Disaster Recovery Planning
Essay title: Disaster Recovery Planning
End User Computing – Policy And Procedure
CONTENTS:
END-USER COMPUTING
Introduction
End-user computing (EUC) may involve a single user on a microcomputer, networks of users downloading data for further processing on workstations, or user-developed mainframe, mini and microcomputer applications using fourth generation or latest languages.

End-user computing represents a way of doing business. Users understand the decisions they need to make, the decision-making process, and the information needed to support the decision. The user wants flexible, easy-to-use tools with standardized interfaces to corporate data for developing and maintaining end-user applications.

Technology alone cannot account for the growth in end-user computing. Rather, the demand for end-user computing stems from:
An unparalleled systems development backlog and a decreasing ability on the part of Management or Information Systems (IS) departments to meet the ever-increasing user needs on a timely and cost-effective basis

Better-educated and more demanding users who realize that maximizing computing benefits is integral to achieving a competitive advantage
The recognition of complete, accurate, and timely information as a corporate resource and competitive advantage
An increasing specialization and sophistication of business analysis
Scope
The oddness of EUC, coupled with the lack of central control, create or recreate exposures that should be addressed by meeting the following measures:
Responsibilities and Development of Policies
Policies must be developed that will control EUC without interfering with the benefits. According to the research findings, both users and data processing personnel support standardization policies, provided that standardization includes support from the IS group, and that standardization does not stifle an end-users ability to experiment with new technology.

Data Identification and Classification
Corporate policies should specify data security and privacy provisions for all applications. Such policies should require the identification of data ownership and the assignment of security levels to data. Procedures for controlling the data, commensurate with the level of confidentiality classification, should be developed.

Adequate Developmental Budgets
One myth that seems to hamper effective use of end-user computing is a belief that end-user applications can be effectively developed on the job in a users spare time. The myth prevails because new technologies have piqued the interest of talented individuals, and those individuals have invested personal resources (time) in developing applications to assist in their job.

Departments cannot realize the benefits of end-user developments without providing sufficient time for development. If the organization wants to benefit from end-user development, user development time should be separately budgeted and managed.

Get Your Essay

Cite this page

End-User Computing And Single User. (July 8, 2021). Retrieved from https://www.freeessays.education/end-user-computing-and-single-user-essay/