{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:33:12Z","timestamp":1772555592300,"version":"3.50.1"},"reference-count":78,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"abstract":"<jats:p>Research on Shadow IT is facing a conceptual dilemma in cases where previously \u201ccovert\u201d systems developed by business entities are integrated in the organizational IT management. These systems become visible, are thus not \u201cin the shadows\u201d anymore, and subsequently do not fit to existing definitions of Shadow IT. Practice shows that some information systems share characteristics of Shadow IT but are created openly in alignment with the IT organization. This paper proposes the term \u201cBusiness-managed IT\u201d to describe \u201covert\u201d information systems developed or managed by business entities and distinguishes it from Shadow IT by illustrating case vignettes. Accordingly, our contribution is to suggest a concept and its delineation against other concepts. In this way, IS researchers interested in IT originated from or maintained by business entities can construct theories with a wider scope of application that are at the same time more specific to practical problems. In addition, the terminology allows to value potentially innovative developments by business entities more adequately.<\/jats:p>","DOI":"10.4018\/ijitbag.2018070104","type":"journal-article","created":{"date-parts":[[2018,12,21]],"date-time":"2018-12-21T14:28:39Z","timestamp":1545402519000},"page":"53-71","source":"Crossref","is-referenced-by-count":24,"title":["Shadow IT and Business-Managed IT"],"prefix":"10.4018","volume":"9","author":[{"given":"Andreas","family":"Kopper","sequence":"first","affiliation":[{"name":"TU Dresden, Dresden, Germany"}]},{"given":"Daniel","family":"F\u00fcrstenau","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Stephan","family":"Zimmermann","sequence":"additional","affiliation":[{"name":"Augsburg University of Applied Sciences, Augsburg, Germany"}]},{"given":"Stefan","family":"Klotz","sequence":"additional","affiliation":[{"name":"TU Dresden, Dresden, Germany"}]},{"given":"Christopher","family":"Rentrop","sequence":"additional","affiliation":[{"name":"Konstanz University of Applied Sciences, Konstanz, Germany"}]},{"given":"Hannes","family":"Rothe","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Susanne","family":"Strahringer","sequence":"additional","affiliation":[{"name":"TU Dresden, Dresden, Germany"}]},{"given":"Markus","family":"Westner","sequence":"additional","affiliation":[{"name":"OTH Regensburg, Regensburg, Germany"}]}],"member":"2432","reference":[{"issue":"1","key":"IJITBAG.2018070104-0","first-page":"1041","article-title":"Theory of Workarounds.","volume":"34","author":"S.Alter","year":"2014","journal-title":"Communications of the Association for Information Systems"},{"issue":"3","key":"IJITBAG.2018070104-1","first-page":"50","article-title":"Who owns IT?","volume":"58","author":"S. J.Andriole","year":"2015","journal-title":"Communications of the Association for Information Systems"},{"key":"IJITBAG.2018070104-2","unstructured":"Beck, K., Beedle, M., van Bennekum, A., Cockburn, A., Cunningham, W., Fowler, M., . . . Thomas, D. (2001). Manifesto for Agile Software Development. Retrieved from http:\/\/agilemanifesto.org\/"},{"issue":"2","key":"IJITBAG.2018070104-3","first-page":"124","article-title":"Shadow Systems: The Good, The Bad and The Ugly.","volume":"52","author":"S.Behrens","year":"2009","journal-title":"Communications of the Association for Information Systems"},{"key":"IJITBAG.2018070104-4","first-page":"1","article-title":"Enterprise App Stores for Mobile Applications: Development of a Benefits Framework.","author":"D.Beimborn","year":"2013","journal-title":"Proceedings of the 19th Americas Conference on Information Systems"},{"key":"IJITBAG.2018070104-5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijproman.2007.06.004"},{"key":"IJITBAG.2018070104-6","doi-asserted-by":"publisher","DOI":"10.2307\/249620"},{"key":"IJITBAG.2018070104-7","doi-asserted-by":"publisher","DOI":"10.2307\/249521"},{"key":"IJITBAG.2018070104-8","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2014.3"},{"key":"IJITBAG.2018070104-9","first-page":"1","article-title":"Understanding the Organizational Antecedents of Bottom-up Un-enacted-Projects.","author":"A.Buchwald","year":"2014","journal-title":"Proceedings of the 22nd European Conference on Information Systems"},{"key":"IJITBAG.2018070104-10","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2016.15"},{"key":"IJITBAG.2018070104-11","unstructured":"Capgemini. (2016). IT-Trends-Studie 