Table 1 - uploaded by Melanie Huber
Content may be subject to copyright.
Details on the multiple-case study.

Details on the multiple-case study.

Source publication
Article
Full-text available
ERP systems integrate a major part of all business processes and organizations include them in their IT service management. Besides these formal systems, there are additional systems that are rather stand-alone and not included in the IT management tasks. These so-called ‘shadow systems’ also support business processes but hinder a high enterprise...

Context in source publication

Context 1
... processes and business units varied. Table 1 shows an overview about these organizations, their processes and departments, as well as the interview partners from business and IT. We conducted the case studies between June 2012 and June 2013, lasting three to four months each. ...

Citations

... According to the Asia Business Transformations article, the real challenge is how the organization responds to the existence of shadow IT, which has been attached to the behavior of its employees' use of IT 2 . In general, research related to shadow IT has developed, and the results of research related to shadow IT have shown contradictory results, positive and negative [5]- [10]. ...
... The ERPS is a new generation of IS and is normally implemented in order to integrate isolated applications into a single database (Huber et al. 2016). The integration includes data among all an entity's departments, providing the organization's manager with a broader scope. ...
Article
Full-text available
It is generally perceived that the effective implementation of an adequate internal control system prevents and controls an entity’s risks and improves its procedures and performance. This study empirically investigates the relationship between the internal control system and firms’ performance, with particular emphasis on the moderation role of an integrated information system. For this purpose, a survey was developed and sent to 215 Saudi firms that had implemented an integrated information system. A hundred and two valid responses were received. Partial least squares structural equation modeling was utilized for the data analysis and hypothesis testing. The findings confirmed that organizational structure, prospectors’ strategy, information system quality, and management support significantly influence the internal control system for the study sample. The finding also supports the role of an information system as a moderator variable in the relationship between internal control and organizational performance. Additionally, the study elucidates the importance of information system maturity for information system quality.
... Parallel with the official infrastructure, developed, acquired or maintained by the IT sector, most organisations have a co-existing so-called shadow IT (Sakal et al., 2017a), also referred to in literature as feral systems, grey IT, hidden IT, workaround systems, rogue IT, end user computing (Behrens, 2009;Fürstenau and Rothe, 2014;Haag and Eckhardt, 2017;Huber et al., 2016;Mallmann et al., 2018;Rentrop and Zimmermann, 2012;Silic and Back, 2014;Zimmermann et al., 2014). This is software developed or acquired without the knowledge, approval or support of the IT sector, by employees who are not IT experts and who work in some of the organisation's non-IT sectors (Sakal et al., 2017b). ...
Article
The aim of the paper was to look into the degree of awareness among end users of the existence of spreadsheet risks. A systematic overview of literature resulted in identifying research questions, to which answers were given by analysing data gathered by means of a field survey. The research included 161 respondents. Despite the opinion that spreadsheets are very important for performing their tasks to a significant extent, the respondents think that their use is not combined to a significant extent with risks such as errors, credibility, security, data abuse, and poor analysis that may result in making wrong decisions, lack of version control, inadequate qualifications of users, lack of spreadsheet development guidelines, loss of data, breach of legal regulations, and unauthorised access to data. The majority of organisations where the respondents are employed do not possess defined spreadsheet risk management strategies, nor have adopted standards and rules for spreadsheet use.
... This suggests that the migration from on-premises to cloud-based ERP is moving rapidly. Over the previous year, according to a report released in 2016 [3], 44% of ERP systems deployed as cloud-based solutions. Cloud-based ERP can be set up in different ways and with varying levels of responsibility [4]. ...
