End User Computing Research Issues and Trends (1990-2000)

End User Computing Research Issues and Trends (1990-2000)

James P. Downey (University of Central Arkansas, USA) and Summer E. Bartczak (Air Force Institute of Technology, USA)
Copyright: © 2005 |Pages: 20
DOI: 10.4018/978-1-59140-474-3.ch001
OnDemand PDF Download:


During the 1980s and into the early 1990s, end user computing (EUC) was reported to be among the key concerns facing managers and organizations. Is EUC still an important topic? This study examines academic research during this period. A research-focused framework is offered to provide a conceptual structure for examining the trends and issues in EUC. This framework is parsimonious and also allows a comprehensive classification of end user computing’s three major dimensions: end user, technology, and organization. The study examines every article from five leading information systems (IS) journals (ISR, MISQ, JMIS, I&M, and JEUC) for the 11 years 1990-2000. The results indicate that there has been no diminishing of EUC interest and studies during this time, either overall or in any journal or dimension. A discussion of emerging trends, important themes, and journal differences concludes this examination.

Complete Chapter List

Search this Book:
Table of Contents
Mo Adam Mahmood
Chapter 1
James P. Downey, Summer E. Bartczak
During the 1980s and into the early 1990s, end user computing (EUC) was reported to be among the key concerns facing managers and organizations. Is... Sample PDF
End User Computing Research Issues and Trends (1990-2000)
Chapter 2
Tanya McGill
End user development of applications forms a significant part of organizational systems development. This study investigates the role that... Sample PDF
The Effect of End User Development on End User Success
Chapter 3
D. Sandy Staples, Peter B. Seddon
Goodhue and Thompson (1995) proposed the Technology-to-Performance Chain (TPC) model in 1995 to help end-users and organizations understand and make... Sample PDF
Testing the Technology-to-Performance Chain Model
Chapter 4
Mun Y. Yi, Kun S. Im
Computer task performance is an essential driver of end user productivity. Recent research indicates that computer self-efficacy (CSE) is an... Sample PDF
The Role of Personal Goal and Self-Efficiency in Predicting Computer Task Performance
Chapter 5
Steven A. Morris, Thomas E. Marshall
The importance of perceptions of control in explaining human behavior and motivation has been identified, investigated, and found to be significant... Sample PDF
Measurement of Perceived Control in Information Systems
Chapter 6
Qingxiong Ma, Liping Liu
The technology acceptance model proposes that perceived ease of use and perceived usefulness predict the acceptance of information technology. Since... Sample PDF
The Technology Acceptance Model: A Meta-Analysis of Empirical Findings
Chapter 7
Nory B. Jones, Thomas R. Kochtanek
Practitioners and academics often assume that investments in technology will lead to productivity improvements. While the literature provides many... Sample PDF
Success Factors in the Implementation of a Collaborative Technology and Resulting Productivity Improvements in a Small Business: An Exploratory Study
Chapter 8
Evan W. Duggan, Cherian S. Thachenkary
Joint Application Development (JAD) was introduced in the late 1970s to solve many of the problems system users experienced with the conventional... Sample PDF
Supporting the JAD Facilitator with the Nominal Group Technique
Chapter 9
Barbara Adams, Eta S. Berner, Joni Rousse Wyatt
User resistance is a common occurrence when new information systems are implemented within health care organizations. Individuals responsible for... Sample PDF
Applying Strategies to Overcome User Resistance in a Group of Clinical Managers to a Business Software Application: A Case Study
Chapter 10
Bernd Carsten Stahl
Decisions regarding information assurance and IT security can affect individuals’ rights and obligations and thereby acquire a moral quality. The... Sample PDF
Responsibility for Information Assurance and Privacy: A Problem of Individual Ethics?
Chapter 11
Mary C. Jones, R. Leon Price
This study examines organizational knowledge sharing in enterprise resource planning (ERP) implementation. Knowledge sharing in ERP implementation... Sample PDF
Organizational Knowledge Sharing in ERP Implementation: Lessons from Industry
Chapter 12
Manish Gupta, Raghav Rao, Shambhu Upadhyaya
Information assurance is a key component in e-banking services. This article investigates the information assurance issues and tenets of e-banking... Sample PDF
Electronic Banking and Information Assurance Issues: Survey and Synthesis
Chapter 13
Kregg Aytes, Terry Connolly
Despite rapid technological advances in computer hardware and software, insecure behavior by individual computer users continues to be a significant... Sample PDF
Computer Security and Risky Computing Practices: A Rational Choice Perspective
Chapter 14
Merrill Warkentin, Kimberly Davis, Ernst Bekkering
The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and... Sample PDF
A TAM Analysis of an Alternative High-Security User Authentication Procedure
Chapter 15
Kalyani Chatterjea
In-service upgrading has been an accepted avenue for retraining practicing teachers in Singapore to keep abreast of changing curriculum requirements... Sample PDF
A Blended Approach Learning Strategy for Teacher Development
About the Editor
About the Authors