• No results found

Framtida forskning

TEMA 10. UNDERLÄTTAR DISTANSARBETE

6.1 Framtida forskning

Denna studie har undersökt relationen shadow IT med tyst kunskap. Även fast resultaten inte är generaliserbara för alla organisationer ger det en indikation på att en koppling mellan SIT och delningen av tyst kunskap finns. Då tidigare forskning fastslagit att SIT utgör en säkerhetsrisk i form av dataförlust och dataläckage skulle framtida forskning kunna undersöka hur man ska öka säkerhetsaspekter i tekniken för att säkerställa fortsatt delning av tyst kunskap. Framtida forskning skulle även kunna undersöka hur man skapar liknande förutsättningar och forum som vid SIT, i syfte att antingen fasa ut SIT eller komplettera SIT och öka förståelsen för kunskapsdelning. Framtida forskning skulle kunna ytterligare studera SECI-modellens tredje dimension kombination för att undersöka huruvida denna dimension verkligen sker utan något inslag av tyst kunskap.

Referenser

Akenine, D. (red.) (2014). ​Boken om IT-arkitektur​. (Första upplagan). Helsingborg: Hoi.

Allen, J. P. (2008). How web 2.0 communities solve the knowledge sharing problem. ​IEEE International Symposium on Technology and Society​. Fredericton, Canada.

Alvesson, M. & Sköldberg, K. (2017). ​Tolkning och reflektion: vetenskapsfilosofi och kvalitativ metod​.

(Tredje upplagan). Lund: Studentlitteratur.

Ambrosini, V., & Bowman, C. (2001). Tacit knowledge: Some suggestions for operationalization.

Journal of Management studies​, ​38​(6), 811-829.

Backman, J. (2016). ​Rapporter och uppsatser​. (Tredje upplagan). Lund: Studentlitteratur.

Behrens, S. (2009). Shadow systems: The good, the bad and the ugly. ​Communications of the ACM, 52​(2), 124-129.

Behrens, S., & Sedera, W. (2004). Why do shadow systems exist after an ERP implementation? Lessons from a case study. ​PACIS 2004 Proceedings​, 136.

Bryman, A. (2008). ​Social research methods​. (3. ed.) Oxford: Oxford University Press.

Brynjolfsson, E., & McAfee, A., (2015). ​Den andra maskinåldern: arbete, utveckling och välstånd i en tid av lysande teknologi.​ Borgå: Bokförlaget Daidalos AB.

Cabrera, A., & Cabrera, E. F. (2002). Knowledge-sharing dilemmas. ​Organization studies​, ​23​(5), 687-710.

Chua, C., Storey, V., & Chen, L., (2014). Central IT or Shadow IT? Factors shaping users’ decision to go rogue with IT. ​Thirty Fifth International Conference on Information Systems, ​Auckland, New Zealand. ​https://aisel.aisnet.org/icis2014/proceedings/ISGovernance/2/

Chugh, R. (2018). Tacit Knowledge Transfer in Australian Universities: Exploring the Barriers and Enablers. ​MATEC Web of Conferences, 210​(1), EDP Sciences.

Constant, D., Kiesler, S., & Sproull, L., (1994). What's mine is ours, or is it? A study of attitudes about information sharing. ​Information systems research​, ​5​(4), 400-421.

Davenport, T. H. (1998). Putting the enterprise into the enterprise system. ​Harvard business review​, 76​(4).

Davis, F., (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. ​MIS Quarterly,​ ​13​(3), 319-340.

Eriksson, J., (2014). ​Öppna myndigheten: information och ärenden i e-förvaltningen.​ Stockholm: SKL Kommentus AB.

Ferneley, E. H., & Sobreperez, P. (2006). Resist, comply or workaround? An examination of different facets of user engagement with information systems. ​European Journal of Information Systems​, ​15​(4), 345-356.

Fuchs, C., Hofkirchner, W., Schafranek, M., Raffl, C., Sandoval, M., & Bichler, R. (2010). Theoretical foundations of the web: cognition, communication, and co-operation. Towards an understanding of Web 1.0, 2.0, 3.0. ​Future internet​, ​2​(1), 41-59.

