An Examination of Shadow IT


Betts, B. (2016). Shadow data and the risks posed by cloud storage apps. ComputerWeekly. Retrieved from

Burgess, M. (2017). GDPR will change data protection – here’s what you need to know. Wired. Retrieved from

Christopher, E. (2016). 5 Shadow IT Trends Facing Today’s CIOs. My Tech Decisions. Retrieved from:

Collet, S. (2017). Five new threats to your mobile security. CSO Online. Retrieved from

Computer History Museum. (n.d.). Timeline of Computer History Memory & Storage. Retrieved from

Gallagher, S. (2017). Avast! There’s malware in that CCleaner software update. Ars Technica. Retrieved from

Hamburger, E. (2013). Google Docs began as a hacked together experiment, says creator. The Verge. Retrieved from

Harris, E. (2014). Data Breach Hurts Profits at Target. The New York Times. Retrieved from

Hausman, K., Alston, N., Chapple, M. (2005). Protecting Your Network from Security Risks and Threats. informIT. Retrieved from:

Meyer, D. (2015). Why shutting down Shadow IT stifles innovation. ITProPortal. Retrieved from

Miller, G. (2016). 60% of small companies that suffer a cyber attack are out of business within six months. The Denver Post. Retrieved from

Noyes, A. (2007). Shadow IT. Government Executive, 39(17), 63.

Pisello, T. (2004). IT ‘shadow spending’ has doubled. Computerworld. Retrieved from–shadow-spending–has-doubled.html

Silic, M., & Back, A. (2014). Shadow IT – A view from behind the curtain. Computers & Security, 45274-283.

Silic, M., Barlow, J. B., & Back, A. (2017). A new perspective on neutralization and deterrence: Predicting shadow IT usage. Information & Management541023-1037. doi:10.1016/

Thomchick, D. (2017). Symantec Publishes Shadow Data Report on Latest Security Risk Trends in Cloud Apps for 1H 2017. Symantec Official Blog. Retrieved from:

Walters, R. (2013). Bringing IT out of the shadows. Network Security, 2013(4), 5-11.