Statements (21)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:concept
|
| gptkbp:alsoKnownAs |
gptkb:shadow_IT
|
| gptkbp:associatedWith |
data loss
compliance issues lack of IT oversight risks to security |
| gptkbp:cause |
security vulnerabilities
increased productivity |
| gptkbp:commonIn |
large organizations
|
| gptkbp:mayInclude |
cloud services
external storage personal devices unauthorized software |
| gptkbp:mitigatedBy |
network monitoring
employee training IT governance policies |
| gptkbp:monitors |
IT departments
|
| gptkbp:refersTo |
use of information technology systems, devices, software, applications, and services without explicit organizational approval
|
| gptkbp:bfsParent |
gptkb:shadow_IT
|
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
stealth IT
|