Skip to main content
Top
Published in: Business & Information Systems Engineering 4/2023

07-03-2023 | Research Paper

Why Work Around the Process? Analyzing Workarounds Through the Lens of the Theory of Planned Behavior

Authors: Pnina Soffer, Nesi Outmazgin, Irit Hadar, Shay Tzafrir

Published in: Business & Information Systems Engineering | Issue 4/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Workarounds are a common practice in a broad range of organizational and technological contexts, which has received much attention in information systems research. They are sometimes considered negatively, associated with business risks and noncompliance, and sometimes positively, as a source of innovation and improvement. Although workaround-based process improvements typically adopt the workaround if its consequences are not harmful, this is not always the best option. The paper aims to pave the way for leveraging workarounds for process improvement by understanding problems that motivate them, so alternative solutions can be developed for these problems. Despite many proposed explanations, an in-depth understanding of the reasons underlying employee decisions that lead to workarounds is still needed. To this end, following a qualitative research approach, data were collected in six case study organizations, investigating workaround decisions made by employees through the lens of the theory of planned behavior. The principal unique theme running throughout the findings is that workaround motivation stems from perceived misalignment between organizational, local unit, or personal goals and their realization in business processes. Workarounds are enabled by various factors, including perceived workaround opportunities in the organization. These findings are abstracted to form an explanatory model as a contextual adaptation of the theory of planned behavior to explain workaround intentions. The proposed model explains workaround decisions in a way that can leverage this understanding to promote concrete process improvements.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Show more products
Appendix
Available only for authorised users
Footnotes
1
Although BPMN models can also depict data objects, including all relevant objects would result in highly complex models, which would hamper their effectiveness as a communication platform with the interviewees. Hence, we opted to use models that mainly represent the control flow of processes.
 
Literature
go back to reference Abdullah NS, Sadiq S, Indulska M (2010) Emerging challenges in information systems research for regulatory compliance management. In: Pernici B (ed) Advanced information systems engineering. Springer, pp 251–265 Abdullah NS, Sadiq S, Indulska M (2010) Emerging challenges in information systems research for regulatory compliance management. In: Pernici B (ed) Advanced information systems engineering. Springer, pp 251–265
go back to reference Ajzen I (1985) From intentions to actions: a theory of planned behavior. Springer Ajzen I (1985) From intentions to actions: a theory of planned behavior. Springer
go back to reference Ajzen I (1991) The theory of planned behavior. Organ Behav Hum Decis Proc 50(2):179–211CrossRef Ajzen I (1991) The theory of planned behavior. Organ Behav Hum Decis Proc 50(2):179–211CrossRef
go back to reference Ajzen I (2011) The theory of planned behaviour: reactions and reflections. Psychol Health 26:1113–1127CrossRef Ajzen I (2011) The theory of planned behaviour: reactions and reflections. Psychol Health 26:1113–1127CrossRef
go back to reference Ajzen I (2020) The theory of planned behavior: frequently asked questions. Hum Behav Emerg Technol 2(4):314–324CrossRef Ajzen I (2020) The theory of planned behavior: frequently asked questions. Hum Behav Emerg Technol 2(4):314–324CrossRef
go back to reference Ajzen I, Fishbein M (1974) Factors influencing intentions and the intention-behavior relation. Hum Relat 27(1):1–15CrossRef Ajzen I, Fishbein M (1974) Factors influencing intentions and the intention-behavior relation. Hum Relat 27(1):1–15CrossRef
