Academic literature on the topic 'End-user computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'End-user computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "End-user computing"

1

Panko, Raymond R., and Daniel N. Port. "End User Computing." Journal of Organizational and End User Computing 25, no. 3 (July 2013): 1–19. http://dx.doi.org/10.4018/joeuc.2013070101.

Full text
Abstract:
End user computing (EUC) is like dark matter in physics. EUC is enormous in quantity and importance yet has been largely invisible to corporate IT departments, information systems (IS) researchers, and corporate management. EUC applications, especially spreadsheet applications, are also “dark” in the sense that they pose a number of overlooked risks for organizations, including errors, privacy violations, trade secret extrusions, and compliance violations. On the positive side, EUC applications are also like the dark energy of physics. They are supporting critical gains in decision making, computing by scientists and engineers, operational systems, and other important processes in every corner of the firm. It is time to stop ignoring end user computing in general and spreadsheets in particular. The purpose of this paper is to document to the extent possible today then importance of end user computing relative to the concerns of corporate IT departments and IS researchers.
APA, Harvard, Vancouver, ISO, and other styles
2

Goodell, Howie, and Carol Traynor. "End-user computing." ACM SIGCHI Bulletin 29, no. 4 (October 1997): 84–86. http://dx.doi.org/10.1145/270950.270997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Clark, Carol. "End User Computing Ergonomics." Journal of Organizational and End User Computing 18, no. 3 (July 2006): 66–74. http://dx.doi.org/10.4018/joeuc.2006070104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gray, Paul. "Examining End-User Computing." Journal of Information Systems Management 5, no. 1 (January 1988): 84–85. http://dx.doi.org/10.1080/07399018808962902.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gilhooley, Ian A. "Controlling End-User Computing." EDPACS 14, no. 4 (October 1986): 1–9. http://dx.doi.org/10.1080/07366988609450377.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ko, Catherine, and Margaret Hurley. "Managing end‐user computing." Information Management & Computer Security 3, no. 3 (August 1995): 3–6. http://dx.doi.org/10.1108/09685229510092066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Abdul-Gader, Abdulla H. "End User Computing Success Factors." Journal of Organizational and End User Computing 4, no. 3 (July 1992): 4–13. http://dx.doi.org/10.4018/joeuc.1992070101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gray, Paul. "Guides to End-User Computing." Journal of Information Systems Management 7, no. 1 (January 1990): 90–93. http://dx.doi.org/10.1080/07399019008968336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Abdul-Gader, Abdulla H. "End-User Computing Success Factors." Information Resources Management Journal 3, no. 1 (January 1990): 2–14. http://dx.doi.org/10.4018/irmj.1990010101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hale, Ron. "End-User Computing Security Guidelines." Information Systems Security 4, no. 4 (January 1996): 49–64. http://dx.doi.org/10.1080/10658989609342520.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "End-user computing"

1

Dahalin, Zulkhairi. "Factors affecting end-user computing sophistication in small business." Thesis, Aston University, 2000. http://publications.aston.ac.uk/10607/.

Full text
Abstract:
This thesis describes research on End-User Computing (EUC) in small business in an environment where no Information System (IS) support and expertise are available. The research aims to identify the factors that contribute to EUC Sophistication and understand the extent small firms are capable of developing their own applications. The intention is to assist small firms to adopt EUC, encourage better utilisation of their IT resources and gain the benefits associated with computerisation. The factors examined are derived inductively from previous studies where a model is developed to map these factors with the degree of sophistication associated with IT and EUC. This study attempts to combine the predictive power of quantitative research through surveys with the explanatory power of qualitative research through action-oriented case study. Following critical examination of the literature, a survey of IT Adoption and EUC was conducted. Instruments were then developed to measure EUC and IT Sophistication indexes based on sophistication constructs adapted from previous studies using data from the survey. This is followed by an in-depth action case study involving two small firms to investigate the EUC phenomenon in its real life context. The accumulated findings from these mixed research strategies are used to form the final model of EUC Sophistication in small business. Results of the study suggest both EUC Sophistication and the Presence of EUC in small business are affected by Management Support and Behaviour towards EUC. Additionally EUC Sophistication is also affected by the presence of an EUC Champion. Results are also consistent with respect to the independence between IT Sophistication and EUC Sophistication. The main research contributions include an accumulated knowledge of EUC in small business, the Model of EUC Sophistication, an instrument to measure EUC Sophistication Index for small firms, and a contribution to research methods in IS.
APA, Harvard, Vancouver, ISO, and other styles
2