Fürstenau, D., & Rothe, H. (2014). Shadow it systems: Discerning the good and the evil. ​Proceedings of the 22nd European Conference on Information Systems,​ Tel Aviv, Israel.

Fürstenau, D., Sandner, M., Rothe, H., & Anapliotis, D. (2016). Shadow IT, risk, and shifting power relations in organizations. Paper presented at the ​AMCIS 2016: Surfing the IT Innovation Wave - 22nd Americas Conference on Information Systems.

Gozman, D., & Willcocks, L. (2015). Crocodiles in the regulatory swamp: Navigating the dangers of outsourcing, SaaS and shadow IT. Paper presented at the ​2015 International Conference on Information Systems: Exploring the Information Frontier, ICIS 2015.

Graneheim, U. H., & Lundman, B. (2004). Qualitative content analysis in nursing research: concepts, procedures and measures to achieve trustworthiness. ​Nurse education today, 24​(2), 105-112.

Györy, A., Cleven, A., Uebernickel, F., & Brenner, W. (2012). Exploring the shadows: IT governance approaches to user-driven innovation. Paper presented at​ the ECIS 2012 - Proceedings of the 20th European Conference on Information Systems.

Haag, S. (2015). Appearance of Dark Clouds? – An Empirical Analysis of Users’ Shadow Sourcing of Cloud Services, in ​Proceedings of the 12th International Conference on Wirtschaftsinformatik​,

Osnabrück.

Haag, S., & Eckhardt, A. (2017). Shadow IT. ​Business & Information Systems Engineering,​ ​59​(6), 469-473.

Haag, S., Eckhardt, A., & Bozoyan, C. (2015). Are shadow system users the better IS users?–insights of a lab experiment. ​Thirty Sixth International Conference on Information Systems,​ Fort Worth 2015.

Haag, S., Eckhardt, A., & Schwarz, A. (2019). The Acceptance of Justifications among Shadow IT Users and Nonusers – An Empirical Analysis. ​Information & Management, 56(5)​, 731-741.

Haldin-Herrgard, T. (2000). Difficulties in diffusion of tacit knowledge in organizations.​ Journal of Intellectual Capital, 1​(4), 357-365. doi:10.1108/14691930010359252

Harboe, T. (2013). ​Grundläggande metod: den samhällsvetenskapliga uppsatsen​. (Första upplagan) Malmö:

Gleerup.

Hendriks, P. (1999). Why share knowledge? The influence of ICT on the motivation for knowledge sharing. ​Knowledge and process management​, ​6​(2), 91-100.

Holste, J., & Fields, D. (2010). Trust and tacit knowledge sharing and use. ​Journal of Knowledge Management,​ ​14​(1), 128-140.

Howells, J. (1996). Tacit knowledge. ​Technology analysis & strategic management​, ​8​(2), 91-106.

Jarrahi, M. H., & Sawyer, S. (2013). Social technologies, informal knowledge practices, and the enterprise.​ Journal of Organizational Computing and Electronic Commerce, 23​(1-2), 110-137.

doi:10.1080/10919392.2013.748613

Jarvenpaa, S. L., & Staples, D. S. (2000). The use of collaborative electronic media for information sharing: an exploratory study of determinants. ​The Journal of Strategic Information Systems​, ​9​(2-3), 129-154.

Kietzmann, J., Hermkens, K., Mccarthy, I., & Silvestre, B., 2011. Social media? Get serious!

Understanding the functional building blocks of social media. ​Business Horizons​, 54(3), 241-251.

Kilpeläinen, T., & Tyrväinen, P. (2004). The degree of digitalization of the information overflow. In Proceedings of the Sixth Conference on Enterprise Information Systems (ICEIS),​ pp. 367-374.

Klotz, S., Westner, M., Strahringer, S., & Schieder, C. (2019). Transformed knowledge sharing through business-managed IT and shadow IT. Paper presented at the ​25th Americas Conference on

Information Systems, AMCIS 2019.

Kopper, A., & Westner, M. (2016). Deriving a framework for causes, consequences, and governance of Shadow IT from literature. ​MKWI 2016 Proceedings​, 1687-1698.

