Lecture 11 End-User Computing (EUC) Strategy.

Slides:



Advertisements
Similar presentations
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Advertisements

© Paradigm Publishing, Inc Chapter 10 Information Systems Chapter 10 Information Systems.
COBIT - II.
IT Planning.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Management Information Systems, 4 th Edition 1 Chapter 16 Alternative Avenues for Systems Acquisitions.
CHAPTER 9 DEVELOPING BUSINESS/IT STRATEGIES. IT Planning Planning an information system doesn’t start with bits, and bytes, or a Web site. It starts with.
13.1 © 2007 by Prentice Hall 13 Chapter Building Systems.
Virtual Environmental, Health & Safety Manager Compliance Management System T. Cozzie Consulting, Inc. telephone
Lecture Nine Database Planning, Design, and Administration
Chapter 1 Introduction to Databases
Retail Marketing Mix and Planning Charles Blankson, Ph.D.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Chapter 13 Organizing Information System Resources MIS Department Centralization and Decentralization Outsourcing Computer Facilities and Services.
Basel Accord IITRANSITIONSERVICES Business Integration Support FCM Management Limited Paris New York Toronto.
365 IT CONSULTANCY AND PROJECTS PTY (LTD) 04 Smuts Park Corner Northey & Smuts Ave Witbank 1039 Phone: Fax:
13. Getting organized for purchasing
Picture 1 model: ICT lifecycle in a company 1. business needs & business strategy 2. ICT strategy - ICT assessment - ICT strategic plan - ICT implementation/tactical.
WEEK TWO HELPDESK OPERATIONS. WHAT DO WE MEAN BY SAYING “HELPDESK OPERATING CHARACTERISTICS”?
CHAPTER 2 Information Systems: Concepts and Management.
Customer Relationship Management (CRM)
Organizing Information Technology Resources
© Paradigm Publishing Inc Chapter 10 Information Systems.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Training.
HR Planning & HRIS. HR Planning The process of systematically reviewing HR requirements to ensure that the required number of employees, with the required.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Section 9 External and internal resources AQA ICT A2 Level © Nelson Thornes Section 9: External and internal resources Management of Internal Resources.
WORKING EFFECTIVELY IN AN INFORMATION TECHNOLOGY ENVIRONMENT
Investigating jobs in IT
11.1 © 2007 by Prentice Hall 11 Chapter Building Information Systems.
System Development Process Prof. Sujata Rao. 2Overview Systems development life cycle (SDLC) – Provides overall framework for managing system development.
Lecture 4. People Aspects in IS 2 To be covered: To be covered: More types of IS Roles of people (Stakeholders ) using, developing, and managing information.
2 ND EDITION ROD JONES Copyright © Pearson Australia (a division of Pearson Australia Group Pty Ltd) 2010 PowerPoint presentation to accompany.
Implementation of the Essential Standards The Australian Quality Framework (AQTF) is the national set of standards which assures nationally consistent,
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 1 AIS Development Strategies.
14.1 – Policy and Strategy Issues
CHAPTER 2 Information Systems and the Modern Organization.
AIS Development Strategies. Lecture 4-2 ©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart Introduction This.
Information Systems. What are Information Systems? The largest growth in most economies is coming from 'information' industries. The success of such knowledge-based.
Advantages & Disadvantages of Outsourcing author Alberto Caramanica.
IT Job Roles & Responsibilities Shannon Ciriaco Unit 2:
1 ISA&D29-Oct ISA&D29-Oct-13 Systems Analyst: problem solver IT and Strategic Planning.
INTRODUCTION TO MANAGEMENT INFORMATION SYSTEM. INTRODUCTION Now a day, there are many companies, which depend on their computers for their day-to-day.
1 Getting Started : Purposes of IS Strategic Planning.
Training A2 Module Heathcote Ch. 49. The need for training  Employees need training to give them the skills, attitude and knowledge required to.
1 Inputs Physical Resources Environment The General Systems Model of the firm Transformation Process Output Resources Physical Resources Information Processor.
System Users and Developers
MANAGEMENT INFORMATION SYSTEMS (MIS) AND OTHER INFORMATION SYSTEMS.
Software Engineering Lecture # 1.
Introduction to ITIL and ITIS. CONFIDENTIAL Agenda ITIL Introduction  What is ITIL?  ITIL History  ITIL Phases  ITIL Certification Introduction to.
University Retention Schedule Training. Introduction to the University Retention Schedule.
1 Towards a Knowledge Management Framework Brian Lehaney Head of Statistics and Operational Research School of Mathematical and Information Sciences Coventry.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Database Administration Advanced Database Dr. AlaaEddin Almabhouh.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
P3 Business Analysis. 2 Section D: Business Process Change D1. The role of process and process change initiatives D2. Improving the process of the organisation.
Accounting systems design & evaluation 9434SB 18 March 2002.
Information ITIL Technology Infrastructure Library ITIL.
Strategic Information Systems Planning
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Information Technology (IT) Department
Building Information Systems
An Introduction to Software Engineering
LO2 - Be Able to Design IT Systems to Meet Business Needs
Purchasing and Supply Chain Management
IT OPERATIONS Session 7.
Decision Support Systems
Presentation transcript:

Lecture 11 End-User Computing (EUC) Strategy

Objectives What is end-user computing? Approaches to end users The strategy organisations may adopt in the management of end-user computing The tasks that need to be performed by an information systems manager to support end-users.

