Conceptualizing Shadow IT Integration Drawbacks from a Systemic Viewpoint

Business units are increasingly able to fuel the transformation that digitalization demands of organizations. Thereby, they can implement Shadow IT (SIT) without involving a central IT department to create flexible and innovative solutions. Self-reinforcing effects lead to an intertwinement of SIT with the organization. As a result, high complexities, redundancies, and sometimes even lock-ins occur. IT Integration suggests itself to meet these challenges. However, it can also eliminate the benefits that SIT presents. To help organizations in this area of conflict, we are conducting a literature review including a systematic search and an analysis from a systemic viewpoint using path dependency and switching costs. Our resulting conceptual framework for SIT integration drawbacks classifies the drawbacks into three dimensions. The first dimension consists of switching costs that account for the financial, procedural, and emotional drawbacks and the drawbacks from a loss of SIT benefits. The second dimension includes organizational, technical, and level-spanning criteria. The third dimension classifies the drawbacks into the global level, the local level, and the interaction between them. We contribute to the scientific discussion by introducing a systemic viewpoint to the research on shadow IT. Practitioners can use the presented criteria to collect evidence to reach an IT integration decision.

[1]  Anselm L. Strauss,et al.  Basics of qualitative research : techniques and procedures for developing grounded theory , 1998 .

[2]  Muhammad Mustafa Kamal,et al.  Facilitating enterprise application integration adoption: An empirical analysis of UK local government authorities , 2013, Int. J. Inf. Manag..

[3]  Wing Lam,et al.  Investigating success factors in enterprise application integration: a case-driven analysis , 2005, Eur. J. Inf. Syst..

[4]  David Dagan Feng,et al.  An Intelligent Middleware for Dynamic Integration of Heterogeneous Health Care Applications , 2005, 11th International Multimedia Modelling Conference.

[5]  Marinos Themistocleous,et al.  Journal of Enterprise Information Management Justifying the decisions for EAI implementations : a validated proposition of influential factors , 2016 .

[6]  Christopher Rentrop,et al.  Business-managed IT: A Conceptual Framework and Empirical Illustration , 2018, ECIS.

[7]  Georg Schreyögg,et al.  Organizational Path Dependence: Opening the Black Box , 2009 .

[8]  Muhammad Mustafa Kamal,et al.  The case of EAI in facilitating e-Government services in a Welsh authority , 2009, Int. J. Inf. Manag..

[9]  Richard T. Watson,et al.  Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..

[10]  Martin Mocker,et al.  Driving Digitization at Audi , 2017, ICIS.

[11]  Vasiliki Mantzana,et al.  Benefits and barriers related to eai adoption: the case of a healthcare organisation , 2006, ECIS.

[12]  Frédéric Thiesse,et al.  Integration: an omitted Variable in Information Systems Research , 2012, ECIS.

[13]  Mario Silic,et al.  Influence of Shadow IT on Innovation in Organizations , 2016, Complex Syst. Informatics Model. Q..

[14]  Till J. Winkler,et al.  Two Tales of Technology: Business and IT Managers' Technological Frames Related to Cloud Computing , 2017, ICIS.

[15]  Andreas Eckhardt,et al.  Shadow IT , 2017, Bus. Inf. Syst. Eng..

[16]  Robert Winter,et al.  An architecture model for supporting application integration decisions , 2003, ECIS.

[17]  Knut H. Rolland,et al.  Ambidextrous Enterprise Architecting: Betting on the Future and Hacking Path-dependencies , 2015, ECIS.

[18]  Bendik Bygstad,et al.  The Generative Mechanisms of Digital Infrastructure Evolution , 2013, MIS Q..

[19]  D. North Competing Technologies , Increasing Returns , and Lock-In by Historical Events , 1994 .

[20]  Carsten Felden,et al.  The Relation of Shadow Systems and ERP Systems - Insights from a Multiple-Case Study , 2016, Syst..

[21]  C. Fornell A National Customer Satisfaction Barometer: The Swedish Experience: , 1992 .

[22]  Marinos Themistocleous,et al.  Taxonomy of Factors for Information System Application Integration , 2000 .

[23]  Yajiong Xue,et al.  Organization Structural and Cultural Influences in Hospital Information Systems Integration , 2005, AMCIS.

[24]  Carsten Felden,et al.  Integration of Shadow IT Systems with Enterprise Systems - A Literature Review , 2017, PACIS.

[25]  Björn Niehaves,et al.  Innovation Through BYOD? , 2015, Business & Information Systems Engineering.

