{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T20:39:19Z","timestamp":1769546359823,"version":"3.49.0"},"reference-count":101,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T00:00:00Z","timestamp":1600387200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T00:00:00Z","timestamp":1600387200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s10796-020-10067-8","type":"journal-article","created":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T19:02:31Z","timestamp":1600455751000},"page":"97-119","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Appropriating Information Technology Artefacts through Trial and Error: The Case of the Tablet"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3110-7495","authenticated-orcid":false,"given":"Efpraxia D.","family":"Zamani","sequence":"first","affiliation":[]},{"given":"Nancy","family":"Pouloudi","sequence":"additional","affiliation":[]},{"given":"George M.","family":"Giaglis","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Wareham","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,18]]},"reference":[{"issue":"1","key":"10067_CR1","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1287\/isre.2014.0564","volume":"26","author":"R Aggarwal","year":"2015","unstructured":"Aggarwal, R., Kryscynski, D., Midha, V., Singh, H. (2015). Early to adopt and early to discontinue: The impact of self-perceived and actual IT knowledge on technology use behaviors of end users. Information Systems Research 26 (1), 127\u2013144. https:\/\/doi.org\/10.1287\/isre.2014.0564.","journal-title":"Information Systems Research"},{"issue":"3","key":"10067_CR2","doi-asserted-by":"publisher","first-page":"427","DOI":"10.2307\/25148691","volume":"29","author":"MK Ahuja","year":"2005","unstructured":"Ahuja, M. K., & Thatcher, J. B. (2005). Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on post-adoption information technology use. MIS Quarterly: Management Information Systems, 29(3), 427\u2013459.","journal-title":"MIS Quarterly: Management Information Systems"},{"key":"10067_CR3","unstructured":"Alblas, A. A., & Langerak, F. (2015). The impact of design debugging on new product development speed: The significance of improvisational and trial-and-error learning. POMS 26th Annual Conference - Production and Operations Management Society (POMS). POMS 26th Annual Conference - Production and Operations Management Society (POMS), Washington D.C., USA."},{"key":"10067_CR4","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.17705\/1CAIS.03455","volume":"34","author":"S Alter","year":"2014","unstructured":"Alter, S. (2014). Theory of workarounds. Communications of the Association for Information Systems, 34, 1041\u20131066.","journal-title":"Communications of the Association for Information Systems"},{"issue":"3","key":"10067_CR5","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1057\/ejis.2008.14","volume":"17","author":"B Azad","year":"2008","unstructured":"Azad, B., & King, N. (2008). Enacting computer workaround practices within a medication dispensing system. European Journal of Information Systems, 17(3), 264\u2013278.","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"10067_CR6","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1057\/ejis.2011.48","volume":"21","author":"B Azad","year":"2011","unstructured":"Azad, B., & King, N. (2011). Institutionalized computer workaround practices in a Mediterranean country: An examination of two organizations. European Journal of Information Systems, 21(4), 358\u2013372.","journal-title":"European Journal of Information Systems"},{"issue":"7","key":"10067_CR7","doi-asserted-by":"publisher","first-page":"361","DOI":"10.17705\/1jais.00367","volume":"15","author":"FF Bagayogo","year":"2014","unstructured":"Bagayogo, F. F., Lapointe, L., & Bassellier, G. (2014). Enhanced use of IT: A new perspective on post-adoption. Journal of the Association of Information Systems, 15(7), 361\u2013387.","journal-title":"Journal of the Association of Information Systems"},{"issue":"2","key":"10067_CR8","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1287\/isre.1070.0122","volume":"18","author":"H Barki","year":"2007","unstructured":"Barki, H., Titah, R., & Boffo, C. (2007). Information system use\u2013related activity: An expanded Behavioral conceptualization of individual-level information system use. Information Systems Research, 18(2), 173\u2013192. https:\/\/doi.org\/10.1287\/isre.1070.0122.","journal-title":"Information Systems Research"},{"issue":"4","key":"10067_CR9","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1057\/ejis.2014.10","volume":"24","author":"T Barnett","year":"2015","unstructured":"Barnett, T., Pearson, A. W., Pearson, R., & Kellermanns, F. W. (2015). Five-factor model personality traits as predictors of perceived and actual usage of technology. European Journal of Information Systems, 24(4), 374\u2013390. https:\/\/doi.org\/10.1057\/ejis.2014.10.","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"10067_CR10","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1108\/ITP-01-2016-0023","volume":"31","author":"AK Barrett","year":"2018","unstructured":"Barrett, A. K. (2018). Technological appropriations as workarounds: Integrating electronic health records and adaptive structuration theory research. Information Technology & People, 31(2), 368\u2013387. https:\/\/doi.org\/10.1108\/ITP-01-2016-0023.","journal-title":"Information Technology & People"},{"issue":"1","key":"10067_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1287\/isre.10.1.1","volume":"10","author":"M Barrett","year":"1999","unstructured":"Barrett, M., & Walsham, G. (1999). Electronic trading and work transformation in the London insurance market. Information Systems Research, 10(1), 1\u201322.","journal-title":"Information Systems Research"},{"key":"10067_CR12","unstructured":"Beaudry, A., & Pinsonneault, A. (1998). Appropriation of information technology: A requisite for improved individual performance. Americas Conference on Information Systems (AMCIS 1998). http:\/\/aisel.aisnet.org\/amcis1998\/238"},{"issue":"3","key":"10067_CR13","doi-asserted-by":"publisher","first-page":"493","DOI":"10.2307\/25148693","volume":"29","author":"A Beaudry","year":"2005","unstructured":"Beaudry, A., & Pinsonneault, A. (2005). Understanding user responses to information technology: A coping model of user adaptation. MIS Quarterly, 29(3), 493\u2013524.","journal-title":"MIS Quarterly"},{"key":"10067_CR14","doi-asserted-by":"publisher","unstructured":"Bhattacherjee, A., & Premkumar, G. (2004). Understanding changes in belief and attitude toward information technology usage: A theoretical model and longitudinal test. MIS Quarterly, 28(2), 229\u2013254. https:\/\/doi.org\/10.2307\/25148634.","DOI":"10.2307\/25148634"},{"issue":"3","key":"10067_CR15","doi-asserted-by":"publisher","first-page":"351","DOI":"10.2307\/3250921","volume":"25","author":"\u0391 Bhattacherjee","year":"2001","unstructured":"Bhattacherjee, \u0391. (2001). Understhanding information systems continuance: An expectation confirmation model. MIS Quarterly, 25(3), 351\u2013370.","journal-title":"MIS Quarterly"},{"key":"10067_CR16","unstructured":"Bishop, B. (2013). Blogging platform Posterous to shut down on April 30th. The Verge. https:\/\/www.theverge.com\/2013\/2\/15\/3993770\/blogging-platform-posterous-to-shut-down-on-april-30th"},{"issue":"1","key":"10067_CR17","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1287\/orsc.1040.0103","volume":"16","author":"M-C Boudreau","year":"2005","unstructured":"Boudreau, M.-C., & Robey, D. (2005). Enacting integrated information technology: A human agency perspective. Organization Science, 16(1), 3\u201318.","journal-title":"Organization Science"},{"key":"10067_CR18","doi-asserted-by":"publisher","unstructured":"Brohman, K., Addas, S., Dixon, J., & Pinsonneault, A. (2020). Cascading feedback: A longitudinal study of a feedback ecosystem for Telemonitoring patients with chronic disease. MIS Quarterly, 44(1), 421\u2013450. https:\/\/doi.org\/10.25300\/MISQ\/2020\/15089.","DOI":"10.25300\/MISQ\/2020\/15089"},{"issue":"3","key":"10067_CR19","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1287\/isre.1060.0096","volume":"17","author":"A Burton-Jones","year":"2006","unstructured":"Burton-Jones, A., & Straub, D. W. (2006). Reconceptualizing system usage: An approach and empirical test. Information Systems Research, 17(3), 228\u2013246. https:\/\/doi.org\/10.1287\/isre.1060.0096.","journal-title":"Information Systems Research"},{"key":"10067_CR20","doi-asserted-by":"publisher","unstructured":"Carroll, J., & Fidock, J. (2011). Beyond resistance to technology appropriation. 44th Hawaii international conference on system sciences (HICSS 44), 1\u20139. https:\/\/doi.org\/10.1109\/HICSS.2011.82.","DOI":"10.1109\/HICSS.2011.82"},{"key":"10067_CR21","unstructured":"Charmaz, K. (2006). Constructing grounded theory. A Practical Guide through Qualitative Analysis. SAGE Publications."},{"issue":"3","key":"10067_CR22","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1080\/07421222.2015.1099180","volume":"32","author":"S Chatterjee","year":"2015","unstructured":"Chatterjee, S., Moody, G., Lowry, P. B., Chakraborty, S., & Hardin, A. (2015). Strategic relevance of organizational virtues enabled by information Technology in Organizational Innovation. Journal of Management Information Systems, 32(3), 158\u2013196. https:\/\/doi.org\/10.1080\/07421222.2015.1099180.","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"10067_CR23","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1057\/jit.2016.9","volume":"31","author":"J Choudrie","year":"2016","unstructured":"Choudrie, J., Zamani, E. D., Krepel, B., & Stewart, M. \u0391. (2016). Understanding individual user resistance and workarounds of Enterprise social networks: The case of service ltd. Journal of Information Technology, 31(2), 130\u2013151. https:\/\/doi.org\/10.1057\/jit.2016.9.","journal-title":"Journal of Information Technology"},{"issue":"3","key":"10067_CR24","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.im.2018.08.001","volume":"56","author":"X Chu","year":"2019","unstructured":"Chu, X., Luo, X. R., & Chen, Y. (2019). A systematic review on cross-cultural information systems research: Evidence from the last decade. Information & Management, 56(3), 403\u2013417. https:\/\/doi.org\/10.1016\/j.im.2018.08.001.","journal-title":"Information & Management"},{"key":"10067_CR25","doi-asserted-by":"publisher","unstructured":"Ciborra, C. (1999). Notes on improvisation and time in organizations. Accounting, Management and Information Technologies, 9(2), 77\u201394. https:\/\/doi.org\/10.1016\/S0959-8022(99)00002-8.","DOI":"10.1016\/S0959-8022"},{"key":"10067_CR26","unstructured":"Ciborra, C. (2002). The labyrinths of information: Challenging the wisdom of systems. Oxford University Press."},{"key":"10067_CR27","doi-asserted-by":"crossref","unstructured":"Clark, P. A. (1987). Anglo-American innovation. Walter de Gruyter GmbH & Co KG.","DOI":"10.1515\/9783110857504"},{"key":"10067_CR28","doi-asserted-by":"publisher","unstructured":"Costall, A. (1993). How Lloyd Morgan\u2019s canon backfired. Journal of the History of the Behavioral Sciences, 29(2), 113\u2013122. https:\/\/doi.org\/10.1002\/1520-6696(199304)29:2<113::AID-JHBS2300290203>3.0.CO;2-G.","DOI":"10.1002\/1520-6696"},{"issue":"3","key":"10067_CR29","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.im.2017.08.005","volume":"55","author":"WA Cram","year":"2018","unstructured":"Cram, W. A., & Marabelli, M. (2018). Have your cake and eat it too? Simultaneously pursuing the knowledge-sharing benefits of agile and traditional development approaches. Information & Management, 55(3), 322\u2013339. https:\/\/doi.org\/10.1016\/j.im.2017.08.005.","journal-title":"Information & Management"},{"issue":"3","key":"10067_CR30","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1007\/s10796-018-9879-y","volume":"22","author":"YM Dang","year":"2020","unstructured":"Dang, Y. M., Zhang, Y. G., Brown, S. A., & Chen, H. (2020). Examining the impacts of mental workload and task-technology fit on user acceptance of the social media search system. Information Systems Frontiers, 22(3), 697\u2013718. https:\/\/doi.org\/10.1007\/s10796-018-9879-y.","journal-title":"Information Systems Frontiers"},{"issue":"4","key":"10067_CR31","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1007\/s10796-017-9796-5","volume":"21","author":"D Dang-Pham","year":"2019","unstructured":"Dang-Pham, D., Pittayachawan, S., Bruno, V., & Kautz, K. (2019). Investigating the diffusion of IT consumerization in the workplace: A case study using social network analysis. Information Systems Frontiers, 21(4), 941\u2013955. https:\/\/doi.org\/10.1007\/s10796-017-9796-5.","journal-title":"Information Systems Frontiers"},{"key":"10067_CR32","doi-asserted-by":"crossref","unstructured":"Davis, F. D., Bagozzi, R. . P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982\u20131003.","DOI":"10.1287\/mnsc.35.8.982"},{"issue":"3","key":"10067_CR33","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1057\/jit.2015.19","volume":"31","author":"RM Davison","year":"2016","unstructured":"Davison, R. M., & Martinsons, M. G. (2016). Context is king! Considering particularism in research design and reporting. Journal of Information Technology, 31(3), 241\u2013249. https:\/\/doi.org\/10.1057\/jit.2015.19.","journal-title":"Journal of Information Technology"},{"issue":"2","key":"10067_CR34","first-page":"167","volume":"25","author":"AR Dennis","year":"2001","unstructured":"Dennis, A. R., Wixom, B. H., & Vandenberg, R. J. (2001). Understanding Fit and Appropriation Effects in Group Support Systems via Meta-Analysis., 25(2), 167\u2013193.","journal-title":"Understanding Fit and Appropriation Effects in Group Support Systems via Meta-Analysis."},{"key":"10067_CR35","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1287\/orsc.5.2.121","volume":"5","author":"G DeSanctis","year":"1994","unstructured":"DeSanctis, G., & Poole, M. S. (1994). Capturing the complexity in advanced technology use: Adaptive structuration theory. Organization Science, 5, 121\u2013147.","journal-title":"Organization Science"},{"issue":"2","key":"10067_CR36","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1108\/ITP-11-2017-0378","volume":"32","author":"MS Doargajudhur","year":"2019","unstructured":"Doargajudhur, M. S., & Dell, P. (2019). Impact of BYOD on organizational commitment: An empirical investigation. Information Technology & People, 32(2), 246\u2013268. https:\/\/doi.org\/10.1108\/ITP-11-2017-0378.","journal-title":"Information Technology & People"},{"issue":"3","key":"10067_CR37","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1057\/palgrave.jit.2000069","volume":"21","author":"A Elbanna","year":"2006","unstructured":"Elbanna, A. (2006). The validity of the improvisation argument in the implementation of rigid technology: The case of ERP systems. Journal of Information Technology, 21(3), 165\u2013175.","journal-title":"Journal