A Benefit Dependency Network for Shadow Information Technology Adoption, Based on Practitioners’ Viewpoints
Abstract
:1. Introduction
2. Related Work
2.1. Why Is SIT So Appealing?
2.2. The Benefit Dependency Network Dilemma
- Investment objectives—specific to the project and focused on the outcome, i.e., on what the project will achieve if successful.
- Business benefits—advantages that are incurred as a result of the project. When benefits are delivered, they will lead to organizations achieving the investment objectives.
- Business changes—permanent changes to practices, processes and relationships within the organization, which are required in order to achieve the benefits.
- Enabling changes—adjustments or changes that need to be implemented for business changes to take place.
- IT enablers—IT tools that must be implemented, as well as IT considerations to be evaluated before introducing new technology.
2.3. Bring Your Own Device (BYOD)
3. Research Methodology
4. Design and Development
4.1. First Design Science Iteration
- Current: SIT can beneficially be included to obtain a better global image of inventory and processes.
- Change: overlooked SIT systems can have a serious impact on the success and outcome of changes, existing SIT systems can be converted or included in official EA and users can respond to poorly aligned EA by making SIT systems.
- Future: several studies suggest that the successful organizations of the future will be the ones that will create opportunities for SIT systems and reduce central control over IT.
4.2. Second Iteration
4.3. Third Iteration
4.4. Fourth Iteration
4.5. Fifth Iteration
4.6. Sixth Iteration
4.7. Seventh Iteration
4.8. Eighth Iteration
4.9. Design Iteration
4.10. Tenth Iteration
4.11. Eleventh Iteration
4.12. Twelfth Iteration
4.13. Thirteenth Iteration
4.14. Fourteenth Iteration
4.15. Data Saturation
4.16. Findings—Final Artifact
5. Discussion
6. Conclusions
Limitations and Future Research
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
- (a)
- Shadow information technology (SIT) describes the autonomous deployment, procurement or management of information technology. It represents all hardware, software, or any other technological solution used by employees inside of the organizational ecosystem that did not receive any formal IT department approval and is not prescribed by the formal policy.
- (b)
- Benefit dependency network (BDN) is a core tool in constructing a benefits realization plan, it provides a framework that links the investment objectives and the necessary benefits with the business changes needed to provide said benefits and IT functionality to push and allow for these changes to be made.
- (c)
- When discussing BDN, there are five concepts that cannot be dismissed:
- Investment objectives—specific to the project and focuses on the outcome of the project, on what the project will achieve if successful
- Business benefits—advantages that are incurred as a result of the project. When benefits are delivered, they will lead to achieve the investment objectives
- Business changes—permanent changes to practices, processes and relationships within the organization, required in order to achieve benefits
- Enabling changes—adjustments or changes that need to be implemented for business changes to take place
- IT enablers—IT tools that must be implemented as well as IT considerations to be evaluated before introducing new technology.
- Based on the explanation above, would you remove any of the outputs in Figure 1?
- What outputs would you include on the table and how would they interconnect between each other?
