Would you ban end-user development as too risky

Assignment Help Management Information Sys
Reference no: EM13753345

End-User Software Development Managing Nonprofessionals Various office productivity suites with word processing and spreadsheet applications such as Google Docs, Open Office, and Microsoft Office allow users to create their own macros, functions, and even programs. These features are open to end users to help them improve their own productivity--especially with spreadsheets.

Although this sounds great in principle, most users aren't professional developers, and their mistakes can be costly. Assume the role of an IT director for a mid-sized company and answer the following questions:

a. Would you ban end-user development as too risky? Why or why not?

b. Search the Internet for risks associated with end user development and list what you find.

c. What could you do to help support end-user development in your organization?

Verified Expert

Reference no: EM13753345

Questions Cloud

Uses a job order costing system : Drake Consulting uses a job order costing system, in which each client is a different job. Drake assigns direct labor, daily per diem, and travel cost directly to each job. It allocates indirect costs to jobs based on a predetermined overhead allocat..
Possible capital project using the npv method : The finance department of a large corporation has evaluated a possible capital project using the NPV method, the Payback Method, and the IRR method. The analysts are puzzled, since the NPV indicated rejection, but the IRR and Payback methods both ..
How continual infusion of immigrants contributed to swelling : Explain how continual infusion of immigrants contributed to the swelling numbers in America% cities, a. how this urbanization contrib.. to what is called the 'market revolution.'
Using a computerized accounting system : Where do you see Excel being useful for anyone in the area of business when dealing with accounting, bookkeeping, and financial transactions? In your post, be sure to discuss accountants who are already using a computerized accounting system
Would you ban end-user development as too risky : Would you ban end-user development as too risky - What could you do to help support end-user development in your organization?
The gross profit does not change : Which of the following correctly describes the following journal entry? The gross profit does not change.
Describe how the organization''s policies : Describe how the organization's policies and standards would be administered to meet the key requirements of accepted industry standards.
Project on the capital budgeting techniques : As a financial consultant, you have contracted with Wheel Industries to evaluate their procedures involving the evaluation of long term investment opportunities.
Describe the journal entry : Which of the following does not correctly describe the following journal entry?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Role of a chief security officer

Role of a Chief Security Officer - What is the role of a chief security officer, and why is this organizational role a relatively new one?

  What role can company executives play in an implementation

What are the skills, knowledge, and abilities required to be a project manager? Name five critical success factors and why they are important to the success of a project.

  How they can be used to facilitate organizational purposes

Politics of Information - some of the "Politics of Information" and how they can be used to facilitate organizational purposes?

  Significant challenges facing the healthcare system

Challenges in the Healthcare System - Show What are the three most significant challenges facing the healthcare system

  Lean supply chain management implemented usa amp chinathe

lean supply chain management implemented usa amp chinathe lean supply chain management can be implemented with the

  Impact of information technology on business1 we are all

impact of information technology on business1. we are all quite aware of the impact of information technology on

  Explain bead bar management information systems

Bead Bar Management Information Systems - List and describe each of the seven phases of the systems development life cycle.

  Determine how you would design the security controls

Determine how you would design the security controls to mitigate the risks involved. Determine the security defense mechanisms that you would utilize in order to secure communications from floor to floor in the office space, including equipment an..

  Most threatening security issues firms

What will be the most threatening security issues firms have to deal with within the next five years? Offer an example to support your response.

  Differentiate corporate strategy from project management

Differentiate corporate strategy from project management. and Identify the implications of organizational culture on project structure.

  Describe right to privacy for workers

Right to privacy for workers - Where do you draw the line between internal computer monitoring and the right to privacy for workers?

  Global value chain managementthe benefits of global value

global value chain managementthe benefits of global value chain management. the paper needs to address how the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd