Henry Akinlude

Introduction

Shadow IT and Rogue Innovation in Corporate Environments

In today’s corporate environment, Shadow IT and Rogue Innovation have become more widespread, shaping organizational dynamics and IT governance.

Shadow IT refers to the use of information technology systems, devices, software, applications, and services without explicit organizational approval. This phenomenon arises when employees or departments deploy solutions independently to meet specific needs, bypassing official IT channels (Raković et al., 2023).

Rogue Innovation, on the other hand, involves unauthorized innovation activities within an organization. Employees or teams initiate projects or develop new processes without formal approval, aiming to enhance efficiency or address challenges autonomously (McBride et al., 2023).

The acceleration of digital transformation has significantly contributed to the emergence of Shadow IT and Rogue Innovation. As organizations strive to remain competitive, employees increasingly adopt new technologies and processes to enhance productivity and innovation. The accessibility of cloud-based applications and services has facilitated the deployment of solutions without IT department oversight, leading to a surge in Shadow IT practices (Györy et al., 2012).

This trend is further amplified by the shift towards remote and hybrid work models, where employees operating outside traditional office settings often resort to unauthorized tools to maintain productivity and collaboration. The decentralization of IT procurement and the consumerization of IT has empowered employees to source and implement technologies independently, fostering an environment conducive to both Shadow IT and Rogue Innovation (Silic & Back, 2014).

  1. Associated Risks and Benefits

The adoption of Shadow IT and engagement in Rogue Innovation present a dual-edged sword, offering potential benefits alongside inherent risks.

Risks:

Security Vulnerabilities: Unauthorized applications and devices may lack robust security measures, increasing the risk of data breaches and cyberattacks. The absence of IT oversight means these tools are not subjected to standard security protocols, rendering the organization susceptible to threats.

Compliance Issues: Utilizing unapproved tools can lead to non-compliance with industry regulations and standards, potentially resulting in legal and financial repercussions. Shadow IT can cause uncontrolled data flows, complicating adherence to legislations such as the General Data Protection Regulation (GDPR) (Silic & Back, 2014).

Operational Inefficiencies: A fragmented IT environment, resulting from disparate, unsanctioned tools, can cause inconsistencies, integration challenges, and increased complexity in managing IT resources. This fragmentation can hinder effective communication and collaboration within the organization.

Benefits:

Enhanced Innovation: Employees can experiment with new tools and approaches, potentially leading to innovative solutions that benefit the organization. This autonomy can foster a culture of creativity and proactive problem-solving (McBride et al., 2023).

Financial Implications: While Shadow IT can lead to increased costs due to redundant systems and potential security breaches, it can also drive innovation and efficiency, potentially offsetting some financial risks

Improved Productivity: Access to preferred applications can enable employees to perform tasks more efficiently, as they can select tools that best fit their working styles and immediate needs (Silic & Back, 2014).

  1. The Role of Business Analysis as a Tool for Managing These Challenges

Business analysis is pivotal in addressing the complexities introduced by Shadow IT and Rogue Innovation within organizations. As intermediaries between various stakeholders, business analysts facilitate effective communication and understanding between business units and IT departments, ensuring that technological initiatives align with organizational objectives and compliance requirements.

One of the primary responsibilities of business analysts is to identify unauthorized tools and systems that constitute Shadow IT. Through comprehensive process mapping and active stakeholder engagement, they can uncover these unsanctioned applications and assess their alignment with the organization’s goals. This proactive identification is crucial for mitigating potential security risks and ensuring that all technological resources are utilized effectively (Zimmermann et al., 2020).

In addition to identification, business analysts are tasked with assessing the risks and benefits associated with Shadow IT and Rogue Innovation initiatives. This involves evaluating the potential impacts of these initiatives, allowing organizations to make informed decisions regarding their adoption or integration. By weighing the advantages of innovative solutions against associated security and compliance risks, business analysts provide a balanced perspective that aids in strategic decision-making (McBride et al., 2023).

Furthermore, business analysts play a significant role in developing governance frameworks that regulate the use of technology and innovation efforts within the organization. Establishing clear policies and procedures ensures that all technological activities align with organizational objectives and compliance requirements. A well-defined governance framework provides guidelines for acceptable use and outlines the process for approving new tools and initiatives, fostering a controlled environment conducive to innovation (Silic & Back, 2014).

By fulfilling these responsibilities, business analysts help organizations navigate the challenges posed by Shadow IT and Rogue Innovation, transforming potential obstacles into opportunities for growth and advancement.

  1. Research Questions and Objectives

This study aims to address the following research questions:

  • What factors contribute to the emergence of Shadow IT and Rogue Innovation in corporations?
  • What are the specific risks and benefits associated with these phenomena in the context of corporate governance and operational efficiency?
  • How can business analysis methodologies be applied to manage and integrate unauthorized technological initiatives within organizations effectively?

The primary objectives of this research are to:

  • Investigate the underlying drivers that lead to the adoption of Shadow IT and the pursuit of Rogue Innovation within corporate settings.
  • Assess the impact of these practices on organizational security, compliance, and overall performance.
  • Propose a structured framework for business analysts to identify, evaluate, and manage unauthorized IT activities, transforming potential challenges into strategic opportunities.

By addressing these questions and objectives, this study seeks to provide actionable insights for organizations striving to balance the imperative for innovation with maintaining robust governance and control mechanisms.

Understanding the Growth of Shadow IT and Rogue Innovation

Evolution of Corporate IT Governance and Decentralization Trends

The landscape of corporate Information Technology (IT) governance has undergone significant transformations over the past few decades, marked by a shift from centralized control to more decentralized models. This evolution has been instrumental in the emergence and proliferation of Shadow IT and Rogue Innovation within organizations.

In the 1980s and 1990s, the advent of personal computing introduced a new dynamic to corporate IT environments. Employees began utilizing personal devices and software to enhance productivity, often without the knowledge or approval of centralized IT departments. This practice laid the groundwork for what is now recognized as Shadow IT.

As organizations expanded and diversified, the limitations of a strictly centralized IT governance model became apparent. Centralized systems struggled to respond swiftly to the unique and evolving needs of various departments, leading to bottlenecks and inefficiencies. In response, businesses began adopting more decentralized approaches, granting individual departments greater autonomy over their IT resources. This decentralization aimed to foster innovation and agility but also inadvertently facilitated the rise of unauthorized IT solutions and independent innovation efforts—phenomena now termed Shadow IT and Rogue Innovation.

The early 2000s witnessed a surge in the adoption of cloud computing and software-as-a-service (SaaS) solutions. These technologies offered scalable resources and applications accessible over the Internet, reducing dependence on centralized IT infrastructures. While this shift empowered departments to procure and deploy solutions tailored to their specific needs, it also increased unsanctioned IT activities as employees sought to bypass the perceived constraints of centralized governance (Klotz et al., 2019).

