=Paper= {{Paper |id=Vol-3216/paper_197 |storemode=property |title=WAM! - WorkAround Mining in Healthcare |pdfUrl=https://ceur-ws.org/Vol-3216/paper_197.pdf |volume=Vol-3216 |authors=Wouter van der Waal |dblpUrl=https://dblp.org/rec/conf/bpm/Waal22 }} ==WAM! - WorkAround Mining in Healthcare== https://ceur-ws.org/Vol-3216/paper_197.pdf
WAM! - WorkAround Mining in Healthcare
Wouter van der Waal
Utrecht University, Heidelberglaan 8, 3584 CS Utrecht, the Netherlands

Keywords
Workarounds, Automated Detection, Event data, Healthcare, Process Mining, Business Process Analysis




1. Problem Statement
Many organizations use standard operating procedures to streamline their work. When proce-
dures are clear, people know what to do. Still, it often happens that work is performed in a way
that is different from the prescribed procedure. When confronted with unexpected situations,
limited time, or a lack of resources, workers may be unable to follow a procedure and may feel
compelled to perform a workaround to solve a problem [1].
   Some workarounds are beneficial and can be leveraged to improve organizational proce-
dures [2, 3]. In other cases, not following a procedure may be harmful or outright dangerous.
Workarounds can result in noncompliance, privacy issues, or negative effects in the process
downstream [4, 5]. Whatever the effect, it is important that process owners are provided with
insights into the occurrence of workarounds. These insights can help to prevent workarounds
from happening again or to improve the concerned procedure [3]. In addition, being able to
structurally and comprehensively identify workarounds would allow for the monitoring of their
emergence, diffusion, and evolution, potentially enabling process analysts to detect and respond
to new workarounds faster than with current techniques.
   To date, most studies in which workarounds were identified and analyzed relied on qualitative
methods, primarily through interviewing and observing users during their work [3]. This
approach has led to valuable insights related to the mechanics and effects of workarounds,
as well as the motivations of the people using them [6, 4, 7]. However, the use of qualitative
methods is labor-intensive; furthermore, users may not disclose their normal behavior when
they are aware of being observed [8]. To address these drawbacks, my focus is on the use
of event logs, process mining, and other quantitative analysis techniques. The state of the
art shows that workarounds can be detected and monitored with this data [9]. However, it is
unclear to what extent this information can be used to discover new workarounds when starting
from the data. Note that if both the workaround and the normative process occur outside of the
system, there will not be any information available to detect this. While these workarounds
may be discovered using interviews, they cannot be found using event logs.

BPM’22: International Conference on Business Process Management, September 11–16, 2022, Münster, Germany
†
 Dissertation Supervisors: Hajo A. Reijers & Inge van de Weerd
$ w.g.vanderwaal@uu.nl (W. v. d. Waal)
 0000-0001-6514-7570 (W. v. d. Waal)
                                       © 2022 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
    CEUR
    Workshop
    Proceedings
                  http://ceur-ws.org
                  ISSN 1613-0073
                                       CEUR Workshop Proceedings (CEUR-WS.org)




                                                                                                          51
  Earlier work shows that event logs from a Health Information System (HIS) can be used to
automatically detect and monitor known workarounds [9]. I stay in line with this focus on the
healthcare domain. Studies have shown that in hospital settings specifically workarounds are a
widespread phenomenon [10]: Nurses share each other’s passwords to save time, physicians
send each other X-rays via WhatsApp to get quick second opinions, and secretaries use shadow
systems on paper to track the department’s occupation. The principles behind my work are
nonetheless transparent and I expect that many of the patterns can be transferred to other
domains.
  This leads to the following research question:

                 How can we use event data stored in HISs to detect workarounds?