2016. Retrieved from https:\/\/www.capgemini.com\/de-de\/resources\/it-trends-studie-2016\/"},{"key":"IJITBAG.2018070104-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.08.020"},{"issue":"1","key":"IJITBAG.2018070104-13","first-page":"66","article-title":"Bottom-up enterprise information systems.","volume":"60","author":"C. E. H.Chua","year":"2016","journal-title":"Communications of the Association for Information Systems"},{"key":"IJITBAG.2018070104-14","unstructured":"Chua, C. E. H., Storey, V. C., & Chen, L. (2014). Central IT or Shadow IT? Factors Shaping Users\u2019 Decision to Go Rogue with IT. In Proceedings of the 35th International Conference on Information Systems (pp. 1\u201314)."},{"key":"IJITBAG.2018070104-15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2014.03.001"},{"key":"IJITBAG.2018070104-16","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-04-2017-0153"},{"key":"IJITBAG.2018070104-17","unstructured":"Dittes, S., Urbach, N., Ahlemann, F., Smolnik, S., & M\u00fcller, T. (2015). Why Don\u2019t You Stick to Them? Understanding Factors Influencing and Counter-Measures to Combat Deviant Behavior Towards Organizational IT Standards. In O. Thomas & F. Teuteberg (Eds.), Proceedings of the 12. Internationale Tagung Wirtschaftsinformatik: Smart Enterprise Engineering (pp. 1\u201315)."},{"key":"IJITBAG.2018070104-18","doi-asserted-by":"publisher","DOI":"10.1109\/ESPRE.2015.7330162"},{"key":"IJITBAG.2018070104-19","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.2007010104"},{"key":"IJITBAG.2018070104-20","first-page":"1","article-title":"Shadow IT Systemes: Discerning the Good and the Evil.","author":"D.F\u00fcrstenau","year":"2014","journal-title":"Proceedings of the 22nd European Conference on Information Systems"},{"key":"IJITBAG.2018070104-21","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.04103"},{"key":"IJITBAG.2018070104-22","first-page":"1","article-title":"Why do Shadow Sytems Fail? An Expert Study on Determinants of Discontinuation.","author":"D.F\u00fcrstenau","year":"2016","journal-title":"Proceedings of the 24th European Conference on Information Systems"},{"key":"IJITBAG.2018070104-23","unstructured":"Gartner. (2016). Coming to Terms with Business Unit IT to Prepare for Digital Business. Retrieved from https:\/\/www.gaartner.com\/doc\/3288932\/coming-terms-business-unit-it"},{"key":"IJITBAG.2018070104-24","unstructured":"Gartner. (2017). Make the Best of Shadow IT. Retrieved from https:\/\/www.gartner.com\/smarterwithgartner\/make-the-best-of-shadow-it\/"},{"key":"IJITBAG.2018070104-25","first-page":"1","article-title":"Crocodiles in the Regulatory Swamp: Navigating the Dangers of Outsourcing, SaaS and Shadow IT.","author":"D.Gozman","year":"2015","journal-title":"Proceedings of the 36th International Conference on Information Systems"},{"issue":"4","key":"IJITBAG.2018070104-26","first-page":"1225","article-title":"IT Consumerization and the Transformation of IT Governance.","volume":"42","author":"R. W.Gregory","year":"2018","journal-title":"Management Information Systems Quarterly"},{"key":"IJITBAG.2018070104-27","first-page":"1","article-title":"Exploring the Shadows: IT Governance Approaches to User-driven innovation.","author":"A.Gy\u00f6ry","year":"2012","journal-title":"Proceedings of the 20th European Conference on Information Systems"},{"key":"IJITBAG.2018070104-28","unstructured":"Haag, S. (2015). Appearance of Dark Clouds? \u2013 An Empirical Analysis of Users\u2019 Shadow Sourcing of Cloud Services. In O. Thomas & F. Teuteberg (Eds.), Proceedings of the 12. Internationale Tagung Wirtschaftsinformatik: Smart Enterprise Engineering (pp. 1438\u20131452)."},{"key":"IJITBAG.2018070104-29","first-page":"1","article-title":"Justifying Shadow IT Usage.","author":"S.Haag","year":"2015","journal-title":"Proceedings of the 19th Pacific Asia Conference on Information Systems"},{"key":"IJITBAG.2018070104-30","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-017-0497-x"},{"key":"IJITBAG.2018070104-31","first-page":"1","article-title":"Are Shadow System Users the Better IS Users? \u2013 Insights of a Lab Experiment.","author":"S.Haag","year":"2015","journal-title":"Proceedings of the 36th International Conference on Information Systems"},{"key":"IJITBAG.2018070104-32","first-page":"1","article-title":"The Unperceived Boon and Bane of Cloud Computing: End-User Computing vs. Integration.","author":"J.Hetzenecker","year":"2012","journal-title":"Proceedings of the 18th