Which of the following is the BEST method for uncovering shadow IT within an organization?