References
- Haag, S.; Eckhardt, A. Shadow IT. Bus. Inf. Syst. Eng. 2017, 59, 469–473. [Google Scholar] [CrossRef]
- Ferreira, R.; Pereira, R.; Bianchi, I.S.; da Silva, M.M. Decision Factors for Remote Work Adoption: Advantages, Disadvantages, Driving Forces and Challenges. J. Open Innov. Technol. Mark. Complex. 2021, 7, 70. [Google Scholar] [CrossRef]
- Sengik, A.R.; Lunardi, G.L.; Scalabrin Bianchi, S.; Wiedenhöft, G.C. Using Design Science Research to Propose an IT Governance Model for Higher Education Institutions. Educ. Inf. Technol. 2022. [Google Scholar] [CrossRef] [PubMed]
- Györy, A.; Cleven, A.; Uebernickel, F.; Brenner, W. Exploring the Shadows: IT Governance Approaches to User-Driven Innovation. In Proceedings of the 20th European Conference on Information Systems, Barcelona, Spain, 11–13 June 2012. [Google Scholar]
- Silic, M.; Barlow, J.B.; Back, A. A New Perspective on Neutralization and Deterrence: Predicting Shadow IT Usage. Inf. Manag. 2017, 54, 1023–1037. [Google Scholar] [CrossRef] [Green Version]
- de Vargas Pinto, A.; Beerepoot, I.; Maçada, A.C.G. Encourage Autonomy to Increase Individual Work Performance: The Impact of Job Characteristics on Workaround Behavior and Shadow IT Usage. Inf. Technol. Manag. 2022. [Google Scholar] [CrossRef]
- Klotz, S.; Kopper, A.; Westner, M.; Strahringer, S. Causing Factors, Outcomes, and Governance of Shadow IT and Business-Managed IT: A Systematic Literature Review. Int. J. Inf. Syst. Proj. Manag. 2019, 7, 15–43. [Google Scholar] [CrossRef]
- Raković, L. Shadow IT—Systematic Literature Review. ITC 2020, 49, 144–160. [Google Scholar] [CrossRef] [Green Version]
- Sillic, M. Critical Impact of Organizational and Individual Inertia in Explaining Non-Compliant Security Behavior in the Shadow IT Context. Comput. Secur. 2019, 80, 108–119. [Google Scholar] [CrossRef]
- Kopper, A.; Westner, M.; Strahringer, S. From Shadow IT to Business-Managed IT: A Qualitative Comparative Analysis to Determine Configurations for Successful Management of IT by Business Entities. Inf. Syst. E-Bus. Manag. 2020, 18, 209–257. [Google Scholar] [CrossRef]
- Klotz, S. Shadow IT and Business-Managed IT: Where Is the Theory? In Proceedings of the 2019 IEEE 21st Conference on Business Informatics (CBI), Moscow, Russia, 15–17 July 2019; pp. 286–295. [Google Scholar]
- Mallmann, G.L.; Maçada, A.C.G. The Mediating Role of Social Presence in the Relationship between Shadow IT Usage and Individual Performance: A Social Presence Theory Perspective. Behav. Inf. Technol. 2021, 40, 427–441. [Google Scholar] [CrossRef]
- Richter, S.; Waizenegger, L.; Steinhueser, M.; Richter, A. Knowledge Management in the Dark: The Role of Shadow IT in Practices in Manufacturing. Int. J. Knowl. Manag. 2019, 15, 1–19. [Google Scholar] [CrossRef]
- Magunduni, J.; Chigona, W. Revisiting Shadow IT Research: What We Already Know, What We Still Need to Know, and How Do We Get There? In Proceedings of the 2018 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa, 8–9 March 2018; pp. 1–6. [Google Scholar]
- Furstenau, D.; Rothe, H.; Sandner, M. Shadow Systems, Risk, and Shifting Power Relations in Organizations. CAIS 2017, 41, 43–61. [Google Scholar] [CrossRef]
- Huber, M.; Zimmermann, S.; Rentrop, C.; Felden, C. The Influence of Shadow IT Systems on Enterprise Architecture Management Concerns. In Information Systems; Themistocleous, M., Morabito, V., Eds.; Lecture Notes in Business Information Processing; Springer International Publishing: Cham, Switzerland, 2017; Volume 299, pp. 461–477. [Google Scholar] [CrossRef]
- Mallmann, G.L.; Maçada, A.C.G.; Oliveira, M. Can Shadow IT Facilitate Knowledge Sharing in Organizations? An Ex-Ploratory Study. In Proceedings of the 17th European Conference on Knowledge Management-ECKM 2016, Ulster, Belfast, Ireland, 1–2 September 2016; pp. 550–558. [Google Scholar]