of Information Technology"},{"issue":"1","key":"10067_CR38","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s10796-014-9513-6","volume":"17","author":"A Elbanna","year":"2015","unstructured":"Elbanna, A., & Linderoth, H. C. J. (2015). The formation of technology mental models: The case of voluntary use of technology in organizational setting. Information Systems Frontiers, 17(1), 95\u2013108. https:\/\/doi.org\/10.1007\/s10796-014-9513-6.","journal-title":"Information Systems Frontiers"},{"key":"10067_CR39","unstructured":"Elie-Dit-Cosaque, C., & Pallud, J. (2010). User Adaptation and IS Success: An Empirical Investigation among French Workers. International conference of information systems (ICIS 2010). http:\/\/aisel.aisnet.org\/icis2010_submissions\/158"},{"issue":"5","key":"10067_CR40","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1057\/palgrave.ejis.3000556","volume":"14","author":"KJ Fernandes","year":"2005","unstructured":"Fernandes, K. J. (2005). Eureka moments in the works of Claudio Ciborra. European Journal of Information Systems, 14(5), 498\u2013499. https:\/\/doi.org\/10.1057\/palgrave.ejis.3000556.","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"10067_CR41","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1057\/palgrave.ejis.3000629","volume":"15","author":"EH Ferneley","year":"2006","unstructured":"Ferneley, E. H., & Sobreperez, P. (2006). Resist, comply or workaround? An examination of different facets of user engagement with information systems. European Journal of Information Systems, 15(4), 345\u2013356.","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"10067_CR42","doi-asserted-by":"publisher","first-page":"551","DOI":"10.25300\/MISQ\/2018\/13215","volume":"42","author":"JF George","year":"2018","unstructured":"George, J. F., Gupta, M., Giordano, G., Mills, A. M., Tennant, V. M., & Lewis, C. C. (2018). The effects of communication media and culture on deception detection accuracy. MIS Quarterly, 42(2), 551\u2013575. https:\/\/doi.org\/10.25300\/MISQ\/2018\/13215.","journal-title":"MIS Quarterly"},{"key":"10067_CR43","unstructured":"Glaser, B. G. (1978). Theoretical sensitivity: Advances in the methodology of grounded theory. The Sociology Press."},{"key":"10067_CR44","doi-asserted-by":"crossref","unstructured":"Glaser, B. G., & Strauss, A. (1967). The discovery of grounded theory: Strategies for qualitative research. Aldine Publishing Co.","DOI":"10.1097\/00006199-196807000-00014"},{"key":"10067_CR45","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.jbusres.2018.12.018","volume":"97","author":"M Gupta","year":"2019","unstructured":"Gupta, M., Esmaeilzadeh, P., Uz, I., & Tennant, V. M. (2019a). The effects of national cultural values on individuals\u2019 intention to participate in peer-to-peer sharing economy. Journal of Business Research, 97, 20\u201329. https:\/\/doi.org\/10.1016\/j.jbusres.2018.12.018.","journal-title":"Journal of Business Research"},{"key":"10067_CR46","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ijinfomgt.2018.09.006","volume":"44","author":"M Gupta","year":"2019","unstructured":"Gupta, M., George, J. F., & Xia, W. (2019b). Relationships between IT department culture and agile software development practices: An empirical investigation. International Journal of Information Management, 44, 13\u201324. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2018.09.006.","journal-title":"International Journal of Information Management"},{"key":"10067_CR47","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1016\/j.procs.2018.10.142","volume":"141","author":"M Haug","year":"2018","unstructured":"Haug, M., Gewald, H., & Rockmann, R. (2018). Grandma\u2019s new tablet \u2013 The role of Mobile devices in trying to innovate in IT. Procedia Computer Science, 141, 460\u2013465. https:\/\/doi.org\/10.1016\/j.procs.2018.10.142.","journal-title":"Procedia Computer Science"},{"issue":"1","key":"10067_CR48","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1057\/ejis.2012.43","volume":"22","author":"R Hekkala","year":"2013","unstructured":"Hekkala, R., & Urquhart, C. (2013). Everyday power struggles: Living in an IOIS project. European Journal of Information Systems, 22(1), 76\u201394. https:\/\/doi.org\/10.1057\/ejis.2012.43.","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"10067_CR49","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1177\/1049732316665344","volume":"27","author":"MM Hennink","year":"2017","unstructured":"Hennink, M. M., Kaiser, B. N., & Marconi, V. C. (2017). Code saturation versus meaning saturation: How many interviews are enough? Qualitative Health Research, 27(4), 591\u2013608. https:\/\/doi.org\/10.1177\/1049732316665344.","journal-title":"Qualitative Health Research"},{"key":"10067_CR50","unstructured":"Hookway, N. S. (2008). Human Documents Research: From the Diary to the Blog. 1\u201318."