We are Social: a Social Influence Perspective to investigate Shadow IT Usage

Shadow IT can be used by one individual or a group of employees, which suggest two levels of use: an individual and collective use of shadow IT. The study takes a social influence perspective to investigate the mechanisms that underlie the dissemination process of shadow IT among users and uncover the reasons why they use shadow IT. We performed a survey among employees of four companies. The results show that the social influence varies depending on the group of reference in question (peer, superior, mass influence). We found that employees are strongly influenced by their peers and by a mass of people to use a shadow IT, such as co-workers, professional workmates, and employees from other departments, suggesting a broader range of social influence that can affect the use of shadow IT. We aid to clarify some reasons why employee uses shadow IT and how the dissemination process occurs among users. Also, as social influence is based on communication and social interactions, organizations may pay attention in creating initiatives and taking actions to engaged users in the information security policies, which is one of the primary concern related to shadow IT.

[1]  Ephraim R. McLean,et al.  The DeLone and McLean Model of Information Systems Success: A Ten-Year Update , 2003, J. Manag. Inf. Syst..

[2]  Andrea Back,et al.  Shadow it – A View from Behind the Curtain , 2014, Comput. Secur..

[3]  Gurpreet Dhillon,et al.  A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research , 2014, Inf. Syst. Res..

[4]  Carsten Felden,et al.  Integration of Shadow IT Systems with Enterprise Systems - A Literature Review , 2017, PACIS.

[5]  Peter H. Gray,et al.  Social Influence and Knowledge Management Systems Use: Evidence from Panel Data , 2013, MIS Q..

[6]  Chin-Lung Hsu,et al.  Why do people play on-line games? An extended TAM with social influences and flow experience , 2004, Inf. Manag..

[7]  Christopher Rentrop,et al.  On the Emergence of Shadow IT - a Transaction Cost-Based Approach , 2014, ECIS.

[8]  Geoffrey S. Hubona,et al.  Using PLS path modeling in new technology research: updated guidelines , 2016, Ind. Manag. Data Syst..

[9]  Andreas Eckhardt,et al.  Normalizing the Shadows - The Role of Symbolic Models for Individuals' Shadow IT Usage , 2014, ICIS.

[10]  Andreas Eckhardt,et al.  Are Shadow System Users the Better IS Users? - Insights of a Lab Experiment , 2015, ICIS.

[11]  Marko Sarstedt,et al.  Multigroup Analysis in Partial Least Squares (PLS) Path Modeling: Alternative Methods and Empirical Results , 2011 .

[12]  Jacob Cohen Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.

[13]  Victor R. Prybutok,et al.  Investigating factors affecting social presence and user satisfaction with Mobile Instant Messaging , 2014, Comput. Hum. Behav..

[14]  Dennis F. Galletta,et al.  A Multidimensional Commitment Model of Volitional Systems Adoption and Usage Behavior , 2005, J. Manag. Inf. Syst..

[15]  Martin H. Levinson Alone Together: Why We Expect More from Technology and Less from Each Other , 2011 .

[16]  Andreas Eckhardt,et al.  Shadow IT , 2017, Bus. Inf. Syst. Eng..

[17]  Zoonky Lee,et al.  Social influence on technology acceptance behavior: self-identity theory perspective , 2006, DATB.

[18]  A. Turner Generation Z: Technology and Social Interest , 2015 .

[19]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[20]  Marie-Claude Boudreau,et al.  IT-driven identity work: Creating a group identity in a digital environment , 2014, Inf. Organ..

[21]  Christopher Rentrop,et al.  Shadow IT - Management and Control of Unofficial IT , 2012, ICDS 2012.

[22]  Blake Ives,et al.  IT Consumerization: When Gadgets Turn Into Enterprise IT Tools , 2012, MIS Q. Executive.

[23]  Jan Marco Leimeister,et al.  Consumerization - IT Innovations from the Consumer Market as a Challenge for Corporate IT , 2012, Bus. Inf. Syst. Eng..

