Logo des Repositoriums
 

Leaving the Shadow: A Configurational Approach to Explain Post-identification Outcomes of Shadow IT Systems

dc.contributor.authorFürstenau, Daniel
dc.contributor.authorRothe, Hannes
dc.contributor.authorSandner, Matthias
dc.date.accessioned2021-05-01T06:22:45Z
dc.date.available2021-05-01T06:22:45Z
dc.date.issued2021
dc.description.abstractWith the advent of end-user and cloud computing, business users can implement information systems for work practices on their own – either from scratch or as extensions to existing systems. The resulting information systems, however, often remain hidden from managers and official IT units, and are therefore called “shadow IT systems�. When a shadow IT system is identified, the organization has to decide on the future of this system. The study uses a configurational perspective to explain outcomes of shadow IT system identification, as well as the mechanisms and contextual conditions which bring them about. For this purpose, 27 profiles of shadow IT systems were compiled by conducting 35 interviews with respondents from different positions and industries. The analysis gives insight into six distinct context-mechanism-outcome configurations explaining four outcomes that occur after shadow IT system identification, namely phase-out, replacement, continuing as IT-managed system, and continuing as business-managed system. These results contribute to the shadow IT literature and, more broadly, IS architecture and governance streams of the IS literature. They inform IT managers when these weigh decision options for identified shadow IT systems given different contextual conditions.de
dc.identifier.doi10.1007/s12599-020-00635-2
dc.identifier.pissn1867-0202
dc.identifier.urihttp://dx.doi.org/10.1007/s12599-020-00635-2
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/36348
dc.publisherSpringer
dc.relation.ispartofBusiness & Information Systems Engineering: Vol. 63, No. 2
dc.relation.ispartofseriesBusiness & Information Systems Engineering
dc.subjectApplication governance
dc.subjectConfigurational method
dc.subjectIT governance
dc.subjectShadow IT
dc.titleLeaving the Shadow: A Configurational Approach to Explain Post-identification Outcomes of Shadow IT Systemsde
dc.typeText/Journal Article
gi.citation.endPage111
gi.citation.startPage97

Dateien