Recent from talks
Nothing was collected or created yet.
End-user computing
View on WikipediaThis article contains instructions or advice. (July 2021) |
End-user computing (EUC) refers to systems in which non-programmers can create working applications.[1] EUC is a group of approaches to computing that aim to better integrate end users into the computing environment. These approaches attempt to realize the potential for high-end computing to perform problem-solving in a trustworthy manner.[2][3]
End-user computing can range in complexity from users simply clicking a series of buttons, to citizen developers[4] writing scripts in a controlled scripting language, to being able to modify and execute code directly.
Examples of end-user computing are systems built using fourth-generation programming languages, such as MAPPER or SQL, or one of the fifth-generation programming languages, such as ICAD.
Factors
[edit]Factors contributing to the need for further EUC research include knowledge processing, pervasive computing, issues of ontology, interactive visualization, and the like.
Some of the issues related to end-user computing concern software architecture (iconic versus language interfaces, open versus closed,[clarification needed] and others). Other issues relate to intellectual property, configuration and maintenance. End-user computing allows more user-input into system affairs that can range from personalization to full-fledged ownership of a system.
EUC strategy
[edit]EUC applications should not be evolved by accident, but there should be a defined EUC strategy.[citation needed] Any Application Architecture Strategy / IT Strategy should consider the white spaces in automation (enterprise functionality not automated by ERP / Enterprise Grade Applications). These are the potential areas where EUC can play a major role.[citation needed] Then ASSIMPLER parameters[which?] should be applied[by whom?] to these white spaces to develop the EUC strategy. (ASSIMPLER stands for availability, scalability, security, interoperability, maintainability, performance, low cost of ownership, extendibility and reliability.[5])
In businesses, an end-user concept gives workers more flexibility, as well as more opportunities for better productivity and creativity. However, EUC will work only when leveraged correctly. That’s why it requires a full-fledged strategy. Any strategy should include all the tools users might need to carry out their tasks and work more productively.
Types of EUC
End-user computing covers a broad range of user-facing resources, including:
- desktop and notebook computers;
- desktop operating systems and applications;
- scripting languages such as robotic desktop automation or RDA;
- smartphones and wearables;
- mobile, web and cloud applications;
- virtual desktops and applications[6]
EUC risk drivers
[edit]Business owners should understand that every user-controlled app needs to be monitored and supervised. Otherwise, organization risk facing a lot of problems and losses if end-users don’t follow company policy or leave their job. In functions such as finance, accounting and regulated activities, unmanaged EUC may expose the organization to regulatory compliance issues and fines.
End-user computing operating and business risks may be driven by:
- lack of rigorous testing;
- lack of version & change control;
- lack of documentation and reliance on end-user who developed it;
- lack of maintenance processes;
- lack of security;
- lack of audit trail;
- overreliance on manual controls.
EUC risk management software
[edit]Many companies elect to leverage software to manage their EUC risks. Software can provide many benefits to organizations, including:
- automation of risk management activities;
- reduction in manual effort required for manual controls;
- version controls for EUC applications;
- change controls for EUC applications.
Examples of EUC risk software include:
- apparity[7]
See also
[edit]References
[edit]- ^ Goodall, Howie (March 1997). "End-user computing". CHI EA '97 CHI '97 Extended Abstracts on Human Factors in Computing Systems. ACM CHI 97 Human Factors in Computing Systems Conference. Los Angeles, Los Angeles County, California, United States of America: Association for Computing Machinery. p. 132. ISBN 0-89791-926-2. Retrieved 30 December 2015.
- ^ McBride, Neil, "Towards User-Oriented control of End-User Computing in Large Organizations"
- ^ Mahmood, Adam, Advances in End User Computing Series Archived 2007-01-29 at the Wayback Machine University of Texas, USA, ISSN 1537-9310
- ^ "Definition of Citizen Developer - Gartner Information Technology Glossary".
- ^ Compare: Vanarse, Mandar. "Business Value Assurance during the transformation journey" (PDF). Wipro. Wipro Limited. Archived from the original (PDF) on 4 March 2016. Retrieved 26 July 2015.
How should the business services be designed in terms of availability, security, scalability, interoperability, maintenance, performance, lower cost, extendibility and reliability (ASSIMPLER) from end consumer perspective?
- ^ "What is end-user computing (EUC)? - Definition from WhatIs.com". SearchMobileComputing. Retrieved 2019-12-04.
- ^ "End-user computing risk management solution of the year: Apparity". InsuranceERM. Retrieved 2 May 2023.
External links
[edit]End-user computing
View on GrokipediaIntroduction
Definition
End-user computing (EUC) refers to the practice where non-technical users, such as business professionals or knowledge workers, independently develop, access, or manage information systems and applications to meet their specific operational or decision-making needs, without primary reliance on professional IT staff.[11] This encompasses a range of activities from simple data processing tasks to custom application creation, emphasizing user autonomy in an environment with accessible computing resources.[12] EUC empowers end-users to respond agilely to business requirements, thereby reducing dependency on centralized IT departments and alleviating backlogs in application development.[13] Traditionally, EUC has involved tools like spreadsheets (e.g., Microsoft Excel macros) and database query languages such as SQL, classified as fourth-generation languages (4GLs), allowing users to extract and manipulate data from corporate systems without extensive programming expertise.[11] In contrast, modern EUC extends to citizen development facilitated by low-code and no-code platforms, where visual interfaces and drag-and-drop functionalities enable non-programmers to build sophisticated applications, such as workflow automations or mobile apps, integrated with cloud resources.[14] Examples include Microsoft Power Apps for creating business applications connected to existing data sources, and fifth-generation tools like AI-assisted systems (e.g., ICAD for knowledge-based engineering design), which further democratize development through declarative and intelligent interfaces.[12][13] Key characteristics of EUC include user empowerment for enhanced productivity and innovation, as it allows direct control over data access and processing to align closely with departmental needs.[12] However, it also introduces challenges such as potential uncontrolled proliferation of applications, which can lead to inconsistencies if not managed, though this agility remains a core benefit in reducing IT bottlenecks.[15] Overall, EUC spans from ad-hoc tools to structured platforms, prioritizing end-user initiative to foster organizational responsiveness.[11]Historical Development
End-user computing (EUC) emerged in the mid-1970s amid the limitations of centralized mainframe systems, which restricted data access and processing to IT professionals, prompting the development of tools that empowered non-technical users to perform computing tasks independently.[16] The introduction of minicomputers and fourth-generation languages (4GLs), such as non-procedural tools like SQL precursors, facilitated this shift by allowing end-users to query and manipulate data without deep programming knowledge, marking the "end-user revolution" era.[16] A pivotal milestone was the 1979 release of VisiCalc, the first electronic spreadsheet software for personal computers like the Apple II, which automated financial calculations and "what-if" analyses, transforming PCs from hobbyist devices into essential business tools for non-programmers.[17] By the 1990s, EUC expanded with the adoption of client-server architectures, which distributed processing between user workstations (clients) and centralized servers, enabling more scalable data handling and reducing reliance on mainframes. Tools like Microsoft Access, launched in 1992, further democratized database creation and management for business users, aligning with the era's business process reengineering (BPR) movement, which emphasized radical workflow redesign to leverage IT for efficiency gains. This growth highlighted early risks, particularly in financial sectors where unchecked EUC led to control issues; a 1997 study on EUC in banking underscored vulnerabilities in user-developed applications, prompting calls for better oversight amid rapid adoption.[18] Organizations responded by establishing information centers in about 75% of cases to support EUC, with client-server implementations comprising 5-6.5% of total applications on average.[19] The 2000s and 2010s saw EUC evolve through web-based applications and cloud computing, which provided accessible, scalable platforms for remote collaboration and data sharing, building on early internet infrastructure like Amazon's 2002 web services.[20] This period introduced the "citizen developer" concept, formalized by Gartner around 2017, referring to business employees using low-code/no-code tools to build applications without IT involvement; Gartner predicted that 70% of new applications developed by organizations would use low-code or no-code technologies by 2025.[21] Platforms like OutSystems, established in 2001 and recognized as a low-code leader, exemplified this trend by enabling rapid app development for non-experts.[22][23] In the 2020s, EUC integrated with post-COVID remote work demands, accelerating virtual desktop infrastructure (VDI) adoption for secure, device-agnostic access to corporate resources, alongside growing integration of generative AI in low-code platforms to enhance application development as of 2025.[24][25] The global EUC market, valued at approximately $13.29 billion in 2024, was projected to reach $14.77 billion in 2025 according to a January 2025 report, driven by hybrid work and digital transformation initiatives (though estimates vary across sources).[26] Overall, EUC has shifted from isolated, user-specific tools in the mainframe era to integrated enterprise ecosystems, where low-code platforms and cloud services support organization-wide innovation and agility.[16]Core Components
Enabling Technologies
End-user computing relies on personal computing devices such as desktops, laptops, smartphones, and tablets, which provide users with direct access to applications and data without reliance on centralized mainframes.[27] These devices form the foundational hardware layer, enabling mobility and flexibility in work environments by supporting operating systems like Windows and iOS that integrate seamlessly with enterprise tools.[4] Productivity software plays a central role in empowering end-users to handle data analysis and collaboration tasks independently. For instance, Microsoft Excel facilitates advanced spreadsheet-based computations, modeling, and reporting, often used for financial forecasting and data manipulation in business settings. Similarly, Google Sheets supports real-time collaborative editing and cloud-based sharing, making it ideal for team-based workflows where multiple users contribute to documents simultaneously.[28] Development tools further extend these capabilities through low-code platforms like Mendix, which allow non-technical users to visually design, build, and deploy custom applications using drag-and-drop interfaces and pre-built components.[29] Infrastructure supporting end-user computing includes virtual desktop infrastructure (VDI) solutions like VMware Horizon, which centralizes desktop environments on servers to deliver virtualized desktops and applications over networks, ensuring consistent user experiences across devices.[30] Complementing VDI, desktop-as-a-service (DaaS) offerings such as Amazon WorkSpaces provide fully managed, cloud-hosted virtual desktops that enable secure remote access to Windows or Linux environments from any device, with scalable provisioning and pay-as-you-go pricing.[31] In data management, end-user databases like Microsoft Access allow individuals to create, query, and maintain relational databases for local or small-scale applications, such as inventory tracking or customer records, without requiring full-scale database administration.[32] Visualization tools like Tableau enhance this by enabling users to connect to diverse data sources and generate interactive dashboards, charts, and reports that reveal patterns and insights through drag-and-drop interfaces.[33] Integration aspects are facilitated by APIs and middleware, which bridge user-developed applications with enterprise resource planning (ERP) systems like SAP, allowing data exchange and workflow automation—for example, syncing end-user analytics outputs with SAP modules for inventory or finance.[34] This connectivity ensures that custom tools built by end-users can interoperate with core business systems, reducing silos and enhancing overall efficiency.[35] The evolution of end-user computing has shifted from on-premises setups, where hardware and software were locally managed, to cloud-native architectures that prioritize scalability and remote accessibility. Solutions like Azure Virtual Desktop exemplify this transition, offering a hybrid cloud VDI service that provisions Windows desktops in Microsoft Azure, supporting seamless integration with on-premises resources while accommodating distributed and hybrid work models.[36] This move to cloud-native platforms reduces infrastructure overhead and enhances security through centralized updates and multi-factor authentication.[37]User Involvement
End-users in end-user computing (EUC) encompass a diverse spectrum of roles, ranging from basic consumers of technology to advanced creators of custom solutions. Basic end-users, such as office workers, typically interact with pre-built applications for everyday tasks like email management and document processing, requiring minimal technical intervention.[36] Power users, including data analysts, go further by customizing tools to build sophisticated models, such as financial forecasts in spreadsheets. At the advanced end, citizen developers—defined by Gartner as employees who create application capabilities using tools not actively forbidden by IT—leverage no-code or low-code platforms to develop bespoke workflows without formal programming expertise.[38][39] The skill requirements across this spectrum vary to match the level of involvement. Basic end-users need foundational digital literacy to navigate interfaces and perform simple operations, ensuring effective access to resources. Intermediate skills, such as scripting with Visual Basic for Applications (VBA) in Excel, enable power users to automate repetitive tasks and generate custom reports. Advanced citizen developers focus on prototyping solutions through drag-and-drop interfaces and visual programming, bypassing traditional coding while emphasizing problem-solving and domain knowledge.[40] End-users bear key responsibilities that drive operational efficiency in EUC environments, including data entry to maintain accurate records, report generation for timely insights, and ad-hoc analysis to address immediate business needs. These activities foster faster decision-making and spur innovation by empowering users to respond agilely to challenges. For instance, Forrester research indicates that citizen developers using low-code tools can create, test, and deploy applications up to 10 times faster than traditional methods, amplifying productivity gains.[41] Additionally, low-code/no-code approaches can reduce custom application development time by 50% to 90%, further enhancing organizational agility.[42] To support effective user involvement, organizations emphasize training needs that balance skill development with autonomy. Self-service portals provide on-demand resources for basic troubleshooting and learning, allowing users to upskill independently on tools like spreadsheets or BI software. Complementary IT support, including workshops and governance guidelines, ensures users maintain compliance with security standards while preserving creative freedom. This structured upskilling prevents errors and maximizes the potential of EUC.[43][44] Representative examples illustrate these dynamics in practice. In finance teams, power users often employ spreadsheets for budgeting and variance analysis, enabling rapid scenario modeling without IT dependency. Marketing professionals, acting as citizen developers, utilize business intelligence (BI) tools to design campaign dashboards, integrating data from multiple sources for real-time performance tracking and optimization.Influencing Factors
Technological Factors
Advancements in pervasive computing, characterized by the proliferation of ubiquitous devices such as smartphones, wearables, and smart sensors, have significantly driven the adoption of end-user computing (EUC) by enabling seamless access to computational resources from anywhere.[45] This shift allows non-technical users to perform complex tasks without reliance on centralized IT infrastructure, fostering greater autonomy in data processing and application usage.[46] Cloud scalability further propels EUC effectiveness, with platforms like Amazon Web Services (AWS) providing elastic resources that dynamically adjust to user demands, ensuring high availability and cost-efficiency for end-user applications.[4] Additionally, ontology-based tools enhance knowledge representation in EUC environments by structuring domain-specific information into reusable semantic models, which non-experts can leverage to build and query knowledge bases without deep programming expertise.[47] Key enablers include interactive visualization technologies, such as augmented reality (AR) and virtual reality (VR) interfaces, which allow end-users to manipulate and explore data in immersive, intuitive ways, improving comprehension and decision-making in fields like design and training.[48] Mobile-first designs prioritize responsive interfaces optimized for handheld devices, ensuring EUC applications remain accessible and performant across diverse screen sizes and contexts.[49] Integration with the Internet of Things (IoT) further empowers EUC by facilitating real-time data ingestion from connected devices, enabling users to monitor and automate processes like environmental controls or inventory tracking directly through user-friendly apps.[50] Despite these drivers, technological constraints hinder EUC adoption, particularly incompatibilities with legacy systems that often require custom middleware or data migration efforts to interface with modern end-user tools.[51] Bandwidth limitations in remote setups exacerbate this, as insufficient network capacity can degrade performance in virtual desktop environments, leading to latency in data transfer and reduced user productivity.[52] Cybersecurity vulnerabilities in user devices, such as unpatched endpoints or weak authentication, pose significant risks in EUC, where decentralized control amplifies exposure to breaches affecting sensitive data handling.[53] These factors yield measurable impacts on EUC, with low-code platforms significantly reducing development time—up to 90% for tasks like ETL—through visual interfaces and pre-built components, accelerating application creation for business users.[54] However, the rise of multi-device environments introduces complexity, as ensuring consistency across ecosystems like desktops, mobiles, and IoT demands robust synchronization protocols. As of 2025, 5G networks and edge computing enable latencies as low as 10 ms in optimized setups, enhancing EUC responsiveness by processing data closer to the user for applications requiring low-latency feedback, such as remote collaboration or real-time analytics.[55][56][57]Organizational Factors
Organizational culture plays a pivotal role in the adoption and success of end-user computing (EUC), often requiring a shift toward agile mindsets that prioritize innovation and decentralized decision-making over rigid central control.[58] This cultural evolution fosters user empowerment, enabling end-users to develop and deploy applications that align closely with business needs, but it can encounter resistance from traditional IT silos concerned about the proliferation of shadow IT—unauthorized tools and applications that bypass official channels, potentially creating data silos and compliance risks.[59] Such resistance stems from fears of diminished oversight and increased vulnerability, highlighting the need for cultural alignment to mitigate conflicts between IT governance and user autonomy.[60] Policy influences in EUC revolve around governance frameworks designed to balance user autonomy with necessary oversight, ensuring that end-user-developed applications contribute to organizational goals without introducing undue risks.[61] These frameworks typically include approval workflows for user applications, such as version control, change management, and access protocols, which standardize documentation and updates while allowing flexibility for customization.[62] By embedding policies that promote shared storage and visibility, organizations can maintain IT and compliance monitoring without stifling innovation, as evidenced in structured processes that assess EUC models for accuracy and reliability.[61] Resource drivers significantly shape EUC implementation, with budget constraints often accelerating its adoption as a means to achieve cost efficiencies, such as up to a 30% reduction in IT administrative expenses through cloud-based solutions that minimize hardware and support overheads.[63] Concurrently, skill gaps in IT talent—exacerbated by global shortages projected to impact over 90% of organizations by 2026—necessitate the formation of hybrid IT-user teams, where end-users collaborate with IT professionals to bridge expertise deficits and manage complex EUC environments effectively.[64] These teams leverage tools like virtual desktop infrastructure to distribute workloads and access broader talent pools, alleviating overburdened internal resources.[64] Industry variations in EUC adoption reflect differing priorities, with finance sectors exhibiting high uptake for rapid financial modeling using tools like spreadsheets, which comprise over 90% of EUC inventory in such environments to support agile analytics and decision-making.[65] In contrast, regulated sectors like healthcare impose stricter controls due to compliance demands for data security and patient privacy, favoring hybrid EUC deployments that enhance protection while permitting controlled user access.[66] EUC maturity models provide metrics to evaluate organizational alignment with business objectives, assessing progression from ad hoc implementations to optimized states across dimensions such as governance, lifecycle management, security, and data management.[67] These models, often structured in five levels from initial chaos to strategic integration, help organizations benchmark EUC effectiveness and identify gaps in cultural, policy, and resource support.[68]Strategies and Best Practices
Strategy Formulation
Strategy formulation in end-user computing (EUC) entails a systematic process to create an aligned plan that empowers users to utilize computing resources while advancing organizational goals such as operational efficiency and innovation. This high-level planning phase emphasizes evaluating the existing EUC environment, setting clear objectives, and establishing priorities to ensure sustainable growth in user-driven initiatives. By integrating strategic frameworks, organizations can transition from ad-hoc user practices to structured empowerment that supports business agility without compromising oversight.[69] The initial key step involves assessing the current EUC landscape through user profiling, inventorying tools and applications, and identifying gaps in capabilities or compliance. For example, this assessment defines user personas, maps data flows, and evaluates existing technologies to pinpoint areas where EUC can address unmet needs like custom analytics or remote access. Following this, organizations define specific goals, such as striking a balance between productivity enhancements and risk mitigation, often prioritizing objectives like improved collaboration or cost savings. Prioritization of initiatives then occurs using established frameworks, such as the integrative framework developed by Alavi, Nelson, and Weiss, which profiles organizational postures toward EUC based on policy, support, and control attributes to guide evolutionary strategy development. An alternative approach draws from exploratory studies identifying strategy types like coordinator (focusing on structured implementation), networker (emphasizing collaborative tools), and entrepreneur (promoting self-reliant innovation), allowing managers to select postures that align with compliance and creative goals.[36][69][70][71] Core components of an EUC strategy include developing a roadmap for tool selection and integration, alongside defining success metrics. The roadmap outlines phased adoption of appropriate technologies, such as low-code platforms for non-technical users or virtual desktop infrastructure for secure access, ensuring selections match user profiles like finance teams needing advanced spreadsheets. Integration with enterprise resource planning (ERP) systems is crucial to fill automation gaps, enabling EUC applications to pull data from core platforms for tailored reporting or process enhancements without duplicating efforts. Success metrics focus on return on investment (ROI), including quantifiable outcomes like reduced IT support tickets through self-service capabilities.[69][72] Organizations adopt various approaches to EUC strategy, ranging from centralized models where IT dictates tool access and standards to maintain uniformity, to decentralized models granting users greater autonomy for rapid prototyping. Hybrid strategies have gained prominence, blending citizen development—where business users build applications using no-code tools—with IT oversight to enforce governance and security. This hybrid model fosters innovation while mitigating risks through policies like mandatory reviews and training. In practice, a mid-sized international bank implemented such a strategy by inventorying critical EUC applications, providing Excel training to over 70 staff, and migrating high-risk spreadsheets to controlled systems, resulting in improved compliance and operational efficiency for reporting processes.[73][74] The benefits of well-formulated EUC strategies include enhanced organizational flexibility, allowing quick adaptations to market demands, and accelerated time-to-market for custom business applications developed by empowered users. These outcomes enable faster deployment of solutions like automated workflows, ultimately driving productivity and competitive advantage.[8][75]Implementation Guidelines
Implementing end-user computing (EUC) initiatives requires a structured approach to ensure effective deployment and sustained value. The process typically unfolds in distinct phases, beginning with pilot testing involving a select group of users to validate functionality and gather initial feedback. During this phase, organizations select diverse end-users, provide targeted training on tools and applications, and test interoperability to identify potential issues early.[76] Following successful piloting, the rollout scales through self-service portals that enable users to access resources independently, reducing administrative overhead while maintaining control. This scalable phase emphasizes clear timelines, resource allocation, and iterative adjustments based on pilot insights to facilitate broader adoption.[77] Ongoing monitoring incorporates feedback loops, where usage statistics, user surveys, and performance metrics are regularly reviewed to refine the EUC environment and address emerging needs.[76] Key best practices enhance the reliability and security of EUC implementations. Standardizing templates for common applications, such as Excel add-ins for data analysis or reporting, promotes consistency and reduces errors across user-developed solutions. Integrating single sign-on (SSO) mechanisms streamlines access while enforcing security policies, minimizing unauthorized entry risks. Regular audits of user activities and resources ensure compliance and optimal resource utilization, with predefined checklists to evaluate application governance and data handling.[77] Tool integration plays a pivotal role in creating a seamless EUC experience. Deploying Virtual Desktop Infrastructure (VDI) provides consistent environments across devices, supporting both persistent and non-persistent desktops based on user needs, such as high-resource applications requiring 16-32 GB RAM. This approach ensures accessibility from any location, including off-campus or remote setups, through modular, scalable infrastructure. Complementing VDI, comprehensive training programs—covering application usage, security protocols, and self-service portal navigation—boost user adoption and proficiency, often delivered via virtual sessions or on-demand resources.[78][79] To mitigate implementation challenges, organizations adopt phased migrations from legacy systems to cloud-based EUC platforms. This involves assessing current infrastructure, planning with cross-functional teams to align IT and business objectives, preparing data and applications for transfer, executing the migration with user acceptance testing, and providing post-migration support. Such collaboration across departments fosters shared responsibility, minimizes disruptions, and ensures alignment on timelines and risks during the transition.[80] Success in EUC implementation is measured by key indicators that reflect user engagement and operational efficiency. Adoption rates, measured through user satisfaction surveys on functionality and support, gauge overall acceptance and alignment with business needs. Reduced support costs, achieved by proactive issue resolution and lower ticket volumes post-rollout, demonstrate efficiency gains, with high end-user satisfaction correlating to decreased shadow IT and improved productivity.[81][77]Risks and Challenges
Primary Risk Drivers
End-user computing (EUC) environments are inherently risky due to their emphasis on user autonomy and decentralized system development, which bypass traditional IT oversight and formal validation mechanisms. This structure amplifies vulnerabilities by allowing non-experts to create and maintain critical applications, often without standardized controls or documentation. Primary risk drivers stem from these foundational characteristics, leading to inconsistencies, errors, and exposures that can undermine organizational reliability and compliance.[82] At the core of EUC risks lies the absence of formal development processes, such as rigorous testing cycles and version control, which are standard in professional software engineering but rarely applied by end users. Spreadsheets and similar tools, central to EUC, lack built-in safeguards against human error, enabling unchecked modifications that propagate inaccuracies across business operations. Additionally, the proliferation of unsupported tools fosters shadow IT, where unauthorized applications emerge outside IT governance, expanding the attack surface and complicating security management. This is compounded by overreliance on individual expertise, as applications often depend on the knowledge of specific users who may depart, leave undocumented logic, or introduce biases without peer review.[83][84][85] Environmental factors further exacerbate these issues, particularly the rapid pace of technological evolution that outstrips end-user training and adaptation capabilities. Users may adopt emerging tools like low-code platforms without adequate skills, resulting in misconfigurations or insecure implementations. Integration gaps with enterprise core systems are another key driver, creating data silos that hinder holistic visibility and foster inconsistencies in reporting or decision-making. In decentralized EUC setups, these silos arise from incompatible formats and lack of interoperability, isolating critical information and increasing the potential for duplicated efforts or overlooked discrepancies.[60][86] In the financial sector, where EUC tools like spreadsheets underpin manual controls for regulatory reporting and risk modeling, these drivers amplify error propagation and compliance threats. Surveys indicate widespread reliance on such tools, with regulators in 2023 emphasizing heightened scrutiny on EUC practices to mitigate systemic risks in banking operations. Manual processes in finance heighten susceptibility to inaccuracies, as unverified models can distort capital calculations or valuation assessments, potentially leading to regulatory penalties or financial misstatements.[87][88] Quantitatively, unverified EUC models exhibit high error rates, with academic research showing that 94% of spreadsheets contain faults and cell error rates ranging from 1% to 5%, sufficient to invalidate results in complex applications. Scalability issues arise from uncontrolled proliferation, as shadow IT can multiply applications exponentially without resource allocation, straining maintenance and amplifying cumulative risks across the organization. These metrics underscore the need for targeted oversight, as even modest error frequencies compound in high-stakes environments.[89] Historically, these drivers have been evident since the 1990s, when widespread PC adoption spurred EUC growth but introduced early concerns over unmanaged user-developed systems and associated control gaps. Risks intensified with the rise of remote work post-2020, as distributed teams accelerated shadow IT adoption and reduced collaborative verification, further decentralizing expertise and oversight.[90][91]Common Risk Examples
Operational risks in end-user computing (EUC) often stem from data inaccuracies in unvalidated spreadsheets, which can lead to significant financial losses. For instance, in 2012, JPMorgan Chase incurred approximately $6.2 billion in trading losses partly due to manual input errors in an Excel spreadsheet used for Value at Risk (VaR) calculations, where outdated data was not properly updated, exacerbating risk underestimation.[92] Similarly, TransAlta Corporation reported a $24 million loss in 2003 after a cut-and-paste error in an Excel spreadsheet caused erroneous bidding on power contracts during California's energy crisis.[93] Overreliance on Excel for financial modeling has also resulted in projection errors, such as in the case of Tibco Software in 2014, where a spreadsheet miscalculation overstated equity value by $100 million, leading to shareholder lawsuits.[94] Security risks arise from unauthorized access through user-shared files and vulnerabilities to malware on personal devices, compromising sensitive data in EUC environments. Shadow IT applications, often developed by end-users bypassing IT oversight, heighten these threats by lacking enterprise-grade security controls, potentially exposing networks to breaches.[60] A notable example is the 2023 Police Service of Northern Ireland (PSNI) incident, where a spreadsheet error exposed personal data of 9,483 officers and staff via an unprotected tab, resulting in a £750,000 fine (issued in 2024) and potential costs of up to £240 million for enhanced security and legal claims due to inadequate file handling practices.[95][96] Compliance risks manifest in audit failures from missing documentation in EUC tools, particularly violating regulations like the Sarbanes-Oxley Act (SOX) or General Data Protection Regulation (GDPR) in finance operations reliant on spreadsheets. In EUC-heavy financial settings, undocumented changes to models can lead to non-compliance, as seen in Standard Chartered Bank's 2021 £46.55 million fine from the UK Prudential Regulation Authority for an $8 billion error in a spreadsheet lacking proper controls, breaching reporting standards akin to SOX requirements.[97] GDPR violations occur when EUC practices fail to ensure data accuracy and auditability, increasing fines for mishandled personal information.[98] Maintenance risks involve the obsolescence of user-built applications when key personnel depart, causing knowledge loss and operational disruptions. Without centralized documentation, custom EUC tools become unmaintainable, forcing costly redevelopment; for example, the departure of spreadsheet creators in financial firms often leaves interdependent models vulnerable to breakdown, as highlighted in actuarial studies on EUC sustainability.[99] In 2024, Norway's $1.5 trillion Government Pension Fund Global lost approximately $92 million due to an Excel error in entering a date for benchmark calculations, highlighting persistent operational risks in financial indexing.[100]Risk Management
Governance Practices
Governance practices in end-user computing (EUC) emphasize structured oversight to mitigate risks associated with user-developed applications while maintaining operational agility. Organizations typically begin by establishing comprehensive EUC policies that define what constitutes an EUC, such as spreadsheets, databases, or custom scripts, and outline approval gates for their creation and deployment. These policies require formal review processes before implementation, ensuring alignment with enterprise standards for data integrity and security.[101] Regular inventories of user-developed applications are mandated to create a centralized repository, enabling visibility into the EUC landscape and facilitating risk prioritization based on factors like complexity and business impact. Additionally, version control mandates are enforced to track changes, prevent unauthorized modifications, and maintain historical records of updates, often through standardized protocols that include documentation and rollback capabilities.[103] Established frameworks such as COBIT (Control Objectives for Information and Related Technology) provide a robust foundation for EUC governance by integrating IT controls into broader enterprise objectives, including risk management and compliance. COBIT's maturity model allows organizations to assess and improve EUC processes, from initial design and testing to ongoing maintenance, with specific controls for spreadsheets and other user tools emphasizing security, access restrictions, and validation.[104][105] These frameworks incorporate structured change management to evaluate the potential impacts of modifications before rollout.[105] Effective monitoring forms the backbone of EUC governance, with access controls limiting permissions to authorized users based on role and need, thereby reducing unauthorized access risks. Audit trails are implemented to log all activities, including changes and usage, providing traceability for compliance audits. Periodic reviews, such as quarterly risk assessments, evaluate the ongoing viability of EUCs, identifying high-risk items through metrics like usage frequency and error rates, and prompting remediation or decommissioning as needed.[106][101] Critical applications identified during reviews are escalated to central IT teams for formal validation, migration to managed platforms, or enhanced controls, ensuring scalability and security without stifling end-user initiative.[101] Adopting these governance practices has demonstrated effectiveness in reducing EUC-related incidents, errors, and compliance costs by enhancing control environments and minimizing uncontrolled proliferation, as evidenced in enterprise programs that streamline testing and regulatory adherence.[101] Industry analyses indicate that mature EUC governance can bring critical applications within acceptable risk tolerances, lowering overall operational disruptions.[106]Supportive Software Tools
Supportive software tools for end-user computing (EUC) encompass specialized platforms designed to manage risks, automate processes, and ensure compliance in environments where users develop and maintain custom applications, such as spreadsheets and databases. These tools are categorized primarily into risk management platforms and automation solutions, enabling organizations to oversee EUC assets without stifling user innovation.[107][108] Risk management platforms, such as Apparity, focus on auditing and tracking spreadsheets and other EUC applications to mitigate errors and compliance issues. Apparity automates the identification, inventory, and assessment of EUC applications, providing features like version history, error detection for issues such as #REF or #VALUE errors, and change management to track modifications in Excel files.[109][110] Similarly, automation tools like UiPath leverage robotic process automation (RPA) to streamline EUC workflows, allowing end users to build and deploy bots for repetitive tasks such as data entry and system integration directly within their processes.[108][111] Key features across these tools include automated testing for formula integrity, compliance reporting to meet regulatory standards like SOX, and seamless integration with enterprise systems for centralized oversight. For instance, change detection capabilities in tools like Apparity monitor alterations in real-time, alerting administrators to potential risks in critical EUC models.[112] These platforms also support version rollback and active capture of EUC events throughout their lifecycle, enhancing governance without requiring extensive IT intervention.[113] Prominent vendors in the EUC space include BeyondTrust for privileged access management, which secures user permissions to EUC resources by enforcing least-privilege controls and session monitoring, and ServiceNow for cataloging EUC assets within its IT service management framework.[114][115] As of 2025, market leaders are increasingly incorporating AI-enhanced monitoring, such as predictive risk analytics and anomaly detection in tools evaluated by Forrester, to proactively identify vulnerabilities in EUC environments.[116][117] Adopting these tools centralizes control over decentralized EUC practices, supports scalability for growing application inventories, and significantly reduces manual audit efforts—audit management software can shorten audit cycles by 60-70% through automation.[118] However, implementation often involves high initial setup costs for integration and customization, alongside challenges in gaining user buy-in due to perceived restrictions on flexibility.[119][120]Emerging Trends
Cloud and Virtualization Adoption
The adoption of cloud and virtualization technologies in end-user computing (EUC) has accelerated the shift toward flexible, scalable deployment models that support modern work environments. Key models include Cloud PCs, such as Microsoft's Windows 365, which provide a full Windows desktop experience hosted in the cloud, allowing users to access personalized computing resources from any device without local hardware dependencies.[121] Similarly, Virtual Desktop Infrastructure (VDI) platforms like Citrix Virtual Apps and Desktops enable the delivery of virtualized applications and desktops to end-users, facilitating device-agnostic access essential for remote and hybrid work setups.[122] These models decouple the operating system and applications from physical endpoints, promoting seamless productivity across diverse devices including laptops, tablets, and mobile phones. A significant driver of this adoption has been the post-2020 surge in remote work demands triggered by the COVID-19 pandemic, which prompted organizations to prioritize infrastructure that supports distributed teams. By 2025, over 60% of enterprises have adopted hybrid cloud models, reflecting a broader embrace of cloud-based EUC for enhanced scalability during fluctuating workloads.[123] Additionally, these technologies align with zero-trust security principles, where access is continuously verified regardless of location, reducing breach risks in perimeter-less environments; projections indicate over 60% of enterprises will implement some form of zero-trust framework by 2025.[124] Benefits of cloud and virtualization in EUC include centralized management, where IT administrators can provision, monitor, and update resources from a single console, streamlining operations across global teams. Automatic updates ensure compliance and security patches are applied uniformly without user intervention, minimizing downtime. Cost efficiency is a major advantage, with pay-per-use pricing models enabling organizations to scale resources dynamically and reduce hardware needs by 30-50% compared to traditional on-premises setups.[125] Despite these advantages, challenges persist, particularly data sovereignty issues, where regulations like GDPR require data to remain within specific geographic boundaries, complicating multi-cloud deployments for multinational firms. Latency in global setups can also degrade user experience, especially for graphics-intensive applications, necessitating edge computing integrations to minimize delays.[126][127] In the retail sector, cloud EUC has proven effective for seasonal scaling; for instance, Walmart adopted cloud-based workforce solutions to manage its large, variable employee base, enabling rapid onboarding of temporary staff during peak holiday periods while optimizing costs through elastic resource allocation.[128] This approach allows retailers to expand virtual desktops on demand, supporting inventory management and point-of-sale systems without over-provisioning hardware.AI and Automation Integration
The integration of artificial intelligence (AI) and automation into end-user computing (EUC) has introduced agentic AI systems that autonomously suggest and customize applications based on user behavior and needs. For instance, Microsoft 365 Copilot, embedded within Office applications like Word, Excel, and Teams, leverages generative AI to recommend tailored app functionalities, such as drafting documents or analyzing spreadsheets, thereby streamlining end-user workflows without requiring IT intervention.[129][130] Similarly, natural language interfaces enable non-technical users to query data through conversational prompts, as seen in Copilot's chat features that generate insights from enterprise data sources, transforming complex EUC environments into intuitive platforms.[131] These advancements align with broader agentic AI trends, where autonomous agents plan and execute tasks to meet user-defined goals, enhancing productivity in EUC settings.[132] Automation trends in EUC increasingly rely on robotic process automation (RPA) bots to handle repetitive tasks, such as data entry, file management, and application updates, which traditionally burden end-users and IT support. RPA tools integrate with user interfaces to mimic human actions across productivity applications, freeing users for higher-value activities while maintaining compliance in decentralized computing environments.[133][134] Complementing this, predictive analytics employs machine learning models to detect risks in user computing models, such as potential security vulnerabilities or performance bottlenecks, by analyzing historical usage patterns and forecasting issues proactively. In IT service management contexts relevant to EUC, these analytics have been shown to optimize resource allocation and mitigate downtime through early risk identification.[135][136] As of 2025, AI-driven self-healing desktops have become more prevalent, where systems automatically diagnose and resolve issues like software conflicts or hardware degradations without user or administrator input, drawing on neuroscience-inspired AI for predictive maintenance.[137] This evolution supports a browser-first working paradigm in EUC, prioritizing web-based access to applications and resources, which simplifies deployment and enhances scalability for hybrid workforces.[138] Such developments are expected to accelerate AI adoption in EUC, with experts forecasting the rise of AI agents as a core component of digital workspace management.[139] These integrations offer significant benefits, notably democratizing advanced analytics by empowering non-experts to generate actionable insights from complex datasets via intuitive AI interfaces, such as automated report creation in tools like Power BI.[140] Furthermore, AI and automation are projected to reduce manual interventions by up to 60% through minimized human involvement and enhanced data accuracy in EUC processes (Gartner, 2027).[141] However, concerns persist regarding ethical AI use, including biases in algorithmic decision-making that could exacerbate inequalities in access to EUC resources, and the potential for job displacement in routine roles like basic troubleshooting and data handling.[142][143] Addressing these requires robust governance to ensure equitable deployment and workforce reskilling.[144]References
- https://assets.kpmg.com/content/dam/kpmgsites/uk/pdf/2022/10/[kpmg](/page/KPMG)-euc-proposition-sep-2022.pdf
