scholarly journals A Strategy for Developing End-user Developers: ‘I Thought I Hated Every Minute of It, But I Learnt Such a Lot’

10.28945/2540 ◽  
2002 ◽  
Author(s):  
Ann Monday

A continuing challenge for university lecturers is to develop successful programs that challenge students whilst at the same time responding to a ‘customer’ driven market place. In 2000, two new courses were introduced into a business degree program as a result of feedback from past and present students and the business community. These courses aimed to explore the wider issues of end-users developing small-scale applications to support their role at work whilst possessing a limited skill set in applications development. In each year (2000 and 2001) a different approach was adopted. This paper reflects upon the teaching of these two courses over the two-year period, the responses of students to the different approaches and the extent to which the learning outcomes were achieved.

2008 ◽  
pp. 309-316
Author(s):  
Elaine H. Ferneley

End User Development (EUD) of system applications is typically undertaken by end users for their own, or closely aligned colleagues, business needs. EUD studies have focused on activity that is small scale, is undertaken with management consent and will ultimately be brought into alignment with the organisation’s software development strategy. However, due to the increase pace of today’s organisations EUD activity increasing takes place without the full knowledge or consent of management, such developments can be defined as covert rather than subversive, they emerge in response to the dynamic environments in which today’s organisations operate. This paper reports on a covert EUD project where a wide group of internal and external stakeholders worked collaboratively to drive an organisation’s software development strategy. The research highlights the future inevitability of external stakeholders engaging in end user development as, with the emergence of wiki and blog-like environments, the boundaries of organisations’ technological artifacts become increasingly hard to define.


Author(s):  
Elaine H. Ferneley

End user development (EUD) of system applications is typically undertaken by end users for their own, or closely aligned colleagues, business needs. EUD studies have focused on activity that is small scale, is undertaken with management consent and will ultimately be brought into alignment with the organisation’s software development strategy. However, due to the increase pace of today’s organisations EUD activity increasing takes place without the full knowledge or consent of management, such developments can be defined as covert rather than subversive, they emerge in response to the dynamic environments in which today’s organisations operate. This chapter reports on a covert EUD project where a wide group of internal and external stakeholders worked collaboratively to drive an organisation’s software development strategy. The research highlights the future inevitability of external stakeholders engaging in end user development as, with the emergence of wiki and blog-like environments, the boundaries of organisations’ technological artifacts become increasingly hard to define.


2009 ◽  
pp. 736-742
Author(s):  
Elaine H. Ferneley

End User Development (EUD) of system applications is typically undertaken by end users for their own, or closely aligned colleagues, business needs. EUD studies have focused on activity that is small scale, is undertaken with management consent and will ultimately be brought into alignment with the organisation’s software development strategy. However, due to the increase pace of today’s organisations EUD activity increasing takes place without the full knowledge or consent of management, such developments can be defined as covert rather than subversive, they emerge in response to the dynamic environments in which today’s organisations operate. This paper reports on a covert EUD project where a wide group of internal and external stakeholders worked collaboratively to drive an organisation’s software development strategy. The research highlights the future inevitability of external stakeholders engaging in end user development as, with the emergence of wiki and blog-like environments, the boundaries of organisations’ technological artifacts become increasingly hard to define.


2019 ◽  
Vol 1 (1) ◽  
pp. 79-87
Author(s):  
Sugian Nurwijaya

This is a research and developmentstudy with limited trials which aims to develop the Mathematics Learning Package by using a geogebra-assisted scientific approach in the eight grade of MTs Al-Junaidiyah Biru, Bone Regency. Such learning package includes student books, student activity sheets, learning implementation plans and learning outcomes test. The subjects of this study were twenty two students of class VIIIC MTs Al-Junaidiyah Biru Bone Regency. The development procedure used in this study is the Thiagarajan model or 4D model (Define, Design, Develop, and Disseminate) which includes four phases, namely the limitation, the design, the development, and the small scale distribution phase. Learning packagewith geogebra-assisted scientific approach that had been developed have been validated by experts and have been revised so that results are feasible to use. The results of limited trials show that the learning package produced has been practical and effective. (4) skor rata-rata yang diperoleh siswa pada tes hasil belajar adalah 78,40 dari skor ideal 100 dengan standar deviasi 11,89. Dimana 19 dari 22 siswa atau 86,36% memenuhi ketuntasan individu yang menunjukkan bahwa ketuntasan klasikal tercapai.The results of data analysis are as follows: (1) teacher activities can guide groups to work and learneffectively; (2) students generally give the positive responses to the developed learning package; (3) mathematics learning package with geogebra-assisted scientific approach make students more active in the learning process; (4) the average score obtained by students on the learning outcomes test is 78.40 from the ideal score of 100 with a standard deviation of 11.89. Then, 19 of 22 students or 86.36% fulfilled individual completeness which shows that classical completeness was achieved


