<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">WAM! -WorkAround Mining in Healthcare</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Wouter</forename><surname>Van Der Waal</surname></persName>
							<email>w.g.vanderwaal@uu.nl</email>
							<affiliation key="aff0">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<addrLine>Heidelberglaan 8</addrLine>
									<postCode>3584 CS</postCode>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">WAM! -WorkAround Mining in Healthcare</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">5D4C87C4A3C050CADF281B60F0C90CD8</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T04:00+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Workarounds</term>
					<term>Automated Detection</term>
					<term>Event data</term>
					<term>Healthcare</term>
					<term>Process Mining</term>
					<term>Business Process Analysis</term>
				</keywords>
			</textClass>
			<abstract/>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Problem Statement</head><p>Many organizations use standard operating procedures to streamline their work. When procedures are clear, people know what to do. Still, it often happens that work is performed in a way that is different from the prescribed procedure. When confronted with unexpected situations, limited time, or a lack of resources, workers may be unable to follow a procedure and may feel compelled to perform a workaround to solve a problem <ref type="bibr" target="#b0">[1]</ref>.</p><p>Some workarounds are beneficial and can be leveraged to improve organizational procedures <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3]</ref>. In other cases, not following a procedure may be harmful or outright dangerous. Workarounds can result in noncompliance, privacy issues, or negative effects in the process downstream <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5]</ref>. Whatever the effect, it is important that process owners are provided with insights into the occurrence of workarounds. These insights can help to prevent workarounds from happening again or to improve the concerned procedure <ref type="bibr" target="#b2">[3]</ref>. In addition, being able to structurally and comprehensively identify workarounds would allow for the monitoring of their emergence, diffusion, and evolution, potentially enabling process analysts to detect and respond to new workarounds faster than with current techniques.</p><p>To date, most studies in which workarounds were identified and analyzed relied on qualitative methods, primarily through interviewing and observing users during their work <ref type="bibr" target="#b2">[3]</ref>. This approach has led to valuable insights related to the mechanics and effects of workarounds, as well as the motivations of the people using them <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b6">7]</ref>. However, the use of qualitative methods is labor-intensive; furthermore, users may not disclose their normal behavior when they are aware of being observed <ref type="bibr" target="#b7">[8]</ref>. To address these drawbacks, my focus is on the use of event logs, process mining, and other quantitative analysis techniques. The state of the art shows that workarounds can be detected and monitored with this data <ref type="bibr" target="#b8">[9]</ref>. However, it is unclear to what extent this information can be used to discover new workarounds when starting from the data. Note that if both the workaround and the normative process occur outside of the system, there will not be any information available to detect this. While these workarounds may be discovered using interviews, they cannot be found using event logs.</p><p>Earlier work shows that event logs from a Health Information System (HIS) can be used to automatically detect and monitor known workarounds <ref type="bibr" target="#b8">[9]</ref>. I stay in line with this focus on the healthcare domain. Studies have shown that in hospital settings specifically workarounds are a widespread phenomenon <ref type="bibr" target="#b9">[10]</ref>: Nurses share each other's passwords to save time, physicians send each other X-rays via WhatsApp to get quick second opinions, and secretaries use shadow systems on paper to track the department's occupation. The principles behind my work are nonetheless transparent and I expect that many of the patterns can be transferred to other domains.</p><p>This leads to the following research question:</p><p>How can we use event data stored in HISs to detect workarounds?</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Work</head><p>As illustrated in Figure <ref type="figure">1</ref>, workarounds occur when users intend to reach a goal but perceive a block to do so using the official procedure <ref type="bibr" target="#b0">[1]</ref>. Similar to the conformance-checking field of process mining, we can look for differences between process variants to detect them <ref type="bibr" target="#b10">[11]</ref>. However, we see two important differences. First of all, a workaround requires an intent to reach a business goal. So, fraud, deception, and errors are not in scope. Secondly, the user is unable to achieve this goal by using the intended procedure <ref type="bibr" target="#b0">[1]</ref>. So, accidentally following a different route is not a workaround.</p><p>In addition, while non-conformance usually supposes strict rules <ref type="bibr" target="#b11">[12,</ref><ref type="bibr" target="#b12">13]</ref> or a known process model to conform to <ref type="bibr" target="#b13">[14]</ref>, workarounds can occur without these. Deviance mining also uses process mining but looks at smaller deviations between processes <ref type="bibr" target="#b14">[15]</ref>, which may also be useful to mine for workarounds. Quite different from a deviance, a workaround can be very common. If a workaround is sufficiently effective, it may be shared throughout the organization, potentially becoming more common than the official procedure <ref type="bibr" target="#b15">[16]</ref>.