{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T04:40:49Z","timestamp":1773204049084,"version":"3.50.1"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T00:00:00Z","timestamp":1583712000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T00:00:00Z","timestamp":1583712000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Bus Inf Syst Eng"],"published-print":{"date-parts":[[2021,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>With the advent of end-user and cloud computing, business users can implement information systems for work practices on their own \u2013 either from scratch or as extensions to existing systems. The resulting information systems, however, often remain hidden from managers and official IT units, and are therefore called \u201cshadow IT systems\u201d. When a shadow IT system is identified, the organization has to decide on the future of this system. The study uses a configurational perspective to explain outcomes of shadow IT system identification, as well as the mechanisms and contextual conditions which bring them about. For this purpose, 27 profiles of shadow IT systems were compiled by conducting 35 interviews with respondents from different positions and industries. The analysis gives insight into six distinct context-mechanism-outcome configurations explaining four outcomes that occur after shadow IT system identification, namely phase-out, replacement, continuing as IT-managed system, and continuing as business-managed system. These results contribute to the shadow IT literature and, more broadly, IS architecture and governance streams of the IS literature. They inform IT managers when these weigh decision options for identified shadow IT systems given different contextual conditions.<\/jats:p>","DOI":"10.1007\/s12599-020-00635-2","type":"journal-article","created":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T14:03:19Z","timestamp":1583762599000},"page":"97-111","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Leaving the Shadow: A Configurational Approach to Explain Post-identification Outcomes of Shadow IT Systems"],"prefix":"10.1007","volume":"63","author":[{"given":"Daniel","family":"F\u00fcrstenau","sequence":"first","affiliation":[]},{"given":"Hannes","family":"Rothe","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Sandner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,9]]},"reference":[{"key":"635_CR1","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1287\/isre.2015.0595","volume":"26","author":"R Agarwal","year":"2015","unstructured":"Agarwal R, Tiwana A (2015) Editorial \u2013 Evolvable systems: through the looking glass of IS. Inf Syst Res 26:473\u2013479","journal-title":"Inf Syst Res"},{"key":"635_CR2","first-page":"1041","volume":"34","author":"S Alter","year":"2014","unstructured":"Alter S (2014) Theory of workarounds. Commun Assoc Inf Syst 34:1041\u20131066","journal-title":"Commun Assoc Inf Syst"},{"key":"635_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.5465\/amr.2003.8925191","volume":"28","author":"M Alvesson","year":"2003","unstructured":"Alvesson M (2003) Beyond neopositivisits, romantics and localists: a reflective approach to interviews in organizational research. Acad Manag Rev 28:13\u201333","journal-title":"Acad Manag Rev"},{"key":"635_CR4","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1287\/orsc.1070.0306","volume":"18","author":"S Aral","year":"2007","unstructured":"Aral S, Weill P (2007) IT Assets, organizational capabilities, and firm performance: how resource allocations and organizational differences explain performance variation. Organ Sci 18:763\u2013780","journal-title":"Organ Sci"},{"key":"635_CR5","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1145\/1461928.1461960","volume":"52","author":"S Behrens","year":"2009","unstructured":"Behrens S (2009) Shadow systems: the good, the bad and the ugly. Commun ACM 52:124\u2013129","journal-title":"Commun ACM"},{"key":"635_CR6","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1057\/s41303-017-0047-0","volume":"27","author":"A