Shahper Richter, Lena Waizenegger, M. Steinhueser, A. Richter
{"title":"Knowledge Management in the Dark: The Role of Shadow IT in Practices in Manufacturing","authors":"Shahper Richter, Lena Waizenegger, M. Steinhueser, A. Richter","doi":"10.4018/IJKM.2019040101","DOIUrl":null,"url":null,"abstract":"The voluntary use of private devices by employees without the formal approval of the IT department, commonly termed Shadow IT, is an increasingly widespread phenomenon. In this article, the authors study the role of private smartphones (and related applications like WhatsApp) in knowledge-intensive practices in the manufacturing domain. With an in-depth case study based on data gained from observations and interviews, the authors are able to empirically illustrate why workers use their private smartphones (contrary to company guidelines) and how they find significant gains of productivity by using the forbidden applications. This study gives rich insights into the rise of Shadow IT in a manufacturing context which takes place in a self-organised way without knowledge of the management.","PeriodicalId":196147,"journal":{"name":"Int. J. Knowl. Manag.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Knowl. Manag.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/IJKM.2019040101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
The voluntary use of private devices by employees without the formal approval of the IT department, commonly termed Shadow IT, is an increasingly widespread phenomenon. In this article, the authors study the role of private smartphones (and related applications like WhatsApp) in knowledge-intensive practices in the manufacturing domain. With an in-depth case study based on data gained from observations and interviews, the authors are able to empirically illustrate why workers use their private smartphones (contrary to company guidelines) and how they find significant gains of productivity by using the forbidden applications. This study gives rich insights into the rise of Shadow IT in a manufacturing context which takes place in a self-organised way without knowledge of the management.