Central IT or Shadow IT? Factors Shaping Users' Decision to Go Rogue with IT
Abstract
Shadow Information Technology (IT) occurs when users develop systems outside of the central information technology department. It provides both benefits and risks. Users procuring shadow IT often do not consider integration with existing enterprise architecture, privacy and security protection, maintenance cost, and legal ramifications. Problems with shadow IT must often be resolved by central IT. It is, thus, important for central IT to determine when users will consider shadow IT, and how shadow IT can be managed. This research analyzes paired interviews with CIOs and senior users to identify factors causing shadow IT. The paper finds that the form the shadow IT/central IT duality takes is based on: (a) perceptions of legitimacy of the Shadow IT by the organization and central IT; and (b) the ability of user departments to procure IT independently.
Recommended Citation
Chua, C. E., Storey, V. C., & Chen, L. (2014). Central IT or Shadow IT? Factors Shaping Users' Decision to Go Rogue with IT. Proceedings of the 35th International Conference on Information Systems (2014, Auckland, New Zealand) Association for Information Systems (AIS).
Meeting Name
35th International Conference on Information Systems: Building a Better World Through Information Systems, ICIS 2014 (2014: Dec. 14-17, Auckland, New Zealand)
Department(s)
Business and Information Technology
Keywords and Phrases
Configuration theory; Legitimacy; Shadow IT
Document Type
Article - Conference proceedings
Document Version
Citation
File Type
text
Language(s)
English
Rights
© 2014 Association for Information Systems (AIS), All rights reserved.
Publication Date
17 Dec 2014