{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T15:53:41Z","timestamp":1770911621652,"version":"3.50.1"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319258966","type":"print"},{"value":"9783319258973","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25897-3_10","type":"book-chapter","created":{"date-parts":[[2015,10,27]],"date-time":"2015-10-27T15:20:38Z","timestamp":1445959238000},"page":"141-155","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Dealing with Risks and Workarounds: A Guiding Framework"],"prefix":"10.1007","author":[{"given":"Jo\u00e3o","family":"Barata","sequence":"first","affiliation":[]},{"given":"Paulo Rupino","family":"da Cunha","sequence":"additional","affiliation":[]},{"given":"Lu\u00eds","family":"Abrantes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,26]]},"reference":[{"key":"10_CR1","first-page":"1041","volume":"34","author":"S Alter","year":"2014","unstructured":"Alter, S.: Theory of workarounds. Commun. Assoc. Inf. Syst. 34, 1041\u20131066 (2014)","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"10_CR2","unstructured":"R\u00f6der, N., Wiesche, M., Schermann, M., Krcmar, H.: Workaround aware business process modeling. In: Proceedings of International Conference on Wirtschaftsinformatik, pp. 482\u2013496 (2015)"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1007\/978-3-540-72988-4_38","volume-title":"Advanced Information Systems Engineering","author":"J Stirna","year":"2007","unstructured":"Stirna, J., Persson, A., Sandkuhl, K.: Participative enterprise modeling: experiences and recommendations. In: Krogstie, J., Opdahl, A.L., Sindre, G. (eds.) CAiSE 2007 and WES 2007. LNCS, vol. 4495, pp. 546\u2013560. Springer, Heidelberg (2007)"},{"key":"10_CR4","unstructured":"ISO: ISO 9001 Quality management system \u2013 requirements. International Organization for Standardization, Geneva (2008)"},{"key":"10_CR5","unstructured":"IAF: Transition planning guidance for ISO 9001:2015. ISO\/TC 176\/SC2. International Accreditation Forum (2015)"},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1108\/BPMJ-07-2013-0093","volume":"20","author":"A Antunes","year":"2014","unstructured":"Antunes, A., Cunha, P.R., Barata, J.: MUVE IT: Reduce the Friction in Business Processes. Bus. Process Manag. J. 20, 571\u2013597 (2014)","journal-title":"Bus. Process Manag. J."},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Sadgrove, M.K.: The Complete Guide to Business Risk Management. Ashgate (2015)","DOI":"10.4324\/9781315614915"},{"key":"10_CR8","first-page":"1","volume":"14","author":"S Alter","year":"2004","unstructured":"Alter, S., Sherer, S.A.: A general, but readily adaptable model of information system risk. Commun. Assoc. Inf. Syst. 14, 1\u201328 (2004)","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"10_CR9","unstructured":"Zur M\u00fchlen, M., Rosemann, M.: Integrating Risks in Business Process Models. In: Proceedings of ACIS, pp. 62\u201372 (2005)"},{"key":"10_CR10","first-page":"933","volume":"34","author":"S Suriadi","year":"2014","unstructured":"Suriadi, S., Wei\u00df, B., Winkelmann, A., ter Hofstede, A.H.M., Adams, M., Conforti, R., Fidge, C., La Rosa, M., Ouyang, C., Pika, A., Rosemann, M., Wynn, M.: Current research in risk-aware business process management - overview, comparison, and gap analysis. Commun. Assoc. Inf. Syst. 34, 933\u2013984 (2014)","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1057\/palgrave.ejis.3000629","volume":"15","author":"EH Ferneley","year":"2006","unstructured":"Ferneley, E.H., Sobreperez, P.: Resist, comply or workaround? an examination of different facets of user engagement with information systems. Eur. J. Inf. Syst. 15, 345\u2013356 (2006)","journal-title":"Eur. J. Inf. Syst."},{"key":"10_CR12","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12074","author":"J Malaurent","year":"2015","unstructured":"Malaurent, J., Avison, D.: Reconciling global and local needs: a canonical action research project to deal with workarounds. Inf. Syst. J. (2015). doi:\n                    10.1111\/isj.12074","journal-title":"Inf. Syst. J."},{"key":"10_CR13","unstructured":"Popescu, M., Dascalu, A.: Considerations on integrating risk and quality management. Annals of \u201cDunarea de Jos\u201d University of Galati, Fascicle I, pp. 49\u201354 (2011)"},{"key":"10_CR14","unstructured":"Aureli, S., Salvatori, F.: The current state of risk management in italian small and medium-sized enterprises. In: Proceedings of AMIS, pp. 15\u201336 (2013)"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1186\/2251-712X-8-12","volume":"8","author":"A Islam","year":"2012","unstructured":"Islam, A., Tedford, D.: Risk determinants of small and medium-sized manufacturing enterprises (SMEs) - an exploratory study in New Zealand. J. Ind. Eng. Int. 8, 12 (2012)","journal-title":"J. Ind. Eng. Int."},{"key":"10_CR16","doi-asserted-by":"publisher","first-page":"582","DOI":"10.2307\/2392581","volume":"23","author":"GI Susman","year":"1978","unstructured":"Susman, G.I., Evered, R.D.: An assessment of the scientific merits of action research. Adm. Sci. Q. 23, 582\u2013603 (1978)","journal-title":"Adm. Sci. Q."},{"key":"10_CR17","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1111\/j.1365-2575.2004.00162.x","volume":"14","author":"R Davison","year":"2004","unstructured":"Davison, R., Martinsons, M.G., Kock, N.: Principles of canonical action research. Inf. Syst. J. 14, 65\u201386 (2004)","journal-title":"Inf. Syst. J."},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"19","DOI":"10.2469\/faj.v60.n6.2669","volume":"60","author":"GA Holton","year":"2006","unstructured":"Holton, G.A., Knight, F.: Defining risk. Financ. Anal. J. 60, 19\u201325 (2006)","journal-title":"Financ. Anal. J."},{"key":"10_CR19","first-page":"1","volume":"11","author":"RS Kaplan","year":"2009","unstructured":"Kaplan, R.S.: Risk management and the strategy execution system. Balanc. Scorec. Rep. 11, 1\u20136 (2009)","journal-title":"Balanc. Scorec. Rep."},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-642-03964-5_16","volume-title":"E-Commerce and Web Technologies","author":"M Zoet","year":"2009","unstructured":"Zoet, M., Welke, R., Versendaal, J., Ravesteyn, P.: Aligning risk management and compliance considerations with business process development. In: Di Noia, T., Buccafurri, F. (eds.) EC-Web 2009. LNCS, vol. 5692, pp. 157\u2013168. Springer, Heidelberg (2009)"},{"key":"10_CR21","unstructured":"NIST, N.I. of S. and T.: NIST SP 800-37: Guide for Applying the Risk Management Framework to Federal Information Systems: a Security Life Cycle Approach (2010)"},{"key":"10_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-75183-0_12","volume-title":"Business Process Management","author":"W Sadiq","year":"2007","unstructured":"Sadiq, W., Governatori, G., Namiri, K.: Modeling control objectives for business process compliance. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 149\u2013164. Springer, Heidelberg (2007)"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Handel, M.J., Poltrock, S.: Working around official applications. In: Proceedings of CSCW (2011)","DOI":"10.1145\/1958824.1958870"},{"key":"10_CR24","unstructured":"R\u00f6der, N., Schermann, M.: Why managers tolerate workarounds - the role of information systems. In: Proceedings of AMCIS (2014)"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Zhou, X., Ackerman, M., Zheng, K.: CPOE workarounds, boundary objects, and assemblages. In: Proceedings of CHI (2011)","DOI":"10.1145\/1978942.1979439"},{"key":"10_CR26","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1097\/01.HMR.0000304495.95522.ca","volume":"33","author":"JRB Halbesleben","year":"2008","unstructured":"Halbesleben, J.R.B., Wakefield, D.S., Wakefield, B.J.: Work-arounds in health care settings: Literature review and research agenda. Health Care Manage. Rev. 33, 2\u201312 (2008)","journal-title":"Health Care Manage. Rev."},{"key":"10_CR27","doi-asserted-by":"publisher","first-page":"1043","DOI":"10.1080\/1478336042000255497","volume":"15","author":"D Gallear","year":"2004","unstructured":"Gallear, D., Ghobadian, A.: An empirical investigation of the channels that facilitate a total quality culture. Total Qual. Manag. Bus. Excell. 15, 1043\u20131067 (2004)","journal-title":"Total Qual. Manag. Bus. Excell."},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Persson, A., Stirna, J.: An explorative study into the influence of business goals on the practical use of enterprise modelling methods and tools. In: Proceedings of ISD, pp. 275\u2013287. Springer, New York (2001)","DOI":"10.1007\/978-1-4615-0595-2_22"},{"key":"10_CR29","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1111\/j.1539-6924.2008.01186.x","volume":"29","author":"KJ Holmes","year":"2009","unstructured":"Holmes, K.J., Graham, J.A., McKone, T., Whipple, C.: Regulatory models and the environment: practice, pitfalls, and prospects. Risk Anal. 29, 159\u2013170 (2009)","journal-title":"Risk Anal."},{"key":"10_CR30","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-642-41641-5_15","volume-title":"The Practice of Enterprise Modeling","author":"J Barata","year":"2013","unstructured":"Barata, J., da Cunha, P.R.: Modeling the organizational regulatory space: a joint design approach. In: Grabis, J., Kirikova, M., Zdravkovic, J., Stirna, J. (eds.) PoEM 2013. LNBIP, vol. 165, pp. 206\u2013220. Springer, Heidelberg (2013)"},{"key":"10_CR31","unstructured":"Barata, J., Cunha, P.R.: Five dimensions of information systems: a perspective from the IS and quality managers. In: Proceedings of EMCIS, Windsor, UK (2013)"},{"key":"10_CR32","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.intcom.2010.07.003","volume":"23","author":"G Baxter","year":"2011","unstructured":"Baxter, G., Sommerville, I.: Socio-technical systems: from design methods to systems engineering. Interact. Comput. 23, 4\u201317 (2011)","journal-title":"Interact. Comput."},{"key":"10_CR33","unstructured":"Ojala, M., Vilpola, I., Kouri, I.: Risks and risk management in ERP Project-cases in SME Context. In: Proceedings of 9th International Conference on Business Information Systems (BIS 2006), pp. 179\u2013186 (2006)"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Kim, J.K., Sharman, R., Rao, H.R., Upadhyaya, S.: Framework for analyzing critical incident management systems (CIMS). In: Proceedings of HICSS (2006)","DOI":"10.1037\/t68563-000"},{"key":"10_CR35","unstructured":"Nadhrah, N., Michell, V.: A normative method to analyse workarounds in a healthcare environment: motivations, consequences, and constraints. In: Proceedings of ICISO, pp. 195\u2013205 (2013)"},{"key":"10_CR36","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/s10796-010-9235-3","volume":"13","author":"S Strecker","year":"2010","unstructured":"Strecker, S., Heise, D., Frank, U.: RiskM: A multi-perspective modeling method for IT risk assessment. Inf. Syst. Front. 13, 595\u2013611 (2010)","journal-title":"Inf. Syst. Front."},{"key":"10_CR37","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.accinf.2005.10.005","volume":"7","author":"C Carnaghan","year":"2006","unstructured":"Carnaghan, C.: Business process modeling approaches in the context of process level audit risk assessment: an analysis and comparison. Int. J. Account. Inf. Syst. 7, 170\u2013204 (2006)","journal-title":"Int. J. Account. Inf. Syst."},{"key":"10_CR38","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"AR Hevner","year":"2004","unstructured":"Hevner, A.R., March, S.T., Park, J.: Design science in information systems research. MIS Q. 28, 75\u2013105 (2004)","journal-title":"MIS Q."},{"key":"10_CR39","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1057\/palgrave.ejis.3000298","volume":"7","author":"R Baskerville","year":"1998","unstructured":"Baskerville, R., Wood-Harper, A.T.: Diversity in information systems action research methods. Eur. J. Inf. Syst. 7, 90\u2013107 (1998)","journal-title":"Eur. J. Inf. Syst."},{"key":"10_CR40","first-page":"1","volume":"7","author":"E Vries","year":"2007","unstructured":"Vries, E.: Rigorously relevant action research in information systems. Sprouts Work. Pap. Inf. Syst. 7, 1\u201324 (2007)","journal-title":"Sprouts Work. Pap. Inf. Syst."},{"key":"10_CR41","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.infoandorg.2006.11.001","volume":"17","author":"MD Myers","year":"2007","unstructured":"Myers, M.D., Newman, M.: The qualitative interview in IS research: examining the craft. Inf. Organ. 17, 2\u201326 (2007)","journal-title":"Inf. Organ."},{"key":"10_CR42","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.arcontrol.2003.09.004","volume":"27","author":"P Bernus","year":"2003","unstructured":"Bernus, P.: Enterprise models for enterprise architecture and ISO9000:2000. Annu. Rev. Control. 27, 211\u2013220 (2003)","journal-title":"Annu. Rev. Control."},{"key":"10_CR43","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.ijhcs.2011.08.002","volume":"70","author":"Z Yang","year":"2012","unstructured":"Yang, Z., Ng, B.Y., Kankanhalli, A., Luen Yip, J.W.: Workarounds in the use of IS in healthcare: a case study of an electronic medication administration system. Int. J. Hum. Comput. Stud. 70, 43\u201365 (2012)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"10_CR44","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.infoandorg.2008.08.001","volume":"18","author":"BT Pentland","year":"2008","unstructured":"Pentland, B.T., Feldman, M.S.: Designing routines: on the folly of designing artifacts, while hoping for patterns of action. Inf. Organ. 18, 235\u2013250 (2008)","journal-title":"Inf. Organ."},{"key":"10_CR45","doi-asserted-by":"crossref","unstructured":"Barata, J., Cunha, P.R.: ISO2: A new breath for the joint development of IS and ISO 9001 management systems. In: Escalona, M., Arag\u00f3n, G., Linger, H., Lang, M., Barry, C., Schneider, C. (eds.) Information Systems Development: Improving Enterprise Communication (Proceedings of ISD), pp. 499\u2013510. Springer, Switzerland (2014)","DOI":"10.1007\/978-3-319-07215-9_40"},{"key":"10_CR46","doi-asserted-by":"crossref","first-page":"763","DOI":"10.2307\/41703480","volume":"36","author":"R Davison","year":"2012","unstructured":"Davison, R., Martinsons, M.G., Ou, C.X.J.: The roles of theory in canonical action research. MIS Q. 36, 763\u2013786 (2012)","journal-title":"MIS Q."},{"key":"10_CR47","doi-asserted-by":"crossref","unstructured":"Luebbe, A., Weske, M.: Investigating process elicitation workshops using action research. In: Proceedings of BPM 2011 International Workshops, LNBIP 99, pp. 345\u2013356. Springer, Heidelberg (2012)","DOI":"10.1007\/978-3-642-28108-2_34"},{"key":"10_CR48","unstructured":"French, J.R.P.: Field experiments: changing group productivity. In: Miller, J.G. (ed.) Experiments in Social Process: A Symposium on Social Psychology, pp. 81\u201396. McGraw-Hill, New York (1950)"}],"container-title":["Lecture Notes in Business Information Processing","The Practice of Enterprise Modeling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25897-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T20:15:51Z","timestamp":1572120951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25897-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319258966","9783319258973"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25897-3_10","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"26 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}