References

  • Alavi, M.; Nelson, R.R.; and Weiss, I.R. Strategies for end-user computing: an integrative perspective. Journal of Management Information Systems, 4, 3 (Winter 1987-88), 28–49.
  • Anderson, K., and Bernard, A. Spreading mistakes. Journal of Accounting and EDP, 4, 2 (Fall 1988), 42–45.
  • Ballou, D.P.; Pazer, H.L.; Belardo, S.; and Klein, B. Implications of data quality for spreadsheet analysis. Data Base, 18, 3 (Spring, 1987), 13–19.
  • Basili, V.R., and Selby, R.W., Jr. Four applications of a software data collection and analysis methodology. In J.K. Skwirzynski (ed.), Software System Design Methods. Berlin: Springer-Verlag, 1986.
  • Bishop, Y.M.M.; Fienberg, S.E.; and Holland, P.W. Discrete Multivariate Analysis: Theory and Practice. Cambridge, MA: MIT Press, 1975.
  • Brancheau, J.C.; Vogel, D.R.; and Wetherbe, J.C. An investigation of the information center from the user’s perspective. Data Base, 17, 1 (Fall 1985), 4–18.
  • Brown, P.S., and Gould, J.D. An experimental study of people creating spreadsheets. ACM Transactions on Office Information Systems, 5, 3 (May 1987), 258–272.
  • Cale, E.G., Jr. Quality issues for end-user developed software. Journal of Systems Management, 45, 1 (January 1994), 36–39.
  • Card, S.; Moran, T.; and Newell, A. The Psychology of Human-Computer Interaction. Hillsdale, NJ: Laurence Erlbaum, 1983.
  • Cragg, P.B., and King, M. Spreadsheet modeling abuse: an opportunity for OR? Journal of the Operational Research Society, 44, 8 (August 1993), 743–752.
  • Creeth, R. Microcomputer spreadsheets: their use and abuse. Journal of Accountancy, 159, 6 (June 1985), 92.
  • Davies, N., and Ikin, C. Auditing spreadsheets. Australian Accountant (December 1987), 54–56.
  • Dillon, A. Reading from paper versus screens: a critical review of the empirical literature. Ergonomics, 35, 10 (October 1992), 1297–1326.
  • Ditlea, S. Spreadsheets can be hazardous to your health. Personal Computing, 11, 1 (January 1987), 60–69.
  • Floyd, B.D.; Walls, J.; and Marr, K. Managing spreadsheet model development. Journal of Systems Management, 46, 1 (May-June 1995), 38–43, 68.
  • Galletta, D.F.; Abraham, D.; El Louadi, M.; Lekse, W.; Pollalis, Y.: and Sampler, J. An empirical study of spreadsheet error-finding performance. Accounting, Management, and Information Technologies, 3. 2 (February 1993), 79–95.
  • Galletta, D.F.; Hartzel, K.S.; Johnson, S.; Joseph, J.L.: and Rustagi, S. An experimental study of spreadsheet presentation and error detection. Proceedings of the 29th Hawaii International Conference on System Sciences. Maui: IEEE Computer Society Press, 1996, pp. 336–345.
  • Galletta, D.F., and Heckman, R. A role theory perspective on end-user development. Information Systems Research, 1, 2 (June 1990), 168–187.
  • Galletta, D.F., and Hufnagel, E. A model of end-user computing policy: determinants of organizational compliance. Information and Management, 22, 1 (January 1992), 1–18.
  • Gould, J.D.; Alfaro, L.; Barnes, V.; Finn, R.; Grischkowsky, N.; and Minuto, A. Reading is slower from CRT displays than from paper: attempts to isolate a single-variable explanation. Human Factors, 29, 3 (March 1987), 269–299.
  • Gould, J.D.; Alfaro, L.; Finn, R.; Haupt, B.; and Minuto, A. Reading from CRT displays can be as fast as reading from paper. Human Factors, 29, 5 (May 1987), 497–517.
  • Hall, M.J.J. A risk and control oriented study of the practices of spreadsheet application developers. Proceedings of the Twenty-Ninth Hawaii International Conference on System Sciences. Maui: IEEE Computer Society Press, 1996, pp. 364–373.
  • Hayen, R.L., and Peters, R.M. How to ensure spreadsheet integrity. Management Accounting, 70, 10 (October 1989), 30–33.
