References
- Abedin, B., & Jafarzadeh, H. (2015, January). Relationship development with customers on facebook: A critical success factors model. In Proceedings of the 48th hawaii international conference on system sciences (pp. 1889–1898). Kauai, HI: IEEE.
- Ahuja, S., & Gallupe, B. (2015, August). A Foundation for the Study of Personal Cloud Computing in Organizations. In AMCIS.
- Alhassan, I., Sammon, D., & Daly, M. (2019). Critical success factors for data governance: A theory building approach. Information Systems Management, 36(2), 98–110. https://doi.org/https://doi.org/10.1080/10580530.2019.1589670
- Andriole, S. J. (2015). Who owns IT?. Communications of the Association for Information Systems, 58(3), 50–57. DOI:https://doi.org/10.1145/2660765
- Ashja, M., Hadizadeh Moghadam, A., & Bidram, H. (2015). Comparative study of large information systems’ CSFs during their life cycle. Information Systems Frontiers, 17(3), 619–628. https://doi.org/https://doi.org/10.1007/s10796-013-9445-6
- Axelsson, K., Melin, U., & Söderström, F. (2011, June). Analyzing Best Practice and Critical Success Factors in a Health Information System Case – Are There Any Shortcuts to Successful It Implementation? (pp. 09–11). In ECIS.
- Behrens, S. (2009). Shadow systems: the good, the bad and the ugly. Communications of the Association for Information Systems, 52(2), 124–129. DOI: https://doi.org/10.1145/1461928.1461960
- Behrens, S., & Sedera, W. (2004, July). Why Do Shadow Systems Exist after an ERP Implementation? Lessons from a Case Study. In : Proceedings of the 8th Pacific Asia Conference on Information Systems. PACIS. Shanghai, 8–11 July 2004, pp. 1713–1726.
- Benbasat, I., Goldstein, D. K., & Mead, M. (1987). The case research strategy in studies of information systems. MIS Quarterly, 11(3), 369–386. https://doi.org/https://doi.org/10.2307/248684
- Bendor-Samuel, P. (2017). How to eliminate enterprise shadow IT. https://www.cio.com/article/3188726/it-industry/how-to-eliminate-enterprise-shadow-it.html
- Boynton, A. C., & Zmud, R. W. (1984). An assessment of critical success factors. Sloan Management Review, 25(4), 17–27. https://www.researchgate.net/publication/282370599_An_Assessment_of_Critical_Success_Factors
- Buchwald, A., & Urbach, N. (2014). Implikationen von inoffiziellen Projekten für die IT-Governance. HMD Praxis der Wirtschaftsinformatik, 51(3), 319–329. https://doi.org/https://doi.org/10.1365/s40702-014-0048-6
- Bullen, C. V., & Rockart, J. F. (1981). A Primer on Critical Success Factors. In Center for Information Systems Research No. 69.
- Butler, T., & Fitzgerald, B. (1999). Unpacking the systems development process: an empirical application of the CSF concept in a research context. Journal of Strategic Information Systems, 8(4), 351–371. https://doi.org/https://doi.org/10.1016/S0963-8687(00)00027-5
- Bygstad, B. (2017). Generative innovation: A comparison of lightweight and heavyweight IT. Journal of Information Technology, 32(2), 180–193. https://doi.org/https://doi.org/10.1057/jit.2016.15
- Cambridge Dictionary. (n.d.). It takes two to tango. Cambridge University Press. Retrieved from February 28, 2021. https://dictionary.cambridge.org/
- Chow, T., & Cao, D. ‑. B. (2008). A survey study of critical success factors in agile software projects. Journal of Systems and Software, 81(6), 961–971. https://doi.org/https://doi.org/10.1016/j.jss.2007.08.020
- Chua, C. E. H., & Storey, V. C. (2016). Bottom-up enterprise information systems. Communications of the Association for Information Systems, 60(1), 66–72. DOI:https://doi.org/10.1145/2950044
- Chua, C. E. H., Storey, V. C., & Chen, L. (2014, December). Central IT or Shadow IT? Factors Shaping Users’ Decision to Go Rogue with IT. In ICIS.
- Corbin, J. M., & Strauss, A. L. (2015). Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory (4th ed.). SAGE Publications.