go back to reference Alter S (2014) Theory of workarounds. Commun Assoc Inf Syst 34(1):1041–1066 Alter S (2014) Theory of workarounds. Commun Assoc Inf Syst 34(1):1041–1066
go back to reference Alter S (2015) A workaround design system for anticipating, designing, and/or preventing workarounds. In: Gulden J et al (eds) Enterprise, business-process and information systems modeling. Springer, pp 489–498CrossRef Alter S (2015) A workaround design system for anticipating, designing, and/or preventing workarounds. In: Gulden J et al (eds) Enterprise, business-process and information systems modeling. Springer, pp 489–498CrossRef
go back to reference Azad B, King N (2008) Enacting computer workaround practices within a medication dispensing system. Eur J Inf Syst 17(3):264–278CrossRef Azad B, King N (2008) Enacting computer workaround practices within a medication dispensing system. Eur J Inf Syst 17(3):264–278CrossRef
go back to reference Baker T, Nelson RE (2005) Creating something from nothing: resource construction through entrepreneurial bricolage. Admin Sci Q 50(3):329–366CrossRef Baker T, Nelson RE (2005) Creating something from nothing: resource construction through entrepreneurial bricolage. Admin Sci Q 50(3):329–366CrossRef
go back to reference Bamberger P (2008) Beyond contextualization: using context theories to narrow the micro-macro gap in management research. Acad Manag J 51(5):839–846CrossRef Bamberger P (2008) Beyond contextualization: using context theories to narrow the micro-macro gap in management research. Acad Manag J 51(5):839–846CrossRef
go back to reference Beerepoot I, Ouali A, van de Weerd I, Reijers HA (2019a) Working around health information systems: to accept or not to accept? In: Proceedings of the 27th European conference on information systems. AIS eLibrary Beerepoot I, Ouali A, van de Weerd I, Reijers HA (2019a) Working around health information systems: to accept or not to accept? In: Proceedings of the 27th European conference on information systems. AIS eLibrary
go back to reference Beerepoot I, van de Weerd I, Reijers HA (2019b) The potential of workarounds for improving processes. In: International conference on business process management. Springer Beerepoot I, van de Weerd I, Reijers HA (2019b) The potential of workarounds for improving processes. In: International conference on business process management. Springer
go back to reference Beerepoot I, Lu X, van de Weerd I, Alexander Reijers H (2021) Seeing the signs of workarounds: a mixed-methods approach to the detection of nurses’ process deviations. In: Proceedings of the 54th Hawaii international conference on system sciences. AIS eLibrary, pp 3763–3772 Beerepoot I, Lu X, van de Weerd I, Alexander Reijers H (2021) Seeing the signs of workarounds: a mixed-methods approach to the detection of nurses’ process deviations. In: Proceedings of the 54th Hawaii international conference on system sciences. AIS eLibrary, pp 3763–3772
go back to reference Berente N, Yoo Y (2012) Institutional contradictions and loose coupling: post implementation of NASA’s Enterprise Information System. Inf Syst Res 23(2):376–396CrossRef Berente N, Yoo Y (2012) Institutional contradictions and loose coupling: post implementation of NASA’s Enterprise Information System. Inf Syst Res 23(2):376–396CrossRef
go back to reference Boudreau P, Vieru D, Paquette G, Heon M (2016) The workarounds process as a source of knowledge creation and management. In: Proceedings of the 49th Hawaii international conference on system sciences. AIS eLibrary, pp 4292–4301 Boudreau P, Vieru D, Paquette G, Heon M (2016) The workarounds process as a source of knowledge creation and management. In: Proceedings of the 49th Hawaii international conference on system sciences. AIS eLibrary, pp 4292–4301
go back to reference Campbell D (2012) Public managers in integrated services collaboratives: what works is workarounds. Publ Admin Rev 72(5):721–730CrossRef Campbell D (2012) Public managers in integrated services collaboratives: what works is workarounds. Publ Admin Rev 72(5):721–730CrossRef
go back to reference Ciborra C (1999) Notes on improvisation and time in organizations. Account Manag Inf Technol 9:77–94 Ciborra C (1999) Notes on improvisation and time in organizations. Account Manag Inf Technol 9:77–94
go back to reference Cropanzano R, Goldman B, Folger R (2005) Self-interest: defining and understanding a human motive. J Organ Behav 26(8):985–991CrossRef Cropanzano R, Goldman B, Folger R (2005) Self-interest: defining and understanding a human motive. J Organ Behav 26(8):985–991CrossRef
go back to reference Dacin MT, Goodstein J, Scott WR (2002) Institutional theory and institutional change: Introduction to the special research forum. Acad Manag J 45(1):45–56CrossRef Dacin MT, Goodstein J, Scott WR (2002) Institutional theory and institutional change: Introduction to the special research forum. Acad Manag J 45(1):45–56CrossRef
go back to reference Davison RM, Ou CX (2013) Sharing knowledge in technology deficient environments: Individual workarounds amid corporate restrictions. In: Proceedings of the 21st European conference on information systems. AIS eLibrary Davison RM, Ou CX (2013) Sharing knowledge in technology deficient environments: Individual workarounds amid corporate restrictions. In: Proceedings of the 21st European conference on information systems. AIS eLibrary
go back to reference Dittes S, Urbach N, Ahlemann F, Smolnik S, Müller T (2015) Why don’t you stick to them? Understanding factors influencing and counter-measures to combat deviant behavior towards organizational IT standards. In: Proceedings of the 12th international conference on Wirtschaftsinformatik. AIS eLibrary, pp 615–629 Dittes S, Urbach N, Ahlemann F, Smolnik S, Müller T (2015) Why don’t you stick to them? Understanding factors influencing and counter-measures to combat deviant behavior towards organizational IT standards. In: Proceedings of the 12th international conference on Wirtschaftsinformatik. AIS eLibrary, pp 615–629
go back to reference Dubinsky Y, Soffer P (2021) Detecting the “split-cases” workaround in event logs. In: Gulden J et al (eds) Enterprise, business-process and information systems modeling. Springer, pp 47–61CrossRef Dubinsky Y, Soffer P (2021) Detecting the “split-cases” workaround in event logs. In: Gulden J et al (eds) Enterprise, business-process and information systems modeling. Springer, pp 47–61CrossRef
go back to reference Edwards JR, Cable DM (2009) The value of value congruence. J Appl Psychol 94(3):654–677CrossRef Edwards JR, Cable DM (2009) The value of value congruence. J Appl Psychol 94(3):654–677CrossRef
go back to reference Eisenhardt KM (1989) Agency theory: an assessment and review. Acad Manag Rev 14(1):57–74CrossRef Eisenhardt KM (1989) Agency theory: an assessment and review. Acad Manag Rev 14(1):57–74CrossRef
go back to reference Eisenhardt KM, Graebner ME (2007) Theory building from cases: opportunities and challenges. Acad Manag J 50(1):25–32CrossRef Eisenhardt KM, Graebner ME (2007) Theory building from cases: opportunities and challenges. Acad Manag J 50(1):25–32CrossRef
go back to reference Ejnefjäll T, Ågerfalk PJ (2019) Conceptualizing workarounds: meanings and manifestations in information systems research. Commun Assoc Inf Syst 45(1):20 Ejnefjäll T, Ågerfalk PJ (2019) Conceptualizing workarounds: meanings and manifestations in information systems research. Commun Assoc Inf Syst 45(1):20
go back to reference Engeström Y (1999) Activity theory and individual and social transformation. Perspect Activity Theor 19(38):19–30CrossRef Engeström Y (1999) Activity theory and individual and social transformation. Perspect Activity Theor 19(38):19–30CrossRef
go back to reference Ferneley EH, Sobreperez P (2006) Resist, comply or workaround? An examination of different facets of user engagement with information systems. Eur J Inf Syst 15(4):345–356CrossRef Ferneley EH, Sobreperez P (2006) Resist, comply or workaround? An examination of different facets of user engagement with information systems. Eur J Inf Syst 15(4):345–356CrossRef
