Download presentation
Presentation is loading. Please wait.
1
E. Wainright Martin Carol V. Brown Daniel W. DeHayes Jeffrey A. Hoffer William C. Perkins MANAGINGINFORMATIONTECHNOLOGY FIFTH EDITION CHAPTER 13 FACILITATING U SER C OMPUTING
2
© 2005 Pearson Prentice-Hall Chapter 13 - 2 T HE E MERGENCE OF U SER A PPLICATION D EVELOPMENT Page 441 Figure 13.1 Primary Drivers for End-User Computing Why end-user computing?
3
© 2005 Pearson Prentice-Hall Chapter 13 - 3 T HE E MERGENCE OF U SER A PPLICATION D EVELOPMENT Page 442 System backlog – the systems development requests by business users that members of the IS organization are not currently working on
4
© 2005 Pearson Prentice-Hall Chapter 13 - 4 U SER- D EVELOPED V ERSUS IS - D EVELOPED A PPLICATIONS Page 442 How should you decide? Understanding the potential advantages and disadvantages of each
5
© 2005 Pearson Prentice-Hall Chapter 13 - 5 U SER- D EVELOPED V ERSUS IS - D EVELOPED A PPLICATIONS Page 442 Figure 13.2 Potential Advantages and Disadvantages of User-Developed Applications
6
© 2005 Pearson Prentice-Hall Chapter 13 - 6 U SER D EVELOPMENT M ETHODOLOGY Page 445 Assessing the Application Risks Figure 13.3 Application, Tool, and Developer Characteristics Factors to consider
7
© 2005 Pearson Prentice-Hall Chapter 13 - 7 U SER- D EVELOPED V ERSUS IS - D EVELOPED A PPLICATIONS Page 445 Categories of application scope that have different risk levels: Personal applications developed and used by the primary user for personal decision making Departmental applications developed by single user but operated and used by multiple users in a department Organizational applications used by multiple users across a number of departments Application Characteristics
8
© 2005 Pearson Prentice-Hall Chapter 13 - 8 U SER- D EVELOPED V ERSUS IS - D EVELOPED A PPLICATIONS Page 445 Important to consider: Complexity of the software tools used to develop system Degree to which application is to be interconnected with other applications or databases Tool Characteristics
9
© 2005 Pearson Prentice-Hall Chapter 13 - 9 Page 446 Figure 13.4 Extent of Interconnectedness (Adapted from Huff, Munro, and Martin, 1988)
10
© 2005 Pearson Prentice-Hall Chapter 13 - 10 U SER- D EVELOPED V ERSUS IS - D EVELOPED A PPLICATIONS Page 446 Important to consider: Relevant skills and experience of potential developers Developers availability to work on project Availability of developer resources in relation to time constraints faced by users Developer Characteristics
11
© 2005 Pearson Prentice-Hall Chapter 13 - 11 U SER D EVELOPMENT M ETHODOLOGY Page 447 (Based on Panko, 1989) Figure 13.5 Guidelines for Choosing the Development Approach Guidelines for Choosing
12
© 2005 Pearson Prentice-Hall Chapter 13 - 12 U SER D EVELOPMENT M ETHODOLOGY Page 448 User Development Guidelines Figure 13.6 Questions to Guide User Developers (1 of 2)
13
© 2005 Pearson Prentice-Hall Chapter 13 - 13 U SER D EVELOPMENT M ETHODOLOGY Page 448 User Development Guidelines Figure 13.6 Questions to Guide User Developers (2 of 2)
14
© 2005 Pearson Prentice-Hall Chapter 13 - 14 U SER D EVELOPMENT M ETHODOLOGY Page 448 User Development Guidelines Also to be considered: Data recovery needs Documentation Testing process Automatic audit features Separate audit programs (especially for spreadsheets)
15
© 2005 Pearson Prentice-Hall Chapter 13 - 15 S TRATEGIES AND T ACTICS FOR M ANAGING U SER C OMPUTING Page 451 Responsibility of IS and business managers: Strategy The strategic objectives and overall approach to end-user computing Technology The range and accessibility of end- user tools Tactics for Support and Control Support services, control policies and procedures
16
© 2005 Pearson Prentice-Hall Chapter 13 - 16 S TRATEGIES AND T ACTICS FOR M ANAGING U SER C OMPUTING Page 451 Figure 13.7 Framework for Leveraging End-User Computing (Based on Brancheau and Brown, 1993)
17
© 2005 Pearson Prentice-Hall Chapter 13 - 17 S TRATEGIES AND T ACTICS FOR M ANAGING U SER C OMPUTING Page 452 Strategies for End-User Computing Figure 13.8 End-User Computing Strategies Common starting point for most in the 1980s
