Knowledge Management in the Dark: The Role of Shadow IT in Practices in Manufacturing

ThevoluntaryuseofprivatedevicesbyemployeeswithouttheformalapprovaloftheITdepartment, commonlytermedShadowIT,isanincreasinglywidespreadphenomenon.Inthisarticle,theauthors study the role of private smartphones (and related applications like WhatsApp) in knowledgeintensivepracticesinthemanufacturingdomain.Withanin-depthcasestudybasedondatagained fromobservationsand interviews, theauthorsareable toempirically illustratewhyworkersuse their private smartphones (contrary to company guidelines) and how they find significant gains ofproductivitybyusingtheforbiddenapplications.Thisstudygivesrichinsightsintotheriseof ShadowITinamanufacturingcontextwhichtakesplaceinaself-organisedwaywithoutknowledge ofthemanagement. KeywoRDS Knowledge Management, Manufacturing, Private IT, Shadow IT, Worker-Centric

[1]  Richard Baskerville,et al.  Individual information systems as a research arena , 2011, Eur. J. Inf. Syst..

[2]  Björn Niehaves,et al.  AIS Electronic , 2017 .

[3]  Rogelio Oliva,et al.  Managing the transition from products to services , 2003, International Journal of Service Industry Management.

[4]  Glenn A. Bowen Naturalistic inquiry and the saturation concept: a research note , 2008 .

[5]  Kevin Crowston,et al.  A pragmatic approach to managing enterprise IT infrastructures in the era of consumerization and individualization of IT , 2017, Int. J. Inf. Manag..

[6]  James Nelson,et al.  Using conceptual depth criteria: addressing the challenge of reaching saturation in qualitative research , 2017 .

[7]  Diane M. Strong,et al.  A roadmap for enterprise system implementation , 2004, Computer.

[8]  Izak Benbasat,et al.  The Case Research Strategy in Studies of Information Systems , 1987, MIS Q..

[9]  Line Dubé,et al.  Rigor in Information Systems Positivist Case Research: Current Practices , 2003, MIS Q..

[10]  Ravi Shankar,et al.  Survey of knowledge management practices in Indian manufacturing industries , 2006, J. Knowl. Manag..

[11]  Andrea Back,et al.  Shadow it – A View from Behind the Curtain , 2014, Comput. Secur..

[12]  Daniel Fürstenau,et al.  Shadow Systems, Risk, and Shifting Power Relations in Organizations , 2017, Commun. Assoc. Inf. Syst..

[13]  M. Gibbert,et al.  What passes as a rigorous case study , 2008 .

[14]  Murray E. Jennex Impacts from Using Knowledge: A Longitudinal Study from a Nuclear Power Plant , 2008, Int. J. Knowl. Manag..

[15]  James D. McKeen,et al.  Knowledge management and organizational performance: an exploratory analysis , 2009, J. Knowl. Manag..

[16]  Andreas Eckhardt,et al.  Are Shadow System Users the Better IS Users? - Insights of a Lab Experiment , 2015, ICIS.

[17]  Sandy Behrens,et al.  Why Do Shadow Systems Exist after an ERP Implementation? Lessons from a Case Study , 2004, PACIS.

[18]  Ergin Sait Varol,et al.  A Study On The Acceptance Of Information Technologies From The Perspectives Of The Academicians In Turkey , 2010 .

[19]  Jan C. Aurich,et al.  Life cycle oriented design of technical Product-Service Systems , 2006 .

[20]  Alexander Richter,et al.  The Blessing of Giving: Kowledge Sharing and Knowledge seeking in Enterprise Social Networks , 2016, ECIS.

[21]  Gordon Thomson BYOD: enabling the chaos , 2012, Netw. Secur..

[22]  Frank MacCrory,et al.  Racing With and Against the Machine: Changes in Occupational Skill Composition in an Era of Rapid Technological Advance , 2014, ICIS.

[23]  Christopher Rentrop,et al.  On the Emergence of Shadow IT - a Transaction Cost-Based Approach , 2014, ECIS.

[24]  Steven L. Alter,et al.  USF Scholarship: a digital repository @ Gleeson Library | Geschke Center , 2016 .

[25]  Alexander Richter,et al.  Sociotechnical challenges in knowledge-intensive production environments , 2016 .

[26]  Björn Niehaves,et al.  The Intensified Blurring of Boundaries Between Work and Private Life through IT Consumerisation , 2015, ECIS.

[27]  Regina-Viola Frey,et al.  How Customer Satisfaction Affects Employee Satisfaction and Retention in a Professional Services Context , 2013 .

[28]  David Sundaram,et al.  European Conference on Information Systems ( ECIS ) 5-2-2012 DIGITAL NATIVES AND DIGITAL IMMIGRANTS : TOWARDS A MODEL OF DIGITAL FLUENCY , 2013 .

[29]  Murray E. Jennex,et al.  Knowledge Management Success in Practice , 2014, 2014 47th Hawaii International Conference on System Sciences.

[30]  Murray E. Jennex,et al.  Towards a consensus knowledge management success definition , 2009 .

[31]  Shahper Vodanovich,et al.  Research Commentary - Digital Natives and Ubiquitous Information Systems , 2010, Inf. Syst. Res..

[32]  Gerardo Patriotta Sensemaking on the Shop Floor: Narratives of Knowledge in Organizations* , 2003 .

[33]  Michael Möhring,et al.  Industry 4.0 - Potentials for Creating Smart Products: Empirical Research Results , 2015, BIS.

