Shahper Richter, Lena Waizenegger, M. Steinhueser, A. Richter
{"title":"黑暗中的知识管理:影子IT在制造业实践中的作用","authors":"Shahper Richter, Lena Waizenegger, M. Steinhueser, A. Richter","doi":"10.4018/IJKM.2019040101","DOIUrl":null,"url":null,"abstract":"The voluntary use of private devices by employees without the formal approval of the IT department, commonly termed Shadow IT, is an increasingly widespread phenomenon. In this article, the authors study the role of private smartphones (and related applications like WhatsApp) in knowledge-intensive practices in the manufacturing domain. With an in-depth case study based on data gained from observations and interviews, the authors are able to empirically illustrate why workers use their private smartphones (contrary to company guidelines) and how they find significant gains of productivity by using the forbidden applications. This study gives rich insights into the rise of Shadow IT in a manufacturing context which takes place in a self-organised way without knowledge of the management.","PeriodicalId":196147,"journal":{"name":"Int. J. Knowl. Manag.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Knowledge Management in the Dark: The Role of Shadow IT in Practices in Manufacturing\",\"authors\":\"Shahper Richter, Lena Waizenegger, M. Steinhueser, A. Richter\",\"doi\":\"10.4018/IJKM.2019040101\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The voluntary use of private devices by employees without the formal approval of the IT department, commonly termed Shadow IT, is an increasingly widespread phenomenon. In this article, the authors study the role of private smartphones (and related applications like WhatsApp) in knowledge-intensive practices in the manufacturing domain. With an in-depth case study based on data gained from observations and interviews, the authors are able to empirically illustrate why workers use their private smartphones (contrary to company guidelines) and how they find significant gains of productivity by using the forbidden applications. This study gives rich insights into the rise of Shadow IT in a manufacturing context which takes place in a self-organised way without knowledge of the management.\",\"PeriodicalId\":196147,\"journal\":{\"name\":\"Int. J. Knowl. Manag.\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Knowl. Manag.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/IJKM.2019040101\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Knowl. Manag.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/IJKM.2019040101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Knowledge Management in the Dark: The Role of Shadow IT in Practices in Manufacturing
The voluntary use of private devices by employees without the formal approval of the IT department, commonly termed Shadow IT, is an increasingly widespread phenomenon. In this article, the authors study the role of private smartphones (and related applications like WhatsApp) in knowledge-intensive practices in the manufacturing domain. With an in-depth case study based on data gained from observations and interviews, the authors are able to empirically illustrate why workers use their private smartphones (contrary to company guidelines) and how they find significant gains of productivity by using the forbidden applications. This study gives rich insights into the rise of Shadow IT in a manufacturing context which takes place in a self-organised way without knowledge of the management.