• All Solutions All Solutions Caret
    • Editage

      One platform for all researcher needs

    • Paperpal

      AI-powered academic writing assistant

    • R Discovery

      Your #1 AI companion for literature search

    • Mind the Graph

      AI tool for graphics, illustrations, and artwork

    • Journal finder

      AI-powered journal recommender

    Unlock unlimited use of all AI tools with the Editage Plus membership.

    Explore Editage Plus
  • Support All Solutions Support
    discovery@researcher.life
Discovery Logo
Sign In
Paper
Search Paper
Cancel
Pricing Sign In
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Chat PDF iconChat PDF Star Left icon
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link
Discovery Logo menuClose menu
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Chat PDF iconChat PDF Star Left icon
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link

Articles published on Shadow IT

Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
63 Search results
Sort by
Recency
  • Research Article
  • 10.54751/revistafoco.v18n9-054
GOVERNING SHADOWS: GOVERNANCE MECHANISMS FOR AUTONOMOUS IT SOLUTIONS
  • Sep 5, 2025
  • REVISTA FOCO
  • Humberto Caetano Cardoso Da Silva + 3 more

Shadow IT encompasses solutions deployed by users, outside the formal structure of IT management. The dissatisfaction with official systems is often the main motivation for the adoption of Shadow IT. Through it, users expect to streamline business processes and improve the user experience. In terms of IT governance, however, Shadow IT means a challenge. The classic IT governance approach addresses issues of control and compliance. However, in a context where solutions are not endorsed by experts, how can these governance elements can be implemented is a question without a clear answer. In this essay, it is suggested that a possible path to achieved higher levels of IT governance is to bring IT closer to end users, making Shadow IT a source of organizational innovation. To do so, it is necessary to expand the view on IT governance and to extend the use of mechanisms related to the informal dimension of governance, specifically the self-control mechanisms. The self-control mechanisms are implemented, primarily, by the controlled. However, the controller may stablish the formal mechanisms of control, so encouraging or enabling the controlled to exercise self-control.

  • Research Article
  • 10.1002/jsc.2682
From Shadow It to Shadow AI–Threats, Risks and Opportunities for Organizations
  • Jun 24, 2025
  • Strategic Change
  • Mario Silic + 2 more

ABSTRACTThe proliferation of artificial intelligence (AI) tools in organizations has given rise to “Shadow AI”—the unsanctioned use of AI systems outside approved governance frameworks. While Shadow AI shares roots with Shadow IT, its generative, opaque, and autonomous nature introduces novel risks related to data privacy, algorithmic bias, hallucination, and governance drift. This study investigates Shadow AI through a mixed‐methods design, combining survey responses from 140 professionals with in‐depth interviews of 10 executives. We examine how employees perceive and justify Shadow AI, what risks it introduces in practice, and how organizational structures fail to regulate its spread. Findings reveal that while AI is widely seen as a productivity tool, governance frameworks often lag behind employee practices, leading to a “governance drift zone” where formal policies exist but lack real‐world traction. Shadow AI also exposes responsibility gaps in high‐risk functions such as HR and legal, where AI‐generated outputs may go unchecked. The study contributes to organizational and cybersecurity literature by conceptualizing Shadow AI as a sociotechnical governance failure. We propose practical strategies—such as AI tool registries, role‐specific training, internal audits, and escalation protocols—to help organizations shift from restriction to controlled enablement, allowing them to leverage AI's benefits while managing its evolving risks.

  • Research Article
  • 10.1108/ics-03-2025-0101
Implementing security governance for remote work: challenges and best practices
  • Jun 18, 2025
  • Information & Computer Security
  • Ramesh Krishna Mahimalur

Purpose This paper aims to investigate the challenges organizations face in implementing effective security governance frameworks for remote work environments and to identify best practices that enable organizations to maintain robust security postures while supporting distributed workforce models. Design/methodology/approach A mixed-methods approach was employed, consisting of a systematic literature review of 47 academic and practitioner publications, followed by semistructured interviews with 18 information security professionals across various industries. The data was analyzed using thematic analysis to identify key challenges and effective governance strategies. Findings The research identified five primary challenges in remote work security governance: endpoint security management, network security boundary dissolution, shadow IT proliferation, compliance verification difficulties and security culture maintenance. The study found that successful organizations implement layered governance approaches that balance technical controls with human-centric security measures, employing risk-based frameworks that adapt to the distributed nature of remote work. Originality/value This study provides a comprehensive analysis of security governance in the context of remote work, moving beyond tactical security controls to examine governance frameworks that enable strategic security management in distributed environments. It contributes to the literature by presenting an integrated model that aligns security governance with remote work realities.

