吃什么降肝火| 行房出血是什么原因| 甲鱼和什么食物相克| 深圳有什么好玩的地方| 程五行属什么| 小熊猫长什么样| 河南有什么美食| 澜字五行属什么| viagra是什么药| 星期天左眼皮跳是什么预兆| 岫岩玉是什么玉| 封面是什么意思| 飞机什么时候开始登机| 谷丙转氨酶是什么意思| 09属什么生肖| 脾胃虚弱吃什么蔬菜| 七月八号是什么日子| 信保是什么| 5月24日是什么星座| 为什么一同房就出血| 吃什么对肾有好处| 漱口水有什么作用| 淋巴结有血流信号预示着什么| 转氨酶偏高是什么原因引起的| 右手小指戴戒指什么意思| 什么生意好做又赚钱| 蚂蚁咬了用什么药| 游戏hp是什么意思| 双肾尿盐结晶是什么意思| 邓绥和阴丽华什么关系| 不将就什么意思| 血癌是什么原因造成的| 庭长是什么级别| amk是什么品牌| 1962年属什么生肖| 信女是什么意思| 尿的正常颜色是什么样| 从来不吃窝边草是什么生肖| 优衣库属于什么档次| 不孕不育应检查什么| 班禅是什么意思| 19点是什么时辰| 看脑袋挂什么科| 为什么会面瘫| 射手座和什么座最配对| 肌肉萎缩吃什么药| ad是什么缩写| 一什么冰箱| 突然头晕恶心是什么原因| 脖子痛什么原因| 莞字五行属什么| 普陀山求什么最灵| 陈皮有什么作用| 碳14阴性是什么意思| 笔记本电脑什么牌子好| 舌苔白有齿痕吃什么药| 放屁多吃什么药| 牙齿里面疼是什么原因| 乔字五行属什么| 改年龄需要什么手续| 人老了为什么会瘦| 喝椰子粉有什么好处| 癣是什么原因引起的| 生物学父亲是什么意思| 爱出汗是什么原因| 什么是辛辣食物| 治疗阳痿吃什么药| 紫荆花代表什么生肖| 青稞是什么东西| 血糖高喝什么茶好| 疝气什么症状| 散光是什么意思| 什么是糖化血红蛋白| 女性肝阳上亢吃什么药| 等闲识得东风面什么意思| 两个土念什么| 无花果不能和什么一起吃| 脸发烫是什么原因| 为什么头发会变白| 三级残疾是什么程度| 在眼皮老跳是什么征兆| 宫颈出血是什么症状| 三什么一什么| 紫癜是什么| 消瘦挂什么科| 吃什么化痰| 梦见鳝鱼是什么预兆| 新生儿囟门什么时候闭合| 皮内瘤变到底是什么意思| 肌酐高有什么症状表现| 圆脸适合什么发型短发| 生命的真谛是什么| 尿血是什么原因引起的| 叩拜是什么意思| 自律什么意思| 牙补好了还会痛什么原因| exo什么时候出道的| 每天半夜两三点醒是什么原因| 养性是什么意思| 咽喉炎吃什么药好| 硒酵母胶囊对甲状腺的作用是什么| 早上出虚汗是什么原因| 顺产收腹带什么时候用最佳| 溶血症是什么意思| 金钱骨是什么部位| 十三香是什么| 辣椒是什么时候传入中国的| 三伏天吃什么对身体好| 蚊子最喜欢什么血型| 怎么知道自己缺什么五行| 苦不堪言是什么意思| 补肾吃什么药效果最好| 山茱萸的功效与作用是什么| ct能检查出什么| 朋友圈屏蔽显示什么| 苍茫的天涯是我的爱是什么歌| 什么原因引起尿路感染| 天葬是什么| 什么病才吃阿昔洛韦片| 拔罐有什么用| 95年属什么生肖婚配表| 川崎病是什么原因引起的| 剑锋金命五行缺什么| 酸西地那非片是什么药| 夏令时是什么意思| 黄瓜籽粉有什么作用| 高危妊娠监督什么意思| 吃蒸苹果有什么好处| 用盐水洗脸有什么好处| 飞黄腾达是什么意思| s和m是什么意思啊| 