Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Blackboard X X G Q WEBCAM RECO 50 6 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 2

image text in transcribed
Blackboard X X G Q WEBCAM RECO 50 6 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 2 31 32 33 34 35 36 37 38 39 40 41 42 430 44 450 4619 4719 481 494 50 QUESTION 33 Match each of the types of Shadow-IT below with its definition. Bricolage A. Authorizing access to a third party to connect to an organization's End-user Computing network to use a sanctioned service. Personal IT B. Purchasing standard software from the cloud that promises them flexibility and productivity and the ability to facilitate user-driven Software-as-a-Service innovation Third Party Access C. Using enterprise-approved tools and systems to develop localized Undisclosed solutions that may go well beyond their originally intended Unintended Use purpose. D. Succumbing to social pressure to use unapproved tools that Workarounds others are using for communication or to share knowledge. E. Adapting an existing work system to circumvent constraints imposed by the original system design. F. Using personal technology developed for consumers for business purposes, G. Constructing larger-scale solutions that bypass formal systems using whatever technology is available. H. None Click Save and Submit to save and submit. Click Save All Answers to save all answers

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The Operations Management Journal

Authors: Kris Safarova

1st Edition

9798734741054

More Books

Students also viewed these General Management questions