Skill 2015 Developing a game to deal with shadow IT Theory, Prototyping, Testing. Markus Bless HTWG Konstanz
Agenda Shadow IT Learning through playing The game Testing the game Q&A (3 slides) (1 slide) (3 slides) (1 slide) 2
Shadow IT What is that? Any application that hasn t been provided by the IT department and isn t supported by the ITSM is referred to as shadow IT Rentrop, HTWG Konstanz Formal IT landscape IT Governance IT systems, IT service processes, IT people employed Shadow IT applications 3
Shadow IT How pervasive is it? Rentrop: 10%-50% of IT landscape is shadow IT 20-87% of all shadow IT applications is abuse of an office suite (Excel, Access, ) 13-31% of all shadow IT applications are end user applications 0-10% of all shadow IT applications are cloud services 0-2% of all shadow IT is Hardware Frost & Sullivan: 35% of all applications are shadow IT Use of Shadow IT also occurs in the IT department Capgemini: The use of shadow IT is rising Györy et al.: The gap between business and IT is large 4
Shadow IT Drivers and impact Shadow IT occurs, because of need Rentrop: 1 out of 300 shadow IT applications doesn t add benefit Formal IT doesn t match needed IT support Benefits Process reference, innovation, flexibility for the business, speed Disadvantages Intransparency, inconstancy, silo solutions, weak protection, lose of flexibility for the IT, follow-up costs 5
Playing Factors for successful learning Catch all learning types Trial and error Transfer to real world Emotional link through communication and fun 6
Prototyping Learning Goals Foster awareness for drivers and impact of shadow IT Learn that shadow IT can be necessary Learn to consider risks of shadow IT Reduce size of the gap between business and IT Show needs of business Show limits and possibilities of IT Get a feeling for the benefits shadow IT receives through integration in the ITSM 7
Prototyping Conceptual design Each turn a player has to choose between formal IT and shadow IT IT resources for formal IT are limited and take time to gain Shadow IT includes risk Players have to move from department to department Each team shares its points and resources Shadow IT can be integrated at the cost of IT resources to minimise risk 8
Prototyping The game Markus Bless Oktober 2015 9
Testing the game Drivers Ø1,91 Risks Ø2,09 Chances Ø2,64 Fun Ø1,45 Communication Ø1,64 Change in behaviour Ø2,36 10
Thank you 11
Sources Capgemini: Studie IT-Trends 2011. Unternehmen fordern wieder Innovation. https://www.de.capgemini.com/resource-file-access/resource/pdf/studie_it-trends_2011.pdf, 16.06.2015. Csikszentmihalyi, M.: Das flow-erlebnis. Jenseits von Angst u. Langeweile: im Tun aufgehen. Klett-Cotta, Stuttgart, 1985. Györy, A.; Brenner, W.; Pirouz, M.; Uebernickel, F.: Bewusster Einsatz von Schatten-IT. Zwischen Sicherheit & Innovationsförderung, 2011. Györy, A.; Cleven, A.; Uebernickel, F.; Brenner, W.: Exploring the Shadows. IT Governance Approaches to User-Driven Innovation. In: ECIS, 2012. Frost&Sullivan: The Hidden Truth Behind Shadow IT. Six trends impacting your security posture. http://www.mcafee.com/us/resources/reports/rp-six-trends-security.pdf, 16.04.2015. Martin, W.: Die Schattenseite der Wolke. Tipps zum Umgang mit Schatten(-IT). BESTinCLOUD Computerwoche, Frankfurt, 2014. Rentrop, C.; Zimmermann, S.: Shadow IT evaluation model. IEEE; FedCSIS, Wroclaw, Poland, 2012. Rentrop, C.: Die Verbreitung von Schatten-IT in Unternehmen. Ergebnisse einer Feldstudie, Konstanz, 2015. Vester, Frederic: Denken, Lernen, Vergessen. Teil 1-3, 25, München, 1995 Warwitz, Siegbert A.; Rudolf, Anita: Spielend lernen - Lernspiele. In: Vom Sinn des Spielens. Reflexionen und Spielideen, Baltmannsweiler, 3. Auflage, S. 82, 2014 Zimmermann, S.; Rentrop, C.: Schatten-IT. In: HMD Praxis der Wirtschaftsinformatik, 2012, 49; S. 60 68. 12
Contact If you have any questions about shadow IT or IT Governance, I will be happy to be your contact person. mabless@htwgkonstanz.de 13