什么路最窄打一生肖| 失眠去医院挂什么科| 狗脚朕什么意思| 33朵玫瑰花代表什么| 谁发明了什么| 中产家庭的标准是什么| 失语是什么意思| 腺癌是什么癌| 4月27日是什么星座| 白眼球发黄是什么原因| 什么非常什么| 睡觉背疼是什么原因| 什么是脱脂牛奶| 孕吐严重是什么原因| 梦见种玉米是什么意思| beryl是什么意思| 浮躁的意思是什么| 什么时候闰九月| 蜜蜂吃什么食物| 骨质密度不均匀是什么意思| 属狗的本命佛是什么佛| 什么血压计最准确| 墨鱼干和什么煲汤最好| 什么叫种草| 梦见月经血是什么预兆| police是什么品牌| 孩子喉咙痛吃什么药好| 2026年属什么| 谷氨酸钠是什么添加剂| 河南人喜欢吃什么菜| 最大的沙漠是什么沙漠| 天安门以前叫什么| 阴道痒用什么药| 淋球菌阳性是什么病| 多动症看什么科室| 什么两难| dickies是什么牌子| 什么中药| 胃不舒服做什么检查| 什么是宫颈息肉| 榴莲坏了是什么味道| 款式是什么意思| 5月23是什么星座| 房产税什么时候开始征收| 轮状病毒吃什么药| 变白吃什么| 妃嫔是什么意思| 阳痿什么意思| 妄语是什么意思| 生津止渴是什么意思| 石龙子吃什么| 含义是什么意思| 梦见在河里抓鱼是什么征兆| reald厅什么意思| 血压高什么不能吃| 精液发黄是什么原因引起的| 属蛇的人适合佩戴什么| 橙子什么季节成熟| 霸王龙吃什么| 朱砂痣是什么意思| 眩晕症是什么原因引起| 吃什么蔬菜可以降血脂| 烤肉筋的肉是什么肉| 喝菊花有什么好处| 甲沟炎是什么样子的| 百香果什么时候吃最好| 孕晚期流鼻血是什么原因| 小蛮腰什么意思| 乳酸杆菌少或无是什么意思| 亚麻籽油有什么功效| 海苔吃多了有什么坏处| 什么是植物| 吾儿是什么意思| 弊病是什么意思| 体细胞是什么意思| 消化性溃疡吃什么药好| 蚂蚱和蝗虫有什么区别| 胃疼喝什么能缓解疼痛| 排骨炖什么汤止咳润肺| 梦到生女儿是什么意思| dm表示什么单位| 足金什么意思| 剥离是什么意思| 事业编有什么好处| 什么是肛瘘| 休止期脱发什么意思| 111什么意思| 大圣归来2什么时候上映| 火车不能带什么| 小便少是什么原因| 从子是什么意思| 品检是做什么的| 可燃冰属于什么能源| 节操什么意思| 水手是干什么的| 1972属什么| 三秦是什么意思| 红肉是指什么肉| 脂肪肝吃什么药最好| 净身高是什么意思| 头皮特别痒是什么原因| 受害者是什么意思| 6.20什么星座| 地球代表什么生肖| 半月板后角变性什么意思| 628是什么星座| 女人左眼跳是什么预兆| 左侧卵巢囊性结构什么意思| 皮脂腺痣是什么原因引起的| 手背肿是什么原因| 吃什么补钾最快最好| 牙齿打桩是什么意思| 嘴巴发甜是什么原因| 什么水果通便效果最好| 男人阴茎硬不起来是什么原因| 2004属什么生肖| 366红包代表什么意思| 打佛七什么意思| 逆天改命是什么意思| 米虫是什么意思| 跃字五行属什么| 梦见杀鸡见血什么征兆| 过期的维生素c有什么用途| 梦见煎鱼是什么预兆| 2016年属猴是什么命| 大片是什么意思| 过期食品属于什么垃圾| 嘴皮发白是什么原因| 早餐吃什么有营养| 随餐吃是什么意思| 孕妇过敏可以用什么药| 短阵房速是什么意思| 产后大出血一般发生在什么时候| 百度

