[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Shadow IT and Business-Managed IT: A Conceptual Framework and Empirical Illustration

Published: 01 July 2018 Publication History

Abstract

Research on Shadow IT is facing a conceptual dilemma in cases where previously "covert" systems developed by business entities are integrated in the organizational IT management. These systems become visible, are thus not "in the shadows" anymore, and subsequently do not fit to existing definitions of Shadow IT. Practice shows that some information systems share characteristics of Shadow IT but are created openly in alignment with the IT organization. This paper proposes the term "Business-managed IT" to describe "overt" information systems developed or managed by business entities and distinguishes it from Shadow IT by illustrating case vignettes. Accordingly, our contribution is to suggest a concept and its delineation against other concepts. In this way, IS researchers interested in IT originated from or maintained by business entities can construct theories with a wider scope of application that are at the same time more specific to practical problems. In addition, the terminology allows to value potentially innovative developments by business entities more adequately.

References

[1]
Alter, S. 2014. Theory of Workarounds. Communications of the Association for Information Systems, 341, 1041-1066.
[2]
Andriole, S. J. 2015. Who owns IT? Communications of the Association for Information Systems, 583, 50-57.
[3]
Beck, K., Beedle, M., van Bennekum, A., Cockburn, A., Cunningham, W., Fowler, M., . . . Thomas, D. 2001. Manifesto for Agile Software Development. Retrieved from http://agilemanifesto.org/
[4]
Behrens, S. 2009. Shadow Systems: The Good, The Bad and The Ugly. Communications of the Association for Information Systems, 522, 124-129.
[5]
BeimbornD.PalitzaM. 2013. Enterprise App Stores for Mobile Applications: Development of a Benefits Framework. In Proceedings of the 19th Americas Conference on Information Systems pp. 1-11.
[6]
Blichfeldt, B. S., & Eskerod, P. 2008. Project Portfolio Management: There's more to it than what Management Enacts. International Journal of Project Management, 264, 357-365.
[7]
Boynton, A. C., Zmud, R. W., & Jacobs, G. C. 1994. The Influence of IT Management Practice on IT Use in Large Organizations. Management Information Systems Quarterly, 183, 299.
[8]
Brown, C. V., & Magill, S. L. 1994. Alignment of the IS Functions with the Enterprise: Toward a Model of Antecedents. Management Information Systems Quarterly, 184, 371-403.
[9]
Buchwald, A., Urbach, N., & Ahlemann, F. 2014a. Business value through controlled IT: Toward an integrated model of IT governance success and its impact. Journal of Information Technology, 292, 128-147.
[10]
BuchwaldA.UrbachN.AhlemannF. 2014b. Understanding the Organizational Antecedents of Bottom-up Un-enacted-Projects. In Proceedings of the 22nd European Conference on Information Systems pp. 1-16.
[11]
Bygstad, B. 2017. Generative innovation: A comparison of lightweight and heavyweight IT. Journal of Information Technology, 322, 180-193.
[12]
Capgemini. 2016. IT-Trends-Studie 2016. Retrieved from https://www.capgemini.com/de-de/resources/it-trends-studie-2016/
[13]
Chow, T., & Cao, D.-B. 2008. A survey study of critical success factors in agile software projects. Journal of Systems and Software, 816, 961-971.
[14]
Chua, C. E. H., & Storey, V. C. 2016. Bottom-up enterprise information systems. Communications of the Association for Information Systems, 601, 66-72.
[15]
Chua, C. E. H., Storey, V. C., & Chen, L. 2014. Central IT or Shadow IT? Factors Shaping Users' Decision to Go Rogue with IT. In Proceedings of the 35th International Conference on Information Systems pp. 1-14.
[16]
Daniel, E. M., Ward, J. M., & Franken, A. 2014. A Dynamic Capabilities Perspective of IS Project Portfolio Management. The Journal of Strategic Information Systems, 232, 95-111.
[17]
Davison, R. M., Ou, C. X. J., & Chang, Y. 2018. Subverting Organisational IS Policy with Feral Systems: A Case in China. Industrial Management & Data Systems, 1183, 570-588.
[18]
