{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:30:10Z","timestamp":1777894210014,"version":"3.51.4"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T00:00:00Z","timestamp":1747353600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T00:00:00Z","timestamp":1747353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003385","name":"Georg-August-Universit\u00e4t G\u00f6ttingen","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003385","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Bus Inf Syst Eng"],"published-print":{"date-parts":[[2025,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Process mining has been established as a data-driven approach to analyze and improve business processes based on event data documented in event logs. A core assumption for meaningful analyses is that event data accurately represent the real-world execution of business processes in an organization. However, anecdotal evidence and recent case studies show that these aspects do not always align, and the business process management community is only beginning to investigate the mechanisms generating mismatches between process execution and event data. This study aims to identify the role of workarounds\u2014goal-directed deviations from standard processes performed by process participants to overcome obstacles\u2014in this context. Through an inductive multiple case study of 13 workarounds in four organizations, three mismatch categories between event logs and real-world process execution related to workarounds are identified and explored. This study contributes to the literature by describing how workarounds can act as mechanisms that cause mismatches between process execution and event data, adding to the discussion on process drift and workaround mining. Furthermore, exploring the mismatch categories offers insights for practitioners and researchers on how to handle and interpret data quality issues in event data.<\/jats:p>","DOI":"10.1007\/s12599-025-00943-5","type":"journal-article","created":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T12:16:35Z","timestamp":1747397795000},"page":"339-356","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Workarounds as a Cause of Mismatches in Business Processes\u2014"],"prefix":"10.1007","volume":"67","author":[{"given":"Christian","family":"Bartelheimer","sequence":"first","affiliation":[]},{"given":"Bernd","family":"L\u00f6hr","sequence":"additional","affiliation":[]},{"given":"Malte","family":"Reineke","sequence":"additional","affiliation":[]},{"given":"Agnes","family":"A\u00dfbrock","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Beverungen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,16]]},"reference":[{"key":"943_CR6","doi-asserted-by":"publisher","unstructured":"Alojairi A (2017) The dynamics of it workaround practices a theoretical concept and an empirical assessment. Int J Adv Comput Sci Appl 8(7):527\u2013534,https:\/\/doi.org\/10.14569\/ijacsa.2017.080773","DOI":"10.14569\/ijacsa.2017.080773"},{"key":"943_CR7","unstructured":"Alraddadi A, Champion D, Lagna A (2018) The role of workarounds in benefits realisation: Evidence from a field study in saudi arabia. In: UK academy for information systems annual conference (UKAIS), pp 1\u201317"},{"key":"943_CR8","doi-asserted-by":"publisher","unstructured":"Alter S (2014) Theory of workarounds. Commun AIS 34(1):1041\u20131066, https:\/\/doi.org\/10.17705\/1CAIS.03455","DOI":"10.17705\/1CAIS.03455"},{"key":"943_CR9","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1007\/978-3-319-19237-6_31","volume-title":"Enterprise, business-process and information systems modeling, LNBIP","author":"S Alter","year":"2015","unstructured":"Alter S (2015) A workaround design system for anticipating, designing, and\/or preventing workarounds. Enterprise, business-process and information systems modeling, LNBIP, vol 214. Springer International, Cham, pp 489\u2013498"},{"key":"943_CR10","doi-asserted-by":"crossref","unstructured":"Andrews R, Suriadi S, Ouyang C, Poppe E (2018) Towards event log querying for data quality. In: Panetto H, Debruyne C, Proper HA, Ardagna CA, Roman D, Meersman R (eds) On the move to meaningful internet systems. otm 2018 conferences, Springer International Publishing, Cham, pp 116\u2013134","DOI":"10.1007\/978-3-030-02610-3_7"},{"issue":"113","key":"943_CR11","first-page":"265","volume":"132","author":"R Andrews","year":"2020","unstructured":"Andrews R, van Dun C, Wynn MT, Kratsch W, R\u00f6glinger M, ter Hofstede A (2020) Quality-informed semi-automated event log generation for process mining. Decis Support Syst 132(113):265","journal-title":"Decis Support Syst"},{"key":"943_CR12","unstructured":"Assbrock A, L\u00f6hr B, Bartelheimer C, Beverungen D (2024) Workarounds as catalysts for process innovation: a multiple case study on pitfalls and protocols. In: International Conference on Information Systems (ICIS)"},{"key":"943_CR13","doi-asserted-by":"crossref","first-page":"1085","DOI":"10.1111\/isj.12435","volume":"33","author":"C Bartelheimer","year":"2023","unstructured":"Bartelheimer C, Wolf V, Beverungen D (2023) Workarounds as generative mechanisms for bottom-up process innovation\u2014insights from a multiple case study. Inf Syst J 33:1085\u20131150","journal-title":"Inf Syst J"},{"key":"943_CR14","unstructured":"Beerepoot I, Van de Weerd I (2018) Prevent, redesign, adopt or ignore: improving healthcare using knowledge of workarounds. In: Proceedings of the european conference on information systems (ECIS), pp 1\u201316"},{"key":"943_CR15","doi-asserted-by":"publisher","unstructured":"Beerepoot I, Lu X, Van\u00a0de Weerd I, Reijers H (2021) Seeing the signs of workarounds: a mixed-methods approach to the detection of nurses\u2019 process deviations. In: Hawaii international conference on system sciences, https:\/\/doi.org\/10.24251\/HICSS.2021.456","DOI":"10.24251\/HICSS.2021.456"},{"issue":"4","key":"943_CR16","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s12599-014-0335-3","volume":"6","author":"D Beverungen","year":"2014","unstructured":"Beverungen D (2014) Exploring the interplay of the design and emergence of business processes as organizational routines. Bus Inf Syst Eng 6(4):191\u2013202. https:\/\/doi.org\/10.1007\/s12599-014-0335-3","journal-title":"Bus Inf Syst Eng"},{"key":"943_CR17","doi-asserted-by":"publisher","unstructured":"Bose RJC, Mans RS, van\u00a0der Aalst WM (2013) Wanna improve process mining results? In: 2013 IEEE symposium on computational intelligence and data mining (CIDM), pp 127\u2013134, https:\/\/doi.org\/10.1109\/CIDM.2013.6597227","DOI":"10.1109\/CIDM.2013.6597227"},{"issue":"1","key":"943_CR18","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1080\/02683960110132070","volume":"17","author":"K Breu","year":"2002","unstructured":"Breu K, Hemingway CJ, Strathern M, Bridger D (2002) Workforce agility: the new employee strategy for the knowledge economy. J Inf Technol 17(1):21\u201331. https:\/\/doi.org\/10.1080\/02683960110132070","journal-title":"J Inf Technol"},{"key":"943_CR19","doi-asserted-by":"crossref","unstructured":"Buijs JCAM, van Dongen BF, van\u00a0der Aalst WMP (2014) Quality dimensions in process discovery: the importance of fitness, precision, generalization and simplicity. Int J Coop Inf Syst 23(01)","DOI":"10.1142\/S0218843014400012"},{"key":"943_CR20","unstructured":"Davison RM, Ou CX (2013) Sharing knowledge in technology deficient environments: Individual workarounds amid corporate restrictions. In: AIS (ed) Proceedings of the european conference on information systems (ECIS), pp 1\u201313"},{"key":"943_CR21","unstructured":"Deloitte (2023) Global process mining survey insights \u2014 the value of process mining for business process transformations. https:\/\/www2.deloitte.com\/us\/en\/pages\/consulting\/articles\/process-mining-business-transformation.html\/#-fullwidth-scc-form, accessed 01 Aug 2024"},{"key":"943_CR22","volume-title":"Fundamentals of