<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1646-9895</journal-id>
<journal-title><![CDATA[RISTI - Revista Ibérica de Sistemas e Tecnologias de Informação]]></journal-title>
<abbrev-journal-title><![CDATA[RISTI]]></abbrev-journal-title>
<issn>1646-9895</issn>
<publisher>
<publisher-name><![CDATA[AISTI - Associação Ibérica de Sistemas e Tecnologias de Informação]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1646-98952023000300021</article-id>
<article-id pub-id-type="doi">10.17013/risti.21-36</article-id>
<title-group>
<article-title xml:lang="pt"><![CDATA[Shadow IT e TI gerenciada pelo negócio: uma análise das percepções sobre os riscos e benefícios em uma organização pública brasileira do setor financeiro]]></article-title>
<article-title xml:lang="en"><![CDATA[Shadow IT and business managed IT: an analysis of perceptions about risks and benefits in a Brazilian public organization of the financial sector]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Aragão]]></surname>
<given-names><![CDATA[Renato da Silva]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Streit]]></surname>
<given-names><![CDATA[Rosalvo Ermes]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidade Católica de Brasília  ]]></institution>
<addr-line><![CDATA[Brasília ]]></addr-line>
<country>Brazil</country>
</aff>
<pub-date pub-type="pub">
<day>30</day>
<month>09</month>
<year>2023</year>
</pub-date>
<pub-date pub-type="epub">
<day>30</day>
<month>09</month>
<year>2023</year>
</pub-date>
<numero>51</numero>
<fpage>21</fpage>
<lpage>36</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.pt/scielo.php?script=sci_arttext&amp;pid=S1646-98952023000300021&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.pt/scielo.php?script=sci_abstract&amp;pid=S1646-98952023000300021&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.pt/scielo.php?script=sci_pdf&amp;pid=S1646-98952023000300021&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo O advento da computação pessoal transformou a forma como trabalhamos, com a tecnologia da informação (TI) desempenhando um papel fundamental nos negócios. No entanto, o aumento no uso de recursos tecnológicos levou ao fenômeno conhecido como Shadow IT, onde os recursos são usados sem o conhecimento do departamento de TI, o que gera preocupações de segurança. Pesquisas recentes destacam benefícios e riscos associados a esse fenômeno. Esta pesquisa examinou as percepções dos gestores de uma organização pública brasileira do setor financeiro em relação às práticas que podem promover a TI gerenciada pelo negócio.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract The advent of personal computing has transformed the way we work, with information technology (IT) playing a pivotal role in businesses. However, the increase in the use of technological resources has led to the phenomenon known as Shadow IT, where resources are used without the knowledge of the IT department, raising security concerns. Recent research highlights the benefits and risks associated with this phenomenon. This study examined the perceptions of managers in a Brazilian public organization of the financial sector regarding practices that can promote business-managed IT.]]></p></abstract>
<kwd-group>
<kwd lng="pt"><![CDATA[Shadow IT]]></kwd>
<kwd lng="pt"><![CDATA[TI gerenciada pelo negócio]]></kwd>
<kwd lng="pt"><![CDATA[governança de TI]]></kwd>
<kwd lng="en"><![CDATA[Shadow IT]]></kwd>
<kwd lng="en"><![CDATA[Business-managed IT]]></kwd>
<kwd lng="en"><![CDATA[IT governance]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alt]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Leimeister]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Priemuth]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Sachse]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Urbach]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Wunderlich]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Software-defined business: implications for IT management]]></article-title>
<source><![CDATA[Business &amp; Information Systems Engineering]]></source>
<year>2020</year>
<volume>62</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>609-21</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Andriole]]></surname>
<given-names><![CDATA[S. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Who owns IT?]]></article-title>
<source><![CDATA[Communications of the ACM]]></source>
<year>2015</year>
<volume>58</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>50-7</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="">
<collab>BACEN. Banco Central do Brasil</collab>
<source><![CDATA[Resolução CMN nº 4.893]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="">
<collab>BACEN. Banco Central do Brasil</collab>
<source><![CDATA[Resolução nº 4.557]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Behrens]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Sedera]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Why do shadow systems exist after an ERP implementation? Lessons from a case study]]></article-title>
<source><![CDATA[Proceedings of the Pacific Asia Conference on Information Systems (PACIS2004)]]></source>
<year>2004</year>
<page-range>153-66</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Candal]]></surname>
<given-names><![CDATA[D. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Gaspar]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Costa]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[de Magalhães]]></surname>
<given-names><![CDATA[F. L. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Ferreira]]></surname>
<given-names><![CDATA[R. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Influência de práticas de gestão do conhecimento aplicadas ao desenvolvimento ágil de software]]></article-title>
<source><![CDATA[RISTI - Revista Ibérica de Sistemas e Tecnologias de Informação]]></source>
<year>2022</year>
<numero>48</numero>
<issue>48</issue>
<page-range>74-88</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chua]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Storey]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Central IT or Shadow IT? Factors shaping users&#8217; decision to go rogue with IT]]></article-title>
<source><![CDATA[Proceedings of the International Conference on Interaction Sciences (ICIS 2014)]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Creswell]]></surname>
<given-names><![CDATA[J. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Creswell]]></surname>
<given-names><![CDATA[J. D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Projeto de pesquisa: Métodos qualitativo, quantitativo e misto]]></source>
<year>2021</year>