Americas Conference on Information Systems"},{"key":"IJITBAG.2018070104-33","first-page":"1","article-title":"Integration of Shadow IT Systems with Enterprise Systems - A Literature Review.","author":"M.Huber","year":"2017","journal-title":"Proceedings of the 21st Pacific Asia Conference on Information Systems"},{"key":"IJITBAG.2018070104-34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2012.05.003"},{"key":"IJITBAG.2018070104-35","unstructured":"Kent, S., Houghton, L., & Kerr, D. V. (2013). Affective Events Theory, Institutional Theory and feral Systems: How do they all Fit? In M. Grimmer & R. Hecker (Eds.), Proceedings of the 27th Australian and New Zealand Academy of Management Conference."},{"key":"IJITBAG.2018070104-36","first-page":"1","article-title":"Two Tales of Technology: Business and IT Managers\u2019 Technological Frames Related to Cloud Computing.","author":"S.Khalil","year":"2017","journal-title":"Proceedings of the 38th International Conference on Information Systems"},{"key":"IJITBAG.2018070104-37","doi-asserted-by":"crossref","unstructured":"Klotz, S., Kopper, A., Westner, S., & Strahringer, S. (2018). Causing Factors, Outcomes, and Governance of Shadow IT and Business-managed IT: A State-of-the-Art Literature Analysis. Manuscript submitted for publication","DOI":"10.4018\/IJITBAG.2018070104"},{"key":"IJITBAG.2018070104-38","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-015-0387-z"},{"key":"IJITBAG.2018070104-39","first-page":"1","article-title":"Perceptions of IT Managers on Shadow IT.","author":"A.Kopper","year":"2017","journal-title":"Proceedings of the 23rd Americas Conference on Information Systems"},{"key":"IJITBAG.2018070104-40","first-page":"1687","article-title":"Deriving a Framework for Causes, Consequences, and Governance of Shadow IT from Literature.","author":"A.Kopper","year":"2016","journal-title":"Proceedings of the Multikonferenz Wirtschaftsinformatik"},{"key":"IJITBAG.2018070104-41","first-page":"1","article-title":"Towards a Taxonomy for Shadow IT.","author":"A.Kopper","year":"2016","journal-title":"Proceedings of the 22nd Americas Conference on Information Systems"},{"key":"IJITBAG.2018070104-42","doi-asserted-by":"publisher","DOI":"10.1365\/s40702-016-0286-x"},{"key":"IJITBAG.2018070104-43","first-page":"208","article-title":"Generativity of Business Intelligence Platforms: A Research Agenda Guided by Lessons from Shadow IT.","author":"M.Kretzer","year":"2014","journal-title":"Proceedings of the Multikonferenz Wirtschaftsinformatik"},{"key":"IJITBAG.2018070104-44","doi-asserted-by":"publisher","DOI":"10.28945\/479"},{"key":"IJITBAG.2018070104-45","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.09.281"},{"key":"IJITBAG.2018070104-46","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2008.03.004"},{"key":"IJITBAG.2018070104-47","doi-asserted-by":"publisher","DOI":"10.2308\/acch-51737"},{"key":"IJITBAG.2018070104-48","first-page":"1","article-title":"Unraveling the Effect of Personal Innovativeness on Bring-Your-Own-Device (BYOD) Intention: The Role of Perceptions Towards Enterprise-Provided and Privately-Owned Technologies.","author":"K.Ortbach","year":"2015","journal-title":"Proceedings of the 23rd European Conference on Information Systems"},{"key":"IJITBAG.2018070104-49","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.244"},{"key":"IJITBAG.2018070104-50","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12122"},{"key":"IJITBAG.2018070104-51","author":"M.Power","year":"2007","journal-title":"Organized Uncertainty: Designing a World of Risk Management"},{"key":"IJITBAG.2018070104-52","first-page":"1023","article-title":"Shadow IT Evaluation Model.","author":"C.Rentrop","year":"2012","journal-title":"Proceedings of the Federated Conference on Computer Science and Information Systems"},{"key":"IJITBAG.2018070104-53","unstructured":"Rentrop, C., & Zimmermann, S. (2012b). Shadow IT: Management and Control of unofficial IT. In J. Lloret Mauri, G. Mart\u00ednez, L. Berntzen, & \u00c5. Smedberg (Eds.), Proceedings of the 6th International Conference on Digital Society (98\u2013102). Wilmington, USA: IARIA."