  • Research Article
  • 10.1111/isj.70001
Navigating Flexibility and Standardisation in Low‐Code/No‐Code Development
  • Jun 17, 2025
  • Information Systems Journal
  • Altus Viljoen + 6 more

ABSTRACTLow‐code/no‐code (LCNC) platforms, such as ServiceNow and Microsoft Power Platform, enable employees without formal IT training to build applications and automate workflows, thus driving agility and reducing dependence on traditional IT teams. However, LCNC platforms also pose a persistent challenge for organisations: while they offer flexibility and freedom by enabling decentralised development, they also require standardisation and control to manage risks that can be exacerbated by these platforms, such as shadow IT and technical debt. Striking the right balance is difficult—too much flexibility can compromise stability, while too much standardisation can stifle the autonomy and creativity that make LCNC platforms valuable in the first place. This study explores flexibility–standardisation tensions in LCNC development through an investigation of two multinational technology firms with differing LCNC maturity levels, both using ServiceNow. Drawing from 57 interviews, we identify three types of flexibility‐standardisation tensions shaped by three key elements of LCNC development: the platform itself, the people using the platform and the organisational processes targeted for improvement. We derive six guidelines used to navigate flexibility–standardisation tensions and demonstrate how these are applied across different stages of LCNC maturity. Building on these insights, we provide concrete, context‐sensitive recommendations to help organisations adapt the guidelines to their specific environments. We conclude with forward‐looking reflections on how firms can dynamically make sense of these tensions as LCNC platforms and practices evolve. Overall, our findings show that effective LCNC governance requires a dynamic approach—one that balances flexibility and standardisation simultaneously rather than treating them as opposing choices.

  • Research Article
  • 10.30574/wjarr.2025.26.1.1315
Shadow IT: The blind spot in zero trust security
  • Apr 30, 2025
  • World Journal of Advanced Research and Reviews
  • Malleswar Reddy Yerabolu

Shadow IT has emerged as a critical blind spot in zero-trust security architectures, presenting significant challenges for organizations attempting to maintain robust security postures. As enterprises increasingly adopt remote work and digital transformation initiatives, the proliferation of unauthorized applications, cloud services, and devices threatens to undermine established security frameworks. The complex interplay between employee productivity needs and security requirements necessitates a balanced approach to Shadow IT management. Organizations must implement comprehensive strategies encompassing discovery, policy frameworks, and user empowerment while fostering a security-conscious culture that addresses both technical and human aspects of the challenge.

  • Open Access Icon
  • Research Article
  • 10.26858/est.v10i2.61349
Injustices of Shadow Information Technology in Creating Open Educational Resources
  • Aug 31, 2024
  • Journal of Educational Science and Technology (EST)
  • Siphamandla Mncube + 2 more

