end user computing feri sulianta

5
06/06/2012 1 End User Computing End User Computing Phenomenon in Information Age Phenomenon in Information Age Goal Goal Addressing End User Computing as Increasing Phenomenon Different kind of activities, cases and End User Computing problematic. Dialogue, how to face End User Computing IT Specialist manage IT Dept. Five Main Resources Human Material Machines (including facilities and energy) Money Information (and data) Physical Conceptual } } 1-3 Hardware Software IT Specialist The USERS Facility Database Information and data itself Information Resources Personal Information System Hardware INPUT Y X = Y + 10 ^ 5 PRINT X Data Base Software Guidance … 1. 2. 3. Procedur User Data/ Information Information System in Group Data and Networking

Upload: feri-sulianta

Post on 15-Jan-2015

638 views

Category:

Documents


0 download

DESCRIPTION

Explain End User Computing as phenomenon in IT Workfield - education purpose only

TRANSCRIPT

Page 1: End user computing   feri sulianta

06/06/2012

1

End User ComputingEnd User ComputingPhenomenon in Information AgePhenomenon in Information Age

Goal Goal • Addressing End User Computing as Increasing

Phenomenon

• Different kind of activities, cases and End User Computing problematic.

• Dialogue, how to face End User Computing

• IT Specialist manage IT Dept.

Five Main Resources

• Human• Material• Machines

– (including facilities and energy)

• Money• Information (and data)

Physical

Conceptual}

}1-3

• Hardware• Software• IT Specialist• The USERS• Facility• Database• Information and data itself

Information Resources

Personal Information System

Hardware

INPUT Y X = Y + 10 ^ 5 PRINT X

Data Base

Software

Guidance … 1. … 2. … 3. …

Procedur

User

Data/ Information

Information System in Group

Data and Networking

Page 2: End user computing   feri sulianta

06/06/2012

2

The End Users• End User : End user or client, who uses the

system information or information generated by information systems. Within organizations, internal users can be classified into (Ebert danGriffin, 2003):

• Staff• Low Level Manager• Middle Level Manajer• Top Level Manajer• Knowledge worker

End User Computing (EUC) as phenomenon

• Environment that stimulate the user to resolve their own problems directly for information needs.

• User such as managers, accountants and internal auditors, develop their own applications and use 'computer' as an advisor or 'specialist' based on 'knowledge' of their own

How Good End User is? - Example• They can create powerful application

using OAS• They can manipulate OAS as ‘real

database’ that you can’t imagine• They can do programming just using

OAS• Let see the example

The reason of EUC growth • IT Department less responsive in serving

end user for information needs • The tendency of PC and hardware

support are getting cheaper and can be connected easily to a server database (ODBC)

• Availability of software which is more easily used by end users

FACT• Although the company had to

accommodate enterprise-scale information systems, there are many other areas that have not been and is not covered by the IT Dept the User's specific needs.

• Users at any level have the Office package to assist their work (+ TOP Secret Data the which IT Person no need to know)

Continue...

• Tunnel Between 'User’s Data' to Information System and otherwise pose a burden for the Department. IT.

• The need for synchronization, Adjustment, requests some data from information systems to be managed separately by the users.

Page 3: End user computing   feri sulianta

06/06/2012

3

EUC Risks• Poorly aimed systems• Poorly designed/ documented

systems• Inefficient use of information

resources• Loss of data integrity• Loss of security• Loss of control

2-17

Masalah EUC(Romney, Steinbart, dan Cushing, 1997)

Loss of central control Sistem dan program bisa jadi dikembangkan tanpa memperhatikan standar atau tujuan organisasi secara keseluruhan

Ignorancedocumentation and development methods

Aplikasi yang dibuat pemakai bisa jadi mengandung kesalahan-kesalahan; tidak melalui pengujian yang seharusnya dilakukan atau kurang terdokumentasi, sehingga dapat menimbulkan masalah dalam pengembangan di kemudian hari

Page 4: End user computing   feri sulianta

06/06/2012

4

Redundant resources • Users develop their own applications• The fact is multiple applications can be

shared by several users• The fact is hardware is replicated in several

departments. • Result Thus occurred the "islands of

automation" within the company

Imcompatibility • Serious technical problems in microcomputer can arise when trying to use the program indifferent system, share data with other systems, or to operate in a data communications system

EUC ProblemsCount

Security Threats • Problems of data access by unauthorized• Insecure data files on a microcomputer I• The user may not understand about data security

issues

Operational Stage problems

Computer system installation withput considertechnical aspects, such as power providers, static electricity, and ventilation

EUC Problemscont

The Strategic Implications of End-User Computing (EUC)

• Levels of end users in terms of capabilities- menu-level end users– command-level end users– end-user programmers– functional support personnel

• EUC application considerations– shifts workload so that end-users and

information specialists’ talents are better used

– reduces communications gap2-21

WORST CASE FOR IT PEOPLE?• Will ‘non IT people’ who are not

educated formally replace your job?• IT People lack of management skill,

softkill and social attitude compare to others

• Non IT People know the business and its process so well

Real cases End User behaviour• End User dengan Paket Office (how powerful office

packages are?)• End User with USB Flash Disk Drive• End User with Cloud Computing• User friendly ‘Hacking’ Tool• End User with Internet Content• End User close to the ‘BOSS’• End User with dangerous hobbies• End User with more access than IT Specialist• Ends User think, IT Specialist know everything

This what End User has done:• How they ‘backup’ the sistem?• Mix and match software & OS• Multiple antivirus to be safe• Electical overload & UPS• Pirated Software? No problem• Thousands ‘freeware’• The way they use hardware : printer,

buy device, maintenance dan clean hardware

Page 5: End user computing   feri sulianta

06/06/2012

5

The Information Resource Manager -- the CIO• Chief Information Officer (CIO) is not

simply a title, but role• Manager of information services• Contributes managerial skills

– Solves information resources problems– Solves problems in other areas of firm’s

operations

2-25

The CIO Attitude• Business goal is a must.• Build partnerships/ties with the rest of

the firm• Improve basic business processes• Communicate in business terms, not

IS jargon• Provide reliable IS services• Be positive, not defensive

2-26

User

ITSpecialist

Computer

Communication Chain in EUC Reference

• Raymond Mc Leod – Management Information System• Materi SIM handout slide - Manajemen Sistem Informasi: Komponen

Sistem Informasi. YFA – Yanuar Firdaus A.W, ST., MT. STTelkom. Agustus 2006

• Feri Sulianta. IT Ergonomic. Elexmedia computindo publishers. June 2010.

• Feri Sulianta. PC EVIL. Elexmedia Komputindo Publisher. September 2009.

• Feri Sulianta dan Yudhy Wicaksono. Cara Mudah menjadi Programmer Excel. Elexmedia Komputindo Publisher. February 2010.

• Fajri Umbara. & Feri Sulianta. Cyber Ninja. Elexmedia Komputindo Publisher. June 2012.

• http://hamrosoft.com/wp-content/uploads/2012/04/Social-Networking-Terms.jpg

• http://fm1397.com/wp-content/uploads/2012/02/social-japan-china.jpeg• http://www.techwireasia.com/wp-

content/uploads/2012/05/Social_Networking_Users_In_Asia_May_2012.jpg

• http://4.bp.blogspot.com/_H5LBvaXZCWw/TI16ewIVGyI/AAAAAAAAEjE/G91zTRnOXrA/s1600/networks-2.jpg

Education only