{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T09:28:23Z","timestamp":1775554103920,"version":"3.50.1"},"reference-count":85,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4,1]]},"abstract":"<p>The voluntary use of private devices by employees without the formal approval of the IT department, commonly termed Shadow IT, is an increasingly widespread phenomenon. In this article, the authors study the role of private smartphones (and related applications like WhatsApp) in knowledge-intensive practices in the manufacturing domain. With an in-depth case study based on data gained from observations and interviews, the authors are able to empirically illustrate why workers use their private smartphones (contrary to company guidelines) and how they find significant gains of productivity by using the forbidden applications. This study gives rich insights into the rise of Shadow IT in a manufacturing context which takes place in a self-organised way without knowledge of the management.<\/p>","DOI":"10.4018\/ijkm.2019040101","type":"journal-article","created":{"date-parts":[[2019,3,19]],"date-time":"2019-03-19T12:34:27Z","timestamp":1552998867000},"page":"1-19","source":"Crossref","is-referenced-by-count":8,"title":["Knowledge Management in the Dark"],"prefix":"10.4018","volume":"15","author":[{"given":"Shahper","family":"Richter","sequence":"first","affiliation":[{"name":"Auckland University of Technology, Auckland, New Zealand"}]},{"given":"Lena","family":"Waizenegger","sequence":"additional","affiliation":[{"name":"Auckland University of Technology, Auckland, New Zealand"}]},{"given":"Melanie","family":"Steinhueser","sequence":"additional","affiliation":[{"name":"University of Zurich, Z\u00fcrich, Switzerland"}]},{"given":"Alexander","family":"Richter","sequence":"additional","affiliation":[{"name":"Victoria University of Wellington, Wellington, New Zealand"}]}],"member":"2432","reference":[{"key":"IJKM.2019040101-0","doi-asserted-by":"publisher","DOI":"10.2307\/3250961"},{"key":"IJKM.2019040101-1","first-page":"34","article-title":"Theory of Workarounds.","author":"S.Alter","year":"2014","journal-title":"Communications of the Association for Information Systems"},{"key":"IJKM.2019040101-2","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2012.13"},{"key":"IJKM.2019040101-3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2006.01.019"},{"key":"IJKM.2019040101-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirpj.2010.03.002"},{"key":"IJKM.2019040101-5","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.8"},{"key":"IJKM.2019040101-6","doi-asserted-by":"crossref","unstructured":"Becker, J., Beverungen, D., Knackstedt, R., Matzner, M., & Muller, O. (2011). Information needs in service systems- A framework for integrating service and manufacturing business processes. In 2011 44th Hawaii International Conference on System Sciences (HICSS). IEEE.","DOI":"10.1109\/HICSS.2011.243"},{"key":"IJKM.2019040101-7","doi-asserted-by":"publisher","DOI":"10.1145\/1461928.1461960"},{"key":"IJKM.2019040101-8","unstructured":"Behrens, S., & Sedera, W. (2004). Why Do Shadow Systems Exist after an ERP Implementation? Lessons from a Case Study. In PACIS 2004 Proceedings."},{"key":"IJKM.2019040101-9","doi-asserted-by":"publisher","DOI":"10.2307\/248684"},{"key":"IJKM.2019040101-10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1628-0_10"},{"issue":"2","key":"IJKM.2019040101-11","article-title":"Mobile communications and emerging media: Prevalence and impact in the workplace.","volume":"5","author":"J. P.Bott","year":"2010","journal-title":"International Journal of Mobile Marketing"},{"key":"IJKM.2019040101-12","doi-asserted-by":"publisher","DOI":"10.1177\/1468794107085301"},{"key":"IJKM.2019040101-13","doi-asserted-by":"publisher","DOI":"10.4018\/IJKM.2016100103"},{"key":"IJKM.2019040101-14","unstructured":"Cetto, A., Klier, J., Klier, M., Richter, A., & Wiesneth, K. (2016). The blessing of giving: Knowledge sharing and knowledge seeking in Enterprise Social Networks. In European Conference on Information Systems, Istanbul, Turkey."