李國強 and Kwok-keung Roger Lee. "A study of the development of end-user computing in Hong Kong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1991. http://hub.hku.hk/bib/B31265005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lee, Kwok-keung Roger. "A study of the development of end-user computing in Hong Kong /." [Hong Kong : University of Hong Kong], 1991. http://sunzi.lib.hku.hk/hkuto/record.jsp?B13115741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bartfeld, Dina. "Toward a model of effective responsive training for end-user computing, a constructivist approach to end-user training." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/nq41099.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Myers, John D. "End-User Computing strategy in the United States Marine Corps." Thesis, Monterey, California. Naval Postgraduate School, 1990. http://hdl.handle.net/10945/30703.

Full text
Abstract:
Approved for public release, distribution is unlimited
The use of End-User computing (EUC) in the Marine Corps has increased dramatically in recent years. As Marine Corps-sponsored programs progressed, large General Services Administration (GSA) contracts were established which made it relatively easy for government agencies to acquire microcomputers. A strongly centralized strategy, successful in the management of the Marine Corps' mainframe systems, was adopted for the EUC program. This thesis concludes that the centralized strategy embraced by the Marine Corps is inappropriate to contend with the problems faced at the end-user level. End-users must be made an active part of the EUC processes for lasting success. More importantly, current inadequacies in support and education must be addressed immediately to ensure effective use of the assets already procured.
APA, Harvard, Vancouver, ISO, and other styles
6

Leung, Shiu-keung. "Information technology and end user computing in the Hong Kong Government." [Hong Kong : University of Hong Kong], 1992. http://sunzi.lib.hku.hk/hkuto/record.jsp?B13331401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sule, Mary-Jane. "Trusted cloud computing modelling with distributed end-user attestable multilayer security." Thesis, Brunel University, 2016. http://bura.brunel.ac.uk/handle/2438/12893.

Full text
Abstract:
As cloud computing continues to gain popularity and its economies of scale continue to improve, stakeholders want to minimise the security risk, protect their data and other resources while maximising the gains of using any cloud resources and its application. It is predicted that by the end of 2017, bulk of spending on any IT infrastructure would be on cloud infrastructure and services as many critical applications – power, medical, finance among others continue to be migrated onto cloud platforms. For these sectors, the security challenges of cloud adoption continue to be of a great concern even with its benefits. The ability to trust and measure security levels of any cloud platform is paramount in the complete adoption and use of cloud computing in many mission critical sectors. In-depth study and analysis of the trustworthiness of various cloud based platforms/systems are often limited by the complex and dynamic nature of cloud and often do not correctly foresee or practically determine the varying trust relationship between and across the cloud layers, components (schedulers), algorithms and applications especially at a large scale. Tradition security and privacy controls continue to be implemented on cloud but due to its fluid and dynamic nature, research work in the area of end-user attestable trust evaluation of the cloud platform is limited. Most of the current simulation tools do not cater for modelling of Trust on scalable multi-layer cloud deployments (including workflow and infrastructure).Even as these tools continue to be implemented none has been used to cater for all the layers of the cloud platform. This research presents a deployment of trusted computing applied in cloud computing suited for mission critical applications. It attempts to simplify the integration of trusted platform module based integrity measurement into cloud infrastructure. Using Eucalyptus cloud software on server-grade hardware, a trusted community cloud platform was deployed on the Brunel Network as presented in Chapter 3. Security is enhanced by the integration of an end-user accessible TPM integrity measurement and verification process; this guarantees trusted ownership and integrity of the uploaded data and provides additional level of trust for the cloud platform. This research further presents a technique which allows data owners to first secure their data offline by inserting colour drops into the data using steganography. The colour drops are used to detect unauthorised modifications, verify data owner in the event the copyright of the data is in dispute and identify the path through which it was tampered with. This process ensures integrity and confidentiality of the resources. This thesis also presents a trust model using fuzzy logic which was simulated using Simulink in Matlab and subsequently evaluated on an experimental platform deployed on the Brunel network. Using this model, end-users can determine the trust values for a cloud platform or service, as well as, classify and compare various cloud platforms. The results obtained suggest that the outputs of this research work can improve end-user confidence when selecting or consuming cloud resources with enhanced data integrity and protection.
APA, Harvard, Vancouver, ISO, and other styles
8

Krüger, Frédéric. "Determination of end user power load profiles by parallel evolutionary computing." Thesis, Strasbourg, 2014. http://www.theses.fr/2014STRAD002.

