Back to Browse

KM Discussion 13: Shadow IT

26 views
Oct 19, 2020
9:29

Sometimes there is a valid business case for the use of technology not officially supported by a company's IT department. However, there are risks and disadvantages when IT is not included in the decision making process, and/or the governance of business critical systems. References Crowdstrike, Vanson Bourne, “2019 Crowdstrike Global Security Attitude Survey”. https://www.crowdstrike.com/resources/reports/global-security- attitude-survey-2019/ Fürstenau, D., Rothe, H. & Sandner, M. “Leaving the Shadow: A Configurational Approach to Explain Post-identification Outcomes of Shadow IT Systems”. Bus Inf Syst Eng (2020). https://doi.org/10.1007/s12599-020-00635-2 Klotz, S., Kopper, A., Westner, M., Strahringer, S. International Journal of Information Systems and Project Management, Vol. 7, No. 1, 2019, 1 5-43. DOI: 10.12821/ijispm070102 International Organization for Standardization, “Information technology – Security techniques – Information Security”. ISO/IEC 27005:2018(E) Raković, L., Sakal, M., Matković, P., Marić, M. (2020). Shadow IT – A Systematic Literature Review. Information Technology and Control, 49(1), 144-160. https://doi.org//10.5755/j01.itc.49.1.23801 Spierings, Anthony; Kerr, Don; and Houghton, Luke, "What Drives the End User to Build a Feral Information System?" (2012). ACIS 2012 Proceedings. 6. https://aisel.aisnet.org/acis2012/6

Download

0 formats

No download links available.

KM Discussion 13: Shadow IT | NatokHD