Personal and Situational Factors as Predictors of End User Performance

Author(s):  
I. M. Jawahar

End-user computing (EUC) has the potential to enhance productivity. However, for this potential to be realized, end users must learn EUC skills and perform at high levels. Because of the significance of end user performance to organizations, it is important to uncover factors that influence end user performance. However, prior research has relied almost exclusively on person factors to predict end user performance even though several models suggest that both person and situational factors influence behavior and performance. This limitation of previous research was overcome by examining the influence of both person and situational factors on end user performance. The three person factors and four situational factors investigated in this study, together, explained almost 40% of the variance in end user performance. Suggestions to enhance end user performance are offered, and directions for future research are discussed.

2009 ◽  
pp. 25-32
Author(s):  
Laura Beckwith ◽  
Margaret Burnett ◽  
Shraddha Sorte

Although gender differences in a technological world are receiving significant research attention, much of the research and practice has aimed at how society and education can impact the successes and retention of female computer science professionals. The possibility of gender issues within software, however, has received almost no attention, nor has the population of female end users. However, there is relevant foundational research suggesting that gender-related factors within a software environment that supports end-user computing may have a strong impact on how effective male and female end users can be in that environment. Thus, in this article, we summarize theory-establishing results from other domains that point toward the formation of grounded hypotheses for studying gender differences in end-user computing. There has been much background research relevant to human issues of end-user computing, which we define here as problem-solving using computer software, also termed end-user programming in some of the literature (e.g., Blackwell, 2002; Green & Petre, 1996; Nardi, 1993). (See the glossary for definitions of these and related terms.) Despite this, few researchers have considered potential gender HCI issues and gender differences that may need to be accounted for in designing end-user computing environments. The most notable exception is Czerwinski’s pioneering research on the support of both genders in navigating through 3-D environments (Czerwinski, Tan, & Robertson, 2002; Tan, Czerwinski, & Robertson, 2003). Although individual differences, such as experience, cognitive style, and spatial ability, are likely to vary more than differences between gender groups, evidence from Czerwinski’s work as well as work in other domains, such as psychology and marketing, has found gender differences relevant to computer usage. In fact, some research has shown that some software is (unintentionally) designed for males (Huff, 2002). One reason gender HCI issues in end-user computing are important is that ignorance of gender issues has already proven to be dangerous: today’s low percentage of computer science females (Camp, 1997) has been directly attributed to the past unawareness of gender issues in computer science education and in the workforce. There is a risk that if gender HCI issues in end-user computing environments are ignored, a similar phenomenon could occur with female end users.


10.28945/2489 ◽  
2002 ◽  
Author(s):  
Chittibabu Govindarajulu

End-user computing (EUC) has led to increased end-user productivity and satisfaction. In order to reduce the risks inherent to EUC, organizations should better manage EUC. As a first step different groups of end-users must be identified. Existing classification schemes have weaknesses and fail to capture the different roles contemporary end users play. Cotterman and Kumar (1989) proposed a user cube based on the three main dimensions of EUC -development, operation, and control. Even though this is rational approach to end user classification, it has been largely ignored by researchers. This may be due to the lack of an instrument to implement the cube. Hence, in this paper, a 10-item instrument is presented and data collected from 292 end users show that the instrument has strong construct validity. Practitioners can find this instrument very useful in determining the characteristics of EUC in their firms which in turn would be beneficial to devise strategies for EUC management.


Author(s):  
Chung-Tzer Liu ◽  
Yi Maggie Guo

End-user satisfaction has always been an important component of Information Systems (IS) success. This is also true for online applications, including online shopping systems, where in addition to being a customer, the shoppers play the role of end-users. Shoppers may not come back to or make a purchase on a Web site if they have an unsatisfactory experience. In this research, we focus on this aspect of online shopping by examining shoppers’ experiences as end-users.