},{"key":"IJKM.2019040101-15","doi-asserted-by":"crossref","unstructured":"Charmaz, K., & Belgrave, L. (2012). Qualitative interviewing and grounded theory analysis. The SAGE handbook of interview research: The complexity of the craft, 2, 347-365.","DOI":"10.4135\/9781452218403.n25"},{"key":"IJKM.2019040101-16","unstructured":"Chua, C., Storey, V., & Chen, L. (2014). Central IT or Shadow IT? Factors shaping users\u2019 decision to go rogue with IT. In Proceedings of the 35th International Conference of Information Systems (ICIS), Tel-Aviv, Israel."},{"key":"IJKM.2019040101-17","doi-asserted-by":"crossref","unstructured":"Daeuble, G., Oezcan, D., Niemoeller, C., Fellmann, M., Nuettgens, M., & Thomas, O. (2015). Information Needs of the Mobile Technical Customer Service--A Case Study in the Field of Machinery and Plant Engineering. In Proceedings of the Hawaii International Conference on System Sciences (HICSS), Manoa, Hawaii. IEEE.","DOI":"10.1109\/HICSS.2015.126"},{"key":"IJKM.2019040101-18","doi-asserted-by":"crossref","unstructured":"Dahiya, D., Gupta, M., & Jain, P. (2012). Enterprise Knowledge Management System: A Multi Agent Perspective. In Proceedings of the ICISTM. Springer.","DOI":"10.1007\/978-3-642-29166-1_24"},{"key":"IJKM.2019040101-19","author":"T. H.Davenport","year":"1993","journal-title":"Process innovation: reengineering work through information technology"},{"key":"IJKM.2019040101-20","doi-asserted-by":"publisher","DOI":"10.1257\/jep.29.3.3"},{"key":"IJKM.2019040101-21","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.92.4.967"},{"key":"IJKM.2019040101-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2014.06.022"},{"key":"IJKM.2019040101-23","doi-asserted-by":"publisher","DOI":"10.2307\/30036550"},{"key":"IJKM.2019040101-24","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1989.4308385"},{"key":"IJKM.2019040101-25","doi-asserted-by":"publisher","DOI":"10.1177\/1077800405284363"},{"key":"IJKM.2019040101-26","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2016.08.019"},{"key":"IJKM.2019040101-27","doi-asserted-by":"publisher","DOI":"10.1177\/1094670513490236"},{"key":"IJKM.2019040101-28","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.04103"},{"key":"IJKM.2019040101-29","doi-asserted-by":"publisher","DOI":"10.1002\/smj.722"},{"key":"IJKM.2019040101-30","author":"B.Glaser","year":"1992","journal-title":"Emergence vs forcing: basics of grounded theory analysis. Emergence vs forcing: basics of grounded theory analysis"},{"key":"IJKM.2019040101-31","unstructured":"Gy\u00f6ry, A., Cleven, A., Uebernickel, F., & Brenner, W. (2012). Exploring the shadows: IT governance approaches to user-driven innovation. In Proceedings of the 20th European Conference on Information Systems (ECIS), Barcelona, Spain."},{"key":"IJKM.2019040101-32","unstructured":"Haag, S., & Eckhardt, A. (2014). Normalizing the shadows\u2013The role of symbolic models for individuals\u2019 shadow IT usage. In Proceedings of the 35th International Conference of Information Systems (ICIS), Auckland, New Zealand."},{"key":"IJKM.2019040101-33","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-017-0497-x"},{"key":"IJKM.2019040101-34","unstructured":"Haag, S., Eckhardt, A., & Bozoyan, C. (2015). Are shadow system users the better IS users?\u2013insights of a lab experiment. In Proceedings of the 36th International Conference of Information Systems (ICIS), Dallas, Texas."},{"key":"IJKM.2019040101-35","unstructured":"Hannola, L., Heinrich, P., Richter, A., & Stocker, A. (2016). Sociotechnical challenges in knowledge-intensive production environments. In Proceedings of the ISPIM Conference. The International Society for Professional Innovation Management (ISPIM)."},{"key":"IJKM.2019040101-36","first-page":"1","article-title":"Empowering production workers with digitally facilitated knowledge processes\u2013a conceptual framework.","author":"L.Hannola","year":"2018","journal-title":"International Journal of Production Research"},{"issue":"3","key":"IJKM.2019040101-37","article-title":"IT consumerization: When gadgets turn into enterprise IT tools.","volume":"11","author":"J.Harris","year":"2012","journal-title":"MIS Quarterly Executive"},{"key":"IJKM.2019040101-38","doi-asserted-by":"crossref","unstructured":"Herrmann, C., Schmidt, C., Kurle, D., Blume, S., & Thiede, S. (2014). Sustainability in Manufacturing and Factories of the