Bhattacherjee","year":"2018","unstructured":"Bhattacherjee A, Davis CJ, Connolly AJ, Hikmet N (2018) User response to mandatory IT use: a coping theory perspective. Eur J Inf Syst 27:395\u2013414","journal-title":"Eur J Inf Syst"},{"key":"635_CR7","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1057\/jit.2015.13","volume":"31","author":"B Bygstad","year":"2016","unstructured":"Bygstad B, Munkvold BE, Volkoff O (2016) Identifying generative mechanisms through affordances: a framework for critical realist data analysis. J Inf Technol 31:83\u201396","journal-title":"J Inf Technol"},{"key":"635_CR8","doi-asserted-by":"publisher","first-page":"35","DOI":"10.4135\/9781452226552.n2","volume-title":"Handbook of narrative inquiry: mapping a methodology","author":"DJ Clandinin","year":"2007","unstructured":"Clandinin DJ, Rosiek J (2007) Mapping a landscape of qualitative inquiry: borderline spaces and tensions. In: Clandinin DJ (ed) Handbook of narrative inquiry: mapping a methodology. Sage, Thousand Oaks, pp 35\u201376"},{"key":"635_CR9","first-page":"848","volume":"20","author":"MJ Culnan","year":"2019","unstructured":"Culnan MJ (2019) Policy to avoid a privacy disaster. J Assoc Inf Syst 20:848\u2013856","journal-title":"J Assoc Inf Syst"},{"key":"635_CR10","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1287\/isre.1100.0326","volume":"21","author":"OA El Sawy","year":"2010","unstructured":"El Sawy OA, Malhotra A, Park YK, Pavlou PA (2010) Seeking the configurations of digital ecodynamics: it takes three to tango. Inf Syst Res 21:835\u2013848","journal-title":"Inf Syst Res"},{"key":"635_CR11","doi-asserted-by":"publisher","first-page":"1180","DOI":"10.5465\/amr.2007.26586092","volume":"32","author":"PC Fiss","year":"2007","unstructured":"Fiss PC (2007) A set-theoretical approach to organizational configurations. Acad Manag Rev 32:1180\u20131198","journal-title":"Acad Manag Rev"},{"key":"635_CR12","unstructured":"Fuerstenau D, Rothe H (2014) Shadow IT systems: discerning the good and the evil. In: Proceedings of the European Conference on Information Systems (ECIS) 2014, Tel Aviv, Israel"},{"key":"635_CR13","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/1795377.1795381","volume":"41","author":"B Furneaux","year":"2010","unstructured":"Furneaux B, Wade M (2010) The end of the information system life: a model of IS discontinuance. Data Base 41:45\u201369","journal-title":"Data Base"},{"key":"635_CR14","doi-asserted-by":"publisher","first-page":"573","DOI":"10.2307\/23042797","volume":"35","author":"B Furneaux","year":"2011","unstructured":"Furneaux B, Wade M (2011) An exploration of organizational level information systems discontinuance intentions. MIS Q 35:573\u2013598","journal-title":"MIS Q"},{"key":"635_CR15","first-page":"43","volume":"41","author":"D Furstenau","year":"2017","unstructured":"Furstenau D, Rothe H, Sandner M (2017) Shadow systems, risk, and shifting power relations in organizations. Commun Assoc Inf Syst 41:43\u201361","journal-title":"Commun Assoc Inf Syst"},{"key":"635_CR16","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/105783.105796","volume":"34","author":"JF George","year":"1991","unstructured":"George JF, King JL (1991) Examining the computing and centralization debate. Commun ACM 34:62\u201372","journal-title":"Commun ACM"},{"key":"635_CR17","unstructured":"Gozman D, Willcocks L (2015) Crocodiles in the regulatory swamp: navigating the dangers of outsourcing, SaaS and shadow IT. In: Proceedings of the International Conference on Information Systems (ICIS) 2015, Fort Worth, TX, USA"},{"key":"635_CR18","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1093\/icc\/6.2.247","volume":"6","author":"SM Greenstein","year":"1997","unstructured":"Greenstein SM (1997) Lock-in and the costs of switching mainframe computer vendors: what do buyers see? Ind Corp Change 6:247\u2013274","journal-title":"Ind Corp Change"},{"key":"635_CR19","first-page":"1225","volume":"42","author":"RW Gregory","year":"2018","unstructured":"Gregory RW, Kaganer E, Henfridsson