2008 ◽  
pp. 2266-2273
Author(s):  
I. M. Jawahar

Over the last decade, end-user computing has become an integral part of the organizational landscape. The emergence of end-user computing can be attributed to the necessity to manage and to effectively use information to function in a knowledge-based economy. Because of the increased organizational computing needs, computer literacy requirements have skyrocketed for clerical and support staff and for many middle and senior management positions (Bowman, Grupe, & Simkin, 1995). The proliferation of microcomputers and the availability of sophisticated user application tools (Shayo, Guthrie, & Igbaria, 1999) have facilitated the widespread implementation of end-user computing technology.


2008 ◽  
pp. 1823-1842
Author(s):  
M. F. Costabile ◽  
D. Fogli ◽  
R. Lanzilotti

End-user development means the active participation of end users in the software development process. In this perspective, tasks that are traditionally performed by professional software developers are transferred to end users, who need to be specifically supported in performing these tasks. We have developed a methodology that supports user work practice and metadesign, allowing experts in a domain to personalize and evolve their own software environments. In this article we illustrate how this methodology is applied to a project for the development of an interactive system in the medical domain. Physicians and their activities have been carefully analyzed through a field study that is reported in the article, in order to provide them with computer systems that may improve their work practice and determine an increase in their productivity and performance, that is, a better quality of diagnosis and medical cure, with the achievement of competitive advantage for the organization they work in.


2008 ◽  
pp. 2114-2129
Author(s):  
Merrill Warkentin

The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures historically have been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security is that is provided by the password, because it is more difficult to violate or crack. However, such a password tends to be more difficult for an end user to remember, particularly when the password does not spell a recognizable word or when it includes non-alphanumeric characters such as punctuation marks or other symbols. Conversely, when end users select their own more easily remembered passwords, the passwords also may be cracked more easily. This study presents a new approach to entering passwords that combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords and high-protection, assigned-password procedures. The present study investigates tradeoffs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all tested password procedures to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared to a high-security password. Further research will be conducted to investigate long-term benefits.


Author(s):  
Murray E. Jennex

How much end-user computing is too much? Should end users develop systems? This case looks at a study of end user computing within the engineering organizations of an electric utility undergoing deregulation. The case was initiated when management perceived that too much engineering time was spent doing IS functions. The case found that there was significant effort being expended on system development, support, and ad hoc use. Reviews of a few key systems illustrate quality problems found with the end-user developed systems. Several issues were identified affecting system development including use of programming standards, documentation, infrastructure integration, and system support. Additionally, the issues of obsolescence, security, and procurement are discussed.


Author(s):  
I. M. Jawahar

Over the last decade, end-user computing has become an integral part of the organizational landscape. The emergence of end-user computing can be attributed to the necessity to manage and to effectively use information to function in a knowledge-based economy. Because of the increased organizational computing needs, computer literacy requirements have skyrocketed for clerical and support staff and for many middle and senior management positions (Bowman, Grupe, & Simkin, 1995). The proliferation of microcomputers and the availability of sophisticated user application tools (Shayo, Guthrie, & Igbaria, 1999) have facilitated the widespread implementation of end-user computing technology.


Author(s):  
Changki Kim ◽  
Kunsoo Suh ◽  
Jinjoo Lee

There has been much controversy regarding the relationship between utilization and user satisfaction. Moreover, conflicting empirical results on that relationship have been reported. Based on the information processing view, a new, alternative model which can resolve this conflict is suggested. The model includes the congruence of task uncertainty and utilization and the contingent effect of task uncertainty on the relationship between utilization and user satisfaction in the context of end-user computing (EUC). This new model is moderately supported by an analysis of data obtained from 134 end-users in 16 Korean business organizations. The results imply that we should pay attention to the fit between task uncertainty and utlization to promote user satisfaction. The results also provide a framework which resolves the inconsistent relationship between utilization and user satisfaction. Implications and future research directions are drawn for further research on MIS and EUC and for the management of EUC.


Sign in / Sign up

Export Citation Format

Share Document