</p><p>One approach specifically used to automatically detect workarounds is to use deep learning <ref type="bibr" target="#b7">[8]</ref>. Neural networks are trained to recognize different workaround types from event logs. These methods can be difficult to use in practice because they require a large amount of labeled training</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Intent</head><p>Goal Block Designed Path Workaround Figure <ref type="figure">1</ref>: An illustration of the definition of a workaround. A worker has an intent to reach a goal, but is prevented to do so by a block on the designed path. The worker can then deviate from the path to work around that block to reach the goal. and testing data. In addition, even if neural networks reach a high classification accuracy, it is difficult to explain why this is happening <ref type="bibr" target="#b16">[17]</ref>, which is often required if you want to use the results in a healthcare environment.</p><p>Alternatively, Outmazgin and Soffer define six workaround patterns, four of which can be used to detect workarounds in event logs <ref type="bibr" target="#b17">[18]</ref>. These patterns require very strict definitions of what is considered a workaround, such as exact thresholds for activity duration or a full process model. While these patterns can be used to detect known workarounds, we cannot discover new workarounds with them.</p><p>Outside of the control-flow, the time, resource, and data perspectives are valuable for conformance checking <ref type="bibr" target="#b10">[11]</ref>. By investigating workarounds discovered using qualitative methods, such as interviews and observations, previous studies show that these perspectives can also be used to recognize different types of workarounds <ref type="bibr" target="#b8">[9]</ref>. We will continue this multi-perspective approach to investigate if, in addition to recognizing workarounds, we can discover new workarounds using event logs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Intended Approach</head><p>As described in the previous section, detecting workarounds has similarities with several approaches in process mining, such as conformance checking. Both focus on differences between the intended and actual process. I will investigate which differences that are used in process mining fields other than workaround mining can also be used to discover workarounds.</p><p>Many workarounds were discovered through interviews in previous studies in five different healthcare organizations <ref type="bibr" target="#b8">[9]</ref>; a general hospital, two district hospitals, and two specialized centers. They are documented as 'workaround snapshots' and include a description of (1) the setting in which the workaround was found, (2) the workaround compared to the normative process, (3) a motivation, and (4) the expected effect of the workaround on cost, time, quality, and flexibility. Using the comparison between the workaround and the normative process, I can determine if and how each workaround could be monitored using (event log) data, resulting in more patterns in addition to the ones extracted from literature.</p><p>While the detection of potential workarounds can be performed in a highly automated fashion, the actual confirmation of the occurrence of workarounds still needs to be done by domain experts. In other words, while the defined patterns can show potentially interesting differences between process variants, only domain experts can determine if a difference is a workaround.</p><p>To test the patterns and techniques for workaround mining, I intend to use case studies. Depending on the research question, I can extract data from different wards in a hospital from the HIS over select periods. This data can then be transformed into event logs in which I look for the patterns. Finally, I further evaluate results that indicate a workaround in a semi-structured interview with an expert of the corresponding ward or process. The expert can determine if the observed behavior is normative, a workaround, or something else.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Preliminary Findings</head><p>By investigating the literature and snapshots, I created a Semi-automated WORkaround Detection (SWORD) framework containing 22 patterns <ref type="bibr" target="#b18">[19]</ref>. Table <ref type="table" target="#tab_0">1</ref> shows an overview of the patterns. I created this framework in the two steps as described in the previous section: 1) a literature study to determine how process mining topics other than workarounds mining define differences between process instances and 2) finding differences between the workarounds and normative processes discovered in earlier studies. For more details on this method, I refer to the full paper.</p><p>Note that the framework is extensible, meaning that new patterns can be added. In addition, while the focus of the framework is on workarounds, many of the patterns can be applied to other process mining fields that focus on differences between process variants.</p><p>In the same study, I tested three of the patterns on real hospital data. While the results were not verified by experts, they were nonetheless promising; I discovered the occurrence of logging measurements in batches (a previously known workaround), unexpected differences in the delay between taking measurements, and their logging for different types of measurements.