1. Theory of Workarounds
2. Barrett, M. P. 2018. Framework for improving critical infrastructure cybersecurity. National Institute of Standards and Technology, Gaithersburg, MD, USA, Tech. Rep.
3. Shadow systems
4. Behrens, S., and W. Sedera. 2004. Why do shadow systems exist after an ERP implementation? Lessons from a case study. In PACIS 2004 proceedings, 136.