메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Exploring the shadows: IT Governance approaches to user-driven innovation

Author keywords

Bring your own device; Business IT alignment; Business driven; IS security; IT governance; Non compliance; Shadow IT; User driven

Indexed keywords

UBIQUITOUS COMPUTING; WEB SERVICES;

EID: 84905750450     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (110)

References (64)
  • 2
    • 84905740530 scopus 로고    scopus 로고
    • BlackBerry outage frustrates investment bankers
    • Bansal, P. (2011). BlackBerry outage frustrates investment bankers. Reuters, 1.
    • (2011) Reuters , vol.1
    • Bansal, P.1
  • 3
    • 58849132056 scopus 로고    scopus 로고
    • Shadow systems: The good, the bad and the ugly
    • Behrens, S. (2009). Shadow Systems: The Good, The Bad and the Ugly. Communications of the ACM, 52, 124-129.
    • (2009) Communications of the ACM , vol.52 , pp. 124-129
    • Behrens, S.1
  • 4
    • 84905740529 scopus 로고    scopus 로고
    • Why Do shadow systems exist after an ERP implementation? Lessons from a case study
    • Behrens, S. and Sedera, W. (2004). Why Do Shadow Systems Exist after an ERP Implementation? Lessons from a Case Study. In Pacific Asia Conference on Information Systems, 1713-1726.
    • (2004) Pacific Asia Conference on Information Systems , pp. 1713-1726
    • Behrens, S.1    Sedera, W.2
  • 5
    • 33846021950 scopus 로고    scopus 로고
    • Real options in information technology risk management: An empirical validation of risk-option relationships
    • Benaroch, M., Lichtenstein, Y. and Robinson, K. (2006). Real Options in Information Technology Risk Management: An Empirical Validation of Risk-Option Relationships. MIS Quarterly, 30
    • (2006) MIS Quarterly , vol.30
    • Benaroch, M.1    Lichtenstein, Y.2    Robinson, K.3
  • 6
    • 55249084997 scopus 로고
    • The case research strategy in studies of information systems
    • Benbasat, I., Goldstein, D. K. and Mead, M. (1987). The Case Research Strategy in Studies of Information Systems. MIS Quarterly, 11, 369-386.
    • (1987) MIS Quarterly , vol.11 , pp. 369-386
    • Benbasat, I.1    Goldstein, D.K.2    Mead, M.3
  • 7
    • 0002624070 scopus 로고    scopus 로고
    • Empirical research in information systems: The practice of relevance
    • Benbasat, I. and Zmud, R. W. (1999). Empirical Research in Information Systems: The Practice of Relevance. MIS Quarterly, 23, 3-16.
    • (1999) MIS Quarterly , vol.23 , pp. 3-16
    • Benbasat, I.1    Zmud, R.W.2
  • 10
    • 0000409290 scopus 로고
    • Alignment of the IS functions with the enterprise: Toward a model of antecedents
    • Brown, C. V. and Magill, S. L. (1994). Alignment of the IS Functions with the Enterprise: Toward a Model of Antecedents. MIS Quarterly, 18, 371.
    • (1994) MIS Quarterly , Issue.18 , pp. 371
    • Brown, C.V.1    Magill, S.L.2
  • 15
    • 84870635275 scopus 로고    scopus 로고
    • Exploring patterns of business-IT alignment for the purpose of process performance measurement
    • Cleven, A. (2011). Exploring Patterns of Business-IT Alignment for the Purpose of Process Performance Measurement. In European Conference On Information Systems, 1-12.
    • (2011) European Conference on Information Systems , pp. 1-12
    • Cleven, A.1
  • 16
    • 3242808612 scopus 로고    scopus 로고
    • Computer Security Institute. Computer Security Institute, New York
    • Computer Security Institute (2011). CSI Computer Crime and Security Survey 2010/2011. Computer Security Institute, New York, 1-42.
    • (2011) CSI Computer Crime and Security Survey 2010/2011 , pp. 1-42
  • 17
    • 0003140320 scopus 로고
    • Organizing knowledge syntheses: A taxonomy of literature reviews
    • Cooper, H. M. (1988). Organizing Knowledge Syntheses: A Taxonomy of Literature Reviews. Knowledge in Society, 1, 104-126.
