{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T15:55:41Z","timestamp":1770911741736,"version":"3.50.1"},"reference-count":91,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,3,7]],"date-time":"2023-03-07T00:00:00Z","timestamp":1678147200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,7]],"date-time":"2023-03-07T00:00:00Z","timestamp":1678147200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Bus Inf Syst Eng"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s12599-023-00802-1","type":"journal-article","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T08:01:50Z","timestamp":1690444910000},"page":"369-389","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Why Work Around the Process? Analyzing Workarounds Through the Lens of the Theory of Planned Behavior"],"prefix":"10.1007","volume":"65","author":[{"given":"Pnina","family":"Soffer","sequence":"first","affiliation":[]},{"given":"Nesi","family":"Outmazgin","sequence":"additional","affiliation":[]},{"given":"Irit","family":"Hadar","sequence":"additional","affiliation":[]},{"given":"Shay","family":"Tzafrir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,7]]},"reference":[{"key":"802_CR1","first-page":"251","volume-title":"Advanced information systems engineering","author":"NS Abdullah","year":"2010","unstructured":"Abdullah NS, Sadiq S, Indulska M (2010) Emerging challenges in information systems research for regulatory compliance management. In: Pernici B (ed) Advanced information systems engineering. Springer, pp 251\u2013265"},{"key":"802_CR2","volume-title":"From intentions to actions: a theory of planned behavior","author":"I Ajzen","year":"1985","unstructured":"Ajzen I (1985) From intentions to actions: a theory of planned behavior. Springer"},{"issue":"2","key":"802_CR3","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen I (1991) The theory of planned behavior. Organ Behav Hum Decis Proc 50(2):179\u2013211","journal-title":"Organ Behav Hum Decis Proc"},{"key":"802_CR4","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1080\/08870446.2011.613995","volume":"26","author":"I Ajzen","year":"2011","unstructured":"Ajzen I (2011) The theory of planned behaviour: reactions and reflections. Psychol Health 26:1113\u20131127","journal-title":"Psychol Health"},{"issue":"4","key":"802_CR5","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1002\/hbe2.195","volume":"2","author":"I Ajzen","year":"2020","unstructured":"Ajzen I (2020) The theory of planned behavior: frequently asked questions. Hum Behav Emerg Technol 2(4):314\u2013324","journal-title":"Hum Behav Emerg Technol"},{"issue":"1","key":"802_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/001872677402700101","volume":"27","author":"I Ajzen","year":"1974","unstructured":"Ajzen I, Fishbein M (1974) Factors influencing intentions and the intention-behavior relation. Hum Relat 27(1):1\u201315","journal-title":"Hum Relat"},{"issue":"1","key":"802_CR7","first-page":"1041","volume":"34","author":"S Alter","year":"2014","unstructured":"Alter S (2014) Theory of workarounds. Commun Assoc Inf Syst 34(1):1041\u20131066","journal-title":"Commun Assoc Inf Syst"},{"key":"802_CR8","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/978-3-319-19237-6_31","volume-title":"Enterprise, business-process and information systems modeling","author":"S Alter","year":"2015","unstructured":"Alter S (2015) A workaround design system for anticipating, designing, and\/or preventing workarounds. In: Gulden J et al (eds) Enterprise, business-process and information systems modeling. Springer, pp 489\u2013498"},{"issue":"3","key":"802_CR9","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1057\/ejis.2008.14","volume":"17","author":"B Azad","year":"2008","unstructured":"Azad B, King N (2008) Enacting computer workaround practices within a medication dispensing system. Eur J Inf Syst 17(3):264\u2013278","journal-title":"Eur J Inf Syst"},{"issue":"3","key":"802_CR10","doi-asserted-by":"publisher","first-page":"329","DOI":"10.2189\/asqu.2005.50.3.329","volume":"50","author":"T Baker","year":"2005","unstructured":"Baker T, Nelson RE (2005) Creating something from nothing: resource construction through entrepreneurial bricolage. Admin Sci Q 50(3):329\u2013366","journal-title":"Admin Sci Q"},{"issue":"5","key":"802_CR11","doi-asserted-by":"publisher","first-page":"839","DOI":"10.5465\/amj.2008.34789630","volume":"51","author":"P Bamberger","year":"2008","unstructured":"Bamberger P (2008) Beyond contextualization: using context theories to narrow the micro-macro gap in management research. Acad Manag J 51(5):839\u2013846","journal-title":"Acad Manag J"},{"key":"802_CR12","unstructured":"Beerepoot I, Ouali A, van de Weerd I, Reijers HA (2019a) Working around health information systems: to accept or not to accept? In: Proceedings of the 27th European conference on information systems. AIS eLibrary"},{"key":"802_CR13","doi-asserted-by":"crossref","unstructured":"Beerepoot I, van de Weerd I, Reijers HA (2019b) The potential of workarounds for improving processes. In: International conference on business process management. Springer","DOI":"10.1007\/978-3-030-37453-2_28"},{"key":"802_CR14","doi-asserted-by":"crossref","unstructured":"Beerepoot I, Lu X, van de Weerd I, Alexander Reijers H (2021) Seeing the signs of workarounds: a mixed-methods approach to the detection of nurses\u2019 process deviations. In: Proceedings of the 54th Hawaii international conference on system sciences. AIS eLibrary, pp 3763\u20133772","DOI":"10.24251\/HICSS.2021.456"},{"issue":"2","key":"802_CR15","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1287\/isre.1110.0373","volume":"23","author":"N Berente","year":"2012","unstructured":"Berente N, Yoo Y (2012) Institutional contradictions and loose coupling: post implementation of NASA\u2019s Enterprise Information System. Inf Syst Res 23(2):376\u2013396","journal-title":"Inf Syst Res"},{"key":"802_CR16","doi-asserted-by":"crossref","unstructured":"Boudreau P, Vieru D, Paquette G, Heon M (2016) The workarounds process as a source of knowledge creation and management. In: Proceedings of the 49th Hawaii international conference on system sciences. AIS eLibrary, pp 4292\u20134301","DOI":"10.1109\/HICSS.2016.532"},{"issue":"5","key":"802_CR17","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1111\/j.1540-6210.2012.02545.x","volume":"72","author":"D Campbell","year":"2012","unstructured":"Campbell D (2012) Public managers in integrated services collaboratives: what works is workarounds. Publ Admin Rev 72(5):721\u2013730","journal-title":"Publ Admin Rev"},{"key":"802_CR18","first-page":"77","volume":"9","author":"C Ciborra","year":"1999","unstructured":"Ciborra C (1999) Notes on improvisation and time in organizations. Account Manag Inf Technol 9:77\u201394","journal-title":"Account Manag Inf Technol"},{"issue":"8","key":"802_CR19","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1002\/job.353","volume":"26","author":"R Cropanzano","year":"2005","unstructured":"Cropanzano R, Goldman B, Folger R (2005) Self-interest: defining and understanding a human motive. J Organ Behav 26(8):985\u2013991","journal-title":"J Organ Behav"},{"issue":"1","key":"802_CR20","doi-asserted-by":"publisher","first-page":"45","DOI":"10.2307\/3069284","volume":"45","author":"MT Dacin","year":"2002","unstructured":"Dacin MT, Goodstein J, Scott WR (2002) Institutional theory and institutional change: Introduction to the special research forum. Acad Manag J 45(1):45\u201356","journal-title":"Acad Manag J"},{"key":"802_CR21","unstructured":"Davison RM, Ou CX (2013) Sharing knowledge in technology deficient environments: Individual workarounds amid corporate restrictions. In: Proceedings of the 21st European conference on information systems. AIS eLibrary"},{"key":"802_CR22","unstructured":"Dittes S, Urbach N, Ahlemann F, Smolnik S, M\u00fcller T (2015) Why don\u2019t you stick to them? Understanding factors influencing and counter-measures to combat deviant behavior towards organizational IT standards. In: Proceedings of the 12th international conference on Wirtschaftsinformatik. AIS eLibrary, pp 615\u2013629"},{"key":"802_CR23","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-030-79186-5_4","volume-title":"Enterprise, business-process and information systems modeling","author":"Y Dubinsky","year":"2021","unstructured":"Dubinsky Y, Soffer P (2021) Detecting the \u201csplit-cases\u201d workaround in event logs. In: Gulden J et al (eds) Enterprise, business-process and information systems modeling. Springer, pp 47\u201361"},{"issue":"3","key":"802_CR24","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1037\/a0014891","volume":"94","author":"JR Edwards","year":"2009","unstructured":"Edwards JR, Cable DM (2009) The value of value congruence. J Appl Psychol 94(3):654\u2013677","journal-title":"J Appl Psychol"},{"issue":"1","key":"802_CR25","doi-asserted-by":"publisher","first-page":"57","DOI":"10.2307\/258191","volume":"14","author":"KM Eisenhardt","year":"1989","unstructured":"Eisenhardt KM (1989) Agency theory: an assessment and review. Acad Manag Rev 14(1):57\u201374","journal-title":"Acad Manag Rev"},{"issue":"1","key":"802_CR26","doi-asserted-by":"publisher","first-page":"25","DOI":"10.5465\/amj.2007.24160888","volume":"50","author":"KM Eisenhardt","year":"2007","unstructured":"Eisenhardt KM, Graebner ME (2007) Theory building from cases: opportunities and challenges. Acad Manag J 50(1):25\u201332","journal-title":"Acad Manag J"},{"issue":"1","key":"802_CR27","first-page":"20","volume":"45","author":"T Ejnefj\u00e4ll","year":"2019","unstructured":"Ejnefj\u00e4ll T, \u00c5gerfalk PJ (2019) Conceptualizing workarounds: meanings and manifestations in information systems research. Commun Assoc Inf Syst 45(1):20","journal-title":"Commun Assoc Inf Syst"},{"issue":"38","key":"802_CR28","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1017\/CBO9780511812774.003","volume":"19","author":"Y Engestr\u00f6m","year":"1999","unstructured":"Engestr\u00f6m Y (1999) Activity theory and individual and social transformation. Perspect Activity Theor 19(38):19\u201330","journal-title":"Perspect Activity Theor"},{"issue":"4","key":"802_CR29","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1057\/palgrave.ejis.3000629","volume":"15","author":"EH Ferneley","year":"2006","unstructured":"Ferneley EH, Sobreperez P (2006) Resist, comply or workaround? An examination of different facets of user engagement with information systems. Eur J Inf Syst 15(4):345\u2013356","journal-title":"Eur J Inf Syst"},{"key":"802_CR30","doi-asserted-by":"publisher","first-page":"e78","DOI":"10.1136\/amiajnl-2013-001686","volume":"21","author":"A Friedman","year":"2014","unstructured":"Friedman A, Crosson J, Howard J, Clark E, Pellerano M, Crabtree B, Jaen C, Cohen DJ (2014) A typology of electronic health record workarounds in small-to-medium size primary care practices. J Am Med Inform Assoc 21:e78\u2013e83","journal-title":"J Am Med Inform Assoc"},{"key":"802_CR31","unstructured":"Fries VC, Wiesche M, Krcmar H (2016) The dualism of workarounds: effects of technology and workload on improvement and noncompliant behavior within organizations. In: International Conference on Information Systems. AIS Library"},{"issue":"3","key":"802_CR32","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1145\/214427.214429","volume":"4","author":"L Gasser","year":"1986","unstructured":"Gasser L (1986) The integration of computing and routine work. ACM Trans off Inf Syst 4(3):205\u2013225","journal-title":"ACM Trans off Inf