<publisher-name><![CDATA[Penso Editora]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De Haes]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Van Grembergen]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[IT governance and its mechanisms]]></article-title>
<source><![CDATA[Information Systems Control Journal]]></source>
<year>2004</year>
<volume>1</volume>
<page-range>27-33</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fürstenau]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Rothe]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Sandner]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Leaving the shadow: A configurational approach to explain post-identification outcomes of shadow IT systems]]></article-title>
<source><![CDATA[Business &amp; information systems engineering]]></source>
<year>2021</year>
<volume>63</volume>
<page-range>97-111</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Györy]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Cleven]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Uebernickel]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Brenner]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Exploring the shadows: IT governance approaches to user-driven innovation]]></article-title>
<source><![CDATA[Proceedings of the 20th European Conference on Information Systems]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Haag]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Eckhardt]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Shadow it]]></article-title>
<source><![CDATA[Business &amp; Information Systems Engineering]]></source>
<year>2017</year>
<volume>59</volume>
<page-range>469-73</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hakvoort]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Exploring possible consequences of shadow-IT usage within a self-managing team context]]></source>
<year>2022</year>
<publisher-name><![CDATA[Radboud University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kitchenham]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Procedures for performing systematic reviews]]></article-title>
<source><![CDATA[Keele University]]></source>
<year>2004</year>
<volume>33</volume>
<numero>2004</numero>
<issue>2004</issue>
<page-range>1-26</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Klotz]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Westner]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Strahringer]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Critical success factors of business-managed IT: it takes two to tango]]></article-title>
<source><![CDATA[Information Systems Management]]></source>
<year>2022</year>
<volume>39</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>220-40</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Klotz]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Westner]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Strahringer]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[From Shadow IT to business-managed IT and back again: How responsibility for IT instances evolves over time]]></article-title>
<source><![CDATA[Proceedings of the Pacific Asia Conference on Information Systems (PACIS2020)]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Klotz]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kopper]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Westner]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Strahringer]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Causing factors, outcomes, and governance of shadow IT and business-managed IT: a systematic literature review]]></article-title>
<source><![CDATA[International Journal of Information Systems and Project Management]]></source>
<year>2019</year>
<volume>7</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>15-43</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kopper]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Westner]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Strahringer]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[From Shadow IT to Business-managed IT: a qualitative comparative analysis to determine configurations for successful management of IT by business entities]]></article-title>
<source><![CDATA[Information Systems and e-Business Management]]></source>
<year>2020</year>
<volume>18</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>209-57</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kopper]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Klotz]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Westner]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Strahringer]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Shadow IT and business-managed IT: practitioner perceptions and their comparison to literature]]></article-title>
<source><![CDATA[Journal of Information Technology Management]]></source>
<year>2019</year>
<volume>30</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1-25</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kopper]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Fuerstenau]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Zimmermann]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Rentrop]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Rothe]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Strahringer]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Westner]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Business-managed IT: a conceptual framework and empirical illustration]]></article-title>
<source><![CDATA[Proceedings of the 26th European Conference on Information Systems (ECIS2018)]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kostova]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Transnational transfer of strategic organizational practices: A contextual perspective]]></article-title>
<source><![CDATA[Academy of management review]]></source>
<year>1999</year>
<volume>24</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>308-24</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mallmann]]></surname>
<given-names><![CDATA[G. L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Antecedentes do comportamento de uso da Shadow IT e sua relação com o desempenho individual]]></source>
<year>2016</year>
<publisher-name><![CDATA[UFRG]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mallmann]]></surname>
<given-names><![CDATA[G. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Maçada]]></surname>
<given-names><![CDATA[A. C. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Eckhardt]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[We are Social: a Social Influence Perspective to investigate Shadow IT Usage]]></article-title>