Article
Full-text available
Cloud ERP is a type of enterprise resource planning (ERP) system that runs on the vendor’s cloud platform instead of an on-premises network, enabling companies to connect through the Internet. The goal of this study was to rank and prioritise the factors driving cloud ERP adoption by organisations and to identify the critical issues in terms of security, usability, and vendors that impact adoption of cloud ERP systems. The assessment of critical success factors (CSFs) in on-premises ERP adoption and implementation has been well documented; however, no previous research has been carried out on CSFs in cloud ERP adoption. Therefore, the contribution of this research is to provide research and practice with the identification and analysis of 16 CSFs through a systematic literature review, where 73 publications on cloud ERP adoption were assessed from a range of different conferences and journals, using inclusion and exclusion criteria. Drawing from the literature, we found security, usability, and vendors were the top three most widely cited critical issues for the adoption of cloud-based ERP; hence, the second contribution of this study was an integrative model constructed with 12 drivers based on the security, usability, and vendor characteristics that may have greater influence as the top critical issues in the adoption of cloud ERP systems. We also identified critical gaps in current research, such as the inconclusiveness of findings related to security critical issues, usability critical issues, and vendor critical issues, by highlighting the most important drivers influencing those issues in cloud ERP adoption and the lack of discussion on the nature of the criticality of those CSFs. This research will aid in the development of new strategies or the revision of existing strategies and polices aimed at effectively integrating cloud ERP into cloud computing infrastructure. It will also allow cloud ERP suppliers to determine organisations’ and business owners’ expectations and implement appropriate tactics. A better understanding of the CSFs will narrow the field of failure and assist practitioners and managers in increasing their chances of success.
... Segundo Huber et al. (2016), o objetivo dos sistemas ERP é uma alta integração corporativa. Eles conseguem isso integrando aplicativos discretos usando um banco de dados comum. ...
Article
Full-text available
A finalidade do presente artigo se centra em identificar em empresa do setor de e-commerce, os problemas de manutenção de ERP em servidor próprio, comparativamente aos benefícios e custos de implantação do mesmo ERP em Cloud Computing. Os estudos foram desenvolvidos em uma empresa de São Paulo/SP, que adota como objeto social o comércio eletrônico de produtos em geral, que vinha enfrentando dificuldades ligadas ao desempenho do ERP mantido em servidor próprio. A migração para nuvem trouxe ganho de performance ao eliminar problemas como lentidão e redução do tempo em que o sistema e suas integrações ficavam inoperantes, ao passo que, aumentou os gastos com tecnologia da informação ligados ao ERP corporativo.
... Due to the individual implementation of SIT, business units rarely regard the current enterprise architecture (EA) during its introduction . Studies show that a majority of SIT include data or functional redundancies to IT-managed systems (enterprise systems (ES)) (Huber et al. 2016), which hinders automation (Fürstenau and Rothe 2014) and causes inefficiencies (Silic et al. 2016). Eliminating unwanted redundancies by IT integration is an established concept in IT management (Hung et al. 2015;Mertens 2012). ...
... Furthermore, business units implement SIT that is often a driver for innovation (Khalil et al. 2017) and has a high fit with the business unit needs . However, the implementation often occurs without considering the overall EA leading to unwanted data and functional redundancies (Huber et al. 2016) and hindering automation (Fürstenau et al. 2017). ...
... Therefore, independent from the current governance status as SIT or business-managed IT (in the following referenced as SIT), EAM needs to decide on whether and how to integrate the redundant IT systems. Integration hereby means the creation of linkages or the unification of the IT systems by technical means (Huber et al. 2016). Thereby, a decision needs to incorporate the business unit benefits to ensure the use of the integrated IT system (Morton 2006). ...
Conference Paper
Business units are increasingly able to introduce information technology (IT) into their business processes. Thereby, they implement Shadow IT (SIT) to create flexible and innovative IT solutions. However, the individual implementation of SIT leads to unwanted data and functional redundancies and as a result to inefficiencies and reduced automation. Integration suggests itself to meet these challenges but can also eliminate the described benefits. In a single-case study, we gain insights into how organizations come to a SIT integration decision that explicitly includes the business unit benefits. Thereby, possible SIT integration strategies, decision criteria and decision situations emerge. Research can base on the presented criteria and the collaborative approach that explicitly considers the perspective of the business unit. Practitioners can use the procedures when confronted with a SIT integration decision.
