Developing a game to deal with shadow IT



Similar documents
22. April 2010 Siemens Enterprise Communications

Does it really CHANGE something?

Department of Geography - Birgit Sattler - University of Duisburg-Essen ILIAS. in geography and landscape architecture

Requirements Engineering on the Transition to Product and Innovation Management

Cloud OS Network. Uwe Lüthy, Die Bedeutung einer Partner Managed Cloud für Kunden. Partner Technology Strategiest

Neue Wege im Avioniksystem Test des Eurofighter

Trends in der Forschung für kontaktlose Anwendungen

Entrepreneurship Education between economic educational philosophy and key competence for lifelong learning

Big Data Vendor Benchmark 2015 A Comparison of Hardware Vendors, Software Vendors and Service Providers


Quellennachweis. Anhang

SECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Sabine Bendiek, Geschäftsführerin EMC Deutschland GmbH

Enterprise Architecture Management - Conclusion. Knut Hinkelmann

Dr. Anna Maria Schneider

PROF. TIM W. DORNIS PH. D. (TUEBINGEN), JSM (STANFORD)

Paul Alpar Anwendungsorientierte Wirtschaftsinformatik, Strategische Planung,

How to start up a software business within a cloud computing environment

COSMOS events, activities and trainings in Austria, BM:UKK

Testmanagement / [ISQI, International Software Quality Institute]. Andreas Spillner.,

- Customer Relationship Management in der

Mit einem Auge auf den mathema/schen Horizont: Was der Lehrer braucht für die Zukun= seiner Schüler

Business Information Systems

29. November 2011 Eidgenössische Steuerverwaltung

Designing and Implementing a Server Infrastructure MOC 20413

XV1100K(C)/XV1100SK(C)

Entrepreneurship education in Germany 1

User-centered Requirements Elicitation for Business Intelligence Solutions

Pumping up Moodle via Integrated Content Authoring, Sharing and Delivery Tools The Educanext LTI Case Study

International Strategic Management

Brand Value of Real Estate

Business Administration and Engineering Degree program. B.Sc. Business Administration and Engineering (Industry)/ (Information technology) Module name

Innovations for Flexible and Sustainable. Supply Chains. 11 th meeting of the European Section MIT Forum Supply Chain Innovation

Martin Krus, Klaus Sedlbauer, Herbert Sinnesbichler

The Future of IT Sourcing in the Digital World

Martina Göhring Hanau Seite 1

Do you know Generation Google? Using research findings to promote information literacy

Media: Conception and Production (B.A.) English taught courses

CURRICULUM VITAE. M. Sc. Anne-Katharina Schiefele

Intelligent Business Operations

Reading Comprehension

Total Quality Management in the food industry Current situation and potential in Germany

Schöll MOC Installing and Configuring Windows Server 2012

Formal Concept Analysis used for object-oriented software modelling Wolfgang Hesse FB Mathematik und Informatik, Univ. Marburg

ENTWURF ÖVE/ÖNORM EN

How To Understand The Value Creation Through Communication

Wolfgang Gaiswinkler Organisational Consultant

Open Text Social Media. Actual Status, Strategy and Roadmap

SPICE auf der Überholspur. Vergleich von ISO (TR) und Automotive SPICE

Illumination simulation with Specter in aviation industry. - Uncertainty of simulation results from Specter in comparison with real measurement -

Lean E T HS MF Einführung des Lean Company Programms in der Siemens Business Unit E T HS

Trends of Internet of Things and Cloud Services. Sak Segkhoonthod, Ph.D CEO Electronic Government Agency (Public Organization)

limo B. Poser The Impact of Corporate Venture Capital

Julia Englert, PhD Student. Curriculum Vitae

PROF. TIM W. DORNIS PH. D. (TUEBINGEN), JSM (STANFORD)

A New Job Opportunity for Unemployed Young People: Data Security Skilled Worker for SMEs

Timebox Planning View der agile Ansatz für die visuelle Planung von System Engineering Projekt Portfolios

Windows HPC Server 2008 Deployment

Secure Contactless Sphere Smart RFID-Technologies for a Connected World. Werner Haas, Herwig Zeiner & SeCoS Konsortium

Does Swiss IT Matter?

NATIVE ADVERTISING, CONTENT MARKETING & CO. AUFBRUCH IN EIN NEUES GOLDENES ZEITALTER DES MARKETINGS?

