Search results

1 – 10 of over 15000
Article
Publication date: 25 September 2023

Trang Nguyen

Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this…

Abstract

Purpose

Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention.

Design/methodology/approach

An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents.

Findings

The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls.

Originality/value

This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 9 August 2021

Mohammed Abbas and Adnan Alghail

The mobile shadow information technology (IT) phenomenon is both completely misunderstood and negatively explored by those participating inside the organizational ecosystem. It

Abstract

Purpose

The mobile shadow information technology (IT) phenomenon is both completely misunderstood and negatively explored by those participating inside the organizational ecosystem. It represents all internet-based software, any other solutions for communications or employees’ sharing without any formal authorization or approval from the IT department. Such behavior can lead to a security breach of the organization’s data privacy, as these risks could disseminate it without the organization fully knowing. Recent research identifies that shadow IT is rarely covered from the knowledge sharing and knowledge protection (KP) perspective. This paper aims to provide an insight on how mobile shadow IT as a phenomenon could impact KP of an organization as a whole.

Design/methodology/approach

This is an exploratory study based on a qualitative approach. The authors conducted interviews with 11 IT users to answer the main research question. The interview guidelines were divided into three parts: types of mobile shadow IT and occurrence; KP nature in the workplace; and mobile shadow IT impact on KP.

Findings

The research findings identified that most interviewees use mobile shadow IT without any notice or permission from their IT departments. This sharing also negatively impacts the KP in the organization. The most common mobile shadow IT applications are the clouded type like Dropbox, Google Drive and WhatsApp. Interviewees are using mobile shadow IT mainly because organizations do not provide suitable tools to communicate efficiently. The authors concluded that mobile shadow IT harms KP with no security and privacy on what is being shared because this process is unmonitored by the organization.

Practical implications

For adequate knowledge and data protection, IT departments need to take more actions and efforts. This study can help IT decision-makers cope with the technology changes while understanding mobile shadow IT impacts. This study also offers insight regarding types of applications that can be used as an alternative tool for employees rather than using unauthorized applications. This research shows that medium-sized organizations are free to use these applications, which can cause damage to organizations.

Originality/value

This research is arguably among the first to explore the interviewees’ perspectives on how mobile shadow IT impacts KP. This paper also provides theoretical and practical insights by identifying the three primary constructs and how mobile shadow IT usage can affect KP.

Details

VINE Journal of Information and Knowledge Management Systems, vol. 53 no. 4
Type: Research Article
ISSN: 2059-5891

Keywords

Article
Publication date: 10 July 2017

Marc Walterbusch, Adrian Fietz and Frank Teuteberg

On account of its easy and intuitive usage as well as obvious advantages (e.g. access to work data from anywhere, at any time and through any means) the evolutionary cloud…

2054

Abstract

Purpose

On account of its easy and intuitive usage as well as obvious advantages (e.g. access to work data from anywhere, at any time and through any means) the evolutionary cloud computing paradigm favors the use of shadow IT. Since many employees are not aware of the associated risks and possible legal violations, unauthorized use of cloud computing services could result in substantial risk exposure for any company. The purpose of this paper is to explore and to extend the body of knowledge concerning the topic of cloud computing with regard to shadow IT.

Design/methodology/approach

The aim of this contribution is to identify the reasons for the use of cloud computing services and the resulting shadow IT from an employee’s perspective, to demonstrate the counteractions a company may take against the unauthorized use of cloud computing services and to elaborate on the inherent opportunities and risks. We follow a mixed-methods approach consisting of a systematic literature review, a cloud computing awareness study, a vignette study and expert interviews.

Findings

Based on a triangulation of the data sets, the paper at hand proposes a morphological box as well as a two-piece belief-action-outcome model, both from an employee’s and employer’s point of view. Our findings ultimately lead to recommendations for action for employers to counteract the risk exposure. Furthermore, also employees are sensitized by means of insights into the topic of unauthorized usage of cloud computing services in everyday working life.

Research limitations/implications

The limitations of the triangulation reflect the limitations of each applied research method. These limitations justify why a mixed-methods approach is favored – rather than relying on a single source of data – because data from various sources can be triangulated.

Practical implications

The paper includes recommendations for action for the handling of the unauthorized usage of cloud computing services within a company, e.g., the set up of a company-wide cloud security strategy and the conduction of an anonymous employee survey to identify the status quo.

Originality/value

This paper fulfills an identified need to explore the usage of cloud computing services within the context of shadow IT.

Details

Journal of Enterprise Information Management, vol. 30 no. 4
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 20 March 2017

Helen Tregidga

The purpose of this paper is to empirically investigate the act of shadow reporting by a social movement organisation as a form of shadow accounting within a sustained campaign…

3720

Abstract

Purpose

The purpose of this paper is to empirically investigate the act of shadow reporting by a social movement organisation as a form of shadow accounting within a sustained campaign against a target corporation. Situated within a consideration of power relations, the rationales underlying the production of the shadow report, and the shadow reports perceived value and limits as a shadow accounting mechanism, are investigated.