  • Hendry, D.G., and Green, T.R.G. Creating, comprehending, and explaining spreadsheets: a cognitive interpretation of what discretionary users think of the spreadsheet model. International Journal of Human—Computer Studies, 40, 6 (June 1994), 1033–1065.
  • Janvrin, D., and Morrison, J. Factors influencing risks and outcomes in end-user development. Proceedings of the Twenty-Ninth Hawaii International Conference on System Sciences. Maui: IEEE Computer Society Press, 1996, pp. 346–355.
  • Kee, R.C., and Mason, J.O., Jr. Preventing errors in spreadsheets. Internal Auditor, 45, 1 (February 1988), 42–47.
  • King, M.; Lee, R.A.; Piper, J.A.; and Whittaker, J. Information Technology and the Management Accountant. London: CIMA, 1991.
  • Lederer, A.L., and Sethi, V. Planning for end-user computing: top-down or bottom-up? Information Management Review, 2, 2 (Fall 1986), 25–34.
  • McGoldrick, J.A.; Martin, J.; Bergering, A.J.; and Symons, S. Locating discrete information in text: effects of computer presentation and menu formatting. Journal of Reading Behavior, 24, 1 (January 1992), 1–20.
  • Munro, M.C.; Huff, S.L.; and Moore, G. Expansion and control of end-user computing. Journal of Management Information Systems, 4, 3 (Winter 1987-88), 5–27.
  • Myers, G.J. A controlled experiment in program testing and code walkthroughs/inspections. Communications of the ACM, 21, 9 (September 1978), 760–768.
  • Oliver, R. Proof-reading on paper and screens: the influence of practice and experience on performance. Journal of Computer-Based Instruction, 20, 4 (April 1994), 118–124.
  • Olson, J.R., and Nilsen, E. Analysis of the cognition involved in spreadsheet software interaction. Human—Computer Interaction, 3, (1987-88), 309–349.
  • Panko, R.R. Hitting the wall: development and debugging errors in a “simple” spreadsheet problem. Proceedings of the 29th Hawaii International Conference on System Sciences. Maui: IEEE Computer Society Press, 1996, pp. 356–363. [URL: http://www.cba.hawaii.edu/PANKO/risks/h6wall.htm.]
  • Panko, R.R. Spreadsheets on trial: a survey of research on spreadsheet risks. Proceedings of the 29th Hawaii International Conference on Systems Sciences. Maui: IEEE Computer Society Press, pp. 326–335. [URL: http://www.cba.hawaii.edu/PANKO/research/risks/h6trial.htm.]
  • Panko, R.R., and Halverson, R.H., Jr. Patterns of errors in spreadsheet development I: quantitative errors. Working Paper, Department of Decision Sciences, College of Business Administration, University of Hawaii, March 1995. [URL: ftp://splicer2.cba.hawaii.edu/panko/sserrors/sswpmar.doc]
  • Panko, R.R., and Halverson, R.H. Are two heads better than one (at reducing spreadsheet errors)? Proceedings of the 2nd AIS Americas Conference on Information Systems. Phoenix: AIS, 1996, pp. 69–70.
  • Pearson, R. Lies, damned lies, and spreadsheets. Byte, 13, 13 (December 1988), 299–304.
  • Rockart, J.F., and Flannery, L.S. The management of end-user computing. Communications of the ACM, 26, 10 (October 1983), 776–784.
  • Schultheis, R., and Sumner, M. The relationship of application risks to application controls: a study of microcomputer-based spreadsheet applications. Journal of End User Computing, 6, 2 (Spring 1994), 11–18.
  • Speier, C., and Brown, C.V. Perceived risks and management actions: differences in end-user application development across functional groups. Proceedings of the Twenty-Ninth Hawaii International Conference on System Sciences. Maui: IEEE Computer Society Press, 1996, pp. 374–384.
  • Stang, D. Spreadsheet disasters I have known. Information Center, 3, 11 (November 1987), 26–30.
  • Stone, D.N., and Black, R.L. Using microcomputers: building structured spreadsheets. Journal of Accountancy, 168, 4 (October 1989), 130–142.
  • Xenakis, J.W. 1–2–3: a dangerous language. Computerworld, 21, 10 (March 9, 1987), 31, 34.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.