Full text
Abstract:
Il est primordial, pour un distributeur d’énergie électrique, d’obtenir des estimations précises de la demande en énergie de leurs réseaux. Des outils statistiques tels que des profils de consommation électrique offrent des estimations de qualité acceptable. Ces profils ne sont cependant généralement pas assez précis, car ils ne tiennent pas compte de l’influence de facteurs tels que la présence de chauffage électrique ou le type d’habitation. Il est néanmoins possible d’obtenir des profils précis en utilisant uniquement les historiques de consommations d’énergie des clients, les mesures desdéparts 20kV, et un algorithme génétique de séparation de sources. Un filtrage et un prétraitement des données a permis de proposer à l’algorithme génétique de séparation de sources des données adaptées. La séparation de sources particulièrement bruitées est résolue par un algorithme génétique complètement parallélisé sur une carte GPGPU. Les profils de consommation électrique obtenus correspondent aux attentes initiales, et démontrent une amélioration considérable de la précision des estimations de courbes de charge de départs 20kV et de postes de transformation moyenne tension-basse tension
Precise estimations of the energy demand of a power network are paramount for electrical distribution companies. Statistical tools such as load profiles offer acceptable estimations. These load profiles are, however, usually not precise enough for network engineering at the local level, as they do not take into account factors such as the presence of electrical heating devices or the type of housing. It is however possible to obtain accurate load profiles with no more than end user energy consumption histories, 20kV feeder load measurements, a blind source separation and a genetic algorithm. Filtering and preliminary treatments performed on the data allowed the blind source separation to work with adequate information. The blind source separation presented in this document is successfully solved by a completely parallel genetic algorithm running on a GPGPU card. The power load profiles obtained match the requirements, and demonstrate a considerable improvement in the forecast of 20kV feeder as well as MV substation load curves
APA, Harvard, Vancouver, ISO, and other styles
9

Leung, Shiu-keung, and 梁兆強. "Information technology and end user computing in the Hong Kong Government." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1992. http://hub.hku.hk/bib/B3196431X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Haydon, Kelly A. S. (Kelly Anne S. ). Carleton University Dissertation Management Studies. "Attitudes towards end user computing : a comparative analysis by job category." Ottawa, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "End-user computing"

1

Russell, Terry. Exploiting end-user computing technology. Oshawa, Ont: Ontario Ministry of Revenue, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stern, Nancy B. Computing with end-user applications. New York: Wiley, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stern, Nancy B. Computing with end-user applications. Chichester: Wiley, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stern, Nancy B. Computing with end-user applications. New York: Wiley, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stern, Nancy B. Computing concepts for end users. New York: Wiley, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Karten, Naomi. Survival guide to end-user computing. Boston: Auerbach Publications, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

M, Ruprecht Mary, ed. End-user computing: Concepts and applications. Cincinnati, OH: South-Western Pub. Co., 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

1941-, Stern Robert A., ed. Computing with end-user applications andBASIC. New York: Wiley, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rittenberg, Larry E. Audit and control of end-user computing. Altamonte, Fla: Institute of Internal Auditors, Research Foundation, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Infotech, Pergamon, ed. Designing end-user interfaces. Oxford: Pergamon Infotech, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "End-user computing"

1

Schmidt, Albrecht. "Programming Ubiquitous Computing Environments." In End-User Development, 3–6. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18425-8_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Clark, C. "End User Computing Ergonomics." In End-User Computing, 2274–83. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-945-8.ch131.

Full text
Abstract:
Until recent years, the end user computing ergonomic focus has primarily been on stationary computer use. A new trend for the end user is mobile computing. An increasing number of end users are working outside of the traditional office. Mobile computing devices allow for these workers to perform job functions while in the field, at home, or while traveling. The organizational and end user benefits abound for the use of such enabling technology. However, the mobile computing environment introduces a new area of ergonomic concerns. Are businesses and end users monitoring the use of these devices from an ergonomic perspective? The good news is the outcome can be influenced and/or determined with intentional efforts on the part of both end users and managers. This paper includes an in depth review of the current and emerging issues, especially the mobile end user environment, that is important to the end user, manager, and organization as a whole. It also provides end user ergonomic suggestions and resources and addresses the management challenges rising from ergonomic issues.
APA, Harvard, Vancouver, ISO, and other styles
3

Beckwith, Laura, Margaret Burnett, and Shraddha Sorte. "Gender and End-User Computing." In End-User Computing, 19–26. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-945-8.ch002.