- Silic, M. Shadow It Steroids for Innovation. SSRN J. 2015. [Google Scholar] [CrossRef] [Green Version]
- Silic, M.; Back, A. Shadow IT—A View from behind the Curtain. Comput. Secur. 2014, 45, 274–283. [Google Scholar] [CrossRef]
- Behrens, S. Shadow Systems: The Good, the Bad and the Ugly. Commun. ACM 2009, 52, 124–129. [Google Scholar] [CrossRef]
- Huber, M.; Zimmermann, S.; Rentrop, C.; Felden, C. Conceptualizing Shadow IT Integration Drawbacks from a Systemic Viewpoint. Systems 2018, 6, 42. [Google Scholar] [CrossRef] [Green Version]
- Mallmann, G.L.; Maçada, A.C.G.; Oliveira, M. The Influence of Shadow IT Usage on Knowledge Sharing: An Exploratory Study with IT Users. Bus. Inf. Rev. 2018, 35, 17–28. [Google Scholar] [CrossRef]
- Walterbusch, M.; Fietz, A.; Teuteberg, F. Missing Cloud Security Awareness: Investigating Risk Exposure in Shadow IT. JEIM 2017, 30, 644–665. [Google Scholar] [CrossRef]
- Bianchi, I.; Dinis Sousa, R.; Pereira, R. Information Technology Governance for Higher Education Institutions: A Multi-Country Study. Informatics 2021, 8, 26. [Google Scholar] [CrossRef]
- Branco, T.; Bianchi, I.; de Sá-Soares, F. Cloud Computing Adoption in the Government Sector in Brazil: An Exploratory Study with Recommendations from IT Managers. In Proceedings of the Green, Pervasive, and Cloud Computing; Miani, R., Camargos, L., Zarpelão, B., Rosas, E., Pasquini, R., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 162–175. [Google Scholar]
- Peppard, J.; Ward, J.; Daniel, E. Managing the Realization of Business Benefits from IT Investments. MIS Q. Exec. 2007, 6, 1–11. [Google Scholar]
- Peppard, J.; Ward, J. Unlocking Sustained Business Value from It Investments. Calif. Manag. Rev. 2005, 48, 52–70. [Google Scholar] [CrossRef] [Green Version]
- Haag, S.; Eckhardt, A. Justifying Shadow It Usage. In Proceedings of the Pacific Asia Conference on Information Systems, PACIS 2015, Singapore, 5–9 July 2015. [Google Scholar]
- Shaw, P. Intervening in the Shadow Systems of Organizations: Consulting from a Complexity Perspective. J. Organ. Change Manag. 1997, 10, 235–250. [Google Scholar] [CrossRef]
- Eckartz, S.; Daneva, M.; Wieringa, R.; van Hillegersberg, J. Cross-Organizational ERP Management: How to Create a Successful Business Case? In Proceedings of the 2009 ACM symposium on Applied Computing-SAC ’09, Honolulu, HI, USA, 9–12 March 2009; p. 1599. [Google Scholar]
- Rentrop, C.; Zimmermann, S. Shadow IT Evaluation Model. In Proceedings of the 2012 Federated Conference on Computer Science and Information Systems, FedCSIS 2012, Szczecin, Poland, 9–12 September 2012; pp. 1023–1027. [Google Scholar]
- Tambo, T.; Baekgaard, L. Dilemmas in Enterprise Architecture Research and Practice from a Perspective of Feral Information Systems. In Proceedings of the 2013 17th IEEE International Enterprise Distributed Object Computing Conference Workshops, Vancouver, BC, Canada, 9–13 September 2013; pp. 289–295. [Google Scholar]
- Kretzer, M.; Maedche, A. Generativity of Business Intelligence Platforms: A Research Agenda Guided by Lessons from Shadow IT. In Proceedings of the MKWI 2014—Multikonferenz Wirtschaftsinformatik, Paderborn, Germany, 26–28 February 2014; pp. 207–220. [Google Scholar]
- Lund-Jensen, R.; Azaria, C.; Permien, F.H.; Sawari, J.; Bækgaard, L. Feral Information Systems, Shadow Systems, and Workarounds—A Drift in IS Terminology. Procedia Comput. Sci. 2016, 100, 1056–1063. [Google Scholar] [CrossRef] [Green Version]
- Steinhueser, M.; Waizenegger, L.; Vodanovich, S.; Richter, A. Knowledge Management without Management—Shadow It in Knowledge-Intensive Manufacturing Practices. In Proceedings of the European Conference on Information Systems (ECIS), Guimarães, Portugal, 5–10 June 2017; pp. 1647–1662. [Google Scholar]