Syst"},{"issue":"6","key":"802_CR33","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1002\/smj.4250090604","volume":"9","author":"A Ginsberg","year":"1988","unstructured":"Ginsberg A (1988) Measuring and modelling changes in strategy: theoretical foundations and empirical directions. Strateg Manag J 9(6):559\u2013575","journal-title":"Strateg Manag J"},{"issue":"2","key":"802_CR34","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/BF02766777","volume":"29","author":"EG Guba","year":"1981","unstructured":"Guba EG (1981) Criteria for assessing the trustworthiness of naturalistic inquiries. ECTJ 29(2):75\u201391","journal-title":"ECTJ"},{"issue":"2","key":"802_CR35","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1097\/HMR.0b013e3181d116c2","volume":"35","author":"JR Halbesleben","year":"2010","unstructured":"Halbesleben JR, Savage GT, Wakefield DS, Wakefield BJ (2010) Rework and workarounds in nurse medication administration process: implications for work processes and patient safety. Health Care Manag Rev 35(2):124\u2013133","journal-title":"Health Care Manag Rev"},{"key":"802_CR36","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-00416-2_1","volume-title":"Handbook on business process management: Introduction, methods, and information systems","author":"M Hammer","year":"2010","unstructured":"Hammer M (2010) What is business process management? In: vom Brocke J, Rosemann M (eds) Handbook on business process management: Introduction, methods, and information systems. Springer, pp 3\u201316"},{"key":"802_CR37","volume-title":"Business process change: a guide for business managers and BPM and Six Sigma professionals","author":"P Harmon","year":"2010","unstructured":"Harmon P (2010) Business process change: a guide for business managers and BPM and Six Sigma professionals. Morgan Kaufmann"},{"key":"802_CR38","unstructured":"Holley DM (1999) Self-interest and beyond. Paragon House"},{"key":"802_CR39","unstructured":"IBM (2006) Acronyms and terminology. In: Customer care handbook (Version 1.2)"},{"issue":"2","key":"802_CR40","first-page":"3","volume":"21","author":"I Ignatiadis","year":"2009","unstructured":"Ignatiadis I, Nandhakumar J (2009) The effect of ERP system workarounds on organizational control: an interpretivist case study. Scand J Inf Syst 21(2):3","journal-title":"Scand J Inf Syst"},{"issue":"2","key":"802_CR41","doi-asserted-by":"publisher","first-page":"386","DOI":"10.5465\/amr.2006.20208687","volume":"31","author":"G Johns","year":"2006","unstructured":"Johns G (2006) The essential impact of context on organizational behavior. Acad Manag Rev 31(2):386\u2013408","journal-title":"Acad Manag Rev"},{"key":"802_CR42","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1146\/annurev-orgpsych-032117-104406","volume":"5","author":"G Johns","year":"2018","unstructured":"Johns G (2018) Advances in the treatment of context in organizational research. Ann Rev Organ Psychol Organ Behav 5:21\u201346","journal-title":"Ann Rev Organ Psychol Organ Behav"},{"issue":"1","key":"802_CR43","first-page":"15","volume":"7","author":"S Klotz","year":"2019","unstructured":"Klotz S, Kopper A, Westner M, Strahringer S (2019) Causing factors, outcomes, and governance of Shadow IT and business-managed IT: a systematic literature review. Int J Inf Syst Proj Manag 7(1):15\u201343","journal-title":"Int J Inf Syst Proj Manag"},{"key":"802_CR44","doi-asserted-by":"crossref","unstructured":"Kobayashi IM, Fussell SR, Xiao Y, Seagull FJ (2005) Work co-ordination, workflow, and workarounds in a medical context. In: CHI'05 extended abstracts on human factors in computing systems. Association for Computing Machinery, pp 1561\u20131564","DOI":"10.1145\/1056808.1056966"},{"key":"802_CR45","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MIS.2003.1249172","volume":"2003","author":"P Koopman","year":"2003","unstructured":"Koopman