Design/methodology/approach

A Foucauldian approach to power/knowledge and truth is drawn upon in the analysis of a single case study. Alongside a consideration of the shadow report itself, interviews with both the preparers of the report and senior management of the corporation targeted comprise the main data.

Findings

The paper provides an empirical investigation into shadow reporting as a form of shadow accounting. While a range of insights are garnered into the preparation, dissemination and impact of the shadow report, key findings relate to a consideration of power relations. The perceived “truth” status of corporate accounts compared to accounts prepared by shadow accountants is problematised through a consideration of technologies of power and power/knowledge formations. Power relations are subsequently recognised as fundamental to the emancipatory potential of shadow reporting.

Research limitations/implications

Results from a single case study are presented. Furthermore, given the production of the shadow report occurred several years prior to the collection of data, participants were asked to reflect on past events. Findings are therefore based on those reflections.

Originality/value

While previous studies have considered the preparation of shadow reports and their transformative potential, this study is, the author believes, the first to empirically analyse the preparation, dissemination and perceived impacts of shadow reporting from the perspectives of both the shadow report producers and the target corporation.

Details

Accounting, Auditing & Accountability Journal, vol. 30 no. 3
Type: Research Article
ISSN: 0951-3574

Keywords

Article
Publication date: 1 February 2006

Gary Pheiffer, Dave Griffiths and David Andrew

The paper argues for a deeper understanding of the dynamics of Corporate Social Responsibility (CSR) by examining the role of what has been called the shadow side of…

Abstract

The paper argues for a deeper understanding of the dynamics of Corporate Social Responsibility (CSR) by examining the role of what has been called the shadow side of organisations. The use of this concept provides an alternative view of how key CSR dynamics may play out in reality. This, it is suggested, may lead to the development of an innovative framework and associated lines of vision and enquiry resulting in a deeper and more holistic understanding of the dynamics of CSR.

Details

Social Responsibility Journal, vol. 2 no. 2
Type: Research Article
ISSN: 1747-1117

Article
Publication date: 13 March 2017

Silvia Gherardi, Karen Jensen and Monika Nerland

The purpose of this paper is to conceive “organizing” as an indeterminate process taking place in the interstices of intra-acting elements, beyond visible/rational/intentional…

3375

Abstract

Purpose

The purpose of this paper is to conceive “organizing” as an indeterminate process taking place in the interstices of intra-acting elements, beyond visible/rational/intentional organizing. The term intra-activity refers to relationships between multiple elements (human and more-than-human) that are understood not to have clear or distinct boundaries. The paper aims at reframing organizing, as the effect of multiple intra-acting elements, by introducing the metaphor of shadow organizing. It offers examples as diverse as knowledge spillover, evidence-based medicine and improvisation, and the mafia’s organizational rules.

Design/methodology/approach

The frame of reference is metaphorical theorization, based on the metaphor of shadow organizing, and is explored through three metonymies: the forest and its sheltered spaces in penumbra; the shadow as a grey zone between canonical and non-canonical practices; and secret societies, hidden in the shadow. The shadow is the symbol of what is “betwixt and between.”

Findings

Shadow organizing focuses on the way that situated elements (people, technologies, knowledge, infrastructures, society) intra-relate and acquire agency. Whilst organizing as the effect of intentional coordination, planning, and strategizing represents a well-established theorization, shadow organizing sheds light on what happen in the interstices of intentional and structured processes. The paper identifies the dimensions of shadow organizing as performativity, liminality, and secrecy.

Originality/value

The passage from elements in interaction to intra-acting relations that form elements is a challenge both for theory and methodology. To face this challenge, metaphorical thinking proves useful since it enhances scholars’ imaginations and emotional participation.

Details

Qualitative Research in Organizations and Management: An International Journal, vol. 12 no. 1
Type: Research Article
ISSN: 1746-5648

Keywords

Article
Publication date: 4 March 2014

Rebecca Gill, Joshua Barbour and Marleah Dean

The purpose of this paper is to provide practical recommendations for shadowing as a method of organizational study with a focus on the situated processes and practices of…

2013

Abstract

Purpose

The purpose of this paper is to provide practical recommendations for shadowing as a method of organizational study with a focus on the situated processes and practices of shadowing fieldwork.

Design/methodology/approach

This paper reflects on the shadowing experiences of three researchers – in a hospital emergency department, nuclear power plants, and entrepreneur workspaces – to generate recommendations by identifying and synthesizing solutions that emerged during the encounters with the challenges and opportunities in shadowing.

Findings

Considering shadowing as an ongoing and emergent research process can be helpful to prepare for particular aspects of shadowing fieldwork. Shadowing presents research challenges that may emerge in the practice of fieldwork, including how to negotiate awkward conversations with participants, what to bring and wear, and how to take notes.

