{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:24:36Z","timestamp":1740173076231,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"5","license":[{"start":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T00:00:00Z","timestamp":1596067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T00:00:00Z","timestamp":1596067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"HHL Leipzig Graduate School of Management gGmbH"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2020,10]]},"abstract":"<jats:title>Zusammenfassung<\/jats:title><jats:p>In einer zunehmend digitalen Arbeitswelt gewinnt die Frage an Bedeutung, wie IT-Aufgaben bestm\u00f6glich abgewickelt und organisiert werden k\u00f6nnen. Aktuelle Entwicklungen f\u00fchren hierbei vermehrt dazu, dass IT-T\u00e4tigkeiten, mit der Zustimmung der IT-Abteilung, durch einzelne Fachbereiche \u00fcbernommen werden. Im Hinblick auf diese sogenannte Business-managed IT stehen Unternehmen allerdings vor der Herausforderung, zu beurteilen, wann mehr Verantwortung von der IT-Abteilung an den Fachbereich \u00fcbertragen werden kann. Durch eine systematische Literaturanalyse werden in diesem Beitrag sieben relevante Kontextfaktoren identifiziert, welche Unternehmen bei diesen Entscheidungen unterst\u00fctzen sollen. Diese Faktoren werden in drei Dimensionen zusammengefasst: (1)\u00a0Aufgabe (Spezifit\u00e4t der Applikation, Unsicherheit, Nutzungsumfang und Risiken der Applikation), (2)\u00a0Mensch (IT-Wissen im Fachbereich und Fachbereichswissen in der IT-Abteilung) und (3)\u00a0Technologie (Grad der Applikationsintegration).<\/jats:p>","DOI":"10.1365\/s40702-020-00644-5","type":"journal-article","created":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T13:05:48Z","timestamp":1596114348000},"page":"988-999","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Business-managed IT \u2013 Rahmenbedingungen f\u00fcr mehr IT-Verantwortung durch den Fachbereich","Business-managed IT\u2014Conditions Fostering Responsibilities for IT Within Business Units"],"prefix":"10.1365","volume":"57","author":[{"given":"Iris","family":"Hausladen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2438-2499","authenticated-orcid":false,"given":"Philipp","family":"Sylla","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2020,7,30]]},"reference":[{"issue":"3","key":"644_CR1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/2660765","volume":"58","author":"SJ Andriole","year":"2015","unstructured":"Andriole\u00a0SJ (2015) Who owns IT? Commun ACM 58(3):50\u201357. https:\/\/doi.org\/10.1145\/2660765","journal-title":"Commun ACM"},{"issue":"4","key":"644_CR33","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1287\/isre.14.4.317.24899","volume":"14","author":"G Bassellier","year":"2003","unstructured":"Bassellier G, Izak B, Reich BH (2003) The Influence of Business Managers\u2019 IT Competence on Championing IT. Inf Syst Res 14(4):317\u2013336","journal-title":"Inf Syst Res"},{"issue":"2","key":"644_CR2","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1057\/jit.2016.15","volume":"32","author":"B Bygstad","year":"2017","unstructured":"Bygstad\u00a0B (2017) Generative innovation: a\u00a0comparison of lightweight and heavyweight IT. J\u00a0Inf Technol 32(2):180\u2013193","journal-title":"J Inf Technol"},{"issue":"1","key":"644_CR4","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/2950044","volume":"60","author":"CEH Chua","year":"2016","unstructured":"Chua CEH, Storey\u00a0VC (2016) Bottom-up enterprise information systems: rethinking the roles of central IT departments. Commun ACM 60(1):66\u201372","journal-title":"Commun