1 |
Sherman, R., "Shedding Light on Data Shadow Systems", Information Management Online, 2004, http://www.information-management.com/news/1002617-1.html(Checked on July 25, 2016)
|
2 |
Shumarova, E. and P.A. Swatman, "Informal e-Collaboration Channels : Shedding light on "Shadow CIT", eCollaboration : Overcoming Boundaries through Multi-Channel Interaction, 21st Bled eConference, 2008, 371-394.
|
3 |
TechTarget, "NASA's shadow IT Issues with Cloud Computing all too Common", 2013.
|
4 |
TechTarget, "Bring Your Own Apps(BYOA)", 2014.
|
5 |
Yun, H., W.J. Kettinger, and C.C. Lee, "A New Open Door : The Smartphone's Impact on Work-to-Life Conflict, Stress, and Resistance", International Journal of Electronic Commerce, Vol.16, No.4, 2012, 121-152.
DOI
|
6 |
Anderson, N., "Cisco Bring Your Own Device-Device Freedom Without", San Jose : Cisco Systems, Inc, 2013.
|
7 |
Bayan, R., "Shed Light on Shadow IT Groups", Techrepublic.com, 2004. http://www.techrepublic.com article/hed-light-on-shadow-it-groups/5247674(Checked on July 25, 2016).
|
8 |
Computer Weekly, "Managing Shadow IT", September, 2012.
|
9 |
Brodin, M., "BYOD VS. CYOD-What is the Difference?", 9th IADIS International Conference Information System, 2016.
|
10 |
Cio Korea, "10 Security Forecast Released by Gartner", 2016, http://www.ciokorea.com/news/30244(Checked on July 25, 2016).
|
11 |
Crump, G., "Shadow IT : Data Protection and Cloud Security", Gigaom Research, 2014, https://gigaom.com/report/shadow-it-data-protection-and-cloud-security(Checked on July 25, 2016).
|
12 |
Cui, X., B.N. Mills, R.G. Melhem, and T. Znati, "Shadows on the Cloud : An Energy-aware, Profit Maximizing Resilience Framework for Cloud Computing", CLOSER, 2014.
|
13 |
CXO Unplugged, "Shadow IT-Should CIOs take Umbrage?", Retrieved, 2012.
|
14 |
Dhingra, M., "Legal Issues in Secure Implementation of Bring Your Own Device(BYOD)", International Conference on Information Security & Privacy, 2015.
|
15 |
Digital Times, "CYOD' focus", September, 16, 2014.
|
16 |
Dols, T., "Influencing Factors Towards Non-compliance in Information Systems", UAS Utrecht, 2009.
|
17 |
Haag, S., "Appearance of Dark Clouds?-An Empirical Analysis of Users' Shadow Sourcing of Cloud Services", 2015.
|
18 |
Hasegawa, T. and M. Nakano, "From ISMS to ITSMS", 2012.
|
19 |
ITR, "Mobile Security-Stand up to Hidden Use Shadow IT", ITR White Paper, 2012, https://www.itr.co.jp/library/whitepaper/ITR_WP_C12090043-pdf.html(Checked on July 25, 2016).
|
20 |
JIPDEC, "CSMS(Cyber Security Management System-Overview of the Conformity Assessment System)", 2014a.
|
21 |
JIPDEC, "IT Service Management System-Overview of the Conformity Assessment System", 2014b.
|
22 |
Kushwaha, P., "Amalgamation of the Information Security Management System with Business-Paradigm Shif", International Journal of Computer Science and Information Security(IJCSIS), Vol.14, No.1, 2016.
|
23 |
JIPDEC, "Prescription of as a Service era-IT Service Management System(Second edition)", 2014c.
|
24 |
Kim, H., "A Case Study on Realization of ITSM Performance Applying the Change Management Framework of ITSM", Journal of Information Technology Services, Vol.10, No. 3, 2011, 251-264.
|
25 |
Kobayashi, K., "Utilized for Business-consumer IT", Nomura Research Institute IT Solutions Frontier, Vol.12, 2011, 78-81.
|
26 |
McAfee, "The Hidden Truth Behind Shadow IT-Six Trends Impacting Your Security Posture", Stratecast Frost & Sullivan, 2013.
|
27 |
Protiviti, "Making Shadow IT Work for You : What Financial Companies Can Do to Bring Grassroots IT Solutions Into the Fold", 2014.
|
28 |
Raden, N., "Shedding Light on Shadow IT : Is Excel Running Your Business?", DSSResources. com, 2005.
|
29 |
Rentrop, C., O. Laak, and M. Mevius, "Schatten-IT : Ein Thema Fur Die Interne Revision", Revisionspraxis-Journal fur Revisoren, Wirtschaftsprufer, IT-Sicherheits-und Datenschutzbeauftragte, 2011, 68-76.
|
30 |
Rentrop, C. and S. Zimmermann, "Shadow IT : Management and Control of Unofficial IT", ICDS 2012 : The Sixth International Conference on Digital Society, 2012a, 98-102.
|
31 |
Rentrop, C. and S. Zimmermann, "Shadow IT Evaluation Model", Proceedings of the Federated Conference on Computer Science and Information Systems, 2012b, 1023-1027.
|
32 |
Schaffner, M., "IT Needs to Become More Like 'Shadow IT", 2007. http://mikeschaffner.typepad.com/michael_schaffner/2007/01/we_need_more_sh.html(Checked on July 25, 2016).
|