SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
06/06/2012




                                                                      Goal
                                                                      • Addressing End User Computing as Increasing
                                                                        Phenomenon
                                                                      • Different kind of activities, cases and End User
                                                                        Computing problematic.
End User Computing                                                    • Dialogue, how to face End User Computing
Phenomenon in Information Age                                         • IT Specialist manage IT Dept.




             Five Main Resources                                                       Information Resources
                                                                      •     Hardware
 • Human                                                              •     Software
 • Material
 • Machines
    – (including facilities and energy)

 • Money
                                            }            Physical
                                                                      •
                                                                      •
                                                                      •
                                                                      •
                                                                            IT Specialist
                                                                            The USERS
                                                                            Facility
                                                                            Database
 • Information (and data)              }   Conceptual                 •     Information and data itself

                                                                1-3




   Personal Information System                                              Information System in Group

                            Data/
                         Information


       Hardware                                 User


            Data Base
                                            Guidance …
                                                1. …
        INPUT Y                                 2. …
        X = Y + 10 ^ 5                          3. …
        PRINT X


         Software                            Procedur

                                                                          Data and
                                                                          Networking




                                                                                                                             1
06/06/2012




                                                           End User Computing (EUC) as
                 The End Users
•    End User : End user or client, who uses the
                                                                  phenomenon
     system information or information generated by     • Environment that stimulate the user to
     information systems. Within organizations,           resolve their own problems directly for
     internal users can be classified into (Ebert dan
     Griffin, 2003):                                      information needs.
       • Staff                                          • User such as managers, accountants
       • Low Level Manager                                and internal auditors, develop their own
       • Middle Level Manajer                             applications and use 'computer' as an
       • Top Level Manajer                                advisor or 'specialist' based on
       • Knowledge worker                                 'knowledge' of their own




    How Good End User is? - Example                           The reason of EUC growth
     • They can create powerful application
       using OAS                                        • IT Department less responsive in serving
                                                          end user for information needs
     • They can manipulate OAS as ‘real
       database’ that you can’t imagine                 • The tendency of PC and hardware
                                                          support are getting cheaper and can be
     • They can do programming just using
                                                          connected easily to a server database
       OAS
                                                          (ODBC)
     • Let see the example 
                                                        • Availability of software which is more
                                                          easily used by end users




                        FACT                             Continue...

    • Although the company had to                        • Tunnel Between 'User’s Data' to
      accommodate enterprise-scale                         Information System and otherwise
      information systems, there are many other            pose a burden for the Department. IT.
      areas that have not been and is not                • The need for synchronization,
      covered by the IT Dept the User's                   Adjustment, requests some data from
      specific needs.                                      information systems to be managed
    • Users at any level have the Office                   separately by the users.
      package to assist their work (+ TOP
      Secret Data the which IT Person no need
      to know)




                                                                                                        2
06/06/2012




                                          Masalah EUC
                                          (Romney, Steinbart, dan Cushing, 1997)



EUC Risks
                                             Loss of central control               Sistem dan program bisa jadi dikembangkan
• Poorly aimed systems                                                                 tanpa memperhatikan standar atau tujuan
                                                                                       organisasi secara keseluruhan
• Poorly designed/ documented
  systems
                                             Ignorance                             Aplikasi yang dibuat pemakai bisa jadi
• Inefficient use of information                documentation and                      mengandung kesalahan-kesalahan; tidak
                                                development                            melalui pengujian yang seharusnya dilakukan
  resources                                     methods                                atau kurang terdokumentasi, sehingga dapat
                                                                                       menimbulkan masalah dalam pengembangan
• Loss of data integrity                                                               di kemudian hari

• Loss of security
• Loss of control
                                   2-17




                                                                                                                                     3
06/06/2012




                      EUC Problems                                                               EUC Problems
                             Count                                                                      cont


                                                                            Security Threats     • Problems of data access by unauthorized
Redundant resources   •   Users develop their own applications                                   • Insecure data files on a microcomputer I
                      •   The fact is multiple applications can be                               • The user may not understand about data security
                          shared by several users                                                  issues
                      •   The fact is hardware is replicated in several
                          departments.
                      •   Result Thus occurred the "islands of
                          automation" within the company
Imcompatibility       • Serious technical problems in microcomputer         Operational Stage    Computer system installation withput consider
                        can arise when trying to use the program in         problems             technical aspects, such as power providers, static
                        different system, share data with other                                  electricity, and ventilation
                        systems, or to operate in a data
                        communications system




      The Strategic Implications of
                                                                                      WORST CASE FOR IT PEOPLE?
       End-User Computing (EUC)
    • Levels of end users in terms of capabilities                                • Will ‘non IT people’ who are not
       - menu-level end users                                                       educated formally replace your job?
       – command-level end users                                                  • IT People lack of management skill,
       – end-user programmers                                                       softkill and social attitude compare to
       – functional support personnel                                               others
    • EUC application considerations
                                                                                  • Non IT People know the business
       – shifts workload so that end-users and
         information specialists’ talents are better
                                                                                    and its process so well
         used
       – reduces communications gap                                  2-21




