This is a preview of subscription content, access via your institution.


  1. 1.

    Behrens S (2009) Shadow systems: the good, the bad and the ugly. Commun ACM 52(2):124–129

    Article  Google Scholar 

  2. 2. (o. J.) Thema Schatten-IT,,284194, letzter Zugriff: 24. August 2015

  3. 3.

    Cloud Security Alliance (2015) Cloud Adoptions Practices & Priorities Survey Report

  4. 4.

    Zimmermann S, Rentrop C, Felden C (2014) Managing Shadow IT Instances – a Method to Control Autonomous IT Solutions in the Business Departments. In: 20th Americas Conference on Information Systems

  5. 5.

    Yates M (2014) Shadow IT is not just the CIO’s problem — it is the CFO’s problem,, letzter Zugriff: 24. August 2015

  6. 6.

    Haag S (2015) Appearance of Dark Clouds? – An Empirical Analysis of Users’ Shadow Sourcing of Cloud Services. In: Wirtschaftsinformatik Proceedings 2015, Paper 96

  7. 7.

    British Telecommunications (2014) Creativity and the modern CIO research – global results,, letzter Zugriff: 24. August 2015

  8. 8.

    Rentrop C, Zimmermann S, Huber M (2015) Schatten-IT ein unterschätztes Risiko? In: D·A·CH Security 2015, S 291–300

  9. 9.

    Chua C, Storey V, Chen L (2014) Central IT or Shadow IT? Factors Shaping Users’ Decision to Go Rogue With IT. In: 35th International Conference on Information Systems, Auckland, New Zealand

  10. 10.

    Fürstenau D, Rothe H (2014) Shadow IT systems: discerning the good and the evil. In: 22nd European Conference on Information Systems, Tel Aviv, Israel

  11. 11.

    Mauerer J (2014) Governance-Dilemma durch die Schatten-IT,,2943550, letzter Zugriff: 24. August 2015

Download references

Author information



Corresponding author

Correspondence to Christopher Rentrop.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Rentrop, C., Zimmermann, S. Schatten-IT. Informatik Spektrum 38, 564–567 (2015).

Download citation