Future. International Journal of precision engineering and manufacturing-green technology, 1(4), 283-292.","DOI":"10.1007\/s40684-014-0034-z"},{"key":"IJKM.2019040101-39","doi-asserted-by":"publisher","DOI":"10.1007\/s10869-010-9160-y"},{"key":"IJKM.2019040101-40","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2017.05.016"},{"key":"IJKM.2019040101-41","doi-asserted-by":"publisher","DOI":"10.4018\/jkm.2008010105"},{"key":"IJKM.2019040101-42","doi-asserted-by":"crossref","unstructured":"Jennex, M. E., Smolnik, S., & Croasdell, D. (2012). Towards a consensus knowledge management success definition. In Organizational Learning and Knowledge: Concepts, Methodologies, Tools and Applications (pp. 403-415). Hershey, PA: IGI Global.","DOI":"10.4018\/978-1-60960-783-8.ch201"},{"key":"IJKM.2019040101-43","doi-asserted-by":"crossref","unstructured":"Jennex, M. E., Smolnik, S., & Croasdell, D. (2014). Knowledge management success in practice. In Proceedings of the 2014 47th Hawaii International Conference on System Sciences (HICSS). IEEE.","DOI":"10.1109\/HICSS.2014.450"},{"key":"IJKM.2019040101-44","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhm.2016.05.003"},{"key":"IJKM.2019040101-45","unstructured":"Jones, D., Behrens, S., Jamieson, K., & Tansley, E. (2004). The rise and fall of a shadow system: Lessons for enterprise system implementation. In ACIS 2004 Proceedings."},{"key":"IJKM.2019040101-46","unstructured":"K\u00f6ffer, S., Anlauf, L., Ortbach, K., & Niehaves, B. (2015). the intensified blurring of boundaries between work and private life through IT consumerisation. In Proceedings of the ECIS."},{"key":"IJKM.2019040101-47","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhm.2005.09.002"},{"key":"IJKM.2019040101-48","doi-asserted-by":"publisher","DOI":"10.1108\/IJOPM-05-2017-0294"},{"issue":"3","key":"IJKM.2019040101-49","article-title":"An Update on Business-IT Alignment:\u201d A Line\u201d Has Been Drawn.","volume":"6","author":"J.Luftman","year":"2007","journal-title":"MIS Quarterly Executive"},{"key":"IJKM.2019040101-50","unstructured":"MacCrory, F., Westerman, G., Alhammadi, Y., & Brynjolfsson, E. (2014). Racing with and against the machine: changes in occupational skill composition in an era of rapid technological advance. In Proceedings of the International Conference on Information Systems, Auckland, New Zealand."},{"key":"IJKM.2019040101-51","unstructured":"Maier, R. (2002). State-of-practice of knowledge management systems: Results of an empirical study. Informatik\/Informatique\u2013Knowledge Management, 1, 14-22."},{"key":"IJKM.2019040101-52","unstructured":"Mallmann, G., & Ma\u00e7ada, A. C. (2016). Behavioral Drivers Behind Shadow IT and Its Outcomes in Terms of Individual Performance. In Proceedings of the American Conference of Information Systems, San Diego, CA."},{"key":"IJKM.2019040101-53","first-page":"179","article-title":"A design theory for systems that support emergent knowledge processes.","author":"M. L.Markus","year":"2002","journal-title":"Management Information Systems Quarterly"},{"key":"IJKM.2019040101-54","article-title":"Using conceptual depth criteria: Addressing the challenge of reaching saturation in qualitative research.","author":"J.Nelson","year":"2016","journal-title":"Qualitative Research"},{"key":"IJKM.2019040101-55","unstructured":"Niehaves, B., K\u00f6ffer, S., & Ortbach, K. (2012). IT Consumerization\u2013A Theory and Practice Review. In Proceedings of the Eighteenth Americas Conference on Information Systems."},{"key":"IJKM.2019040101-56","author":"O.Nordhaug","year":"1993","journal-title":"Human capital in organizations: Competence, training, and learning"},{"key":"IJKM.2019040101-57","doi-asserted-by":"publisher","DOI":"10.1177\/1468794112446106"},{"key":"IJKM.2019040101-58","doi-asserted-by":"publisher","DOI":"10.1108\/09564230310474138"},{"key":"IJKM.2019040101-59","unstructured":"Ortbach, K., Walter, N., & \u00d6ks\u00fcz, A. (2015). Are you ready to lose control? A theory on the role of trust and risk perception on bring-your-own-device policy and information system service quality. In Proceedings of the ECIS."