Full text
Abstract:
Although gender differences in a technological world are receiving significant research attention, much of the research and practice has aimed at how society and education can impact the successes and retention of female computer science professionals. The possibility of gender issues within software, however, has received almost no attention, nor has the population of female end users. However, there is relevant foundational research suggesting that gender-related factors within a software environment that supports end-user computing may have a strong impact on how effective male and female end users can be in that environment. Thus, in this article, we summarize theory-establishing results from other domains that point toward the formation of grounded hypotheses for studying gender differences in end-user computing. There has been much background research relevant to human issues of end-user computing, which we define here as problem-solving using computer software, also termed end-user programming in some of the literature (e.g., Blackwell, 2002; Green & Petre, 1996; Nardi, 1993). (See the glossary for definitions of these and related terms.) Despite this, few researchers have considered potential gender HCI issues and gender differences that may need to be accounted for in designing end-user computing environments. The most notable exception is Czerwinski’s pioneering research on the support of both genders in navigating through 3-D environments (Czerwinski, Tan, & Robertson, 2002; Tan, Czerwinski, & Robertson, 2003). Although individual differences, such as experience, cognitive style, and spatial ability, are likely to vary more than differences between gender groups, evidence from Czerwinski’s work as well as work in other domains, such as psychology and marketing, has found gender differences relevant to computer usage. In fact, some research has shown that some software is (unintentionally) designed for males (Huff, 2002). One reason gender HCI issues in end-user computing are important is that ignorance of gender issues has already proven to be dangerous: today’s low percentage of computer science females (Camp, 1997) has been directly attributed to the past unawareness of gender issues in computer science education and in the workforce. There is a risk that if gender HCI issues in end-user computing environments are ignored, a similar phenomenon could occur with female end users.
APA, Harvard, Vancouver, ISO, and other styles
4

Shayo, Conrad, and Ruth A. Guthrie. "End-User Computing Success Measurement." In End-User Computing, 1523–30. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-945-8.ch103.

Full text
Abstract:
End-user computing (EUC) is the optional development of computer applications and models by personnel (individuals or groups) outside the MIS department. The emergence of EUC in the 80s and early 90s can be traced to the proliferation of computers, increased organizational computing needs, more sophisticated user application development tools coupled with higher computer and information literacy among staff and professional workers. Prior to the arrival of personal computers and graphical user interfaces, end users relied on data processing (now information technology) personnel to assist in meeting their information needs (Inman, 1986). Programming a mainframe was beyond the skills of most workers.
APA, Harvard, Vancouver, ISO, and other styles
5

Jawahar, I. M. "The Past, Present, and Future of End-User Performance." In End-User Computing, 2266–73. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-945-8.ch130.

Full text
Abstract:
Over the last decade, end-user computing has become an integral part of the organizational landscape. The emergence of end-user computing can be attributed to the necessity to manage and to effectively use information to function in a knowledge-based economy. Because of the increased organizational computing needs, computer literacy requirements have skyrocketed for clerical and support staff and for many middle and senior management positions (Bowman, Grupe, & Simkin, 1995). The proliferation of microcomputers and the availability of sophisticated user application tools (Shayo, Guthrie, & Igbaria, 1999) have facilitated the widespread implementation of end-user computing technology.
APA, Harvard, Vancouver, ISO, and other styles
6

Reynolds, Rodney A. "Measurement of End-User Computing Satisfaction." In End-User Computing, 894–96. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-945-8.ch063.

Full text
Abstract:
Doll and Tofkzadeh (1988) developed their measure of End-User Computing Satisfaction because ‘decision analysis’ (examination of specific uses of computer applications in decision making) is “generally not feasible” (p. 259) but that satisfaction is a reasonable surrogate for assessing use. Doll and Tofkzadeh claim evidence from other studies support an expectation that satisfaction leads to use (as opposed to use leading to satisfaction. The Doll and Tofkzadeh study focused more on broad notions of systems and applications (Mini or mainframes, Micro-computer applications, Analysis, and Monitor applications). The End-User Computing Satisfaction scale is multidimensional instrument. Doll and Tofkzadeh (1988) started with 40 items and reduced those first to 18 items and then reduced the scale further to a final set of 12 items. The dimensions of the End-User Satisfaction scale are Content, Accuracy, Format, Ease of use, and Timeliness.
APA, Harvard, Vancouver, ISO, and other styles
7

Aytes, Kregg, and Terry Connolly. "Computer Security and Risky Computing Practices." In End-User Computing, 1690–707. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-945-8.ch115.

