Justifying Shadow IT Usage
نویسندگان
چکیده
Employees and/or functional managers increasingly adopt and use IT systems and services that the IS management of the organization does neither provide nor approve. To effectively counteract such shadow IT in organizations, the understanding of employees’ motivations and drivers is necessary. However, the scant literature on this topic primarily focused on various governance approaches at firm level. With the objective to open the black box of shadow IT usage at the individual unit of analysis, we develop a research model and propose a laboratory experiment to examine users’ justifications for violating implicit and explicit IT usage restrictions based on neutralization theory. To be precise, in this research-in-progress, we posit positive associations between shadow IT usage and human tendencies to downplay such kind of rule-breaking behaviors due to necessity, no injury, and injustice. We expect a lower impact of these neutralization effects in the presence of behavioral IT guidelines that explicitly prohibit users to employ exactly those shadow IT systems.
منابع مشابه
Normalizing the Shadows - The Role of Symbolic Models for Individuals' Shadow IT Usage
Employees increasingly use cloud services of third party providers to efficiently perform their job. Interestingly, the majority adopts the cloud without approval of the organization. IT resources like that are commonly referred to as shadow IT. Although widespread in practice, the present literature on shadow IT is scarce lacking a clear definition of the phenomenon and exclusively focusing on...
متن کاملAre Shadow System Users the Better IS Users? â•fi Insights of a Lab Experiment
Prior research argues that the effective usage of a mandatory system varies with users’ individual differences and engagement, the tasks carried out, and the system features applied. In this study, we analyze individual-level system usage to improve performance by adapting and expanding the number and configuration of systems in use. Thus, we address IT executives’ increasing challenge of users...
متن کاملSegmentation of Soft Shadows Based on a Daylight- and Penumbra Model
This paper introduces a new concept within shadow segmentation for usage in shadow removal and augmentation through construction of an alpha overlay shadow model. Previously, an image was considered to consist of shadow and non-shadow regions. We construct a model that accounts for sunlit, umbra and penumbra regions. The model is based on theories about color constancy, daylight, and the geomet...
متن کاملUsage-Based Pricing and Demand for Residential Broadband
The increasing use of the Internet creates a need to manage traffic while preserving equal treatment of content. We estimate demand for residential broadband, using high-frequency data from subscribers facing a three-part tariff, and use the estimates to study the welfare implications of usage-based pricing, a commonly offered solution to network congestion. The three-part tariff makes data usa...
متن کاملExamining IT Usage Across Different Hierarchical Levels in Organizations: A Study of Organizational, Environmental, and IT Factors
Though IT usage has been identified as a significant construct, significant gaps remain in our understanding of how IT is used by different organizational members. In this paper, we examine the key organizational, external environmental, and IT-related factors that influence IT usage in organizations across management and non-management levels. Based on data from over 500 functional managers, w...
متن کامل