In recent years, the acceleration of digital transformation initiatives has further amplified these trends. The imperative for rapid innovation and responsiveness to market dynamics has prompted employees to seek immediate technological solutions, often outside the purview of official IT channels. This environment has cultivated a fertile ground for both Shadow IT and Rogue Innovation to flourish, challenging traditional IT governance frameworks and necessitating a reevaluation of control mechanisms within organizations (Baillette et al., 2022).

Key Drivers: Cloud Computing, SaaS Adoption, and Demand for Agile Digital Transformation

Some of the key drivers that have been identified as catalysts for the growth of Shadow IT and Rogue Innovation in contemporary corporate settings are:

  • Cloud Computing and SaaS Adoption:

The proliferation of cloud-based services and SaaS applications has made it increasingly feasible for employees to access and implement IT solutions without direct involvement from the IT department. These platforms offer user-friendly interfaces and scalable functionalities, enabling departments to address their specific requirements promptly. However, this ease of access also means that many of these implementations occur without proper oversight, leading to potential security and compliance risks (Silic & Back, 2014).

  • Demand for Agile Digital Transformation:

The contemporary business environment is characterized by rapid technological advancements and shifting market demands. Organizations are constantly pressured to innovate and adapt swiftly to maintain competitive advantage. This urgency often leads employees to circumvent traditional IT processes, which they may perceive as slow or cumbersome, in favor of more immediate, albeit unauthorized, solutions. Such actions, while well-intentioned, contribute to the expansion of Shadow IT and Rogue Innovation (Kopper et al., 2020).

  • Decentralization of IT Resources:

As businesses grow and diversify, there is a natural tendency towards decentralizing IT resources to serve various departments’ unique needs better. While this decentralization can enhance responsiveness and innovation, it also reduces the IT department’s ability to monitor and control all technological deployments effectively. This lack of centralized oversight creates opportunities for unauthorized IT activities to proliferate (Györy et al., 2012).

  • User-Friendly Technology:

The increasing availability of user-friendly technology solutions allows non-IT personnel to deploy and manage IT resources with minimal technical expertise. While this democratization of technology can drive innovation and efficiency, it also means that employees can implement systems without adequate consideration of security, compliance, or integration with existing infrastructures, thereby contributing to the growth of Shadow IT (Silic & Back, 2014).

Case Studies: Real-World Examples of Shadow IT and Rogue Innovation

To illustrate the multi-faceted impact of Shadow IT and Rogue Innovation, it is instructive to examine specific instances where organizations have encountered both benefits and challenges due to these phenomena.

Positive Impact Case Study:

The Boeing Company, a leading aerospace manufacturer, encountered challenges with its official information systems, which were often slow to adapt to the specific needs of various departments. In response, several departments developed their IT solutions without formal approval, a practice known as Shadow IT.

These unauthorized systems allowed teams to address immediate operational requirements more effectively. Recognizing the value these solutions brought, Boeing conducted an internal review and decided to integrate some of these Shadow IT applications into their official IT infrastructure, ensuring proper governance and support mechanisms.

Negative Impact Case Study:

In 2023, several prominent Wall Street financial firms, including JPMorgan Chase and Goldman Sachs, faced significant repercussions due to their employees’ use of unauthorized communication tools. Staff members had been utilizing unapproved messaging applications to discuss sensitive business matters, bypassing official communication channels.

This practice led to violations of regulatory requirements for record-keeping and transparency. As a result, the Securities and Exchange Commission (SEC) imposed fines totaling $1.1 billion across 16 financial institutions. In response to this incident, these firms implemented stricter IT governance policies and conducted comprehensive training programs to educate employees about the risks and regulatory implications associated with Shadow IT (Trelica, 2023).

These case studies underscore the dual-edged nature of Shadow IT and Rogue Innovation. While they can serve as catalysts for innovation and improved performance, they pose significant risks if not properly managed. Organizations must strive to balance the autonomy that fosters innovation with the oversight necessary to maintain security and compliance.

The growth of Shadow IT and rogue innovation is a complex phenomenon rooted in the historical evolution of corporate IT governance and driven by factors such as cloud computing, SaaS adoption, and the demand for agile digital transformation. While these practices can offer substantial benefits, including enhanced innovation and responsiveness, they also present significant security, compliance, and IT governance challenges. A nuanced understanding of the causes, outcomes, and governance of Shadow IT is essential for organizations aiming to harness its benefits while mitigating associated risks (Kooper et al., 2020).

Organizations can foster an environment where innovation thrives without compromising security or compliance by implementing effective governance frameworks that balance control with flexibility. This approach requires continuous collaboration between IT departments and business units, transparent policies, and ongoing education to ensure that all employees understand the implications of Shadow IT and are equipped to make informed decisions about technology adoption (Baillette et al., 2022). In summary, the evolution of IT governance towards more decentralized models has enabled and challenged organizations. Embracing the positive aspects of Shadow IT and rogue innovation while proactively managing their risks is crucial for organizations to remain competitive and secure in the digital age.

Risks and Challenges of Unregulated IT and Innovation

A single overlooked software application, an unsanctioned cloud storage account, or an employee using an AI-powered tool without IT approval—these seemingly minor actions can become significant vulnerabilities for organizations. In a world where innovation often outpaces governance, companies face a paradox: the very technological agility that drives success can also expose them to significant risks. The need for regulation and oversight in Addressing these risks requires a comprehensive understanding of their impact on security, compliance, operations, and financial stability. Organizations must recognize these challenges to implement effective IT governance strategies that balance innovation with risk mitigation.

Security and Compliance Risks

One of the most critical risks associated with unregulated IT adoption is the potential for security breaches and violations of regulatory standards. The rapid pace of innovation and the need for agility in the business environment often prompt departments to bypass the formal IT channels, adopting tools and systems without appropriate oversight. This unregulated approach, called Shadow IT, can expose organizations to substantial security vulnerabilities.

  • Data Breaches

A significant concern for organizations using unregulated IT systems is the heightened risk of data breaches. When departments independently implement technology solutions without involving the IT department, these tools may lack the necessary security features, exposing sensitive data to cyber threats. A study by Caroline C. Hartmann et al. (2021) demonstrated that data breaches often occur when IT governance is weak or absent. Organizations that adopt unregulated tools may unknowingly introduce systems not designed to comply with the latest security protocols, such as encryption, multi-factor authentication, or secure data storage.

Data breaches have legal and financial consequences and severely damage a company’s reputation. Trust is one of the most valuable assets for an organization, and a data breach can erode consumer confidence. This can lead to losing clients, decreased sales, and potentially long-term reputational damage. Furthermore, the financial impact of a data breach can be enormous. For example, IBM reported the average cost of a data breach in 2024 to be $4.88 million (IBM, 2024). These financial losses can be attributed to the direct costs of the breach itself, as well as the indirect costs such as legal fees, regulatory fines, and increased insurance premiums.