go back to reference Friedman A, Crosson J, Howard J, Clark E, Pellerano M, Crabtree B, Jaen C, Cohen DJ (2014) A typology of electronic health record workarounds in small-to-medium size primary care practices. J Am Med Inform Assoc 21:e78–e83CrossRef Friedman A, Crosson J, Howard J, Clark E, Pellerano M, Crabtree B, Jaen C, Cohen DJ (2014) A typology of electronic health record workarounds in small-to-medium size primary care practices. J Am Med Inform Assoc 21:e78–e83CrossRef
go back to reference Fries VC, Wiesche M, Krcmar H (2016) The dualism of workarounds: effects of technology and workload on improvement and noncompliant behavior within organizations. In: International Conference on Information Systems. AIS Library Fries VC, Wiesche M, Krcmar H (2016) The dualism of workarounds: effects of technology and workload on improvement and noncompliant behavior within organizations. In: International Conference on Information Systems. AIS Library
go back to reference Gasser L (1986) The integration of computing and routine work. ACM Trans off Inf Syst 4(3):205–225CrossRef Gasser L (1986) The integration of computing and routine work. ACM Trans off Inf Syst 4(3):205–225CrossRef
go back to reference Ginsberg A (1988) Measuring and modelling changes in strategy: theoretical foundations and empirical directions. Strateg Manag J 9(6):559–575CrossRef Ginsberg A (1988) Measuring and modelling changes in strategy: theoretical foundations and empirical directions. Strateg Manag J 9(6):559–575CrossRef
go back to reference Guba EG (1981) Criteria for assessing the trustworthiness of naturalistic inquiries. ECTJ 29(2):75–91CrossRef Guba EG (1981) Criteria for assessing the trustworthiness of naturalistic inquiries. ECTJ 29(2):75–91CrossRef
go back to reference Halbesleben JR, Savage GT, Wakefield DS, Wakefield BJ (2010) Rework and workarounds in nurse medication administration process: implications for work processes and patient safety. Health Care Manag Rev 35(2):124–133CrossRef Halbesleben JR, Savage GT, Wakefield DS, Wakefield BJ (2010) Rework and workarounds in nurse medication administration process: implications for work processes and patient safety. Health Care Manag Rev 35(2):124–133CrossRef
go back to reference Hammer M (2010) What is business process management? In: vom Brocke J, Rosemann M (eds) Handbook on business process management: Introduction, methods, and information systems. Springer, pp 3–16CrossRef Hammer M (2010) What is business process management? In: vom Brocke J, Rosemann M (eds) Handbook on business process management: Introduction, methods, and information systems. Springer, pp 3–16CrossRef
go back to reference Harmon P (2010) Business process change: a guide for business managers and BPM and Six Sigma professionals. Morgan Kaufmann Harmon P (2010) Business process change: a guide for business managers and BPM and Six Sigma professionals. Morgan Kaufmann
go back to reference Holley DM (1999) Self-interest and beyond. Paragon House Holley DM (1999) Self-interest and beyond. Paragon House
go back to reference IBM (2006) Acronyms and terminology. In: Customer care handbook (Version 1.2) IBM (2006) Acronyms and terminology. In: Customer care handbook (Version 1.2)
go back to reference Ignatiadis I, Nandhakumar J (2009) The effect of ERP system workarounds on organizational control: an interpretivist case study. Scand J Inf Syst 21(2):3 Ignatiadis I, Nandhakumar J (2009) The effect of ERP system workarounds on organizational control: an interpretivist case study. Scand J Inf Syst 21(2):3
go back to reference Johns G (2006) The essential impact of context on organizational behavior. Acad Manag Rev 31(2):386–408CrossRef Johns G (2006) The essential impact of context on organizational behavior. Acad Manag Rev 31(2):386–408CrossRef
go back to reference Johns G (2018) Advances in the treatment of context in organizational research. Ann Rev Organ Psychol Organ Behav 5:21–46CrossRef Johns G (2018) Advances in the treatment of context in organizational research. Ann Rev Organ Psychol Organ Behav 5:21–46CrossRef
go back to reference Klotz S, Kopper A, Westner M, Strahringer S (2019) Causing factors, outcomes, and governance of Shadow IT and business-managed IT: a systematic literature review. Int J Inf Syst Proj Manag 7(1):15–43 Klotz S, Kopper A, Westner M, Strahringer S (2019) Causing factors, outcomes, and governance of Shadow IT and business-managed IT: a systematic literature review. Int J Inf Syst Proj Manag 7(1):15–43