ACM"},{"key":"644_CR3","volume-title":"Proceedings of the 35th International Conference on Information Systems (ICIS)","author":"C Chua","year":"2014","unstructured":"Chua\u00a0C, Storey\u00a0V, Chen\u00a0L (2014) Central IT or Shadow IT? Factors shaping users\u2019 decision to go rogue with IT. In: Proceedings of the 35th International Conference on Information Systems (ICIS) Auckland"},{"key":"644_CR5","first-page":"38","volume-title":"Wertorientiertes Management von IT-Architekturen","author":"M Durst","year":"2008","unstructured":"Durst\u00a0M (2008) Wertorientiertes Management von IT-Architekturen. Deutscher Universit\u00e4ts-Verlag, Wiesbaden, S 38\u201345"},{"key":"644_CR6","volume-title":"Proceedings of the 22nd European Conference on Information Systems (ECIS)","author":"D F\u00fcrstenau","year":"2014","unstructured":"F\u00fcrstenau\u00a0D, Rothe\u00a0H (2014) Shadow IT systems: discerning the good and the evil. In: Proceedings of the 22nd European Conference on Information Systems (ECIS) Tel-Aviv"},{"issue":"1","key":"644_CR7","first-page":"43","volume":"41","author":"D F\u00fcrstenau","year":"2017","unstructured":"F\u00fcrstenau\u00a0D, Rothe\u00a0H, Sandner\u00a0M (2017) Shadow systems, risk, and shifting power relations in organizations. Commun ACM 41(1):43\u201361","journal-title":"Commun ACM"},{"key":"644_CR8","volume-title":"Proceedings of the 20th European Conference on Information Systems (ECIS)","author":"A Gy\u00f6ry","year":"2012","unstructured":"Gy\u00f6ry\u00a0A, Cleven\u00a0A, Uebernickel\u00a0F, Brenner\u00a0W (2012) Exploring the shadows: IT governance approaches to user-driven innovation. In: Proceedings of the 20th European Conference on Information Systems (ECIS) Barcelona"},{"key":"644_CR9","volume-title":"Proceedings der Wirtschaftsinformatik","author":"S Haag","year":"2015","unstructured":"Haag\u00a0S (2015) Appearance of dark clouds?\u2014An empirical analysis of users\u2019 shadow sourcing of cloud services. In: Proceedings der Wirtschaftsinformatik Osnabr\u00fcck"},{"issue":"3","key":"644_CR11","first-page":"99","volume":"11","author":"J Harris","year":"2012","unstructured":"Harris\u00a0J, Ives\u00a0B, Junglas\u00a0I (2012) IT consumerization: When gadgets turn into enterprise IT tools. MISQE 11(3):99\u2013112","journal-title":"MISQE"},{"key":"644_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-13080-0","volume-title":"IT-gest\u00fctzte Logistik. Systeme \u2013 Prozesse \u2013 Anwendungen","author":"I Hausladen","year":"2016","unstructured":"Hausladen\u00a0I (2016) IT-gest\u00fctzte Logistik. Systeme \u2013 Prozesse \u2013 Anwendungen. Springer, Wiesbaden"},{"key":"644_CR12","volume-title":"Proceedings of the 18th Americas Conference on Information Systems (AMCIS)","author":"J Hetzenecker","year":"2012","unstructured":"Hetzenecker\u00a0J, Sprenger\u00a0S, Kammerer\u00a0S, Amberg\u00a0M (2012) The unperceived boon and bane of cloud computing: end-user computing vs. Integration. In: Proceedings of the 18th Americas Conference on Information Systems (AMCIS) Seattle"},{"key":"644_CR15","first-page":"1687","volume-title":"MKWI 2016 proceedings","author":"A Kopper","year":"2016","unstructured":"Kopper\u00a0A, Westner\u00a0M (2016) Deriving a\u00a0framework for causes, consequences, and governance of shadow it from literature. In: MKWI 2016 proceedings, S\u00a01687\u20131698"},{"issue":"1","key":"644_CR30","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1365\/s40702-016-0286-x","volume":"54","author":"A Kopper","year":"2017","unstructured":"Kopper\u00a0A, Westner\u00a0M, Strahringer\u00a0S (2017) Kontrollierte Nutzung von Schatten-IT. HMD Prax Wirtschaftsinform 54(1):97\u2013110","journal-title":"HMD