<source><![CDATA[Proceedings of European Conference on Information Systems]]></source>
<year>2018</year>
<page-range>190</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mallmann]]></surname>
<given-names><![CDATA[G. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Maçada]]></surname>
<given-names><![CDATA[A. C. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Oliveira]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Can Shadow IT Facilitate Knowledge Sharing in Organizations? An Ex-Ploratory Study]]></article-title>
<source><![CDATA[Proceedings of the 17th European Conference on Knowledge Management-ECKM 2016]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Orr]]></surname>
<given-names><![CDATA[S. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Bonyadi]]></surname>
<given-names><![CDATA[C. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Golaszewski]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Sherman]]></surname>
<given-names><![CDATA[A. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Peterson]]></surname>
<given-names><![CDATA[P. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Forno]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodriguez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Shadow IT in higher education: survey and case study for cybersecurity]]></article-title>
<source><![CDATA[Cryptologia]]></source>
<year>2022</year>
<page-range>1-65</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pereira]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Ferreira]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Identificação de Práticas e Recursos de Gestão do Valor das TI no COBIT 5]]></article-title>
<source><![CDATA[RISTI-Revista Ibérica de Sistemas e Tecnologias de Informação]]></source>
<year>2015</year>
<volume>15</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>17-33</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rakovi&#263;]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Sakal]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Matkovi&#263;]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Mari&#263;]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Shadow IT-systematic literature review]]></article-title>
<source><![CDATA[Information Technology and Control]]></source>
<year>2020</year>
<volume>49</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>144-60</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ratinaud]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Interface de R pour les Analyses Multidimensionnelles de Textes et de Questionnaires]]></source>
<year>2008</year>
<publisher-name><![CDATA[IRaMuTeQ]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rentrop]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Zimmermann]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Shadow IT evaluation model]]></article-title>
<source><![CDATA[Proceedings of the 2012 Federated Conference on Computer Science and Information Systems (FedCSIS)]]></source>
<year>2012</year>
<page-range>1023-7</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salviati]]></surname>
<given-names><![CDATA[M. E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Manual do Aplicativo Iramuteq (versão 0.7 Alpha 2 e R Versão 3.2.3)]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Silic]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Shadow it-Steroids for innovation]]></article-title>
<source><![CDATA[SSRN Electronic Journal]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Souza]]></surname>
<given-names><![CDATA[M. A. R. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Wall]]></surname>
<given-names><![CDATA[M. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Thuler]]></surname>
<given-names><![CDATA[A. C. D. M. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Lowen]]></surname>
<given-names><![CDATA[I. M. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Peres]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[O uso do software IRAMUTEQ na análise de dados em pesquisas qualitativas]]></article-title>
<source><![CDATA[Revista da Escola de Enfermagem da USP]]></source>
<year>2018</year>
<volume>52</volume>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Steinhueser]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Waizenegger]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Vodanovich]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Richter]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Knowledge Management without Management--Shadow IT in Knowledge-intensive Manufacturing Practices]]></article-title>
<source><![CDATA[Proceedings 25th European Conference on Information Systems (ECIS 2017)]]></source>
<year>2017</year>
<page-range>1647-62</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Urbach]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Ahlemann]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Böhmann]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Drews]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Brenner]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Schaudel]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Schütte]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The impact of digitalization on the IT department]]></article-title>
<source><![CDATA[Business &amp; Information Systems Engineering]]></source>
<year>2019</year>
<volume>61</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>123-31</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Walters]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bringing IT out of the shadows]]></article-title>
<source><![CDATA[Network Security]]></source>
<year>2013</year>
<volume>2013</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>5-11</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wasiuk]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Lim]]></surname>
<given-names><![CDATA[F. P. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Factors Influencing Business IT Alignment]]></article-title>
<source><![CDATA[International Journal of Smart Business and Technology]]></source>
<year>2021</year>
<volume>9</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-12</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zimmermann]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Rentrop]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Felden]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Managing shadow IT instances - a method to control autonomous IT solutions in the business departments]]></article-title>
<source><![CDATA[Proceedings of the 20th Americas Conference on Information Systems]]></source>
<year>2014</year>
<page-range>1-12</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
