Business & Information Systems Engineering

, Volume 59, Issue 6, pp 469–473 | Cite as

Shadow IT

  • Steffi HaagEmail author
  • Andreas Eckhardt

Shadow IT – An Increasingly Relevant Phenomenon

Innovative information technology (IT) applications and services offered in the cloud, easily accessible via the Internet, either for free or on a flexible pay-per-use basis are increasing rapidly. Employees can use them on organizational and/or personal laptops, tablets, and smartphones to work more efficiently from home or when travelling, or to collaborate conveniently across distance and time zones. While these benefits may fuel today’s digital transformation, they also attract end users or lines of business to turn to such IT offerings on demand without having the organization’s approval to act (e.g., Györy et al. 2012; Urbach and Ahlemann 2016). This trend boosts shadow IT which is hardware, software, or services built, introduced, and/or used for the job without explicit approval or even knowledge of the organization. Recent studies show that 80% of end users and 90% of functional managers deploy shadow IT and opt, for example, to...


Shadow IT Shadow systems Workaround Bring-your-own IT consumerization 


  1. Alter S (2014) Theory of workarounds. Commun Assoc Inf Syst 34:1041–1066Google Scholar
  2. Brown CV, Magill SL (1994) Alignment of the IS functions with the enterprise: toward a model of antecedents. MIS Q 18:371CrossRefGoogle Scholar
  3. Burton-Jones A, Straub D (2006) Reconceptualizing system usage: an approach and empirical test. Inf Syst Res 17:228–246CrossRefGoogle Scholar
  4. Corbin K (2015) CIOs vastly underestimate extent of shadow IT. Accessed 17 Apr 2016
  5. Ferneley EH, Sobreperez P (2006) Resist, comply or workaround? An examination of different facets of user engagement with information systems. Eur J Inf Syst 15:345–356CrossRefGoogle Scholar
  6. Fürstenau D, Rothe H (2014) Shadow IT systems: discerning the good and the evil. In: Proceedings of the 22nd European Conference on Information Systems. Tel AvivGoogle Scholar
  7. Györy A, Cleven A, Uebernickel F, Brenner W (2012) Exploring the shadows: IT governance approaches to user-driven innovation. In: Proceedings of the 20th European Conference on Information Systems. BarcelonaGoogle Scholar
  8. Haag S, Eckhardt A, Bozoyan C (2015) Are shadow system users the better IS users? Insights of a lab experiment. In: Proceedings of the 36th International Conference on Information Systems. Fort WorthGoogle Scholar
  9. Harris J, Ives B, Junglas I (2012) IT consumerization: when gadgets turn into enterprise IT tools. MIS Q Exec 11:99–112Google Scholar
  10. Horlach B, Drews P, Schirmer I, Böhmann T (2017) Increasing the agility of IT delivery: five types of bimodal IT organization. In: Proceedings of the 50th Hawaii International Conference on System Sciences. Big Island, HawaiiGoogle Scholar
  11. Köffer S, Ortbach K, Junglas I, Niehaves B, Harris J (2015) Innovation through BYOD? Bus Inf Syst Eng 57:363–375CrossRefGoogle Scholar
  12. Liang H, Xue Y, Wu L (2013) Ensuring employees’ IT compliance: carrot or stick? Inf Syst Res 24:279–294CrossRefGoogle Scholar
  13. Martin AW, Lopez SH, Roscigno VJ, Hodson R (2013) Against the rules: synthesizing types and processes of bureaucratic rule-breaking. Acad Manag Rev 38:550–574CrossRefGoogle Scholar
  14. Segal M (2016) Dealing with the realities of shadow IT. In: Datacenter J. Accessed 22 Nov 2016
  15. Silic M, Back A (2014) Shadow IT–a view from behind the curtain. Comput Secur 45:274–283CrossRefGoogle Scholar
  16. Sun H (2012) Understanding user revisions when using information system features: adaptive system use and triggers. MIS Q 36:453–478Google Scholar
  17. Urbach N, Ahlemann F (2016) Schatten-IT als gelebte Praxis–IT-Innovationen werden in interdisziplinären Teams in den Fachabteilungen erarbeitet. In: Urbach N, Ahlemann F (eds) IT-Management im Zeitalter der Digitalisierung. Springer, Heidelberg, pp 67–75CrossRefGoogle Scholar
  18. Zimmermann S, Rentrop C, Felden C (2016) Governing identified shadow IT by allocating IT task responsibilities. In: Proceedings of the 22nd Americas Conference on Information Systems. San DiegoGoogle Scholar

Copyright information

© Springer Fachmedien Wiesbaden GmbH 2017

Authors and Affiliations

  1. 1.Chair of Information Systems and E-ServicesTechnische Universität DarmstadtDarmstadtGermany
  2. 2.German Graduate School of Management and Law (GGS)HeilbronnGermany

Personalised recommendations