- Creswell, J. W. (2014). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches (4th ed.). SAGE Publications.
- Davison, R. M., & Ou, C. X. (2015, August). Subverting Organisational IT Policy: A Case in China. In AMCIS.
- Davison, R. M., Ou, C. X., & Chang, Y. (2018). Subverting Organisational IS policy with feral systems: A case in China. Industrial Management & Data Systems, 118(3), 570–588. https://doi.org/https://doi.org/10.1108/IMDS-04-2017-0153
- Eisenhardt, K. M., & Graebner, M. E. (2007). Theory building from cases: opportunities and challenges. Academy of Management Journal, 50(1), 25–32. https://doi.org/https://doi.org/10.5465/amj.2007.24160888
- Esteves, J. M. (2004). Definition and analysis of critical success factors for ERP implementation projects. [Doctoral Dissertation]. Universitat Politècnica de Catalunya. http://byzest.com/Tesis_phd_jesteves.pdf
- Ferneley, E. H. (2007). Covert end user development: A study of success. Journal of Organizational and End User Computing, 19(1), 62–71. https://doi.org/https://doi.org/10.4018/joeuc.2007010104
- Fürstenau, D., & Rothe, H. (2014, June). Shadow IT Systemes: Discerning the Good and the Evil. In ECIS.
- Fürstenau, D., Rothe, H., & Sandner, M. (2017). Shadow systems, risk, and shifting power relations in Organizations. Communications of the Association for Information Systems, 41, 43–61. https://doi.org/https://doi.org/10.17705/1CAIS.04103
- Fürstenau, D., Rothe, H., & Sandner, M. (2020). Leaving the shadow: A configurational approach to explain post-identification outcomes of shadow it systems. Business & Information Systems Engineering, 63, 97–111. https://doi.org/https://doi.org/10.1007/s12599-020-00635-2
- Fürstenau, D., Rothe, H., Sandner, M., & Anapliotis, D. (2016, August). Shadow IT, Risk, and Shifting Power Relations in Organizations. In AMCIS.
- Fürstenau, D., Sandner, M., & Anapliotis, D. (2016, June). Why do Shadow Systems Fail? An Expert Study on Determinants of Discontinuation. In : Proceedings of the 24th European Conference on Information Systems. ECIS. Istanbul, 12–15 June 2016, pp. 1–16
- Gartner (2016): Coming to Terms with Business Unit IT to Prepare for Digital Business. Available online at https://www.gartner.com/en/documents/3288932/coming-to-terms-with-business-unit-it-to-prepare-for-dig,checkedon8/28/2018
- Gibbert, M., & Ruigrok, W. (2010). The “What” and “How” of case study rigor: three strategies based on published work. Organizational Research Methods, 13(4), 710–737. https://doi.org/https://doi.org/10.1177/1094428109351319
- GlobalNewswire. (2019). Enterprise IT focused on moving more workloads to cloud in 2019. https://globenewswire.com/news-release/2019/01/17/1701128/0/en/enterprise-it-focused-on-moving-more-workloads-to-cloud-in-2019.html
- Gregory, R. W., Kaganer, E., Henfridsson, O., & Ruch, T. J. (2018). IT consumerization and the transformation of IT governance. MIS Quarterly, 42(4), 1225–1253. DOI: https://doi.org/10.25300/MISQ/2018/13703
- Guillemette, M. G., & Paré, G. (2012). Toward a new theory of the contribution of the IT function in Organizations. MIS Quarterly, 36(2), 529–551. https://doi.org/https://doi.org/10.2307/41703466
- Györy, A., Cleven, A., Uebernickel, F., & Brenner, W. (2012, June). Exploring the Shadows: IT Governance Approaches to User-driven Innovation. In ECIS.
- Haag, S. (2015, March). Appearance of Dark Clouds? – An Empirical Analysis of Users’ Shadow Sourcing of Cloud Services. In WI.
- Haag, S., & Eckhardt, A. (2014, December). Normalizing the Shadows – The Role of Symbolic Models for Individuals’ Shadow IT Usage. In ICIS.