    Real cases End User behaviour                                                     This what End User has done:
 • End User dengan Paket Office (how powerful office                              •   How they ‘backup’ the sistem?
   packages are?)
 • End User with USB Flash Disk Drive
                                                                                  •   Mix and match software & OS
 • End User with Cloud Computing                                                  •   Multiple antivirus to be safe
 • User friendly ‘Hacking’ Tool                                                   •   Electical overload & UPS
 • End User with Internet Content                                                 •   Pirated Software? No problem
 • End User close to the ‘BOSS’
                                                                                  •   Thousands ‘freeware’
 • End User with dangerous hobbies
 • End User with more access than IT Specialist                                   •   The way they use hardware : printer,
 • Ends User think, IT Specialist know everything                                     buy device, maintenance dan clean
                                                                                      hardware




                                                                                                                                                      4
06/06/2012




The Information Resource
                                                                               The CIO Attitude
Manager -- the CIO
                                                               • Business goal is a must.
• Chief Information Officer (CIO) is not                       • Build partnerships/ties with the rest of
  simply a title, but role                                       the firm
• Manager of information services                              • Improve basic business processes
• Contributes managerial skills                                • Communicate in business terms, not
  – Solves information resources problems                        IS jargon
  – Solves problems in other areas of firm’s
                                                               • Provide reliable IS services
    operations
                                                               • Be positive, not defensive
                                               2-25                                                                                    2-26




 Communication Chain in EUC                                                                Reference 
                                                                       •   Raymond Mc Leod – Management Information System
                                                                       •   Materi SIM handout slide - Manajemen Sistem Informasi: Komponen
            IT                                                             Sistem Informasi. YFA – Yanuar Firdaus A.W, ST., MT. STTelkom.
         Specialist                                                        Agustus 2006
                                                                       •   Feri Sulianta. IT Ergonomic. Elexmedia computindo publishers. June
                                                                           2010.
                                                                       •   Feri Sulianta. PC EVIL. Elexmedia Komputindo Publisher. September
                                                                           2009.
                                                                       •   Feri Sulianta dan Yudhy Wicaksono. Cara Mudah menjadi Programmer
                                                                           Excel. Elexmedia Komputindo Publisher. February 2010.
                                                                       •   Fajri Umbara. & Feri Sulianta. Cyber Ninja. Elexmedia Komputindo
                                                                           Publisher. June 2012.
                                                                       •   http://hamrosoft.com/wp-content/uploads/2012/04/Social-Networking-
                                                                           Terms.jpg
                                                                       •   http://fm1397.com/wp-content/uploads/2012/02/social-japan-china.jpeg
                                                                       •   http://www.techwireasia.com/wp-
           User                 Computer                                   content/uploads/2012/05/Social_Networking_Users_In_Asia_May_201
                                                                           2.jpg
                                                                       •   http://4.bp.blogspot.com/_H5LBvaXZCWw/TI16ewIVGyI/AAAAAAAAEj
                                                                           E/G91zTRnOXrA/s1600/networks-2.jpg
                                                      Education only




                                                                                                                                                  5

Weitere ähnliche Inhalte

Was ist angesagt?

Discovering Computers: Chapter 14
Discovering Computers: Chapter 14Discovering Computers: Chapter 14
Discovering Computers: Chapter 14Anna Stirling
 
Mobile Business Intelligence Best Practices
Mobile Business Intelligence Best PracticesMobile Business Intelligence Best Practices
Mobile Business Intelligence Best PracticesYellowfin
 
Discovering Computers: Chapter 05
Discovering Computers: Chapter 05Discovering Computers: Chapter 05
Discovering Computers: Chapter 05Anna Stirling
 
Propalms Centralized Computing Solution Document
Propalms Centralized Computing   Solution DocumentPropalms Centralized Computing   Solution Document
Propalms Centralized Computing Solution DocumentVijender Yadav
 
Webinar: Understanding the System Center suite & Windows Server 2012
Webinar: Understanding the System Center suite & Windows Server 2012 Webinar: Understanding the System Center suite & Windows Server 2012
Webinar: Understanding the System Center suite & Windows Server 2012 Sentri
 
Discovering Computers: Chapter 07
Discovering Computers: Chapter 07Discovering Computers: Chapter 07
Discovering Computers: Chapter 07Anna Stirling
 
Windows7/8 Migration Strategies
Windows7/8 Migration StrategiesWindows7/8 Migration Strategies
Windows7/8 Migration StrategiesJoe Honan
 
Mobilize Your Enterprise: Think Outside the Four Walls
Mobilize Your Enterprise: Think Outside the Four WallsMobilize Your Enterprise: Think Outside the Four Walls
Mobilize Your Enterprise: Think Outside the Four WallsInSync Conference
 
Discovering Computers: Chapter 09
Discovering Computers: Chapter 09Discovering Computers: Chapter 09
Discovering Computers: Chapter 09Anna Stirling
 
State Of It At Shu Presentation Final 20110210
State Of It At Shu Presentation Final 20110210State Of It At Shu Presentation Final 20110210
State Of It At Shu Presentation Final 20110210landrst
 
The ‘as-a-Service' Phenomenon: The Market is Changing, Are You?
The ‘as-a-Service' Phenomenon: The Market is Changing, Are You?The ‘as-a-Service' Phenomenon: The Market is Changing, Are You?
The ‘as-a-Service' Phenomenon: The Market is Changing, Are You?Stanton Jones
 
Chapter 1-it-im introduction
Chapter 1-it-im introductionChapter 1-it-im introduction
Chapter 1-it-im introductionPrakash Patil
 
DHPA Techday 2015 - Johan Benning - HP Mobility
DHPA Techday 2015 - Johan Benning - HP MobilityDHPA Techday 2015 - Johan Benning - HP Mobility
DHPA Techday 2015 - Johan Benning - HP MobilitySplend
 
Desktop Transformation
Desktop Transformation Desktop Transformation
Desktop Transformation InnoTech
 
Discovering Computers: Chapter 12
Discovering Computers: Chapter 12Discovering Computers: Chapter 12
Discovering Computers: Chapter 12Anna Stirling
 

Was ist angesagt? (19)

Discovering Computers: Chapter 14
Discovering Computers: Chapter 14Discovering Computers: Chapter 14
Discovering Computers: Chapter 14
 
Mobile Business Intelligence Best Practices
Mobile Business Intelligence Best PracticesMobile Business Intelligence Best Practices
Mobile Business Intelligence Best Practices
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
Discovering Computers: Chapter 05
Discovering Computers: Chapter 05Discovering Computers: Chapter 05
Discovering Computers: Chapter 05
 
Propalms Centralized Computing Solution Document
Propalms Centralized Computing   Solution DocumentPropalms Centralized Computing   Solution Document
Propalms Centralized Computing Solution Document
 
Webinar: Understanding the System Center suite & Windows Server 2012
Webinar: Understanding the System Center suite & Windows Server 2012 Webinar: Understanding the System Center suite & Windows Server 2012
Webinar: Understanding the System Center suite & Windows Server 2012
 
Discovering Computers: Chapter 07
Discovering Computers: Chapter 07Discovering Computers: Chapter 07
Discovering Computers: Chapter 07
 
Windows7/8 Migration Strategies
Windows7/8 Migration StrategiesWindows7/8 Migration Strategies
Windows7/8 Migration Strategies
 
Mobilize Your Enterprise: Think Outside the Four Walls
Mobilize Your Enterprise: Think Outside the Four WallsMobilize Your Enterprise: Think Outside the Four Walls
Mobilize Your Enterprise: Think Outside the Four Walls
 
Discovering Computers: Chapter 09
Discovering Computers: Chapter 09Discovering Computers: Chapter 09
Discovering Computers: Chapter 09
 
State Of It At Shu Presentation Final 20110210
State Of It At Shu Presentation Final 20110210State Of It At Shu Presentation Final 20110210
State Of It At Shu Presentation Final 20110210
 
The "as a-Service" Phenomenon
The "as a-Service" PhenomenonThe "as a-Service" Phenomenon
The "as a-Service" Phenomenon
 
HBM Info IT CMD
HBM Info IT CMDHBM Info IT CMD
HBM Info IT CMD
 
Post 3 0_roadshow
Post 3 0_roadshowPost 3 0_roadshow
Post 3 0_roadshow
 
The ‘as-a-Service' Phenomenon: The Market is Changing, Are You?
The ‘as-a-Service' Phenomenon: The Market is Changing, Are You?The ‘as-a-Service' Phenomenon: The Market is Changing, Are You?
The ‘as-a-Service' Phenomenon: The Market is Changing, Are You?
 
Chapter 1-it-im introduction
Chapter 1-it-im introductionChapter 1-it-im introduction
Chapter 1-it-im introduction
 
DHPA Techday 2015 - Johan Benning - HP Mobility
DHPA Techday 2015 - Johan Benning - HP MobilityDHPA Techday 2015 - Johan Benning - HP Mobility
DHPA Techday 2015 - Johan Benning - HP Mobility
 
Desktop Transformation
Desktop Transformation Desktop Transformation
Desktop Transformation
 
Discovering Computers: Chapter 12
Discovering Computers: Chapter 12Discovering Computers: Chapter 12
Discovering Computers: Chapter 12
 

Andere mochten auch

Pivot3 vSTAC VDI P Cubed Appliance with VMware View: An integrated VDI solution
Pivot3 vSTAC VDI P Cubed Appliance with VMware View: An integrated VDI solutionPivot3 vSTAC VDI P Cubed Appliance with VMware View: An integrated VDI solution
Pivot3 vSTAC VDI P Cubed Appliance with VMware View: An integrated VDI solutionPrincipled Technologies
 
Presentation end-user computing in the post-pc era
Presentation   end-user computing in the post-pc eraPresentation   end-user computing in the post-pc era
Presentation end-user computing in the post-pc erasolarisyourep
 
New Horizons for End-User Computing Event - Pivot 3
New Horizons for End-User Computing Event - Pivot 3New Horizons for End-User Computing Event - Pivot 3
New Horizons for End-User Computing Event - Pivot 3Arrow ECS UK
 
VMworld 2013: End User Computing Solutions for Financial Services
VMworld 2013: End User Computing Solutions for Financial ServicesVMworld 2013: End User Computing Solutions for Financial Services
VMworld 2013: End User Computing Solutions for Financial ServicesVMworld
 
Journey to end user computing dallas vmug may 2013
Journey to end user computing   dallas vmug may 2013Journey to end user computing   dallas vmug may 2013
Journey to end user computing dallas vmug may 2013Tommy Trogden
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computingguestc1bca2
 
Vmware end user computing
Vmware end user computingVmware end user computing
Vmware end user computingManas TI SA
 