},{"key":"IJITBAG.2018070104-54","article-title":"A Situational Perspective on Workarounds in IT-enabled Business Processes: A Multiple Case Study.","author":"N.R\u00f6der","year":"2014","journal-title":"Proceedings of the 22nd European Conference on Information Systems"},{"key":"IJITBAG.2018070104-55","doi-asserted-by":"publisher","DOI":"10.1177\/1065912907313077"},{"key":"IJITBAG.2018070104-56","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2016.01.001"},{"key":"IJITBAG.2018070104-57","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.06.007"},{"key":"IJITBAG.2018070104-58","doi-asserted-by":"crossref","unstructured":"Silic, M., Silic, D., & Oblakovic, G. (2016). Influence of Shadow IT on Innovation in Organizations. Complex Systems Informatics and Modeling Quarterly. (8), 68\u201380.","DOI":"10.7250\/csimq.2016-8.06"},{"key":"IJITBAG.2018070104-59","first-page":"1","article-title":"Emergence and Consequences of Drift in Organizational Information Systems.","author":"H.Singh","year":"2015","journal-title":"Proceedings of the 19th Pacific Asia Conference on Information Systems"},{"key":"IJITBAG.2018070104-60","first-page":"1","article-title":"What Drives the End User to Build a Feral Information System?","author":"A.Spierings","year":"2012","journal-title":"Proceedings of the 23rd Australasian Conference on Information Systems"},{"key":"IJITBAG.2018070104-61","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12123"},{"key":"IJITBAG.2018070104-62","doi-asserted-by":"publisher","DOI":"10.1109\/EDOCW.2013.38"},{"key":"IJITBAG.2018070104-63","unstructured":"TechTarget. (2014). What is embedded IT? Retrieved from http:\/\/searchcio.techtarget.com\/definition\/embedded-IT"},{"key":"IJITBAG.2018070104-64","unstructured":"TechTarget. (2016). What is citizen development? Retrieved from http:\/\/searchsalesforce.techtarget.com\/definition\/citizen-development"},{"key":"IJITBAG.2018070104-65","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-07-2015-0066"},{"key":"IJITBAG.2018070104-66","author":"P.Weill","year":"2004","journal-title":"IT Governance: How Top Performers Manage IT Decision Rights for Superior Results"},{"key":"IJITBAG.2018070104-67","unstructured":"Winkler, T. J. (2013). IT Governance Mechanisms and Administration\/IT Alignment in the Public Sector: A Conceptual Model and Case Validation. In R. Alt & B. Franczyk (Eds.), Proceedings of the 11. Internationale Tagung Wirtschaftsinformatik (pp. 831\u2013845)."},{"key":"IJITBAG.2018070104-68","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222300302"},{"key":"IJITBAG.2018070104-69","first-page":"1","article-title":"Organizing and Configuring the IT Function","volume":"Vol. 2","author":"T. J.Winkler","year":"2014","journal-title":"Computing Handbook: Information Systems and Information Technology"},{"key":"IJITBAG.2018070104-70","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2014.10.003"},{"key":"IJITBAG.2018070104-71","author":"R. K.Yin","year":"2013","journal-title":"Case study research: Design and methods"},{"key":"IJITBAG.2018070104-72","first-page":"1","article-title":"Secretly SaaS-ing: Stealth Adoption of Software-as-a-Service from the Embeddedness Perspective.","author":"E.Zainuddin","year":"2012","journal-title":"Proceedings of the 33rd International Conference on Information Systems"},{"key":"IJITBAG.2018070104-73","doi-asserted-by":"publisher","DOI":"10.1007\/BF03340758"},{"key":"IJITBAG.2018070104-74","first-page":"1","article-title":"On the Emergence of Shadow IT - A Transaction Cost-based Approach.","author":"S.Zimmermann","year":"2014","journal-title":"Proceedings of the 22nd European Conference on Information Systems"},{"key":"IJITBAG.2018070104-75","first-page":"1","article-title":"Managing Shadow IT Instances \u2013 A Method to Control Autonomous IT Solutions in the Business Departments.","author":"S.Zimmermann","year":"2014","journal-title":"Proceedings of the 20th Americas Conference on Information Systems"},{"key":"IJITBAG.2018070104-76","first-page":"1","article-title":"Governing Identified Shadow IT by Allocating IT Task Responsibilities.","author":"S.Zimmermann","year":"2016","journal-title":"Proceedings of the 22nd Americas Conference on Information Systems"},{"key":"IJITBAG.2018070104-77","doi-asserted-by":"publisher","DOI":"10.2308\/isys-51579"}],"container-title":["International Journal of IT\/Business Alignment and Governance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=220440","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T22:19:22Z","timestamp":1573597162000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJITBAG.2018070104"}},"subtitle":["A Conceptual Framework and Empirical Illustration"],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":78,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.4018\/ijitbag.2018070104","relation":{},"ISSN":["1947-9611","1947-962X"],"issn-type":[{"value":"1947-9611","type":"print"},{"value":"1947-962X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7]]}}}