Location
260-009, Owen G. Glenn Building
Start Date
12-15-2014
Description
Shadow IT occurs when users develop systems outside of the central information technology department. It provides both benefits and risks- users procuring Shadow IT often do not consider integration with existing enterprise architecture, privacy and security protection, maintenance cost, and legal ramifications. Problems with shadow IT must often be resolved by central IT. It is, thus, important for central IT to determine when users will consider shadow IT, and how shadow IT can be managed. This research performs paired interviews with CIOs and senior users to identify factors causing Shadow IT. Two main arguments are advanced. First, the form the shadow IT/central IT duality takes is based on: (a) an alignment/non-alignment between the organization, central IT, and user function; and (b) the ability of user departments to procure IT independently. Second, top management support is not necessary for successful IT implementation, especially given the presence of enterprise shadow IT systems.
Recommended Citation
Chua, Cecil; Storey, Veda; and Chen, Langtao, "Central IT or Shadow IT? Factors Shaping Users’ Decision to Go Rogue With IT" (2014). ICIS 2014 Proceedings. 2.
https://aisel.aisnet.org/icis2014/proceedings/ISGovernance/2
Central IT or Shadow IT? Factors Shaping Users’ Decision to Go Rogue With IT
260-009, Owen G. Glenn Building
Shadow IT occurs when users develop systems outside of the central information technology department. It provides both benefits and risks- users procuring Shadow IT often do not consider integration with existing enterprise architecture, privacy and security protection, maintenance cost, and legal ramifications. Problems with shadow IT must often be resolved by central IT. It is, thus, important for central IT to determine when users will consider shadow IT, and how shadow IT can be managed. This research performs paired interviews with CIOs and senior users to identify factors causing Shadow IT. Two main arguments are advanced. First, the form the shadow IT/central IT duality takes is based on: (a) an alignment/non-alignment between the organization, central IT, and user function; and (b) the ability of user departments to procure IT independently. Second, top management support is not necessary for successful IT implementation, especially given the presence of enterprise shadow IT systems.