Business Process Management","year":"2018","unstructured":"Dumas M, La Rosa M, Mendling J, Reijers H (eds) (2018) Fundamentals of Business Process Management, 2nd edn. Springer, Heidelberg","edition":"2"},{"key":"943_CR23","doi-asserted-by":"publisher","unstructured":"Dumas M, La Rosa M, Mendling J, Reijers HA (2018b) Introduction to business process management. In: Dumas M, La Rosa M, Mendling J, Reijers H (eds) Fundamentals of business process management, Springer, Heidelberg, pp 1\u201333, https:\/\/doi.org\/10.1007\/978-3-642-33143-5","DOI":"10.1007\/978-3-642-33143-5"},{"key":"943_CR24","doi-asserted-by":"crossref","unstructured":"Dunzer S, Stierle M, Matzner M, Baier S (2019) Conformance checking: a state-of-the-art literature review. In: Proceedings of the 11th international conference on subject-oriented business process management, pp 1\u201310","DOI":"10.1145\/3329007.3329014"},{"key":"943_CR25","volume-title":"The constitution of society: outline of the theory of structuration","author":"A Giddens","year":"1984","unstructured":"Giddens A (1984) The constitution of society: outline of the theory of structuration. University of California, Berkeley"},{"key":"943_CR26","doi-asserted-by":"publisher","unstructured":"Grisold T, Wurm B, Mendling J, vom Brocke J (2020) Using process mining to support theorizing about change in organizations. In: Bui T (ed) Proceedings of the hawaii international conference on system sciences (hicss), Hawaii International Conference on System Sciences, Proceedings of the Annual Hawaii International Conference on System Sciences, https:\/\/doi.org\/10.24251\/HICSS.2020.675","DOI":"10.24251\/HICSS.2020.675"},{"issue":"2","key":"943_CR27","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1007\/s10115-020-01524-6","volume":"63","author":"J Liu","year":"2021","unstructured":"Liu J, Xu J, Zhang R, Reiff-Marganiec S (2021) A repairing missing activities approach with succession relation for event logs. Knowl Inf Syst 63(2):477\u2013495","journal-title":"Knowl Inf Syst"},{"key":"943_CR28","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/978-3-031-78666-2_24","volume-title":"Business process management workshops","author":"B L\u00f6hr","year":"2025","unstructured":"L\u00f6hr B, Bartelheimer C, K\u00f6hne F, Nordlohne S, Alile D, Latten A (2025) Forging the longsword: Exaptation and enhancement of the sword framework for workaround detection. In: Gdowska K, G\u00f3mez-L\u00f3pez MT, Rehse JR (eds) Business process management workshops. Springer Nature Switzerland, Cham, pp 319\u2013331"},{"issue":"4","key":"943_CR29","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1111\/isj.12272","volume":"30","author":"J Malaurent","year":"2019","unstructured":"Malaurent J, Karanasios S (2019) Learning from workaround practices: the challenge of enterprise system implementations in multinational corporations. Inf Syst J 30(4):639\u2013663. https:\/\/doi.org\/10.1111\/isj.12272","journal-title":"Inf Syst J"},{"key":"943_CR30","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1007\/978-3-642-36438-9_10","volume-title":"Process support and knowledge representation in health care","author":"RS Mans","year":"2013","unstructured":"Mans RS, van der Aalst W, Vanwersch R, Moleman AJ (2013) Process mining in healthcare: data challenges when answering frequently posed questions. In: Lenz R, Miksch S, Peleg M, Reichert M, Ria\u00f1o D, ten Teije A (eds) Process support and knowledge representation in health care. Springer, Heidelberg, pp 140\u2013153"},{"key":"943_CR31","doi-asserted-by":"crossref","unstructured":"Marcus L, Schmid SJ, Friedrich F, R\u00f6glinger M, Grindemann P (2024) Navigating the landscape of organizational process mining setups. Bus Inf Syst Eng","DOI":"10.1007\/s12599-024-00908-0"},{"key":"943_CR32","first-page":"266","volume-title":"A companion to qualitative research","author":"P Mayring","year":"2004","unstructured":"Mayring P (2004) Qualitative content analysis. In: Flick U, von Kardorff