- Mallmann, G.L.; Maçada, A.C.G.; Eckhardt, A. We Are Social: A Social Influence Perspective to Investigate Shadow IT Usage. In Proceedings of the Twenty-Sixth European Conference on Information Systems (ECIS2018), Portsmouth, UK, 23–28 June 2018. [Google Scholar]
- Haag, S.; Eckhardt, A.; Schwarz, A. The Acceptance of Justifications among Shadow IT Users and Nonusers—An Empirical Analysis. Inf. Manag. 2019, 56, 731–741. [Google Scholar] [CrossRef]
- Fürstenau, D.; Rothe, H.; Sandner, M. Leaving the Shadow: A Configurational Approach to Explain Post-Identification Outcomes of Shadow IT Systems. Bus. Inf. Syst. Eng. 2021, 63, 97–111. [Google Scholar] [CrossRef] [Green Version]
- Jarrahi, M.H.; Reynolds, R.; Eshraghi, A. Personal Knowledge Management and Enactment of Personal Knowledge Infrastructures as Shadow IT. ILS 2021, 122, 17–44. [Google Scholar] [CrossRef]
- Barreto, J.L.S.; Espinoza, R.A.B.; Dávila, G.A. Blockchain-Based System to Ensure the Integrity of Used Vehicle Purchase Transactions: Under Researchers’ Perspective. In Digital Technologies and Transformation in Business, Industry and Organizations; Pereira, R., Bianchi, I., Rocha, Á., Eds.; Springer International Publishing: Cham, Switzerland, 2022; pp. 121–141. ISBN 978-3-031-07626-8. [Google Scholar]
- Maritz, J.; Eybers, S.; Hattingh, M. Implementation Considerations for Big Data Analytics (BDA): A Benefit Dependency Network Approach. In Responsible Design, Implementation and Use of Information and Communication Technology; Hattingh, M., Matthee, M., Smuts, H., Pappas, I., Dwivedi, Y.K., Mäntymäki, M., Eds.; Lecture Notes in Computer Science; Springer International Publishing: Cham, Switzerland, 2020; Volume 12066, pp. 481–492. ISBN 978-3-030-44998-8. [Google Scholar]
- Ward, J.; Taylor, P.; Bond, P. Evaluation and Realisation of IS/IT Benefits: An Empirical Study of Current Practice. Eur. J. Inf. Syst. 1996, 4, 214–225. [Google Scholar] [CrossRef]
- Siddiqui, R. Bring Your Own Device (BYOD) in Higher Education: Opportunities and Challenges. Int. J. Emerg. Trends Technol. Comput. Sci. (IJETTCS) 2014, 3, 233–236. [Google Scholar]
- Barlette, Y.; Jaouen, A.; Baillette, P. Bring Your Own Device (BYOD) as Reversed IT Adoption: Insights into Managers’ Coping Strategies. Int. J. Inf. Manag. 2021, 56, 102212. [Google Scholar] [CrossRef]
- Junglas, I.; Goel, L.; Rehm, S.-V.; Ives, B. On the Benefits of Consumer IT in the Workplace—An IT Empowerment Perspective. Int. J. Inf. Manag. 2022, 64, 102478. [Google Scholar] [CrossRef]
- Hevner; March; Park; Ram Design Science in Information Systems Research. MIS Q. 2004, 28, 75. [CrossRef]
- Peffers, K.; Tuunanen, T.; Rothenberger, M.A.; Chatterjee, S. A Design Science Research Methodology for Information Systems Research. J. Manag. Inf. Syst. 2007, 24, 45–77. [Google Scholar] [CrossRef]
- Myers, M.D. Qualitative Research in Business and Management; SAGE: London, UK, 2013; ISBN 0-85702-973-8. [Google Scholar]
- Silic, M.; Silic, D.; Oblakovic, G. Shadow IT: Steroids for Innovation. CEUR Workshop Proc. 2016, 1612, 113–120. [Google Scholar] [CrossRef] [Green Version]
- Marshall, B.; Cardon, P.; Poddar, A.; Fontenot, R. Does Sample Size Matter in Qualitative Research?: A Review of Qualitative Interviews in Is Research. J. Comput. Inf. Syst. 2013, 54, 11–22. [Google Scholar] [CrossRef]
- Hennink, M.; Kaiser, B.N. Sample Sizes for Saturation in Qualitative Research: A Systematic Review of Empirical Tests. Soc. Sci. Med. 2022, 292, 114523. [Google Scholar] [CrossRef] [PubMed]
Shadow IT Impact | ||||||
---|---|---|---|---|---|---|
