2014
DOI: 10.1016/j.cose.2014.06.007
|View full text |Cite
|
Sign up to set email alerts
|

Shadow IT – A view from behind the curtain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

3
108
0
17

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 105 publications
(128 citation statements)
references
References 18 publications
3
108
0
17
Order By: Relevance
“…Unfortunately, most employees claim that these software are beneficial to their own and organizational productivity and as well as [19]. They also argued that they are not doing anything wrong and believe that the company will not sanction them for these 'small sins'.…”
Section: Figure 1 Classification Of Insider Taxonomy and Threats Oppmentioning
confidence: 99%
See 4 more Smart Citations
“…Unfortunately, most employees claim that these software are beneficial to their own and organizational productivity and as well as [19]. They also argued that they are not doing anything wrong and believe that the company will not sanction them for these 'small sins'.…”
Section: Figure 1 Classification Of Insider Taxonomy and Threats Oppmentioning
confidence: 99%
“…It refers to any software or hardware installed by employees without approval from IT department. Nevertheless, employees argue that these applications could increase job performance and the capability of fulfilling business needs [19]. It is an insiderthreat, where a non-malicious insider (employee) installs disapproved software that strongly indicates a non-compliant behaviour towards an organization's information security policies [27].…”
Section: Figure 1 Classification Of Insider Taxonomy and Threats Oppmentioning
confidence: 99%
See 3 more Smart Citations