</p><p>In my current (unpublished) work, I have applied the patterns to different wards in a hospital and held interviews with process experts about the observed outliers. The experts were able to verify multiple outliers as being workarounds, including previously unknown workarounds.</p><p>For example, in the emergency room (ER), a physician needs to place a mark in the file if (s)he sees a patient for the first time. This activity can be seen in event logs as 'Seen by physician'. The 'Delay between the start of trace and activity is out of bounds' pattern shows that there are a few cases where this happens a few days after admission to the ER. The expert could explain this behavior as a workaround. If a physician does not perform the required task, administrative personnel update the logs to make sure they reflect that the patient was seen by a physician.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Open points</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1.">Better Detection</head><p>There are two major points to improve workarounds detection using the patterns.</p><p>Firstly, how do we apply the patterns? Currently, I intentionally keep this simple by looking for the largest deviation(s) from the mean. For example, in the confirmed workaround in the previous section, I looked for the events that occurred the most standard deviations away from their meantime. This approach is obviously quite simple and could be improved with more advanced statistics.</p><p>Secondly, we have seen in previous work that many workarounds can be detected with multiple patterns. The example workaround was detected by looking for an activity that occurs at an unusual moment, but we can also see that the same trace takes longer than usual. If we combine the information of multiple patterns, this could also improve the workaround detection.</p><p>While both points may enhance the quality of workaround detection, it is difficult to exactly quantify this improvement. The usual approach for this is to compare the results to established labels in an extensive dataset using measures such as precision and recall. However, this is not possible for workaround detection, since there is no ground truth available. While experts can manually determine if a single trace is a workaround or normative, it is unfeasible to do so for large event logs containing thousands of traces.</p><p>Regardless, it is important to determine if and to what extent potential improvements enhance the detection rate. It may be sufficient to measure this in a smaller event log. In addition, instead of having an experienced high-level expert evaluate traces, the (initial) evaluation may be performed by a less-involved expert, such as a medical student. Both options would decrease the quality of the comparison, but they make the evaluation more feasible to perform.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2.">Future Work</head><p>Being able to detect more workarounds using event logs allows us to further investigate them. From a sociological point of view, there are many questions about where, when, and how workarounds emerge and evolve. If we can monitor them using event logs, we can give more insight into this. We may potentially even pinpoint when and where a workaround begins and see how it spreads through the organization.</p><p>We can also take a more practical approach and investigate the effects of workarounds. If we can reliably distinguish between the normative process and a workaround (or different types of workarounds), we can link this to other available data, such as costs, quality of care, or patient satisfaction using statistical measures such as regression. This would allow organizations to better decide what to do with specific workarounds. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. Appendix</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Delay between start of trace and activity is out of bounds</head><p>There is a deviation in the delay between the start of the trace and the time of an activity</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Time between activities out of bounds</head><p>There is a deviation in the time between activities</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Duration of activity out of bounds</head><p>There is deviation in the duration of an activity</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Duration of trace out of bounds</head><p>There is a deviation in the duration of a trace</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Delay between event and logging is out of bounds</head><p>There is a deviation in the delay between time of event and time of logging</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Detection pattern Explanation</head></div><figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 :</head><label>1</label><figDesc>Workaround detection patterns</figDesc><table><row><cell></cell><cell>Detection pattern</cell><cell>Explanation</cell></row><row><cell></cell><cell>Occurrence of an activity</cell><cell>A specific activity occurs</cell></row><row><cell></cell><cell>Occurrence of recurrent activity</cell><cell>A recurrent activity sequence occurs within a trace</cell></row><row><cell></cell><cell>sequence</cell><cell></cell></row><row><cell></cell><cell>Frequent occurrence of activity</cell><cell>An activity frequently occurs within a trace</cell></row><row><cell>Control-flow</cell><cell>Occurrence of activities in an order different from process model Occurrence of mutually exclusive activities</cell><cell>The order of activities in a trace is other than in a predefined process model Specific activities occur that are mutually exclusive within a trace</cell></row><row><cell></cell><cell>Occurrence of unusual neighboring</cell><cell>An activity is directly followed by an activity other