  • Regulatory Violations

Another significant risk associated with unregulated IT adoption is non-compliance with legal and regulatory standards. Laws such as the General Data Protection Regulation (GDPR) in Europe and the Health Insurance Portability and Accountability Act (HIPAA) in the United States impose stringent requirements on organizations to protect sensitive information. Failure to comply with these regulations can result in hefty fines, legal penalties, and a loss of business reputation.

A report by McKean et al. (2023) found that non-compliance with GDPR has led to financial penalties exceeding €5.88 billion since its implementation in 2018, with significant fines such as the €1.2 billion penalty imposed on Meta in 2023. These regulatory breaches are often the result of employees or departments using software or platforms without ensuring they meet the required legal standards for data protection. For instance, many unregulated applications may not include the necessary features to safeguard personal data, leading to inadvertent violations of privacy laws.

The rapid adoption of cloud-based technologies and third-party applications without proper vetting is one of the primary reasons for non-compliance. As organizations transition to cloud services and adopt third-party solutions, they must ensure that these platforms are equipped with the proper security measures and compliance certifications. Managing third-party risks becomes even more complicated when these tools are not properly integrated into the overall IT governance framework (Folorunso et al., 2024).

Operational Challenges

Unregulated IT adoption can lead to various operational challenges that hinder organizational efficiency. While Shadow IT may offer quick solutions to immediate problems, it can create long-term complications that increase complexity and cost. These operational issues often arise from the lack of centralized control and oversight over IT assets, leading to inefficiencies, redundancies, and difficulties in system integration.

  • Redundancies

In organizations with decentralized IT practices, different departments may independently adopt similar or identical tools without coordinating. This leads to operational redundancies, where multiple versions of the same software or tools are used across the organization. Redundancies can waste resources, increase licensing costs, and require additional support for managing and troubleshooting multiple tools that serve the same function.

For example, in a study by Seth, Najana, and Ranjan (2024), it was observed that many organizations using unregulated cloud-based tools ended up duplicating efforts between departments, leading to unnecessary expenditure on duplicate software licenses. This redundancy impacts the bottom line and complicates management, as IT departments may be unaware of the tools being used and lack control over their performance or functionality.

  • Integration Issues

Another operational challenge posed by unregulated IT is the difficulty in integrating these tools with existing systems. Unregulated tools are often incompatible with the organization’s core IT infrastructure, leading to integration challenges. This lack of interoperability can disrupt business operations, as employees may face difficulties transferring data between different systems or reconciling incompatible data formats.

Integration issues also create problems when scaling IT solutions or adding new functionality. According to Luo et al. (2024), organizations that lack a unified IT strategy often encounter challenges in integrating new technologies with legacy systems, leading to inefficiencies and lost productivity. Furthermore, organizations that rely on numerous unregulated tools may find it challenging to ensure that these tools adhere to the same quality and performance standards, leading to inconsistent experiences for employees and customers alike.

  • Inefficiencies

Unregulated IT systems often result in inefficiencies due to the absence of standardized processes. When departments use disparate tools and platforms, it becomes challenging to streamline operations. Employees may have to deal with various user interfaces, workflows, and data structures, which can slow productivity and lead to errors. Moreover, the lack of oversight and formal training on these tools can increase the likelihood of mistakes, further contributing to inefficiencies.

A study by Almedia F. (2024) found that organizations that implemented Shadow IT systems without proper training or integration experienced significant reductions in employee productivity, as workers spent considerable time navigating unoptimized systems. These inefficiencies can have a ripple effect throughout the organization, delaying projects and increasing the overall cost of doing business.

trategic and Financial Impacts

Unregulated IT practices’ strategic and financial impact extends far beyond the immediate operational disruptions they cause. Unregulated IT can undermine an organization’s long-term objectives, misalign budgets, and lead to governance issues that make it difficult for organizations to meet their strategic goals.

  • Governance Challenges

Effective IT governance is essential for aligning technology initiatives with business goals and ensuring that resources are used efficiently. Unregulated IT initiatives can lead to fragmented decision-making and misalignment between IT and business strategies without proper oversight. The lack of governance sometimes results in competing initiatives across departments, with no clear leadership or accountability.

A lack of governance can lead to confusion about priorities, with different departments adopting conflicting solutions to address similar problems. This misalignment can undermine the organization’s long-term objectives and impede its ability to innovate in a coordinated manner. Furthermore, as organizations scale, the absence of a cohesive IT strategy can cause bottlenecks as decision-makers struggle to evaluate and prioritize numerous competing IT projects.

  • Cost Overruns

Unregulated IT projects are more likely to experience cost overruns due to the absence of formal project management processes. When departments are left to make independent decisions regarding IT solutions, these projects may lack proper planning and oversight, leading to budgetary issues. This is particularly true for IT projects that are not integrated into the broader organizational strategy.

A Flexera (2022) report found that many organizations using unregulated cloud-based tools end up duplicating efforts between departments, leading to unnecessary expenditure on duplicate software licenses. This redundancy impacts the bottom line and complicates management, as IT departments may be unaware of the tools being used and lack control over their performance or functionality.

  • Budget Misalignment

Unregulated IT can also lead to misaligned budgets, as IT expenditures may not reflect the organization’s strategic priorities. When departments bypass formal IT channels, they may purchase tools that do not align with the overall business strategy, leading to wasted resources. These tools may require additional training, support, and integration investments, further exacerbating budgetary misalignment.

As Billi et al. (2023) noted, the misalignment of IT investments with business objectives can result in inefficient use of resources. Organizations may invest heavily in IT projects that do not yield a significant return on investment (ROI), leading to financial inefficiencies. This misalignment can strain the organization’s financial health and hinder its ability to achieve long-term success.

The risks and challenges associated with unregulated IT and rogue innovation are significant, ranging from security and compliance risks to operational inefficiencies and strategic misalignments. Organizations must recognize the importance of proper IT governance and oversight in managing these challenges. By implementing robust governance frameworks, businesses can ensure that innovation is pursued securely, efficiently, and aligned, ultimately contributing to long-term growth and success.

Business Analysis as a Tool for Managing Shadow IT

In an environment where agility and innovation dictate success, organizations often struggle to maintain control over rapidly adopting new technologies. Employees and business units bypass traditional IT approval processes to implement solutions that streamline workflows, enhance productivity, or fill perceived gaps in enterprise systems. While these unauthorized innovations may deliver immediate value, they also introduce security vulnerabilities, operational inefficiencies, and compliance risks.

Managing this complex dynamic requires more than restrictive policies; it demands a strategic approach that aligns business needs with IT governance. Business analysis offers a robust framework for bridging the innovation and control gap. Organizations can turn unmanaged IT into a driver of competitive advantage rather than a liability by engaging stakeholders, analyzing technological gaps, and establishing a structured decision-making process.

Stakeholder Engagement: Identifying Shadow IT through Collaboration

One of the biggest challenges in managing Shadow IT is its hidden nature. Employees adopt tools and software without informing IT departments, often out of necessity rather than defiance. A study by Kopper, Westner, and Strahringer (2019) found that over 60% of business units rely on unsanctioned technology because they perceive enterprise IT to be slow or inadequate in meeting their needs. Rather than treating Shadow IT as a problem to be eradicated, successful organizations recognize the need for open communication and collaboration.

