The Role of Trainer Behavior in End User Software Training

2002 ◽  
Vol 14 (1) ◽  
pp. 23-32 ◽  
Author(s):  
Deborah Compeau
Keyword(s):  
End User ◽  
2020 ◽  
Vol 13 (3) ◽  
pp. 1-15
Author(s):  
Rida Bangash ◽  
Kausar Fiaz Khawaja ◽  
Sumayya Chughtai

User resistance is a complex phenomenon and is considered a major constraint towards the successful implementation and usage of information technology. Hence, in order to investigate the factors that may lead to user resistance; the current study proposes and investigates the mediating role of fear of unknown between lack of change information and end-user grumbling, and the moderating role of emotional regulation between the relationship. Emotional self-regulation theory has been used as an overarching theory that explains the research model proposed and tested in the study. Using a Quantitative approach, the survey was conducted and data was collected from 334 users of FBR systems. With the help of SPSS and MACRO PROCESS, statistical tests were conducted and links were tested. Results revealed that all hypotheses were accepted. Along with these discussions, research implications and recommendations are also provided.


Author(s):  
Mohd Yusri Jusoh ◽  
Haryani Haron ◽  
Jasber Kaur

Bring Your Own Device (BYOD) is a new approach to optimize the use of Information Technology (IT) devices to carry out their work task. The study of BYOD is focused on work activities that perform by IT worker using IT device in public sector. Work activities can provide important insights into IT device portfolio development, end-user segmentation process and the role of IT workers in public sector. The propose of this study is to explore work process of bringing your own devices to support green computing. A conceptual framework of BYOD work process in public sector through integration of IT devices and end-user segmentation to support green computing was developed based on systematic literature review to highlight the implementation of BYOD. This framework considers that work activities based on IT worker, IT device portfolio and end-user segmentation are the main key for public sector to support green computing. This framework is an initial research for researchers and practitioners to further examine BYOD practices in public sector. In addition, to highlight an important gap, this paper explains how different work activities using different IT device influence the IT worker to select the suitable IT device for BYOD that support green computing.


Author(s):  
G.I. Ogle ◽  
A.L. Craigie ◽  
M.J. Baker

The AgLINK bulletin series dominated all agricultural and horticultural information publications from the late 1960s to the late 1980s, when it was discontinued. The collapse of such a high profile series raises questions about the viability of such a mechanism for linking farmers with facts. This failure highlights three key issues: the need to define and allocate the costs based on who benefits; the appropriate positioning of parties within the distribution chain; and a quality specification to which bulletins must adhere. We consider that AgFACT, the AgResearch pastoral agriculture information base which superseded AgLINK in 1997, should largely be cost neutral to science groups in AgResearch. However, the resources for providing information need to be met by science programmes, a cost which is outweighed by the opportunity to communicate with science stakeholders. The costs of distribution and retail need to fall with the other parties who benefit from the dissemination of this information - the retailer and the end user. We also consider that the role of AgResearch is in manufacture rather than sales to the public, which is best done by the agricultural service sector. AgFACT must maintain tight specifications, to ensure that it is relevant to farmers and other users, accurate and unbiased, and up to date. The penalty for not doing so is a loss of value and, moreover, a risk of it becoming a public liability. Keywords: AgFACT, AgLINK, agricultural information, information base, technology transfer


Author(s):  
Ozan Erdinc ◽  
Akin Tascikaraoglu ◽  
Yavuz Eren ◽  
Nikolaos G. Paterakis ◽  
Madeleine Gibescu ◽  
...  
Keyword(s):  
End User ◽  

2011 ◽  
Vol 2 (1) ◽  
pp. 397-405
Author(s):  
Evan Asfoura ◽  
Naoum Jamous ◽  
Gamal Kassem ◽  
Reiner Dumke
Keyword(s):  