than</cell></row><row><cell></cell><cell>activities</cell><cell>usual</cell></row><row><cell></cell><cell cols="2">Occurrence of directly repeating activity An activity is immediately repeated within a trace</cell></row><row><cell></cell><cell>Missing occurrence of activity</cell><cell>A specific activity is missing in the trace</cell></row><row><cell></cell><cell></cell><cell>Continued on next page</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1 :</head><label>1</label><figDesc>Workaround detection patterns (Continued) Data Data object with value outside boundary The value of a data object deviates from the usual values</figDesc><table><row><cell></cell><cell>Change in value between events</cell><cell>Data values change unexpectedly between events</cell></row><row><cell></cell><cell>Specific information in free-text fields</cell><cell>Information is logged in free-text fields instead of dedicated</cell></row><row><cell></cell><cell></cell><cell>fields</cell></row><row><cell></cell><cell>Activity executed by unauthorized</cell><cell>An activity is executed by a resource other than those</cell></row><row><cell></cell><cell>resource</cell><cell>authorized</cell></row><row><cell></cell><cell>Activities executed by multiple</cell><cell>Activities within the same trace are executed by multiple</cell></row><row><cell></cell><cell>resources</cell><cell>resources</cell></row><row><cell>Resource</cell><cell>Activities executed by a single resource</cell><cell>Activities within the same trace are all executed by the same resource</cell></row><row><cell></cell><cell>Frequent occurrence of activity for a</cell><cell>An activity occurs more frequently for one resource</cell></row><row><cell></cell><cell>resource</cell><cell>compared to other resources</cell></row><row><cell></cell><cell>Frequent occurrence of value for a</cell><cell>A data value occurs more frequently for one resource</cell></row><row><cell></cell><cell>resource</cell><cell>compared to other resources</cell></row><row><cell></cell><cell>Occurrence of activity outside of time</cell><cell>An activity occurs outside of the usual time period</cell></row><row><cell></cell><cell>period</cell><cell></cell></row><row><cell>Time</cell><cell></cell><cell></cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This publication is part of the WorkAround Mining (WAM!) project (with project number 18490) which is (partly) financed by the Dutch Research Council (NWO).</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Conceptualizing Workarounds: Meanings and Manifestations in Information Systems Research</title>
		<author>
			<persName><forename type="first">T</forename><surname>Ejnefjäll</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">J</forename><surname>Ågerfalk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications of the Association for Information Systems</title>
		<imprint>
			<biblScope unit="page" from="340" to="363" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Theory of Workarounds</title>
		<author>
			<persName><forename type="first">S</forename><surname>Alter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications of the Association for Information Systems</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Prevent, Redesign, Adopt or Ignore: Improving Healthcare using Knowledge of Workarounds</title>
		<author>
			<persName><forename type="first">I</forename><surname>Beerepoot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Van De Weerd</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Twenty-Sixth European Conference on Information Systems</title>
				<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">The effect of ERP system workarounds on organizational control: An interpretivist case study</title>
		<author>
			<persName><forename type="first">I</forename><surname>Ignatiadis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Nandhakumar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Scandinavian Journal of Information Systems</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="page">3</biblScope>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><surname>Ilie</surname></persName>
		</author>
		<title level="m">Psychological reactance and user workarounds. a study in the context of electronic medical records implementations</title>
				<imprint>
			<publisher>ECIS</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Enacting computer workaround practices within a medication dispensing system</title>
		<author>
			<persName><forename type="first">B</forename><surname>Azad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>King</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">European Journal of Information Systems</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="page" from="264" to="278" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">The Impact of Workaround Difficulty on Frontline Employees&apos; Response to Operational Failures: A Laboratory Experiment on Medication Administration</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">L</forename><surname>Tucker</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Management Science</title>
		<imprint>
			<biblScope unit="volume">62</biblScope>
			<biblScope unit="page" from="1124" to="1144" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Detecting Workarounds in Business Processes-a Deep Learning method for Analyzing Event Logs</title>
		<author>
			<persName><forename type="first">S</forename><surname>Weinzierl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Wolf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Pauli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Beverungen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Matzner</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 28th European Conference on Information Systems</title>
				<meeting>the 28th European Conference on Information Systems</meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Seeing the Signs of Workarounds: A Mixed-Methods Approach to the Detection of Nurses&apos; Process Deviations</title>
		<author>
			<persName><forename type="first">I</forename><surname>Beerepoot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Van De Weerd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Reijers</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Annual Hawaii International Conference on System Sciences, Hawaii International Conference on System Sciences</title>
				<meeting>the Annual Hawaii International Conference on System Sciences, Hawaii International Conference on System Sciences</meeting>
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">A Situational Perspective on Workarounds in IT-Enabled Business Processes: a Multiple Case Study</title>
		<author>
			<persName><forename type="first">N</forename><surname>Röder</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Wiesche</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Schermann</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2014">2014</date>
			<publisher>ECIS</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Balanced multi-perspective checking of process conformance</title>
		<author>
			<persName><forename type="first">F</forename><surname>Mannhardt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>De Leoni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Reijers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computing</title>
		<imprint>
			<biblScope unit="volume">98</biblScope>
			<biblScope unit="page" from="407" to="437" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Associating assertions with business processes and monitoring their execution</title>
		<author>
			<persName><forename type="first">A</forename><surname>Lazovik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Aiello</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Papazoglou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2nd international conference on Service oriented computing</title>
				<meeting>the 2nd international conference on Service oriented computing</meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">A framework for requirents monitoring of service based systems</title>
		<author>
			<persName><forename type="first">K</forename><surname>Mahbub</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Spanoudakis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2nd international conference on Service oriented computing</title>
				<meeting>the 2nd international conference on Service oriented computing</meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="84" to="93" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Conformance checking of processes based on monitoring real behavior</title>
		<author>
			<persName><forename type="first">A</forename><surname>Rozinat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="page" from="64" to="95" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<author>
			<persName><forename type="first">H</forename><surname>Nguyen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Dumas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rosa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">M</forename><surname>Maggi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Suriadi</surname></persName>
		</author>
		<idno type="arXiv">arXiv:1608.08252</idno>
		<title level="m">Business Process Deviance Mining: Review and Evaluation</title>
				<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
	<note type="report_type">ArXiv e-prints</note>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Examining the relationship between acceptance and resistance in system implementation</title>
		<author>
			<persName><forename type="first">T</forename><surname>Lauer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Rajagopalan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">AMCIS 2002 Proceedings</title>
				<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page">179</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Explanation Methods in Deep Learning: Users, Values, Concerns and Challenges</title>
		<author>
			<persName><forename type="first">G</forename><surname>Ras</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Van Gerven</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Haselager</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The Springer Series on Challenges in Machine Learning</title>
				<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="19" to="36" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">A process mining-based analysis of business process work-arounds</title>
		<author>
			<persName><forename type="first">N</forename><surname>Outmazgin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Soffer</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10270-014-0420-6</idno>
	</analytic>
	<monogr>
		<title level="j">Software &amp; Systems Modeling</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="309" to="323" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">The SWORD is Mightier than the Interview: A Framework for Semi-automatic WORkaround Detection</title>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Waal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Beerepoot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Van De Weerd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Reijers</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International conference on business process management</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
	<note>To appear</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