[24]  Jung P. Shim,et al.  Current Status, Issues, and Future of Bring Your Own Device (BYOD) , 2014, Commun. Assoc. Inf. Syst..

[25]  Matthew D. Lieberman,et al.  Social: Why Our Brains Are Wired to Connect , 2013 .

[26]  Andrea Back,et al.  A new perspective on neutralization and deterrence: Predicting shadow IT usage , 2017, Inf. Manag..

[27]  Varun Grover,et al.  Me, My Self, and I(T): Conceptualizing Information Technology Identity and its Implications , 2015, MIS Q..

[28]  Steffi Haag,et al.  Appearance of Dark Clouds? - An Empirical Analysis of Users' Shadow Sourcing of Cloud Services , 2015, Wirtschaftsinformatik.

[29]  Daniel Fürstenau,et al.  Shadow IT Systems: Discerning the Good and the evil , 2014, ECIS.

[30]  Marko Sarstedt,et al.  Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .

[31]  Steven L. Alter,et al.  USF Scholarship: a digital repository @ Gleeson Library | Geschke Center , 2016 .

[32]  Frank Teuteberg,et al.  Missing cloud security awareness: investigating risk exposure in shadow IT , 2017, J. Enterp. Inf. Manag..

[33]  P. Burke,et al.  The Past, Present, and Future of an Identity Theory* , 2000 .

[34]  Ping Wang,et al.  Chasing the Hottest IT: Effects of Information Technology Fashion on Organizations , 2010, MIS Q..

[35]  Detmar W. Straub,et al.  Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs , 1999, MIS Q..

[36]  Walter Brenner,et al.  European Conference on Information Systems ( ECIS ) 5-15-2012 EXPLORING THE SHADOWS : IT GOVERNANCE APPROACHES TO USER-DRIVEN INNOVATION , 2012 .

[37]  Weina Qu,et al.  The effects of the self and social identity on the intention to microblog: An extension of the theory of planned behavior , 2016, Comput. Hum. Behav..

[38]  Carsten Felden,et al.  Managing Shadow IT Instances - A Method to Control Autonomous IT Solutions in the Business Departments , 2014, AMCIS.

[39]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[40]  P. Burke,et al.  Identity theory and social identity theory , 2000 .

[41]  Chia-Ying Li,et al.  Persuasive messages on information system acceptance: A theoretical extension of elaboration likelihood model and social influence theory , 2013, Comput. Hum. Behav..

[42]  Marko Sarstedt,et al.  PLS-SEM: Indeed a Silver Bullet , 2011 .

[43]  Sven Laumer,et al.  Information quality, user satisfaction, and the manifestation of workarounds: a qualitative and quantitative study of enterprise content management system users , 2017, Eur. J. Inf. Syst..

[44]  Sven Laumer,et al.  Social Influence in Technology Adoption Research – A Scientometric Study over two DecadesBehavior , 2010 .

[45]  H. Kelman Compliance, identification, and internalization three processes of attitude change , 1958 .

[46]  Viswanath Venkatesh,et al.  Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior , 2000, MIS Q..

[47]  Daniel Fürstenau,et al.  Shadow Systems, Risk, and Shifting Power Relations in Organizations , 2017, Commun. Assoc. Inf. Syst..

[48]  Sven Laumer,et al.  Who influences whom? Analyzing workplace referents' social influence on IT adoption and non-adoption , 2009, J. Inf. Technol..

[49]  Heshan Sun,et al.  A Longitudinal Study of Herd Behavior in the Adoption and Continued Use of Technology , 2013, MIS Q..

[50]  K. Jamieson,et al.  The Rise and Fall of a Shadow System: Lessons for Enterprise System Implementation , 2004 .

[51]  Carsten Felden,et al.  A Multiple Case Study on the Nature and Management of Shadow Information Technology , 2017, J. Inf. Syst..