References
Behrens S (2009) Shadow systems: the good, the bad and the ugly. Commun ACM 52(2):124–129
CIO.de (o. J.) Thema Schatten-IT, http://www.cio.de/topics/schatten-it,284194, letzter Zugriff: 24. August 2015
Cloud Security Alliance (2015) Cloud Adoptions Practices & Priorities Survey Report
Zimmermann S, Rentrop C, Felden C (2014) Managing Shadow IT Instances – a Method to Control Autonomous IT Solutions in the Business Departments. In: 20th Americas Conference on Information Systems
Yates M (2014) Shadow IT is not just the CIO’s problem — it is the CFO’s problem, http://idcciosummit.com/vienna/insight/detail/topic-6/, letzter Zugriff: 24. August 2015
Haag S (2015) Appearance of Dark Clouds? – An Empirical Analysis of Users’ Shadow Sourcing of Cloud Services. In: Wirtschaftsinformatik Proceedings 2015, Paper 96
British Telecommunications (2014) Creativity and the modern CIO research – global results, http://de.slideshare.net/btletstalk/creativityandthemodern-cioglobal, letzter Zugriff: 24. August 2015
Rentrop C, Zimmermann S, Huber M (2015) Schatten-IT ein unterschätztes Risiko? In: D·A·CH Security 2015, S 291–300
Chua C, Storey V, Chen L (2014) Central IT or Shadow IT? Factors Shaping Users’ Decision to Go Rogue With IT. In: 35th International Conference on Information Systems, Auckland, New Zealand
Fürstenau D, Rothe H (2014) Shadow IT systems: discerning the good and the evil. In: 22nd European Conference on Information Systems, Tel Aviv, Israel
Mauerer J (2014) Governance-Dilemma durch die Schatten-IT, http://www.cio.de/a/governance-dilemma-durch-die-schatten-it,2943550, letzter Zugriff: 24. August 2015
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Rentrop, C., Zimmermann, S. Schatten-IT. Informatik Spektrum 38, 564–567 (2015). https://doi.org/10.1007/s00287-015-0921-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00287-015-0921-x