<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>WAM! - WorkAround Mining in Healthcare</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Utrecht University</institution>
          ,
          <addr-line>Heidelberglaan 8, 3584 CS Utrecht</addr-line>
          ,
          <country country="NL">the Netherlands</country>
        </aff>
      </contrib-group>
      <fpage>51</fpage>
      <lpage>57</lpage>
      <abstract>
        <p>Many organizations use standard operating procedures to streamline their work. When procedures are clear, people know what to do. Still, it often happens that work is performed in a way that is diferent from the prescribed procedure. When confronted with unexpected situations, limited time, or a lack of resources, workers may be unable to follow a procedure and may feel compelled to perform a workaround to solve a problem [1]. Some workarounds are beneficial and can be leveraged to improve organizational procedures [2, 3]. In other cases, not following a procedure may be harmful or outright dangerous. Workarounds can result in noncompliance, privacy issues, or negative efects in the process downstream [4, 5]. Whatever the efect, it is important that process owners are provided with insights into the occurrence of workarounds. These insights can help to prevent workarounds from happening again or to improve the concerned procedure [3]. In addition, being able to structurally and comprehensively identify workarounds would allow for the monitoring of their emergence, difusion, and evolution, potentially enabling process analysts to detect and respond to new workarounds faster than with current techniques. To date, most studies in which workarounds were identified and analyzed relied on qualitative methods, primarily through interviewing and observing users during their work [3]. This approach has led to valuable insights related to the mechanics and efects of workarounds, as well as the motivations of the people using them [6, 4, 7]. However, the use of qualitative methods is labor-intensive; furthermore, users may not disclose their normal behavior when they are aware of being observed [8]. To address these drawbacks, my focus is on the use of event logs, process mining, and other quantitative analysis techniques. The state of the art shows that workarounds can be detected and monitored with this data [9]. However, it is unclear to what extent this information can be used to discover new workarounds when starting from the data. Note that if both the workaround and the normative process occur outside of the system, there will not be any information available to detect this. While these workarounds may be discovered using interviews, they cannot be found using event logs.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Workarounds</kwd>
        <kwd>Automated Detection</kwd>
        <kwd>Event data</kwd>
        <kwd>Healthcare</kwd>
        <kwd>Process Mining</kwd>
        <kwd>Business Process Analysis</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Problem Statement</title>
      <p>
        Earlier work shows that event logs from a Health Information System (HIS) can be used to
automatically detect and monitor known workarounds [
        <xref ref-type="bibr" rid="ref7">9</xref>
        ]. I stay in line with this focus on the
healthcare domain. Studies have shown that in hospital settings specifically workarounds are a
widespread phenomenon [
        <xref ref-type="bibr" rid="ref8">10</xref>
        ]: Nurses share each other’s passwords to save time, physicians
send each other X-rays via WhatsApp to get quick second opinions, and secretaries use shadow
systems on paper to track the department’s occupation. The principles behind my work are
nonetheless transparent and I expect that many of the patterns can be transferred to other
domains.
      </p>
      <p>This leads to the following research question:</p>
      <p>How can we use event data stored in HISs to detect workarounds?</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <p>
        As illustrated in Figure 1, workarounds occur when users intend to reach a goal but perceive
a block to do so using the oficial procedure [ 1]. Similar to the conformance-checking field
of process mining, we can look for diferences between process variants to detect them [
        <xref ref-type="bibr" rid="ref9">11</xref>
        ].
However, we see two important diferences. First of all, a workaround requires an intent to
reach a business goal. So, fraud, deception, and errors are not in scope. Secondly, the user is
unable to achieve this goal by using the intended procedure [1]. So, accidentally following a
diferent route is not a workaround.
      </p>
      <p>
        In addition, while non-conformance usually supposes strict rules [
        <xref ref-type="bibr" rid="ref10 ref11">12, 13</xref>
        ] or a known process
model to conform to [
        <xref ref-type="bibr" rid="ref12">14</xref>
        ], workarounds can occur without these. Deviance mining also uses
process mining but looks at smaller deviations between processes [
        <xref ref-type="bibr" rid="ref13">15</xref>
        ], which may also be
useful to mine for workarounds. Quite diferent from a deviance, a workaround can be very
common. If a workaround is suficiently efective, it may be shared throughout the organization,
potentially becoming more common than the oficial procedure [
        <xref ref-type="bibr" rid="ref14">16</xref>
        ].
      </p>
      <p>
        One approach specifically used to automatically detect workarounds is to use deep learning [
        <xref ref-type="bibr" rid="ref6">8</xref>
        ].
