Investigating the influence of emotions on Shadow IT usage behaviours (notice n° 1892666)
[ vue normale ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 03900cam a2200349 4500500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20260329014847.0 |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | fre |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | dc |
| 100 10 - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Barlette, Yves |
| Relator term | author |
| 245 00 - TITLE STATEMENT | |
| Title | Investigating the influence of emotions on Shadow IT usage behaviours |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Date of publication, distribution, etc. | 2026.<br/> |
| 500 ## - GENERAL NOTE | |
| General note | 50 |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Shadow IT (SIT) usage can be characterized as follows: (1) employees’ voluntary adoption of unapproved IT tools for the purpose of working more efficiently, and (2) employees’ infringement on corporate security policies even when they act without malicious intent. We used the coping model of user adaptation to conduct a survey of 480 SIT users to investigate the ways in which employees cope with SIT usage. Our findings indicate that in the context of SIT usage, employees feel satisfied regardless of their level of control over their SIT usage and that a greater level of perceived control allows employees to maximise their performance at work, increasing satisfaction. We also show that perceived threat fosters the implementation of security measures via problem-focused coping (PFC) behaviours and mitigates emotion-focused coping (EFC) behaviours. As SIT usage can be perceived both as beneficial and threatening, we contribute to behavioural information systems (IS) research by showing that even when employees covertly use unapproved IT resources and infringe on corporate IT policies, they nevertheless engage in risk mitigation to preserve the increased efficiency they gain from using SIT. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | L’utilisation du Shadow IT (SIT) peut être caractérisée comme suit : (1) une adoption volontaire par les employés d’outils informatiques non approuvés dans le but de travailler plus efficacement, et (2) la violation par les employés des politiques de sécurité de l’entreprise, même quand ils agissent sans intention malveillante. Nous avons utilisé le modèle de l’adaptation de l’utilisateur (coping model of user adaptation) dans le cadre d’une enquête auprès de 480 utilisateurs du SIT afin d’étudier comment les employés font face à l’utilisation du SIT. Nos résultats indiquent que dans le contexte de l’utilisation du SIT, les employés se sentent satisfaits quel que soit leur niveau de maîtrise du SIT et qu’un plus grand niveau de contrôle perçu permet aux employés de maximiser leur performance au travail, ce qui augmente encore plus leur satisfaction. Nous montrons également que la menace perçue favorise la mise en œuvre de mesures de sécurité au travers de comportements d’adaptation orientés-problème (PFC) et limite les comportements d’adaptation orientés-émotion (EFC). Comme l’utilisation du SIT peut être perçue à la fois comme bénéfique et menaçante, nous contribuons à la recherche comportementale en systèmes d’information (SI) en montrant que même lorsque les employés utilisent des ressources informatiques non approuvées à la dérobée et enfreignent les politiques informatiques de l’entreprise, ils tentent néanmoins de limiter les risques qu’ils génèrent afin de préserver l’efficacité accrue qu’ils retirent de l’utilisation du SIT. |
| 690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
| Topical term or geographic name as entry element | comportement |
| 690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
| Topical term or geographic name as entry element | coping |
| 690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
| Topical term or geographic name as entry element | orienté-émotion |
| 690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
| Topical term or geographic name as entry element | orienté-problème |
| 690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
| Topical term or geographic name as entry element | sécurité |
| 690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
| Topical term or geographic name as entry element | Shadow IT |
| 690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
| Topical term or geographic name as entry element | behaviour |
| 690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
| Topical term or geographic name as entry element | coping |
| 690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
| Topical term or geographic name as entry element | emotion-focused |
| 690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
| Topical term or geographic name as entry element | problem-focused |
| 690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
| Topical term or geographic name as entry element | security |
| 690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
| Topical term or geographic name as entry element | Shadow IT |
| 700 10 - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Berthevas, Jean-François |
| Relator term | author |
| 700 10 - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Richet, Jean-Loup |
| Relator term | author |
| 700 10 - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Georg Schaffner, Laura |
| Relator term | author |
| 786 0# - DATA SOURCE ENTRY | |
| Note | Systèmes d'information & management | Volume 30 | 2 | 2026-02-17 | p. 99-149 | 1260-4984 |
| 856 41 - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | <a href="https://stm.cairn.info/revue-systemes-dinformation-management-2025-2-page-99?lang=en&redirect-ssocas=7080">https://stm.cairn.info/revue-systemes-dinformation-management-2025-2-page-99?lang=en&redirect-ssocas=7080</a> |
Pas d'exemplaire disponible.




Réseaux sociaux