Expert and Novice End-User Spreadsheet Debugging

2011 ◽  
Vol 23 (2) ◽  
pp. 57-80 ◽  
Author(s):  
Brian Bishop ◽  
Kevin McDaid

The reliability of end-user developed spreadsheets is poor. Research studies find that 94% of ‘real-world’ spreadsheets contain errors. Although some research has been conducted in the area of spreadsheet testing, little is known about the behaviour or processes of individuals during the debugging task. In this paper, the authors investigate the performance and behaviour of expert and novice end-users in the debugging of an experimental spreadsheet. To achieve this aim, a spreadsheet debugging experiment was conducted, with professional and student participants requested to debug a spreadsheet seeded with errors. The work utilises a novel approach for acquiring experimental data through the unobtrusive recording of participants’ actions using a custom built VBA tool. Based on findings from the experiment, a debugging tool is developed, and its effects on debugging performance are investigated.

Author(s):  
Brian Bishop ◽  
Kevin McDaid

The reliability of end-user developed spreadsheets is poor. Research studies find that 94% of ‘real-world’ spreadsheets contain errors. Although some research has been conducted in the area of spreadsheet testing, little is known about the behaviour or processes of individuals during the debugging task. In this paper, the authors investigate the performance and behaviour of expert and novice end-users in the debugging of an experimental spreadsheet. To achieve this aim, a spreadsheet debugging experiment was conducted, with professional and student participants requested to debug a spreadsheet seeded with errors. The work utilises a novel approach for acquiring experimental data through the unobtrusive recording of participants’ actions using a custom built VBA tool. Based on findings from the experiment, a debugging tool is developed, and its effects on debugging performance are investigated.


Author(s):  
Karen Neville ◽  
Philip Powell

This chapter outlines the proposed development of a “Knowledge Base Support Environment” for a university. The system is completely interactive allowing every end user the opportunity to extract from and add to the system. As well as providing a support system for both students and staff alike, the system or environment (see Figure 1) will profile both the academic and technical interests of its end-users. The environment will test student’s problem-solving skills with “real world” simulations and cases providing feedback to both lecturers and students. The environment will grow and change as both staff and students collaborate to add and extract material from the system. Duplication of work by staff will be dramatically reduced, freeing staff to concentrate on other tasks. The environment itself can be used by organizations in training, and in the management and creation of knowledge.


2017 ◽  
Vol 8 (2) ◽  
pp. 563 ◽  
Author(s):  
Usman Ependi

Heuristic evaluation merupakan salah satu bentuk usability testing perangkat lunak yang dinilai oleh pengguna (evaluator). Dalam melakukan heuristic evaluation instrumen penilaian terdiri dari sepuluh (10) pernyataan dengan lima pilihan jawaban dalam skala severity ratings. Dalam penelitian ini heuristic evaluation terhadap aplikasi Depo Auto 2000 Tanjung Api-Api Palembang yang dilakukan oleh 4 evaluator.  Hasil dari heuristic evaluation dikelompokkan kedalam  masing-masing instrumen yaitu visibility of system status dengan nilai 0,75, match between system and the real world dengan nilai 0,25, user control and freedom dengan nilai 0,25, consistency and standards dengan nilai 0,75, error prevention dengan nilai 1, recognition rather than recall dengan nilai 1,25, flexibility and efficiency of use dengan nilai 0,25, Aesthetic and minimalist design dengan nilai 0,25, help users recognize, diagnose, and recover from errors dengan nilai 1 dan Help and documentation dengan nilai 0. Dari hasil heuristic evaluation yang dilakukan menunjukkan bahwa evaluator memberikan nilai 0 dan 1 aplikasi Depo Atuo 2000 Tanjung Api-Api Palembang. Hasil penilaian tersebut menunjukkan bahwa aplikasi yang buat tidak ada masalah usability dan hanya memiliki cosmetic problem sehingga aplikasi Depo Auto 2000 Tanjung Api Api Palembang  dapat dinyatakan layak untuk didistribusikan kepada pengguna akhir (end user). 


