Abstract
Shadow IT is becoming increasingly important as digital work practices make it easier than ever for business units crafting their own IT solutions. Prior research on shadow IT systems has often used fixed accounts of good or evil: They have been celebrated as powerful drivers of innovation or demonized as lacking central governance. We introduce a method to IT managers and architects enabling a more nuanced understanding of shadow IT systems with respect to their architectural embeddedness. Drawing on centrality measures from network analysis, the method portrays shadow IT systems as most critical if they hold a central position in a network of applications and information flows. We use enterprise architecture data from a recycling company to demonstrate and evaluate the method in a real project context. In the example, several critical and yet disregarded shadow IT systems have been identified and measures were taken to govern them decently.
Original language | English |
---|---|
Title of host publication | ECIS 2014 Proceedings |
Editors | Michel Avital, Jan Marco Leimeister, Ulrike Schultze |
Number of pages | 14 |
Place of Publication | Atlanta, GA |
Publisher | Association for Information Systems. AIS Electronic Library (AISeL) |
Publication date | 2014 |
Article number | 9 |
ISBN (Print) | 9780991556700 |
Publication status | Published - 2014 |
Externally published | Yes |
Event | 22nd European Conference on Information Systems, ECIS 2014: Digital Work, Digital Life - David Intercontinental Hotel, Tel Aviv, Israel Duration: 9 Jun 2014 → 11 Jun 2014 Conference number: 22 http://ecis2014.eu/ |
Conference
Conference | 22nd European Conference on Information Systems, ECIS 2014 |
---|---|
Number | 22 |
Location | David Intercontinental Hotel |
Country/Territory | Israel |
City | Tel Aviv |
Period | 09/06/2014 → 11/06/2014 |
Internet address |
Series | Proceedings of the European Conference on Information Systems |
---|---|
ISSN | 0000-0034 |
Keywords
- Centrality measures
- Design science research
- IS architectures
- Network analysis
- Shadow IT systems