Prax Wirtschaftsinform"},{"key":"644_CR14","volume-title":"The 26th European Conference on Information Systems (ECIS)","author":"A Kopper","year":"2018","unstructured":"Kopper\u00a0A, Fuerstenau\u00a0D, Zimmermann\u00a0S, Rentrop\u00a0C, Rothe\u00a0H, Strahringer\u00a0S, Westner\u00a0M (2018) Business-managed IT: a conceptual framework and empirical illustration. In: The 26th European Conference on Information Systems (ECIS) Portsmouth"},{"key":"644_CR16","first-page":"1144","volume-title":"Handbook of organizations","author":"HJ Leavitt","year":"1965","unstructured":"Leavitt\u00a0HJ (1965) Applied organizational change in industry: structural, technological and humanistic approaches. In: March\u00a0JG (Hrsg) Handbook of organizations. Rand-MacNally, Chicago, S 1144\u20131170"},{"key":"644_CR17","volume-title":"Born digital. Understanding the first generation of digital natives","author":"J Palfrey","year":"2008","unstructured":"Palfrey\u00a0J, Gasser\u00a0U (2008) Born digital. Understanding the first generation of digital natives. Basic Books, New York"},{"issue":"4","key":"644_CR18","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1201\/1078\/44705.21.4.20040901\/84183.2","volume":"21","author":"R Peterson","year":"2004","unstructured":"Peterson\u00a0R (2004) Crafting information technology governance. Inf Syst Manag 21(4):7\u201322","journal-title":"Inf Syst Manag"},{"key":"644_CR31","unstructured":"Rentrop\u00a0C, Zimmermann\u00a0C (2012) Shadow IT \u2013 Management and control of unofficial IT. In: Proceedings of the Federated Conference on Computer Science and Information Systems (FedCSIS), Wroc\u0142aw, Poland"},{"key":"644_CR19","first-page":"291","volume-title":"DACH Security","author":"C Rentrop","year":"2015","unstructured":"Rentrop\u00a0C, Zimmermann\u00a0S, Huber\u00a0M (2015) Schatten-IT ein untersch\u00e4tztes Risiko. In: DACH Security, S 291\u2013300"},{"issue":"2","key":"644_CR34","doi-asserted-by":"publisher","first-page":"261","DOI":"10.2307\/249754","volume":"23","author":"V Sambamurthy","year":"1999","unstructured":"Sambamurthy\u00a0V, Zmud\u00a0RW (1999) Arrangements for information technology governance: a theory of multiple contingencies. MIS Q 23(2):261\u2013290","journal-title":"MIS Q"},{"key":"644_CR32","first-page":"46","volume-title":"Information security","author":"M Warkentin","year":"2008","unstructured":"Warkentin\u00a0M, Johnston\u00a0AC (2008) IT Governance and Organizational Development for Security Management. In: Straub DW, Goodman SE, Baskerville R (Hrsg) Information security, M.E. Sharpe, Armonk, S 46\u201368"},{"key":"644_CR21","volume-title":"The 33rd International Conference on Information Systems","author":"TJ Winkler","year":"2012","unstructured":"Winkler\u00a0TJ, Benlian\u00a0A (2012) The dual role of IS specificity in governing software as a\u00a0service. In: The 33rd International Conference on Information Systems Orlando"},{"issue":"3","key":"644_CR22","doi-asserted-by":"publisher","first-page":"13","DOI":"10.2753\/MIS0742-1222300302","volume":"30","author":"TJ Winkler","year":"2013","unstructured":"Winkler\u00a0TJ, Brown\u00a0CV (2013) Horizontal allocation of decision rights for on-premise applications and software-as-a-service. J\u00a0Manag Inf Syst 30(3):13\u201347","journal-title":"J Manag Inf Syst"},{"key":"644_CR20","volume-title":"The 32nd International Conference on Information Systems (ICIS)","author":"TJ Winkler","year":"2011","unstructured":"Winkler\u00a0TJ, Goebel\u00a0C, Benlian\u00a0A, Bidault\u00a0F, G\u00fcnther\u00a0O (2011) The impact of software as a\u00a0service on IS authority\u2014a contingency perspective. In: The 32nd International Conference on Information Systems (ICIS) Shanghai"},{"key":"644_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-8349-6405-2","volume-title":"Organisation, Management, Unternehmensf\u00fchrung. Theorien, Praxisbeispiele und Kritik","author":"J Wolf","year":"2011","unstructured":"Wolf\u00a0J (2011) Organisation, Management, Unternehmensf\u00fchrung. Theorien, Praxisbeispiele und Kritik, 4.