- Haag, S., Eckhardt, A., & Bozoyan, C. (2015, December). Are Shadow System Users the Better IS Users? – Insights of a Lab Experiment. In ICIS.
- Harvey Nash/KPMG. (2019). Harvey nash/KPMG CIO survey 2019. Harvey Nash, KPMG. https://www.hnkpmgciosurvey.com/executive-summary.php
- Jones, D., Behrens, S., Jamieson, K., & Tansley, E. (2004, December). The Rise and Fall of a Shadow System: Lessons for Enterprise System Implementation. In ACIS.
- Kappelman, L., Johnson, V., Torres, R., Maurer, C., & McLean, E. R. (2019). A study of information systems issues, practices, and leadership in Europe. European Journal of Information Systems, 28(1), 26–42. https://doi.org/https://doi.org/10.1080/0960085X.2018.1497929
- Khalil, S., Winkler, T. J., & Xiao, X. (2017, December). Two Tales of Technology: Business and IT Managers’ Technological Frames Related to Cloud Computing. In ICIS.
- Klotz, S. (2019). Shadow IT and Business-Managed IT: Where Is the Theory? In. 2019 IEEE 21st Conference on Business Informatics (CBI) (pp. 286–295). IEEE
- Klotz, S., Kopper, A., Westner, M., & Strahringer, S. (2019). Causing Factors, Outcomes, and Governance of Shadow IT and Business-managed IT: A Systematic Literature Review. International Journal of Information Systems and Project Management,7(1), 15–43. http://www.sciencesphere.org/ijispm/archive/ijispm-070102.pdf
- Klotz, S., Westner, M., & Strahringer, S. (2020, June). From Shadow IT to Business-managed IT and Back Again: How Responsibility for IT Instances Evolves Over Time. In. Proceedings of the 24th Pacific Asia Conference on Information Systems
- Klotz, S., Westner, M., Strahringer, S., & Schieder, C. (2019). Transformed Knowledge Sharing Through Business-managed IT and Shadow IT. In. Proceedings of the 25th Americas Conference on Information Systems.
- Kobus, J., & Westner, M. (2016, April). Ranking-type delphi studies in IS research: step-by-step guide and analytical extension. In M. B. Nunes, P. Isaías, & P. Powell ( Chairs), Proceedings of the 9th IADIS international conference of information systems, Vilamoura.
- Kopper, A. (2017, August). Perceptions of IT Managers on Shadow IT. In AMCIS.
- Kopper, A., Fürstenau, D., Zimmermann, S., Rentrop, C., Rothe, H., Strahringer, S., & Westner, M. (2018, June). Business-managed IT: A Conceptual Framework and Empirical Illustration. In ECIS.
- Kopper, A., Klotz, S., Westner, M., & Strahringer, S. (2019). Shadow IT and Business-managed IT: Practitioner Perceptions and Their Comparison to Literature. Journal of Information Technology Management, XXX(4), 1–25
- Kopper, A., Westner, M., & Strahringer, S. (2017). Kontrollierte Nutzung von Schatten-IT. HMD Praxis der Wirtschaftsinformatik, 54(1), 97–110. https://doi.org/https://doi.org/10.1365/s40702-016-0286-x
- Kopper, A., Westner, M., & Strahringer, S. (2020). From shadow IT to business-managed IT: A qualitative comparative analysis to determine configurations for successful management of IT by business entities. Information Systems and E-Business Management, 18(2), 209–257. https://doi.org/https://doi.org/10.1007/s10257-020-00472-6
- Lam, W. (2005). Investigating success factors in enterprise application integration: A case-driven analysis. European Journal of Information Systems, 14(2), 175–187. https://doi.org/https://doi.org/10.1057/palgrave.ejis.3000530
- Leyh, C., & Sander, P. (2015). Critical Success Factors for ERP System Implementation Projects: An Update of Literature Reviews. In D. Sedera, N. Gronau, & M. Sumner (Eds.), Enterprise Systems. Strategic, Organizational, and Technological Dimensions (pp. 45–67). DOI: https://doi.org/10.1007/978-3-319-17587-43
- Li, X., Wang, X., & Xiao, G. (2019). A comparative study of rank aggregation methods for partial and top ranked lists in genomic applications. Briefings in Bioinformatics, 20(1), 178–189. https://doi.org/https://doi.org/10.1093/bib/bbx101
- Lin, S. (2010). Rank aggregation methods. WIREs Computational Statistics, 2(5), 555–570. https://doi.org/https://doi.org/10.1002/wics.111
- Magal, S. R., Carr, H. H., & Watson, H. J. (1988). Critical success factors for information center managers. MIS Quarterly, 12(3), 413–425. https://doi.org/https://doi.org/10.2307/249208
- Mallmann, G. L., Maçada, A. C. G., & Oliveira, M. (2018). The influence of shadow IT usage on knowledge sharing: an exploratory study with IT users. Business Information Review, 35(1), 17–28. https://doi.org/https://doi.org/10.1177/0266382118760143
- Miles, M. B., Huberman, A. M., & Saldaña, J. (2014). Qualitative Data Analysis: A Methods Sourcebook (3rd ed.). SAGE Publications.