2020 ◽  
Vol 30 (Supplement_5) ◽  
Author(s):  
S Houwaart

Abstract End-user (e.g. patients or the public) testing of information material is becoming more common in the German public health care system. However, including the end-user (in this case patients) in an optimisation process and thus enabling a close collaboration while developing PIMs is still rare. This is surprising, given the fact that patients provide the exact perspective one is trying to address. Within the isPO project, a patient organization is included as a legal project partner to act as the patient representative and provide the patient's perspective. As such, the patient organization was included in the PHR approach as part of the PIM-optimisation team. During the optimisation process, the patients gave practical insights into the procedures of diagnosing and treating different types of cancer as well as into the patient's changing priorities and challenges at different time points. This was crucial information for the envisioned application of the individual PIMs and their hierarchical overview. Moreover, the developed PIM-checklist enabled the patients to give detailed feedback to the PIMs. With their experience of being in the exact situation in which the PIMs will be applied, their recommendations, especially on the wording and layout of the materials, have been a valuable contribution to the PIM optimisation process. In this part of the seminar, we will take a closer look at the following skill building aspects: What is gained from including patients as end-users in the development and optimization of PIM?How can we reach patients to contribute to a PIM optimization process? Which requirements and prerequisites do patients have to provide to successfully work on an optimisation team?How to compromise and weigh opinions when different ideas occur? Altogether, this part will construct a structured path of productive patient involvement and help to overcome uncertainties regarding a collaboration with patient organizations.


Energies ◽  
2020 ◽  
Vol 13 (24) ◽  
pp. 6674
Author(s):  
Sebastian Hoffmann ◽  
Fabian Adelt ◽  
Johannes Weyer

This paper presents an agent-based model (ABM) for residential end-users, which is part of a larger, interdisciplinary co-simulation framework that helps to investigate the performance of future power distribution grids (i.e., smart grid scenarios). Different modes of governance (strong, soft and self-organization) as well as end-users’ heterogeneous behavior represent key influential factors. Feedback was implemented as a measure to foster grid-beneficial behavior, which encompasses a range of monetary and non-monetary incentives (e.g., via social comparison). The model of frame selection (MFS) serves as theoretical background for modelling end-users’ decision-making. Additionally, we conducted an online survey to ground the end-user sub-model on empirical data. Despite these empirical and theoretical foundations, the model presented should be viewed as a conceptual framework, which requires further data collection. Using an example scenario, representing a lowly populated residential area (167 households) with a high share of photovoltaic systems (30%), different modes of governance were compared with regard to their suitability for improving system stability (measured in cumulated load). Both soft and strong control were able to decrease overall fluctuations as well as the mean cumulated load (by approx. 10%, based on weekly observation). However, we argue that soft control could be sufficient and more societally desirable.


Author(s):  
Jitendra Singh ◽  
Vikas Kumar

Regulatory compliance is equally binding on small and medium business groups. Owing to the small scale and limited budget, such SMBs are unable to seek expert advice. To adequately guard the SMBs in regulatory compliance, the present work proposed a third-party managed-end user-driven approach that renders the list of regulatory acts applicable in one's case according to the country of one's residence, services subscribed, and type of the operations to be carried out in subscribed cloud paradigm. The list of applicable regulatory acts are rendered at the subscriber's end only. In addition, the proposed method notifies the present state of compliance of under-considered cloud providers. Based on the recommendation received, the subscriber can proceed with his decision to subscribe or not to subscribe in the event if desired compliances do not exist. This technological assistance will eliminate the need to possess the required knowledge in regulatory acts or seeking advice from the regulatory expert.