18
© 2005 Pearson Prentice-Hall Chapter 13 - 18 S TRATEGIES AND T ACTICS FOR M ANAGING U SER C OMPUTING Page 452 Strategies for End-User Computing Figure 13.8 End-User Computing Strategies Invest heavily in end-user computing but little formal controls
19
© 2005 Pearson Prentice-Hall Chapter 13 - 19 S TRATEGIES AND T ACTICS FOR M ANAGING U SER C OMPUTING Page 452 Strategies for End-User Computing Figure 13.8 End-User Computing Strategies Invest in user computing slowly with specific controls and restrictions in place
20
© 2005 Pearson Prentice-Hall Chapter 13 - 20 S TRATEGIES AND T ACTICS FOR M ANAGING U SER C OMPUTING Page 452 Strategies for End-User Computing Figure 13.8 End-User Computing Strategies Most mature approach – Start with small investments and few controls, then increase both over time
21
© 2005 Pearson Prentice-Hall Chapter 13 - 21 S TRATEGIES AND T ACTICS FOR M ANAGING U SER C OMPUTING Page 452 Centralized Support (Information Center) Approaches Information center (IC) – a centralized support unit for managing end-user computing activities that typically began in 1980s
22
© 2005 Pearson Prentice-Hall Chapter 13 - 22 S TRATEGIES AND T ACTICS FOR M ANAGING U SER C OMPUTING Page 454 IS/Business Partnering Approaches Managed free economy approach: Less centralized approach to supporting users Has five components: Explicit strategy reflecting a support and control philosophy User/IS working partnership End-user support unit well integrated with other IS units Emphasis on end-user education of IS development methods and quality controls Targeting of critical end-user applications
23
© 2005 Pearson Prentice-Hall Chapter 13 - 23 S TRATEGIES AND T ACTICS FOR M ANAGING U SER C OMPUTING Page 454 IS/Business Partnering Approaches Figure 13.9 Reactive Stage One vs. Proactive Stage Two Support Roles
24
© 2005 Pearson Prentice-Hall Chapter 13 - 24 Page 454 Support Services to Facilitate User Computing: Figure 13.10 Common Support Services
25
© 2005 Pearson Prentice-Hall Chapter 13 - 25 S TRATEGIES AND T ACTICS FOR M ANAGING U SER C OMPUTING Page 454 Supporting end users also involves: Preparing them for new software releases Retraining Refitting end-user workstations Common Support Tactics
26
© 2005 Pearson Prentice-Hall Chapter 13 - 26 Page 456 Common Control Tactics Figure 13.11 Common Policies and Procedures Sample Policies and Procedures
27
© 2005 Pearson Prentice-Hall Chapter 13 - 27 S TRATEGIES AND T ACTICS FOR M ANAGING U SER C OMPUTING Page 456 Other control issues include: Use of peer-to-peer or file-sharing applications Can slow down internal networks Create major security problems Blocking unwanted e-mail Common Control Tactics
28
© 2005 Pearson Prentice-Hall Chapter 13 - 28 S PECIAL C ASE: S UPPORTING T ELECOMMUTERS Page 457 Telecommuter – a worker who spends at least a part of his or her regular business hours using IT to perform job outside of a company’s physical facility, using a mobile office, an office in personal home, or at a temporary office at a shared work center away from the company’s main office
29
© 2005 Pearson Prentice-Hall Chapter 13 - 29 S PECIAL C ASE: S UPPORTING T ELECOMMUTERS Page 458 Personal benefits to telecommuters: More productive Increased workday flexibility Improved work/life balance Easier accommodation of communications across time zones
30
© 2005 Pearson Prentice-Hall Chapter 13 - 30 S PECIAL C ASE: S UPPORTING T ELECOMMUTERS Page 458-459 Barriers to telecommuting: Initial investment costs for technology Need for support during off hours Business redesign required to make work Performance appraisal systems need changes Employee isolation Security and legal issues
31
© 2005 Pearson Prentice-Hall Chapter 13 - 31 S PECIAL C ASE: S UPPORTING T ELECOMMUTERS Page 459 Figure 13.12 Six Leadership Secrets for Managing Remote Workers (Based on Kostner, 1996)
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.