go back to reference Kobayashi IM, Fussell SR, Xiao Y, Seagull FJ (2005) Work co-ordination, workflow, and workarounds in a medical context. In: CHI'05 extended abstracts on human factors in computing systems. Association for Computing Machinery, pp 1561–1564 Kobayashi IM, Fussell SR, Xiao Y, Seagull FJ (2005) Work co-ordination, workflow, and workarounds in a medical context. In: CHI'05 extended abstracts on human factors in computing systems. Association for Computing Machinery, pp 1561–1564
go back to reference Koopman P, Hoffman RR (2003) Work-arounds, make-work, and kludges. IEEE Intell Syst 2003:70–75CrossRef Koopman P, Hoffman RR (2003) Work-arounds, make-work, and kludges. IEEE Intell Syst 2003:70–75CrossRef
go back to reference Koppel R, Smith S, Blythe J, Kothari V (2015) Workarounds to computer access in healthcare organizations: you want my password or a dead patient? In: Courtney KL et al (eds) Driving quality in informatics: fulfilling the promise. IOS Press, pp 215–220 Koppel R, Smith S, Blythe J, Kothari V (2015) Workarounds to computer access in healthcare organizations: you want my password or a dead patient? In: Courtney KL et al (eds) Driving quality in informatics: fulfilling the promise. IOS Press, pp 215–220
go back to reference Laumer S, Maier C, Weitzel T (2017) Information quality, user satisfaction, and the manifestation of workarounds: a qualitative and quantitative study of enterprise content management system users. Eur J Inf Syst 26(4):333–360CrossRef Laumer S, Maier C, Weitzel T (2017) Information quality, user satisfaction, and the manifestation of workarounds: a qualitative and quantitative study of enterprise content management system users. Eur J Inf Syst 26(4):333–360CrossRef
go back to reference Malaurent J, Avison D (2016) Reconciling global and local needs: a canonical action research project to deal with workarounds. Inf Syst J 26(3):227–257CrossRef Malaurent J, Avison D (2016) Reconciling global and local needs: a canonical action research project to deal with workarounds. Inf Syst J 26(3):227–257CrossRef
go back to reference Malaurent J, Karanasios S (2020) Learning from workaround practices: the challenge of enterprise system implementations in multinational corporations. Inf Syst J 30(4):639–663CrossRef Malaurent J, Karanasios S (2020) Learning from workaround practices: the challenge of enterprise system implementations in multinational corporations. Inf Syst J 30(4):639–663CrossRef
go back to reference McGann ST, Lyytinen K (2008) The improvisation effect: a case study of user improvisation and its effects on information system evolution. In: Proceedings of the International Conference on Information Systems. AIS eLibrary, p 209 McGann ST, Lyytinen K (2008) The improvisation effect: a case study of user improvisation and its effects on information system evolution. In: Proceedings of the International Conference on Information Systems. AIS eLibrary, p 209
go back to reference Meglino BM, Ravlin EC (1998) Individual values in organizations: concepts, controversies, and research. J Manag 24(3):351–389 Meglino BM, Ravlin EC (1998) Individual values in organizations: concepts, controversies, and research. J Manag 24(3):351–389
go back to reference Miles MB, Huberman AM, Saldaña J (2014) Qualitative data analysis: a methods sourcebook, 3rd edn. Sage Miles MB, Huberman AM, Saldaña J (2014) Qualitative data analysis: a methods sourcebook, 3rd edn. Sage
go back to reference Mize JF (2019) The roundabout way to disaster: recognizing and responding to normalization of deviance. Process Saf Progr 38(2):e12014CrossRef Mize JF (2019) The roundabout way to disaster: recognizing and responding to normalization of deviance. Process Saf Progr 38(2):e12014CrossRef
go back to reference Morrow SL (2005) Quality and trustworthiness in qualitative research in behavioral psychology. J Couns Psychol 52:250–260CrossRef Morrow SL (2005) Quality and trustworthiness in qualitative research in behavioral psychology. J Couns Psychol 52:250–260CrossRef