[??] ???? ?? ‘?? ???? ??’ (?????)

百度   ↑新华网体育APP下载二维码  武胜乡村马拉松由中国田径协会、武胜县人民政府、新华网主办,新华网体育、武胜幸福产业投资有限公司承办,新华网四川有限公司独家运营,已被纳入由新华网与中国田径协会携手打造的国家级赛事IP“韵动中国”马拉松系列赛。

In product development, an end user (sometimes end-user)[a] is a person who ultimately uses or is intended to ultimately use a product.[1][2][3] The end user stands in contrast to users who support or maintain the product,[4] such as sysops, system administrators, database administrators,[5] information technology (IT) experts, software professionals, and computer technicians. End users typically do not possess the technical understanding or skill of the product designers,[6] a fact easily overlooked and forgotten by designers: leading to features creating low customer satisfaction.[2] In information technology, end users are not customers in the usual sense—they are typically employees of the customer.[7] For example, if a large retail corporation buys a software package for its employees to use, even though the large retail corporation was the customer that purchased the software, the end users are the employees of the company, who will use the software at work.

Nurses as information systems end users

Context

edit

End users are one of the three major factors contributing to the complexity of managing information systems. The end user's position has changed from a position in the 1950s (where end users did not interact with the mainframe; computer experts programmed and ran the mainframe) to one in the 2010s where the end user collaborates with and advises the management information system and Information Technology department about his or her needs regarding the system or product. This raises new questions, such as: Who manages each resource?, What is the role of the MIS Department? and What is the optimal relationship between the end-user and the MIS Department?[8]

Empowerment

edit

The concept of end-user first surfaced in the late 1980s and has since then raised many debates. One challenge was the goal to give both the user more freedom, by adding advanced features and functions (for more advanced users) and adding more constraints (to prevent a neophyte user from accidentally erasing an entire company's database).[9] This phenomenon appeared as a consequence of consumerization of computer products and software. In the 1960s and 1970s, computer users were generally programming experts and computer scientists. However, in the 1980s, and especially in the mid-to-late 1990s and the early 2000s, everyday, regular people began using computer devices and software for personal and work use. IT specialists needed to cope with this trend in various ways. In the 2010s, users now want to have more control over the systems they operate, to solve their own problems, and be able to customize the systems to suit their needs. The apparent drawbacks were the risk of corruption of the systems and data the users had control of, due to their lack of knowledge on how to properly operate the computer/software at an advanced level.[10]

For companies to appeal to the user, it took primary care to accommodate and think of end-users in their new products, software launches, and updates. A partnership needed to be formed between the programmer-developers and the everyday end users so both parties could maximize the use of the products effectively.[11] A major example of the public's effects on end user's requirements were the public libraries. They have been affected by new technologies in many ways, ranging from the digitalization of their card catalog, the shift to e-books, e-journals, and offering online services. Libraries have had to undergo many changes in order to cope,[12] including training existing librarians in Web 2.0 and database skills, to hiring IT and software experts.

End user documentation

edit
 
1980s-era personal computer with end-user documentation
 
NATO official and Afghan colonel going through end-user documentation to transfer control of barracks to the Afghan army in 2009

The aim of end user documentation (e.g., manuals and guidebooks for products) is to help the user understand certain aspects of the systems and to provide all the answers in one place.[13] A lot of documentation is available for users to help them understand and properly use a certain product or service. Due to the fact that the information available is usually very vast, inconsistent or ambiguous (e.g., a user manual with hundreds of pages, including guidance on using advanced features), many users suffer from an information overload. Therefore, they become unable to take the right course of action. This needs to be kept in mind when developing products and services and the necessary documentation for them.[14]

Well-written documentation is needed for a user to reference. Some key aspects of such a documentation are:[13]

