References
- Anderson, N., "Cisco Bring Your Own Device-Device Freedom Without", San Jose : Cisco Systems, Inc, 2013.
- Bayan, R., "Shed Light on Shadow IT Groups", Techrepublic.com, 2004. http://www.techrepublic.com article/hed-light-on-shadow-it-groups/5247674(Checked on July 25, 2016).
- Brodin, M., "BYOD VS. CYOD-What is the Difference?", 9th IADIS International Conference Information System, 2016.
- Cio Korea, "10 Security Forecast Released by Gartner", 2016, http://www.ciokorea.com/news/30244(Checked on July 25, 2016).
- Computer Weekly, "Managing Shadow IT", September, 2012.
- Crump, G., "Shadow IT : Data Protection and Cloud Security", Gigaom Research, 2014, https://gigaom.com/report/shadow-it-data-protection-and-cloud-security(Checked on July 25, 2016).
- Cui, X., B.N. Mills, R.G. Melhem, and T. Znati, "Shadows on the Cloud : An Energy-aware, Profit Maximizing Resilience Framework for Cloud Computing", CLOSER, 2014.
- CXO Unplugged, "Shadow IT-Should CIOs take Umbrage?", Retrieved, 2012.
- Dhingra, M., "Legal Issues in Secure Implementation of Bring Your Own Device(BYOD)", International Conference on Information Security & Privacy, 2015.
- Digital Times, "CYOD' focus", September, 16, 2014.
- Dols, T., "Influencing Factors Towards Non-compliance in Information Systems", UAS Utrecht, 2009.
- Haag, S., "Appearance of Dark Clouds?-An Empirical Analysis of Users' Shadow Sourcing of Cloud Services", 2015.
- Hasegawa, T. and M. Nakano, "From ISMS to ITSMS", 2012.
- ITR, "Mobile Security-Stand up to Hidden Use Shadow IT", ITR White Paper, 2012, https://www.itr.co.jp/library/whitepaper/ITR_WP_C12090043-pdf.html(Checked on July 25, 2016).
- JIPDEC, "CSMS(Cyber Security Management System-Overview of the Conformity Assessment System)", 2014a.
- JIPDEC, "IT Service Management System-Overview of the Conformity Assessment System", 2014b.
- JIPDEC, "Prescription of as a Service era-IT Service Management System(Second edition)", 2014c.
- Kim, H., "A Case Study on Realization of ITSM Performance Applying the Change Management Framework of ITSM", Journal of Information Technology Services, Vol.10, No. 3, 2011, 251-264.
- Kobayashi, K., "Utilized for Business-consumer IT", Nomura Research Institute IT Solutions Frontier, Vol.12, 2011, 78-81.
- Kushwaha, P., "Amalgamation of the Information Security Management System with Business-Paradigm Shif", International Journal of Computer Science and Information Security(IJCSIS), Vol.14, No.1, 2016.
- McAfee, "The Hidden Truth Behind Shadow IT-Six Trends Impacting Your Security Posture", Stratecast Frost & Sullivan, 2013.
- Protiviti, "Making Shadow IT Work for You : What Financial Companies Can Do to Bring Grassroots IT Solutions Into the Fold", 2014.
- Raden, N., "Shedding Light on Shadow IT : Is Excel Running Your Business?", DSSResources. com, 2005.
- Rentrop, C., O. Laak, and M. Mevius, "Schatten-IT : Ein Thema Fur Die Interne Revision", Revisionspraxis-Journal fur Revisoren, Wirtschaftsprufer, IT-Sicherheits-und Datenschutzbeauftragte, 2011, 68-76.
- Rentrop, C. and S. Zimmermann, "Shadow IT : Management and Control of Unofficial IT", ICDS 2012 : The Sixth International Conference on Digital Society, 2012a, 98-102.
- Rentrop, C. and S. Zimmermann, "Shadow IT Evaluation Model", Proceedings of the Federated Conference on Computer Science and Information Systems, 2012b, 1023-1027.
- Schaffner, M., "IT Needs to Become More Like 'Shadow IT", 2007. http://mikeschaffner.typepad.com/michael_schaffner/2007/01/we_need_more_sh.html(Checked on July 25, 2016).
- Sherman, R., "Shedding Light on Data Shadow Systems", Information Management Online, 2004, http://www.information-management.com/news/1002617-1.html(Checked on July 25, 2016)
- Shumarova, E. and P.A. Swatman, "Informal e-Collaboration Channels : Shedding light on "Shadow CIT", eCollaboration : Overcoming Boundaries through Multi-Channel Interaction, 21st Bled eConference, 2008, 371-394.
- TechTarget, "NASA's shadow IT Issues with Cloud Computing all too Common", 2013.
- TechTarget, "Bring Your Own Apps(BYOA)", 2014.
- Yun, H., W.J. Kettinger, and C.C. Lee, "A New Open Door : The Smartphone's Impact on Work-to-Life Conflict, Stress, and Resistance", International Journal of Electronic Commerce, Vol.16, No.4, 2012, 121-152. https://doi.org/10.2753/JEC1086-4415160405