P, Hoffman RR (2003) Work-arounds, make-work, and kludges. IEEE Intell Syst 2003:70\u201375","journal-title":"IEEE Intell Syst"},{"key":"802_CR46","first-page":"215","volume-title":"Driving quality in informatics: fulfilling the promise","author":"R Koppel","year":"2015","unstructured":"Koppel R, Smith S, Blythe J, Kothari V (2015) Workarounds to computer access in healthcare organizations: you want my password or a dead patient? In: Courtney KL et al (eds) Driving quality in informatics: fulfilling the promise. IOS Press, pp 215\u2013220"},{"issue":"4","key":"802_CR47","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1057\/s41303-016-0029-7","volume":"26","author":"S Laumer","year":"2017","unstructured":"Laumer S, Maier C, Weitzel T (2017) Information quality, user satisfaction, and the manifestation of workarounds: a qualitative and quantitative study of enterprise content management system users. Eur J Inf Syst 26(4):333\u2013360","journal-title":"Eur J Inf Syst"},{"key":"802_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/0147-1767(85)90062-8","volume-title":"Naturalistic inquiry","author":"YS Lincoln","year":"1985","unstructured":"Lincoln YS, Guba EG (1985) Naturalistic inquiry. Sage"},{"issue":"3","key":"802_CR49","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1111\/isj.12074","volume":"26","author":"J Malaurent","year":"2016","unstructured":"Malaurent J, Avison D (2016) Reconciling global and local needs: a canonical action research project to deal with workarounds. Inf Syst J 26(3):227\u2013257","journal-title":"Inf Syst J"},{"issue":"4","key":"802_CR50","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1111\/isj.12272","volume":"30","author":"J Malaurent","year":"2020","unstructured":"Malaurent J, Karanasios S (2020) Learning from workaround practices: the challenge of enterprise system implementations in multinational corporations. Inf Syst J 30(4):639\u2013663","journal-title":"Inf Syst J"},{"key":"802_CR51","unstructured":"McGann ST, Lyytinen K (2008) The improvisation effect: a case study of user improvisation and its effects on information system evolution. In: Proceedings of the International Conference on Information Systems. AIS eLibrary, p 209"},{"issue":"3","key":"802_CR52","first-page":"351","volume":"24","author":"BM Meglino","year":"1998","unstructured":"Meglino BM, Ravlin EC (1998) Individual values in organizations: concepts, controversies, and research. J Manag 24(3):351\u2013389","journal-title":"J Manag"},{"key":"802_CR53","volume-title":"Qualitative data analysis: a methods sourcebook","author":"MB Miles","year":"2014","unstructured":"Miles MB, Huberman AM, Salda\u00f1a J (2014) Qualitative data analysis: a methods sourcebook, 3rd edn. Sage","edition":"3"},{"issue":"2","key":"802_CR54","doi-asserted-by":"publisher","DOI":"10.1002\/prs.12014","volume":"38","author":"JF Mize","year":"2019","unstructured":"Mize JF (2019) The roundabout way to disaster: recognizing and responding to normalization of deviance. Process Saf Progr 38(2):e12014","journal-title":"Process Saf Progr"},{"key":"802_CR55","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1037\/0022-0167.52.2.250","volume":"52","author":"SL Morrow","year":"2005","unstructured":"Morrow SL (2005) Quality and trustworthiness in qualitative research in behavioral psychology. J Couns Psychol 52:250\u2013260","journal-title":"J Couns Psychol"},{"key":"802_CR56","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.infoandorg.2006.11.001","volume":"17","author":"MD Myers","year":"2007","unstructured":"Myers MD, Newman M (2007) The qualitative interview in IS research: examining the craft. Inf Organ 17:2\u201326","journal-title":"Inf Organ"},{"issue":"2","key":"802_CR57","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1145\/196734.196745","volume":"12","author":"WJ Orlikowski","year":"1994","unstructured":"Orlikowski