Author | Source | Positive | Negative | Neutral | Did Not Mention | BDN References |
(Shaw, 1997) | [29] | x | - | |||
(Behrens, 2009) | [20] | x | - | |||
(Eckartz, Daneva, Wieringa and van Hillegersberg, 2009) | [30] | x | - | |||
(Rentrop and Zimmermann, 2012) | [31] | x | - | |||
(Györy, Cleven, Uebernickel and Brenner, 2012) | [4] | x | - | |||
(Tambo and Baekgaard, 2013) | [32] | x | - | |||
(Silic and Back, 2014) | [19] | x | - | |||
(Kretzer and Maedche, 2014) | [33] | x | - | |||
(Haag and Eckhardt, 2015) | [28] | x | - | |||
(G. L. Mallmann, Maçada and Oliveira, 2016) | [17] | x | - | |||
(Lund-Jensen, Azaria, Permien, Sawari and Bækgaard, 2016) | [34] | x | - | |||
(Silic, 2015) | [18] | x | - | |||
(Furstenau, Rothe and Sandner, 2017) | [15] | x | - | |||
(Silic, Barlow, and Back, 2017) | [5] | x | - | |||
(Walterbusch, Fietz and Teuteberg, 2017) | [23] | x | - | |||
(Haag and Eckhardt, 2017) | [1] | x | - | |||
(Huber, Zimmermann, Rentrop and Felden, 2017) | [16] | x | - | |||
(Steinhueser, Waizenegger, Vodanovich and Richter, 2017) | [35] | x | - | |||
(Mallmann, Maçada and Eckhardt, 2018) | [36] | x | - | |||
(Mallmann, Maçada and Oliveira, 2018) | [22] | x | - | |||
(Huber, Zimmermann, Rentrop, and Felden, 2018) | [21] | x | - | |||
(Magunduni and Chigona, 2018) | [14] | x | - | |||
(Klotz, Kopper, Westner and Strahringer, 2019) | [7] | x | - | |||
(Haag, Eckhardt and Schwarz, 2019) | [11] | x | - | |||
(Haag, Eckhardt and Schwarz, 2019) | [37] | x | - | |||
(Mallmann and Maçada, 2021) | [12] | x | - | |||
(Richter, Waizenegger, Steinhueser and Richter, 2019) | [13] | x | - | |||
(Sillic, 2019) | [9] | x | - | |||
(Raković, 2020) | [8] | x | - | |||
(Fürstenau, Rothe and Sandner, 2021) | [38] | x | - | |||
(Jarrahi, Reynolds and Eshraghi, 2021) | [39] | x | - | |||
(Kopper, Westner and Strahringer, 2020) | [10] | x | - |
Concept | Definition |
---|---|
Investment objectives | Outcome of the project |
Business benefits | Advantages incurred as result of the project |
Business changes | Permanent organizational changes |
Enabling changes | Non-permanent organizational changes |
IT enablers | Technological requirements |
DSR Principles | Explanation |
---|---|
Abstraction | This research consisted of the creation of a BDN for SIT, in order to give a better understanding of the benefits organizations can derive from SIT adoption. |
Originality | The proposed artifact was not in the body of knowledge (BoK). |
Justification | The justification was based on the methods proposed for its evaluation. Qualitative interviews were conducted with the executive team members, managers and team leaders of the proposed artifact, and with this contribution it was possible to add value to the artifact. |
Benefit | A BDN that displayed possible benefits of SIT adoption and that allowed decision makers to obtain useful information—which would aid in the decision-making process and attempt to improve the performance of the organization—was developed. |
Guideline 1: Design as an Artifact |
---|
The artifact proposed by the research was a BDN for SIT adoption. |
Guideline 2: Problem Relevance |
Need to have a BDN to help analyze the benefits of SIT adoption for an organization. |
Guideline 3: Design Evaluation |
Semi-structured interviews, evaluated and suggested by interviewees who are in charge of decision making. |
Guideline 4: Research Contribution |
A new artifact, not present in the body of knowledge. |
Guideline 5: Research Rigor |
The main principles, practices and procedures of SLR and DSR were adopted to increase the credibility of the artifact and the consequent contribution of the research. |
Guideline 6: Design as a Search Process |
The result obtained was the departure from the unknown. A combination of good practices and relevant guidelines for prototype development. |