},{"key":"10067_CR51","doi-asserted-by":"publisher","unstructured":"Hovav, A., & Putri, F. F. (2016). This is my device! Why should I follow your rules? Employees\u2019 compliance with BYOD security policy. Pervasive and Mobile Computing, 32, 35\u201349. https:\/\/doi.org\/10.1016\/j.pmcj.2016.06.007.","DOI":"10.1016\/j.pmcj.2016.06.007"},{"issue":"3","key":"10067_CR52","doi-asserted-by":"publisher","first-page":"525","DOI":"10.2307\/25148694","volume":"29","author":"J Jasperson","year":"2005","unstructured":"Jasperson, J., Carter, P. E., & Zmud, R. W. (2005). A comprehensive conceptualization of post-adoptive Behaviors associated with information technology enabled work systems. MIS Quarterly, 29(3), 525\u2013557. https:\/\/doi.org\/10.2307\/25148694.","journal-title":"MIS Quarterly"},{"issue":"3","key":"10067_CR53","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1007\/s10796-020-10015-6","volume":"22","author":"L Kendall","year":"2020","unstructured":"Kendall, L., Chaudhuri, B., & Bhalla, A. (2020). Understanding technology as situated practice: Everyday use of voice user interfaces among diverse groups of users in urban India. Information Systems Frontiers, 22(3), 585\u2013605. https:\/\/doi.org\/10.1007\/s10796-020-10015-6.","journal-title":"Information Systems Frontiers"},{"issue":"3","key":"10067_CR54","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s10796-008-9073-8","volume":"11","author":"S Kim","year":"2009","unstructured":"Kim, S., & Garrison, G. (2009). Investigating mobile wireless technology adoption: An extension of the technology acceptance model. Information Systems Frontiers, 11(3), 323\u2013333.","journal-title":"Information Systems Frontiers"},{"issue":"6","key":"10067_CR55","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MIS.2003.1249172","volume":"18","author":"P Koopman","year":"2003","unstructured":"Koopman, P., & Hoffman, R. R. (2003). Work-arounds, make-work, and kludges. IEEE Intelligent Systems, 18(6), 70\u201375.","journal-title":"IEEE Intelligent Systems"},{"issue":"12","key":"10067_CR56","doi-asserted-by":"publisher","first-page":"1879","DOI":"10.1177\/0018726710367441","volume":"63","author":"M Korica","year":"2010","unstructured":"Korica, M., & Molloy, E. (2010). Making sense of professional identities: Stories of medical professionals and new technologies. Human Relations, 63(12), 1879\u20131901. https:\/\/doi.org\/10.1177\/0018726710367441.","journal-title":"Human Relations"},{"issue":"1","key":"10067_CR57","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.ijinfomgt.2017.07.001","volume":"38","author":"K-Y Kwahk","year":"2018","unstructured":"Kwahk, K.-Y., Ahn, H., & Ryu, Y. U. (2018). Understanding mandatory IS use behavior: How outcome expectations affect conative IS use. International Journal of Information Management, 38(1), 64\u201376. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2017.07.001.","journal-title":"International Journal of Information Management"},{"key":"10067_CR58","doi-asserted-by":"publisher","unstructured":"Lapointe, L., & Beaudry, A. (2014). Identifying IT user Mindsets: Acceptance. Resistance and Ambivalence., 4619\u20134628. https:\/\/doi.org\/10.1109\/HICSS.2014.568.","DOI":"10.1109\/HICSS.2014.568"},{"issue":"2","key":"10067_CR59","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1111\/isj.12139","volume":"28","author":"JY-H Lee","year":"2018","unstructured":"Lee, J. Y.-H., Panteli, N., B\u00fclow, A. M., & Hsu, C. (2018). Email adaptation for conflict handling: A case study of cross-border inter-organisational partnership in East Asia. Information Systems Journal, 28(2), 318\u2013339. https:\/\/doi.org\/10.1111\/isj.12139.","journal-title":"Information Systems Journal"},{"key":"10067_CR60","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5465\/19416521003654160","volume":"4","author":"PM Leonardi","year":"2010","unstructured":"Leonardi, P. M., & Barley, S. R. (2010). What\u2019s under construction Here? Social action, materiality, and power in constructivist studies of technology and organizing. The Academy of Management Annals, 4, 1\u201351.","journal-title":"The Academy of Management Annals"},{"issue":"1","key":"10067_CR61","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1287\/isre.2018.0813","volume":"30","author":"Y-K Lin","year":"2019","unstructured":"Lin, Y.-K., Lin, M., & Chen, H. (2019). Do electronic health records affect quality of care? Evidence from the HITECH act. Information Systems Research, 30(1), 306\u2013318. https:\/\/doi.org\/10.1287\/isre.2018.0813.","journal-title":"Information Systems Research"},{"key":"10067_CR62","unstructured":"Magni, M., Maruping, L., Caporarello, L., & Basaglia, S. (2011). Innovating with technology in team contexts: A trait activation theory perspective. International conference on information systems (ICIS 2011), Shanghai."