Neural networks are trained to recognize diferent workaround types from event logs. These
methods can be dificult to use in practice because they require a large amount of labeled training
      </p>
      <sec id="sec-2-1">
        <title>Intent</title>
        <p>Designed Path
Workaround</p>
      </sec>
      <sec id="sec-2-2">
        <title>Block</title>
      </sec>
      <sec id="sec-2-3">
        <title>Goal</title>
        <p>
          and testing data. In addition, even if neural networks reach a high classification accuracy, it is
dificult to explain why this is happening [
          <xref ref-type="bibr" rid="ref15">17</xref>
          ], which is often required if you want to use the
results in a healthcare environment.
        </p>
        <p>
          Alternatively, Outmazgin and Sofer define six workaround patterns, four of which can be
used to detect workarounds in event logs [
          <xref ref-type="bibr" rid="ref16">18</xref>
          ]. These patterns require very strict definitions of
what is considered a workaround, such as exact thresholds for activity duration or a full process
model. While these patterns can be used to detect known workarounds, we cannot discover
new workarounds with them.
        </p>
        <p>
          Outside of the control-flow, the time, resource, and data perspectives are valuable for
conformance checking [
          <xref ref-type="bibr" rid="ref9">11</xref>
          ]. By investigating workarounds discovered using qualitative methods, such
as interviews and observations, previous studies show that these perspectives can also be used to
recognize diferent types of workarounds [
          <xref ref-type="bibr" rid="ref7">9</xref>
          ]. We will continue this multi-perspective approach
to investigate if, in addition to recognizing workarounds, we can discover new workarounds
using event logs.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Intended Approach</title>
      <p>As described in the previous section, detecting workarounds has similarities with several
approaches in process mining, such as conformance checking. Both focus on diferences
between the intended and actual process. I will investigate which diferences that are used in
process mining fields other than workaround mining can also be used to discover workarounds.</p>
      <p>
        Many workarounds were discovered through interviews in previous studies in five diferent
healthcare organizations [
        <xref ref-type="bibr" rid="ref7">9</xref>
        ]; a general hospital, two district hospitals, and two specialized
centers. They are documented as ‘workaround snapshots’ and include a description of (1) the
setting in which the workaround was found, (2) the workaround compared to the normative
process, (3) a motivation, and (4) the expected efect of the workaround on cost, time, quality,
and flexibility. Using the comparison between the workaround and the normative process, I can
determine if and how each workaround could be monitored using (event log) data, resulting in
more patterns in addition to the ones extracted from literature.
      </p>
      <p>While the detection of potential workarounds can be performed in a highly automated fashion,
the actual confirmation of the occurrence of workarounds still needs to be done by domain
experts. In other words, while the defined patterns can show potentially interesting diferences
between process variants, only domain experts can determine if a diference is a workaround.</p>
      <p>To test the patterns and techniques for workaround mining, I intend to use case studies.
Depending on the research question, I can extract data from diferent wards in a hospital from
the HIS over select periods. This data can then be transformed into event logs in which I look for
the patterns. Finally, I further evaluate results that indicate a workaround in a semi-structured
interview with an expert of the corresponding ward or process. The expert can determine if the
observed behavior is normative, a workaround, or something else.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Preliminary Findings</title>
      <p>
        By investigating the literature and snapshots, I created a Semi-automated WORkaround
Detection (SWORD) framework containing 22 patterns [
        <xref ref-type="bibr" rid="ref17">19</xref>
        ]. Table 1 shows an overview of the
patterns. I created this framework in the two steps as described in the previous section: 1) a
literature study to determine how process mining topics other than workarounds mining define
diferences between process instances and 2) finding diferences between the workarounds and
normative processes discovered in earlier studies. For more details on this method, I refer to the
full paper.
      </p>
      <p>Note that the framework is extensible, meaning that new patterns can be added. In addition,
while the focus of the framework is on workarounds, many of the patterns can be applied to
other process mining fields that focus on diferences between process variants.</p>
      <p>In the same study, I tested three of the patterns on real hospital data. While the results were
not verified by experts, they were nonetheless promising; I discovered the occurrence of logging
measurements in batches (a previously known workaround), unexpected diferences in the
delay between taking measurements, and their logging for diferent types of measurements.</p>
      <p>In my current (unpublished) work, I have applied the patterns to diferent wards in a hospital
and held interviews with process experts about the observed outliers. The experts were able to
verify multiple outliers as being workarounds, including previously unknown workarounds.</p>
      <p>For example, in the emergency room (ER), a physician needs to place a mark in the file if (s)he
sees a patient for the first time. This activity can be seen in event logs as ’Seen by physician’.