2. Related Work
As illustrated in Figure 1, workarounds occur when users intend to reach a goal but perceive
a block to do so using the official procedure [1]. Similar to the conformance-checking field
of process mining, we can look for differences between process variants to detect them [11].
However, we see two important differences. First of all, a workaround requires an intent to
reach a business goal. So, fraud, deception, and errors are not in scope. Secondly, the user is
unable to achieve this goal by using the intended procedure [1]. So, accidentally following a
different route is not a workaround.
   In addition, while non-conformance usually supposes strict rules [12, 13] or a known process
model to conform to [14], workarounds can occur without these. Deviance mining also uses
process mining but looks at smaller deviations between processes [15], which may also be
useful to mine for workarounds. Quite different from a deviance, a workaround can be very
common. If a workaround is sufficiently effective, it may be shared throughout the organization,
potentially becoming more common than the official procedure [16].
   One approach specifically used to automatically detect workarounds is to use deep learning [8].
Neural networks are trained to recognize different workaround types from event logs. These
methods can be difficult to use in practice because they require a large amount of labeled training



                                            Workaround



               Intent       Designed Path
                                               Block                            Goal


Figure 1: An illustration of the definition of a workaround. A worker has an intent to reach a goal, but
is prevented to do so by a block on the designed path. The worker can then deviate from the path to
work around that block to reach the goal.




                                                  52
and testing data. In addition, even if neural networks reach a high classification accuracy, it is
difficult to explain why this is happening [17], which is often required if you want to use the
results in a healthcare environment.
   Alternatively, Outmazgin and Soffer define six workaround patterns, four of which can be
used to detect workarounds in event logs [18]. These patterns require very strict definitions of
what is considered a workaround, such as exact thresholds for activity duration or a full process
model. While these patterns can be used to detect known workarounds, we cannot discover
new workarounds with them.
   Outside of the control-flow, the time, resource, and data perspectives are valuable for confor-
mance checking [11]. By investigating workarounds discovered using qualitative methods, such
as interviews and observations, previous studies show that these perspectives can also be used to
recognize different types of workarounds [9]. We will continue this multi-perspective approach
to investigate if, in addition to recognizing workarounds, we can discover new workarounds
using event logs.


3. Intended Approach
As described in the previous section, detecting workarounds has similarities with several
approaches in process mining, such as conformance checking. Both focus on differences
between the intended and actual process. I will investigate which differences that are used in
process mining fields other than workaround mining can also be used to discover workarounds.
   Many workarounds were discovered through interviews in previous studies in five different
healthcare organizations [9]; a general hospital, two district hospitals, and two specialized
centers. They are documented as ‘workaround snapshots’ and include a description of (1) the
setting in which the workaround was found, (2) the workaround compared to the normative
process, (3) a motivation, and (4) the expected effect of the workaround on cost, time, quality,
and flexibility. Using the comparison between the workaround and the normative process, I can
determine if and how each workaround could be monitored using (event log) data, resulting in
more patterns in addition to the ones extracted from literature.
   While the detection of potential workarounds can be performed in a highly automated fashion,
the actual confirmation of the occurrence of workarounds still needs to be done by domain
experts. In other words, while the defined patterns can show potentially interesting differences
between process variants, only domain experts can determine if a difference is a workaround.
   To test the patterns and techniques for workaround mining, I intend to use case studies.
Depending on the research question, I can extract data from different wards in a hospital from
the HIS over select periods. This data can then be transformed into event logs in which I look for
the patterns. Finally, I further evaluate results that indicate a workaround in a semi-structured
interview with an expert of the corresponding ward or process. The expert can determine if the
observed behavior is normative, a workaround, or something else.




                                               53
4. Preliminary Findings
By investigating the literature and snapshots, I created a Semi-automated WORkaround De-
tection (SWORD) framework containing 22 patterns [19]. Table 1 shows an overview of the
patterns. I created this framework in the two steps as described in the previous section: 1) a
literature study to determine how process mining topics other than workarounds mining define
differences between process instances and 2) finding differences between the workarounds and
normative processes discovered in earlier studies. For more details on this method, I refer to the
full paper.
   Note that the framework is extensible, meaning that new patterns can be added. In addition,
while the focus of the framework is on workarounds, many of the patterns can be applied to
other process mining fields that focus on differences between process variants.
   In the same study, I tested three of the patterns on real hospital data. While the results were
not verified by experts, they were nonetheless promising; I discovered the occurrence of logging
measurements in batches (a previously known workaround), unexpected differences in the
delay between taking measurements, and their logging for different types of measurements.
   In my current (unpublished) work, I have applied the patterns to different wards in a hospital
and held interviews with process experts about the observed outliers. The experts were able to
verify multiple outliers as being workarounds, including previously unknown workarounds.
   For example, in the emergency room (ER), a physician needs to place a mark in the file if (s)he
sees a patient for the first time. This activity can be seen in event logs as ’Seen by physician’.
The ’Delay between the start of trace and activity is out of bounds’ pattern shows that there are
a few cases where this happens a few days after admission to the ER. The expert could explain
this behavior as a workaround. If a physician does not perform the required task, administrative
personnel update the logs to make sure they reflect that the patient was seen by a physician.


