Weitere Kapitel dieses Buchs durch Wischen aufrufen
The use of Information Technology (IT) without formal approval and support of the IT department, called shadow IT, has challenged organizations to rethink ways of managing IT resources in order to cope with the use of unauthorized technologies in the workplace. We review the literature on shadow IT to shed light on this phenomenon, discussing the conceptual definition and types, the related concepts, and its consequences. This study, then, is an effort to better understand the phenomenon based on the existing literature. We provide contributions by enhancing the emerging body of knowledge on shadow IT, as well as by suggesting research gaps to be addressed in future research in order to advance on the topic.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Alter, S. (2014). Theory of workarounds. Communications of the association for information systems. 34(55), 1041–1066.
Alojairi, A. (2017). The dynamics of IT workaround practices a theoretical concept and an empirical assessment. International Journal of Advanced Computer Science and Applications, 8(7), 527–534. CrossRef
Azad, B., & King, N. (2008). Enacting computer workaround practices within a medication dispensing system. European Journal of Information Systems, 17(3), 264–278. CrossRef
Azad, B., & King, N. (2012). Institutionalized computer workaround practices in a Mediterranean country: an examination of two organizations. European Journal of Information Systems, 21(4), 358–372. CrossRef
Behrens, S., & Sedera, W. (2004). Why do shadow systems exist after an ERP implementation? Lessons from a case study. In Pacific Asia conference on information systems (PACIS).
Dang-Pham, D., & Pittayachawan, S. (2015). Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A protection motivation theory approach. Computers & Security, 48, 281–297. CrossRef
Ferneley, E. H., & Sobreperez, P. (2006). Resist, comply or workaround? An examination of different facets of user engagement with information systems. European Journal of Information Systems, 15(4), 345–356. CrossRef
French, A. M., Guo, C., & Shim, J. P. (2014). Current status, issues, and future of bring your own device (BYOD). Communications of the Association for Information Systems, 35(10), 191–197.
Fürstenau, D., & Rothe, H. (2014). Shadow IT systems: discerning the good and the evil. In Twenty-second European conference on information systems, Tel Aviv.
Fürstenau, D., Rothe, H., & Sandner, M. (2017). Shadow systems, risk, and shifting power relations in organizations. Communications of the Association for Information Systems, 41, 43–61. CrossRef
Globalscape. (2016). Be afraid of your shadow: What is “shadow IT” and how to reduce it. Disponível em: https://www.globalscape.com/resources/whitepapers/shadow-it-guide. Acesso em: 05 março 2018.
Gozman, D., & Willcocks, L. (2015). Crocodiles in the regulatory swamp: Navigating the dangers of outsourcing, SaaS and Shadow IT. In Proceedings of the thirty-sixth international conference on information systems, Fort Worth.
Györy, A. A. B., Cleven, A., Uebernickel, F., & Brenner, W. (2012). Exploring the shadows: IT governance approaches to user-driven innovation. In Proceedings of european conference on information systems. Paper 222.
Haag, S., & Eckhardt, A. (2014). Normalizing the shadows–The role of symbolic models for individuals’ shadow IT usage. In Proceedings of the thirty-fifth international conference on information systems, Auckland.
Haag, S. (2015). Appearance of dark clouds?-an empirical analysis of users’ shadow sourcing of cloud services. In Wirtschaftsinformatik (pp. 1438–1452).
Haag, S., & Eckhardt, A. (2015). Justifying shadow IT usage. In Proceedings of the 19th Pacific Asia conference on information systems, Singapore.
Haag, S., Eckhardt, A., & Bozoyan, C. (2015). Are shadow system users the better IS users?–Insights of a lab experiment. In Proceedings of the thirty-sixth international conference on information systems, Fort Worth.
Haag, S., & Eckhardt, A. (2017). Shadow IT. Business & Information Systems Engineering (pp. 1–5).
Harris, J., Ives, B., & Junglas, I. (2012). IT consumerization: When gadgets turn into enterprise IT tools. MIS Quarterly Executive, 11(3).
Huber, M., Zimmermann, S., Rentrop, C., & Felden, C. (2017). Integration of shadow IT systems with enterprise systems—a literature review. In Proceedings of the twenty-first Pacific Asia conference on information systems, Langkawi.
Jones, D., Behrens, S., Jamieson, K., & Tansley, E. (2004). The rise and fall of a shadow system: Lessons for enterprise system implementation. In ACIS 2004 Proceedings (p. 96).
Khalil, S., Winkler, T. J., & Xiao, X. (2017). Two Tales of Technology: Business and IT Managers’ Technological Frames Related to Cloud Computing.
