2013 17th IEEE International Enterprise Distributed Object Computing Conference Workshops 2013
DOI: 10.1109/edocw.2013.38
|View full text |Cite
|
Sign up to set email alerts
|

Dilemmas in Enterprise Architecture Research and Practice from a Perspective of Feral Information Systems

Abstract: This paper is presenting a discussion of feral information systems (FIS) in relationship to enterprise architecture (EA) thereby aiming to better qualify the architectural understanding of information systems not in line with corporate IT/IS strategy and policies. A qualitative and case-based approach is used as empirical foundation of this paper. With users developing own IS, classical strategy-based EA approaches are challenged. Identifying FIS can strongly improve insight into organizational processes and s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

1
13
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(19 citation statements)
references
References 31 publications
1
13
0
Order By: Relevance
“…Thus, covert IS, which represent the implicit focus in research on Shadow IT, are not involved in given IT management controls of a company. Depending on a company's IT management maturity they are neither registered nor strategically planned within organizational IT management processes (Boynton et al, 1994) such as IT service management (Zimmermann and Rentrop, 2014) or enterprise architecture management (Fuerstenau and Rothe, 2014;Huber et al, 2017;Tambo and Baekgaard, 2013).…”
Section: Conceptual Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, covert IS, which represent the implicit focus in research on Shadow IT, are not involved in given IT management controls of a company. Depending on a company's IT management maturity they are neither registered nor strategically planned within organizational IT management processes (Boynton et al, 1994) such as IT service management (Zimmermann and Rentrop, 2014) or enterprise architecture management (Fuerstenau and Rothe, 2014;Huber et al, 2017;Tambo and Baekgaard, 2013).…”
Section: Conceptual Frameworkmentioning
confidence: 99%
“…Considering the whole body of knowledge about Shadow IT, it is mostly viewed with a negative connotation, but both researchers and practitioners are increasingly dealing with its potential benefits . It can contribute to a company's innovative potential (Silic et al, 2016), lead to an increased organizational agility (Tambo and Baekgaard, 2013), or simply be a way to deal with shortcomings of corporate IT systems (Alter, 2014;Behrens, 2009). These aspects stand in contrast to the negative connotation of the term Shadow IT.…”
Section: Introductionmentioning
confidence: 99%
“…One should also not disregard the fact that often, due to the development of a Shadow system, the completion of current tasks is often delayed, and the time used for thedevelopment of a Shadow system is not recorded as an IT cost, which affects the total performance of the organization [41]. Due to their rather disintegrated nature, Shadow systems may create redundancy of operations and problems with data integrity and quality ( [2], [16] mentioned in [19], [41], [42]). …”
mentioning
confidence: 99%
“…The goal of this IT support is a high enterprise integration [13]. However, there is evidence that shadow systems lead to redundancy [7,14,15] and a lack of integration in the enterprise architecture [4,5,16,17]. While one of the main goals of Enterprise Architecture Management (EAM) is to support these integration and standardization requirements of an organization [18,19], existing shadow systems preclude this goal [20].…”
Section: Introductionmentioning
confidence: 99%
“…Shadow systems are a result of the case that business workgroups implement additional systems, which exist outside of an organizational IT service management [3] and are often not integrated with other enterprise systems [4,5]. Shadow systems support daily activities sometimes even in the same processes as Enterprise Resource Planning (ERP) systems [6][7][8].…”
Section: Introductionmentioning
confidence: 99%