},{"key":"10067_CR63","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.ijhcs.2018.05.004","volume":"118","author":"S M\u00e4kel\u00e4","year":"2018","unstructured":"M\u00e4kel\u00e4, S., & Vellonen, V. (2018). Designing for appropriation: A DIY kit as an educator\u2019s tool in special education schools. International Journal of Human-Computer Studies, 118, 14\u201323. https:\/\/doi.org\/10.1016\/j.ijhcs.2018.05.004.","journal-title":"International Journal of Human-Computer Studies"},{"key":"10067_CR64","unstructured":"McGann, S., & Lyytinen, K. (2008, January 1). The Improvisation Effect: A Case Study of User Improvisation and Its Effects on Information System Evolution. International Conference of Information Systems. http:\/\/aisel.aisnet.org\/icis2008\/209"},{"key":"10067_CR65","unstructured":"Miles, M. B., & Huberman, A. M. (1994). Qualitative data analysis (2nd ed.). Sage Publications."},{"issue":"2","key":"10067_CR66","doi-asserted-by":"publisher","first-page":"304","DOI":"10.2307\/2667089","volume":"46","author":"AS Miner","year":"2001","unstructured":"Miner, A. S., Bassoff, P., & Moorman, C. (2001). Organizational improvisation and learning: A field study. Administrative Science Quarterly, 46(2), 304. https:\/\/doi.org\/10.2307\/2667089.","journal-title":"Administrative Science Quarterly"},{"issue":"11","key":"10067_CR67","doi-asserted-by":"publisher","first-page":"814","DOI":"10.17705\/1jais.00472","volume":"18","author":"WA Molnar","year":"2017","unstructured":"Molnar, W. A., Nandhakumar, J., & Stacey, P. (2017). A paradox of progressive saturation: The changing nature of improvisation over time in a systems development project. Journal of the Association for Information Systems, 18(11), 814\u2013836.","journal-title":"Journal of the Association for Information Systems"},{"key":"10067_CR68","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.jom.2015.07.008","volume":"39\u201340","author":"B Morrison","year":"2015","unstructured":"Morrison, B. (2015). The problem with workarounds is that they work: The persistence of resource shortages. Journal of Operations Management, 39\u201340, 79\u201391. https:\/\/doi.org\/10.1016\/j.jom.2015.07.008.","journal-title":"Journal of Operations Management"},{"issue":"1","key":"10067_CR69","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1287\/isre.7.1.63","volume":"7","author":"W Orlikowski","year":"1996","unstructured":"Orlikowski, W. (1996). Improvising organizational transformation over time: A situated change perspective. Information Systems Research, 7(1), 63\u201392.","journal-title":"Information Systems Research"},{"issue":"2","key":"10067_CR70","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1145\/196734.196745","volume":"12","author":"W Orlikowski","year":"1994","unstructured":"Orlikowski, W., & Gash, D. C. (1994). Technological frames: Making sense of information technology in organizations. ACM Transactions on Information Systems, 12(2), 174\u2013207.","journal-title":"ACM Transactions on Information Systems"},{"key":"10067_CR71","unstructured":"Pallud, J., & Elie-dit-Cosaque, C. (2011). User responses to new system implementation: A Bricolage perspective. International Conference Information Systems (ICIS 2011). http:\/\/aisel.aisnet.org\/icis2011\/proceedings\/humanbehavior\/19"},{"issue":"3","key":"10067_CR72","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1287\/isre.1100.0280","volume":"21","author":"PA Pavlou","year":"2010","unstructured":"Pavlou, P. A., & El Sawy, O. A. (2010). The \u201cthird hand\u201d: IT-enabled competitive advantage in turbulence through improvisational capabilities. Information Systems Research, 21(3), 443\u2013471. https:\/\/doi.org\/10.1287\/isre.1100.0280.","journal-title":"Information Systems Research"},{"issue":"5","key":"10067_CR73","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1111\/1540-5885.1850285","volume":"18","author":"NP Repenning","year":"2001","unstructured":"Repenning, N. P. (2001). Understanding fire fighting in new product development. Journal of Product Innovation Management, 18(5), 285\u2013300. https:\/\/doi.org\/10.1111\/1540-5885.1850285.","journal-title":"Journal of Product Innovation Management"},{"issue":"3","key":"10067_CR74","first-page":"577","volume":"54","author":"C Rerup","year":"2011","unstructured":"Rerup, C., & Feldman, M. S. (2011). Routines as A source of change in organizational schemata: The role of trial-and-error learning. The Academy of Management Journal, 54(3), 577\u2013610.","journal-title":"The Academy of Management Journal"},{"key":"10067_CR75","unstructured":"Richter, A., & Riemer, K. (2009). Corporate Social Networking Sites\u2014Modes of Use and Appropriation through Co-Evolution. 20th Australasian Conference on Information Systems ACIS 2009. 20th Australasian conference on information systems ACIS 2009, Melbourne, Australia."