Krystlik, J., (2017). With GDPR, preparation is everything. ​Computer Fraud & Security​, 2017(6), pp.5–8.

Köffer, S., Ortbach, K. C., & Niehaves, B. (2014). Exploring the relationship between IT consumerization and job performance: a theoretical framework for future research.

Communications of the Association for Information Systems​, ​35​(1), 14.

Leonard, D., & Sensiper, S. (1998). The role of tacit knowledge in group innovation. ​California management review​, ​40​(3), 112-132.

Mallmann, G. L., Maçada, A. C. G., & Eckhardt, A. (2018). We are social: A social influence

perspective to investigate shadow iT usage. Paper presented at the ​26th European Conference on Information Systems: Beyond Digitization - Facets of Socio-Technical Change, ECIS 2018.

Mallmann, G., Maçada, A., & Oliveira, M. (2018). The influence of shadow IT usage on knowledge sharing: An exploratory study with IT users. ​Business Information Review, 35(1)​, 17-28.

Mishra, J., Allen, D., & Pearman, A., 2011. Information sharing during multi-agency major incidents.

Proceedings of the American Society for Information Science and Technology,​ ​48​(1), 1-10.

Mooradian, T., Renzl, B., & Matzler, K. (2006). Who trusts? Personality, trust and knowledge sharing.

Management learning​, ​37​(4), 523-540.

Myers, N., Starliper, M. W., Summers, S. L., & Wood, D. A. (2017). The impact of shadow IT systems on perceived information credibility and managerial decision making.​ Accounting Horizons, 31​(3), 105-123. ​https://doi.org/10.2308/acch-51737

Nonaka, I. (1994). A dynamic theory of organizational knowledge creation. ​Organization science​, ​5​(1), 14-37.

Nonaka, I., Toyama, R., & Konno, N. (2000). SECI, Ba and leadership: a unified model of dynamic knowledge creation. ​Long range planning​, ​33​(1), 5-34.

Panahi, S., Watson, J., & Partridge, H. (2016). Information encountering on social media and tacit knowledge sharing. ​Journal of Information Science, 42​(4), 539-550.

Panahi, S., Watson, J., & Partridge, H. (2013). Towards tacit knowledge sharing over social web tools.

Journal of Knowledge Management,​ ​17​(3), 379-397.

Paroutis, S., & Al Saleh, A. (2009). Determinants of knowledge sharing using Web 2.0 technologies.

Journal of Knowledge Management, 13​(4), 52-63.

Peariasamy, T. & Mansor, N. N. B. (2008). On-the-job knowledge sharing: how to train employees to share job knowledge. ​Jurnal Kemanusiaan bil., 12​, 88-101

Peralta, C.F. & Saldanha, M. F., (2014) Knowledge-centered culture and knowledge sharing: the moderator role of trust propensity. ​Journal of Knowledge Management 18​(3), 538–550.

Pickard, A.J. (2013). ​Research methods in information​. (2. ed.) London: Facet.

Pirani, N., & Meister, D. (2014). IT consumerization: A model of private IT use in organizations. In Proceedings of the 19th DIGIT Workshop, Auckland, New Zealand​.

Polanyi, M. (1966), ​The Tacit Dimension​. M. E. Sharp Inc: New York.

Raden, N. (2005). Shedding light on shadow IT: Is Excel running your business? ​Hired Brains Inc​., Santa Barbara.

Rentrop, C., & Zimmermann, S. (2012). Shadow IT. ​Management and Control of Unofficial IT. ICDS​, 98-102.

Riege, A. (2005). Three-dozen knowledge-sharing barriers managers must consider. ​Journal of knowledge management​. 9 (3), 18-35.

Silic, M. & Back, A. (2014). Shadow IT – A view from behind the curtain. ​Computers & Security​, 45(C), pp.274–283.

Silic, M., Barlow, J., & Back, A. (2017). A new perspective on neutralization and deterrence: Predicting shadow IT usage. ​Information & Management, 54​(8), 1023-1037.

Silic, M., Silic, D., & Oblakovic, G., (2016). Influence of Shadow IT on Innovation in Organizations.

Complex Systems Informatics and Modeling Quarterly,​ (8), pp.68–80.