Dittes, S., Urbach, N., Ahlemann, F., Smolnik, S., & Müller, T. 2015. Why Don't You Stick to Them? Understanding Factors Influencing and Counter-Measures to Combat Deviant Behavior Towards Organizational IT Standards. In O. Thomas & F. Teuteberg Eds., Proceedings of the 12. Internationale Tagung Wirtschaftsinformatik: Smart Enterprise Engineering pp. 1-15.
[19]
Fernandez, E. B., Yoshioka, N., & Washizaki, H. 2015. Patterns for Security and Privacy in Cloud Ecosystems. In 2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements Engineering ESPRE pp. 13-18. Ottawa, Canada: IEEE.
[20]
Ferneley, E. H. 2007. Covert End User Development: A Study of Success. Journal of Organizational and End User Computing, 191, 62-71.
[21]
FürstenauD.RotheH. 2014. Shadow IT Systemes: Discerning the Good and the Evil. In Proceedings of the 22nd European Conference on Information Systems pp. 1-14.
[22]
Fürstenau, D., Rothe, H., & Sandner, M. 2017. Shadow Systems, Risk, and Shifting Power Relations in Organizations. Communications of the Association for Information Systems, 41, 43-61.
[23]
FürstenauD.SandnerM.AnapliotisD. 2016. Why do Shadow Sytems Fail? An Expert Study on Determinants of Discontinuation. In Proceedings of the 24th European Conference on Information Systems pp. 1-16.
[24]
Gartner. 2016. Coming to Terms with Business Unit IT to Prepare for Digital Business. Retrieved from https://www.gaartner.com/doc/3288932/coming-terms-business-unit-it
[25]
Gartner. 2017. Make the Best of Shadow IT. Retrieved from https://www.gartner.com/smarterwithgartner/make-the-best-of-shadow-it/
[26]
GozmanD.WillcocksL. P. 2015. Crocodiles in the Regulatory Swamp: Navigating the Dangers of Outsourcing, SaaS and Shadow IT. In Proceedings of the 36th International Conference on Information Systems pp. 1-20.
[27]
Gregory, R. W., Kaganer, E., Henfridsson, O., & Ruch, T. J. 2018. IT Consumerization and the Transformation of IT Governance. Management Information Systems Quarterly, 424, 1225-1253.
[28]
GyöryA.ClevenA.UebernickelF.BrennerW. 2012. Exploring the Shadows: IT Governance Approaches to User-driven innovation. In Proceedings of the 20th European Conference on Information Systems pp. 1-12.
[29]
Haag, S. 2015. Appearance of Dark Clouds? - An Empirical Analysis of Users' Shadow Sourcing of Cloud Services. In O. Thomas & F. Teuteberg Eds., Proceedings of the 12. Internationale Tagung Wirtschaftsinformatik: Smart Enterprise Engineering pp. 1438-1452.
[30]
HaagS.EckhardtA. 2015. Justifying Shadow IT Usage. In Proceedings of the 19th Pacific Asia Conference on Information Systems pp. 1-11.
[31]
Haag, S., & Eckhardt, A. 2017. Shadow IT. Business & Information Systems Engineering, 596, 469-473.
[32]
HaagS.EckhardtA.BozoyanC. 2015. Are Shadow System Users the Better IS Users? - Insights of a Lab Experiment. In Proceedings of the 36th International Conference on Information Systems pp. 1-20.
[33]
HetzeneckerJ.SprengerS.KammererS.AmbergM. 2012. The Unperceived Boon and Bane of Cloud Computing: End-User Computing vs. Integration. In Proceedings of the 18th Americas Conference on Information Systems pp. 1-9.
[34]
HuberM.ZimmermannS.RentropC.FeldenC. 2017. Integration of Shadow IT Systems with Enterprise Systems - A Literature Review. In Proceedings of the 21st Pacific Asia Conference on Information Systems pp. 1-12.
[35]
Huuskonen, S., & Vakkari, P. 2013. "I Did It My Way": Social workers as secondary designers of a client information system. Information Processing & Management, 491, 380-391.
[36]
Kent, S., Houghton, L., & Kerr, D. V. 2013. Affective Events Theory, Institutional Theory and feral Systems: How do they all Fit? In M. Grimmer & R. Hecker Eds., Proceedings of the 27th Australian and New Zealand Academy of Management Conference.
[37]
KhalilS.WinklerT. J.XiaoX. 2017. Two Tales of Technology: Business and IT Managers' Technological Frames Related to Cloud Computing. In Proceedings of the 38th International Conference on Information Systems pp. 1-20.
[38]
Klotz, S., Kopper, A., Westner, S., & Strahringer, S. 2018. Causing Factors, Outcomes, and Governance of Shadow IT and Business-managed IT: A State-of-the-Art Literature Analysis. Manuscript submitted for publication
[39]
Köffer, S., Ortbach, K., Junglas, I., Niehaves, B., & Harris, J. 2015. Innovation Through BYOD? The Influence of IT Consumerization on Individual IT Innovation Behavior. Business & Information Systems Engineering, 576, 363-375.