Designs ◽  
2021 ◽  
Vol 5 (1) ◽  
pp. 8
Author(s):  
Pyrrhon Amathes ◽  
Paul Christodoulides

Photography can be used for pleasure and art but can also be used in many disciplines of science, because it captures the details of the moment and can serve as a proving tool due to the information it preserves. During the period of the Apollo program (1969 to 1972), the National Aeronautics and Space Administration (NASA) successfully landed humans on the Moon and showed hundreds of photos to the world presenting the travel and landings. This paper uses computer simulations and geometry to examine the authenticity of one such photo, namely Apollo 17 photo GPN-2000-00113. In addition, a novel approach is employed by creating an experimental scene to illustrate details and provide measurements. The crucial factors on which the geometrical analysis relies are locked in the photograph and are: (a) the apparent position of the Earth relative to the illustrated flag and (b) the point to which the shadow of the astronaut taking the photo reaches, in relation to the flagpole. The analysis and experimental data show geometrical and time mismatches, proving that the photo is a composite.


2020 ◽  
Vol 30 (Supplement_5) ◽  
Author(s):  
S Houwaart

Abstract End-user (e.g. patients or the public) testing of information material is becoming more common in the German public health care system. However, including the end-user (in this case patients) in an optimisation process and thus enabling a close collaboration while developing PIMs is still rare. This is surprising, given the fact that patients provide the exact perspective one is trying to address. Within the isPO project, a patient organization is included as a legal project partner to act as the patient representative and provide the patient's perspective. As such, the patient organization was included in the PHR approach as part of the PIM-optimisation team. During the optimisation process, the patients gave practical insights into the procedures of diagnosing and treating different types of cancer as well as into the patient's changing priorities and challenges at different time points. This was crucial information for the envisioned application of the individual PIMs and their hierarchical overview. Moreover, the developed PIM-checklist enabled the patients to give detailed feedback to the PIMs. With their experience of being in the exact situation in which the PIMs will be applied, their recommendations, especially on the wording and layout of the materials, have been a valuable contribution to the PIM optimisation process. In this part of the seminar, we will take a closer look at the following skill building aspects: What is gained from including patients as end-users in the development and optimization of PIM?How can we reach patients to contribute to a PIM optimization process? Which requirements and prerequisites do patients have to provide to successfully work on an optimisation team?How to compromise and weigh opinions when different ideas occur? Altogether, this part will construct a structured path of productive patient involvement and help to overcome uncertainties regarding a collaboration with patient organizations.


Energies ◽  
2020 ◽  
Vol 13 (24) ◽  
pp. 6674
Author(s):  
Sebastian Hoffmann ◽  
Fabian Adelt ◽  
Johannes Weyer

This paper presents an agent-based model (ABM) for residential end-users, which is part of a larger, interdisciplinary co-simulation framework that helps to investigate the performance of future power distribution grids (i.e., smart grid scenarios). Different modes of governance (strong, soft and self-organization) as well as end-users’ heterogeneous behavior represent key influential factors. Feedback was implemented as a measure to foster grid-beneficial behavior, which encompasses a range of monetary and non-monetary incentives (e.g., via social comparison). The model of frame selection (MFS) serves as theoretical background for modelling end-users’ decision-making. Additionally, we conducted an online survey to ground the end-user sub-model on empirical data. Despite these empirical and theoretical foundations, the model presented should be viewed as a conceptual framework, which requires further data collection. Using an example scenario, representing a lowly populated residential area (167 households) with a high share of photovoltaic systems (30%), different modes of governance were compared with regard to their suitability for improving system stability (measured in cumulated load). Both soft and strong control were able to decrease overall fluctuations as well as the mean cumulated load (by approx. 10%, based on weekly observation). However, we argue that soft control could be sufficient and more societally desirable.


2012 ◽  
Vol 204-208 ◽  
pp. 2721-2725
Author(s):  
Hua Ji Zhu ◽  
Hua Rui Wu

Village land continually changes in the real world. In order to keep the data up-to-date, data producers need update the data frequently. When the village land data are updated, the update information must be dispensed to the end-users to keep their client-databases current. In the real world, village land changes in many forms. Identifying the change type of village land (i.e. captures the semantics of change) and representing them in the data world can help end-users understand the change commonly and be convenient for end-users to integrate these change information into their databases. This work focuses on the model of the spatio-temporal change. A three-tuple model CAR for representing the spatio-temporal change is proposed based on the village land feature set before change and the village land feature set after change, change type and rules. In this model, the C denotes the change type. A denotes the attribute set; R denotes the judging rules of change type. The rule is described by the IF-THEN expressions. By the operations between R and A, the C is distinguished. This model overcomes the limitations of current methods. And more, the rules in this model can be easy realized in computer program.