Laumer, S., Maier, C., & Weitzel, T. (2017). Information quality, user satisfaction, and the manifestation of workarounds: a qualitative and quantitative study of enterprise content management system users. European Journal of Information Systems, 26(4), 333–360. CrossRef
Lis, T., & Paula, B. (2015). The use of cloud computing by students from technical university-The current state and perspectives. Procedia Computer Science, 65, 1075–1084. CrossRef
Lund-Jensen, R., Azaria, C., Permien, F. H., Sawari, J., & Bækgaard, L. (2016). Feral information systems, shadow systems, and workarounds–A drift in IS terminology. Procedia Computer Science, 100, 1056–1063. CrossRef
Mallmann, G. L., Maçada, A. C. G., & Oliveira, M. (2018a). The influence of shadow IT usage on knowledge sharing: An exploratory study with IT users. Business Information Review, 35(1), 17–28. CrossRef
Mallmann, G. L., Maçada, A. C. G., Eckhardt, A. (2018b). We are Social: a social influence perspective to investigate shadow IT usage. In Proceedings of European conference on information systems, Portsmouth, UK.
Malaurent, J., & Avison, D. (2015). From an apparent failure to a success story: ERP in China—Post implementation. International Journal of Information Management, 35(5), 643–646. CrossRef
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. Disponível em http://faculty.winthrop.edu/domanm/csci411/Handouts/NIST.pdf.
Miller, K. W., Voas, J., & Hurlburt, G. F. (2012). BYOD: Security and privacy considerations. It Professional, 14(5), 53–55. CrossRef
Müller, S. D., Holm, S. R., & Søndergaard, J. (2015). Benefits of cloud computing: Literature review in a maturity model perspective. CAIS, 37, 42. CrossRef
Park, S. C., & Ryoo, S. Y. (2013). An empirical investigation of end-users’ switching toward cloud computing: A two factor theory perspective. Computers in Human Behavior, 29(1), 160–170. CrossRef
Raden, N. (2005). Shedding light on shadow IT: Is excel running your business. DSSResources. com, 26.
Rentrop, C., & Zimmermann, S. (2012). Shadow IT-management and control of unofficial IT. In Proceedings of the 6th international conference on digital society (pp. 98–102).
Silic, M., & Back, A. (2014). Shadow IT–A view from behind the curtain. Computers & Security, 45, 274–283. CrossRef
Silic, M., Barlow, J. B., & Back, A. (2017). A new perspective on neutralization and deterrence: Predicting shadow IT usage. Information & management, (in press), 1–15. http://dx.doi.org/10.1016/j.im.2017.02.007.
Singh, H. (2015). Emergence and consequences of drift in organizational information systems. In Proceedings of the Asia conference on information systems (PACIS). Paper 202.
Shin, D. (2015). Beyond user experience of cloud service: Implication for value sensitive approach. Telematics and Informatics, 32(1), 33–44. CrossRef
Shumarova, E., & Swatman, P. A. (2008). Informal ecollaboration channels: Shedding light on “shadow cit”. In Proceedings of LED 2008, Bled, Slovenia.
Steinhüser, M., Waizenegger, L., Vodanovich, V. & Richter, A. (2017). Knowledge management without management—Shadow IT in knowledge-intense manufacturing practices. In Proceedings of the 25th European conference on information systems, Guimarães, Portugal.
Turner, A. (2015). Generation Z: Technology and social interest. The Journal of Individual Psychology, 71(2), 103–113. CrossRef
Turkle, S. (2011). Alone together: Why we expect more from technology and less from each other. New York: Basic Books.
Vogus, T. J., & Hilligoss, B. (2016). The underappreciated role of habit in highly reliable healthcare. BMJ Quality & Safety 25(3), 141–146. CrossRef
Walterbusch, M., Fietz, A., & Teuteberg, F. (2017). Missing cloud security awareness: investigating risk exposure in shadow IT. Journal of Enterprise Information Management, 30(4), 644–665. CrossRef
Walters, R. (2013). Bringing IT out of the shadows. Network Security, 2013(4), 5–11. CrossRef
Webster, J. & Watson, R. T. (2002). Analyzing the past to prepare for the future: Writing a literature review. MIS Quarterly, 26, xiii–xxiii.
Weiss, F., & Leimeister, J. M. (2012). IT innovations from the consumer market as a challenge for corporate IT. Business & Information Systems Engineering, 6, 363–366. CrossRef
Zimmermann, S., Rentrop, C., & Felden, C. (2014). Managing shadow IT instances–a method to control autonomous IT solutions in the business departments. In Proceedings of the Twentieth Americas Conference on Information Systems, Savannah.
Zimmermann, S., & Rentrop, C. (2014). On the emergence of shadow IT-a transaction cost-based approach. In Proceedings of the Twenty Second European Conference on Information Systems, Tel Aviv.
Zimmermann, S., Rentrop, C., & Felden, C. (2017). A multiple case study on the nature and management of shadow information technology. Journal of Information Systems, 31(1), 79–101. CrossRef
- Shedding Light on Shadow IT: Definition, Related Concepts, and Consequences
Gabriela Labres Mallmann
Aline de Vargas Pinto
Antônio Carlos Gastaud Maçada
Neuer Inhalt/© ITandMEDIA