Stakeholder engagement is the first step in gaining visibility into these hidden systems. By fostering a culture of transparency, IT teams can identify unauthorized tools while understanding the business drivers behind their adoption. This process involves:

  • Conducting regular cross-departmental dialogues to uncover IT needs that are not being met through official channels.
  • Encouraging employees to report unauthorized tools without fear of reprimand, allowing IT to assess their impact.
  • Implementing technology advisory groups that involve representatives from various business units to evaluate emerging needs before employees resort to Shadow IT.

A case example is Siemens, a global manufacturing company, implemented “IT Ambassadors” within each department to act as intermediaries between employees and IT. This initiative increased awareness of unauthorized tools and facilitated a structured approach to integrating valuable Shadow IT solutions into official infrastructure.

Process and Gap Analysis: Detecting Unauthorized Systems and Assessing Integration Challenges

Once Shadow IT instances are identified, the next step is a structured assessment of their impact on existing systems and processes. Traditional IT governance often fails because it assumes all business units have uniform technological needs. In reality, marketing, sales, and product development departments often require niche solutions that enterprise IT may not readily provide.

Gap analysis helps organizations determine why employees turn to unauthorized tools and whether existing IT solutions can be adapted to meet those needs. This involves:

  • Mapping workflows to identify where unauthorized tools interact with official enterprise systems.
  • Evaluating redundancy and inefficiencies, ensuring Shadow IT does not create conflicts or duplicate existing capabilities.
  • Assessing security, compliance, and data risks, particularly with cloud-based applications that may handle sensitive information.

A systematic literature review by Huber, Zimmermann, and Rentrop (2018) revealed that in many cases, Shadow IT emerges due to IT departments failing to align with business needs rather than employees deliberately circumventing policies. When business analysts conduct thorough process evaluations, they provide IT leaders with the insights necessary to develop sanctioned solutions that meet employees’ real requirements.

Enterprise Architecture (EA) Strategies: Aligning Business Needs with IT Governance

Enterprise Architecture (EA) provides a structured approach to aligning IT strategy with business objectives, ensuring that technological decisions support long-term growth while maintaining governance and compliance. Organizations can proactively address Shadow IT and rogue innovation through standardized frameworks by integrating EA principles.

Key EA strategies for managing Shadow IT include:

  • Technology Standardization: Establishing a unified IT infrastructure reduces the need for employees to seek unauthorized alternatives. Organizations that implement cloud-based enterprise solutions, such as Microsoft 365 or Google Workspace, minimize the necessity for ad-hoc third-party applications.
  • Enterprise Integration Platforms: Middleware solutions like API gateways enable seamless integration of external applications with official enterprise systems, allowing IT to oversee Shadow IT tools without stifling productivity.
  • Business-IT Collaboration: Regular communication between IT departments and business units helps identify unmet needs, ensuring that enterprise systems evolve in alignment with operational demands. EA frameworks such as TOGAF (The Open Group Architecture Framework) provide methodologies to bridge this gap (Lankhorst, 2017).

By embedding these strategies, businesses can create an adaptive IT governance structure that minimizes Shadow IT risks while fostering innovation.

Agile and Lean Methodologies: Incorporating Rogue Innovations into Corporate IT

Agile and Lean methodologies prioritize iterative development, continuous feedback, and adaptability—principles that can help organizations manage and integrate Shadow IT effectively. Rogue innovations often emerge due to the rigidity of traditional IT approval processes, but Agile frameworks offer structured flexibility.

  • Sprint-Based Evaluations: Organizations can implement short cycles (sprints) to test and validate Shadow IT tools before enterprise-wide adoption. For example, software development teams using Scrum or Kanban can trial innovative applications within controlled environments before IT officially integrates them (Rigby et al., 2018).
  • Lean Startup Approach: Companies can apply Lean principles, such as Build-Measure-Learn, to evaluate whether unauthorized tools bring tangible benefits. If an application demonstrates value, it can be formalized within corporate IT governance; otherwise, it can be phased out with minimal disruption.
  • Cross-Functional Teams: Encouraging collaboration between IT and business users through Agile methodologies ensures that innovation is guided by governance rather than hindered by bureaucratic constraints.

Organizations can channel rogue innovations into structured processes by incorporating Agile and Lean approaches, mitigating risks while leveraging employee-driven technological advancements.

Decision Framework: Evaluating Whether to Integrate, Regulate or Phase Out Innovations

Once the risks and benefits of Shadow IT tools are assessed, organizations must determine how to handle them. Some solutions may be highly valuable and worth integrating into official IT infrastructure, while others pose security or compliance risks that necessitate removal. A structured decision framework allows organizations to categorize Shadow IT instances based on their strategic value and potential risks.

Key Considerations in Decision-Making

Effectively managing Shadow IT requires a structured approach that accounts for both business value and potential risks. Organizations cannot afford to eliminate all instances of Shadow IT, as doing so may stifle innovation and hinder productivity. Instead, a balanced decision-making framework should determine whether a tool should be integrated, regulated, or phased out. Below is an in-depth exploration of each approach, providing a richer understanding of their strategic implications.

  1. Integration – Formalizing Shadow IT into Enterprise Systems

Integration is ideal when a Shadow IT tool provides significant value to business processes while meeting security, compliance, and operational standards. Suppose an unauthorized application enhances efficiency, fosters collaboration, or fills enterprise IT gaps. In that case, fully integrating it into the company’s infrastructure can turn a potential risk into a strategic advantage.

Key steps in integration:

  • Vendor Negotiations and Procurement: Many Shadow IT tools originate as free or limited-use applications. Once identified as valuable, organizations must negotiate licensing agreements, ensure proper support, and assess long-term sustainability. For example, marketing teams often adopt social media analytics platforms that provide deep insights into consumer behavior. The company can formally purchase enterprise licenses to ensure data security and compliance if such tools prove useful.
  • IT Support and Maintenance: Integrating a tool into the enterprise system requires ongoing IT support. This means assessing compatibility with existing infrastructure, ensuring seamless data synchronization, and establishing protocols for troubleshooting. Without IT oversight, even the most effective Shadow IT tools can become liabilities due to a lack of technical support.
  • Security and Compliance Audits: Every tool must be evaluated against organizational policies and regulatory requirements such as GDPR, HIPAA, or ISO standards. If the application handles sensitive data, encryption, access control, and compliance audits must be implemented before full-scale adoption.

A successful example of integration comes from Siemens, where engineers started using a cloud-based project management tool to collaborate across global teams. Recognizing its effectiveness, Siemens’ IT department assessed security risks, negotiated licensing, and integrated the platform into their official IT environment, improving efficiency without compromising security.

  • Regulation – Establishing Controlled Usage with Oversight

Not all Shadow IT solutions can or should be fully integrated. In cases where a tool provides specific benefits but also introduces some level of risk, organizations may opt for a regulated approach. This means allowing limited use of the technology under strict policies while ensuring it does not conflict with enterprise IT strategies.