go back to reference Myers MD, Newman M (2007) The qualitative interview in IS research: examining the craft. Inf Organ 17:2–26CrossRef Myers MD, Newman M (2007) The qualitative interview in IS research: examining the craft. Inf Organ 17:2–26CrossRef
go back to reference Orlikowski WJ, Gash DC (1994) Technological frames: making sense of information technology in organizations. ACM Trans Inf Syst 12(2):669–702CrossRef Orlikowski WJ, Gash DC (1994) Technological frames: making sense of information technology in organizations. ACM Trans Inf Syst 12(2):669–702CrossRef
go back to reference Outmazgin N, Soffer P (2016) A process mining-based analysis of business process workarounds. Softw Syst Model 15(2):309–323CrossRef Outmazgin N, Soffer P (2016) A process mining-based analysis of business process workarounds. Softw Syst Model 15(2):309–323CrossRef
go back to reference Outmazgin N, Soffer P, Hadar I (2020) Workarounds in business processes: a goal-based analysis. In: Conference on Advanced Information Systems Engineering. Springer, pp 368–383 Outmazgin N, Soffer P, Hadar I (2020) Workarounds in business processes: a goal-based analysis. In: Conference on Advanced Information Systems Engineering. Springer, pp 368–383
go back to reference Petrides LA, McClelland SI, Nodine TR (2004) Costs and benefits of the workaround: Inventive solution or costly alternative. Int J Educ Manag 18(2):100–108CrossRef Petrides LA, McClelland SI, Nodine TR (2004) Costs and benefits of the workaround: Inventive solution or costly alternative. Int J Educ Manag 18(2):100–108CrossRef
go back to reference Pinto de Vargas A, Maçada ACG, Mallmann GL (2018) Workaround behaviour in information systems research. Revista De Gestão 25(4):430–446CrossRef Pinto de Vargas A, Maçada ACG, Mallmann GL (2018) Workaround behaviour in information systems research. Revista De Gestão 25(4):430–446CrossRef
go back to reference Poelmans S (1999) Workarounds and distributed viscosity in a workflow system: a case study. ACM SIGGROUP Bull 20(3):11–12CrossRef Poelmans S (1999) Workarounds and distributed viscosity in a workflow system: a case study. ACM SIGGROUP Bull 20(3):11–12CrossRef
go back to reference Renzi S, Klobas J (2008) Using the theory of planned behavior with qualitative research. Bocconi University, Carlo F, Dondena Centre for Research on Social Dynamics Renzi S, Klobas J (2008) Using the theory of planned behavior with qualitative research. Bocconi University, Carlo F, Dondena Centre for Research on Social Dynamics
go back to reference Robinson SL, Bennet RJ (1995) A typology of deviant workplace behaviors: a multidimensional scaling study. Acad Manag J 38(2):555–572CrossRef Robinson SL, Bennet RJ (1995) A typology of deviant workplace behaviors: a multidimensional scaling study. Acad Manag J 38(2):555–572CrossRef
go back to reference Röder N, Wiesche M, Schermann M (2014a) A situational perspective on workarounds in IT-enabled business processes: a multiple case study. In: Proceedings of the 22nd European Conference on Information Systems. AIS eLibrary Röder N, Wiesche M, Schermann M (2014a) A situational perspective on workarounds in IT-enabled business processes: a multiple case study. In: Proceedings of the 22nd European Conference on Information Systems. AIS eLibrary
go back to reference Röder N, Wiesche M, Schermann M, Krcmar H (2014b) Why managers tolerate workarounds—the role of information systems. In: AMCIS 2014b proceedings. AIS eLibrary, p 14 Röder N, Wiesche M, Schermann M, Krcmar H (2014b) Why managers tolerate workarounds—the role of information systems. In: AMCIS 2014b proceedings. AIS eLibrary, p 14
go back to reference Röder N, Wiesche M, Schermann M, Krcmar H (2015) Workaround aware business process modeling. In: Wirtschaftsinformatik proceedings. AIS eLibrary, pp 482–496 Röder N, Wiesche M, Schermann M, Krcmar H (2015) Workaround aware business process modeling. In: Wirtschaftsinformatik proceedings. AIS eLibrary, pp 482–496
