Causing factors, outcomes, and governance of shadow IT and business-managed IT: a systematic literature review

S Klotz, A Kopper, M Westner… - International Journal of …, 2019 - aisel.aisnet.org
Shadow IT and Business-managed IT describe the autonomous deployment/procurement or
management of Information Technology (IT) instances, ie, software, hardware, or IT services …

Shadow IT–A view from behind the curtain

M Silic, A Back - Computers & Security, 2014 - Elsevier
Shadow IT is a currently misunderstood and relatively unexplored phenomena. It represents
all hardware, software, or any other solutions used by employees inside of the …

A new perspective on neutralization and deterrence: Predicting shadow IT usage

M Silic, JB Barlow, A Back - Information & management, 2017 - Elsevier
This study examines the role of neutralization and deterrence in discouraging employees
from using Shadow IT: tools, services and systems used in an organization but not …

Exploring the shadows: IT governance approaches to user-driven innovation

A Györy, A Cleven, F Uebernickel, W Brenner - 2012 - aisel.aisnet.org
Abstract Information Systems (IS) researchers traditionally have the assumption that
Information Technology (IT) innovations are conceived within the IT department …

An updated ERP systems annotated bibliography: 2001-2005

J Esteves, V Bohórquez - … of the Association for Information Systems, 2007 - aisel.aisnet.org
The goal of this study is to provide an updated annotated bibliography of ERP publications
published in the main IS conferences and journals during the period 2001-2005 …

Shadow IT–systematic literature review

L Raković, M Sakal, P Matković, M Marić - Information Technology and …, 2020 - itc.ktu.lt
Shadow IT coexists with mandated information systems. Developed and applied by nonIT
domain experts, it is as a rule, but not exclusively, used for resolving nonroutine issues, for …

Shadow systems: The good, the bad and the ugly

S Behrens - Communications of the ACM, 2009 - dl.acm.org
We know them as shadow systems, workaround systems, and even feral systems. Operating
at the fringes of an organization, they covertly replicate the data and functionality of formally …

Critical impact of organizational and individual inertia in explaining non-compliant security behavior in the Shadow IT context

M Sillic - Computers & Security, 2019 - Elsevier
Shadow IT refers to the use of information technology (IT) solutions and systems without
prior explicit organizational approval. In this research, we have investigated an important …

[PDF][PDF] On the Emergence of Shadow IT-a Transaction Cost-Based Approach.

S Zimmermann, C Rentrop - ECIS, 2014 - academia.edu
Abstract Information Technology (IT) used for business processes is not only provided by the
organization's IT department. Business departments and users autonomously implement IT …

[PDF][PDF] Shadow it

C Rentrop, S Zimmermann - … and Control of Unofficial IT. ICDS, 2012 - personales.upv.es
Shadow IT describes the supplement of “official” IT by several, autonomous developed IT
systems, processes and organizational units, which are located in the business …