    • (1988) Knowledge in Society , vol.1 , pp. 104-126
    • Cooper, H.M.1
  • 20
    • 70449727980 scopus 로고    scopus 로고
    • An exploratory study into IT governance implementations and its impact on business/IT alignment
    • De Haes, S. and Van Grembergen, W. (2009). An Exploratory Study into IT Governance Implementations and its Impact on Business/IT Alignment. Information Systems Management, 26, 123-137.
    • (2009) Information Systems Management , vol.26 , pp. 123-137
    • De Haes, S.1    Van Grembergen, W.2
  • 21
    • 0003530977 scopus 로고    scopus 로고
    • The research act: A theoretical introduction to sociological methods
    • New Brunswick, NJ
    • Denzin, N. K. (2009). The research act: a theoretical introduction to sociological methods. Aldine Transaction, New Brunswick, NJ.
    • (2009) Aldine Transaction
    • Denzin, N.K.1
  • 25
    • 84905740517 scopus 로고    scopus 로고
    • Good Technology, Good Technology
    • Good Technology (2011). Case Study of Napa Country. Good Technology, 1-3.
    • (2011) Case Study of Napa Country , pp. 1-3
  • 26
    • 0027813283 scopus 로고
    • Strategic alignment: Leveraging information technology for transforming organizations
    • Henderson, J. C. and Venkatraman, N. (1993). Strategic alignment: Leveraging information technology for transforming organizations. IBM Systems Journal, 32, 4-16.
    • (1993) IBM Systems Journal , vol.32 , pp. 4-16
    • Henderson, J.C.1    Venkatraman, N.2
  • 28
    • 77954238840 scopus 로고    scopus 로고
    • Mixing qualitative and quantitative methods : Triangulation in action
    • Jick, T. D. (2011). Mixing Qualitative and Quantitative Methods : Triangulation in Action. Administrative Science Quaterly, 24, 602-611.
    • (2011) Administrative Science Quaterly , vol.24 , pp. 602-611
    • Jick, T.D.1
  • 29
    • 84893330775 scopus 로고    scopus 로고
    • The rise and fall of a shadow system: Lessons for enterprise system implementation
    • Jones, D., Behrens, S., Jamieson, K. and Tansley, E. (2004). The Rise and Fall of a Shadow System: Lessons for Enterprise System Implementation. In ACIS'04, 1-12.
    • (2004) ACIS'04 , pp. 1-12
    • Jones, D.1    Behrens, S.2    Jamieson, K.3    Tansley, E.4
  • 30
    • 84905740506 scopus 로고
    • Strategic misalignment - How organizations can survive information security
    • Krull, A. R. (1994). Strategic Misalignment - How organizations can survive information security. Computer Fraud & Security Bulletin, 11-19.
    • (1994) Computer Fraud & Security Bulletin , pp. 11-19
    • Krull, A.R.1
  • 31
    • 33845367600 scopus 로고    scopus 로고
    • A systems approach to conduct an effective literature review in support of information systems research
    • Levy, Y. and Ellis, T. J. (2006). A Systems Approach to Conduct an Effective Literature Review in Support of Information Systems Research. Informing Science Journal, 9, 181-212.
    • (2006) Informing Science Journal , vol.9 , pp. 181-212
    • Levy, Y.1    Ellis, T.J.2
  • 32
    • 0000133760 scopus 로고
    • Threats to information systems: Today's reality, yesterday's understanding
    • Loch, K. D., Carr, H. H. and Warkentin, M. E. (1992). Threats to Information Systems: Today's Reality, Yesterday's Understanding. Management Information Systems, 16, 173-186.
    • (1992) Management Information Systems , vol.16 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 34
    • 57149141605 scopus 로고    scopus 로고
    • An update on business-IT alignment: "A line" has been drawn
    • Luftman, J. and Kempaiah, R. (2007). An Update on Business-IT Alignment: "A Line" Has Been Drawn. MIS Quarterly Executive, 6, 165-177.