go back to reference Röder N, Wiesche M, Schermann M, Krcmar H (2016) Toward an ontology of workarounds: a literature review on existing concepts. In: 49th Hawaii International Conference on System Sciences, pp 5177–5186 Röder N, Wiesche M, Schermann M, Krcmar H (2016) Toward an ontology of workarounds: a literature review on existing concepts. In: 49th Hawaii International Conference on System Sciences, pp 5177–5186
go back to reference Rogers Y (1994) Exploring obstacles: integrating CSCW in evolving organisations. In: Proceedings of the 1994 ACM Conference on Computer Supported Cooperative Work. ACM, pp 67–77 Rogers Y (1994) Exploring obstacles: integrating CSCW in evolving organisations. In: Proceedings of the 1994 ACM Conference on Computer Supported Cooperative Work. ACM, pp 67–77
go back to reference Rokeach M (1973) The nature of human values. Free Press Rokeach M (1973) The nature of human values. Free Press
go back to reference Runeson P, Höst M (2009) Guidelines for conducting and reporting case study research in software engineering. Empir Softw Eng 14:131CrossRef Runeson P, Höst M (2009) Guidelines for conducting and reporting case study research in software engineering. Empir Softw Eng 14:131CrossRef
go back to reference Russell B (2007) ‘You gotta lie to IT’: software applications and the management of technological change in a call centre. New Technol Work Employ 22(2):132–145CrossRef Russell B (2007) ‘You gotta lie to IT’: software applications and the management of technological change in a call centre. New Technol Work Employ 22(2):132–145CrossRef
go back to reference Schwartz SH, Bilsky W (1987) Toward a universal psychological structure of human values. J Pers Soc Psychol 53(3):550–562CrossRef Schwartz SH, Bilsky W (1987) Toward a universal psychological structure of human values. J Pers Soc Psychol 53(3):550–562CrossRef
go back to reference Shafagatova A, Van Looy A (2019) Understanding the alignment of employee appraisals and rewards with business processes. In: International Conference on Business Process Management. Springer, pp 386–401 Shafagatova A, Van Looy A (2019) Understanding the alignment of employee appraisals and rewards with business processes. In: International Conference on Business Process Management. Springer, pp 386–401
go back to reference Sobreperez P (2008) Technological frame incongruence, diffusion, and noncompliance. In: León G, et al (eds) Open IT-based innovation: moving towards cooperative IT transfer and knowledge diffusion. Springer, pp 179–196 Sobreperez P (2008) Technological frame incongruence, diffusion, and noncompliance. In: León G, et al (eds) Open IT-based innovation: moving towards cooperative IT transfer and knowledge diffusion. Springer, pp 179–196
go back to reference Sobreperez P, Ferneley EH, Wilson FA (2005) Tricks or trompe l’oeil? An examination of workplace resistance in an information rich managerial environment. In: 13th European Conference on Information Systems Sobreperez P, Ferneley EH, Wilson FA (2005) Tricks or trompe l’oeil? An examination of workplace resistance in an information rich managerial environment. In: 13th European Conference on Information Systems
go back to reference Spierings A, Kerr D, Houghton L (2017) Issues that support the creation of ICT workarounds: towards a theoretical understanding of feral information systems. Inf Syst J 27(6):775–794CrossRef Spierings A, Kerr D, Houghton L (2017) Issues that support the creation of ICT workarounds: towards a theoretical understanding of feral information systems. Inf Syst J 27(6):775–794CrossRef
go back to reference Strong DM, Volkoff O (2010) Understanding organization–enterprise system fit: a path to theorizing the information technology artifact. MIS Q 34(4):731–756CrossRef Strong DM, Volkoff O (2010) Understanding organization–enterprise system fit: a path to theorizing the information technology artifact. MIS Q 34(4):731–756CrossRef
go back to reference Tzafrir SS, Gur A, Blumen O (2015) Employee social environment as a tool for decrease intention to leave. Scand J Manag 31(1):136–146CrossRef Tzafrir SS, Gur A, Blumen O (2015) Employee social environment as a tool for decrease intention to leave. Scand J Manag 31(1):136–146CrossRef
go back to reference van Beijsterveld JAA, van Groenendaal WJH (2016) Solving misfits in ERP implementations by SMEs. Inf Syst J 26(4):369–393CrossRef van Beijsterveld JAA, van Groenendaal WJH (2016) Solving misfits in ERP implementations by SMEs. Inf Syst J 26(4):369–393CrossRef
go back to reference van de Weerd I, Vollers P, Beerepoot I, Fantinato M (2019) Workarounds in retail work systems: prevent, redesign, adopt or ignore? In: Proceedings of the 27th European Conference on Information Systems. AIS eLibrary van de Weerd I, Vollers P, Beerepoot I, Fantinato M (2019) Workarounds in retail work systems: prevent, redesign, adopt or ignore? In: Proceedings of the 27th European Conference on Information Systems. AIS eLibrary
go back to reference van der Aalst WMP (2011) Process mining: discovery, conformance and enhancement of business processes. SpringerCrossRef van der Aalst WMP (2011) Process mining: discovery, conformance and enhancement of business processes. SpringerCrossRef
go back to reference Vardi Y, Weitz E (2004) Misbehavior in organizations: theory, research, and management. Lawrence Erlbaum Vardi Y, Weitz E (2004) Misbehavior in organizations: theory, research, and management. Lawrence Erlbaum
go back to reference Vardi Y, Weitz E (2016) Misbehavior in organizations: a dynamic approach. RoutledgeCrossRef Vardi Y, Weitz E (2016) Misbehavior in organizations: a dynamic approach. RoutledgeCrossRef
go back to reference Vardi Y, Wiener Y (1996) Misbehavior in organizations: a motivational framework. Organ Sci 7(2):151–165CrossRef Vardi Y, Wiener Y (1996) Misbehavior in organizations: a motivational framework. Organ Sci 7(2):151–165CrossRef
go back to reference Vogelsmeier A, Halbesleben J, Scott-Cawiezell J (2008) Technology implementation and workarounds in the nursing home. J Am Med Inform Assoc 15(1):114–119CrossRef Vogelsmeier A, Halbesleben J, Scott-Cawiezell J (2008) Technology implementation and workarounds in the nursing home. J Am Med Inform Assoc 15(1):114–119CrossRef
go back to reference Weinzierl S, Wolf V, Pauli T, Beverungen D, Matzner M (2022) Detecting temporal workarounds in business processes—A deep-learning-based method for analysing event log data. J Bus Anal 5(1):76–100CrossRef Weinzierl S, Wolf V, Pauli T, Beverungen D, Matzner M (2022) Detecting temporal workarounds in business processes—A deep-learning-based method for analysing event log data. J Bus Anal 5(1):76–100CrossRef
go back to reference Wilkin CL, Davern M (2012) Acceptance of post-adoption unanticipated IS usage: towards a taxonomy. Data Base Adv Inf Syst 43(3):9–25CrossRef Wilkin CL, Davern M (2012) Acceptance of post-adoption unanticipated IS usage: towards a taxonomy. Data Base Adv Inf Syst 43(3):9–25CrossRef
go back to reference Yin RK (2009) Case study research: design and methods. Sage Yin RK (2009) Case study research: design and methods. Sage
go back to reference Zimmermann S, Rentrop C (2014) On the emergence of Shadow IT—A transaction cost-based approach. In: Proceedings of the European Conference on Information Systems. AIS eLibrary Zimmermann S, Rentrop C (2014) On the emergence of Shadow IT—A transaction cost-based approach. In: Proceedings of the European Conference on Information Systems. AIS eLibrary
go back to reference Zoellner J, Krzeski E, Harden S, Cook E, Allen K, Estabrooks PA (2012) Qualitative application of the theory of planned behavior to understand beverage consumption behaviors among adults. J Acad Nutr Diet 112(11):1774–1784CrossRef Zoellner J, Krzeski E, Harden S, Cook E, Allen K, Estabrooks PA (2012) Qualitative application of the theory of planned behavior to understand beverage consumption behaviors among adults. J Acad Nutr Diet 112(11):1774–1784CrossRef
Metadata
Title
Why Work Around the Process? Analyzing Workarounds Through the Lens of the Theory of Planned Behavior
Authors
Pnina Soffer
Nesi Outmazgin
Irit Hadar
Shay Tzafrir
Publication date
07-03-2023
Publisher
Springer Fachmedien Wiesbaden
Published in
Business & Information Systems Engineering / Issue 4/2023
Print ISSN: 2363-7005
Electronic ISSN: 1867-0202
DOI
https://doi.org/10.1007/s12599-023-00802-1

Other articles of this Issue 4/2023

Business & Information Systems Engineering 4/2023 Go to the issue

Premium Partner