Affiliation:
1. Hochschule Konstanz University of Applied Sciences
2. Technical University Bergakademie Freiberg
Abstract
ABSTRACT
In several organizations, business workgroups autonomously implement information technology (IT) outside the purview of the IT department. Shadow IT, evolving as a type of workaround from nontransparent and unapproved end-user computing (EUC), is a term used to refer to this phenomenon, which challenges norms relative to IT controllability. This report describes shadow IT based on case studies of three companies and investigates its management. In 62 percent of cases, companies decided to reengineer detected instances or reallocate related subtasks to their IT department. Considerations of risks and transaction cost economics with regard to specificity, uncertainty, and scope explain these actions and the resulting coordination of IT responsibilities between the business workgroups and IT departments. This turns shadow IT into controlled business-managed IT activities and enhances EUC management. The results contribute to the governance of IT task responsibilities and provide a way to formalize the role of workarounds in business workgroups.
Publisher
American Accounting Association
Subject
Management of Technology and Innovation,Information Systems and Management,Human-Computer Interaction,Accounting,Information Systems,Software,Management Information Systems
Reference69 articles.
1. An assessment of the use of transaction cost theory in information technology outsourcing;Alaghehband;Journal of Strategic Information Systems,2011
2. Managing the risks associated with end-user computing;Alavi;Journal of Management Information Systems,1985
3. Strategies for end-user computing: An integrative framework;Alavi;Journal of Management Information Systems,1987
4. Theory of workarounds;Alter;Communications of the Association for Information Systems,2014
5. A transaction cost model of IT outsourcing;Aubert;Information & Management,2004
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献