The emergence of open educational resources (OER) promotes open access which aims to widen information access as part of smart learning in higher education institutions. However, this has caused these institutions to rely on shadow information technology (SIT) for information access and service delivery, to the point where shadow IT principles contradict open education principles. When adopting and developing OER, academics, developers, and students often opt for different software or system software based on the usability and preferences of the system. Higher education institutions (HEIs), such as the University of South Africa (UNISA), are still conscious of the IT policy in terms of the appropriation of prescribed information and communication technology (ICT). However, this institution advocates for the adoption and development of OER, and social injustices when appropriating shadow IT are not yet addressed. To investigate the challenges and injustices encountered by academics in the utilization of shadow IT when creating OER, this study opted for a qualitative research approach. The data source was academics responsible for tuition and research. For data triangulation purposes, documents such as ICT policy, tuition policy, and comprehensive open distance e-learning (CODeL) policy were considered. To propose a model, this study utilized various concepts from different theories such as "structure", which refers to the rules and resources that actors rely on in their practice and form the systems' pattern; the "used technology", which describes how user groups utilize existing technology; and the negative impacts of shadow IT (cost, risk, inconsistency, and control). The study established that, while creating OER, academics rely primarily on shadow IT which has negative impacts in an organization. This is an indication of academic stakeholders continuing to break the shadow IT roles, consciously or unsuspectingly, by being innovative while complying with the institutional mandate of open access in education. In addition to the suggestion of a shadow IT injustices model as the main contribution, this study further proposed that the institutional social capital needs to articulate social injustices associated with shadow IT to protect academics during the creation of OER. This implies that future research may examine the shadow IT injustices among all other twenty-six public universities in South Africa.

  • Research Article
  • Cite Count Icon 1
  • 10.3917/sim.234.0071
Impacts on Employee Coping Behaviors of Opportunities and Threats Related to the Use of Shadow IT
  • Apr 30, 2024
  • Systèmes d'information & management
  • Yves Barlette + 2 more

La Shadow IT (SIT) est une utilisation par les employés (1) de ressources informatiques non approuvées dans le but de travailler plus efficacement, (2) sans intention malveillante, mais qui enfreint les règles de l’entreprise. Cette utilisation crée des vulnérabilités supplémentaires qui augmentent le risque d’incidents de sécurité de l’information (SSI). Nous avons mobilisé la théorie du coping afin d’étudier les comportements d’utilisation de la SIT, au travers d’une enquête auprès de 429 utilisateurs. Nous contribuons à la littérature académique d’une part, en améliorant la compréhension du maintien par les employés d’un équilibre entre les bénéfices et les risques au travers de comportements de maximisation et/ou de protection relatifs à l’utilisation de la SIT. D’autre part, nous enrichissons les modèles conceptuels d’analyses comportementales par l’identification d’effets croisés qui n’avaient pas été étudiés auparavant. Nos contributions managériales soulignent le fait que la maximisation de l’utilisation de la SIT par les employés peut être bénéfique pour les entreprises en termes d’efficacité. Cependant, en termes de SSI, nous montrons qu’il est nécessaire d’aller au-delà d’une simple sensibilisation des employés, car ils pourraient sous-estimer les risques supplémentaires qui résultent de leurs pratiques de SIT .

  • Research Article
  • Cite Count Icon 1
  • 10.1108/tlo-06-2023-0095
The impact of cloud adoption on talent management: an exploratory study from the “learning organization” perspective
  • Feb 6, 2024
  • The Learning Organization
  • Sabine Khalil + 1 more

PurposeCloud computing, a dominant technology, significantly impacts organizations, necessitating talent management strategies for sustained growth. This study aims to explore the impact of cloud adoption on large French organizations through a “learning organization” perspective.Design/methodology/approachInterviews were conducted with business and IT stakeholders from 35 multinational organizations in France.FindingsCloud services have a high impact on large organizations, leading to a demand for cloud-related skills, a power shift from IT to business departments and increased shadow IT activities. Effective utilization requires organizational learning and a change management project, transforming organizations into productive and innovative learning organizations.Originality/valueThis paper contributes to cloud computing, organizational learning and talent management literature, offering managers a novel approach to handling cloud services.

  • Research Article
  • 10.17705/2msqe.00104
Dealing Effectively with Shadow IT by Managing Both Cybersecurity and User Needs
  • Jan 1, 2024
  • MIS Quarterly Executive
  • Steffi Haag + 1 more

Dealing Effectively with Shadow IT by Managing Both Cybersecurity and User Needs

  • Research Article
  • 10.30574/wjarr.2023.20.3.2572
Building secure and compliant web applications using low-code methodologies
  • Dec 30, 2023
  • World Journal of Advanced Research and Reviews
  • Humphrey Emeka Okeke + 1 more

