Abstract
Every industrial business in the modern day strives to become technology-driven, for both survival and expansion. With the availability of new generational technology platforms and low-code tooling, technological manifestations are becoming increasingly decentralized. The two emerging forms of business led autonomous technology deployments are Shadow-IT and Business-managed IT. While Shadow-IT is constructed in secret without the knowledge of central IT team, Business-managed IT is a split-governance model built in collaboration with the IT organization. Common governance is required to ensure that IT investments are efficient, secure, and compliant. Despite being aware of Shadow-IT’s limitations, businesses are unable to upgrade them to better models due to a lack of a simple toolkit that can act as a guidelight. This paper’s goal is to present a framework that can fill this gap and illustrate precise steps for a business unit to make a transition to a business-managed IT model suitable to its technological capability. Based on extensive research and case study analysis, the paper captures insights about different forms of autonomous IT investments, proposes a framework to advocate an appropriate business-IT partnership model for a business unit, and finally solicits the opinions of eminent business executives from diverse industries to confirm its applicability. The framework will act as a guide not just for the initial transition, but also evolution of the partnership model as the business’s technological capabilities grow over time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kent, S., Hougston, L., Kerr, D.: Affective events theory, institutional theory and feral systems: how do they all fit? Presented at the 27th Australian and New Zealand Academy of Management Conference, Hobart, Australia, Hobart, Australia (2013)
Ortbach, K., Bode, M., Niehaves, B.: What influences technological individualization? - An analysis of antecedents to IT consumerization behavior. Presented at the Proceedings of the 19th Americas Conference on Information Systems, Chicago, USA, Chicago, USA, pp. 1–9 (2013)
Haag, A.: Appearance of dark clouds? An empirical analysis of users’ shadow sourcing of cloud services. Presented at the Proceedings of the 12. Internationale Tagung Wirtschaftsinformatik, Osnabrück, Germany, Osnabrück, Germany, pp. 1438–1452 (2015)
Kretzer, M., Maedche, A.: Generativity of business intelligence platforms: a research agenda guided by lessons from shadow IT. Presented at the Proceedings of the Multikonferenz Wirtschaftsinformatik, Paderborn, Germany, Paderborn, Germany, pp. 208–220 (2014)
Behrens, S.: Shadow systems: the good, the bad and the ugly (2009). https://doi.org/10.1145/1461928.1461960
Singh, H.: Emergence and consequences of drift in organizational information systems (2010)
Chua, C.E.H., Storey, V.C., Chen, L.: Central IT or Shadow IT? Factors shaping users’ decision to go rogue with IT. Presented at the ICIS 2014 Proceedings (2014)
Kopper, A., Klotz, S., Westner, M., Strahringer, S.: Shadow IT and Business-managed IT: practitioner perceptions and their comparison to literature, vol. XXX, pp. 1–25, December 2019
Kopper, A., Fuerstenau, D., Rentrop, C.: Business-managed IT: a conceptual framework and empirical illustration. Presented at the Twenty-Sixth European Conference on Information Systems (ECIS2018) (2018). https://doi.org/10.4018/IJITBAG.2018070104
Kure, J., Ito, K., Tateiwa, M., Suzuki, S.: Integrating multi-cloud environment with FUJITSU cloud services management. FUJITSU Sci. Tech. J. 53(1), Article no. 1 (2017)
Alexander, N.S., Swatman, P.A.: Informal eCollaboration Channels: Shedding Light on ‘Shadow CIT,’ June 2008. https://www.alexandria.unisg.ch/handle/20.500.14171/78203. Accessed 9 Aug 2023
Zimmermann, S., Rentrop, C., Felden, C.: Governing identified shadow IT by allocating IT task responsibilities. Presented at the Americas Conference on Information Systems at San Diego, August 2016. https://opus.htwg-konstanz.de/frontdoor/index/index/docId/978. Accessed 9 Aug 2023
Hollweck, T., Yin, R.K.: Case study research design and methods (5th ed.). Can. J. Program Eval. 30(1), 108–110 (2015). https://doi.org/10.3138/cjpe.30.1.108
Myers, M.D., Newman, M.: The qualitative interview in IS research: examining the craft. Inf. Organ. 17(1), 2–26 (2007). https://doi.org/10.1016/j.infoandorg.2006.11.001
Benbasat, I., Goldstein, D.K., Mead, M.: The case research strategy in studies of information systems. MIS Q. 11(3), 369 (1987). https://doi.org/10.2307/248684
Annarelli, A., Battistella, C., Nonino, F., Parida, V., Pessot, E.: Literature review on digitalization capabilities: co-citation analysis of antecedents, conceptualization and consequences. Technol. Forecast. Soc. Change 166, 120635 (2021). https://doi.org/10.1016/j.techfore.2021.120635
Gökalp, E., Martinez, V.: Digital transformation maturity assessment: development of the digital transformation capability maturity model. Int. J. Prod. Res. 60(20), Article no. 20 (2022). https://doi.org/10.1080/00207543.2021.1991020
Çaliş, B.: Capability model and competence measuring for smart hospital system: an analysis for Turkey. Int. J. Health Serv. Res. Policy 5(1), Article no. 1 (2020). https://doi.org/10.33457/ijhsrp.670597
Martín-Peña, M.L., Díaz-Garrido, E., Sánchez-López, J.M.: The digitalization and servitization of manufacturing: a review on digital business models. Strateg. Change 27(2), Article no. 2 (2018). https://doi.org/10.1002/jsc.2184
Büyüközkan, G., Güler, M.: Analysis of companies’ digital maturity by hesitant fuzzy linguistic MCDM methods. J. Intell. Fuzzy Syst. 38(1), 1119–1132 (2020). https://doi.org/10.3233/JIFS-179473
Garmaki, M., Gharib, R.K., Boughzala, I.: Big data analytics capability and contribution to firm performance: the mediating effect of organizational learning on firm performance. J. Enterp. Inf. Manag. 36, 1161–1184 (2023). https://doi.org/10.1108/JEIM-06-2021-0247
An, J.: 77 Building Blocks of Digital Transformation. eBook Partnership (2018). https://books.google.co.in/books?id=2FN1zQEACAAJ
Charmaz, K.: Constructing Grounded Theory, Second. SAGE (2014). https://uk.sagepub.com/en-gb/eur/constructing-grounded-theory/book235960
Acknowledgments
The authors greatly appreciate help from the following students at the primary author’s university who worked tirelessly on various areas including initial literature review, data collection and industry feedback capture. This effort helps the study take a comprehensive shape. We include their names herewith.
∙ Atul Pataskar (atul.pataskar068@nmims.edu.in);
∙ Darshita Gandhi (darshita.gandhi100@nmims.edu.in);
∙ Naman Manchanda (naman.manchanda033@nmims.edu.in);
∙ Raunak Rai (raunak.rai117@nmims.edu.in); and
∙ Swati (c.swati054@nmims.edu.in).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 IFIP International Federation for Information Processing
About this paper
Cite this paper
Devasthali, S., Gupta, G. (2024). Embracing Change from Shadow IT to Collaborative IT Models. In: Sharma, S.K., Dwivedi, Y.K., Metri, B., Lal, B., Elbanna, A. (eds) Transfer, Diffusion and Adoption of Next-Generation Digital Technologies. TDIT 2023. IFIP Advances in Information and Communication Technology, vol 699. Springer, Cham. https://doi.org/10.1007/978-3-031-50204-0_31
Download citation
DOI: https://doi.org/10.1007/978-3-031-50204-0_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-50203-3
Online ISBN: 978-3-031-50204-0
eBook Packages: Computer ScienceComputer Science (R0)