},{"issue":"1","key":"10067_CR76","first-page":"5","volume":"7","author":"K Riemer","year":"2013","unstructured":"Riemer, K., & Johnston, R. B. (2013). What is IT in use and why does it matter for IS design? Systems. Signs & Actions, 7(1), 5\u201321.","journal-title":"Signs & Actions"},{"key":"10067_CR77","unstructured":"Riemer, K., Overfeld, P., Scifleet, P., & Richter, A. (2012). Eliciting the anatomy of technology appropriation processes: A case study in Enterprise social media. European Conference of Information Systems (ECIS 2012). Europ. Conf. Information systems (ECIS 2012). http:\/\/works.bepress.com\/alexander_richter\/1"},{"key":"10067_CR78","unstructured":"Roetzel, P., & Fehrenbacher, D. (2019). On the role of information overload in information systems (IS) success: Empirical evidence from decision support systems. International conference of information systems (ICIS2019), Munich, Germany. https:\/\/aisel.aisnet.org\/icis2019\/general_topics\/general_topics\/21"},{"issue":"2","key":"10067_CR79","doi-asserted-by":"publisher","first-page":"101616","DOI":"10.1016\/j.jsis.2020.101616","volume":"29","author":"M Rossi","year":"2020","unstructured":"Rossi, M., Nandhakumar, J., & Mattila, M. (2020). Balancing fluid and cemented routines in a digital workplace. The Journal of Strategic Information Systems, 29(2), 101616. https:\/\/doi.org\/10.1016\/j.jsis.2020.101616.","journal-title":"The Journal of Strategic Information Systems"},{"key":"10067_CR80","doi-asserted-by":"publisher","first-page":"294","DOI":"10.17705\/1CAIS.04013","volume":"40","author":"KP Scheibe","year":"2017","unstructured":"Scheibe, K. P., & Gupta, M. (2017). The effect of socialization via computer-mediated communication on the relationship between organizational culture and organizational creativity. Communications of the Association for Information Systems, 40, 294\u2013314. https:\/\/doi.org\/10.17705\/1CAIS.04013.","journal-title":"Communications of the Association for Information Systems"},{"issue":"02","key":"10067_CR81","doi-asserted-by":"publisher","first-page":"1650017","DOI":"10.1142\/S1363919616500171","volume":"20","author":"CW Scheiner","year":"2016","unstructured":"Scheiner, C. W., Baccarella, C. V., Feller, N., Voigt, K.-I., & Bessant, J. (2016). Organisational and individual unlearning in identification and evaluation of technologies. International Journal of Innovation Management, 20(02), 1650017. https:\/\/doi.org\/10.1142\/S1363919616500171.","journal-title":"International Journal of Innovation Management"},{"issue":"3","key":"10067_CR82","doi-asserted-by":"publisher","first-page":"663","DOI":"10.25300\/MISQ\/2016\/40.3.07","volume":"40","author":"KW Schmitz","year":"2016","unstructured":"Schmitz, K. W., Teng, J. T. C., & Webb, K. J. (2016). Capturing the complexity of malleable IT use: Adaptive structuration theory for individuals. MIS Quarterly, 40(3), 663\u2013686. https:\/\/doi.org\/10.25300\/MISQ\/2016\/40.3.07.","journal-title":"MIS Quarterly"},{"issue":"3","key":"10067_CR83","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/s10796-020-10020-9","volume":"22","author":"P Seetharaman","year":"2020","unstructured":"Seetharaman, P., Mathew, S. K., Sein, M. K., & Tallamraju, R. B. (2020). Being (more) human in a digitized world. Information Systems Frontiers, 22(3), 529\u2013532. https:\/\/doi.org\/10.1007\/s10796-020-10020-9.","journal-title":"Information Systems Frontiers"},{"issue":"6","key":"10067_CR84","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.1016\/j.techfore.2012.09.005","volume":"80","author":"K Shirahada","year":"2013","unstructured":"Shirahada, K., & Hamazaki, K. (2013). Trial and error mindset of R&D personnel and its relationship to organizational creative climate. Technological Forecasting and Social Change, 80(6), 1108\u20131118. https:\/\/doi.org\/10.1016\/j.techfore.2012.09.005.","journal-title":"Technological Forecasting and Social Change"},{"key":"10067_CR85","unstructured":"Stephen, B. (2018). Tumblr\u2019s porn ban could be its downfall\u2014After all, it happened to LiveJournal. The Verge. https:\/\/www.theverge.com\/2018\/12\/6\/18127869\/tumblr-livejournal-porn-ban-strikethrough"},{"key":"10067_CR86","doi-asserted-by":"crossref","unstructured":"Sun, H. (2012). Understanding user revisions when using information system features: Adaptive system use and triggers. MIS Quarterly, 36(2), 453\u2013478.","DOI":"10.2307\/41703463"},{"issue":"12","key":"10067_CR87","doi-asserted-by":"publisher","first-page":"1809","DOI":"10.1177\/0018726707084915","volume":"60","author":"J Swan","year":"2007","unstructured":"Swan, J., Bresnen, M., Newell, S., & Robertson, M. (2007). The object of knowledge: The role of objects in biomedical innovation. Human Relations, 60(12), 1809\u20131837. https:\/\/doi.org\/10.1177\/0018726707084915.","journal-title":"Human Relations"},{"issue":"3","key":"10067_CR88","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1023\/A:1007652708139","volume":"30","author":"J Swann","year":"1999","unstructured":"Swann, J. (1999). What happens when learning takes place? Interchange, 30(3), 257\u2013282. https:\/\/doi.org\/10.1023\/A:1007652708139.","journal-title":"Interchange"},{"issue":"2","key":"10067_CR89","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.jsis.2017.07.004","volume":"27","author":"S Tams","year":"2018","unstructured":"Tams, S., Thatcher, J. B., & Craig, K. (2018). How and why trust matters in post-adoptive usage: The mediating roles of internal and external self-efficacy. The Journal of Strategic Information Systems, 27(2), 170\u2013190. https:\/\/doi.org\/10.1016\/j.jsis.2017.07.004.","journal-title":"The Journal of Strategic Information Systems"},{"key":"10067_CR90","volume-title":"Grounded theory for qualitative research","author":"C Urquhart","year":"2012","unstructured":"Urquhart, C. (2012). Grounded theory for qualitative research. A Practical Guide: SAGE Publications Ltd."