Which of the following relets to applications and systems that are used within an organization without consent or approval?