By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

Shadow Systems: The Thing at the Foot of the Bed

October 26, 2022
9
Min Read
Woman across the table from 2 men talking

As All-Hallows-Eve approaches and our thoughts swing on rusty hinges from cooler nights, hot mugs off cider, and bags of candy to ghouls, ghosts, and B-Movies that scare the bejesus out of us. It reminds us of the stories of monsters and villagers, the hunters and the hunted.  

There is one particular technology of note. An IT boogey man. A story of the evil shadow system that IT must hunt down and destroy at all costs! But, as with all stories, there's more than one side to it.

Definition of a shadow system

Understanding the nature of this Shadow System monster involves first understanding what it is and its origins.  

According to Wikipedia, a shadow system or shadow IT is a term used by IT for any application relied upon for business processes that is not under the jurisdiction of a centralized information systems department (IT). That is, the information systems department did not create it, was not aware of it, and does not support it.

So, it seems Wikipedia also identifies shadow systems as the monster and Information services (IT) as the hunter. A straightforward monster hunt then…right? Did you notice the plot twist?

Use of shadow systems for business processes

Business processes are used by the business and shadow systems are a business process. In fact, it is usually some business actor that created it. Regardless, IT may believe it has the mandate to control shadow systems and the mission to hunt them down; to destroy them. The plot thickens.

The monsters IT perceives aren't going to be seen by the business as particularly monstrous as the business created them and because they usually play an active role in the business. This makes them difficult to dispose of outright and maybe even a need to understand the impact of technology on workplace culture.

Perhaps the Wikipedia definition should be extended to explain; for every shadow system exists a business narrative that requires its existence. Going a bit further, shadow systems have their own set of rules, controls, and methods but they aren't known or managed by Information Services.

The shadow system hunt

Sometimes, hunting down shadow systems just means asking around but you must ask your questions in a meaningful way to discover their existence. Chances are the business won't even recognize the term 'shadow systems' particularly if you use the Wikipedia definition.  

While the business is a good place to look for shadow systems, IT itself may also harbor them. In IT's case, if there are single use or specialty systems being employed to complete various tasks without the knowledge of the larger IT group, these are also shadow systems and can cause similar types of problems shadow systems can cause for the business.

Shadow systems most commonly involve data and are operated by one person from their workstation or laptop. A common theme is, something is done to a data set behind the scenes to transform or enhance it before it becomes part of another system or report. Shadow systems will often involve one or more spreadsheets.

How to find shadow systems

Here are a few ways to reveal the existence of shadow systems:

  • Someone resigns or retires and suddenly, part of the enterprise stops working.
  • New software is installed or an existing package is updated and a supposedly unrelated part of the enterprise fails.
  • Systems that should have the same data don't. Data may be missing, deleted data may be present, or one or more specific records data is not the same across systems like when data is hand entered from system to another
  • Reports with data from multiple sources which are not formally compiled (as in a data warehouse structure).  
  • Conflict sometimes called ‘data brawling’ occurs when formal system outputs are challenged by shadow system outputs

YOU MIGHT LIKE: Tackling Succession Planning Woes Head On

Mapped-out workflows may also aid in the search for shadow systems. Look at points where multiple processes merge or where a process has a person's name attached to it. Likewise, if a work or data flow's content is changed by a spreadsheet, program, or other piece of non-standard software, this can also be a clue that a shadow system is lurking nearby.

Shadow systems in the utility industry

Examples of shadow systems in the utility industry:

  • A project manager might use a shadow system to keep their own set of information on budgets or timelines
  • Field crews might create their own work order system
  • A utility employee creates their own system to compile and report water consumption data by customer type to submit to an agency on a monthly basis

Inhuming a shadow system

With the discovery of a shadow system, before burying, remember that shadow systems exist for a reason, and you might not have direct control over it anyway since it was created by the business likely with local technology such as Excel.

More critical, its genesis often arises from a genuine desire to improve work output, either to increase speed (e.g. not waiting around for long downloads) or a desire to have control over the data so mindful analysis can be conducted that formal IT systems may not currently support. Given this perspective, you are most likely going to have to negotiate a solution.

Shadow systems have been vilified in the business press for their risks. When found, their creators and the system are often criticized despite the good intentions or legitimate frustration by which they were created. This can be particularly painful to the business who may, in part, be reflecting their perception that their needs were not heard or met by IT.

Thus, this solution is ensuring the valuable part of the system is not lost or overlooked. Technology groups will have to learn to be ok with not controlling key business information.

If you are going to remove a shadow system, you will have to replace it with something that performs the same task or works around whatever issue was being addressed by the shadow system. You might want to find those individuals responsible for outcomes of the shadow systems (software advocates) to help you find new or replacement systems.

Don't panic if it doesn't appear there is an immediate solution that eliminates the shadow system. You will likely need some patience and time to negotiate a resolution with the business. Remember, your solution may be more complex than the shadow system it is replacing; adding more technical debt for IT to manage.

You don’t have to be afraid of the shadows

Shadow systems, while perhaps still monsters, are going to be a bit more complex than you might anticipate. While you should keep an eye out for them, don’t be surprised if one surfaces because of a system issue. Hunting them down and killing them directly is usually not an option. If a shadow system is part of an operational function, then remember one important rule, “Don’t break it”. Lastly, shadow systems usually require resolution with the business that is acceptable to both the business and IT.

Trinnex can help you transform hazy outlooks into clear solutions.

Share post on
linkedIn
twitter
Written by
linkedIn
Cliff Brandon, CBIP
Senior Management Specialist
|
He/Him
Cliff has worked with mining, exploration, EPCM, utilities, & finance organizations on systems design, data, and analytics for 30 years.
linkedIn
Dr. Claire Baldwin
Organizational Management and Effectiveness Specialist
|
She/Her
Dr. Claire Baldwin has 30+ years in infrastructure design & construction, specializing in industrial psychology and change management.

Subscribe to our newsletter

Insights from our experts can be yours, totally free. Join our monthly newsletter with one click.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.