},{"issue":"3","key":"10067_CR91","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1057\/jit.2012.34","volume":"28","author":"C Urquhart","year":"2013","unstructured":"Urquhart, C., & Fern\u00e1ndez, W. (2013). Using grounded theory method in information systems: The researcher as blank slate and other myths. Journal of Information Technology, 28(3), 224\u2013236. https:\/\/doi.org\/10.1057\/jit.2012.34.","journal-title":"Journal of Information Technology"},{"issue":"2","key":"10067_CR92","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1287\/orsc.1050.0171","volume":"17","author":"E Vaast","year":"2006","unstructured":"Vaast, E., & Levina, N. (2006). Multiple faces of codification: Organizational redesign in an IT organization. Organization Science, 17(2), 190\u2013201. https:\/\/doi.org\/10.1287\/orsc.1050.0171.","journal-title":"Organization Science"},{"issue":"2","key":"10067_CR93","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186\u2013205.","journal-title":"Management Science"},{"issue":"3","key":"10067_CR94","doi-asserted-by":"publisher","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Towards a unified view. MIS Quarterly, 27(3), 425\u2013478.","journal-title":"MIS Quarterly"},{"issue":"6","key":"10067_CR95","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1111\/j.1365-2575.2011.00373.x","volume":"21","author":"V Venkatesh","year":"2011","unstructured":"Venkatesh, V., Thong, J. Y. L., Chan, F. K. Y., Hu, P. J.-H., & Brown, S. A. (2011). Extending the two-stage information systems continuance model: Incorporating UTAUT predictors and the role of context. Information Systems Journal, 21(6), 527\u2013555.","journal-title":"Information Systems Journal"},{"issue":"5","key":"10067_CR96","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1287\/orsc.1070.0288","volume":"18","author":"O Volkoff","year":"2007","unstructured":"Volkoff, O., Strong, D. M., & Elmes, M. B. (2007). Technological Embeddedness and organizational change. Organization Science, 18(5), 832\u2013848. https:\/\/doi.org\/10.1287\/orsc.1070.0288.","journal-title":"Organization Science"},{"issue":"3","key":"10067_CR97","doi-asserted-by":"publisher","first-page":"685","DOI":"10.25300\/MISQ\/2017\/41.3.02","volume":"41","author":"M Wiesche","year":"2017","unstructured":"Wiesche, M., Jurisch, M. C., Yetton, P. W., & Krcmar, H. (2017). Grounded theory methodology in information systems research. MIS Quarterly, 41(3), 685\u2013701.","journal-title":"MIS Quarterly"},{"issue":"11","key":"10067_CR98","doi-asserted-by":"publisher","first-page":"787","DOI":"10.17705\/1jais.00473","volume":"18","author":"Y Wu","year":"2017","unstructured":"Wu, Y., Choi, B. C. F., Guo, X., & Chang, K. T.-T. (2017). Understanding user adaptation toward a new IT system in organizations: A social network perspective. Journal of the Association of Information Systems, 18(11), 787\u2013813.","journal-title":"Journal of the Association of Information Systems"},{"key":"10067_CR99","doi-asserted-by":"crossref","unstructured":"Wyatt, S. (2003). Non-users also matter: The construction of users and non-users of the internet. In T. Pinch & N. Oudshoorn (Eds.), How Users Matter: The Coconstruction of Users and Technology (pp. 67\u201379). MIT Press.","DOI":"10.7551\/mitpress\/3592.003.0006"},{"key":"10067_CR100","unstructured":"Zamani, E. D., Giaglis, G. M., & Pouloudi, A. (2013). A Sensemaking Approach to Tablet Users\u2019 Accommodating Practices. International Conference on Information Systems (ICIS 2013), Milan, Italy.\u00a0"},{"key":"10067_CR101","doi-asserted-by":"publisher","unstructured":"Zamani, E. D., Pouloudi, N., Giaglis, G., & Wareham, J. (2019). Accommodating practices during episodes of disillusionment with Mobile IT. Information Systems Frontiers. https:\/\/doi.org\/10.1007\/s10796-019-09972-4.","DOI":"10.1007\/s10796-019-09972-4"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-020-10067-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-020-10067-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-020-10067-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T02:45:41Z","timestamp":1744166741000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-020-10067-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,18]]},"references-count":101,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["10067"],"URL":"https:\/\/doi.org\/10.1007\/s10796-020-10067-8","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,18]]},"assertion":[{"value":"10 September 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2020","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}