E, Steinke I (eds) A companion to qualitative research, vol 1. Sage, Thouasand Oaks, pp 266\u2013269"},{"key":"943_CR33","volume-title":"Qualitative data analysis: an expanded sourcebook","author":"MB Miles","year":"1994","unstructured":"Miles MB, Huberman AM (1994) Qualitative data analysis: an expanded sourcebook. Sage, Thousand Oaks"},{"key":"943_CR34","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/978-3-642-38484-4_5","volume-title":"Enterprise, business-process and information systems modeling, LNBIP","author":"N Outmazgin","year":"2013","unstructured":"Outmazgin N, Soffer P (2013) Business process workarounds: what can and cannot be detected by process mining. In: van der Aalst W, Mylopoulos J, Rosemann M, Shaw MJ, Szyperski C, Nurcan S, Proper HA, Soffer P, Krogstie J, Schmidt R, Halpin T, Bider I (eds) Enterprise, business-process and information systems modeling, LNBIP, vol 147. Springer, Heidelberg, pp 48\u201362"},{"issue":"2","key":"943_CR35","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/s10270-014-0420-6","volume":"15","author":"N Outmazgin","year":"2016","unstructured":"Outmazgin N, Soffer P (2016) A process mining-based analysis of business process work-arounds. Soft Syst Model 15(2):309\u2013323","journal-title":"Soft Syst Model"},{"key":"943_CR36","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1007\/978-3-031-41623-1_22","volume-title":"Business process management forum","author":"N Outmazgin","year":"2023","unstructured":"Outmazgin N, van der Waal W, Beerepoot I, Hadar I, van de Weerd I, Soffer P (2023) From automatic workaround detection to process improvement: a case study. In: Di Francescomarino C, Burattin A, Janiesch C, Sadiq S (eds) Business process management forum. Springer Nature Switzerland, Cham, pp 372\u2013390"},{"issue":"5","key":"943_CR37","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1093\/icc\/dth070","volume":"14","author":"BT Pentland","year":"2005","unstructured":"Pentland BT, Feldman MS (2005) Organizational routines as a unit of analysis. Indust Corp Change 14(5):793\u2013815","journal-title":"Indust Corp Change"},{"issue":"1","key":"943_CR38","doi-asserted-by":"publisher","first-page":"19","DOI":"10.25300\/MISQ\/2020\/14458","volume":"44","author":"BT Pentland","year":"2020","unstructured":"Pentland BT, Liu P, Kremser W, Haerem T (2020) The dynamics of drift in digitized processes. MIS Q 44(1):19\u201347. https:\/\/doi.org\/10.25300\/MISQ\/2020\/14458","journal-title":"MIS Q"},{"key":"943_CR39","doi-asserted-by":"crossref","unstructured":"Pentland BT, Vaast E, Wolf JR (2021) Theorizing process dynamics with directed graphs: a diachronic analysis of digital trace data. MIS Q 45","DOI":"10.25300\/MISQ\/2021\/15360"},{"key":"943_CR40","unstructured":"Pinto AdV, Ma\u00e7ada ACG, Mallmann GL (2018) Impact of workaround behavior and shadow it usage on individual performance. CAPSI Proceedings"},{"key":"943_CR41","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-642-41641-5_10","volume-title":"The practice of enterprise modeling","author":"A Rogge-Solti","year":"2013","unstructured":"Rogge-Solti A, Mans RS, van der Aalst W, Weske M (2013) Improving documentation by repairing event logs. In: Grabis J, Kirikova M, Zdravkovic J, Stirna J (eds) The practice of enterprise modeling. Springer, Heidelberg, pp 129\u2013144"},{"key":"943_CR42","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/978-3-319-45348-4_11","volume-title":"Business process management","author":"A Rogge-Solti","year":"2016","unstructured":"Rogge-Solti A, Senderovich A, Weidlich M, Mendling J, Gal A (2016) In log and model we trust? a generalized conformance checking framework. In: La Rosa M, Loos P, Pastor O (eds) Business process management. Springer International Publishing, Cham, pp 179\u2013196"},{"key":"943_CR43","unstructured":"Safadi H, Faraj S (2010) The role of workarounds during an opensource electronic medical record system implementation. In: International conference on information