End-User Computing, Development, and Software Engineering
Latest Publications


TOTAL DOCUMENTS

17
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

Published By IGI Global

9781466601406, 9781466601413

Author(s):  
Gunnar Stevens ◽  
Volkmar Pipek ◽  
Volker Wulf

End User Development offers technological flexibility to encourage the appropriation of software applications within specific contexts of use. Appropriation needs to be understood as a phenomenon of many collaborative and creative activities. To support appropriation, we propose integrating communication infrastructure into software application that follows an“easy-to-collaborate”-principle. Such an appropriation infrastructure stimulates the experience sharing among a heterogeneous product community and supports the situated development of usages. Taking the case of the BSCWeasel groupware, we demonstrate how an appropriation infrastructure can be realized. Empirical results from the BSCWeasel project demonstrate the impact of such an infrastructure on the appropriation and design process. Based on these results, we argue that the social construction of IT artifacts should be tightly integrated in the material construction of IT artifacts in bridging design and use discourses.


Author(s):  
Jianfeng Wang ◽  
William J. Doll ◽  
Xiaodong Deng

Course management systems (CMSs) enable institutions to engage users efficiently, increase enrollment without major facilities investments, and serve geographically dispersed student markets on an ongoing basis. The full benefits of technology cannot be realized if faculty do not adopt the new technology and use it to achieve their instructional design objectives. From a faculty perspective, pedagogical usability of the software is an important factor affecting technology adoption and effective implementation. Pedagogical usability is measured using Chickering and Gamson’s seven principles of good educational practice. In a distance learning context, this paper provides an initial exploratory study of how faculty perceptions of CMS software characteristics like content re-configurability, interaction re-configurability, and modularity design help faculty implement good pedagogical principles. Additionally, a model is presented that links CMS software design characteristics like content re-configurability, interaction re-configurability, and modularity design with the pedagogical usability assessments of faculty. This model is tested using a sample of 56 faculty members using WebCT at a mid-western university.


Author(s):  
Federico Cabitza ◽  
Carla Simone

In this article, we present WOAD, a framework that was inspired and partly validated within a 2-year observational case study at a major teaching hospital. We present the WOAD framework by stating its main and motivating rationales, outlining its high-level architecture and then introducing its denotational language, LWOAD. We propose LWOAD to support users of an electronic document system in declaratively expressing, specifying and implementing content- and event-based mechanisms that fulfill coordinative requirements and make users aware of relevant conditions. Our focus addresses (a) the user-friendly and yet formal expression of local coordinative practices based on the work context; (b) the promotion of awareness of both these conventions and the context to enable actors to quickly respond; (c) the full deployment of coordination-oriented and context-aware functionalities into legacy electronic document systems. We give examples of LWOAD mechanisms taken from the case study and discuss their impact from the EUD perspective.


Author(s):  
Terry A. Byrd ◽  
Linda W. Byrd

The Resource-Based View (RBV) has become one of the most popular ways to examine the impact of IT on firm performance. An increasing number of researchers are using the theoretical underpinning of the RBV to ground their research in investigating this relationship. This paper follows in this tradition by developing multidimensional measures for two dimensions of IT capability, inside-out IT capability and spanning IT capability. In this regard, the authors relate these dimensions to firm performance as profit ratios and cost ratios. Inside-out capability is the IT resources deployed from inside the firm in response to market requirements and opportunities. However, spanning IT capability involves both internal and external analysis and is needed to integrate the firm’s inside-out and outside-in IT competences. This study also makes an exploratory comparative assessment of the relative impact of inside-out IT capability and spanning IT capability, while analyzing the differences on the impact of IT capability in diverse types of organizations. Finally, the authors give evidence that different dimensions of IT capability may have different effects on performance measures.


Author(s):  
Harri Oinas-Kukkonen ◽  
Sari Hohtari ◽  
Samuli Pekkola

Introducing information systems into organizations initiates a change in human behaviors, which is often perceived as obtrusive and distracting. End-user training may help manage this challenge by getting the users familiar with the system and its functionality. However, end-user training is not easy, nor self-evident, as shown in this paper. This is problematic, particularly when organization-wide standards for how to provide training are missing or when the group of end-users is two-layered, that is, both the customers and the staff must be trained. In this paper, the authors describe a qualitative case study of how the end-user training on an e-Bank was organized, and how the training was delivered to its elderly customers. The training model by Simonsen and Sein (2004) is utilized and extended to cover the systems development cycle. The authors argue that an approach that integrates the end-user training with the systems development improves organizational implementation. As a result, this paper makes practical suggestions about the issues related to organizing end-user training.


