Home
World Journal of Advanced Engineering Technology and Sciences
International, Peer reviewed, Referred, Open access | ISSN Approved Journal

Main navigation

  • Home
    • Journal Information
    • Abstracting and Indexing
    • Editorial Board Members
    • Reviewer Panel
    • Journal Policies
    • WJAETS CrossMark Policy
    • Publication Ethics
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Become a Reviewer panel member
    • Join as Editorial Board Member
  • Contact us
  • Downloads

ISSN: 2582-8266 (Online)  || UGC Compliant Journal || Google Indexed || Impact Factor: 9.48 || Crossref DOI

Fast Publication within 2 days || Low Article Processing charges || Peer reviewed and Referred Journal

Research and review articles are invited for publication in Volume 18, Issue 2 (February 2026).... Submit articles

Neutralization Theory-Based Model for the alleviation of Shadow IT-Induced security threats

Breadcrumb

  • Home
  • Neutralization Theory-Based Model for the alleviation of Shadow IT-Induced security threats

Adinda William Odindo *, Silvance Abeka and Joshua Agola

Jaramogi Oginga Odinga University of Science and Technology, Bondo, Kenya.

Research Article

World Journal of Advanced Engineering Technology and Sciences, 2025, 16(03), 088–101

Article DOI: 10.30574/wjaets.2025.16.3.1306

DOI url: https://doi.org/10.30574/wjaets.2025.16.3.1306

Received on 18 July 2025; revised on 03 September 2025; accepted on 05 September 2025

Normally, employees bypass security measures to meet productivity goals, inadvertently creating significant cybersecurity risks. This is because they are increasingly reliant on digital tools and cloud-based workflows. Shadow IT is categorized as either a software or hardware utilized by either a department or an individual in an organization without the knowledge of the central IT unit. Institutions deploy DLP, NIDS, EDR, Zero Trust, and CASBs to monitor unauthorized data/device activities, complemented by Models like ISO 27001 and COBIT for governance. However, these struggle with rapid shadow IT adoption due to user resistance, high costs, and inability to fully cover personal devices or decentralized workflows. Regulatory mandates enforce compliance but face gaps from bureaucratic delays and evolving threats. Agile governance integrates grassroots tools into innovation pipelines and emerging risks like Generative Artificial Intelligence data leaks and quantum-vulnerable cryptography require specialized solutions. Yet, resource constraints and dynamic threats persist, necessitating real-time monitoring and behavioral incentives. This study aimed to develop a Neutralization Theory-Based Model for mitigation of Shadow IT-Induced vulnerabilities. The entire population included 150 staff from various departments within ICT Authority, Kenya. The sampling was done using Yamane’s formula, yielding 110 respondents.  The data was collected using an online questionnaire on google forms, whose link was shared to the 110 respondents. Cronbach’s Alpha was deployed for assessment of reliability of the research tool. On the other hand, validity was tested by piloting within the security department. The obtained data was first coded on the five Likert scale prior to being fed to the SPSS software. The analysis included the computation of frequencies, percentages, multilinear regression analysis of variance and model fit tests. The results indicated that among the nine factors studied (Authorization, Role-based Access, Filtering, Logging and Auditing, Security Policies, Education and Training, Zero Trust Architecture, AI Governance, Crypto-Agility), seven had a significant positive impact on reducing Shadow IT-induced vulnerabilities. The most influential factor is AI Governance (with the highest beta of 0.312), followed by Crypto-Agility beta=0.205) and Authorization (beta=0.195). Two factors (Filtering and Security Policies) did not show a statistically significant impact in this model leading to their automatic elimination from the attuned model.  AI Governance and Crypto-Agility demonstrated the strongest direct impact on reducing vulnerabilities. This directly addresses critical risks: GenAI data leakage and future quantum attacks on deprecated cryptography in shadow code. Centralized governance prevents sensitive data exposure via unauthorized AI tools, while crypto-agility mitigates long-term supply chain risks in unsanctioned scripts. Subsequently we should enforce dynamic Authorization controls integrated with Zero Trust Architecture at Policy Enforcement Points. Apply micro-segmentation specifically to isolate shadow IoT/legacy systems and enforce Role-Based Access Controls based on continuous risk assessment, not static roles. Utilize CASB/SSPM tools for real-time SaaS authorization checks. 

Neutralization Theory; Shadow IT; Role-Based Access; Generative Artificial Intelligence; Authorization; Logging and Auditing

https://wjaets.com/sites/default/files/fulltext_pdf/WJAETS-2025-1306.pdf

Preview Article PDF

Adinda William Odindo, Silvance Abeka and Joshua Agola. Neutralization Theory-Based Model for the alleviation of Shadow IT-Induced security threats. World Journal of Advanced Engineering Technology and Sciences, 2025, 16(03), 088–101. Article DOI: https://doi.org/10.30574/wjaets.2025.16.3.1306.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content


Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


Copyright © 2026 World Journal of Advanced Engineering Technology and Sciences

Developed & Designed by VS Infosolution