systems (ICIS)"},{"key":"943_CR44","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/s12599-023-00802-1","volume":"65","author":"P Soffer","year":"2023","unstructured":"Soffer P, Outmazgin N, Hadar I, Tzafrir SS (2023) Why work around the process? analyzing workarounds through the lens of the theory of planned behavior. Bus Inf Syst Eng 65:369\u2013389","journal-title":"Bus Inf Syst Eng"},{"issue":"4","key":"943_CR45","doi-asserted-by":"crossref","first-page":"731","DOI":"10.2307\/25750703","volume":"34","author":"D Strong","year":"2010","unstructured":"Strong D, Volkoff O (2010) Understanding organization-enterprise system fit: a path to theorizing the information technology artifacts. MIS Q 34(4):731\u2013756","journal-title":"MIS Q"},{"key":"943_CR46","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.is.2016.07.011","volume":"64","author":"S Suriadi","year":"2017","unstructured":"Suriadi S, Andrews R, ter Hofstede A, Wynn M (2017) Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs. Inf Syst 64:132\u2013150","journal-title":"Inf Syst"},{"key":"943_CR47","doi-asserted-by":"publisher","unstructured":"Ter\u00a0Hofstede AHM, Koschmider A, Marrella A, Andrews R, Fischer DA, Sadeghianasl S, Wynn MT, Comuzzi M, De\u00a0Weerdt J, Goel K, Martin N, Soffer P (2023) Process-data quality: the true frontier of process mining. J Data Inf Qual 15(3), https:\/\/doi.org\/10.1145\/3613247","DOI":"10.1145\/3613247"},{"key":"943_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process mining: discovery, conformance and enhancement of business processes","author":"W van der Aalst","year":"2011","unstructured":"van der Aalst W (2011) Process mining: discovery, conformance and enhancement of business processes. Springer, Heidelberg"},{"key":"943_CR2","doi-asserted-by":"publisher","unstructured":"van\u00a0der Aalst W (2016) Operational support. In: Process mining: Data science in action, Springer, Heidelberg, pp 301\u2013321, https:\/\/doi.org\/10.1007\/978-3-662-49851-4_10","DOI":"10.1007\/978-3-662-49851-4_10"},{"key":"943_CR3","doi-asserted-by":"publisher","unstructured":"van\u00a0der Aalst W, Adriansyah A, de\u00a0Medeiros AKA, Arcieri F, Baier T, Blickle T, Bose JC, van\u00a0den Brand P, Brandtjen R, Buijs J, Burattin A, Carmona J, Castellanos M, Claes J, Cook J, Costantini N, Curbera F, Damiani E, de\u00a0Leoni M, Delias P, van Dongen BF, Dumas M, Dustdar S, Fahland D, Ferreira DR, Gaaloul W, van Geffen F, Goel S, G\u00fcnther C, Guzzo A, Harmon P, ter Hofstede A, Hoogland J, Ingvaldsen JE, Kato K, Kuhn R, Kumar A, La\u00a0Rosa M, Maggi F, Malerba D, Mans RS, Manuel A, McCreesh M, Mello P, Mendling J, Montali M, Motahari-Nezhad HR, zur Muehlen M, Munoz-Gama J, Pontieri L, Ribeiro J, Rozinat A, Seguel\u00a0P\u00e9rez H, Seguel\u00a0P\u00e9rez R, Sep\u00falveda M, Sinur J, Soffer P, Song M, Sperduti A, Stilo G, Stoel C, Swenson K, Talamo M, Tan W, Turner C, Vanthienen J, Varvaressos G, Verbeek E, Verdonk M, Vigo R, Wang J, Weber B, Weidlich M, Weijters T, Wen L, Westergaard M, Wynn M (2012) Process mining manifesto. In: Daniel F, Barkaoui K, Dustdar S (eds) Business process management workshops, Springer, Heidelberg, pp 169\u2013194,https:\/\/doi.org\/10.1007\/978-3-642-28108-2_19","DOI":"10.1007\/978-3-642-28108-2_19"},{"key":"943_CR4","doi-asserted-by":"publisher","unstructured":"van\u00a0der Aalst WMP (2022a) Foundations of process discovery. In: van\u00a0der Aalst WMP, Carmona J (eds) Process mining handbook, Springer International, Cham, pp 37\u201375,https:\/\/doi.org\/10.1007\/978-3-031-08848-3_2","DOI":"10.1007\/978-3-031-08848-3_2"},{"key":"943_CR5","doi-asserted-by":"publisher","unstructured":"van\u00a0der Aalst WMP (2022b) Process mining: A 360 degree overview. In: van\u00a0der Aalst WMP, Carmona J (eds) Process mining handbook, Springer International, Cham, pp 3\u201334,https:\/\/doi.org\/10.1007\/978-3-031-08848-3_1","DOI":"10.1007\/978-3-031-08848-3_1"},{"key":"943_CR48","doi-asserted-by":"publisher","unstructured":"van