Your browser doesn't support javascript.
The impact of mobile shadow IT usage on knowledge protection: an exploratory study: Very Informal Newsletter on Library Automation
VINE Journal of Information and Knowledge Management Systems ; 53(4):830-848, 2023.
Article Dans Anglais | ProQuest Central | ID: covidwho-20231664
ABSTRACT
PurposeThe mobile shadow information technology (IT) phenomenon is both completely misunderstood and negatively explored by those participating inside the organizational ecosystem. It represents all internet-based software, any other solutions for communications or employees' sharing without any formal authorization or approval from the IT department. Such behavior can lead to a security breach of the organization's data privacy, as these risks could disseminate it without the organization fully knowing. Recent research identifies that shadow IT is rarely covered from the knowledge sharing and knowledge protection (KP) perspective. This paper aims to provide an insight on how mobile shadow IT as a phenomenon could impact KP of an organization as a whole.Design/methodology/approachThis is an exploratory study based on a qualitative approach. The authors conducted interviews with 11 IT users to answer the main research question. The interview guidelines were divided into three parts types of mobile shadow IT and occurrence;KP nature in the workplace;and mobile shadow IT impact on KP.FindingsThe research findings identified that most interviewees use mobile shadow IT without any notice or permission from their IT departments. This sharing also negatively impacts the KP in the organization. The most common mobile shadow IT applications are the clouded type like Dropbox, Google Drive and WhatsApp. Interviewees are using mobile shadow IT mainly because organizations do not provide suitable tools to communicate efficiently. The authors concluded that mobile shadow IT harms KP with no security and privacy on what is being shared because this process is unmonitored by the organization.Practical implicationsFor adequate knowledge and data protection, IT departments need to take more actions and efforts. This study can help IT decision-makers cope with the technology changes while understanding mobile shadow IT impacts. This study also offers insight regarding types of applications that can be used as an alternative tool for employees rather than using unauthorized applications. This research shows that medium-sized organizations are free to use these applications, which can cause damage to organizations.Originality/valueThis research is arguably among the first to explore the interviewees' perspectives on how mobile shadow IT impacts KP. This paper also provides theoretical and practical insights by identifying the three primary constructs and how mobile shadow IT usage can affect KP.
Mots clés

Texte intégral: Disponible Collection: Bases de données des oragnisations internationales Base de données: ProQuest Central Type d'étude: Études expérimentales / Étude pronostique / Recherche qualitative langue: Anglais Revue: VINE Journal of Information and Knowledge Management Systems Année: 2023 Type de document: Article

Documents relatifs à ce sujet

MEDLINE

...
LILACS

LIS


Texte intégral: Disponible Collection: Bases de données des oragnisations internationales Base de données: ProQuest Central Type d'étude: Études expérimentales / Étude pronostique / Recherche qualitative langue: Anglais Revue: VINE Journal of Information and Knowledge Management Systems Année: 2023 Type de document: Article