- Myers, M. D., & Newman, M. (2007). The qualitative interview in IS research: examining the craft. Information and Organization, 17(1), 2–26. https://doi.org/https://doi.org/10.1016/j.infoandorg.2006.11.001
- Ologeanu-Taddei, R., Wessel, L., & Bourdon, I. (2019, December). Persistent Paradoxes in Pluralistic Organizations: A Case Study of Continued Use of Shadow-IT in a French Hospital. In ICIS.
- Ortbach, K., Köffer, S., Bode, M., & Niehaves, B. (2013, December). Individualization of Information Systems - Analyzing Antecedents of IT Consumerization Behavior. In ICIS.
- Pan, S. L., & Tan, B. (2011). Demystifying case research: A structured–pragmatic–situational (SPS) approach to conducting case studies. Information and Organization, 21(3), 161–176. https://doi.org/https://doi.org/10.1016/j.infoandorg.2011.07.001
- Peppard, J. (2005, December). The Application of the Viable Systems Model to Information Technology Governance. In ICIS.
- Peppard, J. (2016). Rethinking the concept of the Is Organization. Information Systems Journal, 28(1), 76–103. https://doi.org/https://doi.org/10.1111/isj.12122
- Poon, P., & Wagner, C. (2001). Critical success factors revisited: success and failure cases of information systems for senior executives. Decision Support Systems, 30(4), 393–418. https://doi.org/https://doi.org/10.1016/S0167-9236(00)00069-5
- Raković, L. (2019). A framework for managing spreadsheet-based end user applications. International Journal of Management and Decision Making, 18 (1), 76. Article 96695. https://doi.org/https://doi.org/10.1504/IJMDM.2019.096695
- Remus, U., & Wiener, M. (2010). A multi-method, holistic strategy for researching critical success factors in IT projects. Information Systems Journal, 20(1), 25–52. https://doi.org/https://doi.org/10.1111/j.1365-2575.2008.00324.x
- Rentrop, C., Zimmermann, S., & Huber, M. (2015). Schatten-IT – Ein unterschätztes Risiko?. In Proceedings of the D∙A∙CH security conference.
- Rockart, J. F. (1979). Chief executives define their own data needs. Harvard Business Review, 57 (2), 81–93. https://hbr.org/1979/03/chief-executives-define-their-own-data-needs.
- Segal, M. (2016). Dealing with the realities of shadow IT. Data Center Journal. http://www.datacenterjournal.com/dealing-realities-shadow
- Shah, M. H., Braganza, A., & Morabito, V. (2007). A survey of critical success factors in e-banking: an Organisational perspective. European Journal of Information Systems, 16(4), 511–524. https://doi.org/https://doi.org/10.1057/palgrave.ejis.3000693
- Silic, M., & Back, A. (2014). Shadow IT – A view from behind the curtain. Computers & Security, 45, 274–283. https://doi.org/https://doi.org/10.1016/j.cose.2014.06.007
- Silic, M., Silic, D., & Oblakovic, G. (2016). Influence of shadow IT on innovation in Organizations. Complex Systems Informatics and Modeling Quarterly, (8), 68–80. https://doi.org/https://doi.org/10.7250/csimq.2016-8.06
- Singh, H. (2015, July). Emergence and Consequences of Drift in Organizational Information Systems. In PACIS.
