Professional Documents
Culture Documents
Chapter 16
End-user computing
Bocij, Chaffey, Greasley, Hickie, Business Information Systems, 3rd Edition Pearson Education Limited 2006
Slide 16.2
Learning objectives
After this lecture, you will be able to: define the range of services that must be delivered to support end-users effectively; distinguish between the general term end-user computing and the more specific end-user development; analyse the risks associated with pursuing end-user development of information systems as part of a companys IS strategy; recommend policies for the effective management of end-user computing within an organisation; recommend new information systems applications that could reasonably be developed by end-user staff within an organisation.
Bocij, Chaffey, Greasley, Hickie, Business Information Systems, 3rd Edition Pearson Education Limited 2006
Slide 16.3
Management issues
Managerial issues involved with controlling the use of information systems by end-users include:
Assessing the emphasis to be placed on end-user software development activities. Providing a suitable support function to assist endusers in their use of computers. Ensuring the appropriate skill levels for end-users through staff development and training. Controlling the cost of end-user activities and support.
Bocij, Chaffey, Greasley, Hickie, Business Information Systems, 3rd Edition Pearson Education Limited 2006
Slide 16.4
End-user computing
End-user computing (EUC): All uses of computers by business people who are not information systems professionals. End-user development (EUD): Systems development and programming undertaken by non-IS staff.
Bocij, Chaffey, Greasley, Hickie, Business Information Systems, 3rd Edition Pearson Education Limited 2006
Slide 16.5
End-user IS services
End-user IS services: All services required to support end-users in running their PCs and developing and using applications 1. Provide a help-desk service. 2. Achieve standardisation of software. 3. Ensure network efficiency. 4. Provide training. 5. Delivering services to end-users cost-effectively.
Bocij, Chaffey, Greasley, Hickie, Business Information Systems, 3rd Edition Pearson Education Limited 2006
Slide 16.6
Managing costs
The costs involved with running a help desk are indicated by the Help Desk Institute annual survey (2004) which shows that the median cost of an incident reported via phone is $20. E-mail and web self-service are lower at $16 and $5, but are still significant costs when multiplied across a large organization.
Bocij, Chaffey, Greasley, Hickie, Business Information Systems, 3rd Edition Pearson Education Limited 2006
Slide 16.7
TCO
Total cost of ownership (TCO): TCO refers to the total cost for a company operating a computer. This includes not only the purchase or leasing cost but also the cost of all the services needed to support the end-user. TCO includes non-purchase costs such as:
the loss of productive work time when users are unable to use their computer; the loss of productive work time when someone is trying to fix a colleagues problem (this type of unofficial support can be very costly); the cost of consumables such as paper and toner for printing.
Bocij, Chaffey, Greasley, Hickie, Business Information Systems, 3rd Edition Pearson Education Limited 2006
Slide 16.8
Slide 16.9
Bocij, Chaffey, Greasley, Hickie, Business Information Systems, 3rd Edition Pearson Education Limited 2006
Slide 16.10
Slide 16.11
In this scenario, you are a senior manager at a B2B company who has just read the latest International Benchmarking study commissioned by the DTI () which presents data from different countries on Internet and e-mail access levels (Figs 16.2 and 16.3). Employee access to the Internet or e-mail for your company is limited. You want to remain competitive, but are concerned about the issues of staff time wasting indicated by an article you read in the Guardian and the cost and possible problems with employee relations of monitoring staff access. Questions Referring to Figures 16.2 and 16.3, prepare a list of advantages and disadvantages of enabling widespread employee access;
Bocij, Chaffey, Greasley, Hickie, Business Information Systems, 3rd Edition Pearson Education Limited 2006
Slide 16.12
Slide 16.13
Slide 16.14
Slide 16.15
End-user computing
The term end-user computing has different meanings according to the context in which it is used. The following statements could all refer to end-user computing: all tools by which non-data-processing staff handle their own problems without professional programmers; creative use of data processing by non-data-processing experts; complex computing by non-data-processing professionals to answer organisational information needs; non-technical end-users using user-friendly, fourth-generation languages (4GLs) and PCs to generate reports or build decision support systems; the use of computer hardware and software by people in organisations whose jobs are usually classified as net users of information systems rather than net developers of information systems.
Bocij, Chaffey, Greasley, Hickie, Business Information Systems, 3rd Edition Pearson Education Limited 2006
Slide 16.16
Bocij, Chaffey, Greasley, Hickie, Business Information Systems, 3rd Edition Pearson Education Limited 2006
Slide 16.17
Table 16.1 Different types of end user personnel. Updated descriptions based on original classes of Rockart and Flannery (1983).
