Different from EUC (End user computing) - which is initiated and supported by IT department.
Young employees with a strong bond to the usage of IT
Increasing focus on compliance and risk management
=> integrated methodology to handle shadow IT
=> IT asset portfolio (map the technical quality and the business value of IS) could be used as a starting point. I set of criterias are given:
- A. Relevant
- B. Quality
- C. Size
- Initiative potential
- Parallelism
=> the criterias must be discussed between IT and Business
=> Assess the risk and opportunities of shadow IT have been regards
=> the evaluation model criterias can be develop further into "User-Driven IT"
Comments:
Define Shadow IT: software, hardware, services, processes organizational units
Approach: user-driven
How: provide a evaluation criterias, meeting between IT and Business for discussion
=> good article with ideas of discussion between IT and Business
Bibliography:
Rentrop, Christopher, and Stephan Zimmermann. "Shadow IT evaluation model." Computer Science and Information Systems (FedCSIS), 2012 Federated Conference on. IEEE, 2012.
No comments:
Post a Comment