5. Open points
5.1. Better Detection
There are two major points to improve workarounds detection using the patterns.
   Firstly, how do we apply the patterns? Currently, I intentionally keep this simple by looking
for the largest deviation(s) from the mean. For example, in the confirmed workaround in the
previous section, I looked for the events that occurred the most standard deviations away from
their meantime. This approach is obviously quite simple and could be improved with more
advanced statistics.
   Secondly, we have seen in previous work that many workarounds can be detected with
multiple patterns. The example workaround was detected by looking for an activity that occurs
at an unusual moment, but we can also see that the same trace takes longer than usual. If we
combine the information of multiple patterns, this could also improve the workaround detection.
   While both points may enhance the quality of workaround detection, it is difficult to exactly
quantify this improvement. The usual approach for this is to compare the results to established
labels in an extensive dataset using measures such as precision and recall. However, this is not
possible for workaround detection, since there is no ground truth available. While experts can




                                               54
manually determine if a single trace is a workaround or normative, it is unfeasible to do so for
large event logs containing thousands of traces.
   Regardless, it is important to determine if and to what extent potential improvements enhance
the detection rate. It may be sufficient to measure this in a smaller event log. In addition, instead
of having an experienced high-level expert evaluate traces, the (initial) evaluation may be
performed by a less-involved expert, such as a medical student. Both options would decrease
the quality of the comparison, but they make the evaluation more feasible to perform.

5.2. Future Work
Being able to detect more workarounds using event logs allows us to further investigate them.
From a sociological point of view, there are many questions about where, when, and how
workarounds emerge and evolve. If we can monitor them using event logs, we can give more
insight into this. We may potentially even pinpoint when and where a workaround begins and
see how it spreads through the organization.
   We can also take a more practical approach and investigate the effects of workarounds. If we
can reliably distinguish between the normative process and a workaround (or different types of
workarounds), we can link this to other available data, such as costs, quality of care, or patient
satisfaction using statistical measures such as regression. This would allow organizations to
better decide what to do with specific workarounds.


A. Appendix

                                        Table 1: Workaround detection patterns
                           Detection pattern                                         Explanation

                 Occurrence of an activity                   A specific activity occurs

                 Occurrence of recurrent activity            A recurrent activity sequence occurs within a trace
                 sequence

                 Frequent occurrence of activity             An activity frequently occurs within a trace

                 Occurrence of activities in an order        The order of activities in a trace is other than in a predefined
  Control-flow




                 different from process model                process model

                 Occurrence of mutually exclusive            Specific activities occur that are mutually exclusive within a
                 activities                                  trace

                 Occurrence of unusual neighboring           An activity is directly followed by an activity other than
                 activities                                  usual

                 Occurrence of directly repeating activity   An activity is immediately repeated within a trace

                 Missing occurrence of activity              A specific activity is missing in the trace

                                                                                               Continued on next page




                                                                55
                            Table 1: Workaround detection patterns (Continued)
                      Detection pattern                                        Explanation

            Data object with value outside boundary     The value of a data object deviates from the usual values

            Change in value between events              Data values change unexpectedly between events
 Data




            Specific information in free-text fields    Information is logged in free-text fields instead of dedicated
                                                        fields

            Activity executed by unauthorized           An activity is executed by a resource other than those
            resource                                    authorized

            Activities executed by multiple             Activities within the same trace are executed by multiple
            resources                                   resources
 Resource




            Activities executed by a single resource    Activities within the same trace are all executed by the same
                                                        resource

            Frequent occurrence of activity for a       An activity occurs more frequently for one resource
            resource                                    compared to other resources

            Frequent occurrence of value for a          A data value occurs more frequently for one resource
            resource                                    compared to other resources

            Occurrence of activity outside of time      An activity occurs outside of the usual time period
            period

            Delay between start of trace and activity   There is a deviation in the delay between the start of the
            is out of bounds                            trace and the time of an activity
 Time




            Time between activities out of bounds       There is a deviation in the time between activities

            Duration of activity out of bounds          There is deviation in the duration of an activity

            Duration of trace out of bounds             There is a deviation in the duration of a trace

            Delay between event and logging is out      There is a deviation in the delay between time of event and
            of bounds                                   time of logging


Acknowledgments

                   This publication is part of the WorkAround Mining (WAM!) project (with project
                   number 18490) which is (partly) financed by the Dutch Research Council (NWO).