Full text
Abstract:
Despite rapid technological advances in computer hardware and software, insecure behavior by individual computer users continues to be a significant source of direct cost and productivity loss. Why do individuals, many of whom are aware of the possible grave consequences of low-level insecure behaviors such as failure to backup work and disclosing passwords, continue to engage in unsafe computing practices? In this article we propose a conceptual model of this behavior as the outcome of a boundedly-rational choice process. We explore this model in a survey of undergraduate students (N = 167) at two large public universities. We asked about the frequency with which they engaged in five commonplace but unsafe computing practices, and probed their decision processes with regard to these practices. Although our respondents saw themselves as knowledgeable, competent users, and were broadly aware that serious consequences were quite likely to result, they reported frequent unsafe computing behaviors. We discuss the implications of these findings both for further research on risky computing practices and for training and enforcement policies that will be needed in the organizations these students will shortly be entering.
APA, Harvard, Vancouver, ISO, and other styles
8

Kanellis, Panagiotis, and Ray J. Paul. "User Behaving Badly." In End-User Computing, 637–57. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-945-8.ch049.

Full text
Abstract:
In its formative years and during the 1990s, 1Global Energy PLC (GE) went through a series of structural changes precipitated by the deregulation of the electricity industry in the UK. The severity of these changes had a disruptive effect on its enterprise information systems, which were found unable to adapt to the new and constantly emerging organizational realities. GE’s experiences illustrate the vulnerability of information systems in turbulent environments, provide for a rich description of the causes of misfit due to contextual change, and establish the ability of a system to flex and adapt as a dependent success variable. In addition, the idiographic details of this interpretive field study raise interesting questions about a number of assumptions we hold regarding the development of information systems and the means by which flexibility can be attained.
APA, Harvard, Vancouver, ISO, and other styles
9

Heilman, George E., and Jorge Brusa. "Validating the End-User Computing Satisfaction Survey Instrument in Mexico." In End-User Computing, 1531–41. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-945-8.ch104.

Full text
Abstract:
This study assesses the psychometric properties of a Spanish translation of Doll and Torkzadeh’s End-User Computing Satisfaction (EUCS) survey instrument. The study provides evidence that the EUCS Spanish version can be used as a valid and reliable measure of computing satisfaction among computer users in Mexico. The study also adds support to the use of the EUCS instrument in the investigation of the perceptions of computer users in countries other than the United States (U.S.) and in languages other than English.
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Jason C. H., Robert W. Holt, and D. Bruce Sun. "Organization and Management Issues of End User Computing." In End-User Computing, 35–42. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-945-8.ch004.

Full text
Abstract:
End-user computing (EUC) or as it is commonly termed, end-user development (EUD), is a concept and capability granted by advancement in technology that allows participants in a business environment to utilize information technology (IT) by developing applications of their own. Traditional methodology required a software program to be developed by trained programmers in the analysis and design stages of the systems development life cycle, where a user had to accept the program as an individual entity with unalterable characteristics. EUC/EUD now enables this person to customize the program around his/her specific demands. The framework of EUC establishes empowerment and capabilities so that anyone can develop entire information systems (IS) with little or no help from professional systems analysts or programmers, along with accessing data and creating reports (Laudon & Laudon, 2003). EUC/EUD is a topic in the IT environment that cherishes a progressive history spanning from the mid-1970’s to what it as today.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "End-user computing"

