Shadow IT
dc.contributor.author | Haag, Steffi | |
dc.contributor.author | Eckhardt, Andreas | |
dc.date.accessioned | 2018-01-08T07:47:30Z | |
dc.date.available | 2018-01-08T07:47:30Z | |
dc.date.issued | 2017 | |
dc.identifier.pissn | 1867-0202 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/10741 | |
dc.publisher | Springer | |
dc.relation.ispartof | Business & Information Systems Engineering: Vol. 59, No. 6 | |
dc.relation.ispartofseries | Business & Information Systems Engineering | |
dc.subject | Bring-your-own | |
dc.subject | IT consumerization | |
dc.subject | Shadow IT | |
dc.subject | Shadow systems | |
dc.subject | Workaround | |
dc.title | Shadow IT | |
dc.type | Text/Journal Article | |
gi.citation.endPage | 473 | |
gi.citation.startPage | 469 |