WJ, Gash DC (1994) Technological frames: making sense of information technology in organizations. ACM Trans Inf Syst 12(2):669\u2013702","journal-title":"ACM Trans Inf Syst"},{"issue":"2","key":"802_CR58","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s10270-014-0420-6","volume":"15","author":"N Outmazgin","year":"2016","unstructured":"Outmazgin N, Soffer P (2016) A process mining-based analysis of business process workarounds. Softw Syst Model 15(2):309\u2013323","journal-title":"Softw Syst Model"},{"key":"802_CR59","doi-asserted-by":"crossref","unstructured":"Outmazgin N, Soffer P, Hadar I (2020) Workarounds in business processes: a goal-based analysis. In: Conference on Advanced Information Systems Engineering. Springer, pp 368\u2013383","DOI":"10.1007\/978-3-030-49435-3_23"},{"issue":"2","key":"802_CR60","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1108\/09513540410522234","volume":"18","author":"LA Petrides","year":"2004","unstructured":"Petrides LA, McClelland SI, Nodine TR (2004) Costs and benefits of the workaround: Inventive solution or costly alternative. Int J Educ Manag 18(2):100\u2013108","journal-title":"Int J Educ Manag"},{"issue":"4","key":"802_CR61","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1108\/REGE-12-2017-0015","volume":"25","author":"A Pinto de Vargas","year":"2018","unstructured":"Pinto de Vargas A, Ma\u00e7ada ACG, Mallmann GL (2018) Workaround behaviour in information systems research. Revista De Gest\u00e3o 25(4):430\u2013446","journal-title":"Revista De Gest\u00e3o"},{"issue":"3","key":"802_CR62","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/605610.605618","volume":"20","author":"S Poelmans","year":"1999","unstructured":"Poelmans S (1999) Workarounds and distributed viscosity in a workflow system: a case study. ACM SIGGROUP Bull 20(3):11\u201312","journal-title":"ACM SIGGROUP Bull"},{"key":"802_CR63","volume-title":"Using the theory of planned behavior with qualitative research","author":"S Renzi","year":"2008","unstructured":"Renzi S, Klobas J (2008) Using the theory of planned behavior with qualitative research. Bocconi University, Carlo F, Dondena Centre for Research on Social Dynamics"},{"issue":"2","key":"802_CR64","doi-asserted-by":"publisher","first-page":"555","DOI":"10.2307\/256693","volume":"38","author":"SL Robinson","year":"1995","unstructured":"Robinson SL, Bennet RJ (1995) A typology of deviant workplace behaviors: a multidimensional scaling study. Acad Manag J 38(2):555\u2013572","journal-title":"Acad Manag J"},{"key":"802_CR65","unstructured":"R\u00f6der N, Wiesche M, Schermann M (2014a) A situational perspective on workarounds in IT-enabled business processes: a multiple case study. In: Proceedings of the 22nd European Conference on Information Systems. AIS eLibrary"},{"key":"802_CR66","unstructured":"R\u00f6der N, Wiesche M, Schermann M, Krcmar H (2014b) Why managers tolerate workarounds\u2014the role of information systems. In: AMCIS 2014b proceedings. AIS eLibrary, p 14"},{"key":"802_CR67","unstructured":"R\u00f6der N, Wiesche M, Schermann M, Krcmar H (2015) Workaround aware business process modeling. In: Wirtschaftsinformatik proceedings. AIS eLibrary, pp 482\u2013496"},{"key":"802_CR68","doi-asserted-by":"crossref","unstructured":"R\u00f6der N, Wiesche M, Schermann M, Krcmar H (2016) Toward an ontology of workarounds: a literature review on existing concepts. In: 49th Hawaii International Conference on System Sciences, pp 5177\u20135186","DOI":"10.1109\/HICSS.2016.640"},{"key":"802_CR69","doi-asserted-by":"crossref","unstructured":"Rogers Y (1994) Exploring obstacles: integrating CSCW in evolving organisations. In: Proceedings of the 1994 ACM Conference on Computer Supported Cooperative Work. ACM, pp 67\u201377","DOI":"10.1145\/192844.192875"},{"key":"802_CR70","volume-title":"The nature of human