O, Ruch TJ (2018) IT consumerization and the transformation of IT governance. MIS Q 42:1225\u20131253","journal-title":"MIS Q"},{"key":"635_CR20","unstructured":"Gy\u00f6ry A, Cleven A, Uebernickel F, Brenner W (2012) Exploring the shadows: IT governance approaches to user-driven innovation. In: Proceedings of the European Conference on Information Systems (ECIS) 2012, Barcelona, Spain"},{"key":"635_CR21","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s12599-017-0497-x","volume":"59","author":"S Haag","year":"2017","unstructured":"Haag S, Eckhardt A (2017) Shadow IT. Bus Inf Syst Eng 59:469\u2013473","journal-title":"Bus Inf Syst Eng"},{"key":"635_CR22","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1016\/j.im.2018.11.006","volume":"56","author":"S Haag","year":"2019","unstructured":"Haag S, Eckhardt A, Schwartz A (2019) The acceptance of justifications among shadow IT users and nonusers \u2013 an empirical analysis. Inf Manag 56:731\u2013741","journal-title":"Inf Manag"},{"key":"635_CR23","doi-asserted-by":"publisher","first-page":"3","DOI":"10.3102\/0013189X034002003","volume":"34","author":"B Harry","year":"2005","unstructured":"Harry B, Sturges KM, Klingner JK (2005) Mapping the process: an exemplar of process and challenge in grounded theory analysis. Educ Res 34:3\u201313","journal-title":"Educ Res"},{"key":"635_CR24","doi-asserted-by":"publisher","first-page":"907","DOI":"10.25300\/MISQ\/2013\/37.3.11","volume":"37","author":"O Henfridsson","year":"2013","unstructured":"Henfridsson O, Bygstad B (2013) The generative mechanisms of digital infrastructure evolution. MIS Q 37:907\u2013931","journal-title":"MIS Q"},{"key":"635_CR25","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1080\/07421222.2016.1267516","volume":"33","author":"S Henningsson","year":"2016","unstructured":"Henningsson S, Kettinger WJ (2016) Understanding information systems integration deficiencies in mergers and acquisitions: a configurational perspective. J Manag Inf Syst 33:942\u2013977","journal-title":"J Manag Inf Syst"},{"key":"635_CR26","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s12599-015-0373-5","volume":"57","author":"A Hoffmann","year":"2015","unstructured":"Hoffmann A, Schulz T, Zirfas J, Hoffmann H, Ro\u00dfnagel A, Leimeister JM (2015) Legal compatibility as a characteristic of sociotechnical systems. Bus Inf Syst Eng 57:103\u2013113","journal-title":"Bus Inf Syst Eng"},{"key":"635_CR27","first-page":"1","volume":"42","author":"M Huber","year":"2018","unstructured":"Huber M, Zimmermann S, Rentrop C, Felden C (2018) Conceptualizing shadow IT integration drawbacks from a systemic viewpoint. Systems 42:1\u201314","journal-title":"Systems"},{"key":"635_CR28","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s12599-015-0387-z","volume":"57","author":"S K\u00f6ffer","year":"2015","unstructured":"K\u00f6ffer S, Ortbach K, Junglas I, Niehaves B, Harris J (2015) Innovation through BYOD? Bus Inf Syst Eng 57:363\u2013375","journal-title":"Bus Inf Syst Eng"},{"key":"635_CR29","unstructured":"Kopper A (2017) Perceptions of IT managers on shadow IT. In: Proceedings of the Americas Conference on Information Systems (AMCIS) 2017, Boston, MA, USA"},{"key":"635_CR30","unstructured":"Kopper A, Westner M (2016) Towards a taxonomy for shadow IT. In: Proceedings of the Americas Conference on Information Systems (AMCIS) 2016, San Diego, CA, USA"},{"key":"635_CR31","doi-asserted-by":"publisher","first-page":"53","DOI":"10.4018\/IJITBAG.2018070104","volume":"9","author":"A Kopper","year":"2018","unstructured":"Kopper A, F\u00fcrstenau D, Zimmermann S et al (2018) Shadow IT and business-managed IT: conceptual framework and empirical illustration. Int J IT\/Bus Alignment Gov 9:53\u201371","journal-title":"Int J IT\/Bus Alignment Gov"},{"key":"635_CR32","first-page":"1001","volume":"19","author":"D Koutsikouri","year":"2018","unstructured":"Koutsikouri D, Lindgren R, Henfridsson O, Rudmark D (2018) Extending digital infrastructures: a typology of growth tactics. J Assoc Inf Syst 19:1001\u20131019","journal-title":"J Assoc Inf Syst"},{"key":"635_CR33","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1201\/1078\/43647.20.4.20030901\/77287.2","volume":"4","author":"J Luftman","year":"2003","unstructured":"Luftman J (2003) Assessing IT\/business alignment. Inf Syst Manag 4:9\u201315","journal-title":"Inf Syst Manag"},{"key":"635_CR34","unstructured":"L\u00fcker N, Winkler TJ, Kude T (2016) IT Consumerization and compliant use: do policies matter? In: Pacis 2016 proceedings"},{"key":"635_CR35","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1057\/ejis.2008.50","volume":"17","author":"K Lyytinen","year":"2008","unstructured":"Lyytinen K, Newman M (2008) Explaining information systems change: a punctuated socio-technical change model. Eur J Inf Syst 17:589\u2013613","journal-title":"Eur J Inf Syst"},{"key":"635_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1348\/000712600161646","volume":"91","author":"A Madill","year":"2000","unstructured":"Madill A, Jordan A, Shirley C (2000) Objectivity and reliability in qualitative analysis: realist, contextualist and radical constructionist epistemologies. Br J Psychol 91:1\u201320","journal-title":"Br J Psychol"},{"key":"635_CR37","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1145\/358141.358148","volume":"26","author":"ML Markus","year":"1983","unstructured":"Markus ML (1983) Power, politics, and MIS implementation. Commun ACM 26:430\u2013444","journal-title":"Commun ACM"},{"key":"635_CR38","doi-asserted-by":"publisher","first-page":"550","DOI":"10.5465\/amr.2011.0223","volume":"38","author":"AW Martin","year":"2013","unstructured":"Martin AW, Lopez SH, Roscigno VJ, Hodson R (2013) Against the rules: synthesizing types and processes of bureaucratic rule-breaking. Acad Manag Rev 38:550\u2013574","journal-title":"Acad Manag Rev"},{"key":"635_CR39","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s12599-018-0540-6","volume":"60","author":"C Matt","year":"2018","unstructured":"Matt C (2018) Fog computing. Bus Inf Syst Eng 60:351\u2013355","journal-title":"Bus Inf Syst Eng"},{"key":"635_CR40","doi-asserted-by":"publisher","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"RC Mayer","year":"1995","unstructured":"Mayer RC, Davis JH, Schoorman FD (1995) An integrative model of organizational trust. Acad Manag Rev 20:709\u2013734","journal-title":"Acad Manag Rev"},{"key":"635_CR41","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1057\/9780230244276_2","volume-title":"Interviewing experts","author":"M Meuser","year":"2009","unstructured":"Meuser M, Nagel U (2009) The expert interview and changes in knowledge production. In: Bogner A, Littig B, Menz W (eds) Interviewing experts. Palgrave Macmillan, Basingstoke, pp 17\u201342"},{"key":"635_CR42","doi-asserted-by":"publisher","first-page":"143","DOI":"10.2307\/20721418","volume":"34","author":"MG Morris","year":"2010","unstructured":"Morris MG, Venkatesh V (2010) Job characteristics and job satisfaction: understanding the role of enterprise resource planning system implementation. MIS Q 34:143\u2013161","journal-title":"MIS Q"},{"key":"635_CR43","first-page":"1469","volume":"34","author":"JK Nwankpa","year":"2014","unstructured":"Nwankpa JK, Roumani Y (2014) The influence of organizational trust and organizational mindfulness on ERP systems usage. Commun Assoc Inf Syst 34:1469\u20131492","journal-title":"Commun Assoc Inf Syst"},{"key":"635_CR44","first-page":"647","volume":"17","author":"RR Panko","year":"2006","unstructured":"Panko RR (2006) Spreadsheets and Sarbanes-Oxley: regulations, risks, and control frameworks. Commun Assoc Inf Syst 17:647\u2013676","journal-title":"Commun Assoc Inf Syst"},{"key":"635_CR45","first-page":"648","volume":"18","author":"Y Park","year":"2017","unstructured":"Park Y, El Sawy OA, Fiss PC (2017) The role of business intelligence and communication technologies in organizational agility: a configurational approach. J Assoc Inf Syst 18:648\u2013686","journal-title":"J Assoc Inf Syst"},{"key":"635_CR46","volume-title":"Realistic evaluation","author":"R Pawson","year":"1997","unstructured":"Pawson R, Tilly N (1997) Realistic evaluation. Sage, London"},{"key":"635_CR47","doi-asserted-by":"publisher","first-page":"21","DOI":"10.2307\/41410404","volume":"36","author":"GL Polites","year":"2012","unstructured":"Polites GL, Karahanna E (2012) Shackled to the status quo: the inhibiting effects of incumbent system habit, switching costs, and inertia on new system acceptance. MIS Q 36:21\u201342","journal-title":"MIS Q"},{"key":"635_CR48","unstructured":"Raden N (2005) Shedding light on shadow IT: is Excel running your business? Hired Brains, Santa Bararba. DSSResources.com. https:\/\/cioindex.com\/wpcontent\/uploads\/nm\/articlefiles\/69862-ShadowIT.pdf. Accessed 19 Jan 2020"},{"key":"635_CR50","doi-asserted-by":"publisher","DOI":"10.1525\/9780520957350","volume-title":"The comparative method: moving beyond qualitative and quantitative strategies","author":"CC Ragin","year":"2014","unstructured":"Ragin CC (2014) The comparative method: moving beyond qualitative and quantitative strategies. University of California Press, Oakland"},{"key":"635_CR500","unstructured":"Recker J (2014) Towards a theory of individual-level discontinuance of information systems use. In: Proceedings of the international conference on information systems (ICIS), Auckland, New Zealand"},{"key":"635_CR51","first-page":"41","volume":"17","author":"J Recker","year":"2016","unstructured":"Recker J (2016) Reasoning about discontinuance of information system use. J Inf Technol Theory Appl 17:41\u201366","journal-title":"J Inf Technol Theory Appl"},{"key":"635_CR52","doi-asserted-by":"publisher","first-page":"141","DOI":"10.25300\/MISQ\/2019\/13717","volume":"43","author":"MH Rezazade Mehrizi","year":"2019","unstructured":"Rezazade Mehrizi MH, Rodon Modol J, Zafar Mezhad M (2019) Intensifying to cease: unpacking the process of information systems discontinuance. MIS Q 43:141\u2013165","journal-title":"MIS Q"},{"key":"635_CR53","doi-asserted-by":"publisher","first-page":"393","DOI":"10.5465\/amr.1998.926617","volume":"23","author":"DM Rousseau","year":"1998","unstructured":"Rousseau DM, Sitkin SB, Burt RS, Camerer C (1998) Not so different after all: a cross- discipline view of trust. Acad Manag Rev 23:393\u2013404","journal-title":"Acad Manag Rev"},{"key":"635_CR54","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1057\/jit.2015.2","volume":"30","author":"F Schlosser","year":"2015","unstructured":"Schlosser F, Beimborn D, Weitzel T, Wagner H-T (2015) Achieving social alignment between business and IT \u2013 an empirical evaluation of the efficacy of IT governance mechanisms. J Inf Technol 30:119\u2013135","journal-title":"J Inf Technol"},{"key":"635_CR55","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.cose.2014.06.007","volume":"45","author":"M Silic","year":"2014","unstructured":"Silic M, Back A (2014) Shadow IT \u2013 a view from behind the curtain. Comput Secur 45:274\u2013283","journal-title":"Comput Secur"},{"key":"635_CR57","doi-asserted-by":"publisher","first-page":"277","DOI":"10.2307\/3250939","volume":"24","author":"EB Swanson","year":"2005","unstructured":"Swanson EB, Dans E (2005) System life expectancy and the maintenance effort: exploring their equilibration. MIS Q 24:277\u2013297","journal-title":"MIS Q"},{"key":"635_CR58","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1111\/isj.12070","volume":"25","author":"M Tarafdar","year":"2015","unstructured":"Tarafdar M, Gupta A, Turel O (2015) Special issue on \u2018dark side of information technology use\u2019: an introduction and a framework for research. Inf Syst J 25:161\u2013170","journal-title":"Inf Syst J"},{"key":"635_CR59","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s12599-018-0570-0","volume":"61","author":"N Urbach","year":"2019","unstructured":"Urbach N, Ahlemann F, B\u00f6hmann T, Drews P, Brenner W, Schaudel F, Sch\u00fctte R (2019) The impact of digitalization on the IT department. Bus Inf Syst Eng 61:123\u2013131","journal-title":"Bus Inf Syst Eng"},{"key":"635_CR60","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1108\/JEIM-07-2015-0066","volume":"30","author":"M Walterbusch","year":"2017","unstructured":"Walterbusch M, Fietz A, Teutenberg F (2017) Missing cloud security awareness: investigating risk exposure in shadow IT. J Enterp Inf Manag 30:644\u2013665","journal-title":"J Enterp Inf Manag"},{"key":"635_CR61","doi-asserted-by":"publisher","first-page":"73","DOI":"10.2307\/2391364","volume":"14","author":"RE Walton","year":"1969","unstructured":"Walton RE, Dutton JM (1969) The management of interdepartmental conflict: a model and review. Admin Sci Q 14:73\u201384","journal-title":"Admin Sci Q"},{"key":"635_CR62","first-page":"107","volume":"24","author":"CL Wilkin","year":"2010","unstructured":"Wilkin CL, Chenhall RH (2010) A review of IT governance: a taxonomy to inform accounting information systems. J Inf Syst 24:107\u2013146","journal-title":"J Inf Syst"},{"key":"635_CR63","unstructured":"Winkler TJ, Benlian A (2012) The dual role of IS specifity in governing software as a service. In: ICIS 2012 Proceedings"},{"key":"635_CR64","doi-asserted-by":"publisher","first-page":"13","DOI":"10.2753\/MIS0742-1222300302","volume":"30","author":"TJ Winkler","year":"2013","unstructured":"Winkler TJ, Brown CV (2013) Horizontal allocation of decision rights for on-premise applications and software-as-a-service. J Manag Inf Syst 30:13\u201348","journal-title":"J Manag Inf Syst"},{"key":"635_CR65","first-page":"57.1","volume-title":"Computing handbook","author":"TJ Winkler","year":"2014","unstructured":"Winkler TJ, Brown CV (2014) Organizing and configuring the IT function. In: Topi H, Tucker A (eds) Computing handbook, 3rd edn. Taylor & Francis, Boca Raton, pp 57.1\u201357.14","edition":"3"},{"key":"635_CR67","doi-asserted-by":"publisher","first-page":"67","DOI":"10.2307\/25148829","volume":"32","author":"Y Xue","year":"2008","unstructured":"Xue Y, Liang H, Boulton WR (2008) Information technology governance in information technology investment decision processes: the impact of investment characteristics, external environment, and internal context. MIS Q 32:67\u201396","journal-title":"MIS Q"},{"key":"635_CR68","unstructured":"Zainuddin E (2012) Secretly SaaS-ing: stealth adoption of software-as-a-service. In: Proceedings of the International Conference on Information Systems (ICIS) 2012, Orlando, FL, USA"},{"key":"635_CR69","unstructured":"Zimmermann S, Rentrop C, Felden C (2014) Managing shadow IT instances \u2013 a method to control autonomous IT solutions in the business departments. In: Proceedings of the Americas Conference on Information Systems (AMCIS) 2014, Savannah, GA, USA"},{"key":"635_CR70","unstructured":"Zimmermann S, Rentrop C, Felden C (2016) Governing identified shadow IT by allocating IT task responsibilities. In: Proceedings of the Americas Conference on Information Systems (AMCIS) 2016, San Diego, CA, USA"},{"key":"635_CR71","first-page":"79","volume":"31","author":"S Zimmermann","year":"2017","unstructured":"Zimmermann S, Rentrop C, Felden C (2017) A multiple case study on the nature and management of shadow information technology. J Inf Syst 31:79\u2013101","journal-title":"J Inf Syst"}],"container-title":["Business &amp; Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-020-00635-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12599-020-00635-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-020-00635-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,10]],"date-time":"2021-03-10T18:22:42Z","timestamp":1615400562000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12599-020-00635-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,9]]},"references-count":69,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["635"],"URL":"https:\/\/doi.org\/10.1007\/s12599-020-00635-2","relation":{},"ISSN":["2363-7005","1867-0202"],"issn-type":[{"value":"2363-7005","type":"print"},{"value":"1867-0202","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,9]]},"assertion":[{"value":"11 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}