V mware end user computing
V mware end user computingV mware end user computing
V mware end user computingsolarisyougood
 
VMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices PosterVMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices PosterVMware Academy
 
Notes from the field - End User Computing
Notes from the field - End User ComputingNotes from the field - End User Computing
Notes from the field - End User ComputingJames Charter
 
VMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud EraVMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud EraVMworld
 
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...Info-Tech Research Group
 
VMworld Europe 2014: What’s New in End User Computing: Full Desktop Automatio...
VMworld Europe 2014: What’s New in End User Computing: Full Desktop Automatio...VMworld Europe 2014: What’s New in End User Computing: Full Desktop Automatio...
VMworld Europe 2014: What’s New in End User Computing: Full Desktop Automatio...VMworld
 

Andere mochten auch (13)

Pivot3 vSTAC VDI P Cubed Appliance with VMware View: An integrated VDI solution
Pivot3 vSTAC VDI P Cubed Appliance with VMware View: An integrated VDI solutionPivot3 vSTAC VDI P Cubed Appliance with VMware View: An integrated VDI solution
Pivot3 vSTAC VDI P Cubed Appliance with VMware View: An integrated VDI solution
 
Presentation end-user computing in the post-pc era
Presentation   end-user computing in the post-pc eraPresentation   end-user computing in the post-pc era
Presentation end-user computing in the post-pc era
 
New Horizons for End-User Computing Event - Pivot 3
New Horizons for End-User Computing Event - Pivot 3New Horizons for End-User Computing Event - Pivot 3
New Horizons for End-User Computing Event - Pivot 3
 
VMworld 2013: End User Computing Solutions for Financial Services
VMworld 2013: End User Computing Solutions for Financial ServicesVMworld 2013: End User Computing Solutions for Financial Services
VMworld 2013: End User Computing Solutions for Financial Services
 
Journey to end user computing dallas vmug may 2013
Journey to end user computing   dallas vmug may 2013Journey to end user computing   dallas vmug may 2013
Journey to end user computing dallas vmug may 2013
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computing
 
Vmware end user computing
Vmware end user computingVmware end user computing
Vmware end user computing
 
V mware end user computing
V mware end user computingV mware end user computing
V mware end user computing
 
VMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices PosterVMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices Poster
 
Notes from the field - End User Computing
Notes from the field - End User ComputingNotes from the field - End User Computing
Notes from the field - End User Computing
 
VMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud EraVMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud Era
 
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
 
VMworld Europe 2014: What’s New in End User Computing: Full Desktop Automatio...
VMworld Europe 2014: What’s New in End User Computing: Full Desktop Automatio...VMworld Europe 2014: What’s New in End User Computing: Full Desktop Automatio...
VMworld Europe 2014: What’s New in End User Computing: Full Desktop Automatio...
 

Ähnlich wie End user computing feri sulianta

Brochure quiterian DDWeb
Brochure quiterian DDWebBrochure quiterian DDWeb
Brochure quiterian DDWebJosep Arroyo
 
Introductiont to is_and_mis
Introductiont to is_and_misIntroductiont to is_and_mis
Introductiont to is_and_misRevi Shahini
 
data and information dit1scone
data and information dit1sconedata and information dit1scone
data and information dit1sconeshah fahad
 
OSC2012: Big Data Using Open Source: Netapp Project - Technical
OSC2012: Big Data Using Open Source: Netapp Project - TechnicalOSC2012: Big Data Using Open Source: Netapp Project - Technical
OSC2012: Big Data Using Open Source: Netapp Project - TechnicalAccenture the Netherlands
 
Quiterian analytics
Quiterian analyticsQuiterian analytics
Quiterian analyticsMode Baldeh
 
OpTier McKinsey Big Data Overview
OpTier McKinsey Big Data OverviewOpTier McKinsey Big Data Overview
OpTier McKinsey Big Data Overviewnickychu
 
McKinsey Big Data Overview
McKinsey Big Data OverviewMcKinsey Big Data Overview
McKinsey Big Data Overviewoptier
 
McKinsey Big Data Overview
McKinsey Big Data OverviewMcKinsey Big Data Overview
McKinsey Big Data Overviewoptier
 
Cloud Native Batch Processing: Beyond the What and How
Cloud Native Batch Processing: Beyond the What and HowCloud Native Batch Processing: Beyond the What and How
Cloud Native Batch Processing: Beyond the What and HowVMware Tanzu
 
Building a business intelligence architecture fit for the 21st century by Jon...
Building a business intelligence architecture fit for the 21st century by Jon...Building a business intelligence architecture fit for the 21st century by Jon...
Building a business intelligence architecture fit for the 21st century by Jon...Mark Tapley
 
UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxBLACKSPAROW
 
Data, Information And Knowledge Management Framework And The Data Management ...
Data, Information And Knowledge Management Framework And The Data Management ...Data, Information And Knowledge Management Framework And The Data Management ...
Data, Information And Knowledge Management Framework And The Data Management ...Alan McSweeney
 
Data Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management InitiativesData Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management InitiativesAlan McSweeney
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15Eric
 
IOT TOTAL POWER POINT PRESENTATION UNITS
IOT TOTAL POWER POINT PRESENTATION UNITSIOT TOTAL POWER POINT PRESENTATION UNITS
IOT TOTAL POWER POINT PRESENTATION UNITSDineshV95
 