Author(s):  
Allen Johnston ◽  
Merrill Warkentin

Through persuasive communications, information technology (IT) executives hope to align the actions of end users with the expectations of senior management and of the firm regarding technology usage. One highly influential factor of persuasive effectiveness is the source of the persuasive message. This study presents a conceptual model for explaining the influence of source credibility on end user attitudes and behavioral intentions to comply with organizationally motivated, recommended IT actions within a decentralized, autonomous environment. The results of this study suggest that the elements of source competency, trustworthiness, and dynamism are significant determinants of attitudes and behavioral intentions to engage in recommended IT actions. These findings reveal the importance of these elements of effective communication in persuading end users to follow recommended IT activities and advance IT acceptance and adoption research through the application of persuasive communication theory to the domain.


Author(s):  
Tony Coulson ◽  
Lorne Olfman ◽  
Terry Ryan ◽  
Conrad Shayo

Enterprise systems (ESs) are customizable, integrated software applications designed to support core business processes. This paper reports research contrasting the relative effectiveness of two strategies for ES end-user training that differentially reflect the Sein, Bostrom, and Olfman (1999) hierarchical knowledge-level model. One strategy— procedural—involves training that targets the three lowest knowledge levels of the model (command-based, tool-procedural, and business-procedural); the other—tool-conceptual—involves training that also includes a higher knowledge level (tool-conceptual). A non-equivalent quasi-experimental design was used for groups of senior business students being trained to use an authentic ES. Performance measures were administered during training and ten days after training concluded. Both experiments demonstrated that training involving the tool-conceptual knowledge level leads to superior mental models, compared with training oriented toward lower knowledge levels, as expressed in the recollection and communication of ES concepts. Tool-conceptual knowledge-level training can be used to promote understanding and communication, and should be incorporated into training strategies for ES.


Author(s):  
Y. Ken Wang ◽  
Pratim Datta

Although much research in the IS field has examined IS adoption, less is known about post-adoption behavior among IS users, especially when competing alternatives are available. Incorporating commitment theory from social psychology and management science literature, this paper proposes an IS continuance model that explains why some IS technologies enjoy continued use after adoption and others are often relegated to the basement as shelfware. This paper uses a technology commitment perspective to unravel why adopted technologies experience mixed success. Specifically, the authors argue that IS continuance may be best understood by investigating user commitment toward specific technologies. Three components of technology commitment, that is, affective commitment, calculative commitment, and normative commitment, are used to formulate a research model. The model is empirically tested in the context of instant messaging software. Results show a strong support for the model and explicate commitment differentials among users across different brands of instant messaging software. The study ends with a discussion of the results and their implications for research and practice.


Author(s):  
Gerhard Fischer

The first decade of the World Wide Web predominantly enforced a clear separation between designers and consumers. New technological developments, such as the participatory Web 2.0 architectures, have emerged to support social computing. These developments are the foundations for a fundamental shift from consumer cultures (specialized in producing finished goods) to cultures of participation (in which all people can participate actively in personally meaningful activities). End-user development and meta-design provide foundations for this fundamental transformation. They explore and support new approaches for the design, adoption, appropriation, adaptation, evolution, and sharing of artifacts by all participating stakeholders. They take into account that cultures of participation are not dictated by technology alone: they are the result of incremental shifts in human behavior and social organizations. The design, development, and assessment of five particular applications that contributed to the development of our theoretical framework are described and discussed.


Author(s):  
Brad A. Myers ◽  
Sae Young Jeong ◽  
Yingyu Xie ◽  
Jack Beaton ◽  
Jeff Stylos ◽  
...  

All software today is written using application programming interfaces (APIs). We performed a user study of the online documentation of a large and complex API for Enterprise Service-Oriented Architecture (eSOA), which identified many issues and recommendations for making API documentation easier to use. eSOA is an appropriate testbed because the target users include high-level business experts who do not have significant programming expertise and thus can be classified as “end-user developers.” Our study showed that the participants’ background influenced how they navigated the documentation. Lack of familiarity with business terminology was a barrier for developers without business application experience. Both groups avoided areas of the documentation that had an inconsistent visual design. A new design for the documentation that supports flexible navigation strategies seems to be required to support the wide range of users for eSOA. This paper summarizes our study and provides recommendations for future documentation for APIs.


Sign in / Sign up

Export Citation Format

Share Document