Abstract

The practice of informal IT use, characterizing a hidden or unauthorized, is conceptualized in IS literature as Shadow-IT. This study seeks to understand the conceptual framework that explains the Shadow-IT systems as a form of a workaround representing deviations from existing work systems. Taking workaround theory proposed by Steven Alters in 2014 as a foundational concept in order to examine various aspects of Shadow-IT system as a form of a workaround and the hazards associated with its use. A comprehensive review of a theory of workarounds is systematically organized to inform about the theory and its contributors; its origin and development over time; the intellectual traditions and research milieu in which the theory can be applied. A possible framework is provided for future research to understand organizational challenges in management control and information security as an effect of a Shadow-IT usage utilizing the concepts of workaround theory.

Share

COinS