... The consequence of dynamic requirements for information has established the phenomenon of shadow IT. There are numerous reasons for which end users turn to using shadow IT to perform their tasks (Malaurent, 2011 Given that 64 % of shadow IT is related to ERP systems (sharing data and/or functionalities), shadow IT pose risks for organisations (Huber/Zimmermann/Rentrop/Felden 2016). On the one hand, they increase flexibility of business units, while, on the other, they take up organisations' resources and duplicate effort. ...
Article
More and more companies are trying to optimize their corporate goals through digitalization. These include large corporations, medium-sized companies, but also small businesses. Starting with a central information system, companies are networking to obtain as much information as possible and to keep processes lean in order to increase sales and profits. The complexity of an ERP system often prevents complete transparency in use due to gaps in knowledge. This makes faster, simpler solutions from the common software shelf appear more attractive and is preferred by the user. The aim of this research is to determine the factors for the use of shadow IT. Thus, connections with general information systems such as an ERP system become recognizable. The research questions which are derived from this: What types of shadow IT exist in Germany and Serbia? What are the reasons for a use and do they entail risks? In order to be able to answer these questions, a thorough analysis of the applied software is required. In this case, this also includes an analysis from the user's point of view. These considerations are also differentiated regionally as well as content-related in the following research. Here, experts from European companies were interviewed. By means of a survey, participants were able to explain their use of additional software. This results in interpretations regarding the use of shadow IT. There is a clear trend towards the use of certain auxiliary software. In addition to the strengths and weaknesses of the shadow IT, this work also conveys the weak points of the standardized information system, such as the ERP system and its modules
... This, for example, applies to systems that are created for or offered to customers that are only served by one BU or systems that support the production processes of a single BU. In contrast to that, ERP systems, CRM systems, or more generally formal enterprise systems are not specific to a single BU and typically have a high scope of use (Huber et al. 2016). Cases that deal with such core systems are therefore coded with Specific [0]. ...
... In contrast to that, "Lightweight IT" describes non-invasive solutions that are usually initiated by users in cooperation with an external vendor. A lack of integration is commonly identified as one of the risks of SIT (Chua et al. 2014;Huber et al. 2016) which is caused by insufficient skills of conceptual IT development (Hetzenecker et al. 2012). Consequently, data integrity issues can arise (Silic and Back 2014). ...
Article
Full-text available
Shadow IT describes covert/hidden IT systems that are managed by business entities themselves. Additionally, there are also overt forms in practice, so-called Business- managed IT, which share most of the characteristics of Shadow IT. To better understand this phenomenon, we interviewed 29 executive IT managers about positive and negative cases of Shadow IT and Business-managed IT. By applying qualitative comparative analysis (QCA), we derived four conditions that characterize these cases: Aligned, local, simple, and volatile. The results show that there are three sufficient configurations of conditions that lead to a positive outcome; one of them even encompasses Shadow IT. The most important solution indicates that IT systems managed by business entities are viewed as being positive if they are aligned with the IT department and limited to local requirements. This allows to balance local responsiveness to changing requirements and global standardization. In contrast, IT systems that are not aligned and permanent (and either organization-wide or simple) are consistently considered as negative. Our study is the first empirical quantitative– qualitative study to shed light on the success and failure of Shadow IT and Business-managed IT.
... Whether it is due to gaps in the software solutions function or other reasons, organizations provide a fertile ground for system de-Information Technology and Control 2020/1/49 velopment by end users who are not software developers by profession. The following terms are used in the literature for systems developed by end users or used without the knowledge of IT departments: shadow system(s), shadow IT, feral system(s), grey IT, hidden IT, rogue IT, workaround systems, workaround IT, unofficial IT, bolt-on [6,17,28,40,61,62,70,76,81,86,87]. Huber et al. [28] state that all these terms are used to describe the shadow system phenomenon. ...