Basic concepts of information technology and the internet
Basic concepts of information technology and the internetBasic concepts of information technology and the internet
Basic concepts of information technology and the internetFrankie Jones
 

Ähnlich wie End user computing feri sulianta (20)

Brochure quiterian DDWeb
Brochure quiterian DDWebBrochure quiterian DDWeb
Brochure quiterian DDWeb
 
Introductiont to is_and_mis
Introductiont to is_and_misIntroductiont to is_and_mis
Introductiont to is_and_mis
 
data and information dit1scone
data and information dit1sconedata and information dit1scone
data and information dit1scone
 
OSC2012: Big Data Using Open Source: Netapp Project - Technical
OSC2012: Big Data Using Open Source: Netapp Project - TechnicalOSC2012: Big Data Using Open Source: Netapp Project - Technical
OSC2012: Big Data Using Open Source: Netapp Project - Technical
 
Quiterian analytics
Quiterian analyticsQuiterian analytics
Quiterian analytics
 
OpTier McKinsey Big Data Overview
OpTier McKinsey Big Data OverviewOpTier McKinsey Big Data Overview
OpTier McKinsey Big Data Overview
 
McKinsey Big Data Overview
McKinsey Big Data OverviewMcKinsey Big Data Overview
McKinsey Big Data Overview
 
McKinsey Big Data Overview
McKinsey Big Data OverviewMcKinsey Big Data Overview
McKinsey Big Data Overview
 
Cloud Native Batch Processing: Beyond the What and How
Cloud Native Batch Processing: Beyond the What and HowCloud Native Batch Processing: Beyond the What and How
Cloud Native Batch Processing: Beyond the What and How
 
INFORMATION SYSTEM.pptx
INFORMATION SYSTEM.pptxINFORMATION SYSTEM.pptx
INFORMATION SYSTEM.pptx
 
Building a business intelligence architecture fit for the 21st century by Jon...
Building a business intelligence architecture fit for the 21st century by Jon...Building a business intelligence architecture fit for the 21st century by Jon...
Building a business intelligence architecture fit for the 21st century by Jon...
 
UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptx
 
MIS.pptx
MIS.pptxMIS.pptx
MIS.pptx
 
Big data
Big dataBig data
Big data
 
Data, Information And Knowledge Management Framework And The Data Management ...
Data, Information And Knowledge Management Framework And The Data Management ...Data, Information And Knowledge Management Framework And The Data Management ...
Data, Information And Knowledge Management Framework And The Data Management ...
 
Data Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management InitiativesData Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management Initiatives
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15
 
IOT TOTAL POWER POINT PRESENTATION UNITS
IOT TOTAL POWER POINT PRESENTATION UNITSIOT TOTAL POWER POINT PRESENTATION UNITS
IOT TOTAL POWER POINT PRESENTATION UNITS
 
End User Computing
End User ComputingEnd User Computing
End User Computing
 
Basic concepts of information technology and the internet
Basic concepts of information technology and the internetBasic concepts of information technology and the internet
Basic concepts of information technology and the internet
 

Mehr von ferisulianta.com

Sepuluh Tema yag menjadi standar kurikulum untuk program studi sosial versi ...
Sepuluh Tema yag menjadi standar kurikulum  untuk program studi sosial versi ...Sepuluh Tema yag menjadi standar kurikulum  untuk program studi sosial versi ...
Sepuluh Tema yag menjadi standar kurikulum untuk program studi sosial versi ...ferisulianta.com
 
Kelola Kubikal Data Transaksional Sistem Informasi.pdf
Kelola Kubikal Data Transaksional Sistem Informasi.pdfKelola Kubikal Data Transaksional Sistem Informasi.pdf
Kelola Kubikal Data Transaksional Sistem Informasi.pdfferisulianta.com
 
Membangun Aturan Asosiasi menggunakan Algoritma Apriori untuk Rekomendasi Fil...
Membangun Aturan Asosiasi menggunakan Algoritma Apriori untuk Rekomendasi Fil...Membangun Aturan Asosiasi menggunakan Algoritma Apriori untuk Rekomendasi Fil...
Membangun Aturan Asosiasi menggunakan Algoritma Apriori untuk Rekomendasi Fil...ferisulianta.com
 
Algoritma Apriori untuk Menghasilkan Aturan Asosiasi Saat Berkendara.pdf
Algoritma Apriori untuk Menghasilkan Aturan Asosiasi Saat Berkendara.pdfAlgoritma Apriori untuk Menghasilkan Aturan Asosiasi Saat Berkendara.pdf
Algoritma Apriori untuk Menghasilkan Aturan Asosiasi Saat Berkendara.pdfferisulianta.com
 
Clustering Biaya Kesehatan Menggunakan Algoritma K-Means
Clustering Biaya Kesehatan Menggunakan Algoritma K-MeansClustering Biaya Kesehatan Menggunakan Algoritma K-Means
Clustering Biaya Kesehatan Menggunakan Algoritma K-Meansferisulianta.com
 
Aturan Asosiasi menggunakan Algoritma Apriori sebagai Dasar Aksi Bisnis .pdf
Aturan Asosiasi menggunakan Algoritma Apriori sebagai Dasar Aksi Bisnis .pdfAturan Asosiasi menggunakan Algoritma Apriori sebagai Dasar Aksi Bisnis .pdf
Aturan Asosiasi menggunakan Algoritma Apriori sebagai Dasar Aksi Bisnis .pdfferisulianta.com
 