Key elements of regulation:

  • Defining Usage Policies: IT departments must establish clear rules on how and when a Shadow IT tool can be used. This may include restricting usage to specific teams, defining acceptable data handling procedures, and ensuring compliance with security standards.
  • Monitoring and Auditing: Unlike fully integrated solutions, regulated Shadow IT tools require continuous oversight. Regular audits ensure that employees use the tool within approved guidelines, preventing unauthorized expansion or improper data handling.
  • Access Control Measures: If a Shadow IT tool is to be regulated, IT must implement strong user authentication and role-based access control to prevent unauthorized personnel from accessing sensitive data.

For instance, NASA (2023) allows certain teams to use third-party data visualization tools under controlled conditions. These tools are not fully integrated into the agency’s IT ecosystem but are permitted for specific projects with data access and sharing restrictions. This ensures that innovation is not hindered while maintaining an acceptable level of control.

  • Phase-Out – Eliminating High-Risk or Redundant Shadow IT

In some cases, Shadow IT presents more risks than benefits, making elimination the best course of action. If a tool lacks security measures, creates operational inefficiencies, or leads to compliance violations, organizations must phase it out and replace it with a sanctioned alternative.

Steps in phasing out Shadow IT:

  • Risk Assessment and Justification: Before removing a tool, IT must document the risks it poses, such as data breaches, operational conflicts, or regulatory non-compliance. Employees should understand the reasoning behind discontinuation to avoid resistance.
  • Providing Alternative Solutions: Employees adopt Shadow IT because existing enterprise tools fail to meet their needs. If an application is to be eliminated, IT must offer an official alternative that provides similar functionality while aligning with governance policies.
  • Change Management and Training: Employees may resist removing a familiar tool, especially if it has become central to their workflow. A structured transition plan should include training on approved alternatives, clear deadlines for phasing out the Shadow IT application, and ongoing support to minimize disruptions.

A prime example of a successful phase-out occurred at Capital One, where the IT department implemented an enterprise-approved cloud solution, conducted company-wide training, and gradually decommissioned unauthorized platforms. This approach ensured security and usability, effectively addressing compliance and security concerns.

Determining whether to integrate, regulate, or phase out Shadow IT requires a strategic and analytical approach. Organizations must evaluate each tool’s value, risk level, and compliance implications before making a decision. A well-defined decision framework ensures that businesses maintain agility and innovation while mitigating risks. Organizations that apply a structured evaluation framework can manage Shadow IT proactively rather than reactively. Instead of enforcing blanket prohibitions, this approach ensures that valuable innovations are harnessed while minimizing risks.

Shadow IT is not merely a technological issue but a fundamental challenge of business alignment. Employees adopt unauthorized solutions because they perceive existing IT processes as insufficient. By leveraging business analysis methodologies, organizations can transform unregulated IT into an opportunity rather than a threat. Stakeholder engagement fosters transparency, process analysis uncovers inefficiencies, and structured decision frameworks ensure that technological innovations align with business goals while maintaining security and compliance. With a well-executed strategy, businesses can navigate the fine line between control and agility, ensuring that IT governance does not stifle innovation but empowers it.

The Role of AI and Automation in Shadow IT Management

Artificial intelligence (AI) and automation provide advanced capabilities for detecting, monitoring, and regulating Shadow IT initiatives. With the increasing use of AI-driven analytics, organizations can gain real-time visibility into unauthorized applications and take proactive measures to manage them.

AI-driven approaches for Shadow IT governance include:

  • Anomaly Detection: AI-powered security systems analyze network traffic and detect unauthorized applications, flagging potential risks before they escalate (Olafuyi, B. A. 2023).
  • Automated Compliance Monitoring: Machine learning algorithms can assess whether Shadow IT tools comply with industry regulations and automatically enforce security policies.
  • Chatbots and Virtual Assistants: AI-driven support tools guide employees in selecting approved applications, reducing reliance on unauthorized software.

Governance and Risk Management Strategies

Effectively managing Shadow IT and rogue innovation requires a structured governance and risk management approach. Organizations must balance fostering technological innovation and ensuring compliance with security, operational, and regulatory requirements. This chapter explores key governance strategies, including policy-based approaches and established IT governance models that help businesses mitigate risks while supporting innovation.

Policy-Based Approaches: Developing Balanced Corporate IT Policies

Corporate IT policies form the foundation of governance strategies for managing unregulated IT activities. A well-defined policy framework ensures that employees understand acceptable IT practices while providing guidelines for integrating innovative solutions without compromising security and compliance.

Key Components of Effective IT Policies

  1. Acceptable Use Policies (AUPs): Organizations should clearly define the permitted technologies, applications, and data-sharing practices. AUPs ensure employees adhere to security protocols while maintaining flexibility for approved third-party tools (Von Solms & Van Niekerk, 2013).
  2. Data Protection and Compliance Policies: With regulations like GDPR, HIPAA, and SOX requiring stringent data handling practices, IT policies must establish encryption, access control, and auditing mechanisms to safeguard sensitive information (Tikkinen-Piri et al., 2018).
  3. Bring Your Own Device (BYOD) Policies: As personal devices increasingly enter the workplace, organizations need clear BYOD policies that specify security requirements, network access restrictions, and endpoint management solutions Companies like Cisco, IBM, and Microsoft enforce stringent mobile device security policies to prevent unauthorized access to corporate data (Cisco, 2022; Microsoft, 2022).
  4. Shadow IT Identification and Reporting Policies: Instead of outright banning unauthorized IT tools, organizations should create an open reporting structure that encourages employees to disclose their use of third-party applications. Google‘s internal IT framework allows teams to propose new technologies, which IT evaluates before formal adoption (Westerman et al., 2019).

By implementing balanced IT policies, businesses can reduce Shadow IT risks while maintaining a flexible and adaptive technological environment.

IT Governance Models: COBIT, ITIL, and ISO 27001 Frameworks

IT governance frameworks provide structured methodologies for managing IT operations, security, and risk. Adopting globally recognized models ensures organizations align their IT strategies with business objectives while maintaining robust compliance measures.

  1. COBIT (Control Objectives for Information and Related Technologies)

COBIT is a widely used IT governance framework developed by ISACA (Information Systems Audit and Control Association), focusing on aligning IT with business goals while managing risks and performance.

  • Key COBIT principles include:
    • Establishing a governance structure with clear roles and responsibilities.
    • Aligning IT initiatives with business objectives and risk tolerance.
    • Implementing performance measurement and continuous improvement mechanisms (ISACA, 2019).

Many financial institutions adopt COBIT to maintain compliance with stringent regulatory requirements, ensuring secure and efficient IT operations.

  • ITIL (Information Technology Infrastructure Library)

ITIL is a framework that standardizes IT service management (ITSM), ensuring that IT processes support business goals efficiently.