Building secure and compliant web applications is a critical challenge in today’s digital landscape, particularly when leveraging low-code platforms. This article explores how low-code tools can be effectively utilized to develop applications that meet stringent regulatory standards such as HIPAA, GDPR, and PCI DSS while addressing potential security vulnerabilities. By integrating shift-left security practices, organizations can detect and remediate vulnerabilities early in the development process, significantly reducing post-deployment risks and costs. The article highlights strategies such as adopting platform-native security defaults, formalizing governance policies for citizen developers, and implementing phased security maturity models to ensure robust protection of sensitive data. Real-world examples demonstrate how proactive measures, including automated testing tools and role-based access controls (RBAC), enhance application security without compromising speed or scalability. Despite challenges like shadow IT and configuration gaps, strategic adoption of low-code platforms enables organizations to achieve compliance, maintain governance, and deliver secure solutions efficiently.

  • Research Article
  • Cite Count Icon 1
  • 10.1007/s10111-023-00748-0
Influence of structural factors on employee cloud shadow IT usage during COVID-19 lockdown: a strain theory perspective
  • Dec 16, 2023
  • Cognition, Technology & Work
  • Fowokemi Alaba Ogedengbe + 2 more

Influence of structural factors on employee cloud shadow IT usage during COVID-19 lockdown: a strain theory perspective

  • Open Access Icon
  • PDF Download Icon
  • Research Article
  • 10.36222/ejt.1382461
Detection of Shadow IT Incidents for Centralized IT Management in Enterprises using Statistical and Machine Learning Algorithms
  • Nov 27, 2023
  • European Journal of Technic
  • Mücahit Kutsal + 4 more

Software as a Service (SaaS) is a software service where software solutions are offered to users via the internet, usually subscription-based or sometimes opened to access by selling a license key, distributed over the cloud, and updates are automatically delivered to users because they are distributed over the cloud. The number of SaaS provider companies is increasing day by day, and with this increase, unauthorized purchase of SaaS applications has become a problem for corporate-sized companies. Without the company's approval, SaaS software and hardware used by employees increase Shadow IT which means there is a potential risk of security breaches, data loss, and compliance issues as the IT department is unaware of the usage and unable to monitor and control the systems effectively. In this study, in order to avoid the problems that may be caused by Shadow IT, unauthorized SaaS applications in Arçelik Global have been detected by utilizing statistical and machine learning approaches. In the experiment, Interquartile Range, K-Means and Stabilization algorithms were used for the detection of unauthorized SaaS applications. Using all three algorithms, low, medium and high-risk shadow IT detection was made for Arçelik company. We see that the proposed stabilization approach explores unauthorized SaaS applications much more distinctively than the other two algorithms. The proposed approach can be used in the future to detect unauthorized software from other companies.

  • Research Article
  • Cite Count Icon 2
  • 10.1108/oir-04-2022-0243
Understanding Shadow IT usage intention: a view of the dual-factor model
  • Sep 25, 2023
  • Online Information Review
  • Trang Nguyen

PurposeDespite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention.Design/methodology/approachAn online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents.FindingsThe results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls.Originality/valueThis work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context.

  • Open Access Icon
  • Research Article
  • Cite Count Icon 1
  • 10.2478/orga-2023-0018
Does Individual IT Experience Affect Shadow IT Usage? Empirical Evidence from Universities with Legal Entities in Indonesia
  • Aug 1, 2023
  • Organizacija
  • Nurfitriansyah + 3 more

Abstract Background and purpose Employee dissatisfaction with extant technology is one of the causes of shadow IT use. The selection of alternative technologies is determined by individual IT knowledge. In this study, we intend to examine the relationship between individual IT experience and the use of shadow IT in Indonesian higher education through two job characteristics, namely task identity and autonomy. Methods This study collects and analyses data from 301 respondents at Indonesian universities with legal status using a quantitative methodology. The direct relationship in the research model was investigated using Smart-PLS data analysis. Results The results of the study indicate that individual IT experience strongly supports the use of shadow IT by tertiary institutions with legal entities employees in Indonesia, either through task identity or job autonomy. Conclusion In order for employees to feel satisfied, the organization must prioritize employee IT experience and the information technology requirements they require to complete their work. This can be accomplished by involving employees in the development of information technology.