Practical implications

Though the recommendations for shadowing are based on particular experiences and may not generalize to all shadowing engagements, they offer concrete, practical recommendations useful across experience levels. The recommendations should sensitize researchers to the intimate and situational character of shadowing, and offer strategies for coping with the distinctive requirements of shadowing.

Originality/value

By looking across diverse experiences of shadowing, the paper generated guidelines that help to make sense of shadowing processes, manage uncertainty in the field, and build on the emerging work on shadowing. The ten recommendations provide insight into shadowing that are of particular value to graduate students, junior researchers, and those new to shadowing. Moreover, the experienced shadower may find value in the camaraderie of shared experience, the concrete ideas about another's experience of shadowing, and insight in recommendations that capture aspects of fieldwork that they are also exploring.

Details

Qualitative Research in Organizations and Management: An International Journal, vol. 9 no. 1
Type: Research Article
ISSN: 1746-5648

Keywords

Article
Publication date: 4 March 2014

Ann-Marie Urban and Elizabeth Quinlan

– The purpose of this paper is to share two researcher's experience about the challenges associated with shadowing within the health care context.

Abstract

Purpose

The purpose of this paper is to share two researcher's experience about the challenges associated with shadowing within the health care context.

Design/methodology/approach

Institutional ethnography and shadowing.

Findings

Shadowing is increasingly being used as a data collection method, however, before proceeding to use this approach in today's health care environment, the researcher must give thoughtful consideration to the context.

Originality/value

This paper provides a reflexive elaboration of the differences between the insider and outsider perspective when using the shadowing data collection method within health care organizations.

Details

Qualitative Research in Organizations and Management: An International Journal, vol. 9 no. 1
Type: Research Article
ISSN: 1746-5648

Keywords

Article
Publication date: 10 October 2022

Valentina Kravchenko, Vadim Karapetov and Ignat Nechepurenko

This study aims to identify the factors which influence the change in the volume of shadow economy in the countries of Europe to explain its growth or reduction through the change…

Abstract

Purpose

This study aims to identify the factors which influence the change in the volume of shadow economy in the countries of Europe to explain its growth or reduction through the change in the identified factors. This would help to determine which factors are worth impacting to reduce the volume of shadow economy in the countries of Europe.

Design/methodology/approach

This work sets out an econometric analysis. For the purpose of making research calculations, MS Excel software package has been chosen. It has been decided to use linear multiple regression and several auxiliary tools allowing research accuracy to be increased.

Findings

Final model has shown that the levels of corruption and inflation have a positive effect on the volume of shadow economy. Also, with the low level of significance it has been proved that foreign direct investments have a negative impact on the volume of shadow economy. From the hypotheses, it has also been ascertained that the rule of law and gross domestic product influence the volume of shadow economy negatively. Therefore, the results of this study indicate that the magnitude of shadow economy can be controlled by increasing the efficiency of the rule of law and the economy’s growth.

Research limitations/implications

Because of the limited data on such an indicator as the shadow economy, in this work, this study used data for only one year – 2015, which may reduce the objectivity and reliability of the results obtained. But because of the fact that 38 European countries were taken and, as a result, the selection was larger, objectivity is preserved. As a result, three hypotheses were confirmed.

Practical implications

From the point of view of practical implications, this study should help determine the number of parameters, which affect the volume of the shadow economy in a particular country in Europe. Understanding of such correlations will help to regulate the volume of the shadow economy, which will mostly affect the overall development of the country.

Social implications

From a point of view of social implications, this study will help to solve some problems in Europe countries. Because this study is focused on finding parameters that affect the shadow economy, it is possible to reduce the volume of shadow economy. This changes can lead to a number of social improvements, such as a reduction of crime, a reduction of poverty, a reduction of unemployment, an increase of revenues to the country's treasury and a general increase of living standards.

Originality/value

Within the framework of this work, unique empirical research has been undertaken. This work helps to establish the factors which are the most influential in respect of the volume of shadow economy and which graphically indicate the following: what precisely needs to be prioritized to overcome one of the crucial socioeconomic problems for the majority of European countries.

Article
Publication date: 6 February 2024

Sabine Khalil and Bahae Samhan

Cloud computing, a dominant technology, significantly impacts organizations, necessitating talent management strategies for sustained growth. This study aims to explore the impact…

Abstract

Purpose

Cloud computing, a dominant technology, significantly impacts organizations, necessitating talent management strategies for sustained growth. This study aims to explore the impact of cloud adoption on large French organizations through a “learning organization” perspective.

Design/methodology/approach

Interviews were conducted with business and IT stakeholders from 35 multinational organizations in France.

Findings

Cloud services have a high impact on large organizations, leading to a demand for cloud-related skills, a power shift from IT to business departments and increased shadow IT activities. Effective utilization requires organizational learning and a change management project, transforming organizations into productive and innovative learning organizations.

Originality/value

This paper contributes to cloud computing, organizational learning and talent management literature, offering managers a novel approach to handling cloud services.

Details

The Learning Organization, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-6474

Keywords

1 – 10 of over 15000