Beneficial Noncompliance and Detrimental Compliance: Expected Paths to Unintended Consequences
暂无分享,去创建一个
[1] Albert Cherns,et al. Principles of Sociotechnical Design Revisted , 1987 .
[2] Marie-Claude Boudreau,et al. Enacting Integrated Information Technology: A Human Agency Perspective , 2005, Organ. Sci..
[3] Wanda J. Orlikowski,et al. Improvising Organizational Transformation Over Time: A Situated Change Perspective , 1996, Inf. Syst. Res..
[4] Manuel Wiesche,et al. A Situational Perspective on Workarounds in IT-Enabled Business Processes: a Multiple Case Study , 2014, ECIS.
[5] Steven L. Alter. Work System Theory: Overview of Core Concepts, Extensions, and Challenges for the Future , 2013, J. Assoc. Inf. Syst..
[6] Netta Iivari,et al. Information technology and the first-line manager's dilemma: Lessons from an ethnographic study , 2009 .
[7] T. Baker,et al. Creating Something from Nothing: Resource Construction through Entrepreneurial Bricolage , 2005 .
[8] I. Ajzen. The theory of planned behavior , 1991 .
[9] Steven L. Alter. A Workaround Design System for Anticipating, Designing, and/or Preventing Workarounds , 2015, BMMDS/EMMSAD.
[10] Helmut Krcmar,et al. Why Managers Tolerate Workarounds - The Role of Information Systems , 2014, AMCIS.
[11] Jos Aarts,et al. Evaluating the medication process in the context of CPOE use: The significance of working around the system , 2011, Int. J. Medical Informatics.
[12] David Johnson,et al. Do Strikes and Work-to-Rule Campaigns Change Elementary School Assessment Results? , 2011 .
[13] Robert M. Davison,et al. Sharing Knowledge In Technology Deficient Environments: Individual Workarounds Amid Corporate Restrictions , 2013, ECIS.
[14] W.M.P. van der Aalst,et al. Business Process Management: A Comprehensive Survey , 2013 .
[15] Stefanie Huber,et al. Learning from organizational incidents: Resilience engineering for high‐risk process environments , 2009 .
[16] BoudreauMarie-Claude,et al. Enacting Integrated Information Technology , 2005 .
[17] M. M. van Paassen,et al. A Search for Meaning: A Case Study of the Approach-to-Landing , 2003 .
[18] Diane M. Strong,et al. Understanding Organization-Enterprise System Fit: A Path to Theorizing the Information Technology Artifact , 2010, MIS Q..
[19] Tosha B. Wetterneck,et al. Technology Evaluation: Workarounds to Barcode Medication Administration Systems: Their Occurrences, Causes, and Threats to Patient Safety , 2008, J. Am. Medical Informatics Assoc..
[20] K. Eisenhardt. Agency Theory: An Assessment and Review , 1989 .
[21] Steven L. Alter,et al. USF Scholarship: a digital repository @ Gleeson Library | Geschke Center , 2016 .
[22] Karen Broadhurst,et al. Children's services in the iron cage of performance management : street-level bureaucracy and the spectre of Švejkism , 2010 .
[23] Dennis F. Galletta,et al. Sharing knowledge , 2008, CACM.
[24] J. Carroll. Organizational Learning Activities in High‐hazard Industries: The Logics Underlying Self‐Analysis , 1998 .
[25] J Sice. Evaluating medication. , 1972, Lancet.
[26] Ryan T. Wright,et al. Communications of the Association for Information Systems , 2010 .
[27] Pertti Vakkari,et al. "I Did It My Way": Social workers as secondary designers of a client information system , 2013, Inf. Process. Manag..