Shadow IT coexists with mandated information systems. Developed and applied by nonIT domain experts, it is as a rule, but not exclusively, used for resolving nonroutine issues, for …
D Furstenau, H Rothe, M Sandner - Communications of the …, 2017 - aisel.aisnet.org
Drawing on notions of power and the social construction of risk, we build new theory to understand the persistence of shadow systems in organizations. From a single case study in …
A Kopper, D Fürstenau, S Zimmermann… - International Journal of …, 2018 - igi-global.com
Research on Shadow IT is facing a conceptual dilemma in cases where previously “covert” systems developed by business entities are integrated in the organizational IT management …
T Nguyen - Online Information Review, 2023 - emerald.com
Purpose Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational …
Purpose Organizations worldwide are adopting software as a service (SaaS) applications, where they pay a subscription fee to gain access rather than buying the software. The extant …
Purpose On account of its easy and intuitive usage as well as obvious advantages (eg access to work data from anywhere, at any time and through any means) the evolutionary …
Abstract enterprise system (ES) software is often supplemented independently by end users who develop personal solutions that establish connections between the required business …
D Fürstenau, H Rothe, M Sandner - Business & information systems …, 2021 - Springer
With the advent of end-user and cloud computing, business users can implement information systems for work practices on their own–either from scratch or as extensions to …
Employees increasingly use unauthorized technologies at the workplace, which is referred to as shadow IT. Previous research identifies that shadow IT is often collaborative systems …