDELINES FOR CHOOSING DEVELOPMENT PROCESS
1. SDLC OR PROTOTYPING, DISCIPLINED APPROACH TO
DEFINITION IMPLEMENTATION 2. SDLC, CLEAR
HANDS-OFF BETWEEN PHASES 3. COLLAPSED LIFE
CYCLE 4. DISCIPLINED, ITERATIVE DEVELOPMENT
12
LEVERAGING END-USER COMPUTING
Based on Branceau Brown, 1993
13
ORGANIZATIONAL LEVEL
  • STRATEGY Strategic objectives and approach to
    end-user computing
  • TECHNOLOGY Range accessibility of end-user
    tools
  • SUPPORT CONTROL ACTIONS Support services,
    control policies procedures

14
EXPANSION/CONTROL MATRIX
EXPANSION
CONTROL
Based on Monroe et al., 1987-1988 Brancheau
Amoroso, 1990
15
EVOLUTION OF INFORMATION CENTERSTAGE ONE
  • REACTIVE SERVICES
  • INDIVIDUAL SOLUTIONS
  • PRODUCT TRAINING
  • ALL NEEDS SUPPORTED
  • COMPUTER LITERACY TRAINING
  • ONE-WAY RELATIONSHIPS

16
EVOLUTION OF INFORMATION CENTERSTAGE TWO
  • PROACTIVE SERVICES
  • DEPARTMENTAL SOLUTIONS
  • BUSINESS PROBLEM-SOLVING
  • HIGH-PAYOFF NEEDS SUPPORTED
  • INFORMATION LITERACY EDUCATION
  • ALLIANCE IS/USER ALLIANCE

17
COMMON SUPPORT SERVICES
  • TROUBLESHOOTING
  • CONSULTING
  • TRAINING IS EDUCATION
  • PRODUCT RESEARCH EVALUATION
  • INFORMATION SHARING
  • TOOL SELECTION PURCHASING
  • TOOL INSTALLATION, MAINTENANCE UPGRADING

18
COMMON POLICIES PROCEDURES
  • PRODUCT STANDARDS
  • ERGONOMICS
  • PRODUCT PURCHASES
  • INVENTORY CONTROL
  • UPGRADE PROCEDURES
  • QUALITY REVIEW
  • IDENTIFYING CRITICAL APPLICATIONS DATA

19
COMMON POLICIES PROCEDURES
  • DATA ACCESS
  • BACKUP PROCEDURES
  • AUDIT TRAILS
  • DOCUMENTATION STANDARDS
  • UNAUTHORIZED ACCESS
  • UNAUTHORIZED SOFTWARE COPYING
  • VIRUS PROTECTION

20
CHAPTER 11
  • Facilitating
  • User Computing
Write a Comment
User Comments (0)
About PowerShow.com