[40]
KopperA. 2017. Perceptions of IT Managers on Shadow IT. In Proceedings of the 23rd Americas Conference on Information Systems pp. 1-10.
[41]
KopperA.WestnerM. 2016a. Deriving a Framework for Causes, Consequences, and Governance of Shadow IT from Literature. In NissenV.StelzerD.StraβburgerS.FischerD. Eds., Proceedings of the Multikonferenz Wirtschaftsinformatik pp. 1687-1698.
[42]
KopperA.WestnerM. 2016b. Towards a Taxonomy for Shadow IT. In Proceedings of the 22nd Americas Conference on Information Systems pp. 1-10.
[43]
Kopper, A., Westner, M., & Strahringer, S. 2017. Kontrollierte Nutzung von Schatten-IT. HMD Praxis Der Wirtschaftsinformatik, 541, 97-110.
[44]
KretzerM.MaedcheA. 2014. Generativity of Business Intelligence Platforms: A Research Agenda Guided by Lessons from Shadow IT. In KundischD.SuhlL.BeckmannL. Eds., Proceedings of the Multikonferenz Wirtschaftsinformatik pp. 208-220. Paderborn.
[45]
Levy, Y., & Ellis, T. J. 2006. A Systems Approach to Conduct an Effective Literature Review in Support of Information Systems Research. Informing Science: the International Journal of an Emerging Transdiscipline, 9, 181-212.
[46]
Lund-Jensen, R., Azaria, C., Permien, F. H., Sawari, J., & Bækgaard, L. 2016. Feral Information Systems, Shadow Systems, and Workarounds: A Drift in IS Terminology. Procedia Computer Science, 100, 1056-1063.
[47]
McIvor, R. 2009. How the Transaction Cost and Resource-Based Theories of the Firm Inform Outsourcing Evaluation. Journal of Operations Management, 271, 45-63.
[48]
Myers, N., Starliper, M. W., Summers, S. L., & Wood, D. A. 2017. The Impact of Shadow IT Systems on Perceived Information Credibility and Managerial Decision Making. Accounting Horizons, 313, 105-123.
[49]
OrtbachK. 2015. Unraveling the Effect of Personal Innovativeness on Bring-Your-Own-Device BYOD Intention: The Role of Perceptions Towards Enterprise-Provided and Privately-Owned Technologies. In Proceedings of the 23rd European Conference on Information Systems pp. 1-17.
[50]
PankoR. R.PortD. N. 2012. End User Computing: The Dark Matter and Dark Energy of Corporate IT. In Proceedings of the 45th Hawaii International Conference on System Sciences pp. 4603-4612. IEEE.
[51]
Peppard, J. 2016. Rethinking the concept of the IS organization. Information Systems Journal, 281, 76-103.
[52]
Power, M. 2007. Organized Uncertainty: Designing a World of Risk Management 1st ed. New York, USA: Oxford University Press.
[53]
RentropC.ZimmermannS. 2012a. Shadow IT Evaluation Model. In Proceedings of the Federated Conference on Computer Science and Information Systems pp. 1023-1027. Piscataway, NJ: IEEE.
[54]
Rentrop, C., & Zimmermann, S. 2012b. Shadow IT: Management and Control of unofficial IT. In J. Lloret Mauri, G. Martínez, L. Berntzen, & Å. Smedberg Eds., Proceedings of the 6th International Conference on Digital Society 98-102. Wilmington, USA: IARIA.
[55]
RöderN.WiescheM.SchermannM. 2014. A Situational Perspective on Workarounds in IT-enabled Business Processes: A Multiple Case Study. In Proceedings of the 22nd European Conference on Information Systems pp. 0-15.
[56]
Seawright, J., & Gerring, J. 2008. Case selection techniques in case study research: A menu of qualitative and quantitative options. Political Research Quarterly, 612, 294-308.
[57]
Sedera, D., Lokuge, S., Grover, V., Sarker, S., & Sarker, S. 2016. Innovating with enterprise systems and digital platforms: A contingent resource-based theory view. Information & Management, 533, 366-379.
[58]
Silic, M., & Back, A. 2014. Shadow IT - A view from behind the curtain. Computers & Security, 45, 274-283.
[59]
Silic, M., Silic, D., & Oblakovic, G. 2016. Influence of Shadow IT on Innovation in Organizations. Complex Systems Informatics and Modeling Quarterly. 8, 68-80.
[60]
SinghH. 2015. Emergence and Consequences of Drift in Organizational Information Systems. In Proceedings of the 19th Pacific Asia Conference on Information Systems pp. 1-15.
[61]
SpieringsA.KerrD. V.HoughtonL. 2012. What Drives the End User to Build a Feral Information System? In Proceedings of the 23rd Australasian Conference on Information Systems pp. 1-10.
[62]