FRAUNHOFER INSTITUTe For MATERIAL FLow and LOGISTIcs IML MARKETSTUDY: aided by:

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 MOC 10233

After School Activities

EFFICIENT ELEARNING COURSE DESIGN AND MEDIA PRODUCTION

Inflation,UrsachenundWirkungen

Aerospace quality processes have always been

Symantec Backup Exec (TM) 13 Installation Log

Formal Methods and the Internet of Things

Is Cloud relevant for SOA? Corsin Decurtins

Strategic IT Management Fru Akumawah

ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange

Quality of Logistics Services A journey towards customer driven operational excellence along the supply chain

Definition Science meets Business Conclusion. generated by en.wikipedia.org/serious games

Additive Manufacturing Design & Engineering Symposium. Innovation Intelligence. Paradigmenwechsel in der Konstruktion und Entwicklung

Restructuring of companies a proposal for pre-insolvency restructuring proceedings Dr. Andrea Braun

Transcription:

Skill 2015 Developing a game to deal with shadow IT Theory, Prototyping, Testing. Markus Bless HTWG Konstanz

Agenda Shadow IT Learning through playing The game Testing the game Q&A (3 slides) (1 slide) (3 slides) (1 slide) 2

Shadow IT What is that? Any application that hasn t been provided by the IT department and isn t supported by the ITSM is referred to as shadow IT Rentrop, HTWG Konstanz Formal IT landscape IT Governance IT systems, IT service processes, IT people employed Shadow IT applications 3

Shadow IT How pervasive is it? Rentrop: 10%-50% of IT landscape is shadow IT 20-87% of all shadow IT applications is abuse of an office suite (Excel, Access, ) 13-31% of all shadow IT applications are end user applications 0-10% of all shadow IT applications are cloud services 0-2% of all shadow IT is Hardware Frost & Sullivan: 35% of all applications are shadow IT Use of Shadow IT also occurs in the IT department Capgemini: The use of shadow IT is rising Györy et al.: The gap between business and IT is large 4

Shadow IT Drivers and impact Shadow IT occurs, because of need Rentrop: 1 out of 300 shadow IT applications doesn t add benefit Formal IT doesn t match needed IT support Benefits Process reference, innovation, flexibility for the business, speed Disadvantages Intransparency, inconstancy, silo solutions, weak protection, lose of flexibility for the IT, follow-up costs 5

Playing Factors for successful learning Catch all learning types Trial and error Transfer to real world Emotional link through communication and fun 6

Prototyping Learning Goals Foster awareness for drivers and impact of shadow IT Learn that shadow IT can be necessary Learn to consider risks of shadow IT Reduce size of the gap between business and IT Show needs of business Show limits and possibilities of IT Get a feeling for the benefits shadow IT receives through integration in the ITSM 7

Prototyping Conceptual design Each turn a player has to choose between formal IT and shadow IT IT resources for formal IT are limited and take time to gain Shadow IT includes risk Players have to move from department to department Each team shares its points and resources Shadow IT can be integrated at the cost of IT resources to minimise risk 8

Prototyping The game Markus Bless Oktober 2015 9

Testing the game Drivers Ø1,91 Risks Ø2,09 Chances Ø2,64 Fun Ø1,45 Communication Ø1,64 Change in behaviour Ø2,36 10

Thank you 11

Sources Capgemini: Studie IT-Trends 2011. Unternehmen fordern wieder Innovation. https://www.de.capgemini.com/resource-file-access/resource/pdf/studie_it-trends_2011.pdf, 16.06.2015. Csikszentmihalyi, M.: Das flow-erlebnis. Jenseits von Angst u. Langeweile: im Tun aufgehen. Klett-Cotta, Stuttgart, 1985. Györy, A.; Brenner, W.; Pirouz, M.; Uebernickel, F.: Bewusster Einsatz von Schatten-IT. Zwischen Sicherheit & Innovationsförderung, 2011. Györy, A.; Cleven, A.; Uebernickel, F.; Brenner, W.: Exploring the Shadows. IT Governance Approaches to User-Driven Innovation. In: ECIS, 2012. Frost&Sullivan: The Hidden Truth Behind Shadow IT. Six trends impacting your security posture. http://www.mcafee.com/us/resources/reports/rp-six-trends-security.pdf, 16.04.2015. Martin, W.: Die Schattenseite der Wolke. Tipps zum Umgang mit Schatten(-IT). BESTinCLOUD Computerwoche, Frankfurt, 2014. Rentrop, C.; Zimmermann, S.: Shadow IT evaluation model. IEEE; FedCSIS, Wroclaw, Poland, 2012. Rentrop, C.: Die Verbreitung von Schatten-IT in Unternehmen. Ergebnisse einer Feldstudie, Konstanz, 2015. Vester, Frederic: Denken, Lernen, Vergessen. Teil 1-3, 25, München, 1995 Warwitz, Siegbert A.; Rudolf, Anita: Spielend lernen - Lernspiele. In: Vom Sinn des Spielens. Reflexionen und Spielideen, Baltmannsweiler, 3. Auflage, S. 82, 2014 Zimmermann, S.; Rentrop, C.: Schatten-IT. In: HMD Praxis der Wirtschaftsinformatik, 2012, 49; S. 60 68. 12

Contact If you have any questions about shadow IT or IT Governance, I will be happy to be your contact person. mabless@htwgkonstanz.de 13