Steinhueser, M., Waizenegger, L., Vodanovich, S., & Richter, A. (2017). Knowledge Management without Management-Shadow IT in Knowledge-Intensive Manufacturing Practices. ​Twenty-Fifth European Conference on Information Systems (ECIS)​, Guimarães, Portugal, 2017.

https://doi.org/10.5167/uzh-142373

Suppiah, V. & Sandhu, M.S. (2011). Organisational culture’s influence on tacit knowledge-sharing behaviour, ​Journal of Knowledge Management 15​(3), pp. 462-477.

Söderström, J. (2015). ​Jävla skitsystem!: hur en usel digital arbetsmiljö stressar oss på jobbet - och hur vi kan ta tillbaka kontrollen​. (Utök. och rev. utg.) Stockholm: Karneval.

Taylor, H. (2007). Tacit knowledge: Conceptualizations and operationalizations. ​International Journal of Knowledge Management (IJKM)​, ​3​(3), 60-73.

Tidd, J. & Bessant, J. R., (2013). ​Managing innovation: integrating technological, market and organizational change​. 5th edition. West Sussex: Wiley.

Walsham, G. (2001). Knowledge management:: The benefits and limitations of computer systems.

European Management Journal, 19​(6), 599-608. doi:10.1016/S0263-2373(01)00085-8

Walterbusch, M., Fietz, A., & Teuteberg, F. (2017). Missing cloud security awareness: Investigating risk exposure in shadow IT. ​Journal of Enterprise Information Management, 30​(4), 644-665.

Walters, R. (2013). Bringing IT out of the shadows. ​Network Security, 2013​(4), 5-11.

World Economic Forum, (2020). ​The Digital Infrastructure Imperative.

http://reports.weforum.org/delivering-digital-infrastructure/introduction-the-digital-infrastructur e-imperative/?doing_wp_cron=1539942524.1060171127319335937500​ (hämtad 2020-02-11)

Zimmermann, S., Rentrop, C., & Felden, C., (2014). Managing shadow IT instances - a method to control autonomous IT solutions in the business departments. ​Twentieth Americas Conference on Information Systems,​ Savannah, 2014.

https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1261&context=amcis2014

Bilaga 1: Intervjuguide

Om intervjutillfällena:

- Ca 30 minuter per intervjutillfälle.

- Enskild möten, besök (hemma hos informanten) eller telefon (distans).

INTERVJUOBJEKT #____

Typ av organisation:​ _______

Normal arbetsplats:​ _______

Inledning: ​Berätta vem jag är, vad jag gör, syftet med uppsatsen, vikten av tillgång till datainsamling och uppskattning för deltagande. Påminna om frivillighet och konfidentiell behandling av

intervjumaterial.

Inledande förklaring:​ Teknik i nedan frågor avser hårdvara, mjukvara och IT-tjänster.

- Vilken teknik (hårdvara, mjukvara, IT-tjänst) använder du i ditt arbetsliv som arbetsplatsen tillhandahåller?

- Vilken teknik tillhandahåller du själv organisationen?

- Använder du den tekniken även privat?

- Finns det någon annan teknik som dina kollegor tillhandahåller?

- Vilket är den mest utbredda kommunikationskanalen i organisationen?

- Vilken kommunikationskanal föredrar du när du kommunicerar i arbetslivet?

- Varför föredrar du den?

- Vad är skillnaderna mellan att kommunicera med exempelvis mail och chat?

- Får du snabbare återkoppling när du kommunicerar via ex chat?

- På vilket sätt har Covid-19 ändrat sättet du kommunicerar på?

- Har organisationen erbjudit ny teknik i och med Covid-19 när det gäller kommunikation?

- Upplever du att det finns viss teknik som minskar barriären för dig att dela kunskap med andra?

- om ja, vilken typ av kunskap?

- Upplever du att det finns viss teknik som minskar barriären för andra att dela kunskap med dig?

- om ja, vilken typ av kunskap?

Avslutning: ​Tacka för deltagande, påminna/försäkra om att uppgifterna behandlas konfidentiellt, önska en trevlig dag!

Bilaga 2: Meningsbärare, komprimerad

Related documents