Spierings, A., Kerr, D. V., & Houghton, L. 2017. Issues that support the creation of ICT workarounds: Towards a theoretical understanding of feral information systems. Information Systems Journal, 276, 775-794.
[63]
TamboT.BækgaardL. 2013. Dilemmas in Enterprise Architecture Research and Practice from a Perspective of Feral Information Systems. In Proceedings of the 17th IEEE International Enterprise Distributed Object Computing Conference Workshops pp. 289-295. IEEE.
[64]
TechTarget. 2014. What is embedded IT? Retrieved from http://searchcio.techtarget.com/definition/embedded-IT
[65]
TechTarget. 2016. What is citizen development? Retrieved from http://searchsalesforce.techtarget.com/definition/citizen-development
[66]
Walterbusch, M., Fietz, A., & Teuteberg, F. 2017. Missing cloud security awareness: Investigating risk exposure in shadow IT. Journal of Enterprise Information Management, 304, 644-665.
[67]
Weill, P., & Ross, J. W. 2004. IT Governance: How Top Performers Manage IT Decision Rights for Superior Results. Boston, USA: Harvard Business School Press.
[68]
Winkler, T. J. 2013. IT Governance Mechanisms and Administration/IT Alignment in the Public Sector: A Conceptual Model and Case Validation. In R. Alt & B. Franczyk Eds., Proceedings of the 11. Internationale Tagung Wirtschaftsinformatik pp. 831-845.
[69]
Winkler, T. J., & Brown, C. V. 2013. Horizontal Allocation of Decision Rights for On-Premise Applications and Software-as-a-Service. Journal of Management Information Systems, 303, 13-48.
[70]
Winkler, T. J., & Brown, C. V. 2014. Organizing and Configuring the IT Function. In Tucker, A., Gonzalez, T., Topi, H., & Diaz-Herrera, J. Eds., Computing Handbook: Information Systems and Information Technology 3rd ed., Vol. 2, pp. 1-14. Boca Raton, FL: C R C Press LLC.
[71]
Winter, S., Berente, N., Howison, J., & Butler, B. 2014. Beyond the organizational 'container': Conceptualizing 21st century sociotechnical work. Information and Organization, 244, 250-269.
[72]
Yin, R. K. 2013. Case study research: Design and methods 5th ed. Thousand Oaks, CA: SAGE Publications.
[73]
ZainuddinE. 2012. Secretly SaaS-ing: Stealth Adoption of Software-as-a-Service from the Embeddedness Perspective. In Proceedings of the 33rd International Conference on Information Systems pp. 1-10.
[74]
Zimmermann, S., & Rentrop, C. 2012. Schatten-IT. HMD Praxis Der Wirtschaftsinformatik, 496, 60-68.
[75]
ZimmermannS.RentropC. 2014. On the Emergence of Shadow IT - A Transaction Cost-based Approach. In Proceedings of the 22nd European Conference on Information Systems pp. 1-17.
[76]
ZimmermannS.RentropC.FeldenC. 2014. Managing Shadow IT Instances - A Method to Control Autonomous IT Solutions in the Business Departments. In Proceedings of the 20th Americas Conference on Information Systems pp. 1-12.
[77]
ZimmermannS.RentropC.FeldenC. 2016. Governing Identified Shadow IT by Allocating IT Task Responsibilities. In Proceedings of the 22nd Americas Conference on Information Systems pp. 1-10.
[78]
Zimmermann, S., Rentrop, C., & Felden, C. 2017. A Multiple Case Study on the Nature and Management of Shadow Information Technology. Journal of Information Systems, 311, 79-101.

Cited By

View all
  • (2020)From Shadow IT to Business-managed IT: a qualitative comparative analysis to determine configurations for successful management of IT by business entitiesInformation Systems and e-Business Management10.1007/s10257-020-00472-618:2(209-257)Online publication date: 15-Jul-2020

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image International Journal of IT/Business Alignment and Governance
International Journal of IT/Business Alignment and Governance  Volume 9, Issue 2
July 2018
71 pages
ISSN:1947-9611
EISSN:1947-962X
Issue’s Table of Contents

Publisher

IGI Global

United States

Publication History

Published: 01 July 2018

Author Tags

  1. Alignment
  2. Business-Managed IT
  3. IT Governance
  4. Shadow IT

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2020)From Shadow IT to Business-managed IT: a qualitative comparative analysis to determine configurations for successful management of IT by business entitiesInformation Systems and e-Business Management10.1007/s10257-020-00472-618:2(209-257)Online publication date: 15-Jul-2020

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media