Guideline 7: Communication of Research |
The submission of the article to a journal/conference with high credibility and respect in the scientific community. |
Steps |
---|
Present the interviewee with SIT and BDN definitions. |
Present the interviewee with BDN concepts. |
What outputs should be expected from SIT adoption, based on the shown BDN concepts? |
Show suggested BDN table and ask interviewee what their opinion is on the relationships presented and on what changes they would suggest. |
DSR Interaction | Area | Role | Experience (years) |
---|---|---|---|
1 | IT | Project Manager (PM) | 20 |
2 | IT | Solutions Analyst | 15 |
3 | Client Success | Team Leader | 20 |
4 | IT | Head of Operations | 11 |
5 | IT | PM | 30 |
6 | IT | PM | 5 |
7 | Client Experience | Team Leader | 12 |
8 | IT | Head of Security | n/a |
9 | IT | Systems Administrator | 23 |
10 | IT | Executive Team | n/a |
11 | IT | Head of Services | n/a |
13 | IT | PM | n/a |
14 | IT | Strategy | n/a |
15 | IT | Data Analyst | n/a |
Author | Concept |
---|---|
[20] | Creativity surrounding the systems, the perceived innovativeness of the systems and the stability and order brought about by the system. |
[4] | Enhances the employees’ freedom and boosts their effectiveness. |
[19] | Very efficient and effective when used in place of the formal and standard systems already present. |
[49] | Important source of innovation. |
[17] | Boosts productivity and enables faster and better collaboration and communication. Instantaneous, agile, fast, dynamic, immediate, practical and speedy nature of the information. |
[5] | Efficient and effective. |
[16] | Supports users to increase performance and is innovative and flexible. |
[15] | Creativity, innovation and improved business performance. |
[14] | Beneficial to companies. |
[13] | Increased employee responsiveness and decision-making speed. |
[12] | Helps the circulation of information to be more instantaneous, agile, fast, dynamic and practical, all without the need of formal permission. |
[7] | Source of creativity and innovation. |
[10] | Increased agility, productivity or innovation. |
Relations | Updated or Added | |||
---|---|---|---|---|
Iteration | Contributed | Total | Fields | Relationships |
1 | 5 | 5 | 5 | 0 |
2 | 3 | 8 | 1 | 2 |
3 | 14 | 22 | 6 | 8 |
4 | 7 | 29 | 5 | 2 |
5 | 7 | 36 | 6 | 1 |
6 | 6 | 42 | 1 | 5 |
7 | 5 | 47 | 3 | 2 |
8 | 15 | 62 | 8 | 6 |
9 | 12 | 74 | 5 | 7 |
10 | 12 | 86 | 5 | 7 |
11 | 11 | 97 | 8 | 3 |
12 | 8 | 105 | 5 | 2 |
13 | 12 | 117 | 5 | 7 |
14 | 3 | 120 | 3 | 0 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Scalabrin Bianchi, I.; Vaquina, A.; Pereira, R.; Dinis Sousa, R.; Dávila, G.A. A Benefit Dependency Network for Shadow Information Technology Adoption, Based on Practitioners’ Viewpoints. Informatics 2022, 9, 95. https://doi.org/10.3390/informatics9040095
Scalabrin Bianchi I, Vaquina A, Pereira R, Dinis Sousa R, Dávila GA. A Benefit Dependency Network for Shadow Information Technology Adoption, Based on Practitioners’ Viewpoints. Informatics. 2022; 9(4):95. https://doi.org/10.3390/informatics9040095
Chicago/Turabian StyleScalabrin Bianchi, Isaias, António Vaquina, Ruben Pereira, Rui Dinis Sousa, and Guillermo Antonio Dávila. 2022. "A Benefit Dependency Network for Shadow Information Technology Adoption, Based on Practitioners’ Viewpoints" Informatics 9, no. 4: 95. https://doi.org/10.3390/informatics9040095
APA StyleScalabrin Bianchi, I., Vaquina, A., Pereira, R., Dinis Sousa, R., & Dávila, G. A. (2022). A Benefit Dependency Network for Shadow Information Technology Adoption, Based on Practitioners’ Viewpoints. Informatics, 9(4), 95. https://doi.org/10.3390/informatics9040095