Exploring workaround situations in business processes

Nesi Outmazgin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Business process management (BPM) systems are implemented by organizations in order to gain a full control of processes and ensure their efficient and effective performance according to specified procedures. However, a common phenomenon found in organizations is that processes are bypassed and worked around by their participants. The premise underlying this paper is that workarounds are performed for reasons. Understanding these reasons may reveal flaws in process design or in the implementation of BPM systems. The paper reports an exploratory multiple-case study, performed in three organizations, intended to gain an understanding of business process workarounds and the situations in which they are performed. The study identified six workaround types and 24 situational factors related to them.

Original languageEnglish
Title of host publicationBusiness Process Management Workshops - BPM 2012 International Workshops, Revised Papers
PublisherSpringer Verlag
Pages426-437
Number of pages12
ISBN (Print)9783642362842
DOIs
StatePublished - 2013
EventInternational Workshop on Business Process Management, BPM 2012 - Tallinn, Estonia
Duration: 3 Sep 20123 Sep 2012

Publication series

NameLecture Notes in Business Information Processing
Volume132 LNBIP
ISSN (Print)1865-1348

Conference

ConferenceInternational Workshop on Business Process Management, BPM 2012
Country/TerritoryEstonia
CityTallinn
Period3/09/123/09/12

Keywords

  • BPM implementation
  • Business Process design
  • Case studies
  • Workaround

ASJC Scopus subject areas

  • Management Information Systems
  • Control and Systems Engineering
  • Business and International Management
  • Information Systems
  • Modeling and Simulation
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Exploring workaround situations in business processes'. Together they form a unique fingerprint.

Cite this