  • Specific titles and subtitles for subsections to aid the reader in finding sections
  • Use of videos, annotated screenshots, text and links to help the reader understand how to use the device or program
  • Structured provision of information, which goes from the most basic instructions, written in plain language, without specialist jargon or acronyms, progressing to the information that intermediate or advanced users will need (these sections can include jargon and acronyms, but each new term should be defined or spelled out upon its first use)
  • Easy to search the help guide, find information and access information
  • Clear end results are described to the reader (e.g., "When the program is installed properly, an icon will appear in the left-hand corner of your screen and the LED will turn on...")
  • Detailed, numbered steps, to enable users with a range of proficiency levels (from novice to advanced) to go step-by-step to install, use and troubleshoot the product or service
  • Unique Uniform Resource Locator (URLs) so that the user can go to the product website to find additional help and resources.

At times users do not refer to the documentation available to them due to various reasons, ranging from finding the manual too large or due to not understanding the jargon and acronyms it contains. In other cases, the users may find that the manual makes too many assumptions about a user having pre-existing knowledge of computers and software, and thus the directions may skip over these initial steps (from the users' point of view). Thus, frustrated user may report false problems because of their inability to understand the software or computer hardware. This in turn causes the company to focus on perceived problems instead of focusing on the actual problems of the software.[15]

Security

edit

In the 2010s, there is a lot of emphasis on user's security and privacy. With the increasing role that computers are playing in people's lives, people are carrying laptops and smartphones with them and using them for scheduling appointments, making online purchases using credit cards and searching for information. These activities can potentially be observed by companies, governments or individuals, which can lead to breaches of privacy, identity theft, by, blackmailing and other serious concerns. As well, many businesses, ranging from small business startups to huge corporations are using computers and software to design, manufacture, market and sell their products and services, and businesses also use computers and software in their back office processes (e.g., human resources, payroll, etc.). As such, it is important for people and organizations to know that the information and data they are storing, using, or sending over computer networks, or storing on computer systems, is secure.

However, developers of software and hardware are faced with many challenges in developing a system that can be both user friendly, accessible 24/7 on almost any device, and be truly secure. Security leaks happen, even to individuals and organizations that have security measures in place to protect their data and information (e.g., firewalls, encryption, strong passwords). The complexities of creating such a secure system come from the fact that the behaviour of humans is not always rational or predictable. Even in a very-well secured computer system, a malicious individual can telephone a worker and pretend to be a private investigator working for the software company, and ask for the individual's password, a dishonest process called phishing. As well, even with a well-secured system, if a worker decides to put the company's electronic files on a USB drive to take them home to work on them over the weekend (against many companies' policies), and then loses this USB drive, the company's data may be compromised. Therefore, developers need to make systems that are intuitive to the user in order to have information security and system security.[16]

Another key step to end user security is informing the people and employees about the security threats and what they can do to avoid them or protect themselves and the organization. Clearly underlining the capabilities and risks makes users more aware and informed whilst they are using the products.

Some situations that could put the user at risk are:

  • Auto-logon as administrator options
  • Auto-fill options, in which a computer or program remembers a user's personal information and HTTP cookies
  • Opening junk emails of suspicious emails and/or opening/running attachments or computer files contained in these
  • Email being monitored by third parties, especially when using Wi-Fi connections
  • Unsecure Wi-Fi or use of a public Wi-Fi network at a coffee shop or hotel
  • Weak passwords (using a person's own name, own birthdate, name or birthdate of children, or easy-to-guess passwords such as "1234")
  • Malicious programs such as viruses

Even if the security measures in place are strong, the choices the user makes and his/her behavior have a major impact on how secure their information really is. Therefore, an informed user is one who can protect and achieve the best security out of the system they use.[17] Because of the importance of end-user security and the impact it can have on organizations the UK government set out a guidance for the public sector, to help civil servants learn how to be more security aware when using government networks and computers. While this is targeted to a certain sector, this type of educational effort can be informative to any type of user. This helps developers meet security norms and end users be aware of the risks involved.[18] Reimers and Andersson have conducted a number of studies on end-user security habits and found that the same type of repeated education/training in security best practices can have a marked effect on the perception of compliance with good end-user network security habits, especially concerning malware and ransomware.[19]

