Conceptualizing Shadow IT Integration Drawbacks from a Systemic Viewpoint
暂无分享,去创建一个
[1] Anselm L. Strauss,et al. Basics of qualitative research : techniques and procedures for developing grounded theory , 1998 .
[2] Muhammad Mustafa Kamal,et al. Facilitating enterprise application integration adoption: An empirical analysis of UK local government authorities , 2013, Int. J. Inf. Manag..
[3] Wing Lam,et al. Investigating success factors in enterprise application integration: a case-driven analysis , 2005, Eur. J. Inf. Syst..
[4] David Dagan Feng,et al. An Intelligent Middleware for Dynamic Integration of Heterogeneous Health Care Applications , 2005, 11th International Multimedia Modelling Conference.
[5] Marinos Themistocleous,et al. Journal of Enterprise Information Management Justifying the decisions for EAI implementations : a validated proposition of influential factors , 2016 .
[6] Christopher Rentrop,et al. Business-managed IT: A Conceptual Framework and Empirical Illustration , 2018, ECIS.
[7] Georg Schreyögg,et al. Organizational Path Dependence: Opening the Black Box , 2009 .
[8] Muhammad Mustafa Kamal,et al. The case of EAI in facilitating e-Government services in a Welsh authority , 2009, Int. J. Inf. Manag..
[9] Richard T. Watson,et al. Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..
[10] Martin Mocker,et al. Driving Digitization at Audi , 2017, ICIS.
[11] Vasiliki Mantzana,et al. Benefits and barriers related to eai adoption: the case of a healthcare organisation , 2006, ECIS.
[12] Frédéric Thiesse,et al. Integration: an omitted Variable in Information Systems Research , 2012, ECIS.
[13] Mario Silic,et al. Influence of Shadow IT on Innovation in Organizations , 2016, Complex Syst. Informatics Model. Q..
[14] Till J. Winkler,et al. Two Tales of Technology: Business and IT Managers' Technological Frames Related to Cloud Computing , 2017, ICIS.
[15] Andreas Eckhardt,et al. Shadow IT , 2017, Bus. Inf. Syst. Eng..
[16] Robert Winter,et al. An architecture model for supporting application integration decisions , 2003, ECIS.
[17] Knut H. Rolland,et al. Ambidextrous Enterprise Architecting: Betting on the Future and Hacking Path-dependencies , 2015, ECIS.
[18] Bendik Bygstad,et al. The Generative Mechanisms of Digital Infrastructure Evolution , 2013, MIS Q..
[19] D. North. Competing Technologies , Increasing Returns , and Lock-In by Historical Events , 1994 .
[20] Carsten Felden,et al. The Relation of Shadow Systems and ERP Systems - Insights from a Multiple-Case Study , 2016, Syst..
[21] C. Fornell. A National Customer Satisfaction Barometer: The Swedish Experience: , 1992 .
[22] Marinos Themistocleous,et al. Taxonomy of Factors for Information System Application Integration , 2000 .
[23] Yajiong Xue,et al. Organization Structural and Cultural Influences in Hospital Information Systems Integration , 2005, AMCIS.
[24] Carsten Felden,et al. Integration of Shadow IT Systems with Enterprise Systems - A Literature Review , 2017, PACIS.
[25] Björn Niehaves,et al. Innovation Through BYOD? , 2015, Business & Information Systems Engineering.
[26] Javed Iqbal,et al. Taxonomy of Factors Causing Integration Failure during Global Software Development , 2018, IEEE Access.
[27] Carsten Felden,et al. Toward a Conceptual Decision Framework for Shadow IT Integration , 2018, AMCIS.
[28] Marinos Themistocleous,et al. Evaluating the Adoption of Enterprise Application Integration in Health-Care Organizations , 2006, J. Manag. Inf. Syst..
[29] Carlo R. Laing,et al. Taking the Pulse , 2014 .
