Talk:Shadow IT

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

Bias[edit]

This article is biased as there is little differentiation between "Shadow IT" and "Embedded IT". Restated, the governance models noted support centralized services model, where there are decentralized service models that are highly effective. Federated, network, or Agile models as part of LEAN or process improvement do not sacrifice audit, management, or control; they simply shift where the control points are and how change is managed.— Preceding unsigned comment added by Bwieser (talkcontribs) 00:19, 21 May 2010 (UTC)[reply]

External Links[edit]

Why is there a link for a company called Shadow IT? It has nothing to do with the article, it merely has the name. —Preceding unsigned comment added by 207.14.29.3 (talk) 20:01, 12 April 2011 (UTC)[reply]

Removed the link. --An.ha (talk) 13:27, 27 January 2012 (UTC)[reply]


"without organizational approval" should be replaced with "outside the traditional IT Governance process".

If the CEO tells you to do something, it has organizational approval, even if you aren't in IT. — Preceding unsigned comment added by 159.240.11.172 (talk) 14:53, 28 January 2013 (UTC)[reply]

removing POV tag with no active discussion per Template:POV[edit]

I've removed an old neutrality tag from this page that appears to have no active discussion per the instructions at Template:POV:

This template is not meant to be a permanent resident on any article. Remove this template whenever:
  1. There is consensus on the talkpage or the NPOV Noticeboard that the issue has been resolved
  2. It is not clear what the neutrality issue is, and no satisfactory explanation has been given
  3. In the absence of any discussion, or if the discussion has become dormant.

Since there's no evidence of ongoing discussion, I'm removing the tag for now. If discussion is continuing and I've failed to see it, however, please feel free to restore the template and continue to address the issues. Thanks to everybody working on this one! -- Khazar2 (talk) 14:20, 5 July 2013 (UTC)[reply]

Unprofessional Nonsense[edit]

In the context of the business world, this article reads like the weaselly self-justification of a strident manager caught running a potentially dangerous Stealth IT system. There is almost nothing correct about the second paragraph:

"Shadow IT is considered by many an important source for innovation and such systems may turn out to be prototypes for future approved IT solutions. On the other side, shadow IT solutions are not often in line with the organization's requirements for control, documentation, security, reliability, etc., although these issues can apply equally to authorized IT solutions."

What "many"? Who? I've never seen a reaction to a Stealth IT operation other than alarm by upper management, an order for an immediate audit - always resulting in a dismantling and/or take-over by IT and once, a firing on the spot. The attempt to equate some Stealth IT with IT Operations is flat-out ridiculous and literally not possible: when IT Operations has a problem with control, documentation, security and etc. it's a competency issue. In the case of Stealth IT, they're operating outside the bounds of their assigned responsibility: undermining - at the least - the authority structures of the company and at the worst, creating an unknown and unauthorized collapse-point for the business. Mad Bunny (talk) 16:54, 6 February 2015 (UTC)[reply]

No Positives?[edit]

Shadow IT keeps the wheels from grinding to a halt inside large organisations. It helps keeps defunct processes moving and turns around usable tools and communication channels that greatly speed up the efficiency of organisational workgroups. — Preceding unsigned comment added by 66.203.207.67 (talk) 19:50, 21 April 2015 (UTC)[reply]

Neutrality of opinions[edit]

The drawback section sounds like a rant from disgruntled IT professionals. I summed them up into three main points. I also did the same to the benefits.

There are also a lot of anecdotal evidence on both sides. I toned them down.

The part about "perceived or actual limitations" makes those who set up shadow IT solutions are simply paranoid of the "Big Brother". "Limitations" suffice.

I hope these changes will bring some balance to the article. Gerry P. Kan (talk) 09:48, 23 August 2023 (UTC)[reply]