- Spierings, A., Kerr, D. V., & Houghton, L. (2012, December). What Drives the End User to Build a Feral Information System?. In ACIS.
- Spierings, A., Kerr, D. V., & Houghton, L. (2017). Issues that support the creation of ICT workarounds: towards a theoretical understanding of feral information systems. Information Systems Journal, 27(6), 775–794. https://doi.org/https://doi.org/10.1111/isj.12123
- Urbach, N., & Ahlemann, F. (2016). Schatten-IT als gelebte Praxis – IT-Innovationen werden in interdisziplinären Teams in den Fachabteilungen erarbeitet. In N. Urbach & F. Ahlemann (Eds.), IT-Management im Zeitalter der Digitalisierung (pp. 67–75). Springer.
- Urbach, N., & Ahlemann, F. (2019). IT Management in the Digital Age: A Roadmap for the IT Department of the Future. Springer. https://doi.org/https://doi.org/10.1007/978-3-319-96187-3.
- Walterbusch, M., Fietz, A., & Teuteberg, F. (2014). Schatten-IT: implikationen und handlungsempfehlungen für mobile security. HMD Praxis der Wirtschaftsinformatik, 51(1), 24–33. https://doi.org/https://doi.org/10.1365/s40702-014-0006-3
- Walterbusch, M., Fietz, A., & Teuteberg, F. (2017). Missing cloud security awareness: investigating risk exposure in shadow IT. Journal of Enterprise Information Management, 30(4), 644–665. https://doi.org/https://doi.org/10.1108/JEIM-07-2015-0066
- Webster, J., & Watson, R. T. (2002). Analyzing the past to prepare for the future: writing a literature review. MIS Quarterly, 26(2), xiii–xxiii. https://www.jstor.org/stable/4132319
- Weill, P., & Ross, J. W. (2004). IT Governance: How Top Performers Manage IT Decision Rights for Superior Results. Harvard Business School Press.
- Williams, J. J., & Ramaprasad, A. (1996). A taxonomy of critical success factors. European Journal of Information Systems, 5(4), 250–260. https://doi.org/https://doi.org/10.1057/ejis.1996.30
- Winkler, T. J., & Brown, C. V. (2013). Horizontal allocation of decision rights for on-premise applications and software-as-a-service. Journal of Management Information Systems, 30(3), 13–48. https://doi.org/https://doi.org/10.2753/MIS0742-1222300302
- Yang, J., Shen, G. Q., Drew, D. S., & Ho, M. (2010). Critical success factors for stakeholder management: construction practitioners’ perspectives. Journal of Construction Engineering and Management, 136(7), 778–786. https://doi.org/https://doi.org/10.1061/(ASCE)CO.1943-7862.0000180
- Yin, R. K. (2018). Case Study Research and Applications: Design and Methods (6th ed.). SAGE Publications.
- Zimmermann, S., Rentrop, C., & Felden, C. (2016a, July). Governing IT activities in business workgroups—design principles for a method to control identified shadow IT. In W. Abramowicz, R. Alt, & B. Franczyk (Eds.), Lecture notes in business information processing: vol. 255, business information systems: 19th international conference (pp. 252–264). Springer.
- Zimmermann, S., & Rentrop, C. (2014, June). On the Emergence of Shadow IT - A Transaction Cost-based Approach. In ECIS.
- Zimmermann, S., & Rentrop, C. (2012). Schatten-IT. HMD Praxis der Wirtschaftsinformatik, 49(6), 60–68. https://doi.org/https://doi.org/10.1007/BF03340758
- Zimmermann, S., Rentrop, C., & Felden, C. (2016b, August). Governing Identified Shadow IT by Allocating IT Task Responsibilities. In AMCIS.
- Zimmermann, S., Rentrop, C., & Felden, C. (2014, August). Managing Shadow IT Instances – A Method to Control Autonomous IT Solutions in the Business Departments. In AMCIS.
- Zimmermann, S., Rentrop, C., & Felden, C. (2017). A multiple case study on the nature and management of shadow information technology. Journal of Information Systems, 31(1), 79–101. https://doi.org/https://doi.org/10.2308/isys-51579