In end-user license agreements, the end user is distinguished from the value-added reseller who installs the software or the organization that purchases and manages the software.[citation needed]

Certain American defense-related products and information require export approval from the United States Government under the International Traffic in Arms Regulations and Export Administration Regulations.[20] In order to obtain a license to export, the exporter must specify both the end user and the end use for undertaking an end-user certificate.[21]

In the UK, there exist documents that accompany licenses for products named in the end user undertaking statements.[clarification needed][22]

See also

edit

Notes

edit
  1. ^ When used as an adjective, end-user is generally hyphenated; when used as a noun, end user is left unhyphenated. Thus, "good end-user experience" versus "good experience to the end user".

References

edit
  1. ^ Dictionary of Computer and Internet Terms. Barron's Business Guides (8 ed.). Hauppauge, New York: Barron's Educational Series. 2003. p. 171. ISBN 978-0764121661. OCLC 50480181. the person ultimately intended to use a product
  2. ^ a b Howe, Denis (2025-08-06). "FOLDOC entry for "end-user"". foldoc.org. London. Retrieved 2025-08-06. The person who uses a computer application, as opposed to those who developed or it.
  3. ^ Legal Information Institute. "U.S. Code § 8541 - Definitions". www.law.cornell.edu. Ithaca, New York: Cornell Law School. Retrieved 2025-08-06. The term "end-user", with respect to a good, service, or technology, means the person that receives and ultimately uses the good, service, or technology.
  4. ^ FIPS Task Group on Database Management System Standards (1979). Recommendations for Database Management System Standards. Washington, D.C.: National Bureau of Standards. p. 58. OCLC 6862471. The end users are persons who perform the application functions. End users include "parametric" and generalized function users, but they are not system support personnel.
  5. ^ Shepherd, John C. (1990). Database Management: Theory and Application. Homewood, Illinois: Irwin Professional Publishing. p. 20. ISBN 978-0256078299. OCLC 20491157.
  6. ^ O'Neil, Patrick (1994). Database Principles Programming Performance. San Francisco: Morgan Kaufmann Publishers. pp. 4–5. ISBN 978-1558602199. OCLC 30777731. One of the most important features of a DBMS is that relatively inexperienced users, called end users, are empowered to retrieve information from the database. The user poses a query at the terminal keyboard, requesting the database system to display the answer on a terminal screen or on a printed sheet.
  7. ^ Chrissis, Mary Beth; Konrad, Mike; Shrum, Sandy (2011). CMMI for Development: Guidelines for Process Integration and Product Improvement. Upper Saddle River, New Jersey: Addison-Wesley. p. 581. ISBN 9780321711502. OCLC 884168009. A party that ultimately uses a delivered product or that receives the benefit of a delivered service. (See also "customer".) End users may or may not also be customers (who can establish and accept agreements or authorize payments).
