Causing factors, outcomes, and governance of shadow IT and business-managed IT: a systematic literature review

S Klotz, A Kopper, M Westner… - International Journal of …, 2019 - aisel.aisnet.org
Shadow IT and Business-managed IT describe the autonomous deployment/procurement or
management of Information Technology (IT) instances, ie, software, hardware, or IT services …

Shadow IT–systematic literature review

L Raković, M Sakal, P Matković, M Marić - Information Technology and …, 2020 - itc.ktu.lt
Shadow IT coexists with mandated information systems. Developed and applied by nonIT
domain experts, it is as a rule, but not exclusively, used for resolving nonroutine issues, for …

Shadow systems, risk, and shifting power relations in organizations

D Furstenau, H Rothe, M Sandner - Communications of the …, 2017 - aisel.aisnet.org
Drawing on notions of power and the social construction of risk, we build new theory to
understand the persistence of shadow systems in organizations. From a single case study in …

Shadow IT and business-managed IT: a conceptual framework and empirical illustration

A Kopper, D Fürstenau, S Zimmermann… - International Journal of …, 2018 - igi-global.com
Research on Shadow IT is facing a conceptual dilemma in cases where previously “covert”
systems developed by business entities are integrated in the organizational IT management …

Understanding Shadow IT usage intention: a view of the dual-factor model

T Nguyen - Online Information Review, 2023 - emerald.com
Purpose Despite the growing concern about security breaches and risks emerging from
Shadow IT usage, a type of information security violation committed by organizational …

Impact of software as a service (SaaS) on software acquisition process

S Raghavan R, J KR, RV Nargundkar - Journal of Business & …, 2020 - emerald.com
Purpose Organizations worldwide are adopting software as a service (SaaS) applications,
where they pay a subscription fee to gain access rather than buying the software. The extant …

Missing cloud security awareness: investigating risk exposure in shadow IT

M Walterbusch, A Fietz, F Teuteberg - Journal of Enterprise …, 2017 - emerald.com
Purpose On account of its easy and intuitive usage as well as obvious advantages (eg
access to work data from anywhere, at any time and through any means) the evolutionary …

Issues that support the creation of ICT workarounds: towards a theoretical understanding of feral information systems

A Spierings, D Kerr, L Houghton - Information Systems Journal, 2017 - Wiley Online Library
Abstract enterprise system (ES) software is often supplemented independently by end users
who develop personal solutions that establish connections between the required business …

Leaving the shadow: A configurational approach to explain post-identification outcomes of shadow IT systems

D Fürstenau, H Rothe, M Sandner - Business & information systems …, 2021 - Springer
With the advent of end-user and cloud computing, business users can implement
information systems for work practices on their own–either from scratch or as extensions to …

The influence of shadow IT usage on knowledge sharing: An exploratory study with IT users

GL Mallmann, ACG Maçada… - Business Information …, 2018 - journals.sagepub.com
Employees increasingly use unauthorized technologies at the workplace, which is referred
to as shadow IT. Previous research identifies that shadow IT is often collaborative systems …