What Happens to Shadow IT? (Fürstenau et al 2020)
Listen now
Description
Sometimes people set up their own IT systems outside of what is officially supported by the IT department. When these IT systems are revealed, what happens to them? Fürstenau D., Rothe H. & Sandner M. (2020), Leaving the Shadow: A Configurational Approach to Explain Post-Identification Outcomes of Shadow IT Systems’, Business & Information Systems Engineering, https://doi.org/10.1007/s12599-020-00635-2
More Episodes
Digital technology as a boundary object for making sense of time and temporality in hybrid work. Griva, A., Chandra Kruse, L., Hattinger, M., Högberg, K., Pappas, I. O., & Conboy, K. (2024). Making space for time: Strategies for the design of time‐aware hybrid work. Information Systems...
Published 08/31/24
Published 08/31/24
Five principles that help us develop situated explanations. Grisold, T., Kremser, W., Mendling, J., Recker, J., Vom Brocke, J., & Wurm, B. (2024). Generating impactful situated explanations through digital trace data. Journal of Information Technology, 39(1), 2-18....
Published 08/17/24