What is end-user computing? End-user-developed computer-based information systems for personal, departmental or organisation-wide use, where the end-user is a non-IT professional End-user control of which hardware and package applications are purchased for use in their department End-user use of existing information systems

Problems in technology implementation Defining users’ needs easily and comprehensively Some user requirements are missed through inattention to detail or bias of the technician Sometimes not enough time for users to describe all of their needs for systems designers Users needs will vary according to the particular work a person does within each of the different levels of the organisation (strategic, operational, tactical) and their individual skills New requirements for interworking force users to develop new skills for using technology and for handling the subsequent new work relationships

The User-Designer Communications Gap User Concerns Will the system deliver the information I need for my work How quickly can I access the data? How easily can I retrieve the data? How much clerical support will I need to enter data into the system? How will the operation of the system fit into my daily business schedule? Designer Concerns How much disk storage space will the master file consume? How many lines of program code will it take to perform this function? How can we cut down on CPU time when we run the system? What is the most efficient way of storing this piece of data? What database management system should we use?

Approaches to end users Contemporary systems-building approaches tend to treat end users as essential but they play a largely passive role relative to other forces shaping the system A different tradition assigns users a more active role – one that empowers them to codetermine the role of IS in their workplace – e.g. Sociotechnical Design, End-User Computing

Contemporary Role of the IS Manager Responsible for: Setting the organisation’s IS strategy covering issues such as integration with business strategy, investment levels and whether services are centralised or decentralised Establishing IS infrastructure (networks, hardware and software services) Implementation of corporate strategy through developing line-of-business systems Ensuring that the company follows ethical or legal codes for health and safety and data protection

Contemporary Role of End-user IS Services To: Provide a help-desk service Achieve standardisation of software Ensure network efficiency Provide training Deliver services to end-users cost-effectively

Management approach to End-User Computing Management’s approach to EUC should be designed to fit in with the information systems strategy of the organisation. The aims will always be to maximise the benefits and minimise the problems. Two factors need to be managed: the rate of expansion the level of control. The rate of expansion is managed by: making hardware/software easier/difficult to obtain making information easier/difficult to obtain imposing/relieving the end-user departments of the cost of EUC

The levels of control over EUC is managed by: more or less restrictive standards over the purchase of hardware/software the level of requirement of mainframe use as compared to PC use for applications restrictions on access of data. The organisation may manage the rate of expansion to yield a high or low rate of growth of EUC. Similarly may also ensure high or low level of control over EUC.

EXPANSION/CONTROL MATRIX (Curtis 1995) HIGH LOW EXPANSION CONTROL

There are four possible mixes of strategies: Laissez-faire – this is the ‘no policy’ situation. EUC is neither encouraged nor controlled. Containment – here there is a high level of control, EUC is channelled. Acceleration – EUC is encouraged with very little control, high risks involved. Controlled Growth – policies are put in place both to encourage expansion and at the same time controlled growth. This is a situation in which the roles of the end-users and the computer centre are clearly specified.

End-User Services The main end-user services that the information systems manager has to provide to support EUC are as follows: Provide a help-desk service – this will solve problems that users encounter in using the software. This will involve troubleshooting in all aspects of software/hardware problem situations. This service should be delivered as quickly as possible. Achieve standardisation of software – applications throughout the organisation should be standard to reduce the cost of purchase and to enable information transfer. Ensure network efficiency – reduce network ‘downtime’. Provide training – for users in application use and/or development. Deliver services to end-users cost effectively. – minimising ‘total cost of ownership’ which includes cost of purchase and maintenance.

Help-desk service or Information Centre Information Centre (IC) is an American term for the help-desk or IT support. The IC provides all the services required for end-users to use and develop applications Many help desks are now outsourced to other companies. (Outsourcing is when all or part of the information system services of an organisation is sub-contracted to another company).

The ranges of services typically offered are: Help desk support for user problems. Assisting in software purchase, installation and updates. Provide guidance in the selection, purchase and installation of hardware. This will conform to set standards, taking advantage of discounts and limiting support contracts. Consulting with the user to determine if a particular application is appropriate for EUD. Assistance in application development. Management and supply of data to end-users, improving access to shared data. Training and education in particular on packages or development techniques.