... The following terms are used in the literature for systems developed by end users or used without the knowledge of IT departments: shadow system(s), shadow IT, feral system(s), grey IT, hidden IT, rogue IT, workaround systems, workaround IT, unofficial IT, bolt-on [6,17,28,40,61,62,70,76,81,86,87]. Huber et al. [28] state that all these terms are used to describe the shadow system phenomenon. However, in the literature there is no clear consensus on these terms, and the attitudes are often opposed. ...
... Huber et al. [28] add end user computing to the list of terms that indicate IT systems developed by end users, although Rentrop and Zimmermann [62] stated in the paper published in 2012 that it is necessary to distinguish shadow IT from end user computing. Similar to Retrop and Zimmerman [62], Tambo et al. [81] emphasize that feral systems (shadow systems) should not be confused with end user development (EUD) because EUD is controlled and rooted in the official IT. ...
Article
Shadow IT coexists with mandated information systems. Developed and applied by non­IT domain experts, it is as a rule, but not exclusively, used for resolving non­routine issues, for which mandated IS does not have appropriate functions. Shadow IT solutions are not supported or controlled by IT departments. The aim of the paper is to show to which extent shadow IT has been researched, as this area has not yet received the necessary attention from both academia and business. A systematic literature review was conducted in order to find the papers covering the topic of shadow IT. The following electronic databases were searched: Web of Science (Thomson Reuters), Scopus (Elsevier), and AIS Electronic Library (The Association for Information Systems (AIS)). More than half of the analysed papers are case studies in one or more organizations. The papers were published mostly in scientific conferences and in scientific journals. Based on the literature review, the reasons for shadow IT occurrence, the possibility of its management, as well as its advantages and disadvantages are presented. The most important conclusions and views regarding shadow IT, according to the authors’ opinion, are indicated at the end. The limitation of a systematic literature review is that only papers published in English are analysed. Besides identifying papers covering the shadow IT topics, the reasons for the emergence of shadow IT, the possibilities of its management and its advantages and disadvantages are systematized.
... As the definition suggests, shadow IT usage encompasses a variety of possibilities, since it can be the use of any software or hardware, on-premise or on-demand, self-developed or purchased, subject to or free of charge, and whether complementing or substituting the organisational IT infrastructure (Haag and Eckhardt 2014;Silic and Back 2014). For instance, an installed application, a spreadsheet, a cloud service, a peripheral device, or a combined solution are some examples of how employees use shadow IT in the workplace (Huber et al. 2016). Given this complexity, we performed a review of the literature on shadow IT in an attempt to clarify the ways in which individuals use shadow IT at work. ...
... For example, smartphones, tablets, notebooks, etc. and the personal application access on the company's network. Rentrop and Zimmermann (2012), Silic and Back (2014), Zimmermann, Rentrop, and Felden (2014), Gozman and Willcocks (2015), Huber et al. (2016) ...
... Jones et al. (2004),Rentrop and Zimmermann (2012),Furstenau and Rothe (2014),Zimmermann, Rentrop, and Felden (2014),Huber et al. (2016) ...
Article
The use of unauthorised technologies in the workplace, called shadow IT, is increasing within organisations. Research has identified that employees frequently use unauthorised solutions to collaborate and communicate at work, which can ultimately enhance their performance. This research aims to examine the mediating role of social presence on the relationship between shadow IT usage and individual performance. We performed a survey among 286 employees from three large companies. The results show a positive relationship between shadow IT usage and social presence, suggesting that some aspects of social presence, such as perceived higher levels of sensitivity and comprehension, are significant outcomes related to the use of shadow IT. The results also provide empirical evidence to show social presence has a mediating role in the relationship of shadow IT usage and individual performance. Thereby, this research contributes by providing new insights into the consequences of shadow IT usage, and partially explaining the impact the use of shadow IT has on employee performance. In addition, the findings highlight the importance of social presence in relation to technology-mediated communication within organisations.