- Alavi, M., and Weiss, I. R., "Managing the Risks Associated with End-User Computing," Journal of Manaqement Information Systems, Vol. 2, No. 3, Winter, 1985-1986, pp. 5-20.Google Scholar
- Benson, David, "A Field Study of End User Computing Findings and Issues," MIS Quarterlv, Vol. 7, No. 4, December, 1983, pp. 35-45.Google ScholarDigital Library
- Bowman, Brent, "Controlling Application Development by End- Users in A PC Environment ~ A Survey of Techniques," Information Executive, Vol. 2, No. 3, Summer, 1989, pp. 70-74.Google Scholar
- Carlson, E.D. Grace, and Sutton, J.A., "Case Studies of End-User Requirements for Interactive Problem Solving Systems," MIS Quarterly, V. 1, No. 1, March, 1977. pp. 51-63.Google Scholar
- Culnan, M. J., "Chauffeured verus End-User Access to Commercial Databases' The Effects of Task and Individual Differences," MIS Quarterl~, V. 7, No. 1, March, 19~, pp. 55-68.Google Scholar
- Davis, Gordon B., "Caution' User- Developed Decision Support Systems Can be Dangerous to Your Organization," Fifteenth Hawaii International Conference on System Sciences, Honolulu, Hawaii, January 6-8, 1982."The Roles of theGoogle Scholar
- Hammond, J , Manager and Management Scientist in Successful Implementation," Sloan Manaqement Review, V. 26, No. 10, October, 1983, pp. 785-793.Google Scholar
- McFar lan, Warren, "P o rt f o 1 io Approach to Information Systems," Harvard Business Review, March- April, 1981.Google Scholar
- McIntosh, N. B. and Daft, R.L., "User Department Technology and Information Design," Information and Manaqement, V. 1, No. 3, 1978, pp. 123--131.Google Scholar
- Nesbit, I. S., "On Thin Ice' Micros and Data Integrity," Datamation, Nov. 1, 1985, pp. 80-84. Google ScholarDigital Library
- Porter, W. Thomas and william E. Perry, EDP Controls and Audit inq, Fifth Edition,Boston'Kent Publishing Company, 1987. Google ScholarDigital Library
- Sumner,M.,and Kleppe r,R., "Information Systems Strategy and End-User Application Development," Database, Summer, 1987, pp 13-30. Google ScholarDigital Library
Index Terms
- The relationship of application risks to application controls: a study of microcomputer-based database applications
Recommendations
The relationship of application risks to application controls: a study of microcomputer-based database applications
End-user computing has posed serious concerns to MIS professionals for a number of years. One of the primary concerns harbored by MIS professionals is the quality of the end-user applications that are developed by those whose primary function and ...
Identifying Usability Risks for Mobile Application
ICONETSI '20: Proceedings of the 2020 International Conference on Engineering and Information Technology for Sustainable IndustryRisk is an important factor that determines the success of mobile application development. Identifying risks will help developers minimize failures. Likewise, the determination of risks that affect usability can support taking preventive action before ...
Application Embedding: From Fish Tank to Axiom
Programming '17: Companion Proceedings of the 1st International Conference on the Art, Science, and Engineering of ProgrammingApplication embedding is a technique for developing web applications. It divides the implementation of an application to two artifacts: (1) a host application -- a platform that is agnostic of any particular application, and (2) the application's ...
Comments