Claim Missing Document
Check
Articles

Found 1 Documents
Search
Journal : Bulletin of Computer Science Research

Qualitative Analysis of Shadow IT Practices in Higher Education to Identify IT Security Needs Ahmad Aunul Bari Hayiz; Arif Wibisono
Bulletin of Computer Science Research Vol. 5 No. 3 (2025): April 2025
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletincsr.v5i3.520

Abstract

The presence of Shadow IT in educational settings often stems from users' attempts to fulfill work needs that are not met by formal systems. These tools, typically accessed outside institutional infrastructure, are preferred due to their practical use in day-to-day activities. However, such informal practices have been observed to trigger a variety of technical and security-related issues that remain undocumented by institutional IT policies. These tools may also pose significant risks to information security and work system reliability. This research aims to examine recurring problems encountered by users and interpret how these issues relate to key components in the work systems such as participants, technologies, information, processes, and products/services. The study employed a qualitative case study and applied the Eisenhardt method (1989) approach involving 35 respondents through interviews and field observations. Data was analyzed using open coding to extract recurring problem patterns. The analysis revealed four primary categories of problems System Error, Slow System Response, Access Limitations and Data Loss. These findings indicate that Shadow IT disrupts the flow of information and affects both technological and human elements within the work system. The study contributes by mapping factual user difficulties to concrete IT security needs that extend beyond formal policies. It suggests that effective IT security must address not only technical safeguards but also user behavior, access reliability, and adaptive policies capable of integrating informal digital practices.
Co-Authors Abdul Rochman, Nur Hidayat Abdul Rokhim Achmad Buchori Adelya Rizki Asmedianti Adi Cipta Airlangga Adi Kurniawan Ahmad Aunul Bari Hayiz Aini, Yumna Nur Aisyah Rahmawati Alfiana, Nur Algracevian Andrea Gibran Syahrial Alifio Rahmanqa Amalia, Shinta Amna Shifia Nisafani Ananta Ulisa Sitepu, Evi Andhika Prasandy Rachman Andre Parvian Aristio Anggi Yhurinda Perdana Putri Anna Shifia Nisafani Anwar Maulana, Ahmad Nurul Arinda Bagus Wicaksono Asmara, Sang Norma Lintang Az-Zahra, Farah Helga Azhar, Amril Azizah Rachmawati Baasith, Darywan Damar Bayu Timur Aji Daffa, Bariqi Raihan Daniel Oranova Siahaan Dimas Khoirul Habib Dwi Kusuma, Ressa Laurencya Eko Noerhayati Eko Retno Mulyaningrum Erma Suryani Erma Suryani Evi Ananta Ulisa Sitepu Faisal Isflah Huda Faizal Mahananto Fath, Hamzah Febrianti, Nur Aida Frella Dwi Rusanda Geulis Enes Wahyuning Tiyas Hafizudin Wirawan Harto Nuroso Hascaria Budi Prasetiyo Ika Menarianti, Ika Ika Nurkasanah Irsya‘Adah Jessica Patricia Halim Khoirum Maulana Ishaq Lailatul Nabilah Indah Cahyani Lelly Kusirawati Lifta Kaumala Febriyanti Lilik Ariyanto Litafira Syahadiyanti M. Ammar Fauzan M. Yusuf Sulaiman Mahendrawathi ER Muchammad Fahmi Zamroni Mudjahidin Muhammad Afrizal Firmansah Muhammad Endy Harjono Muhammad Septama Prasetya Muhammad, Ghifary Nasution, Angel Anggina Nugroho Budhisantosa Nurfatikha, Rih Prajna Nurkasanah, Ika Nurkholis, Lalu Muhammad Dzuu Mirrotin Nuzulia Rachma Permata Sari Raffly Andico Devara Rahmanqa, Alifio Ramadina, Raysa Farah Mumtaz Raras Tyasnurita Regita Cahyani Salsabilla Renaldi Dwi Setiawan Rindu Puspita Wibawa Rivanna Citraning Rachmawati, Rivanna Citraning Rizka Wakhiddatus Sholikah Rully Agus Hendrawan Saifurrahman, Anas Supandi Syaiful Fuadi Sylvi Amalia Annisa Tatik Tatik Thesa Adelia Kusuma Tony Dwi Susanto Umar Abdul Aziz Vino Julys Pramudito Wibisono, khairunnisa Arif Fajar Wijayanto . WIJAYANTO WIJAYANTO wijayanto wijayanto Yoyon Putra, Arya Tigor Yulia Frasetia Ningsih