2020
DOI: 10.1007/s12599-020-00635-2
|View full text |Cite
|
Sign up to set email alerts
|

Leaving the Shadow: A Configurational Approach to Explain Post-identification Outcomes of Shadow IT Systems

Abstract: With the advent of end-user and cloud computing, business users can implement information systems for work practices on their own -either from scratch or as extensions to existing systems. The resulting information systems, however, often remain hidden from managers and official IT units, and are therefore called ''shadow IT systems''. When a shadow IT system is identified, the organization has to decide on the future of this system. The study uses a configurational perspective to explain outcomes of shadow IT… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 57 publications
0
5
0
Order By: Relevance
“…• In step two, the context and its conditions were identified. In configurational analysis, there is no presumption about the level at which the contextual conditions are situated [54]. In the context of our analysis, contextual conditions described the setup in which informal futureproofing talks took place that led to either futureproof or non-futureproof health estate projects.…”
Section: Discussionmentioning
confidence: 99%
“…• In step two, the context and its conditions were identified. In configurational analysis, there is no presumption about the level at which the contextual conditions are situated [54]. In the context of our analysis, contextual conditions described the setup in which informal futureproofing talks took place that led to either futureproof or non-futureproof health estate projects.…”
Section: Discussionmentioning
confidence: 99%
“…To the degree of our knowledge, previous research does not show how transforms the task significance but rather focuses mainly on the interrelation between task significance and job performance after implementation [e.g. 34,35].…”
Section: Discussionmentioning
confidence: 99%
“…ability to address changes of the external environment and assist in improvement of the internal business processes [34]. Thus, information systems and technologies supporting insignificant or irrelevant tasks should be suspended [35].…”
Section: Figure 1 Four Types Of Intelligence [Adopted From [4]]mentioning
confidence: 99%
“…Closely related to workarounds is the concept of shadow systems, which refers to digital technologies and infrastructures that emerge to support work where official information systems do not (Behrens, 2009; Fürstenau et al, 2021; Györy et al, 2012; Haag & Eckhardt, 2017; Mallmann et al, 2018). They exist in parallel to the official information systems and are part of underground or “bootlegging” activities, a kind of work that is performed around formal practices (Abetti, 1997; Augsdorfer, 2008; Daskalopoulou et al, 2019; Pearson, 1997).…”
Section: Related Workmentioning
confidence: 99%