Class Term
1 Non-programming end users -
Description
These are users of software developed by others These are users who use more sophisticated functions of a package, such as formulas and macros in a spreadsheet such as Excel
Here users write their own functions using add - on application languages such as Visual Basic for Applications
These are support staff who work in one area of the business to provide enduser development and support
These are the support staff who exist to troubleshoot hardware and software problems that are encountered by users in Classes 1 to 3
This type of programming staff has traditionally worked on company operational or reporting systems
Bocij, Chaffey, Greasley, Hickie, Business Information Systems, 3rd Edition Pearson Education Limited 2006
Slide 16.18
Bocij, Chaffey, Greasley, Hickie, Business Information Systems, 3rd Edition Pearson Education Limited 2006
Slide 16.19
Slide 16.20
Problems such as these are usually easily solved and 86% of the time they dont require IT support. However, 64% of IT professionals are surprised at how often they are called out to look at broken monitors only to find they arent plugged in, 52% claim that they are regularly asked to un-block paper jams in printers and 54% are often asked to change toners!
Bocij, Chaffey, Greasley, Hickie, Business Information Systems, 3rd Edition Pearson Education Limited 2006
Slide 16.21
Help-desk technologies
Asset management software: Help-desk staff need to know the technical details of the systems being used in the company and the software loaded on them. This is achieved by asset management software such as Microsoft Systems Management server. This can also distribute new software automatically. Computer telephony integration (CTI): CTI gives automatic phone number identification and the system will then load up the details of the computer, its current user and configuration. This allows first-tier calls to be answered much faster. Case-based reasoning: These systems use artificial intelligence techniques (Chapter 6) to guide the user or staff through the process of solving the problem. Web-based intranet access: Users can access frequently asked questions, send an e-mail or type in keywords describing their problems. Problems solved this way will save help-desk staff the time spent dealing with straightforward queries. Workflow: Workflow systems can be used to prioritise user queries and assign them to the staff best placed to deal with them. An example of a workflow queue used in a help desk is shown in Figure 16.4.
Bocij, Chaffey, Greasley, Hickie, Business Information Systems, 3rd Edition Pearson Education Limited 2006
Slide 16.22
Figure 16.4 Workflow system from Staffware being used to prioritise support calls
Bocij, Chaffey, Greasley, Hickie, Business Information Systems, 3rd Edition Pearson Education Limited 2006
Slide 16.23
End-user development
End-user development of applications represents a major trend in the use of information technology in organisations. McGill et al. (2003) explain that:
User-developed applications (UDAs) are computer based applications for which non-information systems professionals assume primary development responsibility. They support decision making and organizational processes in the majority of Organizations
Bocij, Chaffey, Greasley, Hickie, Business Information Systems, 3rd Edition Pearson Education Limited 2006
Slide 16.24
Slide 16.25
Slide 16.26
Figure 16.6 A model of IS success that can be applied to end-user developed applications
Source: Reprinted by permission, DeLone, W. and McLean, E. Information system success: The quest for the dependent Variable, Information System Research, 3(1), 1992. Copyright 1992, the Institute for Operations Research and the Management Sciences (INFORMS), 7240 Parkway Drive, <?xml:namespace prefix = st1 ns = urn:schemas-microsoft-com: office:smarttags />Suite 310, Honover, MD 21076 USA. Bocij, Chaffey, Greasley, Hickie, Business Information Systems, 3rd Edition Pearson Education Limited 2006
Slide 16.27
Isolation: A few scattered pioneers of EUD develop small-scale business tools within their area. Initially, little support from central IS. Standalone: Larger-scale applications that may be of importance to a department are developed. At this stage, an information centre may be developed to support an increase in demand for user computing services. Manual integration: Here, different end-user applications need to exchange data. This happens through manual intervention, with files being transferred by floppy disk or across the network or even with rekeying of information. Information centre development has continued to support the needs of these larger-scale applications by providing training and skills and specifying standards for hardware, software and the development process. Automated integration: Users start to link into corporate applications to gain seamless access to information. Distributed integration: At this stage of development, there is a good level of integration between different end-user applications and corporate systems. Good standards of metadata (or data describing data in a data dictionary) are required to help achieve this.
Bocij, Chaffey, Greasley, Hickie, Business Information Systems, 3rd Edition Pearson Education Limited 2006
Slide 16.28
Risks of EUD
Using information that is out of date Information requires export from other information systems before it can be analysed by the end-user application Corruption of centrally held data by uploading erroneous data Development of insecure systems without password control that are vulnerable to accidental and deliberate damage.
Bocij, Chaffey, Greasley, Hickie, Business Information Systems, 3rd Edition Pearson Education Limited 2006
Slide 16.29