  • Research Article
  • 10.1080/08874417.2023.2234318
Inconsistencies Between Information Security Policy Compliance and Shadow IT Usage
  • Jul 20, 2023
  • Journal of Computer Information Systems
  • Hsieh-Hong Huang + 1 more

ABSTRACT This study investigates the effects of self-efficacy on intentions toward information security policy compliance and behaviors in shadow information technology, with self-efficacy being divided into information technology self-efficacy and information security self-efficacy. An experiment was conducted and a total of 83 valid subjects were recruited in this study. Data were collected on the subjects’ behaviors during the experiment, and quantitative data were also collected using a posttest questionnaire. The findings indicated that ITSE and ISSE positively correlated with information security policy (ISP) compliance, suggesting that improving self-efficacy in either aspect will improve ISP compliance intention. However, ISP compliance did not correlate significantly with shadow IT usage, as subjects with high ISP compliance still used shadow IT. Therefore, there was a discrepancy between intention and actual behavior. In practical terms, organizations can use training and education to improve their employees’ self-efficacy in the technically challenging or unfamiliar aspects of IT and ISP compliance, improve their ISP compliance intention, and reduce the possibility of ISP violations, such as shadow IT usage.

  • Research Article
  • Cite Count Icon 3
  • 10.1177/02663821231188823
Workarounds and shadow IT – balancing innovation and risk
  • Jul 12, 2023
  • Business Information Review
  • Martin S White

A significant amount of research has been carried out into the way in which employees use workarounds and shadow IT to cope with the complexity of enterprise applications. There is a similar situation in the use of clinical record applications. However neither qualitative or quantitative survey techniques give any indication of the scale of the adoption of workarounds. In both enterprise and clinical settings workarounds can either introduce a substantial element of corporate risk or provide a basis for process innovation. The research that has been carried out primarily focuses on data-rich processes and little attention has been given to workarounds in a digital workplace where the processes may be significantly more complex that in enterprise data processes

  • Research Article
  • 10.1093/combul/bwad045
Workarounds: The Risks and the Rewards
  • May 17, 2023
  • ITNOW
  • Martin White

Abstract Your most innovative employees may be creating shadow IT solutions to the business problems they face. Martin White, Principal Analyst at SearchResearch Online, takes a tour of these workarounds and considers what they mean for IT leaders.

  • Open Access Icon
  • Research Article
  • 10.1504/ijbir.2023.10063453
The Impact of Training and Awareness on Employee Shadow IT Usage in Developing Economies
  • Jan 1, 2023
  • International Journal of Business Innovation and Research
  • Fariza Hanim Rusly + 2 more

The Impact of Training and Awareness on Employee Shadow IT Usage in Developing Economies

  • Research Article
  • Cite Count Icon 3
  • 10.3917/sim.222.0059
Benefits and Risks of Shadow IT in Health Care: A Narrative Review of the Literature
  • Nov 18, 2022
  • Systèmes d'information & management
  • Paméla Baillette + 2 more

Actuellement, les institutions du domaine de la santé sont confrontées à des pratiques liées à l’informatique parallèle (Shadow IT - SIT) qui permettent aux employés d’améliorer leur efficience grâce à des outils qui complètent les ressources informatiques fournies par l’entreprise. Bien que les pratiques SIT puissent être bénéfiques, elles créent également des vulnérabilités et des points d’accès supplémentaires pour les cybermenaces dans un domaine où les données des patients sont considérées comme sensibles. Cette recherche aborde donc la question suivante : quels sont les intérêts et risques découlant des usages et pratiques relatives à la SIT dans le domaine de la santé ? Basée sur une revue narrative de la littérature comprenant 220 articles, cette recherche met en évidence plusieurs spécificités du contexte de la santé et leur impact sur la recherche relative à l’adoption des TI et aux comportements en matière de sécurité de l’information. En termes de contributions managériales, nous formulons plusieurs propositions pour mieux maîtriser les risques de la SIT comme la sensibilisation des personnels et les solutions ‘zéro confiance’. Nous contribuons également à la littérature académique en soulignant l’intérêt d’un questionnement sur les facteurs spécifiques de l’adoption inversée des TI, le phénomène de la pseudo-conformité et l’impact des techniques de neutralisation. Nous faisons également plusieurs propositions de recherches futures, comme l’étude de l’impact des situations d’urgence sur le comportement des personnels de santé.