    • (2007) MIS Quarterly Executive , vol.6 , pp. 165-177
    • Luftman, J.1    Kempaiah, R.2
  • 36
    • 0038032339 scopus 로고    scopus 로고
    • Issues and challenges in ubiquitous computing
    • Lyytinen, K. and Yoo, Y. (2002). Issues and Challenges in Ubiquitous Computing. Communications of the ACM, 45, 63-65.
    • (2002) Communications of the ACM , vol.45 , pp. 63-65
    • Lyytinen, K.1    Yoo, Y.2
  • 37
    • 67650143327 scopus 로고    scopus 로고
    • What levels of moral reasoning and values explain adherence to information security rules? An empirical study
    • Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T. and Vance, A. (2009). What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems, 18, 126-139.
    • (2009) European Journal of Information Systems , vol.18 , pp. 126-139
    • Myyry, L.1    Siponen, M.2    Pahnila, S.3    Vartiainen, T.4    Vance, A.5
  • 39
    • 38549154685 scopus 로고    scopus 로고
    • Spreadsheets and sarbanes-oxley: Regulations, risks, and control frameworks
    • Panko, R. R. (2006). Spreadsheets and Sarbanes-Oxley: Regulations, Risks, and Control Frameworks. Communications of the Association for Information Systems, 17, 1-50.
    • (2006) Communications of the Association for Information Systems , vol.17 , pp. 1-50
    • Panko, R.R.1
  • 41
    • 84993110618 scopus 로고    scopus 로고
    • Digital natives, digital immigrants
    • Prensky, M. (2001). Digital Natives, Digital Immigrants. On the Horizon, 9, 1-6.
    • (2001) On the Horizon , vol.9 , pp. 1-6
    • Prensky, M.1
  • 42
    • 78650770842 scopus 로고    scopus 로고
    • Improving employees' compliance through information systems security training: An action research study
    • Puhakainen, P. and Siponen, M. (2010). Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study. MIS Quarterly, 34, 757-778.
    • (2010) MIS Quarterly , vol.34 , pp. 757-778
    • Puhakainen, P.1    Siponen, M.2
  • 43
    • 55249118032 scopus 로고
    • Linking the MIS plan with corporate strategy: An exploratory study
    • Pyburn, P. J. (1983). Linking the MIS plan with corporate strategy: an exploratory study. MIS Quarterly, 7, 1-14.
    • (1983) MIS Quarterly , vol.7 , pp. 1-14
    • Pyburn, P.J.1
  • 44
    • 51449091631 scopus 로고    scopus 로고
    • Information security cultures of four professions: A comparative study
    • Ramachandran, S., Rao, S. V. and Goles, T. (2008). Information Security Cultures of Four Professions: A Comparative Study. In HICSS 08, 1-10.
    • (2008) HICSS , vol.8 , pp. 1-10
    • Ramachandran, S.1    Rao, S.V.2    Goles, T.3
  • 45
    • 0001940135 scopus 로고    scopus 로고
    • Factors that influence the social dimension of alignment between business and information technology objectives
    • Reich, B. H. and Benbasat, I. (2000). Factors That Influence the Social Dimension of Alignment between Business and Information Technology Objectives. MIS Quarterly, 24, 81-113.
    • (2000) MIS Quarterly , vol.24 , pp. 81-113
    • Reich, B.H.1    Benbasat, I.2
  • 46
    • 85001817266 scopus 로고    scopus 로고
    • Beyond rigor and relevance: Producing consumable research about information systems
    • Idea Group Inc
    • Robey, D. and Markus, M. L. (1998). Beyond rigor and relevance: producing consumable research about information systems. Information Resources Management Journal. Idea Group Inc.
    • (1998) Information Resources Management Journal
    • Robey, D.1    Markus, M.L.2
  • 48
    • 84905740507 scopus 로고    scopus 로고
    • Wall street's 'crackberry' withdrawal
    • Rusli, E. M. (2011). Wall Street's 'CrackBerry' Withdrawal. The New York Times, 1.
