{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T15:54:26Z","timestamp":1770911666216,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032028662","type":"print"},{"value":"9783032028679","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-02867-9_32","type":"book-chapter","created":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T05:45:32Z","timestamp":1756532732000},"page":"541-557","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["From Temporary Fixes to\u00a0Informed Decisions\u2014Design Echelons for\u00a0Evaluating Workarounds"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-7321-5459","authenticated-orcid":false,"given":"Malte","family":"Reineke","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9581-4602","authenticated-orcid":false,"given":"Bernd","family":"L\u00f6hr","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9693-6240","authenticated-orcid":false,"given":"Agnes","family":"A\u00dfbrock","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3462-0537","authenticated-orcid":false,"given":"Christian","family":"Bartelheimer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4216-3276","authenticated-orcid":false,"given":"Daniel","family":"Beverungen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,31]]},"reference":[{"issue":"1","key":"32_CR1","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.17705\/1CAIS.03455","volume":"34","author":"S Alter","year":"2014","unstructured":"Alter, S.: Theory of workarounds. Commun. Assoc. Inf. Syst. 34(1), 1041\u20131066 (2014). https:\/\/doi.org\/10.17705\/1CAIS.03455","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"32_CR2","unstructured":"Assbrock, A., L\u00f6hr, B., Bartelheimer, C., Beverungen, D.: Workarounds as catalysts for process innovation: a multiple case study on pitfalls and protocols. In: International Conference on Information Systems (ICIS) Proceedings (2024)"},{"key":"32_CR3","doi-asserted-by":"publisher","unstructured":"Bartelheimer, C., L\u00f6hr, B., Reineke, M., A\u00dfbrock, A., Beverungen, D.: Workarounds as a cause of mismatches in business processes\u2014insights from a multiple case study. In: Business & Information Systems Engineering (BISE), pp. 1\u201318 (2025). https:\/\/doi.org\/10.1007\/s12599-025-00943-5","DOI":"10.1007\/s12599-025-00943-5"},{"key":"32_CR4","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1111\/isj.12435","volume":"33","author":"C Bartelheimer","year":"2023","unstructured":"Bartelheimer, C., Wolf, V., Beverungen, D.: Workarounds as generative mechanisms for bottom-up process innovation\u2013insights from a multiple case study. Inf. Syst. J. 33, 1085\u20131150 (2023)","journal-title":"Inf. Syst. J."},{"key":"32_CR5","unstructured":"Beerepoot, I., Van de Weerd, I.: Prevent, redesign, adopt or ignore: improving healthcare using knowledge of workarounds. In: European Conference on Information Systems (ECIS) Proceedings, pp. 1\u201316 (2018)"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Beerepoot, I., van\u00a0de Weerd, I., Reijers, H.A.: The potential of workarounds for improving processes. In: Business Process Management (BPM) Workshop Proceedings, pp. 338\u2013350 (2019)","DOI":"10.1007\/978-3-030-37453-2_28"},{"key":"32_CR7","volume":"58","author":"RM Davison","year":"2021","unstructured":"Davison, R.M., Wong, L.H.M., Ou, C.X., Alter, S.: The coordination of workarounds: insights from responses to misfits between local realities and a mandated global enterprise system. Inf. Manage. 58, 103530 (2021)","journal-title":"Inf. Manage."},{"issue":"4","key":"32_CR8","first-page":"333","volume":"26","author":"S Laumer","year":"2017","unstructured":"Laumer, S., Maier, C., Weitzel, T.: Information quality, user satisfaction, and the manifestation of workarounds: a qualitative and quantitative study of enterprise content management system users. EJIS 26(4), 333\u2013360 (2017)","journal-title":"EJIS"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"L\u00f6hr, B., Bartelheimer, C., K\u00f6hne, F., Nordlohne, S., Alile, D., Latten, A.: Forging the longsword: exaptation and enhancement of the sword framework for workaround detection. In: BPM Workshop Proceedings, pp. 319\u2013331 (2025)","DOI":"10.1007\/978-3-031-78666-2_24"},{"issue":"2","key":"32_CR10","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s10270-014-0420-6","volume":"15","author":"N Outmazgin","year":"2016","unstructured":"Outmazgin, N., Soffer, P.: A process mining-based analysis of business process work-arounds. Softw. Syst. Model. 15(2), 309\u2013323 (2016)","journal-title":"Softw. Syst. Model."