{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T15:54:22Z","timestamp":1770911662691,"version":"3.50.1"},"publisher-location":"Cham","reference-count":65,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030374525","type":"print"},{"value":"9783030374532","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-37453-2_28","type":"book-chapter","created":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T23:03:04Z","timestamp":1578006184000},"page":"338-350","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["The Potential of Workarounds for Improving Processes"],"prefix":"10.1007","author":[{"given":"Iris","family":"Beerepoot","sequence":"first","affiliation":[]},{"given":"Inge","family":"van de Weerd","sequence":"additional","affiliation":[]},{"given":"Hajo A.","family":"Reijers","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,3]]},"reference":[{"key":"28_CR1","first-page":"1041","volume":"34","author":"S Alter","year":"2014","unstructured":"Alter, S.: Theory of workarounds. Commun. Assoc. Inf. Syst. 34, 1041\u20131066 (2014)","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"28_CR2","doi-asserted-by":"publisher","first-page":"147","DOI":"10.2307\/23043493","volume":"35","author":"PM Leonardi","year":"2011","unstructured":"Leonardi, P.M.: When flexible routines meet flexible technologies: affordance, constraint, and the imbrication of human and material agencies. MIS Q. 35, 147\u2013167 (2011)","journal-title":"MIS Q."},{"key":"28_CR3","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1057\/ejis.2008.14","volume":"17","author":"B Azad","year":"2008","unstructured":"Azad, B., King, N.: Enacting computer workaround practices within a medication dispensing system. Eur. J. Inf. Syst. 17, 264\u2013278 (2008)","journal-title":"Eur. J. Inf. Syst."},{"key":"28_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1287\/orsc.1040.0103","volume":"16","author":"M-C Boudreau","year":"2005","unstructured":"Boudreau, M.-C., Robey, D.: Enacting integrated information technology: a human agency perspective. Organ. Sci. 16, 3\u201318 (2005)","journal-title":"Organ. Sci."},{"key":"28_CR5","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1097\/HMR.0b013e3181d116c2","volume":"35","author":"JRB Halbesleben","year":"2010","unstructured":"Halbesleben, J.R.B., Savage, G.T., Wakefield, D.S., Wakefield, B.J.: Rework and workarounds in nurse medication administration process: implications for work processes and patient safety. Health Care Manag. Rev. 35, 124\u2013133 (2010)","journal-title":"Health Care Manag. Rev."},{"key":"28_CR6","unstructured":"R\u00f6der, N., Wiesche, M., Schermann, M., Krcmar, H.: Workaround aware business process modeling. In: Wirtschaftsinformatik, pp. 482\u2013496 (2015)"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Azad, B., King, N.: Rethinking how computer workarounds emerge: taking workarounds seriously but not negatively. In: Academy of Management Proceedings (2017)","DOI":"10.5465\/AMBPP.2017.276"},{"key":"28_CR8","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1136\/bmjqs-2015-005149","volume":"26","author":"KM Cresswell","year":"2017","unstructured":"Cresswell, K.M., Mozaffar, H., Lee, L., Williams, R., Sheikh, A.: Workarounds to hospital electronic prescribing systems: a qualitative study in English hospitals. BMJ Qual Saf. 26, 542\u2013551 (2017)","journal-title":"BMJ Qual Saf."},{"key":"28_CR9","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1108\/09513540410522234","volume":"18","author":"LA Petrides","year":"2004","unstructured":"Petrides, L.A., McClelland, S.I., Nodine, T.R.: Costs and benefits of the workaround: inventive solution or costly alternative. Int. J. Educ. Manag. 18, 100\u2013108 (2004)","journal-title":"Int. J. Educ. Manag."},{"key":"28_CR10","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.mnl.2010.05.009","volume":"8","author":"C Lalley","year":"2010","unstructured":"Lalley, C., Malloch, K.: Workarounds: The hidden pathway to excellence. Nurse Lead. 8, 29\u201332 (2010)","journal-title":"Nurse Lead."},{"key":"28_CR11","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1057\/ejis.2011.48","volume":"21","author":"B Azad","year":"2012","unstructured":"Azad, B., King, N.: Institutionalized computer workaround practices in a Mediterranean country: an examination of two organizations. Eur. J. Inf. Syst. 21, 358\u2013372 (2012)","journal-title":"Eur. J. Inf. Syst."