},{"key":"IJKM.2019040101-60","doi-asserted-by":"publisher","DOI":"10.1108\/13673270910971824"},{"key":"IJKM.2019040101-61","doi-asserted-by":"publisher","DOI":"10.1111\/1467-6486.00343"},{"key":"IJKM.2019040101-62","doi-asserted-by":"crossref","unstructured":"Richter, A., Hetmank, C., Klier, J., Klier, M., & M\u00fcller, M. (2016). Enterprise Social Networks from a Manager's Perspective. In Proceedings of the 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE.","DOI":"10.1109\/HICSS.2016.527"},{"key":"IJKM.2019040101-63","doi-asserted-by":"publisher","DOI":"10.1108\/03055721311329927"},{"key":"IJKM.2019040101-64","doi-asserted-by":"crossref","unstructured":"Schmidt, R., M\u00f6hring, M., H\u00e4rting, R.-C., Reichstein, C., Neumaier, P., & Jozinovi\u0107, P. (2015). Industry 4.0-potentials for creating smart products: empirical research results. In Proceedings of the International Conference on Business Information Systems. Springer.","DOI":"10.1007\/978-3-319-19027-3_2"},{"key":"IJKM.2019040101-65","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.06.007"},{"key":"IJKM.2019040101-66","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2017.02.007"},{"key":"IJKM.2019040101-67","doi-asserted-by":"publisher","DOI":"10.1108\/13673270610709251"},{"key":"IJKM.2019040101-68","unstructured":"Stadtmueller, L. (2013). The Hidden Truth Behind Shadow IT Six trends impacting your security posture. In Stratecast and Frost & Sullivan; 50 Years of Growth, Innovation and Leadership (pp. 1-13)."},{"key":"IJKM.2019040101-69","author":"R. E.Stake","year":"2008","journal-title":"Qualitative case studies"},{"key":"IJKM.2019040101-70","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.3"},{"key":"IJKM.2019040101-71","doi-asserted-by":"publisher","DOI":"10.21121\/eab.2010319615"},{"key":"IJKM.2019040101-72","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(12)70013-2"},{"key":"IJKM.2019040101-73","doi-asserted-by":"publisher","DOI":"10.1504\/IJHRDM.2004.004493"},{"key":"IJKM.2019040101-74","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0324"},{"key":"IJKM.2019040101-75","unstructured":"Waizenegger, L., Thalmann, S., Sarigianni, C., Eckhardt, A., Kolb, D., Maier, R., & Remus, U. (2016). From isolation to collaboration-how the increasing diffusion of mobile devices has changed practices of knowledge sharing in non-office settings. In Proceedings of the European Conference of Information Systems, Munster, Germany."},{"key":"IJKM.2019040101-76","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000589"},{"key":"IJKM.2019040101-77","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(13)70049-7"},{"key":"IJKM.2019040101-78","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-013-0296-y"},{"key":"IJKM.2019040101-79","unstructured":"West, D. (2012). How mobile devices are transforming healthcare. Issues in technology innovation, 18(1), 1-11."},{"key":"IJKM.2019040101-80","author":"R. K.Yin","year":"2015","journal-title":"Qualitative research from start to finish"},{"key":"IJKM.2019040101-81","doi-asserted-by":"publisher","DOI":"10.1108\/13673270910997088"},{"key":"IJKM.2019040101-82","unstructured":"Zainuddin, E. (2012). Secretly saas-ing: stealth adoption of software-as-a-service from the embeddedness perspective. In Proceedings of the meeting of the International Conference of Information Systems, Orlando, FL."},{"key":"IJKM.2019040101-83","unstructured":"Zimmermann, S., & Rentrop, C. (2014). On the emergence of shadow IT-A transaction cost-based approach. In Proceedings of the European Conference of Information Systems, Tel-Aviv, Israel."},{"key":"IJKM.2019040101-84","doi-asserted-by":"publisher","DOI":"10.2308\/isys-51579"}],"container-title":["International Journal of Knowledge Management"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=225474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T15:52:04Z","timestamp":1651852324000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJKM.2019040101"}},"subtitle":["The Role of Shadow IT in Practices in Manufacturing"],"short-title":[],"issued":{"date-parts":[[2019,4,1]]},"references-count":85,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijkm.2019040101","relation":{},"ISSN":["1548-0666","1548-0658"],"issn-type":[{"value":"1548-0666","type":"print"},{"value":"1548-0658","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,1]]}}}