  • Research Article
  • 10.1177/2694105820220204003
How to Manage Technical Debt and Shadow IT to Synchronize Digital Strategy
  • Sep 1, 2022
  • Management and Business Review
  • Sunil Mithas + 1 more

The digital transformation of many firms is impeded by misalignment between their IT and business strategies, evidenced by technical debt and shadow IT. Sunil Mithas and Rajiv Kohli explain how companies can overcome these hurdles by investing wisely in information technology.

  • 1
  • 2
  • 3
  • 4
  • 1
  • 2
  • 3
  • 4

Popular topics

  • Latest Artificial Intelligence papers
  • Latest Nursing papers
  • Latest Psychology Research papers
  • Latest Sociology Research papers
  • Latest Business Research papers
  • Latest Marketing Research papers
  • Latest Social Research papers
  • Latest Education Research papers
  • Latest Accounting Research papers
  • Latest Mental Health papers
  • Latest Economics papers
  • Latest Education Research papers
  • Latest Climate Change Research papers
  • Latest Mathematics Research papers

Most cited papers

  • Most cited Artificial Intelligence papers
  • Most cited Nursing papers
  • Most cited Psychology Research papers
  • Most cited Sociology Research papers
  • Most cited Business Research papers
  • Most cited Marketing Research papers
  • Most cited Social Research papers
  • Most cited Education Research papers
  • Most cited Accounting Research papers
  • Most cited Mental Health papers
  • Most cited Economics papers
  • Most cited Education Research papers
  • Most cited Climate Change Research papers
  • Most cited Mathematics Research papers

Latest papers from journals

  • Scientific Reports latest papers
  • PLOS ONE latest papers
  • Journal of Clinical Oncology latest papers
  • Nature Communications latest papers
  • BMC Geriatrics latest papers
  • Science of The Total Environment latest papers
  • Medical Physics latest papers
  • Cureus latest papers
  • Cancer Research latest papers
  • Chemosphere latest papers
  • International Journal of Advanced Research in Science latest papers
  • Communication and Technology latest papers

Latest papers from institutions

  • Latest research from French National Centre for Scientific Research
  • Latest research from Chinese Academy of Sciences
  • Latest research from Harvard University
  • Latest research from University of Toronto
  • Latest research from University of Michigan
  • Latest research from University College London
  • Latest research from Stanford University
  • Latest research from The University of Tokyo
  • Latest research from Johns Hopkins University
  • Latest research from University of Washington
  • Latest research from University of Oxford
  • Latest research from University of Cambridge

Popular Collections

  • Research on Reduced Inequalities
  • Research on No Poverty
  • Research on Gender Equality
  • Research on Peace Justice & Strong Institutions
  • Research on Affordable & Clean Energy
  • Research on Quality Education
  • Research on Clean Water & Sanitation
  • Research on COVID-19
  • Research on Monkeypox
  • Research on Medical Specialties
  • Research on Climate Justice
Discovery logo
FacebookTwitterLinkedinInstagram

Download the FREE App

  • Play store Link
  • App store Link
  • Scan QR code to download FREE App

    Scan to download FREE App

  • Google PlayApp Store
FacebookTwitterTwitterInstagram
  • Universities & Institutions
  • Publishers
  • R Discovery PrimeNew
  • Ask R Discovery
  • Blog
  • Accessibility
  • Topics
  • Journals
  • Open Access Papers
  • Year-wise Publications
  • Recently published papers
  • Pre prints
  • Questions
  • FAQs
  • Contact us
Lead the way for us

Your insights are needed to transform us into a better research content provider for researchers.

Share your feedback here.

FacebookTwitterLinkedinInstagram
Cactus Communications logo

Copyright 2025 Cactus Communications. All rights reserved.

Privacy PolicyCookies PolicyTerms of UseCareers