},{"key":"28_CR12","unstructured":"Safadi, H., Faraj, S.: The role of workarounds during an OpenSource Electronic Medical Record System Implementation. In: ICIS, p. 47 (2010)"},{"key":"28_CR13","unstructured":"Kitchenham, B., Charters, S.: Guidelines for performing systematic literature reviews in software engineering, vol. 5. Technical report, Ver. 2.3 EBSE Technical Report. EBSE (2007)"},{"key":"28_CR14","unstructured":"Webster, J., Watson, R.T.: Analyzing the past to prepare for the future: Writing a literature review. MIS Q. xiii\u2013xxiii (2002)"},{"key":"28_CR15","doi-asserted-by":"crossref","first-page":"9","DOI":"10.17705\/1CAIS.03709","volume":"37","author":"J Vom Brocke","year":"2015","unstructured":"Vom Brocke, J., Simons, A., Riemer, K., Niehaves, B., Plattfaut, R., Cleven, A.: Standing on the Shoulders of Giants. CAIS. 37, 9 (2015)","journal-title":"CAIS."},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Dunford, B.B., Perrigino, M.B.: The organization made us do it: demanding formalization and workaround attributions. Academy of Management Proceedings, vol. 2015, pp. 17443\u201317443 (2015)","DOI":"10.5465\/ambpp.2015.237"},{"key":"28_CR17","volume-title":"To Do No Harm: Ensuring Patient Safety in Health Care Organizations","author":"JM Morath","year":"2005","unstructured":"Morath, J.M., Turnbull, J.E.: To Do No Harm: Ensuring Patient Safety in Health Care Organizations. Wiley, San Francisco (2005)"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Zhou, X., Ackerman, M., Zheng, K.: CPOE workarounds, boundary objects, and assemblages. In: Proceedings of the SIGCHI Conference on Human Factors Computing System, pp. 3353\u20133362 (2011)","DOI":"10.1145\/1978942.1979439"},{"key":"28_CR19","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-642-36285-9_45","volume-title":"Business Process Management Workshops","author":"N Outmazgin","year":"2013","unstructured":"Outmazgin, N.: Exploring workaround situations in business processes. In: La Rosa, M., Soffer, P. (eds.) BPM 2012. LNBIP, vol. 132, pp. 426\u2013437. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36285-9_45"},{"key":"28_CR20","first-page":"79","volume":"31","author":"S Zimmermann","year":"2017","unstructured":"Zimmermann, S., Rentrop, C., Felden, C.: A multiple case study on the nature and management of shadow information technology. J. Inf. Syst. 31, 79\u2013101 (2017)","journal-title":"J. Inf. Syst."},{"key":"28_CR21","unstructured":"Nadhrah, N., Michell, V.: A normative method to analyse workarounds in a healthcare environment: motivations, consequences, and constraints (2013)"},{"key":"28_CR22","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1111\/isj.12123","volume":"27","author":"A Spierings","year":"2017","unstructured":"Spierings, A., Kerr, D., Houghton, L.: Issues that support the creation of ICT workarounds: towards a theoretical understanding of feral information systems. Inf. Syst. J. 27, 775\u2013794 (2017)","journal-title":"Inf. Syst. J."},{"key":"28_CR23","unstructured":"Alter, S.: Beneficial noncompliance and detrimental compliance: expected paths to unintended consequences. In: AMCIS (2015)"},{"key":"28_CR24","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.ipm.2012.05.003","volume":"49","author":"S Huuskonen","year":"2013","unstructured":"Huuskonen, S., Vakkari, P.: I Did It My Way: Social workers as secondary designers of a client information system. Inf. Process. Manag. 49, 380\u2013391 (2013)","journal-title":"Inf. Process. Manag."},{"key":"28_CR25","unstructured":"Reiz, A., Gewald, H.: Physicians\u2019 resistance towards information systems in healthcare: the case of workarounds. In: PACIS, p. 12 (2016)"},{"key":"28_CR26","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-319-25897-3_10","volume-title":"The Practice of Enterprise Modeling","author":"J Barata","year":"2015","unstructured":"Barata, J., da Cunha, P.R., Abrantes, L.: Dealing with risks and workarounds: a guiding framework. In: Ralyt\u00e9, J., Espa\u00f1a, S., Pastor, \u00d3. (eds.) PoEM 2015. LNBIP, vol. 235, pp. 141\u2013155. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-25897-3_10"},{"key":"28_CR27","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1177\/1356262214556550","volume":"20","author":"A Blandford","year":"2014","unstructured":"Blandford, A., Furniss, D., Vincent, C.: Patient safety and interactive medical devices: Realigning work as imagined and work as done. Clin. Risk. 20, 107\u2013110 (2014)","journal-title":"Clin. Risk."},{"key":"28_CR28","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1111\/isj.12090","volume":"26","author":"JAA Van Beijsterveld","year":"2016","unstructured":"Van Beijsterveld, J.A.A., Van Groenendaal, W.J.H.: Solving misfits in ERP implementations by SMEs. Inf. Syst. J. 26, 369\u2013393 (2016)","journal-title":"Inf. Syst. J."},{"key":"28_CR29","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1108\/IJAIM-09-2015-0059","volume":"24","author":"DM Drum","year":"2016","unstructured":"Drum, D.M., Pernsteiner, A.J., Revak, A.: Walking a mile in their shoes: user workarounds in a SAP environment. Int. J. Account. Inf. Manag. 24, 185\u2013204 (2016)","journal-title":"Int. J. Account. Inf. Manag."},{"key":"28_CR30","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.ijhcs.2011.08.002","volume":"70","author":"Z Yang","year":"2012","unstructured":"Yang, Z., Ng, B.-Y., Kankanhalli, A., Yip, J.W.L.: Workarounds in the use of IS in healthcare. Int. J. Hum Comput Stud. 70, 43\u201365 (2012)","journal-title":"Int. J. Hum Comput Stud."},{"key":"28_CR31","unstructured":"Koppel, R., Smith, S.W., Blythe, J., Kothari, V.: Workarounds to computer access in healthcare organizations: you want my password or a dead patient? In: ITCH. pp. 215\u2013220 (2015)"},{"key":"28_CR32","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1016\/j.iccn.2004.12.003","volume":"21","author":"P Carayon","year":"2005","unstructured":"Carayon, P., G\u00fcrses, A.P.: A human factors engineering conceptual framework of nursing workload and patient safety in intensive care units. Intensive Crit. Care Nurs. 21, 284\u2013301 (2005)","journal-title":"Intensive Crit. Care Nurs."},{"key":"28_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2656213","volume":"22","author":"SY Park","year":"2015","unstructured":"Park, S.Y., Chen, Y., Rudkin, S.: Technological and organizational adaptation of EMR implementation in an Emergency Department. ACM Trans. Comput. Interact. 22, 1 (2015)","journal-title":"ACM Trans. Comput. Interact."},{"key":"28_CR34","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1057\/palgrave.ejis.3000629","volume":"15","author":"EH Ferneley","year":"2006","unstructured":"Ferneley, E.H., Sobreperez, P.: Resist, comply or workaround? An examination of different facets of user engagement with information systems. Eur. J. Inf. Syst. 15, 345\u2013356 (2006)","journal-title":"Eur. J. Inf. Syst."},{"key":"28_CR35","doi-asserted-by":"crossref","unstructured":"Kobayashi, M., Fussell, S.R., Xiao, Y., Seagull, F.J.: Work coordination, workflow, and workarounds in a medical context. In: CHI 2005 Extended Abstracts on Human Factors in Computing Systems, pp. 1561\u20131564 (2005)","DOI":"10.1145\/1056808.1056966"},{"key":"28_CR36","doi-asserted-by":"crossref","unstructured":"Saleem, J.J., et al.: Paper persistence and computer-based workarounds with the electronic health record in primary care. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, pp. 660\u2013664 (2011)","DOI":"10.1177\/1071181311551136"},{"key":"28_CR37","first-page":"290","volume":"169","author":"H Van Der Sijs","year":"2011","unstructured":"Van Der Sijs, H., Rootjes, I., Aarts, J.: The shift in workarounds upon implementation of computerized physician order entry. Stud. Health Technol. Inform. 169, 290 (2011)","journal-title":"Stud. Health Technol. Inform."},{"key":"28_CR38","unstructured":"Brooks, J., Ravishankar, M.-N., Oshri, I.: Regulating Vendor-Client Workarounds: An Information Brokering Approach (2015)"},{"key":"28_CR39","first-page":"137","volume":"29","author":"DM Drum","year":"2015","unstructured":"Drum, D.M., Standifer, R., Bourne, K.: Facing the consequences: examining a workaround outcomes-based model. J. Inf. Syst. 29, 137\u2013159 (2015)","journal-title":"J. Inf. Syst."},{"key":"28_CR40","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1016\/j.jbusres.2011.02.020","volume":"65","author":"AR Wheeler","year":"2012","unstructured":"Wheeler, A.R., Halbesleben, J.R.B., Harris, K.J.: How job-level HRM effectiveness influences employee intent to turnover and workarounds in hospitals. J. Bus. Res. 65, 547\u2013554 (2012)","journal-title":"J. Bus. Res."