Skip to main content
Log in

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

References

  • Alter S (2014) Theory of workarounds. Commun Assoc Inf Syst 34:1041–1066

    Google Scholar 

  • Brown CV, Magill SL (1994) Alignment of the IS functions with the enterprise: toward a model of antecedents. MIS Q 18:371

    Article  Google Scholar 

  • Burton-Jones A, Straub D (2006) Reconceptualizing system usage: an approach and empirical test. Inf Syst Res 17:228–246

    Article  Google Scholar 

  • Corbin K (2015) CIOs vastly underestimate extent of shadow IT. http://www.cio.com/article/2968281/cio-role/cios-vastly-underestimate-extent-of-shadow-it.html. Accessed 17 Apr 2016

  • Ferneley EH, Sobreperez P (2006) Resist, comply or workaround? An examination of different facets of user engagement with information systems. Eur J Inf Syst 15:345–356

    Article  Google Scholar 

  • Fürstenau D, Rothe H (2014) Shadow IT systems: discerning the good and the evil. In: Proceedings of the 22nd European Conference on Information Systems. Tel Aviv

  • Györy A, Cleven A, Uebernickel F, Brenner W (2012) Exploring the shadows: IT governance approaches to user-driven innovation. In: Proceedings of the 20th European Conference on Information Systems. Barcelona

  • Haag S, Eckhardt A, Bozoyan C (2015) Are shadow system users the better IS users? Insights of a lab experiment. In: Proceedings of the 36th International Conference on Information Systems. Fort Worth

  • Harris J, Ives B, Junglas I (2012) IT consumerization: when gadgets turn into enterprise IT tools. MIS Q Exec 11:99–112

    Google Scholar 

  • Horlach B, Drews P, Schirmer I, Böhmann T (2017) Increasing the agility of IT delivery: five types of bimodal IT organization. In: Proceedings of the 50th Hawaii International Conference on System Sciences. Big Island, Hawaii

  • Köffer S, Ortbach K, Junglas I, Niehaves B, Harris J (2015) Innovation through BYOD? Bus Inf Syst Eng 57:363–375

    Article  Google Scholar 

  • Liang H, Xue Y, Wu L (2013) Ensuring employees’ IT compliance: carrot or stick? Inf Syst Res 24:279–294

    Article  Google Scholar 

  • Martin AW, Lopez SH, Roscigno VJ, Hodson R (2013) Against the rules: synthesizing types and processes of bureaucratic rule-breaking. Acad Manag Rev 38:550–574

    Article  Google Scholar 

  • Segal M (2016) Dealing with the realities of shadow IT. In: Datacenter J. http://www.datacenterjournal.com/dealing-realities-shadow/. Accessed 22 Nov 2016

  • Silic M, Back A (2014) Shadow IT–a view from behind the curtain. Comput Secur 45:274–283

    Article  Google Scholar 

  • Sun H (2012) Understanding user revisions when using information system features: adaptive system use and triggers. MIS Q 36:453–478

    Google Scholar 

  • Urbach N, Ahlemann F (2016) Schatten-IT als gelebte Praxis–IT-Innovationen werden in interdisziplinären Teams in den Fachabteilungen erarbeitet. In: Urbach N, Ahlemann F (eds) IT-Management im Zeitalter der Digitalisierung. Springer, Heidelberg, pp 67–75

    Chapter  Google Scholar 

  • Zimmermann S, Rentrop C, Felden C (2016) Governing identified shadow IT by allocating IT task responsibilities. In: Proceedings of the 22nd Americas Conference on Information Systems. San Diego

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Steffi Haag.

Additional information

Accepted after two revisions by Prof. Dr. Weinhardt.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Haag, S., Eckhardt, A. Shadow IT. Bus Inf Syst Eng 59, 469–473 (2017). https://doi.org/10.1007/s12599-017-0497-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12599-017-0497-x

Keywords

Navigation