    • (2011) The New York Times , vol.1
    • Rusli, E.M.1
  • 49
    • 2942738445 scopus 로고    scopus 로고
    • Arrangements for information technology governance: A theory of multiple contingencies
    • Sambamurthy, V. and Zmud, R. W. (1999). Arrangements for Information Technology Governance: A Theory of Multiple Contingencies. MIS Quarterly, 23, 261-290.
    • (1999) MIS Quarterly , vol.23 , pp. 261-290
    • Sambamurthy, V.1    Zmud, R.W.2
  • 52
    • 0033115568 scopus 로고    scopus 로고
    • Critical success factors in the alignment of IS plans with business plans
    • Teo, T. S. H. and Ang, J. S. K. (1999). Critical success factors in the alignment of IS plans with business plans. International Journal of Information Management, 19, 173-185.
    • (1999) International Journal of Information Management , vol.19 , pp. 173-185
    • Teo, T.S.H.1    Ang, J.S.K.2
  • 53
    • 1442306469 scopus 로고    scopus 로고
    • Management research based on the paradigm of the design sciences: The quest for field-tested and grounded technological rules
    • van Aken, J. E. (2004). Management Research Based on the Paradigm of the Design Sciences: The Quest for Field-Tested and Grounded Technological Rules. Journal of Management Studies, 41, 219-246.
    • (2004) Journal of Management Studies , vol.41 , pp. 219-246
    • Van Aken, J.E.1
  • 54
    • 0033277396 scopus 로고    scopus 로고
    • Alignment is not enough: Integrating business and information technology management with the balanced business scorecard
    • Van der Zee, J. T. M. and Jong, B. d. (1999). Alignment is not enough: Integrating business and information technology management with the balanced business scorecard. Journal of Management Information Systems, 16, 137-156.
    • (1999) Journal of Management Information Systems , vol.16 , pp. 137-156
    • Van Der Zee, J.T.M.1    Jong, B.D.2
  • 56
    • 67650170305 scopus 로고    scopus 로고
    • Behavioral and policy issues in information systems security: The insider threat
    • Warkentin, M. and Willison, R. (2009). Behavioral and policy issues in information systems security: the insider threat. European Journal of Information Systems, 18, 101-105.
    • (2009) European Journal of Information Systems , vol.18 , pp. 101-105
    • Warkentin, M.1    Willison, R.2
  • 57
    • 84905713906 scopus 로고
    • Informations systems security and privacy
    • (Hanson, J. and Liebowitz, J., Eds), Ablex Pub. Corp., Norwood, N.J
    • Warkentin, M. E. (1995). Informations Systems Security and Privacy. In: Advances in Telematics. Volume 3 (Hanson, J. and Liebowitz, J., Eds), 57-79, Ablex Pub. Corp., Norwood, N.J.
    • (1995) Advances in Telematics , vol.3 , pp. 57-79
    • Warkentin, M.E.1
  • 60
    • 0012903874 scopus 로고    scopus 로고
    • Analyzing the past to prepare for the future: Writing a literature review
    • Webster, J. and Watson, R. T. (2002). Analyzing the Past to Prepare for the Future: Writing a Literature Review. MIS Quarterly, 26, xiii-xxiii.
    • (2002) MIS Quarterly , vol.26
    • Webster, J.1    Watson, R.T.2
  • 62
    • 84905740509 scopus 로고    scopus 로고
    • Wikipedia. Wikipedia
    • Wikipedia (2011). Napa County, California. Wikipedia, 1-15.
    • (2011) Napa County, California , pp. 1-15
  • 63
    • 0003673547 scopus 로고    scopus 로고
    • Third Edit. Sage Publications, Thousand Oaks, London, New Delhi
    • Yin, R. K. (2003). Case Study Research. Design and Methods. Third Edit. Sage Publications, Thousand Oaks, London, New Delhi.
    • (2003) Case Study Research. Design and Methods
    • Yin, R.K.1
  • 64
    • 70349309259 scopus 로고    scopus 로고
    • Current state of information security research in IS
    • Zafar, H. and Clark, J. G. (2009). Current State of Information Security Research In IS. Communications of the AIS, 24, 557-596.
    • (2009) Communications of the AIS , vol.24 , pp. 557-596
    • Zafar, H.1    Clark, J.G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.