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Xin Yu

PurposeIn heterogeneously segmented markets, collaborating with product users in product innovation is important for business success. End user innovators and embedded user innovators differ in terms of their prior embeddedness in the target industry. The purpose of this study is twofold. First, the authors empirically compare these two types of user innovators in terms of their diffusion channel selection. Second, the authors analyze how the technological advances of their innovations affect this difference.Design/methodology/approachUsing an online questionnaire survey, this study collected a sample of 237 user-generated innovations in Japan and analyzed several hypotheses using quantitative statistical approaches.FindingsThe analysis shows that embedded user innovators are more likely than end user innovators to transfer their innovations to producers rather than peers. As the technological advances of their innovations increase, end user innovators' likelihood of transferring their innovation to producers increases more significantly than that of embedded user innovators.Originality/valueThis is the first paper to investigate the difference between end user innovators and embedded user innovators with respect to their diffusion channel selection as well as the moderating role of technological advances. The findings bring new perspectives to the domains of user–producer collaboration and technology transfer.


2016 ◽  
Vol 31 (1) ◽  
pp. 79-101 ◽  
Author(s):  
Stephan Zimmermann ◽  
Christopher Rentrop ◽  
Carsten Felden

ABSTRACT In several organizations, business workgroups autonomously implement information technology (IT) outside the purview of the IT department. Shadow IT, evolving as a type of workaround from nontransparent and unapproved end-user computing (EUC), is a term used to refer to this phenomenon, which challenges norms relative to IT controllability. This report describes shadow IT based on case studies of three companies and investigates its management. In 62 percent of cases, companies decided to reengineer detected instances or reallocate related subtasks to their IT department. Considerations of risks and transaction cost economics with regard to specificity, uncertainty, and scope explain these actions and the resulting coordination of IT responsibilities between the business workgroups and IT departments. This turns shadow IT into controlled business-managed IT activities and enhances EUC management. The results contribute to the governance of IT task responsibilities and provide a way to formalize the role of workarounds in business workgroups.


Sensors ◽  
2019 ◽  
Vol 19 (11) ◽  
pp. 2445 ◽  
Author(s):  
Rodrigo A. C. da Silva ◽  
Nelson L. S. da Fonseca

In the fog computing paradigm, fog nodes are placed on the network edge to meet end-user demands with low latency, providing the possibility of new applications. Although the role of the cloud remains unchanged, a new network infrastructure for fog nodes must be created. The design of such an infrastructure must consider user mobility, which causes variations in workload demand over time in different regions. Properly deciding on the location of fog nodes is important to reduce the costs associated with their deployment and maintenance. To meet these demands, this paper discusses the problem of locating fog nodes and proposes a solution which considers time-varying demands, with two classes of workload in terms of latency. The solution was modeled as a mixed-integer linear programming formulation with multiple criteria. An evaluation with real data showed that an improvement in end-user service can be obtained in conjunction with the minimization of the costs by deploying fewer servers in the infrastructure. Furthermore, results show that costs can be further reduced if a limited blocking of requests is tolerated.


2020 ◽  
Vol 7 (2) ◽  
pp. 200-214
Author(s):  
Ron Corso

Institutions of higher education in the twenty-first century are undergoing a transformation locally and globally from traditional pillars of learning to being more entrepreneurial in their core business. There is increasing pressure on universities to becoming more flexible and adaptable as organizations and in the graduate attributes, they imbed in their students. There is a need to build deeper links with business, to both maximize innovation and promote growth, to ensure students are equipped to excel in the workforce. This change is having a disruptive effect on the role of universities, from classical research institutions to entrepreneurial universities mimicking more of the modern workplace working environment, requiring autonomy in their decision-making and in the way new research is developed, implemented and transferred in the relationships formed within their respective regions. This article outlines work in progress on the University of South Australia’s attempts to rebrand itself as a University of Innovation and Enterprise (Australia’s University of Enterprise) in both its end-user inspired research outcomes and industry-informed teaching and learning.


Sign in / Sign up

Export Citation Format

Share Document