  • Key ITIL strategies for managing Shadow IT include:
    • Service Strategy: Identifying business needs and evaluating IT solutions before adoption.
    • Service Design: Assessing security, compliance, and integration factors in new IT tools.
    • Continual Service Improvement: Monitoring IT performance and refining governance processes (Axelos, 2020).

ITIL is particularly effective for large enterprises managing diverse IT ecosystems, ensuring structured service delivery and incident management.

  • ISO 27001: Information Security Management

ISO 27001 is an international standard for managing information security risks, helping organizations develop comprehensive risk management policies.

  • Core ISO 27001 components include:
    • Risk assessment methodologies to evaluate security vulnerabilities.
    • Data protection measures, including encryption and access controls.
    • Compliance monitoring to align IT practices with regulatory requirements (International Organization for Standardization, 2021).

ISO 27001 is widely adopted in industries handling sensitive data, such as healthcare, finance, and government agencies, ensuring robust cybersecurity and compliance protocols.

  • Implementing a Hybrid Governance Model

Many organizations combine multiple IT governance frameworks to create a hybrid governance model tailored to their specific needs. For example:

  • A multinational bank may use COBIT for regulatory compliance, ITIL for IT service management, and ISO 27001 for cybersecurity governance.
  • A technology firm might integrate Agile methodologies with ITIL to ensure flexibility while maintaining structured IT operations.
  • Healthcare institutions often combine HIPAA compliance policies with ISO 27001 to protect patient data effectively.

By leveraging multiple governance models, businesses can optimize IT management, reduce security risks, and enhance operational efficiency.

Risk-Based Approach to Shadow IT: Categorizing and Managing Acceptable Risks

A risk-based framework allows organizations to categorize Shadow IT initiatives based on their potential impact and define acceptable levels of innovation outside IT’s control. Instead of outright banning unauthorized tools, businesses can assess and regulate them based on predefined criteria.

Risk categorization includes:

  • Low-Risk Innovations: Non-sensitive tools that improve productivity, such as third-party project management or design applications, may be permitted under controlled guidelines.
  • Moderate-Risk Innovations: Applications that handle limited internal data require additional security measures, such as access control and encryption, before approval.
  • High-Risk Innovations: Software that interacts with sensitive customer data, financial records, or proprietary algorithms must undergo rigorous IT scrutiny or be replaced with enterprise-approved alternatives.

Implementation strategies for a risk-based approach:

  • Security Audits: Conducting regular risk assessments ensures that Shadow IT remains within acceptable security thresholds.
  • Defined Governance Models: Establishing tiered governance policies allows organizations to apply different levels of control based on the associated risk level.
  • Employee Training: Educating staff on the risks of unregulated IT use fosters compliance while encouraging responsible innovation.

Transforming Shadow IT into a Strategic Asset

Traditionally viewed as a challenge, Shadow IT is increasingly being recognized as a potential asset that can drive business growth, innovation, and efficiency. Instead of outright eliminating Shadow IT, progressive organizations are shifting toward strategic integration, transforming unsanctioned technology use into a competitive advantage. By identifying beneficial innovations, fostering controlled experimentation through innovation sandboxes, and strengthening collaboration between IT and business teams, companies can leverage Shadow IT to enhance agility, improve responsiveness, and gain technological leadership.

When Shadow IT Becomes Advantageous: Identifying Beneficial Innovations

While Shadow IT often presents risks related to security, compliance, and inefficiencies, it can also uncover gaps in existing IT solutions and highlight employee-driven technological advancements. Many organizations are recognizing that some unsanctioned technologies solve real-world business problems faster than corporate IT departments can.

Key Indicators That Shadow IT Provides Strategic Value:

  • Business Efficiency Gains: When employees adopt third-party solutions that streamline workflows and improve productivity beyond what sanctioned tools offer, it suggests a need for IT to evaluate and formalize the tool’s adoption).
  • Faster Innovation Cycles: Shadow IT solutions often emerge to bypass bureaucratic delays in corporate IT approvals. If a tool significantly accelerates product development or operational processes, it may warrant integration into official IT frameworks.
  • Enhanced Customer Experience: Some departments implement Shadow IT tools to personalize customer engagement, such as marketing teams using AI-driven analytics platforms. If these tools enhance customer satisfaction and drive revenue, IT should assess their long-term value.
  • Cost Savings and ROI: If a Shadow IT solution reduces costs or enhances revenue-generating activities without major compliance risks, formalizing its use can create measurable financial benefits.

By adopting a structured evaluation framework, organizations can determine whether Shadow IT initiatives should be integrated, monitored, or phased out.

Innovation Sandboxes: Controlled Experimentation for New Technologies

To harness the potential of Shadow IT while mitigating risks, organizations are creating controlled environments for experimentation, known as innovation sandboxes. These environments allow employees to explore and test new technologies without disrupting core IT infrastructure or violating compliance standards.

Key Features of an Effective Innovation Sandbox:

  • Defined Scope and Governance: IT teams set clear guidelines on what can be tested, under what conditions, and who oversees the process.
  • Security and Compliance Safeguards: Data privacy, encryption, and regulatory requirements are embedded within the sandbox to ensure risk mitigation.
  • Scalability and Integration Pathways: If a Shadow IT tool demonstrates value, a structured pathway ensures its seamless transition into the organization’s official IT infrastructure.

JPMorgan Chase has leveraged innovation sandbox environments to facilitate the testing and development of AI-driven financial technologies. By providing a controlled space for experimentation, employees can explore and refine new banking solutions without violating regulatory requirements. This approach enables the company to assess the viability and security of emerging technologies before integrating them into its core systems, ensuring compliance while fostering continuous innovation (Tulsi et al., 2024).

Similarly, Unilever (2022) has established an innovation sandbox within its marketing division to enable teams to experiment with advanced data analytics tools. This initiative allows marketers to test and optimize new digital strategies while maintaining alignment with corporate IT policies. By providing a structured yet flexible environment, Unilever ensures that new technologies enhance marketing efficiency without compromising data security or regulatory compliance.

IT-Business Collaboration: Bridging the Gap Between IT Governance and Business Needs

One of the biggest drivers of Shadow IT is the perceived disconnect between IT departments and business teams. Employees often bypass IT policies when they feel corporate IT does not align with their operational needs. To bridge this gap, organizations must foster collaboration between IT professionals and business units. Strategies to Strengthen IT-Business Collaboration include:

  • Business-Led IT Governance: Encouraging cross-functional collaboration where business leaders participate in IT decision-making to ensure technologies align with strategic goals.
  • Enterprise Architecture Integration: Developing IT frameworks that prioritize business agility while maintaining governance, ensuring that employees do not need to resort to Shadow IT.
  • Employee Training & Awareness: Instead of punitive policies against Shadow IT, companies like Microsoft and IBM educate employees on safe and compliant technology adoption.
  • Innovation Councils: Establishing IT innovation teams that evaluate employee-driven technological solutions, allowing promising Shadow IT initiatives to be fast-tracked for approval.