der Waal W, Beerepoot I, Van de Weerd I, Reijers HA (2022) The sword is mightier than the interview: A framework for semi-automatic workaround detection. In: Di Ciccio C, Dijkman R, Del R\u00edo Ortega A, Rinderle-Ma S (eds) Business process management, LNCS, vol 13420, Springer International Publishing, Cham, pp 91\u2013106, https:\/\/doi.org\/10.1007\/978-3-031-16103-2","DOI":"10.1007\/978-3-031-16103-2"},{"key":"943_CR49","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-023-00846-3","author":"W van der Waal","year":"2024","unstructured":"van der Waal W, Van de Weerd I, Beerepoot I, Lu X, Kappen T, Haitjema S, Reijers HA (2024) Putting the sword to the test: Finding workarounds with process mining. Bus Inf Syst Eng. https:\/\/doi.org\/10.1007\/s12599-023-00846-3","journal-title":"Bus Inf Syst Eng"},{"issue":"11","key":"943_CR50","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/240455.240479","volume":"39","author":"Y Wand","year":"1996","unstructured":"Wand Y, Wang RY (1996) Anchoring data quality dimensions in ontological foundations. Commun ACM 39(11):86\u201395. https:\/\/doi.org\/10.1145\/240455.240479","journal-title":"Commun ACM"},{"key":"943_CR51","unstructured":"Van\u00a0de Weerd I, Vollers P, Beerepoot I, Fantinato M (2018) Workarounds in retail work systems: Prevent, redesign, adopt or ignore? In: Proceedings of the european conference on information systems (ECIS)"},{"key":"943_CR52","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1080\/2573234X.2021.1978337","volume":"5","author":"S Weinzierl","year":"2021","unstructured":"Weinzierl S, Wolf V, Pauli T, Beverungen D, Matzner M (2021) Detecting temporal workarounds in business processes\u2014a deep-learning-based method for analysing event log data. J Bus Anal 5:76\u2013100","journal-title":"J Bus Anal"},{"key":"943_CR53","doi-asserted-by":"publisher","unstructured":"Wijnhoven F, Hoffmann P, Bemthuis R, Boksebeld J (2023) Using process mining for workarounds analysis in context: Learning from a small and medium-sized company case. Int J Inf Manag Data Insights 3(1):100,163, https:\/\/doi.org\/10.1016\/j.jjimei.2023.100163","DOI":"10.1016\/j.jjimei.2023.100163"},{"key":"943_CR54","volume-title":"Case Study Research and Applications: Design and Methods","author":"RK Yin","year":"2017","unstructured":"Yin RK (2017) Case Study Research and Applications: Design and Methods. SAGE, Thousand Oaks"},{"key":"943_CR55","first-page":"384","volume":"31","author":"ED Zamani","year":"2021","unstructured":"Zamani ED, Pouloudi N (2021) Generative mechanisms of workarounds, discontinuance and reframing: a study of negative disconfirmation with consumerised it. ISJ 31:384\u2013428","journal-title":"ISJ"},{"issue":"1","key":"943_CR56","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s10796-020-10067-8","volume":"24","author":"ED Zamani","year":"2022","unstructured":"Zamani ED, Pouloudi N, Giaglis GM, Wareham J (2022) Appropriating information technology artefacts through trial and error: the case of the tablet. Inf Syst Front 24(1):97\u2013119","journal-title":"Inf Syst Front"}],"container-title":["Business &amp; Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-025-00943-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12599-025-00943-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-025-00943-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T15:20:38Z","timestamp":1756999238000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12599-025-00943-5"}},"subtitle":["Insights from a Multiple Case Study"],"short-title":[],"issued":{"date-parts":[[2025,5,16]]},"references-count":56,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["943"],"URL":"https:\/\/doi.org\/10.1007\/s12599-025-00943-5","relation":{},"ISSN":["2363-7005","1867-0202"],"issn-type":[{"value":"2363-7005","type":"print"},{"value":"1867-0202","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,16]]},"assertion":[{"value":"1 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}