Shadow it systems: Discerning the good and the evil. Furstenau, D. & Rothe, H. In Proceedings of the 22nd European Conference on Information Systems, pages 1 - 14, 2014. Association for Information Systems. abstract bibtex Shadow IT is becoming increasingly important as digital work practices make it easier than ever for business units crafting their own IT solutions. Prior research on shadow IT systems has often used fixed accounts of good or evil: They have been celebrated as powerful drivers of innovation or demonized as lacking central governance. We introduce a method to IT managers and architects enabling a more nuanced understanding of shadow IT systems with respect to their architectural embeddedness. Drawing on centrality measures from network analysis, the method portrays shadow IT systems as most critical if they hold a central position in a network of applications and information flows. We use enterprise architecture data from a recycling company to demonstrate and evaluate the method in a real project context. In the example, several critical and yet disregarded shadow IT systems have been identified and measures were taken to govern them decently.
@inproceedings{
title = {Shadow it systems: Discerning the good and the evil},
type = {inproceedings},
year = {2014},
keywords = {Centrality measures,Design science research,IS architectures,Network analysis,Shadow IT systems},
pages = {1 - 14},
publisher = {Association for Information Systems},
city = {Tel Aviv, Israel},
id = {e7a3cb32-185d-3506-9b4f-56c97ecd81cd},
created = {2018-05-23T10:16:59.860Z},
file_attached = {false},
profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278},
last_modified = {2018-05-23T10:16:59.860Z},
read = {false},
starred = {false},
authored = {true},
confirmed = {true},
hidden = {false},
citation_key = {Furstenau2014},
source_type = {CONF},
private_publication = {false},
abstract = {Shadow IT is becoming increasingly important as digital work practices make it easier than ever for business units crafting their own IT solutions. Prior research on shadow IT systems has often used fixed accounts of good or evil: They have been celebrated as powerful drivers of innovation or demonized as lacking central governance. We introduce a method to IT managers and architects enabling a more nuanced understanding of shadow IT systems with respect to their architectural embeddedness. Drawing on centrality measures from network analysis, the method portrays shadow IT systems as most critical if they hold a central position in a network of applications and information flows. We use enterprise architecture data from a recycling company to demonstrate and evaluate the method in a real project context. In the example, several critical and yet disregarded shadow IT systems have been identified and measures were taken to govern them decently.},
bibtype = {inproceedings},
author = {Furstenau, Daniel and Rothe, Hannes},
booktitle = {Proceedings of the 22nd European Conference on Information Systems}
}
Downloads: 0
{"_id":"kGDtDoGecSn7XkCji","bibbaseid":"furstenau-rothe-shadowitsystemsdiscerningthegoodandtheevil-2014","author_short":["Furstenau, D.","Rothe, H."],"bibdata":{"title":"Shadow it systems: Discerning the good and the evil","type":"inproceedings","year":"2014","keywords":"Centrality measures,Design science research,IS architectures,Network analysis,Shadow IT systems","pages":"1 - 14","publisher":"Association for Information Systems","city":"Tel Aviv, Israel","id":"e7a3cb32-185d-3506-9b4f-56c97ecd81cd","created":"2018-05-23T10:16:59.860Z","file_attached":false,"profile_id":"4d6e333c-c37d-3ec7-8c04-1f45c312e278","last_modified":"2018-05-23T10:16:59.860Z","read":false,"starred":false,"authored":"true","confirmed":"true","hidden":false,"citation_key":"Furstenau2014","source_type":"CONF","private_publication":false,"abstract":"Shadow IT is becoming increasingly important as digital work practices make it easier than ever for business units crafting their own IT solutions. Prior research on shadow IT systems has often used fixed accounts of good or evil: They have been celebrated as powerful drivers of innovation or demonized as lacking central governance. We introduce a method to IT managers and architects enabling a more nuanced understanding of shadow IT systems with respect to their architectural embeddedness. Drawing on centrality measures from network analysis, the method portrays shadow IT systems as most critical if they hold a central position in a network of applications and information flows. We use enterprise architecture data from a recycling company to demonstrate and evaluate the method in a real project context. In the example, several critical and yet disregarded shadow IT systems have been identified and measures were taken to govern them decently.","bibtype":"inproceedings","author":"Furstenau, Daniel and Rothe, Hannes","booktitle":"Proceedings of the 22nd European Conference on Information Systems","bibtex":"@inproceedings{\n title = {Shadow it systems: Discerning the good and the evil},\n type = {inproceedings},\n year = {2014},\n keywords = {Centrality measures,Design science research,IS architectures,Network analysis,Shadow IT systems},\n pages = {1 - 14},\n publisher = {Association for Information Systems},\n city = {Tel Aviv, Israel},\n id = {e7a3cb32-185d-3506-9b4f-56c97ecd81cd},\n created = {2018-05-23T10:16:59.860Z},\n file_attached = {false},\n profile_id = {4d6e333c-c37d-3ec7-8c04-1f45c312e278},\n last_modified = {2018-05-23T10:16:59.860Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Furstenau2014},\n source_type = {CONF},\n private_publication = {false},\n abstract = {Shadow IT is becoming increasingly important as digital work practices make it easier than ever for business units crafting their own IT solutions. Prior research on shadow IT systems has often used fixed accounts of good or evil: They have been celebrated as powerful drivers of innovation or demonized as lacking central governance. We introduce a method to IT managers and architects enabling a more nuanced understanding of shadow IT systems with respect to their architectural embeddedness. Drawing on centrality measures from network analysis, the method portrays shadow IT systems as most critical if they hold a central position in a network of applications and information flows. We use enterprise architecture data from a recycling company to demonstrate and evaluate the method in a real project context. In the example, several critical and yet disregarded shadow IT systems have been identified and measures were taken to govern them decently.},\n bibtype = {inproceedings},\n author = {Furstenau, Daniel and Rothe, Hannes},\n booktitle = {Proceedings of the 22nd European Conference on Information Systems}\n}","author_short":["Furstenau, D.","Rothe, H."],"biburl":"https://bibbase.org/service/mendeley/4d6e333c-c37d-3ec7-8c04-1f45c312e278","bibbaseid":"furstenau-rothe-shadowitsystemsdiscerningthegoodandtheevil-2014","role":"author","urls":{},"keyword":["Centrality measures","Design science research","IS architectures","Network analysis","Shadow IT systems"],"metadata":{"authorlinks":{}},"downloads":0},"bibtype":"inproceedings","biburl":"https://bibbase.org/service/mendeley/4d6e333c-c37d-3ec7-8c04-1f45c312e278","dataSources":["2252seNhipfTmjEBQ"],"keywords":["centrality measures","design science research","is architectures","network analysis","shadow it systems"],"search_terms":["shadow","systems","discerning","good","evil","furstenau","rothe"],"title":"Shadow it systems: Discerning the good and the evil","year":2014}