[30] Judy K. Frels,et al. Consumer switching costs: A typology, antecedents, and consequences , 2003 .
[31] Walter Brenner,et al. European Conference on Information Systems ( ECIS ) 5-15-2012 EXPLORING THE SHADOWS : IT GOVERNANCE APPROACHES TO USER-DRIVEN INNOVATION , 2012 .
[32] Christian Glaschke,et al. Weighting of Integration Qualities in IS Architectures: A Production Case , 2015, ECIS.
[33] Andreas Eckhardt,et al. We are Social: a Social Influence Perspective to investigate Shadow IT Usage , 2018, ECIS.
[34] Thomas Schmidt,et al. The Path Biography Methodology: Analyzing Self-Reinforcing Mechanisms on Technical and Organizational Levels , 2015, ICIS.
[35] Sandy Behrens,et al. Shadow systems: the good, the bad and the ugly , 2009, CACM.
[36] Daniel Fürstenau,et al. Shadow IT Systems: Discerning the Good and the evil , 2014, ECIS.
[37] Robert Winter,et al. Success Factors and Performance Indicators for Enterprise Application Integration , 2005, AMCIS.
[38] Jugoslav Achkoski,et al. Intelligence information system (IIS) with SOA-based information systems , 2011, Proceedings of the ITI 2011, 33rd International Conference on Information Technology Interfaces.
[39] Torsten Eymann,et al. Digitalization: Opportunity and Challenge for the Business and Information Systems Engineering Community , 2017, Business & Information Systems Engineering.
[40] Carsten Felden,et al. A Multiple Case Study on the Nature and Management of Shadow Information Technology , 2017, J. Inf. Syst..
[41] Harminder Singh,et al. Emergence and Consequences of Drift in Organizational Information Systems , 2010, PACIS.
[42] Lars Bækgaard,et al. Dilemmas in Enterprise Architecture Research and Practice from a Perspective of Feral Information Systems , 2013, 2013 17th IEEE International Enterprise Distributed Object Computing Conference Workshops.
[43] Andreas Eckhardt,et al. Normalizing the Shadows - The Role of Symbolic Models for Individuals' Shadow IT Usage , 2014, ICIS.
[44] Carsten Felden,et al. The Influence of Shadow IT Systems on Enterprise Architecture Management Concerns , 2017, EMCIS.
[45] Alexander Richter,et al. Knowledge Management without Management - Shadow IT in Knowledge-Intensive manufacturing Practices , 2017, ECIS.
[46] Stefan Henningsson,et al. The Paradox of Post-Acquisition IS Integration Preparation: Preparing Under Incomplete Information , 2018, 2018 IEEE 20th Conference on Business Informatics (CBI).
[47] Christopher Rentrop,et al. On the Emergence of Shadow IT - a Transaction Cost-Based Approach , 2014, ECIS.
[48] Hui Wang,et al. Research of Strategic Route in Heterogeneous System Integration Based on ESB-SOA , 2009, 2009 International Conference on Computational Intelligence and Software Engineering.
[49] Marinos Themistocleous,et al. Benchmarking the benefits and barriers of application integration , 2001 .
[50] Paul Louis Drnevich,et al. Information Technology and Business-Level Strategy: Toward an Integrated Theoretical Perspective , 2013, MIS Q..
[51] David C. Yen,et al. Critical Factors of Adopting Enterprise Application Integration Technology: An Empirical Study on Larger Hospitals , 2015, Commun. Assoc. Inf. Syst..
[52] Daniel Fürstenau,et al. Shadow Systems, Risk, and Shifting Power Relations in Organizations , 2017, Commun. Assoc. Inf. Syst..
[53] Piyush Maheshwari,et al. Enterprise application integration using a component-based architecture , 2003, Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003.
[54] Mario Silic. Critical impact of organizational and individual inertia in explaining non-compliant security behavior in the Shadow IT context , 2019, Comput. Secur..