“…The increasing use of shadow IT systems-IT applications not sanctioned or monitored by a company's IT department (Myers et al, 2016) -has emerged as an important topic for both practitioners and academics (Sherman, 2004;Raden, 2005;Olavsrud, 2012;Zimmerman, et al, 2017). 1 Shadow IT systems can pose a threat to businesses because they often lack adequate security, effective controls, and proper documentation (Schaffner, 2007).…”