The ’Delay between the start of trace and activity is out of bounds’ pattern shows that there are
a few cases where this happens a few days after admission to the ER. The expert could explain
this behavior as a workaround. If a physician does not perform the required task, administrative
personnel update the logs to make sure they reflect that the patient was seen by a physician.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Open points</title>
      <sec id="sec-5-1">
        <title>5.1. Better Detection</title>
        <p>There are two major points to improve workarounds detection using the patterns.</p>
        <p>Firstly, how do we apply the patterns? Currently, I intentionally keep this simple by looking
for the largest deviation(s) from the mean. For example, in the confirmed workaround in the
previous section, I looked for the events that occurred the most standard deviations away from
their meantime. This approach is obviously quite simple and could be improved with more
advanced statistics.</p>
        <p>Secondly, we have seen in previous work that many workarounds can be detected with
multiple patterns. The example workaround was detected by looking for an activity that occurs
at an unusual moment, but we can also see that the same trace takes longer than usual. If we
combine the information of multiple patterns, this could also improve the workaround detection.</p>
        <p>While both points may enhance the quality of workaround detection, it is dificult to exactly
quantify this improvement. The usual approach for this is to compare the results to established
labels in an extensive dataset using measures such as precision and recall. However, this is not
possible for workaround detection, since there is no ground truth available. While experts can
manually determine if a single trace is a workaround or normative, it is unfeasible to do so for
large event logs containing thousands of traces.</p>
        <p>Regardless, it is important to determine if and to what extent potential improvements enhance
the detection rate. It may be suficient to measure this in a smaller event log. In addition, instead
of having an experienced high-level expert evaluate traces, the (initial) evaluation may be
performed by a less-involved expert, such as a medical student. Both options would decrease
the quality of the comparison, but they make the evaluation more feasible to perform.</p>
      </sec>
      <sec id="sec-5-2">
        <title>5.2. Future Work</title>
        <p>Being able to detect more workarounds using event logs allows us to further investigate them.
From a sociological point of view, there are many questions about where, when, and how
workarounds emerge and evolve. If we can monitor them using event logs, we can give more
insight into this. We may potentially even pinpoint when and where a workaround begins and
see how it spreads through the organization.</p>
        <p>We can also take a more practical approach and investigate the efects of workarounds. If we
can reliably distinguish between the normative process and a workaround (or diferent types of
workarounds), we can link this to other available data, such as costs, quality of care, or patient
satisfaction using statistical measures such as regression. This would allow organizations to
better decide what to do with specific workarounds.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>A. Appendix</title>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgments</title>
      <p>This publication is part of the WorkAround Mining (WAM!) project (with project
number 18490) which is (partly) financed by the Dutch Research Council (NWO).
[1] T. Ejnef jäll, P. J. Ågerfalk, Conceptualizing Workarounds: Meanings and Manifestations
in Information Systems Research, Communications of the Association for Information
Systems (2019) 340–363.
[2] S. Alter, Theory of Workarounds, Communications of the Association for Information
Systems 34 (2014).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>I.</given-names>
            <surname>Beerepoot</surname>
          </string-name>
          , I. van de Weerd, Prevent, Redesign, Adopt or Ignore:
          <article-title>Improving Healthcare using Knowledge of Workarounds</article-title>
          ,
          <source>in: Twenty-Sixth European Conference on Information Systems</source>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>I.</given-names>
            <surname>Ignatiadis</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. Nandhakumar,</surname>
          </string-name>
          <article-title>The efect of ERP system workarounds on organizational control: An interpretivist case study</article-title>
          ,
          <source>Scandinavian Journal of Information Systems</source>
          <volume>21</volume>
          (
          <year>2009</year>
          )
          <article-title>3</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ilie</surname>
          </string-name>
          ,
          <article-title>Psychological reactance and user workarounds. a study in the context of electronic medical records implementations</article-title>
          ,
          <source>ECIS</source>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>B.</given-names>
            <surname>Azad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>King</surname>
          </string-name>
          ,
          <article-title>Enacting computer workaround practices within a medication dispensing system</article-title>
          ,
          <source>European Journal of Information Systems</source>
          <volume>17</volume>
          (
          <year>2008</year>
          )
          <fpage>264</fpage>
          -
          <lpage>278</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Tucker</surname>
          </string-name>
          ,
          <article-title>The Impact of Workaround Dificulty on Frontline Employees' Response to Operational Failures: A Laboratory Experiment on Medication Administration</article-title>
          ,
          <source>Management Science</source>
          <volume>62</volume>
          (
          <year>2016</year>
          )
          <fpage>1124</fpage>
          -
          <lpage>1144</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S.</given-names>
            <surname>Weinzierl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Wolf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Pauli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Beverungen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Matzner</surname>