values","author":"M Rokeach","year":"1973","unstructured":"Rokeach M (1973) The nature of human values. Free Press"},{"key":"802_CR71","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s10664-008-9102-8","volume":"14","author":"P Runeson","year":"2009","unstructured":"Runeson P, H\u00f6st M (2009) Guidelines for conducting and reporting case study research in software engineering. Empir Softw Eng 14:131","journal-title":"Empir Softw Eng"},{"issue":"2","key":"802_CR72","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1111\/j.1468-005X.2007.00189.x","volume":"22","author":"B Russell","year":"2007","unstructured":"Russell B (2007) \u2018You gotta lie to IT\u2019: software applications and the management of technological change in a call centre. New Technol Work Employ 22(2):132\u2013145","journal-title":"New Technol Work Employ"},{"issue":"3","key":"802_CR73","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1037\/0022-3514.53.3.550","volume":"53","author":"SH Schwartz","year":"1987","unstructured":"Schwartz SH, Bilsky W (1987) Toward a universal psychological structure of human values. J Pers Soc Psychol 53(3):550\u2013562","journal-title":"J Pers Soc Psychol"},{"key":"802_CR74","doi-asserted-by":"crossref","unstructured":"Shafagatova A, Van Looy A (2019) Understanding the alignment of employee appraisals and rewards with business processes. In: International Conference on Business Process Management. Springer, pp 386\u2013401","DOI":"10.1007\/978-3-030-26619-6_25"},{"key":"802_CR75","doi-asserted-by":"crossref","unstructured":"Sobreperez P (2008) Technological frame incongruence, diffusion, and noncompliance. In: Le\u00f3n G, et al (eds) Open IT-based innovation: moving towards cooperative IT transfer and knowledge diffusion. Springer, pp 179\u2013196","DOI":"10.1007\/978-0-387-87503-3_10"},{"key":"802_CR76","unstructured":"Sobreperez P, Ferneley EH, Wilson FA (2005) Tricks or trompe l\u2019oeil? An examination of workplace resistance in an information rich managerial environment. In: 13th European Conference on Information Systems"},{"issue":"6","key":"802_CR77","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1111\/isj.12123","volume":"27","author":"A Spierings","year":"2017","unstructured":"Spierings A, Kerr D, Houghton L (2017) Issues that support the creation of ICT workarounds: towards a theoretical understanding of feral information systems. Inf Syst J 27(6):775\u2013794","journal-title":"Inf Syst J"},{"issue":"4","key":"802_CR78","doi-asserted-by":"publisher","first-page":"731","DOI":"10.2307\/25750703","volume":"34","author":"DM Strong","year":"2010","unstructured":"Strong DM, Volkoff O (2010) Understanding organization\u2013enterprise system fit: a path to theorizing the information technology artifact. MIS Q 34(4):731\u2013756","journal-title":"MIS Q"},{"issue":"1","key":"802_CR79","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.scaman.2014.08.004","volume":"31","author":"SS Tzafrir","year":"2015","unstructured":"Tzafrir SS, Gur A, Blumen O (2015) Employee social environment as a tool for decrease intention to leave. Scand J Manag 31(1):136\u2013146","journal-title":"Scand J Manag"},{"issue":"4","key":"802_CR80","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1111\/isj.12090","volume":"26","author":"JAA van Beijsterveld","year":"2016","unstructured":"van Beijsterveld JAA, van Groenendaal WJH (2016) Solving misfits in ERP implementations by SMEs. Inf Syst J 26(4):369\u2013393","journal-title":"Inf Syst J"},{"key":"802_CR81","unstructured":"van de Weerd I, Vollers P, Beerepoot I, Fantinato M (2019) Workarounds in retail work systems: prevent, redesign, adopt or ignore? In: Proceedings of the 27th European Conference on Information Systems. AIS eLibrary"},{"key":"802_CR82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process mining: discovery, conformance and enhancement of business processes","author":"WMP van der Aalst","year":"2011","unstructured":"van der Aalst WMP (2011) Process mining: discovery, conformance and enhancement of business processes. Springer"},{"key":"802_CR83","volume-title":"Misbehavior in organizations: theory, research, and management","author":"Y Vardi","year":"2004","unstructured":"Vardi Y, Weitz E (2004) Misbehavior in organizations: theory, research, and management. Lawrence Erlbaum"},{"key":"802_CR84","doi-asserted-by":"publisher","DOI":"10.4324\/9781315732565","volume-title":"Misbehavior in organizations: a dynamic approach","author":"Y Vardi","year":"2016","unstructured":"Vardi Y, Weitz E (2016) Misbehavior in organizations: a dynamic approach. Routledge"},{"issue":"2","key":"802_CR85","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1287\/orsc.7.2.151","volume":"7","author":"Y Vardi","year":"1996","unstructured":"Vardi Y, Wiener Y (1996) Misbehavior in organizations: a motivational framework. Organ Sci 7(2):151\u2013165","journal-title":"Organ Sci"},{"issue":"1","key":"802_CR86","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1197\/jamia.M2378","volume":"15","author":"A Vogelsmeier","year":"2008","unstructured":"Vogelsmeier A, Halbesleben J, Scott-Cawiezell J (2008) Technology implementation and workarounds in the nursing home. J Am Med Inform Assoc 15(1):114\u2013119","journal-title":"J Am Med Inform Assoc"},{"issue":"1","key":"802_CR87","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1080\/2573234X.2021.1978337","volume":"5","author":"S Weinzierl","year":"2022","unstructured":"Weinzierl S, Wolf V, Pauli T, Beverungen D, Matzner M (2022) Detecting temporal workarounds in business processes\u2014A deep-learning-based method for analysing event log data. J Bus Anal 5(1):76\u2013100","journal-title":"J Bus Anal"},{"issue":"3","key":"802_CR88","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/2351848.2351850","volume":"43","author":"CL Wilkin","year":"2012","unstructured":"Wilkin CL, Davern M (2012) Acceptance of post-adoption unanticipated IS usage: towards a taxonomy. Data Base Adv Inf Syst 43(3):9\u201325","journal-title":"Data Base Adv Inf Syst"},{"key":"802_CR89","volume-title":"Case study research: design and methods","author":"RK Yin","year":"2009","unstructured":"Yin RK (2009) Case study research: design and methods. Sage"},{"key":"802_CR90","unstructured":"Zimmermann S, Rentrop C (2014) On the emergence of Shadow IT\u2014A transaction cost-based approach. In: Proceedings of the European Conference on Information Systems. AIS eLibrary"},{"issue":"11","key":"802_CR91","doi-asserted-by":"publisher","first-page":"1774","DOI":"10.1016\/j.jand.2012.06.368","volume":"112","author":"J Zoellner","year":"2012","unstructured":"Zoellner J, Krzeski E, Harden S, Cook E, Allen K, Estabrooks PA (2012) Qualitative application of the theory of planned behavior to understand beverage consumption behaviors among adults. J Acad Nutr Diet 112(11):1774\u20131784","journal-title":"J Acad Nutr Diet"}],"container-title":["Business &amp; Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-023-00802-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12599-023-00802-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-023-00802-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T08:12:55Z","timestamp":1690445575000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12599-023-00802-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,7]]},"references-count":91,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["802"],"URL":"https:\/\/doi.org\/10.1007\/s12599-023-00802-1","relation":{},"ISSN":["2363-7005","1867-0202"],"issn-type":[{"value":"2363-7005","type":"print"},{"value":"1867-0202","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,7]]},"assertion":[{"value":"12 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}