Author(s):  
Nitin Vishnu Choudhari ◽  
Dr. Ashish B Sasankar

Abstract –Today Security issue is the topmost problem in the cloud computing environment. It leads to serious discomfort to the Governance and end-users. Numerous security solutions and policies are available however practically ineffective in use. Most of the security solutions are centered towards cloud technology and cloud service providers only and no consideration has been given to the Network, accessing, and device securities at the end-user level. The discomfort at the end-user level was left untreated. The security of the various public, private networks, variety of devices used by end-users, accessibility, and capacity of end-users is left untreated. This leads towards the strong need for the possible modification of the security architecture for data security at all levels and secured service delivery. This leads towards the strong need for the possible adaption of modified security measures and provisions, which shall provide secured hosting and service delivery at all levels and reduce the security gap between the cloud service providers and end-users. This paper investigates the study and analyze the security architecture in the Cloud environment of Govt. of India and suggest the modifications in the security architecture as per the changing scenario and to fulfill the future needs for the secured service delivery from central up to the end-user level. Keywords: Cloud Security, Security in GI Cloud, Cloud Security measures, Security Assessment in GI Cloud, Proposed Security for GI cloud


2004 ◽  
Vol 4 (2) ◽  
pp. 111-123 ◽  
Author(s):  
Peter Goldsmith ◽  
Karen Bender

Dynamics in the global food system, along with a cascade of technologies, drive demands for capturing information and sharing information vertically within the supply chain. Food safety, genetic engineering, and animal welfare all have contributed to the need for enhanced information flow within the supply chain. Identity preservation in grains and oilseeds is an emerging issue that may influence the structure of agriculture in the longer term. This research addresses the following questions. While demand for high-information grains appears to be growing, where and how along the supply chain is the value created and captured? Though it appears that the economy demands ever-increasing amounts of differentiation, why do opportunities for producers and life science companies to create and capture significant new sources of value remain elusive? To answer these questions needs assessments were conducted with grain procurement executives. Their responses reveal the "buyer's calculus" where buyers balance investment in specific relationship assets with the market uplift or risk mitigation return it generates. Buying from a competitively structured industry has numerous benefits. There is a "cost" or tradeoff leaving the spot market procurement model in favor of a relationship-based model; hence the calculus. The current equilibrium state reflects the current risk-adjusted value proposition suppliers deliver to end users. Though end-user benefits are on the horizon with the next generation of biotechnologies, their emergence is insufficient to guarantee farmers and life science greater returns. End users will always balance the risk mitigation and market uplift features of a supply offering with the risks of narrowing their supply base. To drive value up the chain, suppliers need to shift away from focusing solely on the products of the future and focus on the technologies, delivery systems, and organizational models that, when bundled with new products solve problems and make end users more competitive.


2018 ◽  
Author(s):  
Hwayoung Cho ◽  
Dakota Powell ◽  
Adrienne Pichon ◽  
Jennie Thai ◽  
Josh Bruce ◽  
...  

BACKGROUND Mobile health (mHealth) apps have the potential to be a useful mode of delivering HIV prevention information, particularly for young men (13-24 years) who account for 21% of new HIV diagnoses in the United States. We translated an existing evidence-based, face-to-face HIV prevention curriculum into a portable platform and developed a mobile Web app: MyPEEPS Mobile. OBJECTIVE The purpose of this study was to assess the usability of MyPEEPS Mobile from both expert and end user perspectives. METHODS We conducted a heuristic evaluation with five experts in informatics to identify violations of usability principles and end user usability testing with 20 young men aged 15 to 18 years in New York, NY, Birmingham, AL, and Chicago, IL to identify potential obstacles to their use of the app. RESULTS Mean scores of the overall severity of the identified heuristic violations rated by experts ranged from 0.4 and 2.6 (0=no usability problem to 4=usability catastrophe). Overall, our end users successfully completed the tasks associated with use case scenarios and provided comments/recommendations on improving usability of MyPEEPS Mobile. The mean of the overall Post-Study System Usability Questionnaire scores rated by the end users was 1.63 (SD 0.65), reflecting strong user acceptance of the app. CONCLUSIONS The comments made by experts and end users will be used to refine MyPEEPS Mobile prior to a pilot study assessing the acceptability of the app across diverse sexual minority young men in their everyday lives.


Sign in / Sign up

Export Citation Format

Share Document