Case Studies: Successful Integration of Rogue Innovation

Netflix’s Use of Shadow IT to Drive Cloud Innovation

In the early 2010s, Netflix engineers bypassed corporate IT infrastructure to implement Amazon Web Services (AWS) cloud solutions, seeking greater scalability and flexibility than traditional data centers could provide. Initially viewed as an unauthorized move, Netflix’s leadership recognized the strategic advantage and formally integrated AWS into its IT strategy. Today, Netflix operates one of the world’s most advanced cloud-based infrastructures, allowing real-time content delivery to millions of users globally (AWS, 2016).

AstraZeneca’s Adoption of Shadow IT in R&D

Pharmaceutical giant AstraZeneca faced challenges with slow approval cycles for data analytics tools used in clinical research. Research teams adopted unapproved AI-driven data analysis platforms to accelerate drug development to streamline trial assessments. Recognizing the impact, AstraZeneca’s IT department worked with researchers to validate and integrate these tools into its enterprise architecture, leading to faster drug approval processes (AstraZeneca 2023).

Airbus Leveraging Shadow IT for Digital Manufacturing

Airbus engineers working on aircraft design adopted 3D printing software that was not initially sanctioned by corporate IT. The tool allowed rapid prototyping, reducing design cycle times and lowering costs. Instead of banning it, Airbus created an internal “innovation hub” to evaluate and scale beneficial Shadow IT solutions. This initiative has since contributed to advancements in aerospace manufacturing (McKinsey & Company, 2024).

When managed effectively, Shadow IT can become a catalyst for innovation rather than a source of risk. Organizations that embrace structured evaluation frameworks, controlled experimentation environments, and IT-business collaboration can transform Shadow IT into a strategic enabler of digital transformation. By learning from successful case studies, companies can integrate employee-driven innovations into corporate IT strategies while maintaining security, compliance, and efficiency.

Conclusion

In an era where rapid technological advancements shape business landscapes, the rise of Shadow IT and Rogue Innovation presents challenges and opportunities. This study has examined the intricate balance between innovation and governance, emphasizing the pivotal role of business analysis in managing unsanctioned IT initiatives. By leveraging structured decision frameworks, governance models, and collaborative strategies, organizations can transform Shadow IT from a compliance risk into a strategic asset that fuels innovation and efficiency.

The study highlights the dual nature of Shadow IT and Rogue Innovation. While unregulated IT adoption can lead to data breaches, regulatory violations such as GDPR and HIPAA non-compliance, and increased cybersecurity threats, it also presents business agility and innovation opportunities. Without proper IT governance, organizations face financial and reputational damage. Operationally, Shadow IT contributes to redundancies, integration issues, and inefficiencies that create obstacles to enterprise-wide digital transformation. Additionally, misalignment between IT and business objectives further complicates IT strategy execution.

However, Shadow IT can enhance efficiency and foster technological leadership when managed effectively. Case studies from Netflix, Siemens, and AstraZeneca illustrate how structured governance can turn unsanctioned IT into a source of competitive advantage. Business analysis plays a crucial role in addressing these challenges by facilitating stakeholder engagement, conducting process gap analysis, and implementing structured decision frameworks. These approaches help organizations evaluate and integrate beneficial Shadow IT while mitigating risks.

Policy & Strategy Recommendations:

Balancing the need for IT control with the imperative for innovation requires a multi-faceted governance approach. Organizations should adopt hybrid IT governance models by implementing frameworks such as COBIT, ITIL, and ISO 27001, which allow them to enforce compliance while fostering digital transformation. Risk-based categorization is essential, as assessing and classifying Shadow IT based on risk level enables controlled experimentation while restricting high-risk implementations. Innovation sandboxes provide controlled environments for testing new technologies, ensuring compliance while allowing employees to explore and refine cutting-edge solutions.

AI and automation can enhance governance further by providing real-time monitoring systems that improve Shadow IT visibility and ensure compliance without stifling productivity. Encouraging business-IT collaboration by establishing cross-functional teams to evaluate and integrate employee-driven innovations into corporate IT infrastructures fosters alignment between business needs and IT policies. Through these strategic measures, organizations can mitigate risks while leveraging Shadow IT as a driver of innovation.

Future Research Areas

  • AI-Driven Governance Models: How can machine learning and AI enhance real-time risk assessment and decision-making in IT governance?
  • Decentralized IT Models: With the rise of blockchain and decentralized computing, how can organizations adapt governance strategies to remain secure yet agile?
  • Quantum Computing & IT Security: As quantum technology matures, its impact on cybersecurity, encryption, and risk management in corporate IT warrants deeper exploration.

The dynamic interplay between innovation and IT governance necessitates adaptive, forward-thinking strategies. By embracing structured governance, business analysis methodologies, and emerging technologies, organizations can mitigate risks while leveraging Shadow IT as a driver of digital transformation. Rather than suppressing unauthorized innovations, businesses must cultivate an ecosystem where agility and compliance coexist, ensuring sustainable growth in the digital age.

References

Almeida, F. (2024). Causes of Failure of Open Innovation Practices in Small- and Medium-Sized Enterprises. Administrative Sciences14(3), 50. https://doi.org/10.3390/admsci14030050

Amazon Web Services. (2016). Netflix Case Study. Retrieved from https://aws.amazon.com/solutions/case-studies/netflix-case-study/

AstraZeneca. (2023). Data Science & Artificial Intelligence. Retrieved from https://www.astrazeneca.com/r-d/data-science-and-ai.html

Axelos. (2020). ITIL Foundation: ITIL 4 Edition. Axelos Publishing. https://www.amazon.com/ITIL-foundation-Axelos/dp/0113316070

Baillette, P., Barlette, Y., & Berthevas, J.-F. (2022). “Benefits and Risks of Shadow IT in Health Care: A Narrative Review of the Literature.” This review highlights the specificities of Shadow IT in the healthcare context and its impact on IT adoption and information security

Billi, A., & Bernardo, A. (2025). The Effects of Digital Transformation, IT Innovation, and Sustainability Strategies on Firms’ Performances: An Empirical Study. Sustainability, 17(3), 823. https://doi.org/10.3390/su17030823

Capital One. (2019). Capital One Announces Data Security Incident. Retrieved from https://www.capitalone.com/facts2019/

Caroline C Hartmann, Jimmy Carmenate; Academic Research on the Role of Corporate Governance and IT Expertise in Addressing Cybersecurity Breaches: Implications for Practice, Policy, and Research. Current Issues in Auditing 1 September 2021; 15 (2): A9–A23. https://doi.org/10.2308/CIIA-2020-034

Cisco. (2022). What Is Mobile Device Security? Cisco. Retrieved from https://www.cisco.com/c/en/us/solutions/small-business/resource-center/security/mobile-device-security.html .