References
[1] T. Ejnefjäll, P. J. Ågerfalk, Conceptualizing Workarounds: Meanings and Manifestations
    in Information Systems Research, Communications of the Association for Information
    Systems (2019) 340–363.
[2] S. Alter, Theory of Workarounds, Communications of the Association for Information
    Systems 34 (2014).




                                                           56
 [3] I. Beerepoot, I. van de Weerd, Prevent, Redesign, Adopt or Ignore: Improving Healthcare
     using Knowledge of Workarounds, in: Twenty-Sixth European Conference on Information
     Systems, 2018.
 [4] I. Ignatiadis, J. Nandhakumar, The effect of ERP system workarounds on organizational
     control: An interpretivist case study, Scandinavian Journal of Information Systems 21
     (2009) 3.
 [5] V. Ilie, Psychological reactance and user workarounds. a study in the context of electronic
     medical records implementations, ECIS (2013).
 [6] B. Azad, N. King, Enacting computer workaround practices within a medication dispensing
     system, European Journal of Information Systems 17 (2008) 264–278.
 [7] A. L. Tucker, The Impact of Workaround Difficulty on Frontline Employees’ Response to
     Operational Failures: A Laboratory Experiment on Medication Administration, Manage-
     ment Science 62 (2016) 1124–1144.
 [8] S. Weinzierl, V. Wolf, T. Pauli, D. Beverungen, M. Matzner, Detecting Workarounds in
     Business Processes-a Deep Learning method for Analyzing Event Logs, in: Proceedings of
     the 28th European Conference on Information Systems, 2020.
 [9] I. Beerepoot, X. Lu, I. van de Weerd, H. A. Reijers, Seeing the Signs of Workarounds: A
     Mixed-Methods Approach to the Detection of Nurses’ Process Deviations, in: Proceedings
     of the Annual Hawaii International Conference on System Sciences, Hawaii International
     Conference on System Sciences, 2021.
[10] N. Röder, M. Wiesche, M. Schermann, A Situational Perspective on Workarounds in
     IT-Enabled Business Processes: a Multiple Case Study., in: ECIS, 2014.
[11] F. Mannhardt, M. de Leoni, H. A. Reijers, W. M. P. van der Aalst, Balanced multi-perspective
     checking of process conformance, Computing 98 (2015) 407–437.
[12] A. Lazovik, M. Aiello, M. Papazoglou, Associating assertions with business processes and
     monitoring their execution, in: Proceedings of the 2nd international conference on Service
     oriented computing, ACM Press, 2004.
[13] K. Mahbub, G. Spanoudakis, A framework for requirents monitoring of service based sys-
     tems, in: Proceedings of the 2nd international conference on Service oriented computing,
     ACM Press, 2004, pp. 84–93.
[14] A. Rozinat, W. M. P. van der Aalst, Conformance checking of processes based on monitoring
     real behavior, Information Systems 33 (2008) 64–95.
[15] H. Nguyen, M. Dumas, M. La Rosa, F. M. Maggi, S. Suriadi, Business Process Deviance
     Mining: Review and Evaluation, ArXiv e-prints (2016). arXiv:1608.08252.
[16] T. Lauer, B. Rajagopalan, Examining the relationship between acceptance and resistance
     in system implementation, AMCIS 2002 Proceedings (2002) 179.
[17] G. Ras, M. van Gerven, P. Haselager, Explanation Methods in Deep Learning: Users, Values,
     Concerns and Challenges, in: The Springer Series on Challenges in Machine Learning,
     Springer International Publishing, 2018, pp. 19–36.
[18] N. Outmazgin, P. Soffer, A process mining-based analysis of business process work-arounds,
     Software & Systems Modeling 15 (2014) 309–323. doi:10.1007/s10270-014-0420-6.
[19] W. van der Waal, I. Beerepoot, I. van de Weerd, H. A. Reijers, The SWORD is Mightier than
     the Interview: A Framework for Semi-automatic WORkaround Detection, in: International
     conference on business process management, 2022. To appear.




                                              57