Andreas Kopper

Andreas Kopper
TU Dresden | TUD · Lehrstuhl Wirtschaftsinformatik

Dr. rer. pol.

About

11
Publications
10,810
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
217
Citations
Additional affiliations
January 2013 - present
McKinsey
Position
  • Manager

Publications

Publications (11)
Article
Full-text available
Shadow IT describes covert/hidden IT systems that are managed by business entities themselves. Additionally, there are also overt forms in practice, so-called Business- managed IT, which share most of the characteristics of Shadow IT. To better understand this phenomenon, we interviewed 29 executive IT managers about positive and negative cases of...
Article
Two concepts describe the autonomous deployment of IT by business entities: Shadow IT and Business-managed IT. Shadow IT is deployed covertly, that is, software, hardware, or IT services created/procured or managed by business entities without alignment with the IT organization. In contrast, Business-managed IT describes the overt deployment of IT,...
Article
Shadow IT and Business-managed IT describe the autonomous deployment/procurement or management of Information Technology (IT) instances, i.e., software, hardware, or IT services, by business entities. For Shadow IT, this happens covertly, i.e., without alignment with the IT organization; for Business-managed IT this happens overtly, i.e., in alignm...
Article
[https://tu-dresden.de/bu/wirtschaft/isih/ressourcen/dateien/paper/IJITBAG-Kopper-Fuerstenau-et-al-2018-Shadow-IT-and-Business-Managed.pdf] Research on Shadow IT is facing a conceptual dilemma in cases where previously “covert” systems developed by business entities are integrated in the organizational IT management. These systems become visible,...
Conference Paper
Full-text available
Research on Shadow IT is facing a conceptual dilemma in cases where previously "covert" systems developed by business entities (individual users, business workgroups, or business units) are integrated in the organizational IT management. These systems become visible, are therefore not "in the shadows" anymore, and subsequently do not fit to existin...
Conference Paper
Full-text available
Shadow IT is the autonomous procurement or usage of IT by business units or users without involving the IT organization. To get an up to date IT management’s perspective on this phenomenon, 16 interviews with executive or senior IT managers were conducted. Using content analysis, the empirical data is compared with current themes about Shadow IT th...
Article
Full-text available
Zusammenfassung Basierend auf einer systematischen und umfangreichen Analyse von Praxisbeiträgen zum Thema Schatten-IT, die zwischen September 2015 und August 2016 erschienen sind, beschreibt der vorliegende Artikel Governance-Aspekte zu diesem Phänomen. Er ergänzt damit vorhergehende akademische Studien. Es zeigt sich, dass unter Praktikern der Ei...
Chapter
Basierend auf einer systematischen und umfangreichen Analyse von Praxisbeiträgen zum Thema Schatten-IT und einer Interviewstudie mit 16 IT-Führungskräften beschreibt der vorliegende Artikel Governance-Aspekte zu diesem Phänomen. Er ergänzt damit vorhergehende akademische Studien. Es zeigt sich, dass unter Praktikern der Eindruck vorherrscht, dass I...
Conference Paper
Full-text available
In a comprehensive literature review, we identified 21 different terms used for Shadow IT related concepts. This variety makes it difficult to identify related research and build upon it. To address this ambiguity, we reduce the different terms to six distinct concepts by developing a taxonomy and examining their relation¬ships. We do so by using a...
Conference Paper
Full-text available
Shadow IT is a widespread phenomenon which includes systems, services, and processes that are not part of the " official " corporate IT. The topic is still an emerging research area and slowly gaining traction in recent years but a state of the art analysis is missing to date. We therefore conduct a structured literature review to derive a framewor...

Network

Cited By