Flexera. (2022). State of the Cloud Report. Retrieved from https://www.flexera.com/blog/cloud/cloud-computing-trends-2022-state-of-the-cloud-report/

Folorunso, Adebola & Wada, Ifeoluwa & Samuel, Bunmi & Mohammed, Viqaruddin. (2024). Security compliance and its implication for cybersecurity. World Journal of Advanced Research and Reviews. 24. 2105-2121. 10.30574/wjarr.2024.24.1.3170.

Györy, A., Cleven, A., Uebernickel, F., & Brenner, W. (2012). Exploring the shadows: IT governance approaches to user-driven innovation. ECIS 2012 Proceedings. Retrieved from https://aisel.aisnet.org/ecis2012/180

Huber, M., Zimmermann, S., & Rentrop, C. (2018). Toward a Conceptual Decision Framework for Shadow IT Integration. International Journal of Information Systems and Project Management, 6(2), 43-58. https://www.mdpi.com/2079-8954/6/4/42

IBM (2024). Cost of a Data Breach Report 2024. Retrieved from www.ibm.com/reports/data-breach

International Organization for Standardization. (2021). ISO/IEC 27001: Information Security Management Systems. Geneva: ISO. https://www.iso.org/standard/27001

ISACA. (2019). COBIT 2019 Framework: Governance and Management Objectives. ISACA Publications. https://www.isaca.org/resources/cobit#1

Klotz, S., Westner, M., Kopper, A., & Strahringer, S. (2019). “Causing factors, outcomes, and governance of Shadow IT and business-managed IT: a systematic literature review.” This paper discusses the enablers, motivators, and governance approaches for Shadow IT and business-managed IT1.

Kopper, A., Westner, M., & Strahringer, S. (2019). Causing factors, outcomes, and governance of Shadow IT and business-managed IT: a systematic literature review. International Journal of Information Systems and Project Management, 7(1), 15-43. https://jitm.ubalt.edu/XXX-4/article1.pdf

Kopper, A., Westner, M., & Strahringer, S. (2020). From Shadow IT to Business-managed IT: A qualitative comparative analysis to determine configurations for successful management of IT by business entities. Information Systems and e-Business Management, 18(2), 293–326. https://link.springer.com/article/10.1007/s10257-020-00472-6

Lankhorst, M. (2017). Enterprise Architecture at Work: Modelling, Communication, and Analysis. Springer. https://link.springer.com/book/10.1007/978-3-662-53933-0

Luo, Z., Abbasi, B. N., Yang, C., & Li, J. (2024). A systematic review of evaluation and program planning strategies for technology integration in education: Insights for evidence-based practice. Education and Information Technologies, 29, 21133–21167. https://doi.org/10.1007/s10639-024-12707-x

McBride, R., Packard, M. D., & Worthington, W. J. (2023). Rogue Entrepreneurship. Journal of Entrepreneurship Theory and Practice. Retrieved from https://journals.sagepub.com/doi/10.1177/10422587221135763

McKean, R., Magee, J., & de Souza, R. (2023). GDPR fines and data breach survey. DLA Piper. Retrieved from https://www.dlapiper.com/en/us/insights/publications/2023/01/gdpr-fines-and-data-breach-survey/

McKinsey & Company. (2024). Digitalizing operations at Airbus: An interview with Delphine Bazaud. Retrieved from https://www.mckinsey.com/industries/aerospace-and-defense/our-insights/digitalizing-operations-at-airbus-an-interview-with-delphine-bazaud

Microsoft. (2022). BYOD Security Best Practices. Microsoft. Retrieved from https://www.microsoft.com/en-us/microsoft-365/business-insights-ideas/resources/what-is-byopc-and-byod

NASA Advanced Supercomputing Division. (2023). Visualization and Data Analysis Services. Retrieved from https://www.nas.nasa.gov/hecc/services/visualization_service.html

Olafuyi, B. A. (2023). Artificial Intelligence in Cybersecurity: Enhancing Threat Detection and Mitigation. International Journal of Scientific and Research Publications, 13(12), 194-210. Retrieved from https://www.ijsrp.org/research-paper-1223/ijsrp-p14419.pdf

Raković, Lazar & Sakal, Marton & Matkovic, Predrag & Maric, Mirjana. (2020). Shadow IT – Systematic Literature Review. Information Technology And Control. 49. 144-160. 10.5755/j01.itc.49.1.23801.

Rigby, D. K., Sutherland, J., & Takeuchi, H. (2018). Embracing Agile. Harvard Business Review, 96(3), 40-50. https://hbr.org/2016/05/embracing-agile

Seth, D., Najana, M., & Ranjan, P. (2024). Compliance and regulatory challenges in cloud computing: A sector-wise analysis. International Journal of Global Information Systems, 10(2), 45-67. https://doi.org/10.21428/e90189c8.68b5dea5

Siemens AG. (2012). Delegating Authority: The Compliance Ambassador Program at Siemens Industry, Inc. Siemens AG. Retrieved from https://studylib.net/doc/18616151/delegating-authority-the-compliance-ambassador-program-at

Silic, M., & Back, A. (2014). Shadow IT – A view from behind the curtain. Computers & Security, 45, 274-283. Retrieved from https://www.researchgate.net/publication/263284725_Shadow_IT_-_A_view_from_behind_the_curtain

Tikkinen-Piri, C., Rohunen, A., & Markkula, J. (2018). GDPR: Implementation, Implications and the Impact on Data-Driven Business. Business Information Systems Engineering, 60(3), 257-272. https://doi.org/10.1016/j.clsr.2017.05.015

Trelica. (2023). Shadow SaaS: Why You Can’t Ignore Shadow IT risks. Retrieved from https://www.trelica.com/blog/the-security-risks-of-shadow-saas-in-your-company

Tulsi, K., Dutta, A., Singh, N., & Jain, D. (2024). Transforming Financial Services: The Impact of AI on JP Morgan Chase’s Operational Efficiency and Decision-Making. International Journal of Scientific Research in Engineering and Technology. https://ijsret.com/wp-content/uploads/2024/01/IJSRET_V10_issue1_138.pdf

Unilever. (2022). Safeguarding data.

Von Solms, R., & Van Niekerk, J. (2013). From Information Security to Cyber Security. Computers & Security, 38, 97-102. https://profsandhu.com/cs6393_s19/Solms-Niekerk-2013.pdf

Westerman, G., Bonnet, D., & McAfee, A. (2019). Leading Digital: Turning Technology into Business Transformation. Harvard Business Review Press. https://books.google.com.ng/books/about/Leading_Digital.html?id=Fh9eBAAAQBAJ&redir_esc=y

Zimmermann, S., Rentrop, C., & Felden, C. (2014). Managing Shadow IT Instances – A Method to Control Autonomous IT Solutions in the Business Departments. Proceedings of the 22nd European Conference on Information Systems (ECIS), Tel Aviv, Israel. https://aisel.aisnet.org/amcis2014/StrategicUse/GeneralPresentations/12/

Zimmermann, S., Rentrop, C., & Felden, C. (2020). From Shadow IT to Business-managed IT: A Qualitative Comparative Analysis. Information Systems Frontiers, 22, 1227-1245.