Shadow IT Systems: Discerning the Good and the Evil

Daniel Fürstenau, Hannes Rothe

Publikation: Bidrag til bog/antologi/rapportKonferencebidrag i proceedingsForskningpeer review

Abstrakt

Shadow IT is becoming increasingly important as digital work practices make it easier than ever for business units crafting their own IT solutions. Prior research on shadow IT systems has often used fixed accounts of good or evil: They have been celebrated as powerful drivers of innovation or demonized as lacking central governance. We introduce a method to IT managers and architects enabling a more nuanced understanding of shadow IT systems with respect to their architectural embeddedness. Drawing on centrality measures from network analysis, the method portrays shadow IT systems as most critical if they hold a central position in a network of applications and information flows. We use enterprise architecture data from a recycling company to demonstrate and evaluate the method in a real project context. In the example, several critical and yet disregarded shadow IT systems have been identified and measures were taken to govern them decently.
OriginalsprogEngelsk
TitelECIS 2014 Proceedings
RedaktørerMichel Avital, Jan Marco Leimeister, Ulrike Schultze
Antal sider14
UdgivelsesstedAtlanta, GA
ForlagAssociation for Information Systems. AIS Electronic Library (AISeL)
Publikationsdato2014
Artikelnummer9
ISBN (Trykt)9780991556700
StatusUdgivet - 2014
Udgivet eksterntJa
BegivenhedThe 22nd European Conference on Information Systems (ECIS) 2014: Digital Work, Digital Life - David Intercontinental Hotel, Tel Aviv, Israel
Varighed: 9 jun. 201411 jun. 2014
Konferencens nummer: 22
http://ecis2014.eu/

Konference

KonferenceThe 22nd European Conference on Information Systems (ECIS) 2014
Nummer22
LokationDavid Intercontinental Hotel
LandIsrael
ByTel Aviv
Periode09/06/201411/06/2014
Internetadresse
NavnProceedings of the European Conference on Information Systems
ISSN0000-0034

Emneord

  • Centrality measures
  • Design science research
  • IS architectures
  • Network analysis
  • Shadow IT systems

Citationsformater