\u00a0Aufl. Gabler, Wiesbaden","edition":"4"},{"issue":"1","key":"644_CR24","doi-asserted-by":"publisher","first-page":"67","DOI":"10.2307\/25148829","volume":"32","author":"Y Xue","year":"2008","unstructured":"Xue\u00a0Y, Liang\u00a0H, Boulton\u00a0WR (2008) Information technology governance in\u00a0information technology investment decision processes: the impact of investment characterisics, external\u00a0environment, and internal\u00a0context. MIS\u00a0Q 32(1):67\u201396","journal-title":"MIS Q"},{"key":"644_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-20787-8","volume-title":"Der Umgang mit Schatten-IT in Unternehmen. Eine Methode zum Management intransparenter Informationstechnologie","author":"S Zimmermann","year":"2018","unstructured":"Zimmermann\u00a0S (2018) Der Umgang mit Schatten-IT in Unternehmen. Eine Methode zum Management intransparenter Informationstechnologie. Springer, Wiesbaden"},{"key":"644_CR25","volume-title":"Proceedings of the 22nd European Conference on Information Systems","author":"S Zimmermann","year":"2014","unstructured":"Zimmermann\u00a0S, Rentrop\u00a0C (2014) On the emergence of shadow IT\u2014A transaction cost-based approach. In: Proceedings of the 22nd European Conference on Information Systems Tel-Aviv"},{"key":"644_CR27","series-title":"Lecture Notes in Business Information Processing,","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-319-39426-8_20","volume-title":"Business information systems","author":"S Zimmermann","year":"2016","unstructured":"Zimmermann\u00a0S, Rentrop\u00a0C, Felden\u00a0C (2016) Governing IT\u00a0activities in\u00a0business workgroups. Design principles for a\u00a0method to control identified shadow IT. In: Witold\u00a0A, Rainer\u00a0A, Bogdan\u00a0F (Hrsg) Business information systems 19th International Conference, BIS 2016, Leipzig, 6\u20138 July 2016. Lecture Notes in Business Information Processing,, Bd. 255. Springer, Cham, S\u00a0252\u2013264"},{"issue":"1","key":"644_CR28","doi-asserted-by":"publisher","first-page":"79","DOI":"10.2308\/isys-51579","volume":"31","author":"S Zimmermann","year":"2017","unstructured":"Zimmermann\u00a0S, Rentrop\u00a0C, Felden\u00a0C (2017) A multiple case study on the nature and management of shadow information technology. J\u00a0Inf Syst 31(1):79\u2013101. https:\/\/doi.org\/10.2308\/isys-51579","journal-title":"J Inf Syst"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-020-00644-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1365\/s40702-020-00644-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-020-00644-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,29]],"date-time":"2021-07-29T23:09:40Z","timestamp":1627600180000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1365\/s40702-020-00644-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,30]]},"references-count":32,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["644"],"URL":"https:\/\/doi.org\/10.1365\/s40702-020-00644-5","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"type":"print","value":"1436-3011"},{"type":"electronic","value":"2198-2775"}],"subject":[],"published":{"date-parts":[[2020,7,30]]},"assertion":[{"value":"4 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}