1

Goodell, Howie. "End-user computing." In CHI '97 extended abstracts. New York, New York, USA: ACM Press, 1997. http://dx.doi.org/10.1145/1120212.1120304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gogan, J. L., and L. R. Porter. "End-user computing: determinants of user behavior." In [1989] Proceedings of the Twenty-Second Annual Hawaii International Conference on System Sciences. Volume IV: Emerging Technologies and Applications Track. IEEE, 1989. http://dx.doi.org/10.1109/hicss.1989.48146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bostrom, Robert P., Lorne Olfman, and Maung Sein. "Training for end-user computing." In the twenty-second annual computer personnel research conference. New York, New York, USA: ACM Press, 1986. http://dx.doi.org/10.1145/317210.317218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brown, Carol, Kate Kaiser, Robert Klepper, and Ryan Nelson. "The management of end-user computing." In the 1993 conference. New York, New York, USA: ACM Press, 1993. http://dx.doi.org/10.1145/158011.372751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zmud, Robert W., and Mary R. Lind. "Linking mechanism supporting end-user computing." In the twenty-first annual conference. New York, New York, USA: ACM Press, 1985. http://dx.doi.org/10.1145/16687.16696.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hernández, Francisco, Purushotham Bangalore, and Kevin Reilly. "End-user tools for grid computing." In the first workshop. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1083231.1083237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Correa, Claiton Marques, and Milene Selbach Silveira. "End-User Highlighted." In IHC '21: XX Brazilian Symposium on Human Factors in Computing Systems. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3472301.3484332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"End-user programming." In 2009 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). IEEE, 2009. http://dx.doi.org/10.1109/vlhcc.2009.5295298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Koh, Chang E. "Graphical user interfaces and end user computing support (abstract)." In the 1994 computer personnel research conference. New York, New York, USA: ACM Press, 1994. http://dx.doi.org/10.1145/186281.186497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kross, Sean, and Philip J. Guo. "End-User Programmers Repurposing End-User Programming Tools to Foster Diversity in Adult End-User Programming Education." In 2019 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). IEEE, 2019. http://dx.doi.org/10.1109/vlhcc.2019.8818824.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "End-user computing"

1

Eparkhina, Dina. EuroSea Legacy Report. EuroSea, 2023. http://dx.doi.org/10.3289/eurosea_d8.12.

Full text
Abstract:
EuroSea is a holistic large-scale project encompassing the full value chain of marine knowledge, from observations to modelling and forecasting and to user-focused services. This report summarizes the legacy of EuroSea as planned and measured through a dedicated impact monitoring protocol, a holistic assessment of the project's successes in advancing and integrating European ocean observing and forecasting systems. Since its start, EuroSea has been analysing how well the project progresses towards the identified areas of impact. Impact assessment is not performance evaluation. These terms overlap but are distinct: performance relates to the efficient use of resources; impact relates to the transformative effect on the users. The EuroSea legacy report is presented through an aggregation and analysis of the EuroSea work towards achieving its impacts. Overall, over 100 impacts have been identified and presented on the website and in a stand-alone impact report. The legacy report sheds light on 32 most powerful impacts (four impacts in each of the eight EuroSea impact areas). EuroSea Impact Areas: 1. Strengthen the European Ocean Observing System (EOOS), support the Global Ocean Observing System (GOOS) and the GOOS Regional Alliances; 2. Increase ocean data sharing and integration; 3. Deliver improved climate change predictions; 4. Build capacity, internally in EuroSea and externally with EuroSea users, in a range of key areas; 5. Develop innovations, including exploitation of novel ideas or concepts; shorten the time span between research and innovation and foster economic value in the blue economy; 6. Facilitate methodologies, best practices, and knowledge transfer in ocean observing and forecasting; 7. Contribute to policy making in research, innovation, and technology; 8. Raise awareness of the need for a fit for purpose, sustained, observing and forecasting system in Europe. Ocean observing and forecasting is a complex activity brining about a variety of technologies, human expertise, in water and remote sensing measurements, high-volume computing and artificial intelligence, and a high degree of governance and coordination. Determining an impact on a user type or an area, therefore, requires a holistic assessment and a clear strategic overview. The EuroSea impact monitoring protocol has been the first known such attempt in a European ocean observing and forecasting project. The project’s progress has been followed according to the identified impact areas, through consortium workshops, stakeholder webinars, tracking, and reporting. At the end of EuroSea, we are able to demonstrate how well we have responded to the European policy drivers set out in the funding call and the grant agreement of our project, signed between the European Commission and 53 organizations, members of the EuroSea consortium. The project's impact is diverse, spanning areas from strengthening ocean observing governance to contributing to policymaking or boosting ocean research, innovation, and technology. Each impact area underscores EuroSea's commitment to a sustainable and informed approach to ocean observing and forecasting for enhanced marine knowledge and science-based sustainable blue economy and policies. (EuroSea Deliverable, D8.12)
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography