Fact-checked by Grok 2 weeks ago

End-user computing

End-user computing (EUC) refers to the utilization and creation of information systems by non-specialist end-users to address their personal or job-related needs, often without direct involvement from information technology professionals. This approach encompasses a range of activities, from simple data processing with tools like spreadsheets to more complex application development using low-code or no-code platforms, granting users direct control over data, software, and hardware. This includes end-user development as a key aspect. The concept of EUC emerged prominently in the early alongside the widespread adoption of personal computers, which shifted computing power from centralized mainframes to individual desktops and enabled users to perform tasks independently of IT departments. By the mid-, it had become a significant trend in organizations, with projections estimating millions of personal computers in use by the , driven by the need for faster, more flexible information processing. Over time, EUC evolved with advancements in client-server architectures, the , and . As of 2025, this includes accelerated migrations due to Windows 10 end-of-support and emphasis on digital employee experience (DEX) alongside modern elements like virtual desktops, mobile access, and collaborative tools that support remote workforces. Today, it integrates generative techniques and sustainable device practices to enhance and environmental responsibility in end-user environments. Key benefits of EUC include improved employee productivity through tailored solutions, reduced dependency on IT for routine tasks, and cost efficiencies by minimizing overprovisioning of resources. It fosters innovation by empowering users to customize applications quickly, supports business continuity in remote settings, and enhances agility with scalable cloud-based infrastructures. Common tools and technologies in EUC range from productivity software like for data analysis to enterprise solutions such as virtual desktop infrastructure (VDI) for secure access to corporate resources. Despite these advantages, EUC introduces notable risks, including vulnerabilities from unvetted user-developed applications, potential inconsistencies across decentralized systems, and challenges with regulatory standards for sensitive . Uncontrolled can lead to practices, increasing organizational exposure to cyber threats and operational inefficiencies without proper oversight. Effective management of EUC involves establishing policies for , , and support structures, such as managed programs that balance user with IT to mitigate these risks.

Introduction

Definition

End-user computing (EUC) refers to the practice where non-technical users, such as professionals or knowledge workers, independently develop, access, or manage information systems and applications to meet their specific operational or needs, without primary reliance on IT staff. This encompasses a range of activities from simple data processing tasks to custom application creation, emphasizing user autonomy in an environment with accessible computing resources. EUC empowers end-users to respond agilely to requirements, thereby reducing dependency on centralized IT departments and alleviating backlogs in application . Traditionally, EUC has involved tools like spreadsheets (e.g., macros) and database query languages such as SQL, classified as fourth-generation languages (4GLs), allowing users to extract and manipulate data from corporate systems without extensive programming expertise. In contrast, modern EUC extends to citizen development facilitated by low-code and no-code platforms, where visual interfaces and drag-and-drop functionalities enable non-programmers to build sophisticated applications, such as workflow automations or mobile apps, integrated with cloud resources. Examples include Power Apps for creating business applications connected to existing data sources, and fifth-generation tools like AI-assisted systems (e.g., ICAD for knowledge-based engineering design), which further democratize development through declarative and intelligent interfaces. Key characteristics of EUC include user empowerment for enhanced and , as it allows direct control over data access and processing to align closely with departmental needs. However, it also introduces challenges such as potential uncontrolled proliferation of applications, which can lead to inconsistencies if not managed, though this agility remains a core benefit in reducing IT bottlenecks. Overall, EUC spans from ad-hoc tools to structured platforms, prioritizing end-user initiative to foster organizational responsiveness.

Historical Development

End-user computing (EUC) emerged in the mid-1970s amid the limitations of centralized mainframe systems, which restricted data access and processing to IT professionals, prompting the development of tools that empowered non-technical users to perform tasks independently. The introduction of minicomputers and fourth-generation languages (4GLs), such as non-procedural tools like SQL precursors, facilitated this shift by allowing end-users to query and manipulate data without deep programming knowledge, marking the "end-user revolution" era. A pivotal milestone was the release of , the first electronic spreadsheet software for personal computers like the , which automated financial calculations and "what-if" analyses, transforming PCs from hobbyist devices into essential business tools for non-programmers. By the 1990s, EUC expanded with the adoption of client-server architectures, which distributed processing between user workstations (clients) and centralized servers, enabling more scalable data handling and reducing reliance on mainframes. Tools like , launched in 1992, further democratized database creation and management for business users, aligning with the era's (BPR) movement, which emphasized radical workflow redesign to leverage IT for efficiency gains. This growth highlighted early risks, particularly in financial sectors where unchecked EUC led to control issues; a 1997 study on EUC in banking underscored vulnerabilities in user-developed applications, prompting calls for better oversight amid rapid adoption. Organizations responded by establishing information centers in about 75% of cases to support EUC, with client-server implementations comprising 5-6.5% of total applications on average. The 2000s and 2010s saw EUC evolve through web-based applications and , which provided accessible, scalable platforms for remote collaboration and data sharing, building on early infrastructure like Amazon's 2002 web services. This period introduced the "citizen developer" concept, formalized by around 2017, referring to business employees using low-code/no-code tools to build applications without IT involvement; predicted that 70% of new applications developed by organizations would use low-code or no-code technologies by 2025. Platforms like , established in 2001 and recognized as a low-code leader, exemplified this trend by enabling rapid app development for non-experts. In the 2020s, EUC integrated with post-COVID demands, accelerating virtual desktop infrastructure (VDI) adoption for secure, device-agnostic access to corporate resources, alongside growing integration of generative AI in low-code platforms to enhance application development as of . The global EUC market, valued at approximately $13.29 billion in , was projected to reach $14.77 billion in according to a January 2025 report, driven by hybrid work and initiatives (though estimates vary across sources). Overall, EUC has shifted from isolated, user-specific tools in the mainframe era to integrated ecosystems, where low-code platforms and cloud services support organization-wide innovation and agility.

Core Components

Enabling Technologies

End-user computing relies on personal computing devices such as desktops, laptops, smartphones, and tablets, which provide users with direct access to applications and data without reliance on centralized mainframes. These devices form the foundational layer, enabling and flexibility in work environments by supporting operating systems like Windows and that integrate seamlessly with enterprise tools. Productivity software plays a central role in empowering end-users to handle and collaboration tasks independently. For instance, facilitates advanced spreadsheet-based computations, modeling, and reporting, often used for financial forecasting and data manipulation in business settings. Similarly, supports real-time collaborative editing and cloud-based sharing, making it ideal for team-based workflows where multiple users contribute to documents simultaneously. Development tools further extend these capabilities through low-code platforms like Mendix, which allow non-technical users to visually design, build, and deploy custom applications using drag-and-drop interfaces and pre-built components. Infrastructure supporting end-user computing includes virtual desktop infrastructure (VDI) solutions like , which centralizes desktop environments on servers to deliver virtualized desktops and applications over networks, ensuring consistent user experiences across devices. Complementing VDI, desktop-as-a-service (DaaS) offerings such as Amazon WorkSpaces provide fully managed, cloud-hosted virtual desktops that enable secure remote access to Windows or environments from any device, with scalable provisioning and pay-as-you-go pricing. In , end-user databases like allow individuals to create, query, and maintain relational databases for local or small-scale applications, such as inventory tracking or customer records, without requiring full-scale database administration. Visualization tools like Tableau enhance this by enabling users to connect to diverse data sources and generate interactive dashboards, charts, and reports that reveal patterns and insights through drag-and-drop interfaces. Integration aspects are facilitated by and , which bridge user-developed applications with (ERP) systems like , allowing data exchange and workflow automation—for example, syncing end-user outputs with modules for or . This connectivity ensures that custom tools built by end-users can interoperate with core business systems, reducing and enhancing overall efficiency. The evolution of end-user computing has shifted from on-premises setups, where hardware and software were locally managed, to cloud-native architectures that prioritize and remote accessibility. Solutions like exemplify this transition, offering a hybrid cloud VDI service that provisions Windows desktops in , supporting seamless integration with on-premises resources while accommodating distributed and hybrid work models. This move to cloud-native platforms reduces infrastructure overhead and enhances security through centralized updates and .

User Involvement

End-users in end-user computing (EUC) encompass a diverse spectrum of roles, ranging from basic consumers of technology to advanced creators of custom solutions. Basic end-users, such as office workers, typically interact with pre-built applications for everyday tasks like management and , requiring minimal technical intervention. Power users, including data analysts, go further by customizing tools to build sophisticated models, such as financial forecasts in spreadsheets. At the advanced end, citizen developers—defined by as employees who create application capabilities using tools not actively forbidden by IT—leverage no-code or low-code platforms to develop bespoke workflows without formal programming expertise. The skill requirements across this spectrum vary to match the level of involvement. Basic end-users need foundational to navigate interfaces and perform simple operations, ensuring effective access to resources. Intermediate skills, such as scripting with (VBA) in Excel, enable power users to automate repetitive tasks and generate custom reports. Advanced citizen developers focus on prototyping solutions through drag-and-drop interfaces and visual programming, bypassing traditional coding while emphasizing problem-solving and . End-users bear key responsibilities that drive in EUC environments, including to maintain accurate records, report generation for timely insights, and ad-hoc analysis to address immediate needs. These activities foster faster and spur by empowering users to respond agilely to challenges. For instance, Forrester research indicates that citizen developers using low-code tools can create, test, and deploy applications up to 10 times faster than traditional methods, amplifying productivity gains. Additionally, low-code/no-code approaches can reduce custom application development time by 50% to 90%, further enhancing organizational agility. To support effective user involvement, organizations emphasize needs that balance skill development with . portals provide resources for basic and learning, allowing users to upskill independently on tools like spreadsheets or software. Complementary IT support, including workshops and guidelines, ensures users maintain with standards while preserving creative freedom. This structured upskilling prevents errors and maximizes the potential of EUC. Representative examples illustrate these dynamics in practice. In teams, power users often employ spreadsheets for budgeting and variance analysis, enabling rapid scenario modeling without IT dependency. Marketing professionals, acting as citizen developers, utilize (BI) tools to design campaign dashboards, integrating data from multiple sources for real-time performance tracking and optimization.

Influencing Factors

Technological Factors

Advancements in pervasive computing, characterized by the proliferation of ubiquitous devices such as smartphones, wearables, and smart sensors, have significantly driven the adoption of end-user computing (EUC) by enabling seamless access to computational resources from anywhere. This shift allows non-technical users to perform complex tasks without reliance on centralized , fostering greater autonomy in and application usage. Cloud scalability further propels EUC effectiveness, with platforms like (AWS) providing elastic resources that dynamically adjust to user demands, ensuring and cost-efficiency for end-user applications. Additionally, ontology-based tools enhance knowledge representation in EUC environments by structuring domain-specific information into reusable semantic models, which non-experts can leverage to build and query knowledge bases without deep programming expertise. Key enablers include interactive visualization technologies, such as (AR) and (VR) interfaces, which allow end-users to manipulate and explore data in immersive, intuitive ways, improving comprehension and in fields like design and training. Mobile-first designs prioritize responsive interfaces optimized for handheld devices, ensuring EUC applications remain accessible and performant across diverse screen sizes and contexts. Integration with the (IoT) further empowers EUC by facilitating real-time data ingestion from connected devices, enabling users to monitor and automate processes like environmental controls or inventory tracking directly through user-friendly apps. Despite these drivers, technological constraints hinder EUC adoption, particularly incompatibilities with legacy systems that often require custom or efforts to interface with modern end-user tools. limitations in remote setups exacerbate this, as insufficient capacity can degrade in virtual desktop environments, leading to in data transfer and reduced user productivity. Cybersecurity vulnerabilities in user devices, such as unpatched endpoints or weak , pose significant risks in EUC, where decentralized control amplifies exposure to breaches affecting sensitive data handling. These factors yield measurable impacts on EUC, with low-code platforms significantly reducing development time—up to 90% for tasks like ETL—through visual interfaces and pre-built components, accelerating application creation for business users. However, the rise of multi-device environments introduces complexity, as ensuring consistency across ecosystems like desktops, mobiles, and demands robust synchronization protocols. As of 2025, networks and enable latencies as low as 10 ms in optimized setups, enhancing EUC responsiveness by processing closer to the for applications requiring low-latency , such as remote collaboration or .

Organizational Factors

Organizational culture plays a pivotal role in the adoption and success of end-user computing (EUC), often requiring a shift toward agile mindsets that prioritize and decentralized over rigid central . This fosters user empowerment, enabling end-users to develop and deploy applications that align closely with needs, but it can encounter resistance from traditional IT silos concerned about the proliferation of —unauthorized tools and applications that bypass official channels, potentially creating data silos and compliance risks. Such resistance stems from fears of diminished oversight and increased vulnerability, highlighting the need for cultural alignment to mitigate conflicts between IT and user . Policy influences in EUC revolve around frameworks designed to balance user with necessary oversight, ensuring that end-user-developed applications contribute to organizational goals without introducing undue risks. These frameworks typically include approval workflows for user applications, such as , , and access protocols, which standardize and updates while allowing flexibility for . By embedding policies that promote shared storage and visibility, organizations can maintain IT and without stifling , as evidenced in structured processes that assess EUC models for accuracy and reliability. Resource drivers significantly shape EUC implementation, with budget constraints often accelerating its adoption as a means to achieve cost efficiencies, such as up to a 30% reduction in IT administrative expenses through cloud-based solutions that minimize hardware and support overheads. Concurrently, skill gaps in IT talent—exacerbated by global shortages projected to impact over 90% of organizations by 2026—necessitate the formation of IT-user teams, where end-users collaborate with IT professionals to bridge expertise deficits and manage complex EUC environments effectively. These teams leverage tools like virtual desktop infrastructure to distribute workloads and access broader talent pools, alleviating overburdened internal resources. Industry variations in EUC adoption reflect differing priorities, with finance sectors exhibiting high uptake for rapid using tools like spreadsheets, which comprise over 90% of EUC inventory in such environments to support agile and . In contrast, regulated sectors like healthcare impose stricter controls due to compliance demands for and patient privacy, favoring EUC deployments that enhance protection while permitting controlled user access. EUC maturity models provide metrics to evaluate organizational alignment with business objectives, assessing progression from implementations to optimized states across dimensions such as , lifecycle management, , and data management. These models, often structured in five levels from initial chaos to strategic , help organizations EUC effectiveness and identify gaps in cultural, policy, and resource support.

Strategies and Best Practices

Strategy Formulation

Strategy formulation in end-user computing (EUC) entails a systematic process to create an aligned plan that empowers users to utilize computing resources while advancing organizational goals such as and innovation. This high-level planning phase emphasizes evaluating the existing EUC environment, setting clear objectives, and establishing priorities to ensure sustainable growth in user-driven initiatives. By integrating strategic frameworks, organizations can transition from ad-hoc user practices to structured empowerment that supports without compromising oversight. The initial key step involves assessing the current EUC landscape through user profiling, inventorying tools and applications, and identifying gaps in capabilities or . For example, this assessment defines user personas, maps data flows, and evaluates existing technologies to pinpoint areas where EUC can address unmet needs like custom or remote . Following this, organizations define specific goals, such as striking a between productivity enhancements and , often prioritizing objectives like improved or cost savings. Prioritization of initiatives then occurs using established frameworks, such as the integrative framework developed by Alavi, , and Weiss, which profiles organizational postures toward EUC based on , support, and control attributes to guide evolutionary development. An alternative approach draws from exploratory studies identifying strategy types like (focusing on structured implementation), networker (emphasizing collaborative tools), and entrepreneur (promoting self-reliant innovation), allowing managers to select postures that align with and creative goals. Core components of an EUC strategy include developing a for tool selection and , alongside defining success metrics. The outlines phased adoption of appropriate technologies, such as low-code platforms for non-technical users or virtual desktop infrastructure for secure access, ensuring selections match user profiles like finance teams needing advanced spreadsheets. with (ERP) systems is crucial to fill gaps, enabling EUC applications to pull from core platforms for tailored reporting or process enhancements without duplicating efforts. Success metrics focus on (ROI), including quantifiable outcomes like reduced IT support tickets through capabilities. Organizations adopt various approaches to EUC , ranging from centralized models where IT dictates tool access and standards to maintain uniformity, to decentralized models granting users greater autonomy for . strategies have gained prominence, blending citizen development—where business users build applications using no-code tools—with IT oversight to enforce and security. This model fosters while mitigating risks through policies like mandatory reviews and . In practice, a mid-sized international bank implemented such a by inventorying critical EUC applications, providing Excel to over 70 staff, and migrating high-risk spreadsheets to controlled systems, resulting in improved and for reporting processes. The benefits of well-formulated EUC strategies include enhanced organizational flexibility, allowing quick adaptations to market demands, and accelerated time-to-market for custom business applications developed by empowered users. These outcomes enable faster deployment of solutions like automated workflows, ultimately driving productivity and .

Implementation Guidelines

Implementing end-user computing (EUC) initiatives requires a structured approach to ensure effective deployment and sustained value. The process typically unfolds in distinct phases, beginning with pilot testing involving a select group of users to validate functionality and gather initial feedback. During this phase, organizations select diverse end-users, provide targeted training on tools and applications, and test to identify potential issues early. Following successful piloting, the rollout scales through portals that enable users to access resources independently, reducing administrative overhead while maintaining control. This scalable phase emphasizes clear timelines, , and iterative adjustments based on pilot insights to facilitate broader adoption. Ongoing monitoring incorporates feedback loops, where usage statistics, user surveys, and performance metrics are regularly reviewed to refine the EUC environment and address emerging needs. Key best practices enhance the reliability and security of EUC implementations. Standardizing templates for common applications, such as Excel add-ins for or , promotes consistency and reduces errors across user-developed solutions. Integrating (SSO) mechanisms streamlines access while enforcing policies, minimizing unauthorized entry risks. Regular audits of user activities and resources ensure and optimal resource utilization, with predefined checklists to evaluate application and data handling. Tool integration plays a pivotal role in creating a seamless EUC . Deploying Virtual Desktop Infrastructure (VDI) provides consistent environments across devices, supporting both persistent and non-persistent desktops based on user needs, such as high-resource applications requiring 16-32 RAM. This approach ensures from any location, including off-campus or remote setups, through modular, scalable infrastructure. Complementing VDI, comprehensive training programs—covering application usage, security protocols, and portal navigation—boost user adoption and proficiency, often delivered via virtual sessions or on-demand resources. To mitigate implementation challenges, organizations adopt phased migrations from systems to cloud-based EUC platforms. This involves assessing current , planning with cross-functional teams to align IT and objectives, preparing and applications for transfer, executing the with user , and providing post-migration support. Such across departments fosters shared responsibility, minimizes disruptions, and ensures alignment on timelines and risks during the . Success in EUC implementation is measured by key indicators that reflect user engagement and . Adoption rates, measured through user satisfaction surveys on functionality and , gauge overall acceptance and alignment with needs. Reduced costs, achieved by proactive issue resolution and lower ticket volumes post-rollout, demonstrate efficiency gains, with high end-user satisfaction correlating to decreased and improved productivity.

Risks and Challenges

Primary Risk Drivers

End-user computing (EUC) environments are inherently risky due to their emphasis on user autonomy and decentralized system development, which bypass traditional IT oversight and formal validation mechanisms. This structure amplifies vulnerabilities by allowing non-experts to create and maintain critical applications, often without standardized controls or . Primary risk drivers stem from these foundational characteristics, leading to inconsistencies, errors, and exposures that can undermine organizational reliability and . At the core of EUC risks lies the absence of formal development processes, such as rigorous testing cycles and , which are standard in professional but rarely applied by end users. Spreadsheets and similar tools, central to EUC, lack built-in safeguards against , enabling unchecked modifications that propagate inaccuracies across business operations. Additionally, the proliferation of unsupported tools fosters , where unauthorized applications emerge outside IT governance, expanding the and complicating security management. This is compounded by overreliance on individual expertise, as applications often depend on the knowledge of specific users who may depart, leave undocumented logic, or introduce biases without . Environmental factors further exacerbate these issues, particularly the rapid pace of that outstrips end-user training and adaptation capabilities. Users may adopt emerging tools like low-code platforms without adequate skills, resulting in misconfigurations or insecure implementations. Integration gaps with enterprise core systems are another key driver, creating data silos that hinder holistic visibility and foster inconsistencies in reporting or decision-making. In decentralized EUC setups, these silos arise from incompatible formats and lack of , isolating critical information and increasing the potential for duplicated efforts or overlooked discrepancies. In the financial sector, where EUC tools like spreadsheets underpin manual controls for regulatory reporting and risk modeling, these drivers amplify error propagation and threats. Surveys indicate widespread reliance on such tools, with regulators in 2023 emphasizing heightened on EUC practices to mitigate systemic risks in banking operations. Manual processes in finance heighten susceptibility to inaccuracies, as unverified models can distort calculations or valuation assessments, potentially leading to regulatory penalties or financial misstatements. Quantitatively, unverified EUC models exhibit high error rates, with academic research showing that 94% of contain faults and error rates ranging from 1% to 5%, sufficient to invalidate results in complex applications. Scalability issues arise from uncontrolled proliferation, as can multiply applications exponentially without , straining maintenance and amplifying cumulative risks across the organization. These metrics underscore the need for targeted oversight, as even modest error frequencies compound in high-stakes environments. Historically, these drivers have been evident since the , when widespread PC adoption spurred EUC growth but introduced early concerns over unmanaged user-developed systems and associated control gaps. Risks intensified with the rise of post-2020, as distributed teams accelerated adoption and reduced collaborative verification, further decentralizing expertise and oversight.

Common Risk Examples

Operational risks in end-user computing (EUC) often stem from data inaccuracies in unvalidated spreadsheets, which can lead to significant financial losses. For instance, in 2012, incurred approximately $6.2 billion in trading losses partly due to manual input errors in an Excel spreadsheet used for () calculations, where outdated data was not properly updated, exacerbating risk underestimation. Similarly, Corporation reported a $24 million loss in 2003 after a cut-and-paste error in an Excel spreadsheet caused erroneous bidding on power contracts during California's energy crisis. Overreliance on Excel for has also resulted in projection errors, such as in the case of in 2014, where a spreadsheet miscalculation overstated by $100 million, leading to shareholder lawsuits. Security risks arise from unauthorized access through user-shared files and vulnerabilities to malware on personal devices, compromising sensitive data in EUC environments. Shadow IT applications, often developed by end-users bypassing IT oversight, heighten these threats by lacking enterprise-grade security controls, potentially exposing networks to breaches. A notable example is the 2023 Police Service of Northern Ireland (PSNI) incident, where a spreadsheet error exposed personal data of 9,483 officers and staff via an unprotected tab, resulting in a £750,000 fine (issued in 2024) and potential costs of up to £240 million for enhanced security and legal claims due to inadequate file handling practices. Compliance risks manifest in audit failures from missing documentation in EUC tools, particularly violating regulations like the Sarbanes-Oxley Act () or (GDPR) in finance operations reliant on spreadsheets. In EUC-heavy financial settings, undocumented changes to models can lead to non-compliance, as seen in Bank's 2021 £46.55 million fine from the UK Prudential Regulation Authority for an $8 billion error in a spreadsheet lacking proper controls, breaching reporting standards akin to SOX requirements. GDPR violations occur when EUC practices fail to ensure data accuracy and auditability, increasing fines for mishandled personal information. Maintenance risks involve the obsolescence of user-built applications when key personnel depart, causing knowledge loss and operational disruptions. Without centralized documentation, custom EUC tools become unmaintainable, forcing costly redevelopment; for example, the departure of spreadsheet creators in financial firms often leaves interdependent models vulnerable to breakdown, as highlighted in actuarial studies on EUC sustainability. In 2024, Norway's $1.5 trillion Government Pension Fund Global lost approximately $92 million due to an Excel error in entering a date for calculations, highlighting persistent operational s in financial indexing.

Risk Management

Governance Practices

Governance practices in end-user computing (EUC) emphasize structured oversight to mitigate s associated with user-developed applications while maintaining operational agility. Organizations typically begin by establishing comprehensive EUC policies that define what constitutes an EUC, such as spreadsheets, , or custom scripts, and outline approval gates for their creation and deployment. These policies require formal review processes before implementation, ensuring alignment with enterprise standards for and . Regular inventories of user-developed applications are mandated to create a centralized , enabling visibility into the EUC landscape and facilitating risk prioritization based on factors like and business impact. Additionally, mandates are enforced to track changes, prevent unauthorized modifications, and maintain historical records of updates, often through standardized protocols that include and capabilities. Established frameworks such as (Control Objectives for Information and Related Technology) provide a robust foundation for EUC by integrating IT controls into broader enterprise objectives, including and . 's allows organizations to assess and improve EUC processes, from initial design and testing to ongoing maintenance, with specific controls for spreadsheets and other user tools emphasizing security, access restrictions, and validation. These frameworks incorporate structured to evaluate the potential impacts of modifications before rollout. Effective monitoring forms the backbone of EUC , with controls limiting permissions to authorized users based on and need, thereby reducing unauthorized risks. Audit trails are implemented to log all activities, including changes and usage, providing for audits. Periodic reviews, such as quarterly assessments, evaluate the ongoing viability of EUCs, identifying high-risk items through metrics like usage frequency and error rates, and prompting remediation or decommissioning as needed. Critical applications identified during reviews are escalated to central IT teams for formal validation, to managed platforms, or enhanced controls, ensuring and without stifling end-user initiative. Adopting these practices has demonstrated effectiveness in reducing EUC-related incidents, errors, and costs by enhancing environments and minimizing uncontrolled proliferation, as evidenced in enterprise programs that streamline testing and regulatory adherence. Industry analyses indicate that mature EUC can bring critical applications within acceptable risk tolerances, lowering overall operational disruptions.

Supportive Software Tools

Supportive software tools for end-user computing (EUC) encompass specialized platforms designed to manage risks, automate processes, and ensure in environments where users develop and maintain custom applications, such as spreadsheets and databases. These tools are categorized primarily into platforms and solutions, enabling organizations to oversee EUC assets without stifling user innovation. Risk management platforms, such as Apparity, focus on auditing and tracking spreadsheets and other EUC applications to mitigate errors and issues. Apparity automates the identification, inventory, and of EUC applications, providing features like version , error detection for issues such as #REF or #VALUE errors, and to track modifications in Excel files. Similarly, tools like leverage (RPA) to streamline EUC workflows, allowing end users to build and deploy bots for repetitive tasks such as data entry and system integration directly within their processes. Key features across these tools include automated testing for formula integrity, compliance reporting to meet regulatory standards like , and seamless with enterprise systems for centralized oversight. For instance, capabilities in tools like Apparity monitor alterations in , alerting administrators to potential risks in critical EUC models. These platforms also support version rollback and active capture of EUC events throughout their lifecycle, enhancing without requiring extensive IT . Prominent vendors in the EUC space include for privileged access management, which secures user permissions to EUC resources by enforcing least-privilege controls and session monitoring, and for cataloging EUC assets within its IT service management framework. As of 2025, market leaders are increasingly incorporating AI-enhanced monitoring, such as predictive risk analytics and in tools evaluated by Forrester, to proactively identify vulnerabilities in EUC environments. Adopting these tools centralizes control over decentralized EUC practices, supports scalability for growing application inventories, and significantly reduces manual audit efforts—audit management software can shorten audit cycles by 60-70% through . However, implementation often involves high initial setup costs for integration and customization, alongside challenges in gaining user buy-in due to perceived restrictions on flexibility.

Cloud and Virtualization Adoption

The adoption of and technologies in end-user computing (EUC) has accelerated the shift toward flexible, scalable deployment models that support modern work environments. Key models include Cloud PCs, such as Microsoft's Windows 365, which provide a full Windows desktop experience hosted in the , allowing users to access personalized computing resources from any without local dependencies. Similarly, Virtual Desktop Infrastructure (VDI) platforms like Citrix Virtual Apps and Desktops enable the delivery of virtualized applications and desktops to end-users, facilitating device-agnostic access essential for remote and hybrid work setups. These models decouple the operating system and applications from physical endpoints, promoting seamless productivity across diverse devices including laptops, tablets, and mobile phones. A significant driver of this adoption has been the post-2020 surge in demands triggered by the , which prompted organizations to prioritize infrastructure that supports distributed teams. By 2025, over 60% of enterprises have adopted hybrid models, reflecting a broader embrace of -based EUC for enhanced scalability during fluctuating workloads. Additionally, these technologies align with zero-trust principles, where is continuously verified regardless of location, reducing risks in perimeter-less environments; projections indicate over 60% of enterprises will implement some form of zero-trust framework by 2025. Benefits of cloud and virtualization in EUC include centralized management, where IT administrators can provision, monitor, and update resources from a single console, streamlining operations across global teams. Automatic updates ensure compliance and security patches are applied uniformly without user intervention, minimizing . Cost efficiency is a major advantage, with pay-per-use pricing models enabling organizations to scale resources dynamically and reduce hardware needs by 30-50% compared to traditional on-premises setups. Despite these advantages, challenges persist, particularly issues, where regulations like GDPR require data to remain within specific geographic boundaries, complicating multi-cloud deployments for multinational firms. Latency in global setups can also degrade , especially for graphics-intensive applications, necessitating integrations to minimize delays. In the retail sector, EUC has proven effective for seasonal scaling; for instance, adopted -based workforce solutions to manage its large, variable employee base, enabling rapid of temporary staff during peak holiday periods while optimizing costs through elastic . This approach allows retailers to expand virtual desktops on demand, supporting inventory management and point-of-sale systems without over-provisioning hardware.

AI and Automation Integration

The integration of () and into end-user computing (EUC) has introduced agentic AI systems that autonomously suggest and customize applications based on user behavior and needs. For instance, Copilot, embedded within applications like Word, Excel, and Teams, leverages generative AI to recommend tailored app functionalities, such as drafting documents or analyzing spreadsheets, thereby streamlining end-user workflows without requiring IT intervention. Similarly, interfaces enable non-technical users to query data through conversational prompts, as seen in Copilot's chat features that generate insights from data sources, transforming complex EUC environments into intuitive platforms. These advancements align with broader agentic AI trends, where autonomous agents plan and execute tasks to meet user-defined goals, enhancing in EUC settings. Automation trends in EUC increasingly rely on (RPA) bots to handle repetitive tasks, such as , file management, and application updates, which traditionally burden end-users and IT support. RPA tools integrate with user interfaces to mimic human actions across productivity applications, freeing users for higher-value activities while maintaining compliance in environments. Complementing this, employs models to detect risks in user computing models, such as potential security vulnerabilities or performance bottlenecks, by analyzing historical usage patterns and forecasting issues proactively. In IT service management contexts relevant to EUC, these have been shown to optimize and mitigate through early risk identification. As of 2025, AI-driven self-healing desktops have become more prevalent, where systems automatically diagnose and resolve issues like software conflicts or degradations without or input, drawing on neuroscience-inspired for . This evolution supports a browser-first working paradigm in EUC, prioritizing web-based access to applications and resources, which simplifies deployment and enhances for workforces. Such developments are expected to accelerate adoption in EUC, with experts forecasting the rise of agents as a core component of digital workspace management. These integrations offer significant benefits, notably democratizing advanced by empowering non-experts to generate actionable insights from complex datasets via intuitive interfaces, such as automated report creation in tools like Power BI. Furthermore, and are projected to reduce manual interventions by up to 60% through minimized human involvement and enhanced data accuracy in EUC processes (, 2027). However, concerns persist regarding ethical use, including biases in algorithmic that could exacerbate inequalities in access to EUC resources, and the potential for job displacement in routine roles like basic and data handling. Addressing these requires robust to ensure equitable deployment and reskilling.

References

  1. [1]
    End User Computing and End User Development - Academia.edu
    EUC encompasses the use and development of information systems by non-specialist users. The confusion from multiple definitions highlights the need for a ...
  2. [2]
    [PDF] End-user Empowerment in the Digital Age - ScholarSpace
    These technologies led to the notion of end-user-computing, which may be defined as “an information processing activity in which the person has direct personal ...
  3. [3]
    [PDF] DOCUMENT RESUME Managing End User Computing in ... - ERIC
    End User Computing : The Problem and a Proposed Approach. End user computing encompasses a broad definition of technology used directly by individuals in ...<|control11|><|separator|>
  4. [4]
    What is EUC (End User Computing)? - Amazon AWS
    End-user computing (EUC) is a combination of technologies, policies, and processes that gives your workforce secure, remote access to applications, ...Why is EUC important? · What are the benefits of EUC? · What are EUC use cases?
  5. [5]
    Top Generative AI Techniques to Improve End-User Computing
    Feb 19, 2024 · I&O leaders responsible for end-user computing can use this research to identify the best ways to use GenAI within their organizations.
  6. [6]
    Best Practices for Device Sustainability in End-User Computing
    Mar 13, 2024 · Gartner Information Technology Research on Best Practices for Device Sustainability in End-User Computing.
  7. [7]
    What is EUC? - End-User Computing Definition - BOC Group
    End-User Computing (EUC) offers significant benefits by empowering employees to develop and manage their own solutions, enhancing productivity and flexibility.Introduction · Benefits of End-User Computing · EUC Different use cases
  8. [8]
    [PDF] End User Computing: Risks of Convenience
    Jan 24, 2013 · The appeal and convenience of EUC usage can often result in non- controlled processes that increase organizational risk. ERP Environment. • ...
  9. [9]
    What are your thoughts on citizen developed applications ... - Gartner
    Sep 3, 2021 · What are your thoughts on citizen developed applications (also called end user computing) without the knowledge or participation of the IT
  10. [10]
    None
    ### Summary of End-User Computing Applications (Hill & Barnes, 2011)
  11. [11]
    [PDF] End User Computing and End User Development
    According to Amoroso (1988) end users are defined as those that develop applications according to their needs in an environment where they have access to ...
  12. [12]
    Low-Code Platform
    Nov 15, 2021 · ''2. ''That's where the power of citizen development comes in – with no-code/low-code platforms, anyone ... ter end-user computing ...
  13. [13]
    [PDF] Bridging Business and IT Through Low-Code/No-Code: Insights into ...
    Dec 26, 2024 · Bridging Business and IT Through Low-Code/No-Code: Insights into ... The management of end-user computing. ACM Computing Surveys, 25(4) ...
  14. [14]
    [PDF] End user computing: A critique of the empirical literature
    The team defined end-user computing as any automated procedure created by users to sup port the routine execution of their corporate functions.
  15. [15]
    [PDF] On the Co-Evolution of Information Technology and ... - eCommons
    Second Era: The End User Revolution (mid 1970s to early 1990s). The mid 1970s ushered in the end user era with the introduction of minicomputers and fourth ...
  16. [16]
    Software & Languages | Timeline of Computer History
    Visicalc is developed​​ Harvard MBA candidate Dan Bricklin and programmer Bob Frankston develop VisiCalc, the program that turned the personal computer into a ...
  17. [17]
    AI is revolutionizing business process reengineering
    Feb 14, 2025 · Business Process Reengineering, or BPR, was introduced in the 1990s by Michael Hammer and James Champy. Its goal is radical redesign—not just ...
  18. [18]
    End-User Computing in Banking Industry - ResearchGate
    End-user computing (EUC) is direct hands-on use and development of ... Feb 1997; INFORM MANAGE-AMSTER. Cheri Speier · C.V. Brown. Although the diversity of ...
  19. [19]
    (PDF) The Support and Management of User Computing in the 1990s
    Aug 9, 2025 · End-user computing (EUC) has been a significant organizational phenomenon for more than two decades and remains critically important with the ...Missing: reengineering | Show results with:reengineering
  20. [20]
    A Brief History of Cloud Computing - Dataversity
    Dec 17, 2021 · Cloud Computing in the Early 2000s. In 2002, Amazon introduced its web-based retail services. It was the first major business to think of ...
  21. [21]
  22. [22]
    Gartner Names OutSystems a Leader: 2017
    Jun 19, 2017 · OutSystems is the only solution that combines the power of low-code development with advanced mobile capabilities, enabling visual development ...Missing: concept | Show results with:concept
  23. [23]
    Cloud Based VDI Market Growth Fueled by Hybrid Work & Cloud ...
    Oct 14, 2025 · The cloud based VDI market is expanding rapidly as organizations embrace hybrid work, digital transformation, and secure cloud environments.<|separator|>
  24. [24]
    End-User Computing (EUC) Global Market Report 2025
    In stockThe end-user computing (EUC) market size has grown rapidly in recent years. It will grow from $13.29 billion in 2024 to $14.77 billion in 2025 at a compound ...Missing: credible | Show results with:credible
  25. [25]
    End-User Computing: Revolutionizing Current Digital Landscape
    Mar 26, 2024 · A crucial component to ensuring that end-users can, in fact, work remotely is the reliance on cloud-based technologies that enable team ...
  26. [26]
    End-User Service Computing: Spreadsheets as a ... - ResearchGate
    Aug 8, 2025 · In this paper, we show how spreadsheets, an end-user development paradigm proven to be highly productive and simple to learn and use, ...
  27. [27]
    Google Sheets: Online Spreadsheets & Templates
    Create online spreadsheets with Google Sheets. Collaborate in real-time from any device and leverage AI to generate formatting, analysis, and more.
  28. [28]
    What is Low-Code Development? | Mendix
    Low-code platforms allow developers to extend applications with their own coded enhancements. No-code platforms apply constraints to the development environment ...What Is Low Code? · Features Of Low-Code... · How To Choose A Low-Code...<|control11|><|separator|>
  29. [29]
    10 use cases when Horizon and VDI best using a physical laptop
    Jan 19, 2024 · Horizon and virtual desktop infrastructure (VDI) can be an excellent technology option to replace or complement physical laptops and desktops.1. Remote Work And... · 5. Developer Desktop · 6. Mobile Workforce
  30. [30]
    Desktop as a Service (DaaS) - Amazon WorkSpaces - AWS
    Amazon WorkSpaces delivers secure Desktop as a Service (DaaS) with fully managed virtual desktops. Access Windows and Linux desktops from any device with ...Amazon Workspaces Desktop As... · Benefits · Case Studies
  31. [31]
  32. [32]
    What Is Data Visualization? Definition & Examples | Tableau
    By using visual elements like charts, graphs, and maps, data visualization tools provide an accessible way to see and understand trends, outliers, and patterns ...Data Visualization And Big... · Visualization Tools And... · Blogs About Data...
  33. [33]
    Integrating Using a Middleware - SAP Help Portal
    You can include a middleware in your integration landscape by configuring the add-on to communicate with the middleware instead of directly communicating.
  34. [34]
    API Management | SAP Integration Suite Capability
    Develop your APIs by exposing and composing back-end interfaces from apps or middleware. Protect your APIs from security threats, manage traffic, and cache ...
  35. [35]
    End User Computing (EUC) - Definition and Key Steps - Nerdio
    Jun 24, 2025 · The key benefits of implementing EUC solutions are enhanced security, greater workforce flexibility, and streamlined IT management. By ...
  36. [36]
    Migrating from On-Premises VDI to Azure Virtual Desktop - CloudThat
    Dec 23, 2024 · In this blog, we will walk you through the key steps and considerations for a successful migration to Azure Virtual Desktop.Missing: evolution | Show results with:evolution
  37. [37]
    What Is a Citizen Developer? Best Practices & Benefits in 2025
    Feb 11, 2025 · A citizen developer is a non-technical employee (usually not in IT or the engineering team) who builds apps or automates workflows using low-code or no-code ...
  38. [38]
    A Guide to Citizen Developer Meaning and Definition - Interfacing
    Citizen Developers are able to help further automate and digitize systems by contributing to or integrating with existing applications. Putting the “rapid” in ...
  39. [39]
    Why You Need To Know About Low-Code, Even If You're ... - Forrester
    Aug 8, 2018 · Low-code development platforms are emerging ... They have the potential to greatly decrease the time needed to meet business requirements.
  40. [40]
  41. [41]
    End-User Portal for Self-Service | A Simple Guide - NinjaOne
    Jun 30, 2025 · An end-user portal for self-service is a centralized platform that empowers users to access information, resolve issues, and manage their accounts.
  42. [42]
    IT Service Desk Self-Service Portal: Complete Guide - Freshworks
    Jul 1, 2025 · Discover how IT self-service portals boost support efficiency, cut workload, and enhance employee experience with best practices and tools ...
  43. [43]
    Exploring Ubiquitous Computing: Pervasive Technology Insights
    May 7, 2024 · Ubiquitous computing, also referred to as pervasive computing, ambient intelligence, or “everyware,” represents a cutting-edge form of computing.Layers Of Pervasive... · Examples Of Ubiquitous... · Advantages Of Ubiquitous...
  44. [44]
    The computing continuum: From IoT to the cloud - ScienceDirect.com
    This paper provides a comprehensive and unified view of the computing continuum. The paper discusses computing models in general with a focus on cloud ...Missing: pervasive | Show results with:pervasive
  45. [45]
    A Jigsaw-Based End-User Tool for the Development of Ontology ...
    Jul 6, 2021 · In this paper, we present an end-user development (EUD) tool that supports subject matter experts in the construction of ontology–based knowledge bases.
  46. [46]
    Current state of the art and future directions: Augmented reality data ...
    Augmented Reality (AR), as a novel data visualization tool, is advantageous in revealing spatial data patterns and data-context associations.
  47. [47]
    Mobile First Design: Creating Seamless Mobile Experiences
    Mobile First Design is a strategic approach that prioritizes mobile user experience to create seamless and user-friendly digital experiences.
  48. [48]
    The Complete Guide to IoT Integration in Mobile Apps
    Learn how to connect your mobile app to smart technology and IoT devices with our complete guide covering planning, building, and testing strategies.
  49. [49]
    My Top Five Security Considerations in Legacy System Modernization
    Aug 19, 2025 · These five considerations – undocumented integrations, performance optimization conflicts, authentication complexity, encryption complications ...
  50. [50]
    Remote Desktop Protocol (RDP) bandwidth requirements
    Jun 19, 2025 · When using a remote session, your network's available bandwidth dramatically impacts the quality of your experience. Different applications and ...
  51. [51]
    Cybersecurity end-user compliance: Password management versus ...
    One study found that approximately 88 % of all data breaches are caused by EUC issues, including 43 % of data breaches traceable to EUC issues (Tessian, 2022).
  52. [52]
    Low-Code ETL Platform Benefits Metrics – 42 Statistics Every Data ...
    Aug 18, 2025 · Up to 70% reduction in development costs reported.​​ Vendor case studies report up to 70% reduction in application development costs when using ...
  53. [53]
    5G and edge computing: why does 5G need edge? - STL Partners
    5G increases speeds by up to ten times that of 4G, edge computing reduces latency by bringing compute capabilities into the network, closer to the end user.
  54. [54]
    Edge Computing and 5G: Emerging Technology Shaping the Future ...
    Aug 20, 2024 · 5G and edge computing can work together to offer enterprise IT companies faster edge computing and transmission of processed data to user devices across ...
  55. [55]
    Organizational Factors Affecting the Success of End-User Computing
    Dec 23, 2015 · This paper identifies variables affecting end-user computing success, classified as controllable, partially controllable, or uncontrollable.
  56. [56]
    What Is End User Computing? | phoenixNAP IT Glossary
    Jan 28, 2025 · Shadow IT. Users may bypass official EUC solutions by using unauthorized applications or devices, leading to data silos, compliance risks, and ...
  57. [57]
    Shadow IT and End-User-Computing Tools Governance
    Apr 3, 2024 · Employee Resistance: Employees may resist disclosing the use of unauthorized tools due to fear of reprisal or losing access to preferred tools.
  58. [58]
    A Framework for Managing and Controlling End-User Computing ...
    An EUC governance framework sets out what controls and processes are in place within an enterprise to ensure that the outcomes of EUCs are accurate, reliable ...
  59. [59]
    End-user computing (EUC) governance - Milliman
    Jul 6, 2017 · This briefing note discusses some of the key considerations in respect of attaining a suitable end-user computing (EUC) framework.Missing: approval workflows
  60. [60]
    5 Ways a Cloud EUC Solution can Surprisingly SAVE You Money
    Apr 23, 2024 · Organizations can see an up-to 30% reduction in administrative costs of a Cloud-based EUC solution. Tip #3: Don't forget about the soft costs.
  61. [61]
    Navigating End-User Computing (EUC) Amid a Global IT Talent ...
    Impact on End-User Computing Operations · Increased Pressure on IT Teams: With fewer skilled professionals available, existing IT teams are often overburdened.Missing: gaps | Show results with:gaps
  62. [62]
    Everything You Need To Know About End-User Computing — EUC ...
    End-user computing is a broad term, so we break down what it is, why you should care, and how you can start improving governance and controls today.Missing: Goodall 1997
  63. [63]
    End User Computing: Why Hybrid EUC is the Best Choice - Apporto
    End user computing services support this approach by enabling access to corporate applications across various platforms and supporting diverse endpoint devices.
  64. [64]
    [PDF] thingsat end-user computing maturity model
    ThingsAt's EUC maturity model helps understand EUC maturity, from Level 1 (Ad hoc) to Level 5 (Optimized), and is derived from experience and best practices.Missing: ASSIMPLER | Show results with:ASSIMPLER
  65. [65]
    End User Computing Roadmap Workshop - WWT
    The maturity model is a valuable framework for setting priorities and building your digital workspace capabilities related to people, process and technology.
  66. [66]
    How to Develop a Successful EUC Strategy and Roadmap
    Mar 18, 2020 · It's vital that any EUC operation follows a clear strategy. Here are a few key steps that will be essential in creating a strong EUC roadmap.Missing: selection | Show results with:selection
  67. [67]
    Strategies for End-User Computing: An Integrative Framework
    Abstract: This paper develops a framework consisting of five core strategies or organizational postures vis-à-vis end-user computing (euc).
  68. [68]
    (PDF) An exploratory study of end user computing strategy
    Aug 9, 2025 · Using qualitative case study data, three end user computing strategy types emerged for managers who rely on IS to achieve organizational goals.Missing: formulation | Show results with:formulation<|control11|><|separator|>
  69. [69]
    [PDF] The map from ERP to ROI | Grant Thornton
    20 The map from ERP to ROI. Change management strategy. Your business transition will need an integrated and collaborative change management strategy and plan.Missing: EUC | Show results with:EUC
  70. [70]
    Metric of the Month: ROI of Support, Part 2 - HDI
    Jul 31, 2019 · Through aggressive problem management, over the course of a year this service desk was able to reduce ticket volumes from 2.6 tickets per user ...
  71. [71]
    'Citizen developer' success requires strong IT oversight - CIO
    May 20, 2021 · If IT leaders don't get out in front of the downsides of increasing reliance on citizen developers, significant problems await. Here's how ...Missing: hybrid | Show results with:hybrid
  72. [72]
    (PDF) Controlling End User Computing Applications - a case study
    We report the results of a project to control the use of end user computing tools for business critical applications in a banking environment.
  73. [73]
    Working Within an End User Computing Strategy - Stefanini
    Jan 30, 2020 · End-using computing allows workers more flexibility, better productivity and more access to creative stimuli. Yet, EUC is only successful when utilized ...
  74. [74]
    How to run a successful IT pilot program | TechTarget
    Nov 13, 2024 · 9 essential steps of a tech pilot program · 1. Determine whether software warrants a pilot test · 2. Secure resources and approvals · 3. Define the ...Missing: phases rollout
  75. [75]
    Driving adoption best practices for EUC success: A step-by-step guide
    Nov 10, 2022 · From planning to launching, here's your step-by-step guide for building a successful end user adoption program.Missing: metrics | Show results with:metrics
  76. [76]
    VDI deployment guide - AppsAnywhere
    Feb 26, 2021 · Read on for high-level best practices that will help guide a successful deployment of VDI on your campus.
  77. [77]
    End User Computing (EUC) Training - Koenig-solutions.com
    EUC training equips individuals with the necessary skills to implement solutions like virtual desktops, cloud computing, and mobile device management.
  78. [78]
    Legacy System Cloud Migration Process: 5 Stages Explained
    A comprehensive 2025 guide to legacy system cloud migration journey with five key phases designed to ensure efficiency, security, and business continuity.Table Of Contents · Phase 2: Planning · Phase 4: Migration
  79. [79]
    9 key metrics for IT success - CIO
    Mar 18, 2025 · 1. Return on investment · 2. Business value delivered · 3. Rate of change · 4. Application delivery success · 5. IT and business team engagement · 6.
  80. [80]
    End-User Computing (EUC) Risks: A Comprehensive Guide - Incisive
    This document discusses the importance and risks associated with End-User Computing (EUC) tools such as spreadsheets, low-code/no-code and generative AI ...
  81. [81]
    What is EUC & why are there risks? - Apparity
    Spreadsheets are subject to human error, lack native controls, and are easily manipulated, making them key drivers of risk within organizations. ... Model Risk ...
  82. [82]
    What Is Shadow IT? | IBM
    Risks of shadow IT​​ End users or departmental teams may not understand the importance of updates, patching, configurations, permissions, and critical security ...
  83. [83]
    End-user computing: A problem everyone has but nobody wants to ...
    Jan 5, 2021 · EUCs are prone to both risk and operational costs. From a risk perspective, there are dependencies on the users who create and/or maintain the ...
  84. [84]
    What are Data Silos? | IBM
    Data silos are isolated collections of data that prevent data sharing between different departments, systems and business units.
  85. [85]
    It's in the Details: Are Spreadsheets Putting Firms at Risk?
    Mar 10, 2023 · Regulators are putting increased pressure on financial institutions to manage their spreadsheets and end user computing (EUC) risk programs more effectively.
  86. [86]
    Risk Management for End User Computing in Banking
    Boardwalk Velocity is the first product designed to address Excel EUC risk in a way that satisfies IT, regulators, and users simultaneously.Missing: Goodall 1997
  87. [87]
    [PDF] A critical review of the literature on spreadsheet errors
    Jun 7, 2008 · Panko summarized this literature by reporting that 94% of spreadsheets have errors, with an average cell error rate of 5.2%. We will revisit ...
  88. [88]
    [PDF] End User Computing and Information Security
    By the early 1990s, it had been widely recognised (Brancheau & Brown, 1993) that the benefits emerging from end-user computing were of two distinct types:.<|separator|>
  89. [89]
    End-User Computing (EUC) Risks Didn't Disappear — They Evolved
    they meld. Your program should too. Actionable ...Missing: rapid | Show results with:rapid
  90. [90]
    Solutions To Spreadsheet Risk Post JPM's London Whale - Forbes
    Feb 19, 2013 · It found the bank's Value at Risk (VaR) was being calculated with an Excel spreadsheet that “required time-consuming manual inputs to entries ...
  91. [91]
  92. [92]
  93. [93]
  94. [94]
  95. [95]
    What Is EUC? End-User Computing Risks And Benefits - Cloudzy
    Oct 4, 2024 · EUC, or end-user computing, is a framework where non-IT professionals or business users are able to manage their own computing needs through applications, data ...
  96. [96]
    End-User Computing: Solving the Problem - SOA
    Companies are too dependent on EUC functionality that allows them to respond quickly and effectively to dynamic market conditions. And auditors and regulators ...Missing: overreliance individual expertise
  97. [97]
    Designing an Enterprise End-User Computing Program - WSJ
    ### Summary of EUC Governance Program Elements
  98. [98]
    [PDF] Managing Risk of End User Computing (EUC) - KPMG International
    Depending on an organisation's EUC policy, the data contained within these EUC applications can more often than not be sensitive.
  99. [99]
    The Ultimate End-User Computing (EUC) | Checklist - Mitratech
    The EUC checklist helps identify, quantify, and manage EUC risks, which are applications developed by end-users, and helps to establish controls and evidence.Creating A Great Euc Policy... · What You Will Learn · Managing Eucs Controls Is...
  100. [100]
    [PDF] Applying the CobiT® Control Framework - arXiv
    APPLYING CobiT TO SPREADSHEETS​​ a “first draft” upon which a formal set of overall and more detailed control objectives can be built. The controls will ...
  101. [101]
    COBIT®| Control Objectives for Information Technologies® - ISACA
    COBIT is a globally accepted framework for optimizing enterprise IT governance, with an expanded definition of governance and 40 objectives.
  102. [102]
    Apparity EUC Risk Management Software
    Apparity safeguards organizations by automating compliance and risk control over critical spreadsheets and end-user computing tools.What is End User Computing? · Excel Spreadsheet Controls · Spreadsheet Controls
  103. [103]
    UI Path - CIMCON Software
    The UIPath RPA tool allows businesses to create flowcharts, sequences to automate their business processes. These workflows are created by end users for ...
  104. [104]
    Integrity Check - Excel Spreadsheet Audit Add-In - Apparity
    Apparity's Integrity Check tool audits Excel spreadsheets for errors such as #REF, #VALUE and hardcoded values within formulas.
  105. [105]
    Excel Spreadsheet Controls & Change Management - Apparity
    Apparity offers spreadsheet controls and spreadsheet change management tools for end users, which include excel version history, version rollback, version ...A Toolkit For You · Version History · Error Identification
  106. [106]
    What is Workflow Automation? - UiPath
    RPA is a technology designed to automate specific, repetitive, rule-based tasks. It mimics how a person interacts with software by performing actions like ...How Workflow Automation... · Where Does Workflow... · What's The Relationship...
  107. [107]
    Internal Audit Spreadsheet & EUC Risks - Apparity
    Jun 24, 2021 · EUC risks include errors in critical spreadsheets, especially in financial reporting, and high-risk processes. Errors can lead to costly and ...<|separator|>
  108. [108]
    About Apparity
    Apparity's software monitors and assists with every event that occurs during the life cycle of spreadsheets and other critical end user computing (EUC) ...Compliance With Value-Added... · Spreadsheet Controls · Euc Framework
  109. [109]
    Privileged Access Management (PAM) & Identity Security Solutions
    Gain visibility and control over privileged identities, accounts, access, and privilege pathways across your environment - with one, integrated platform.Missing: computing | Show results with:computing
  110. [110]
    EUC devices discovery - ServiceNow Community
    We have EUC devices(Desktop, Laptops, Tablets) to be discovered as part of deliverables. Would like to understand what is the best approach procs and crons.
  111. [111]
    The Forrester Tech Tide™: End-User Computing, Q2 2025
    Apr 25, 2025 · Twenty-One Technologies Underpin End-User Computing · Endpoint Security Suites · Hybrid Virtual Desktop Infrastructure · Mobile Devices · Remote ...
  112. [112]
    Four Key EUC Trends From IGEL's Now & Next 2025 Event - Forrester
    Apr 2, 2025 · Forrester sees a similar trend: 49% of the nearly 5,000 respondents in our Workforce Survey, 2023, said that they can accomplish all of ...
  113. [113]
    How Audit Management Software Cuts Compliance Costs by 40%
    Audit management software cuts compliance costs by 40% through automation, reducing manual work, and cutting audit cycle time by 60-70%.
  114. [114]
    Apparity Reviews 2025: Details, Pricing, & Features - G2
    Apparity is a risk management software that allows organizations to identify, track and manage end-user computing applications (also referred to as EUAs, EUCs, ...
  115. [115]
    Apparity Innovative EUC Risk Management - GRC Viewpoint
    Apparity offers a comprehensive solution for managing end-user computing (EUC) risks, ensuring regulatory compliance and enhancing operational efficiency.
  116. [116]
    Meet Windows 365 Cloud PC - Microsoft
    Deploy and manage Cloud PCs with Windows 365, a Microsoft virtualization solution designed for hybrid work. Find the right Windows 365 plan for your ...See Enterprise plans and pricing · Windows 365 Business · Windows 365 LinkMissing: models | Show results with:models
  117. [117]
  118. [118]
    Cloud Computing Statistics 2025: Infrastructure, Spending & Security
    Oct 8, 2025 · Enterprise Cloud Adoption Rates by Industry · In 2025, healthcare cloud adoption rates have reached 76%, with a strong focus on secure data ...Missing: DaaS | Show results with:DaaS
  119. [119]
  120. [120]
    How Cloud Computing Reduces Costs
    Sep 28, 2025 · According to a 2025 IDC report, mid-sized businesses save 30%-50% annually by offloading server maintenance and software patching to a cloud ...From Capital Expense To... · Hidden Costs You Eliminate... · Why Local Expertise MattersMissing: EUC percentage
  121. [121]
    Data sovereignty compliance challenges and best practices
    Jan 24, 2025 · Organizations that use the cloud face stiff challenges in complying with data sovereignty laws and regulations. The first step: Understand which laws apply.
  122. [122]
    Multi-Region Cloud: Low Latency & Data Sovereignty
    Nov 14, 2024 · Impossible Cloud expands in Europe with two new regions, empowering customers to meet data sovereignty and data residency laws while reducing latency.
  123. [123]
    DaaS Benefits for Finance, Healthcare & Retail - Anunta Tech
    Apr 29, 2025 · ​. Case Study: Walmart's Cloud-Based Workforce Solutions. Walmart adopted cloud-based solutions to enhance its workforce management and ...
  124. [124]
  125. [125]
    Microsoft 365 Copilot | AI Productivity Tools for Work
    Supercharge productivity, streamline tasks, and uncover insights in seconds with secure AI chat grounded in your work and web data. It works across Microsoft ...Microsoft Copilot Studio · Copilot for individuals · For business · For enterprise
  126. [126]
    Microsoft 365 Copilot help and learning
    Microsoft 365 Copilot empowers you to enhance your skills and boost productivity using the power of Artificial Intelligence, helping you work smarter and ...Chat with Copilot in Outlook · Getting started with Copilot Chat · Word · Planner
  127. [127]
    Gartner's Top 10 Strategic Technology Trends for 2025
    Oct 21, 2024 · Trend 1: Agentic AI: Autonomous AI can plan and take action to achieve goals set by the user. Business benefits: A virtual workforce of ...Missing: end- | Show results with:end-
  128. [128]
    What is Robotic Process Automation (RPA)? - IBM
    RPA combines APIs and user interface (UI) interactions to integrate and perform repetitive tasks between enterprise and productivity applications.
  129. [129]
    What Is Robotic Process Automation (RPA)? - SAP
    Automate repetitive tasks with robotic process automation. This solution can help you free up your employees to focus on more strategic work.
  130. [130]
    Role of Predictive Analytics in Risk Management - CRG Solutions
    May 9, 2024 · Predictive analytics is a powerful tool for risk management that organizations can use to anticipate, assess, and mitigate risks effectively across various ...
  131. [131]
    Predictive Analytics in ITSM: Reducing Downtime - CIO Influence
    Mar 21, 2025 · Predictive analytics plays a pivotal role in optimizing ITSM by forecasting resource demands, identifying risks, and improving customer service delivery.<|separator|>
  132. [132]
    Neurotech Meets ITOps: How AI Can Drive Self-Healing IT Systems
    Mar 3, 2025 · Neuroscience-inspired AI is driving a shift from reactive IT operations to autonomous, self-healing ecosystems that predict, understand, and resolve issues ...Missing: desktops projections
  133. [133]
    End-User Computing Trends in 2025: What's Next? - Retail Assist
    Jun 3, 2025 · A browser-first EUC strategy offers: Easier application access ... AI and browser-first working. Embracing these trends helps reduce ...
  134. [134]
    End User Computing Market Size, Trends | Report [2025-2033]
    Global End User Computing market size is anticipated to be valued at USD 50838.97 million in 2025, with a projected growth to USD 113825.02 million by 2033 ...
  135. [135]
    EUC Trends for 2025 – Liquidware Digital Workspace Management
    Dec 31, 2024 · As we approach the end of 2024, I wanted to look at what we can expect in EUC in 2025. As always, EUC will be at the cutting edge.<|separator|>
  136. [136]
    Democratizing Data Insights with AI-Powered Report Generation in ...
    Aug 7, 2025 · The results indicate that AI-driven report generation reduces the time to report development by 60%, enhances narrative coherence, and enhances ...
  137. [137]
    7 data engineering trends for 2026 and beyond - N-iX
    Sep 17, 2025 · Gartner predicts that by 2027, AI assistants and AI-enhanced workflows will reduce manual intervention by 60% and enable self-service data ...
  138. [138]
    Ethical concerns mount as AI takes bigger decision-making role
    Oct 26, 2020 · Harvard experts examine the promise and potential pitfalls as AI takes a bigger decision-making role in more industries.
  139. [139]
    Ethical implications of AI and the future of work | Deloitte Insights
    May 15, 2020 · Next came issues that are distinctly human, such as fairness of pay, the design of jobs for sustainability, and treatment of alternative workers ...
  140. [140]
    The Ethical Implications of AI and Job Displacement - Sogeti Labs
    Oct 3, 2024 · This article explores the ethical implications of AI-induced job displacement and examines potential strategies to mitigate its adverse effects.Missing: computing | Show results with:computing