Author(s):  
Nitin Vishnu Choudhari ◽  
Dr. Ashish B Sasankar

Abstract –Today Security issue is the topmost problem in the cloud computing environment. It leads to serious discomfort to the Governance and end-users. Numerous security solutions and policies are available however practically ineffective in use. Most of the security solutions are centered towards cloud technology and cloud service providers only and no consideration has been given to the Network, accessing, and device securities at the end-user level. The discomfort at the end-user level was left untreated. The security of the various public, private networks, variety of devices used by end-users, accessibility, and capacity of end-users is left untreated. This leads towards the strong need for the possible modification of the security architecture for data security at all levels and secured service delivery. This leads towards the strong need for the possible adaption of modified security measures and provisions, which shall provide secured hosting and service delivery at all levels and reduce the security gap between the cloud service providers and end-users. This paper investigates the study and analyze the security architecture in the Cloud environment of Govt. of India and suggest the modifications in the security architecture as per the changing scenario and to fulfill the future needs for the secured service delivery from central up to the end-user level. Keywords: Cloud Security, Security in GI Cloud, Cloud Security measures, Security Assessment in GI Cloud, Proposed Security for GI cloud


2004 ◽  
Vol 4 (2) ◽  
pp. 111-123 ◽  
Author(s):  
Peter Goldsmith ◽  
Karen Bender

Dynamics in the global food system, along with a cascade of technologies, drive demands for capturing information and sharing information vertically within the supply chain. Food safety, genetic engineering, and animal welfare all have contributed to the need for enhanced information flow within the supply chain. Identity preservation in grains and oilseeds is an emerging issue that may influence the structure of agriculture in the longer term. This research addresses the following questions. While demand for high-information grains appears to be growing, where and how along the supply chain is the value created and captured? Though it appears that the economy demands ever-increasing amounts of differentiation, why do opportunities for producers and life science companies to create and capture significant new sources of value remain elusive? To answer these questions needs assessments were conducted with grain procurement executives. Their responses reveal the "buyer's calculus" where buyers balance investment in specific relationship assets with the market uplift or risk mitigation return it generates. Buying from a competitively structured industry has numerous benefits. There is a "cost" or tradeoff leaving the spot market procurement model in favor of a relationship-based model; hence the calculus. The current equilibrium state reflects the current risk-adjusted value proposition suppliers deliver to end users. Though end-user benefits are on the horizon with the next generation of biotechnologies, their emergence is insufficient to guarantee farmers and life science greater returns. End users will always balance the risk mitigation and market uplift features of a supply offering with the risks of narrowing their supply base. To drive value up the chain, suppliers need to shift away from focusing solely on the products of the future and focus on the technologies, delivery systems, and organizational models that, when bundled with new products solve problems and make end users more competitive.


2017 ◽  
Vol 22 (4) ◽  
pp. 297-304 ◽  
Author(s):  
Ming Jin ◽  
Nicole DeHoratius ◽  
Glen Schmidt

Purpose The popular “beer game” illustrates the bullwhip effect where a small perturbation in downstream demand can create wild swings in upstream product flows. The purpose of this paper is to present a methodical framework to measure the bullwhip effect and evaluate its impact. Design/methodology/approach This paper illustrates a framework using SKU-level data from an industry-leading manufacturer, its distributors, end-users and suppliers. Findings Firms benefit from tracking multiple intra-firm bullwhips and from tracking bullwhips pertinent to specific products, specific suppliers and specific customers. The framework presented in this paper enables managers to pinpoint bullwhip sources and mitigate bullwhip effects. Research limitations/implications This paper presents a framework for methodically measuring and tracking intra-firm and inter-firm bullwhips. Practical implications A disconnect exists between what is known and taught regarding the bullwhip effect and how it is actually tracked and managed in practice. This paper aims to reduce this gap. For the various products analyzed herein, the authors show how using this framework has the potential to reduce delivered product cost by 2 to 15 per cent. Social implications Properly managing the bullwhip leads to lower inventories and potentially lower product prices while simultaneously increasing firm profits. Originality/value This paper presents a novel approach to systematically tracking intra-firm bullwhips along with bullwhips specific to a given supplier or customer.


Sign in / Sign up

Export Citation Format

Share Document