[HTML][HTML] Software compliance requirements, factors, and policies: A systematic literature review
Background Recent statistics reveal that 56% of software attacks are caused by insider
negligence and 26% are caused by malicious insiders. They also show that 67% of …
negligence and 26% are caused by malicious insiders. They also show that 67% of …
Workarounds as generative mechanisms for bottom‐up process innovation—Insights from a multiple case study
C Bartelheimer, V Wolf… - Information Systems …, 2023 - Wiley Online Library
Workarounds are goal‐driven deviations from the standard operating procedures performed
to overcome obstacles constraining day‐to‐day work. Despite starting as temporary fixes …
to overcome obstacles constraining day‐to‐day work. Despite starting as temporary fixes …
Generative mechanisms of workarounds, discontinuance and reframing: a study of negative disconfirmation with consumerised IT
ED Zamani, N Pouloudi - Information Systems Journal, 2021 - Wiley Online Library
This study investigates the observed behavioural outcomes when users experience
negative disconfirmation with consumerised IT artefacts with the aim to identify the …
negative disconfirmation with consumerised IT artefacts with the aim to identify the …
[HTML][HTML] The coordination of workarounds: Insights from responses to misfits between local realities and a mandated global enterprise system
We investigate how employees react when confronted with an enterprise system (ES) that
does not fit with work processes dictated by local realities. We draw on interview data (n …
does not fit with work processes dictated by local realities. We draw on interview data (n …
Value alignment's role in mitigating resistance to IT use: the case of physicians' resistance to electronic health record systems
This research investigates the impact of value alignment on physician resistance to
electronic health record systems (EHRS) through the reduction of perceived threat to …
electronic health record systems (EHRS) through the reduction of perceived threat to …
Encourage autonomy to increase individual work performance: the impact of job characteristics on workaround behavior and shadow IT usage
A de Vargas Pinto, I Beerepoot… - Information Technology …, 2023 - Springer
IT users are increasingly experienced at adapting technologies to their needs; resulting in
the widespread use of workarounds and shadow IT. To ascertain the impact of job …
the widespread use of workarounds and shadow IT. To ascertain the impact of job …
[HTML][HTML] Working around inadequate information systems in the workplace: An empirical study in Romania
We explore how employees behave when faced with information systems (IS) that
inadequately support their work. Inadequate IS often induce workaround behaviour, a …
inadequately support their work. Inadequate IS often induce workaround behaviour, a …
Challenges and Limitations of Pandemic Information Systems: A Literature Review
In this article, we investigate the role of information systems (IS) during the COVID-19
pandemic. By focusing on the limitations, challenges, and failures that IS faced as a …
pandemic. By focusing on the limitations, challenges, and failures that IS faced as a …
Factors impacting successful BPMS adoption and use: A South African financial services case study
A Koopman, LF Seymour - … Conference, EMMSAD 2020, Held at CAiSE …, 2020 - Springer
Abstract Business Process Management Suites (BPMS) are being adopted in organisations
to increase business process agility across a diverse application landscape. Yet many …
to increase business process agility across a diverse application landscape. Yet many …
Adoption of IT solutions: A data-driven analysis approach
Many IT departments provide solutions that satisfy a variety of needs to deliver services and
reach business goals. These IT solutions may fall short of addressing all the requirements of …
reach business goals. These IT solutions may fall short of addressing all the requirements of …