},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Outmazgin, N., van\u00a0der Waal, W., Beerepoot, I., Hadar, I., van\u00a0de Weerd, I., Soffer, P.: From automatic workaround detection to process improvement: a case study. In: BPM Forum Proceedings, pp. 372\u2013390 (2023)","DOI":"10.1007\/978-3-031-41623-1_22"},{"issue":"3","key":"32_CR12","doi-asserted-by":"publisher","first-page":"45","DOI":"10.2753\/MIS0742-1222240302","volume":"24","author":"K Peffers","year":"2007","unstructured":"Peffers, K., Tuunanen, T., Rothenberger, M.A., Chatterjee, S.: A design science research methodology for information systems research. JMIS 24(3), 45\u201377 (2007). https:\/\/doi.org\/10.2753\/MIS0742-1222240302","journal-title":"JMIS"},{"key":"32_CR13","unstructured":"Pinto, A.d.V., Ma\u00e7ada, A.C.G., Mallmann, G.L.: Impact of workaround behavior and shadow it usage on individual performance. In: CAPSI Proceedings (2018)"},{"key":"32_CR14","unstructured":"R\u00f6der, N., Wiesche, M., Schermann, M.: A situational perspective on workarounds in it-enabled business processes: a multiple case study. In: ECIS Proceedings (2014)"},{"key":"32_CR15","unstructured":"R\u00f6der, N., Wiesche, M., Schermann, M., Krcmar, H.: Why managers tolerate workarounds - the role of information systems. In: AMCIS Proceedings (2014)"},{"key":"32_CR16","unstructured":"R\u00f6der, N., Wiesche, M., Schermann, M., Krcmar, H.: Workaround aware business process modeling. In: Wirtschaftsinformatik (WI) Proceedings (2015)"},{"issue":"5","key":"32_CR17","first-page":"669","volume":"64","author":"M R\u00f6glinger","year":"2022","unstructured":"R\u00f6glinger, M., et al.: Exogenous shocks and business process management. BISE 64(5), 669\u2013687 (2022)","journal-title":"BISE"},{"key":"32_CR18","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s12599-023-00802-1","volume":"65","author":"P Soffer","year":"2023","unstructured":"Soffer, P., Outmazgin, N., Hadar, I., Tzafrir, S.S.: Why work around the process? Analyzing workarounds through the lens of the theory of planned behavior. BISE 65, 369\u2013389 (2023). https:\/\/doi.org\/10.1007\/s12599-023-00802-1","journal-title":"BISE"},{"issue":"2","key":"32_CR19","doi-asserted-by":"publisher","first-page":"427","DOI":"10.25300\/MISQ\/2023\/16700","volume":"48","author":"T Tuunanen","year":"2024","unstructured":"Tuunanen, T., Winter, R., vom Brocke, J.: Dealing with complexity in design science research: a methodology using design echelons. MIS Q. 48(2), 427\u2013458 (2024). https:\/\/doi.org\/10.25300\/MISQ\/2023\/16700","journal-title":"MIS Q."},{"key":"32_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-023-00846-3","author":"W van der Waal","year":"2024","unstructured":"van der Waal, W., Van de Weerd, I., Beerepoot, I., Lu, X., Kappen, T., Haitjema, S., Reijers, H.A.: Putting the sword to the test: Finding workarounds with process mining. BISE (2024). https:\/\/doi.org\/10.1007\/s12599-023-00846-3","journal-title":"BISE"},{"key":"32_CR21","unstructured":"Vollenberg, C., Plattfaut, R., Coners, A.: How do organizations react to unintended affordances? An ethnography in healthcare. In: ICIS Proceedings (2023)"},{"key":"32_CR22","unstructured":"Van\u00a0de Weerd, I., Vollers, P., Beerepoot, I., Fantinato, M.: Workarounds in retail work systems: prevent, redesign, adopt or ignore? In: ECIS Proceedings (2018)"},{"issue":"6","key":"32_CR23","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1002\/joom.1267","volume":"69","author":"S Wei","year":"2023","unstructured":"Wei, S., Chen, X., Rice, R.E.: We can work it out: a multilevel examination of relationships among group and individual technology workarounds, and performance. J. Oper. Manag. 69(6), 1008\u20131038 (2023). https:\/\/doi.org\/10.1002\/joom.1267","journal-title":"J. Oper. Manag."},{"issue":"1","key":"32_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2023.100163","volume":"3","author":"F Wijnhoven","year":"2023","unstructured":"Wijnhoven, F., Hoffmann, P., Bemthuis, R., Boksebeld, J.: Using process mining for workarounds analysis in context: learning from a small and medium-sized company case. Int. J. Inf. Manage. Data Insights 3(1), 100163 (2023). https:\/\/doi.org\/10.1016\/j.jjimei.2023.100163","journal-title":"Int. J. Inf. Manage. Data Insights"},{"issue":"3","key":"32_CR25","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1111\/isj.12315","volume":"31","author":"ED Zamani","year":"2020","unstructured":"Zamani, E.D., Pouloudi, N.: Generative mechanisms of workarounds, discontinuance and reframing: a study of negative disconfirmation with consumerised it. Inf. Syst. J. 31(3), 384\u2013428 (2020). https:\/\/doi.org\/10.1111\/isj.12315","journal-title":"Inf. Syst. J."}],"container-title":["Lecture Notes in Computer Science","Business Process Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-02867-9_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T05:39:40Z","timestamp":1757482780000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-02867-9_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,31]]},"ISBN":["9783032028662","9783032028679"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-02867-9_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,31]]},"assertion":[{"value":"31 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Process Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seville","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bpm2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.bpm2025seville.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}