Penerapan Metode Apriori Untuk Identifikasi Pola Data Transaksi Pada Customer...
Penerapan Metode Apriori Untuk Identifikasi Pola Data Transaksi Pada Customer...Penerapan Metode Apriori Untuk Identifikasi Pola Data Transaksi Pada Customer...
Penerapan Metode Apriori Untuk Identifikasi Pola Data Transaksi Pada Customer...ferisulianta.com
 
Prediction Of Cryptocurrency Prices Using Lstm, Svm And Polynomial Regression...
Prediction Of Cryptocurrency Prices Using Lstm, Svm And Polynomial Regression...Prediction Of Cryptocurrency Prices Using Lstm, Svm And Polynomial Regression...
Prediction Of Cryptocurrency Prices Using Lstm, Svm And Polynomial Regression...ferisulianta.com
 
Konsumen Sebagai Co-Creation untuk Menentukan Strategi.pdf
Konsumen Sebagai Co-Creation untuk Menentukan Strategi.pdfKonsumen Sebagai Co-Creation untuk Menentukan Strategi.pdf
Konsumen Sebagai Co-Creation untuk Menentukan Strategi.pdfferisulianta.com
 
Materi Seminar Netnografi - Feri Sulianta.pdf
Materi Seminar Netnografi - Feri Sulianta.pdfMateri Seminar Netnografi - Feri Sulianta.pdf
Materi Seminar Netnografi - Feri Sulianta.pdfferisulianta.com
 
Bentuk-bentuk Netnografi (Feri Sulianta).pdf
Bentuk-bentuk Netnografi (Feri Sulianta).pdfBentuk-bentuk Netnografi (Feri Sulianta).pdf
Bentuk-bentuk Netnografi (Feri Sulianta).pdfferisulianta.com
 
Literasi digital di tengah pandemi - Feri Sulianta
Literasi digital di tengah pandemi - Feri SuliantaLiterasi digital di tengah pandemi - Feri Sulianta
Literasi digital di tengah pandemi - Feri Suliantaferisulianta.com
 
Buku literasi digital, riset dan perkembangannya dalam perspektif social stud...
Buku literasi digital, riset dan perkembangannya dalam perspektif social stud...Buku literasi digital, riset dan perkembangannya dalam perspektif social stud...
Buku literasi digital, riset dan perkembangannya dalam perspektif social stud...ferisulianta.com
 
Public speaking (Dr. Feri Sulianta)
Public speaking (Dr. Feri Sulianta)Public speaking (Dr. Feri Sulianta)
Public speaking (Dr. Feri Sulianta)ferisulianta.com
 
Katalog buku feri sulianta 2018
Katalog buku feri sulianta 2018Katalog buku feri sulianta 2018
Katalog buku feri sulianta 2018ferisulianta.com
 
Membangunkan sang raksasa feri sulianta
Membangunkan sang raksasa   feri suliantaMembangunkan sang raksasa   feri sulianta
Membangunkan sang raksasa feri suliantaferisulianta.com
 
Membangunkan sang raksasa feri sulianta
Membangunkan sang raksasa   feri suliantaMembangunkan sang raksasa   feri sulianta
Membangunkan sang raksasa feri suliantaferisulianta.com
 
Success with softskill to deliver your hardskill feri sulianta - st inten
Success with softskill to deliver your hardskill   feri sulianta - st intenSuccess with softskill to deliver your hardskill   feri sulianta - st inten
Success with softskill to deliver your hardskill feri sulianta - st intenferisulianta.com
 
Bpm framework overview & guidelines - learn by characteristics
Bpm framework overview & guidelines - learn by characteristicsBpm framework overview & guidelines - learn by characteristics
Bpm framework overview & guidelines - learn by characteristicsferisulianta.com
 

Mehr von ferisulianta.com (20)

Sepuluh Tema yag menjadi standar kurikulum untuk program studi sosial versi ...
Sepuluh Tema yag menjadi standar kurikulum  untuk program studi sosial versi ...Sepuluh Tema yag menjadi standar kurikulum  untuk program studi sosial versi ...
Sepuluh Tema yag menjadi standar kurikulum untuk program studi sosial versi ...
 
Kelola Kubikal Data Transaksional Sistem Informasi.pdf
Kelola Kubikal Data Transaksional Sistem Informasi.pdfKelola Kubikal Data Transaksional Sistem Informasi.pdf
Kelola Kubikal Data Transaksional Sistem Informasi.pdf
 
Membangun Aturan Asosiasi menggunakan Algoritma Apriori untuk Rekomendasi Fil...
Membangun Aturan Asosiasi menggunakan Algoritma Apriori untuk Rekomendasi Fil...Membangun Aturan Asosiasi menggunakan Algoritma Apriori untuk Rekomendasi Fil...
Membangun Aturan Asosiasi menggunakan Algoritma Apriori untuk Rekomendasi Fil...
 
