學門類別
最新個案
- Leadership Imperatives in an AI World
- Vodafone Idea Merger - Unpacking IS Integration Strategies
- V21 Landmarks Pvt. Ltd: Scaling Newer Heights in Real Estate Entrepreneurship
- Snapchat’s Dilemma: Growth or Financial Sustainability
- Did I Just Cross the Line and Harass a Colleague?
- Predicting the Future Impacts of AI: McLuhan’s Tetrad Framework
- Porsche Drive (A) and (B): Student Spreadsheet
- Porsche Drive (B): Vehicle Subscription Strategy
- TNT Assignment: Financial Ratio Code Cracker
- Winsol: An Opportunity For Solar Expansion
Malus Analytics International: Combatting the Menace of Shadow IT
內容大綱
Since its founding in 2014, Malus Analytics International (MAI), a US-based player in the analytics consulting industry, had focused on helping its clients move to cloud-based computing and database management. However, by 2018, this strategy had left many of MAI's customers vulnerable to “Shadow IT,” an information technology (IT) phenomenon where employees used computing devices, data, and software that were not provided, approved, or sanctioned by an organization’s IT department for work. Twenty of MAI’s top clients had experienced data breaches as a result of the use of unsanctioned applications. In response, MAI's management team needed to develop a collaborative plan to help ameliorate the natural tensions between the chief information officers and the end-users. The plan needed to balance security requirements and resource management with innovation and flexibility.
學習目標
This case is suitable for an undergraduate- or graduate-level course on core analytics or information technology (IT). Students will assess the impact of Shadow IT on businesses and develop amelioration solutions that address the use of cloud computing. After completion of the case, students will be able to<ul><li>recognize the growing impact of Shadow IT throughout business and government;</li><li>appreciate the interactive nature of Shadow IT and cloud computing;</li><li>identify factors that are driving the increase use of Shadow IT by end-users; and</li><li>develop strategies to ameliorate the Shadow IT challenge.</li></ul>