          </string-name>
          ,
          <article-title>Detecting Workarounds in Business Processes-a Deep Learning method for Analyzing Event Logs</article-title>
          ,
          <source>in: Proceedings of the 28th European Conference on Information Systems</source>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>I.</given-names>
            <surname>Beerepoot</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Lu</surname>
          </string-name>
          , I. van de Weerd,
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Reijers</surname>
          </string-name>
          ,
          <article-title>Seeing the Signs of Workarounds: A Mixed-Methods Approach to the Detection of Nurses' Process Deviations</article-title>
          ,
          <source>in: Proceedings of the Annual Hawaii International Conference on System Sciences, Hawaii International Conference on System Sciences</source>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>N.</given-names>
            <surname>Röder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Wiesche</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Schermann</surname>
          </string-name>
          ,
          <string-name>
            <surname>A Situational</surname>
          </string-name>
          <article-title>Perspective on Workarounds in IT-Enabled Business Processes: a Multiple Case Study</article-title>
          .,
          <source>in: ECIS</source>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>F.</given-names>
            <surname>Mannhardt</surname>
          </string-name>
          , M. de Leoni,
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Reijers</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          ,
          <article-title>Balanced multi-perspective checking of process conformance</article-title>
          ,
          <source>Computing</source>
          <volume>98</volume>
          (
          <year>2015</year>
          )
          <fpage>407</fpage>
          -
          <lpage>437</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Lazovik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Aiello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Papazoglou</surname>
          </string-name>
          ,
          <article-title>Associating assertions with business processes and monitoring their execution</article-title>
          ,
          <source>in: Proceedings of the 2nd international conference on Service oriented computing</source>
          , ACM Press,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>K.</given-names>
            <surname>Mahbub</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Spanoudakis, A framework for requirents monitoring of service based systems</article-title>
          ,
          <source>in: Proceedings of the 2nd international conference on Service oriented computing</source>
          , ACM Press,
          <year>2004</year>
          , pp.
          <fpage>84</fpage>
          -
          <lpage>93</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Rozinat</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. M. P. van der Aalst</surname>
          </string-name>
          ,
          <article-title>Conformance checking of processes based on monitoring real behavior</article-title>
          ,
          <source>Information Systems</source>
          <volume>33</volume>
          (
          <year>2008</year>
          )
          <fpage>64</fpage>
          -
          <lpage>95</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>H.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. La</given-names>
            <surname>Rosa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. M.</given-names>
            <surname>Maggi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Suriadi</surname>
          </string-name>
          , Business Process Deviance Mining:
          <article-title>Review and Evaluation, ArXiv e-prints (</article-title>
          <year>2016</year>
          ). arXiv:
          <volume>1608</volume>
          .
          <fpage>08252</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>T.</given-names>
            <surname>Lauer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Rajagopalan</surname>
          </string-name>
          ,
          <article-title>Examining the relationship between acceptance and resistance in system implementation</article-title>
          ,
          <source>AMCIS 2002 Proceedings</source>
          (
          <year>2002</year>
          )
          <fpage>179</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>G.</given-names>
            <surname>Ras</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. van Gerven</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Haselager</surname>
          </string-name>
          , Explanation Methods in Deep Learning: Users, Values, Concerns and Challenges,
          <source>in: The Springer Series on Challenges in Machine Learning</source>
          , Springer International Publishing,
          <year>2018</year>
          , pp.
          <fpage>19</fpage>
          -
          <lpage>36</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>N.</given-names>
            <surname>Outmazgin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Sofer</surname>
          </string-name>
          ,
          <article-title>A process mining-based analysis of business process work-arounds</article-title>
          ,
          <source>Software &amp; Systems Modeling</source>
          <volume>15</volume>
          (
          <year>2014</year>
          )
          <fpage>309</fpage>
          -
          <lpage>323</lpage>
          . doi:
          <volume>10</volume>
          .1007/s10270-014-0420-6.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [19]
          <string-name>
            <surname>W. van der Waal</surname>
          </string-name>
          , I. Beerepoot, I. van de Weerd,
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Reijers</surname>
          </string-name>
          ,
          <article-title>The SWORD is Mightier than the Interview: A Framework for Semi-automatic WORkaround Detection</article-title>
          , in: International conference on business process management,
          <year>2022</year>
          . To appear.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>