},{"key":"28_CR41","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.jom.2015.07.008","volume":"39","author":"B Morrison","year":"2015","unstructured":"Morrison, B.: The problem with workarounds is that they work: the persistence of resource shortages. J. Oper. Manag. 39, 79\u201391 (2015)","journal-title":"J. Oper. Manag."},{"key":"28_CR42","doi-asserted-by":"publisher","first-page":"1004","DOI":"10.1080\/10410236.2016.1196422","volume":"32","author":"AK Barrett","year":"2017","unstructured":"Barrett, A.K., Stephens, K.K.: Making Electronic Health Records (EHRs) work: informal talk and workarounds in healthcare organizations. Health Commun. 32, 1004\u20131013 (2017)","journal-title":"Health Commun."},{"key":"28_CR43","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1097\/JCE.0000000000000142","volume":"41","author":"S Waheed","year":"2016","unstructured":"Waheed, S.: Identifying medical device workarounds in the hospital and reporting them to the US food and drug administration. J. Clin. Eng. 41, 30\u201332 (2016)","journal-title":"J. Clin. Eng."},{"key":"28_CR44","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1108\/ICS-02-2016-0017","volume":"25","author":"R Woltjer","year":"2017","unstructured":"Woltjer, R.: Workarounds and trade-offs in information security \u2013 an exploratory study. Inf. Comput. Secur. 25, 402\u2013420 (2017)","journal-title":"Inf. Comput. Secur."},{"key":"28_CR45","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/j.annemergmed.2013.10.035","volume":"63","author":"RL Wears","year":"2014","unstructured":"Wears, R.L., Hettinger, A.Z.: The tragedy of adaptability. Ann. Emerg. Med. 63, 338\u2013339 (2014)","journal-title":"Ann. Emerg. Med."},{"key":"28_CR46","unstructured":"Sobreperez, P., Ferneley, E.H., Wilson, F.: Tricks or trompe l\u2019oeil? An examination workplace resistance in an information rich managerial environment. In: ECIS, Regensburg (2005)"},{"key":"28_CR47","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/978-3-319-19237-6_31","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"S Alter","year":"2015","unstructured":"Alter, S.: A workaround design system for anticipating, designing, and\/or preventing workarounds. In: Gaaloul, K., Schmidt, R., Nurcan, S., Guerreiro, S., Ma, Q. (eds.) CAISE 2015. LNBIP, vol. 214, pp. 489\u2013498. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19237-6_31"},{"key":"28_CR48","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.ijinfomgt.2015.06.004","volume":"35","author":"J Malaurent","year":"2015","unstructured":"Malaurent, J., Avison, D.: From an apparent failure to a success story: ERP in China - Post implementation. Int. J. Inf. Manag. 35, 643\u2013646 (2015)","journal-title":"Int. J. Inf. Manag."},{"key":"28_CR49","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-38484-4_5","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"N Outmazgin","year":"2013","unstructured":"Outmazgin, N., Soffer, P.: Business process workarounds: what can and cannot be detected by process mining. In: Nurcan, S., Proper, Henderik A., Soffer, P., Krogstie, J., Schmidt, R., Halpin, T., Bider, I. (eds.) BPMDS\/EMMSAD -2013. LNBIP, vol. 147, pp. 48\u201362. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38484-4_5"},{"key":"28_CR50","doi-asserted-by":"publisher","first-page":"832","DOI":"10.4338\/ACI-2016-01-RA-0007","volume":"7","author":"JW Blaz","year":"2016","unstructured":"Blaz, J.W., Doig, A.K., Cloyes, K.G., Staggers, N.: The hidden lives of nurses\u2019 cognitive artifacts. Appl. Clin. Inform. 7, 832\u2013849 (2016)","journal-title":"Appl. Clin. Inform."},{"key":"28_CR51","doi-asserted-by":"crossref","unstructured":"Park, S.Y., Chen, Y.: Adaptation as design: Learning from an EMR deployment study. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2097\u20132106. Austin, TX (2012)","DOI":"10.1145\/2207676.2208361"},{"key":"28_CR52","doi-asserted-by":"crossref","unstructured":"R\u00f6der, N., Wiesche, M., Schermann, M., Krcmar, H.: Toward an ontology of workarounds: a literature review on existing concepts. In: Proceedings of the Annual Hawaii International Conference on System Sciences, pp. 5177\u20135186. IEEE Computer Society (2016)","DOI":"10.1109\/HICSS.2016.640"},{"key":"28_CR53","doi-asserted-by":"crossref","unstructured":"Alter, S.: Engineering enterprises for emergent change. In: Proceedings - IEEE Conference on Business Informatics, CBI, pp. 113\u2013123. Institute of Electrical and Electronics Engineers Inc. (2014)","DOI":"10.1109\/CBI.2014.35"},{"key":"28_CR54","unstructured":"Gasparas, J., Monteiro, E.: Cross-contextual use of integrated information systems. In: ECIS (2009)"},{"key":"28_CR55","unstructured":"R\u00f6der, N., Wiesche, M., Schermann, M.: A situational perspective on workarounds in IT-enabled business processes: a multiple case study (2014)"},{"key":"28_CR56","unstructured":"Ali, M., Cornford, T., Klecun, E.: Exploring control in health information systems implementation. In: Studies Health Technology Informatics, pp. 681\u2013685. Cape Town (2010)"},{"key":"28_CR57","doi-asserted-by":"publisher","first-page":"1668","DOI":"10.1016\/j.apergo.2014.05.012","volume":"45","author":"D Furniss","year":"2014","unstructured":"Furniss, D., Masci, P., Curzon, P., Mayer, A., Blandford, A.: 7 Themes for guiding situated ergonomic assessments of medical devices. Appl. Ergon. 45, 1668\u20131677 (2014)","journal-title":"Appl. Ergon."},{"key":"28_CR58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining","author":"WMP Van der Aalst","year":"2011","unstructured":"Van der Aalst, W.M.P.: Process Mining. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19345-3"},{"key":"28_CR59","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1108\/JAOC-05-2015-0040","volume":"13","author":"DM Drum","year":"2017","unstructured":"Drum, D.M., Pernsteiner, A., Revak, A.: Workarounds in an SAP environment: impacts on accounting information quality. J. Account. Organ. Chang. 13, 44\u201364 (2017)","journal-title":"J. Account. Organ. Chang."},{"key":"28_CR60","doi-asserted-by":"publisher","first-page":"1124","DOI":"10.1287\/mnsc.2015.2170","volume":"62","author":"AL Tucker","year":"2016","unstructured":"Tucker, A.L.: The impact of workaround difficulty on frontline employees\u2019 response to operational failures: a laboratory experiment on medication administration. Manag. Sci. 62, 1124\u20131144 (2016)","journal-title":"Manag. Sci."},{"key":"28_CR61","doi-asserted-by":"crossref","unstructured":"Hustad, E., Olsen, D.H.: ERP post-implementation issues in small-and-medium-sized enterprises (2011)","DOI":"10.1007\/978-3-642-24358-5_29"},{"key":"28_CR62","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1177\/1098214011405505","volume":"32","author":"D Campbell","year":"2011","unstructured":"Campbell, D.: Policy workaround stories are valuable evaluative indicators: but should they be told? Am. J. Eval. 32, 408\u2013417 (2011)","journal-title":"Am. J. Eval."},{"key":"28_CR63","doi-asserted-by":"crossref","unstructured":"Vieru, D., Arduin, P.-E.: Sharing knowledge in a shared services center context: an explanatory case study of the dialectics of formal and informal practices (2016)","DOI":"10.1007\/978-3-319-47009-2_2"},{"key":"28_CR64","doi-asserted-by":"crossref","unstructured":"Zimmermann, S., Rentrop, C., Felden, C.: Governing IT activities in business workgroups\u2014design principles for a method to control identified shadow IT (2016)","DOI":"10.1007\/978-3-319-39426-8_20"},{"key":"28_CR65","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A Rozinat","year":"2008","unstructured":"Rozinat, A., Van der Aalst, W.M.P.: Conformance checking of processes based on monitoring real behavior. Inf. Syst. 33, 64\u201395 (2008)","journal-title":"Inf. Syst."}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37453-2_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T00:11:18Z","timestamp":1735863078000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-37453-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030374525","9783030374532"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37453-2_28","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"3 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Process Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vienna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bpm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bpm2019.ai.wu.ac.at\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"In addition, 13 papers were published from the BPM forum and 60 from the BPM Workshops","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}