

References
Alter S (2014) Theory of workarounds. Commun Assoc Inf Syst 34:1041–1066
Brown CV, Magill SL (1994) Alignment of the IS functions with the enterprise: toward a model of antecedents. MIS Q 18:371
Burton-Jones A, Straub D (2006) Reconceptualizing system usage: an approach and empirical test. Inf Syst Res 17:228–246
Corbin K (2015) CIOs vastly underestimate extent of shadow IT. http://www.cio.com/article/2968281/cio-role/cios-vastly-underestimate-extent-of-shadow-it.html. Accessed 17 Apr 2016
Ferneley EH, Sobreperez P (2006) Resist, comply or workaround? An examination of different facets of user engagement with information systems. Eur J Inf Syst 15:345–356
Fürstenau D, Rothe H (2014) Shadow IT systems: discerning the good and the evil. In: Proceedings of the 22nd European Conference on Information Systems. Tel Aviv
Györy A, Cleven A, Uebernickel F, Brenner W (2012) Exploring the shadows: IT governance approaches to user-driven innovation. In: Proceedings of the 20th European Conference on Information Systems. Barcelona
Haag S, Eckhardt A, Bozoyan C (2015) Are shadow system users the better IS users? Insights of a lab experiment. In: Proceedings of the 36th International Conference on Information Systems. Fort Worth
Harris J, Ives B, Junglas I (2012) IT consumerization: when gadgets turn into enterprise IT tools. MIS Q Exec 11:99–112
Horlach B, Drews P, Schirmer I, Böhmann T (2017) Increasing the agility of IT delivery: five types of bimodal IT organization. In: Proceedings of the 50th Hawaii International Conference on System Sciences. Big Island, Hawaii
Köffer S, Ortbach K, Junglas I, Niehaves B, Harris J (2015) Innovation through BYOD? Bus Inf Syst Eng 57:363–375
Liang H, Xue Y, Wu L (2013) Ensuring employees’ IT compliance: carrot or stick? Inf Syst Res 24:279–294
Martin AW, Lopez SH, Roscigno VJ, Hodson R (2013) Against the rules: synthesizing types and processes of bureaucratic rule-breaking. Acad Manag Rev 38:550–574
Segal M (2016) Dealing with the realities of shadow IT. In: Datacenter J. http://www.datacenterjournal.com/dealing-realities-shadow/. Accessed 22 Nov 2016
Silic M, Back A (2014) Shadow IT–a view from behind the curtain. Comput Secur 45:274–283
Sun H (2012) Understanding user revisions when using information system features: adaptive system use and triggers. MIS Q 36:453–478
Urbach N, Ahlemann F (2016) Schatten-IT als gelebte Praxis–IT-Innovationen werden in interdisziplinären Teams in den Fachabteilungen erarbeitet. In: Urbach N, Ahlemann F (eds) IT-Management im Zeitalter der Digitalisierung. Springer, Heidelberg, pp 67–75
Zimmermann S, Rentrop C, Felden C (2016) Governing identified shadow IT by allocating IT task responsibilities. In: Proceedings of the 22nd Americas Conference on Information Systems. San Diego
Author information
Authors and Affiliations
Corresponding author
Additional information
Accepted after two revisions by Prof. Dr. Weinhardt.
Rights and permissions
About this article
Cite this article
Haag, S., Eckhardt, A. Shadow IT. Bus Inf Syst Eng 59, 469–473 (2017). https://doi.org/10.1007/s12599-017-0497-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12599-017-0497-x