2022
DOI: 10.1080/01611194.2022.2103754
|View full text |Cite
|
Sign up to set email alerts
|

Shadow IT in higher education: survey and case study for cybersecurity

Abstract: County (UMBC) ScholarWorks@UMBC digital repository on the Maryland Shared Open Access (MD-SOAR) platform.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 25 publications
0
0
0
Order By: Relevance
“…Além disso, no que diz respeito à importância das medidas relacionadas à segurança e aos riscos computacionais, para (Walters, 2013), a aplicação de medidas de segurança apropriadas para gerenciar riscos é necessária no contexto de Shadow IT. Ainda, (Orr et al, 2022) destaca a importância da preocupação com riscos cibernéticos nesse contexto. (Hakvoort, 2022) avaliou que funcionários capacitados no tema de segurança da informação terão maior capacidade de avaliar seus riscos ao usarem Shadow IT (PL23, por exemplo).…”
Section: Ameaçasunclassified
“…Além disso, no que diz respeito à importância das medidas relacionadas à segurança e aos riscos computacionais, para (Walters, 2013), a aplicação de medidas de segurança apropriadas para gerenciar riscos é necessária no contexto de Shadow IT. Ainda, (Orr et al, 2022) destaca a importância da preocupação com riscos cibernéticos nesse contexto. (Hakvoort, 2022) avaliou que funcionários capacitados no tema de segurança da informação terão maior capacidade de avaliar seus riscos ao usarem Shadow IT (PL23, por exemplo).…”
Section: Ameaçasunclassified
“…"Shadow IT" (SIT) refers to the growing practice of using IT resources outside of the official company infrastructure to get work done (S Haag & Eckhardt, 2014;Kopper, 2017;Silic, Barlow, & Back, 2017). Excel spreadsheets, apps that are integrated into organizational systems (SIT can be on company-owned devices, personal devices, or in the cloud), and apps used to complete daily work are all examples of SIT (Orr et al, 2022), or software used for routine tasks (Raković, Sakal, Dakić, & Đurković, 2022;Raković, Sakal, Matković, & Marić, 2020).…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, the use of SIT in tertiary institutions exhibits distinct trends and patterns relating to its shape, function, and security risk. (Orr et al, 2022), In addition to the requirement that universities in Indonesia disclose academic and non-academic data on both individuals and institutions, this allows employees to utilize IT resources not provided by the university. Whether they are aware of it or not, the academic environment, particularly higher education, has the potential to use SIT in their daily activities.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations