{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:57:43Z","timestamp":1725897463479},"reference-count":95,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Systems Management"],"published-print":{"date-parts":[[2022,7,3]]},"DOI":"10.1080\/10580530.2021.1938300","type":"journal-article","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T10:46:31Z","timestamp":1625481991000},"page":"220-240","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":6,"title":["Critical Success Factors of Business-managed IT: It Takes Two to Tango"],"prefix":"10.1080","volume":"39","author":[{"given":"Stefan","family":"Klotz","sequence":"first","affiliation":[{"name":"Chair of Business Informatics, esp. Information Systems in Trade and Industry, TU Dresden, Dresden, Germany"}]},{"given":"Markus","family":"Westner","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science and Mathematics, OTH Regensburg, Regensburg, Germany"}]},{"given":"Susanne","family":"Strahringer","sequence":"additional","affiliation":[{"name":"Chair of Business Informatics, esp. Information Systems in Trade and Industry, TU Dresden, Dresden, Germany"}]}],"member":"301","published-online":{"date-parts":[[2021,7,5]]},"reference":[{"key":"cit0001","first-page":"1889","volume-title":"Proceedings of the 48th hawaii international conference on system sciences","author":"Abedin B."},{"key":"cit0002","volume-title":"AMCIS","author":"Ahuja S."},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1080\/10580530.2019.1589670"},{"issue":"3","key":"cit0004","first-page":"50","volume":"58","author":"Andriole S. J.","year":"2015","journal-title":"Communications of the Association for Information Systems"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-013-9445-6"},{"key":"cit0006","volume-title":"ECIS","author":"Axelsson K."},{"issue":"2","key":"cit0007","first-page":"124","volume":"52","author":"Behrens S.","year":"2009","journal-title":"Communications of the Association for Information Systems"},{"key":"cit0008","unstructured":"Behrens, S. & Sedera, W. (2004, July). Why Do Shadow Systems Exist after an ERP Implementation? Lessons from a Case Study. In : Proceedings of the 8th Pacific Asia Conference on Information Systems. PACIS. Shanghai, 8\u201311 July 2004, pp. 1713\u20131726."},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.2307\/248684"},{"key":"cit0010","unstructured":"Bendor-Samuel, P. (2017). How to eliminate enterprise shadow IT. https:\/\/www.cio.com\/article\/3188726\/it-industry\/how-to-eliminate-enterprise-shadow-it.html"},{"issue":"4","key":"cit0011","first-page":"17","volume":"25","author":"Boynton A. C.","year":"1984","journal-title":"Sloan Management Review"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1365\/s40702-014-0048-6"},{"key":"cit0013","volume-title":"Center for Information Systems Research No. 69","author":"Bullen C. V.","year":"1981"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(00)00027-5"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2016.15"},{"key":"cit0016","unstructured":"Cambridge Dictionary. (n.d.).It takes two to tango. Cambridge University Press. Retrieved from February 28, 2021. https:\/\/dictionary.cambridge.org\/"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.08.020"},{"issue":"1","key":"cit0018","first-page":"66","volume":"60","author":"Chua C. E. H.","year":"2016","journal-title":"Communications of the Association for Information Systems"},{"key":"cit0019","volume-title":"ICIS","author":"Chua C. E. H."},{"key":"cit0020","volume-title":"Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory","author":"Corbin J. M.","year":"2015","edition":"4"},{"key":"cit0021","volume-title":"Research Design: Qualitative, Quantitative, and Mixed Methods Approaches","author":"Creswell J. W.","year":"2014","edition":"4"},{"key":"cit0022","volume-title":"AMCIS","author":"Davison R. M."},{"key":"cit0023","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-04-2017-0153"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2007.24160888"},{"key":"cit0025","unstructured":"Esteves, J. M. (2004). Definition and analysis of critical success factors for ERP implementation projects. [Doctoral Dissertation]. Universitat Polit\u00e8cnica de Catalunya. http:\/\/byzest.com\/Tesis_phd_jesteves.pdf"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.2007010104"},{"key":"cit0027","volume-title":"ECIS","author":"F\u00fcrstenau D."},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.04103"},{"key":"cit0029","author":"F\u00fcrstenau D.","year":"2020","journal-title":"Business & Information Systems Engineering, 63,\u00a097\u2013111"},{"key":"cit0030","volume-title":"AMCIS","author":"F\u00fcrstenau D."},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.17265\/2159-5313\/2016.09.003"},{"key":"cit0032","doi-asserted-by":"publisher","DOI":"10.17265\/2159-5313\/2016.09.003"},{"key":"cit0033","doi-asserted-by":"publisher","DOI":"10.1177\/1094428109351319"},{"key":"cit0034","unstructured":"GlobalNewswire. (2019). Enterprise IT focused on moving more workloads to cloud in 2019. https:\/\/globenewswire.com\/news-release\/2019\/01\/17\/1701128\/0\/en\/enterprise-it-focused-on-moving-more-workloads-to-cloud-in-2019.html"},{"issue":"4","key":"cit0035","first-page":"1225","volume":"42","author":"Gregory R. W.","year":"2018","journal-title":"MIS Quarterly"},{"key":"cit0036","doi-asserted-by":"publisher","DOI":"10.2307\/41703466"},{"key":"cit0037","volume-title":"ECIS","author":"Gy\u00f6ry A."},{"key":"cit0038","volume-title":"WI","author":"Haag S."},{"key":"cit0039","volume-title":"ICIS","author":"Haag S."},{"key":"cit0040","volume-title":"ICIS","author":"Haag S."},{"key":"cit0041","unstructured":"Harvey Nash\/KPMG. (2019). Harvey nash\/KPMG CIO survey 2019. Harvey Nash, KPMG. https:\/\/www.hnkpmgciosurvey.com\/executive-summary.php"},{"key":"cit0042","volume-title":"ACIS","author":"Jones D."},{"key":"cit0043","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2018.1497929"},{"key":"cit0044","volume-title":"ICIS","author":"Khalil S."},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.1109\/CBI.2019.00039"},{"key":"cit0046","doi-asserted-by":"crossref","unstructured":"Klotz, S., Kopper, A., Westner, M. & Strahringer, S. (2019). Causing Factors, Outcomes, and Governance of Shadow IT and Business-managed IT: A Systematic Literature Review.International Journal of Information Systems and Project Management,7(1), 15\u201343. http:\/\/www.sciencesphere.org\/ijispm\/archive\/ijispm-070102.pdf","DOI":"10.12821\/ijispm070102"},{"key":"cit0047","unstructured":"Klotz, S., Westner, M. & Strahringer, S. (2020, June). From Shadow IT to Business-managed IT and Back Again: How Responsibility for IT Instances Evolves Over Time. In. Proceedings of the 24th Pacific Asia Conference on Information Systems"},{"key":"cit0048","unstructured":"Klotz, S., Westner, M., Strahringer, S. & Schieder, C. (2019). Transformed Knowledge Sharing Through Business-managed IT and Shadow IT. In. Proceedings of the 25th Americas Conference on Information Systems."},{"key":"cit0049","volume-title":"Proceedings of the 9th IADIS international conference of information systems","author":"Kobus J."},{"key":"cit0050","volume-title":"AMCIS","author":"Kopper A."},{"key":"cit0051","volume-title":"ECIS","author":"Kopper A."},{"key":"cit0052","first-page":"1","volume":"4","author":"Kopper A.","year":"2019","journal-title":"Journal of Information Technology Management, XXX"},{"key":"cit0053","doi-asserted-by":"publisher","DOI":"10.1365\/s40702-016-0286-x"},{"key":"cit0054","doi-asserted-by":"publisher","DOI":"10.1007\/s10257-020-00472-6"},{"key":"cit0055","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000530"},{"key":"cit0056","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/978-3-319-17587-4_3","volume-title":"Enterprise Systems. Strategic, Organizational, and Technological Dimensions","author":"Leyh C.","year":"2015"},{"key":"cit0057","doi-asserted-by":"publisher","DOI":"10.1093\/bib\/bbx101"},{"key":"cit0058","doi-asserted-by":"publisher","DOI":"10.1002\/wics.111"},{"key":"cit0059","doi-asserted-by":"publisher","DOI":"10.2307\/249208"},{"key":"cit0060","doi-asserted-by":"publisher","DOI":"10.1177\/0266382118760143"},{"key":"cit0061","volume-title":"Qualitative Data Analysis: A Methods Sourcebook","author":"Miles M. B.","year":"2014","edition":"3"},{"key":"cit0062","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2006.11.001"},{"key":"cit0063","volume-title":"ICIS","author":"Ologeanu-Taddei R."},{"key":"cit0064","volume-title":"ICIS","author":"Ortbach K."},{"key":"cit0065","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2011.07.001"},{"key":"cit0066","volume-title":"ICIS","author":"Peppard J."},{"key":"cit0067","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12122"},{"key":"cit0068","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(00)00069-5"},{"key":"cit0069","doi-asserted-by":"publisher","DOI":"10.1504\/IJMDM.2019.096695"},{"key":"cit0070","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2008.00324.x"},{"key":"cit0071","volume-title":"Proceedings of the D\u2219A\u2219CH security conference","author":"Rentrop C.","year":"2015"},{"issue":"2","key":"cit0072","first-page":"81","volume":"57","author":"Rockart J. F.","year":"1979","journal-title":"Harvard Business Review"},{"key":"cit0073","author":"Segal M.","year":"2016","journal-title":"Data Center Journal"},{"key":"cit0074","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000693"},{"key":"cit0075","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.06.007"},{"key":"cit0076","doi-asserted-by":"publisher","DOI":"10.7250\/csimq.2016-8.06"},{"key":"cit0077","volume-title":"PACIS","author":"Singh H."},{"key":"cit0078","volume-title":"ACIS","author":"Spierings A."},{"key":"cit0079","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12123"},{"key":"cit0080","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-52832-7_5"},{"key":"cit0081","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96187-3"},{"key":"cit0082","doi-asserted-by":"publisher","DOI":"10.1365\/s40702-014-0006-3"},{"key":"cit0083","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-07-2015-0066"},{"issue":"2","key":"cit0084","first-page":"xiii","volume":"26","author":"Webster J.","year":"2002","journal-title":"MIS Quarterly"},{"key":"cit0085","volume-title":"IT Governance: How Top Performers Manage IT Decision Rights for Superior Results","author":"Weill P.","year":"2004"},{"key":"cit0086","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.1996.30"},{"key":"cit0087","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222300302"},{"key":"cit0088","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)CO.1943-7862.0000180"},{"key":"cit0089","volume-title":"Case Study Research and Applications: Design and Methods","author":"Yin R. K.","year":"2018","edition":"6"},{"key":"cit0090","first-page":"252","volume-title":"Lecture notes in business information processing: vol. 255, business information systems: 19th international conference","author":"Zimmermann S."},{"key":"cit0091","volume-title":"ECIS","author":"Zimmermann S."},{"key":"cit0092","doi-asserted-by":"publisher","DOI":"10.1007\/BF03340758"},{"key":"cit0093","volume-title":"AMCIS","author":"Zimmermann S."},{"key":"cit0094","volume-title":"AMCIS","author":"Zimmermann S."},{"key":"cit0095","doi-asserted-by":"publisher","DOI":"10.2308\/isys-51579"}],"container-title":["Information Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10580530.2021.1938300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,5]],"date-time":"2023-11-05T17:18:18Z","timestamp":1699204698000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10580530.2021.1938300"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,5]]},"references-count":95,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,7,3]]}},"alternative-id":["10.1080\/10580530.2021.1938300"],"URL":"https:\/\/doi.org\/10.1080\/10580530.2021.1938300","relation":{},"ISSN":["1058-0530","1934-8703"],"issn-type":[{"value":"1058-0530","type":"print"},{"value":"1934-8703","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,5]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uism20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uism20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-07-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}