[34]  Oliver Thomas,et al.  Information Needs of the Mobile Technical Customer Service -- A Case Study in the Field of Machinery and Plant Engineering , 2015, 2015 48th Hawaii International Conference on System Sciences.

[35]  Sandy Behrens,et al.  Shadow systems: the good, the bad and the ugly , 2009, CACM.

[36]  Denis Kurle,et al.  Sustainability in manufacturing and factories of the future , 2014 .

[37]  Alexander Richter,et al.  Participative Knowledge Management to Empower Manufacturing Workers , 2016, Int. J. Knowl. Manag..

[38]  M. J. Donate,et al.  The role of knowledge-oriented leadership in knowledge management practices and innovation , 2015 .

[39]  A. Richter,et al.  Knowledge Management Goals Revisited – A Cross-Sectional Analysis of Social Software Adoption in Corporate Environments , 2013 .

[40]  Michael A. Osborne,et al.  The future of employment: How susceptible are jobs to computerisation? , 2017 .

[41]  M. O’Reilly,et al.  ‘Unsatisfactory Saturation’: a critical exploration of the notion of saturated sample sizes in qualitative research , 2013 .

[42]  J. Aurich,et al.  How to design and offer services successfully , 2010 .

[43]  J. Diefendorff,et al.  The relations of motivational traits with workplace deviance. , 2007, The Journal of applied psychology.

[44]  K. Jamieson,et al.  The Rise and Fall of a Shadow System: Lessons for Enterprise System Implementation , 2004 .

[45]  Dorothy E. Leidner,et al.  Review: Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues , 2001, MIS Q..

[46]  Sotirios Paroutis,et al.  Determinants of knowledge sharing using Web 2.0 technologies , 2009, J. Knowl. Manag..

[47]  Jerry N. Luftman,et al.  An Update on Business-IT Alignment: "A Line" Has Been Drawn , 2007, MIS Q. Executive.

[48]  Pooja Jain,et al.  Enterprise Knowledge Management System: A Multi Agent Perspective , 2012, ICISTM.

[49]  B. Flyvbjerg Five Misunderstandings About Case-Study Research , 2006, 1304.1186.

[50]  Walter Brenner,et al.  European Conference on Information Systems ( ECIS ) 5-15-2012 EXPLORING THE SHADOWS : IT GOVERNANCE APPROACHES TO USER-DRIVEN INNOVATION , 2012 .

[51]  Kevin Ortbach,et al.  Are You Ready to Lose Control? A Theory on the Role of Trust and Risk Perception on Bring-Your-Own-Device Policy and Information System Service Quality , 2015, ECIS.

[52]  Andrea Hershatter,et al.  Millennials and the World of Work: An Organization and Management Perspective , 2010 .

[53]  A. Richter,et al.  “Power to the workers” , 2019, International Journal of Operations & Production Management.

[54]  Carsten Felden,et al.  A Multiple Case Study on the Nature and Management of Shadow Information Technology , 2017, J. Inf. Syst..

[55]  Antonio Carlos Gastaud Maçada,et al.  Behavioral Drivers Behind Shadow IT and Its Outcomes in Terms of Individual Performance , 2016, AMCIS.

[56]  K. Charmaz,et al.  Qualitative interviewing and grounded theory analysis , 2012 .

[57]  David H. Autor,et al.  Why Are There Still So Many Jobs? The History and Future of Workplace , 2015 .

[58]  Alexander Richter,et al.  Enterprise Social Networks from a Manager's Perspective , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).

[59]  Ronald Maier,et al.  From Isolation to Collaboration - How the Increasing diffusion of Mobile Devices has changed Practices of Knowledge Sharing in non-Office Settings , 2016, ECIS.

[60]  Geoff Walsham,et al.  Doing interpretive research , 2006, Eur. J. Inf. Syst..

[61]  Mary Jo Bitner,et al.  Technology’s Impact on the Gaps Model of Service Quality , 2010 .

[62]  Alexander Richter,et al.  Empowering production workers with digitally facilitated knowledge processes – a conceptual framework , 2018, Int. J. Prod. Res..

[63]  Richard Walters,et al.  Bringing IT out of the shadows , 2013, Netw. Secur..

[64]  Miyoung Jeong,et al.  Employees’ use of mobile devices and their perceived outcomes in the workplace: A case of luxury hotel , 2016 .

[65]  Les Gasser,et al.  A Design Theory for Systems That Support Emergent Knowledge Processes , 2002, MIS Q..

[66]  K. Eisenhardt Building theories from case study research , 1989, STUDI ORGANIZZATIVI.

[67]  Ralf Knackstedt,et al.  Information Needs in Service Systems - A Framework for Integrating Service and Manufacturing Business Processes , 2011, 2011 44th Hawaii International Conference on System Sciences.

[68]  Jaakko Virkkunen,et al.  Transforming learning and knowledge creation on the shop floor , 2004 .

[69]  Stephen J. Andriole Managing Technology in a 2.0 World , 2012, IT Professional.

[70]  T. Lam,et al.  A study of hotel employee behavioral intentions towards adoption of information technology , 2007 .

[71]  Blake Ives,et al.  IT Consumerization: When Gadgets Turn Into Enterprise IT Tools , 2012, MIS Q. Executive.

[72]  Andrea Back,et al.  A new perspective on neutralization and deterrence: Predicting shadow IT usage , 2017, Inf. Manag..

[73]  Eruani Zainuddin Secretly SaaS-ing: Stealth Adoption of Software-as-a-Service from the Embeddedness Perspective , 2012, ICIS.