Leaving the Shadow: A Configurational Approach to Explain Post-identification Outcomes of Shadow IT Systems

Volume: 63, Issue: 2, Pages: 97 - 111
Published: Mar 9, 2020
Abstract
With the advent of end-user and cloud computing, business users can implement information systems for work practices on their own – either from scratch or as extensions to existing systems. The resulting information systems, however, often remain hidden from managers and official IT units, and are therefore called “shadow IT systems”. When a shadow IT system is identified, the organization has to decide on the future of this system. The study...
Paper Details
Title
Leaving the Shadow: A Configurational Approach to Explain Post-identification Outcomes of Shadow IT Systems
Published Date
Mar 9, 2020
Volume
63
Issue
2
Pages
97 - 111
Citation AnalysisPro
  • Scinapse’s Top 10 Citation Journals & Affiliations graph reveals the quality and authenticity of citations received by a paper.
  • Discover whether citations have been inflated due to self-citations, or if citations include institutional bias.