Here is the synopsis of our sample research paper on Benefits and Risks of End User Computing. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 3 page paper examines risks and benefits of end user computing. A bit of history of the evolution of end user computing is included in this paper that examines effective tools to use to minimize risk. Bibliography lists 3 sources.
Page Count:
3 pages (~225 words per page)
File: RT13_SA413MIS.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
extremely popular. Long gone are the giant mainframes of the 1970s and in comes easy to use personal computers that may be hard wired or networked with the use of
wireless techniques. Generally speaking, during the 1980s when much change took place, end users would begin to implement their own technologies, "rogue" IT organizations began to evolve within business
units ( Melymuka, 2001). The world was getting ready for a change that they were not quite sure about. Yet, most realized the world would be making progress with every
new innovation. Suddenly, there would be PDAs, cell phones for the masses and cheap easy to use computers suitable for three year olds. The world had changed. The trend for
end-user computing had swept the business community. While the trend is positive, there are admittedly risks associated with end-user computing. Obviously, autonomy is accomplished when there are more end users
in an organization. However, there is greater risk with more autonomy. Some of the risk can be mitigated through the implementation of tools that watches the end user. For example,
if an employer believes that an employee is slacking off or visiting inappropriate web sites, there is software available that can track a users every move. Some do not
like to use such tactics as it seems to be underhanded and trust can then become an issue. At the same time, an employer can catch employees sabotaging a system
for instance by utilizing this method. Although privacy should be given when possible, with a great deal of end user involvement, certain risks do render a company vulnerable and so
the risks need to be addressed. Other tactics may involve simply providing an end user with appropriate training so that mistakes do not occur. Although end user computing is desirable
...