Algoritma Apriori untuk Menghasilkan Aturan Asosiasi Saat Berkendara.pdf
Algoritma Apriori untuk Menghasilkan Aturan Asosiasi Saat Berkendara.pdfAlgoritma Apriori untuk Menghasilkan Aturan Asosiasi Saat Berkendara.pdf
Algoritma Apriori untuk Menghasilkan Aturan Asosiasi Saat Berkendara.pdf
 
Clustering Biaya Kesehatan Menggunakan Algoritma K-Means
Clustering Biaya Kesehatan Menggunakan Algoritma K-MeansClustering Biaya Kesehatan Menggunakan Algoritma K-Means
Clustering Biaya Kesehatan Menggunakan Algoritma K-Means
 
Aturan Asosiasi menggunakan Algoritma Apriori sebagai Dasar Aksi Bisnis .pdf
Aturan Asosiasi menggunakan Algoritma Apriori sebagai Dasar Aksi Bisnis .pdfAturan Asosiasi menggunakan Algoritma Apriori sebagai Dasar Aksi Bisnis .pdf
Aturan Asosiasi menggunakan Algoritma Apriori sebagai Dasar Aksi Bisnis .pdf
 
Penerapan Metode Apriori Untuk Identifikasi Pola Data Transaksi Pada Customer...
Penerapan Metode Apriori Untuk Identifikasi Pola Data Transaksi Pada Customer...Penerapan Metode Apriori Untuk Identifikasi Pola Data Transaksi Pada Customer...
Penerapan Metode Apriori Untuk Identifikasi Pola Data Transaksi Pada Customer...
 
Prediction Of Cryptocurrency Prices Using Lstm, Svm And Polynomial Regression...
Prediction Of Cryptocurrency Prices Using Lstm, Svm And Polynomial Regression...Prediction Of Cryptocurrency Prices Using Lstm, Svm And Polynomial Regression...
Prediction Of Cryptocurrency Prices Using Lstm, Svm And Polynomial Regression...
 
Konsumen Sebagai Co-Creation untuk Menentukan Strategi.pdf
Konsumen Sebagai Co-Creation untuk Menentukan Strategi.pdfKonsumen Sebagai Co-Creation untuk Menentukan Strategi.pdf
Konsumen Sebagai Co-Creation untuk Menentukan Strategi.pdf
 
Materi Seminar Netnografi - Feri Sulianta.pdf
Materi Seminar Netnografi - Feri Sulianta.pdfMateri Seminar Netnografi - Feri Sulianta.pdf
Materi Seminar Netnografi - Feri Sulianta.pdf
 
Bentuk-bentuk Netnografi (Feri Sulianta).pdf
Bentuk-bentuk Netnografi (Feri Sulianta).pdfBentuk-bentuk Netnografi (Feri Sulianta).pdf
Bentuk-bentuk Netnografi (Feri Sulianta).pdf
 
Literasi digital di tengah pandemi - Feri Sulianta
Literasi digital di tengah pandemi - Feri SuliantaLiterasi digital di tengah pandemi - Feri Sulianta
Literasi digital di tengah pandemi - Feri Sulianta
 
Buku literasi digital, riset dan perkembangannya dalam perspektif social stud...
Buku literasi digital, riset dan perkembangannya dalam perspektif social stud...Buku literasi digital, riset dan perkembangannya dalam perspektif social stud...
Buku literasi digital, riset dan perkembangannya dalam perspektif social stud...
 
Public speaking (Dr. Feri Sulianta)
Public speaking (Dr. Feri Sulianta)Public speaking (Dr. Feri Sulianta)
Public speaking (Dr. Feri Sulianta)
 
Katalog buku feri sulianta 2018
Katalog buku feri sulianta 2018Katalog buku feri sulianta 2018
Katalog buku feri sulianta 2018
 
Membangunkan sang raksasa feri sulianta
Membangunkan sang raksasa   feri suliantaMembangunkan sang raksasa   feri sulianta
Membangunkan sang raksasa feri sulianta
 
Membangunkan sang raksasa feri sulianta
Membangunkan sang raksasa   feri suliantaMembangunkan sang raksasa   feri sulianta
Membangunkan sang raksasa feri sulianta
 
Managing Achievement
Managing AchievementManaging Achievement
Managing Achievement
 
Success with softskill to deliver your hardskill feri sulianta - st inten
Success with softskill to deliver your hardskill   feri sulianta - st intenSuccess with softskill to deliver your hardskill   feri sulianta - st inten
Success with softskill to deliver your hardskill feri sulianta - st inten
 
Bpm framework overview & guidelines - learn by characteristics
Bpm framework overview & guidelines - learn by characteristicsBpm framework overview & guidelines - learn by characteristics
Bpm framework overview & guidelines - learn by characteristics
 

End user computing feri sulianta

  • 1. 06/06/2012 Goal • Addressing End User Computing as Increasing Phenomenon • Different kind of activities, cases and End User Computing problematic. End User Computing • Dialogue, how to face End User Computing Phenomenon in Information Age • IT Specialist manage IT Dept. Five Main Resources Information Resources • Hardware • Human • Software • Material • Machines – (including facilities and energy) • Money } Physical • • • • IT Specialist The USERS Facility Database • Information (and data) } Conceptual • Information and data itself 1-3 Personal Information System Information System in Group Data/ Information  Hardware  User  Data Base Guidance … 1. … INPUT Y 2. … X = Y + 10 ^ 5 3. … PRINT X  Software  Procedur Data and Networking 1
  • 2. 06/06/2012 End User Computing (EUC) as The End Users • End User : End user or client, who uses the phenomenon system information or information generated by • Environment that stimulate the user to information systems. Within organizations, resolve their own problems directly for internal users can be classified into (Ebert dan Griffin, 2003): information needs. • Staff • User such as managers, accountants • Low Level Manager and internal auditors, develop their own • Middle Level Manajer applications and use 'computer' as an • Top Level Manajer advisor or 'specialist' based on • Knowledge worker 'knowledge' of their own How Good End User is? - Example The reason of EUC growth • They can create powerful application using OAS • IT Department less responsive in serving end user for information needs • They can manipulate OAS as ‘real database’ that you can’t imagine • The tendency of PC and hardware support are getting cheaper and can be • They can do programming just using connected easily to a server database OAS (ODBC) • Let see the example  • Availability of software which is more easily used by end users FACT Continue... • Although the company had to • Tunnel Between 'User’s Data' to accommodate enterprise-scale Information System and otherwise information systems, there are many other pose a burden for the Department. IT. areas that have not been and is not • The need for synchronization, covered by the IT Dept the User's Adjustment, requests some data from specific needs. information systems to be managed • Users at any level have the Office separately by the users. package to assist their work (+ TOP Secret Data the which IT Person no need to know) 2
  • 3. 06/06/2012 Masalah EUC (Romney, Steinbart, dan Cushing, 1997) EUC Risks Loss of central control Sistem dan program bisa jadi dikembangkan • Poorly aimed systems tanpa memperhatikan standar atau tujuan organisasi secara keseluruhan • Poorly designed/ documented systems Ignorance Aplikasi yang dibuat pemakai bisa jadi • Inefficient use of information documentation and mengandung kesalahan-kesalahan; tidak development melalui pengujian yang seharusnya dilakukan resources methods atau kurang terdokumentasi, sehingga dapat menimbulkan masalah dalam pengembangan • Loss of data integrity di kemudian hari • Loss of security • Loss of control 2-17 3
  • 4. 06/06/2012 EUC Problems EUC Problems Count cont Security Threats • Problems of data access by unauthorized Redundant resources • Users develop their own applications • Insecure data files on a microcomputer I • The fact is multiple applications can be • The user may not understand about data security shared by several users issues • The fact is hardware is replicated in several departments. • Result Thus occurred the "islands of automation" within the company Imcompatibility • Serious technical problems in microcomputer Operational Stage Computer system installation withput consider can arise when trying to use the program in problems technical aspects, such as power providers, static different system, share data with other electricity, and ventilation systems, or to operate in a data communications system The Strategic Implications of WORST CASE FOR IT PEOPLE? End-User Computing (EUC) • Levels of end users in terms of capabilities • Will ‘non IT people’ who are not - menu-level end users educated formally replace your job? – command-level end users • IT People lack of management skill, – end-user programmers softkill and social attitude compare to – functional support personnel others • EUC application considerations • Non IT People know the business – shifts workload so that end-users and information specialists’ talents are better and its process so well used – reduces communications gap 2-21 Real cases End User behaviour This what End User has done: • End User dengan Paket Office (how powerful office • How they ‘backup’ the sistem? packages are?) • End User with USB Flash Disk Drive • Mix and match software & OS • End User with Cloud Computing • Multiple antivirus to be safe • User friendly ‘Hacking’ Tool • Electical overload & UPS • End User with Internet Content • Pirated Software? No problem • End User close to the ‘BOSS’ • Thousands ‘freeware’ • End User with dangerous hobbies • End User with more access than IT Specialist • The way they use hardware : printer, • Ends User think, IT Specialist know everything buy device, maintenance dan clean hardware 4
  • 5. 06/06/2012 The Information Resource The CIO Attitude Manager -- the CIO • Business goal is a must. • Chief Information Officer (CIO) is not • Build partnerships/ties with the rest of simply a title, but role the firm • Manager of information services • Improve basic business processes • Contributes managerial skills • Communicate in business terms, not – Solves information resources problems IS jargon – Solves problems in other areas of firm’s • Provide reliable IS services operations • Be positive, not defensive 2-25 2-26 Communication Chain in EUC Reference  • Raymond Mc Leod – Management Information System • Materi SIM handout slide - Manajemen Sistem Informasi: Komponen IT Sistem Informasi. YFA – Yanuar Firdaus A.W, ST., MT. STTelkom. Specialist Agustus 2006 • Feri Sulianta. IT Ergonomic. Elexmedia computindo publishers. June 2010. • Feri Sulianta. PC EVIL. Elexmedia Komputindo Publisher. September 2009. • Feri Sulianta dan Yudhy Wicaksono. Cara Mudah menjadi Programmer Excel. Elexmedia Komputindo Publisher. February 2010. • Fajri Umbara. & Feri Sulianta. Cyber Ninja. Elexmedia Komputindo Publisher. June 2012. • http://hamrosoft.com/wp-content/uploads/2012/04/Social-Networking- Terms.jpg • http://fm1397.com/wp-content/uploads/2012/02/social-japan-china.jpeg • http://www.techwireasia.com/wp- User Computer content/uploads/2012/05/Social_Networking_Users_In_Asia_May_201 2.jpg • http://4.bp.blogspot.com/_H5LBvaXZCWw/TI16ewIVGyI/AAAAAAAAEj E/G91zTRnOXrA/s1600/networks-2.jpg Education only 5