[26]  Javed Iqbal,et al.  Taxonomy of Factors Causing Integration Failure during Global Software Development , 2018, IEEE Access.

[27]  Carsten Felden,et al.  Toward a Conceptual Decision Framework for Shadow IT Integration , 2018, AMCIS.

[28]  Marinos Themistocleous,et al.  Evaluating the Adoption of Enterprise Application Integration in Health-Care Organizations , 2006, J. Manag. Inf. Syst..

[29]  Carlo R. Laing,et al.  Taking the Pulse , 2014 .

[30]  Judy K. Frels,et al.  Consumer switching costs: A typology, antecedents, and consequences , 2003 .

[31]  Walter Brenner,et al.  European Conference on Information Systems ( ECIS ) 5-15-2012 EXPLORING THE SHADOWS : IT GOVERNANCE APPROACHES TO USER-DRIVEN INNOVATION , 2012 .

[32]  Christian Glaschke,et al.  Weighting of Integration Qualities in IS Architectures: A Production Case , 2015, ECIS.

[33]  Andreas Eckhardt,et al.  We are Social: a Social Influence Perspective to investigate Shadow IT Usage , 2018, ECIS.

[34]  Thomas Schmidt,et al.  The Path Biography Methodology: Analyzing Self-Reinforcing Mechanisms on Technical and Organizational Levels , 2015, ICIS.

[35]  Sandy Behrens,et al.  Shadow systems: the good, the bad and the ugly , 2009, CACM.

[36]  Daniel Fürstenau,et al.  Shadow IT Systems: Discerning the Good and the evil , 2014, ECIS.

[37]  Robert Winter,et al.  Success Factors and Performance Indicators for Enterprise Application Integration , 2005, AMCIS.

[38]  Jugoslav Achkoski,et al.  Intelligence information system (IIS) with SOA-based information systems , 2011, Proceedings of the ITI 2011, 33rd International Conference on Information Technology Interfaces.

[39]  Torsten Eymann,et al.  Digitalization: Opportunity and Challenge for the Business and Information Systems Engineering Community , 2017, Business & Information Systems Engineering.

[40]  Carsten Felden,et al.  A Multiple Case Study on the Nature and Management of Shadow Information Technology , 2017, J. Inf. Syst..

[41]  Harminder Singh,et al.  Emergence and Consequences of Drift in Organizational Information Systems , 2010, PACIS.

[42]  Lars Bækgaard,et al.  Dilemmas in Enterprise Architecture Research and Practice from a Perspective of Feral Information Systems , 2013, 2013 17th IEEE International Enterprise Distributed Object Computing Conference Workshops.

[43]  Andreas Eckhardt,et al.  Normalizing the Shadows - The Role of Symbolic Models for Individuals' Shadow IT Usage , 2014, ICIS.

[44]  Carsten Felden,et al.  The Influence of Shadow IT Systems on Enterprise Architecture Management Concerns , 2017, EMCIS.

[45]  Alexander Richter,et al.  Knowledge Management without Management - Shadow IT in Knowledge-Intensive manufacturing Practices , 2017, ECIS.

[46]  Stefan Henningsson,et al.  The Paradox of Post-Acquisition IS Integration Preparation: Preparing Under Incomplete Information , 2018, 2018 IEEE 20th Conference on Business Informatics (CBI).

[47]  Christopher Rentrop,et al.  On the Emergence of Shadow IT - a Transaction Cost-Based Approach , 2014, ECIS.

[48]  Hui Wang,et al.  Research of Strategic Route in Heterogeneous System Integration Based on ESB-SOA , 2009, 2009 International Conference on Computational Intelligence and Software Engineering.

[49]  Marinos Themistocleous,et al.  Benchmarking the benefits and barriers of application integration , 2001 .

[50]  Paul Louis Drnevich,et al.  Information Technology and Business-Level Strategy: Toward an Integrated Theoretical Perspective , 2013, MIS Q..

[51]  David C. Yen,et al.  Critical Factors of Adopting Enterprise Application Integration Technology: An Empirical Study on Larger Hospitals , 2015, Commun. Assoc. Inf. Syst..

[52]  Daniel Fürstenau,et al.  Shadow Systems, Risk, and Shifting Power Relations in Organizations , 2017, Commun. Assoc. Inf. Syst..

[53]  Piyush Maheshwari,et al.  Enterprise application integration using a component-based architecture , 2003, Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003.

[54]  Mario Silic Critical impact of organizational and individual inertia in explaining non-compliant security behavior in the Shadow IT context , 2019, Comput. Secur..