  8. ^ Rainer Jr., R. Kelly; Prince, Brad; Cegielski, Casey (2014). Introduction to Information Systems. Supporting and Transforming Businesses (Fifth ed.). Wiley. pp. 12–13. ISBN 978-1-118-67436-9.
  9. ^ LUPTON, CAROL (2025-08-06). "User Empowerment or Family Self-Reliance? The Family Group Conference Model". The British Journal of Social Work. 28 (1): 107–128. doi:10.1093/oxfordjournals.bjsw.a011302. JSTOR 23714792.
  10. ^ "Can IT Cope With Empowered End-Users?". Forbes. Retrieved 2025-08-06.
  11. ^ Kappelman, Leon A; Guynes, Carl Stephen (1995). "End-user training & empowerment". Journal of Systems Management. 46 (5). Cleveland: 36. ProQuest 199819277.
  12. ^ Seidler-de Alwis, Ragna; Fühles-Ubach, Simone (2010). "Success factors for the future of information centres, commercial and public libraries: a study from Germany". Interlending & Document Supply. 38 (3): 183–188. doi:10.1108/02641611011072387.
  13. ^ a b "10 Examples of Great End User Documentation". blog.screensteps.com. Retrieved 2025-08-06.[self-published source?]
  14. ^ Strother, Judith B.; Ulijn, Jan M.; Fazal, Zohra (2025-08-06). Strother, Judith B.; Ulijn, Jan M.; Fazal, Zohra (eds.). Information Overload: An International Challenge to Professional Engineers and Technical Communicators. John Wiley & Sons, Inc. pp. 1–12. doi:10.1002/9781118360491.ch1. ISBN 9781118360491.
  15. ^ Wilkinson, Paul Johnston (2003). End-user documentation (Doctoral). Durham theses, Durham University. pp. 2–6.
  16. ^ Stanton, Jeffrey M.; Stam, Kathryn R.; Mastrangelo, Paul; Jolton, Jeffrey (2025-08-06). "Analysis of end user security behaviors". Computers & Security. 24 (2): 124–133. doi:10.1016/j.cose.2004.07.001.
  17. ^ Tribelhorn, Ben (2007). "End user security" (PDF). Computer Security. Harvey Mudd College. Retrieved 2025-08-06.
  18. ^ "End User Devices Security Guidance: Introduction – GOV.UK". www.gov.uk. Retrieved 2025-08-06.
  19. ^ K. Reimers, D. Andersson (2017) POST-SECONDARY EDUCATION NETWORK SECURITY: THE END USER CHALLENGE AND EVOLVING THREATS, ICERI2017 Proceedings, pp. 1787–1796.
  20. ^ "Defense trade controls overview" (PDF). www.pmddtc.state.gov. Washington, D.C.: United States Department of State. Retrieved 2025-08-06.
  21. ^ "Nontransfer and use certificate" (PDF). www.pmddtc.state.gov. Washington, D.C.: United States Department of State. Archived from the original (PDF) on 2025-08-06. Retrieved 2025-08-06.
  22. ^ "Frequently asked questions on End-User Undertakings | Find Laws, Legal Information, News & Solicitors". Findlaw UK. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
edit
马齿苋对什么病最有效 脂肪瘤吃什么药 什么是潮汐车道 银环蛇咬伤后什么症状 恐龙是什么时代
屁多是什么原因 眼珠子发黄是什么原因 佛跳墙是什么菜系 脚腿肿是什么原因引起的 吃什么水果败火
1658是什么意思 宫腔内囊性回声是什么意思 2003年出生属什么 梦见老公出轨预示什么 天秤座男生和什么星座最配
挑担是什么意思 不打自招是什么生肖 桃子又什么又什么 隆胸有什么危害和后遗症吗 脸两侧长痘痘是什么原因
叶酸买什么牌子的好hcv9jop1ns7r.cn 贤惠是什么意思inbungee.com 95年属什么的生肖yanzhenzixun.com 胸痛什么原因hcv9jop1ns5r.cn 俄罗斯为什么要打乌克兰hcv9jop2ns6r.cn
椎间盘变性是什么意思luyiluode.com 梦见两个小男孩是什么意思hcv8jop7ns9r.cn 晚上两点是什么时辰shenchushe.com 淋巴细胞百分比偏高是什么原因hcv9jop4ns8r.cn 肥大肾柱是什么意思hcv9jop4ns9r.cn
什么鸡没有毛hcv8jop6ns4r.cn 满月送什么礼物好hcv9jop5ns0r.cn 专案组是什么意思hcv9jop7ns1r.cn 3月8日是什么星座jasonfriends.com 男人吃荔枝有什么好处hcv8jop5ns7r.cn
舌头两边有齿痕是什么原因hcv8jop7ns8r.cn 拔智齿后需要注意什么hcv9jop0ns4r.cn 桥本是什么意思hcv7jop5ns0r.cn 讹人是什么意思xinjiangjialails.com 产瘤是什么意思hcv8jop0ns3r.cn
百度