Although spreadsheet programs are used for small "scratchpad" applications, they are also used to develop many large applications, and error rates are in line with those in programming and other human cognitive domains.
This updated examination of computer and corporate security in the business setting fills the critical need for security education and provides coverage of all major security issues.
To date, only one technique, cell-by-cell code inspection, has been demonstrated to be effective, and the degree to which other techniques can reduce spreadsheet errors needs to be determined.
The paper notes that the dotcom bubble was an investment disaster but that U.S. IT employment fell surprisingly little and soon surpassed the bubble's peak IT employment, and students may have to stop considering the undergraduate degree to be a terminal degree in IS and computer science.
It is time to stop ignoring end user computing in general and spreadsheets in particular and only talk about development, regardless of whether the developer user a 3GL or 4GL.
Findings were that subjects were overconfident when inspecting alone, that certain types of errors are especially difficult to detect, and that the benefits of the group phase is greatest for these difficult-to-detect type of errors.
Undergraduate MIS business students developed and debugged a spreadsheet model from a word problem that consisted of a bid to build a wall to address the concern that past spreadsheet experiments may have used problems that were too difficult or that required domain knowledge that subjects did not have.
Use of time studies provide detailed information on organizational communication patterns, offering a rich base of data for identifying promising new targets for “groupwork”; support researchers.…