Article's arguments:
User want to use the latest application, wireless technologies
The problem with shadow IT poses security risks
Fighting Shadow IT could be counterproductive. => Agencies that institute prohibitive policies will face substantial pushback. (IT controls)
Find the right balance between individual productivity and the needs of the IT department
=> Just highlighting the stuff you cannot do is a bad way
=> create "white lists" of approved applications and popular web destinations
Comments:
Define Shadow IT: software, hardware, services
Approach: IT controls
How: create checklists for what can do, what cannot
=> cannot create the huge checklist like that
Bibliography:
Noyes, Andrew. "Management Matters: Shadow IT."Government Executive 10 (2007).
No comments:
Post a Comment