<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">SWORD Extractor Pulling Workarounds out the Eventlog</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Wouter</forename><surname>Van Der Waal</surname></persName>
							<email>g.vanderwaal@uu.nl</email>
							<affiliation key="aff0">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<addrLine>Heidelberglaan 8</addrLine>
									<postCode>3584 CS</postCode>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Inge</forename><surname>Van De Weerd</surname></persName>
							<email>g.c.vandeweerd@uu.nl</email>
							<affiliation key="aff0">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<addrLine>Heidelberglaan 8</addrLine>
									<postCode>3584 CS</postCode>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Hajo</forename><forename type="middle">A</forename><surname>Reijers</surname></persName>
							<email>h.a.reijers@uu.nl</email>
							<affiliation key="aff0">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<addrLine>Heidelberglaan 8</addrLine>
									<postCode>3584 CS</postCode>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">SWORD Extractor Pulling Workarounds out the Eventlog</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">7B812936B08330724D8C9C05684C997B</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T16:33+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Workarounds</term>
					<term>Automated detection</term>
					<term>Event logs</term>
					<term>Process Mining</term>
					<term>Business process analysis</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>While workarounds can be used to improve processes, discovering them may be challenging. In earlier work, we showed that the Semi-automated WORkaround Detection (SWORD) framework can be used to detect workarounds in event data. Starting from an event log, the SWORD Extractor demonstrated in this work guides the user through all the necessary steps to find cases that may indicate workarounds, without requiring extensive technical experience. The tool's design supports the implementation of additional patterns for future research.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>To streamline processes, many organizations define how people should work in procedures <ref type="bibr" target="#b0">[1]</ref>. These are usually not designed to predict and describe any and all eventualities that may occur in the process. If a worker observes an obstacle to follow the procedure, such as a missing signature from a colleague who is on vacation, a system that is offline due to maintenance, or simply has too little time, they may find an alternative path to work around the block <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>.</p><p>Once workarounds are discovered, process managers can use them to improve the general process in various ways <ref type="bibr" target="#b2">[3]</ref>. However, this requires the discovery of workarounds. Previous research searched for new workaround types using qualitative methods such as interviews <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref> or used qualitative measures to recognize workaround instances of known types in event logs <ref type="bibr" target="#b4">[5]</ref>. Building upon both methods, recent work into workaround mining has shown that new workaround types can also be discovered with a data-driven approach using the Semi-automated WORkaround Detection (SWORD) framework <ref type="bibr" target="#b5">[6]</ref>. This framework defines various patterns that may indicate workarounds from an event log. Each pattern has individual requirements, such as accurate timestamps or actor roles, that determine if it is applicable to the event log. As the framework is modular, only a selection of the patterns can used based on the available data.</p><p>However, the practical use of the framework is not straightforward. The requirements differ strongly between the patterns and are not always common in event logs. As such, this requires programming knowledge to work with the framework even besides general implementation issues. To allow workaround mining without a technical background, we introduce the SWORD Extractor which makes the application of the SWORD framework much easier for anyone interested in discovering workarounds. Given an event log, it guides the user through selecting patterns, and applying them, removing the need for specialized skills.</p><p>In the following, we explain how the tool can be used in Section 2, discuss its maturity in Section 3, and discuss future work and conclude in Section 4.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Functionality</head><p>As can be seen in Figure <ref type="figure" target="#fig_0">1</ref>, the SWORD Extractor consists of four sections: The top left section shows the Case View, the top right section shows the Selection List, the bottom left shows the Patterns Scores, and the bottom right shows the Pattern Options. In the following, we will discuss the main features of the tool per section, in order of usage. Afterward, we will discuss how the results can be used for research outside of the tool.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Loading an Event Log</head><p>The first step in using the SWORD Extractor is selecting which columns in the event log link to the columns in the SWORD framework. When run, an OS-dependent popup directly asks the user to load an event log. This log is expected to be in .csv format, where columns are separated by commas. There are no other requirements besides the file being an event log: While every line should contain one event, there is no requirement on the number of columns in the log or their exact content. In the next step, the event log columns should be linked to the SWORD format using the options in the top right "Selection List".</p><p>There are six columns available: "CaseID" to distinguish between cases, "Activity" to identify the activity performed in the event, "Start time" which indicates the moment the event began, "End time" which shows when the event finished, "Log time" as the time the event was logged in the system, and "Resource" to show who performed the event. Note that "Start time" is the main time-based column and is required for all time-related patterns. Thus, even if the only available timestamp is technically the logging time, it should still be matched to "Start time" instead.</p><p>Not all columns need to be selected. Only the CaseID is strictly required to use the tool. If certain data is not available in the event log, it can simply be left empty as is the case in Figure 1 for "End time", "Log time", and "Resource". However, any other column that is not matched to the event log may limit the number of SWORD patterns that can be applied at a later point.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Pattern Options</head><p>Once the right columns from the event log are loaded, all patterns that may be applied can be selected from the Pattern Options in the bottom right part of the interface. All patterns that have their requirements satisfied are automatically made clickable, while the remaining patterns stay grayed out. This can be seen in Figure <ref type="figure" target="#fig_0">1</ref>. As there are no log times or resources provided, the patterns concerning the number of resources or the delay until logging cannot be calculated, while all other patterns are available.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">Pattern Calculation</head><p>Any pattern available in the selection field can simply be calculated by clicking on it. Once this happens, the tool calculates the scores for this pattern per case and immediately shows the results in the Pattern Scores view in the bottom left. Patterns may also be re-calculated, which can be useful if the alignment to the SWORD format changes. In this case, the pattern will be overwritten in the table.</p><p>Depending on the pattern, size of the event log, and the system used, the time it takes to calculate a pattern can differ strongly. The simpler patterns, such as "Duration of Trace" are usually finished within seconds, while more complex patterns like "Delay between start of trace and event" can take more time. Each new pattern will be shown in an additional column in this view. The patterns can be inspected in more detail by sorting with the "Sort by" drop-down menu above the table to find the traces that deviate strongest according to the specific pattern.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4.">Case Filtering</head><p>Cases of interest, such as cases with high pattern scores, can be inspected in the top left Case View. This view always shows the six SWORD columns. If a column has not been matched to the event log, all values will show "NA". The drop-down menu below the table can be used to select a specific case.</p><p>In Figure <ref type="figure" target="#fig_0">1</ref>, case SFA is selected, as it showed the highest Z-score for the "Delay between start of trace and event" pattern. In the Case View, we can see that, according to the event log, "ER Triage" has been executed a second time more than a day after initial registration. As patients in the ER rarely stay more than 24 hours <ref type="bibr" target="#b5">[6]</ref>, this is likely an example of a delayed ER release registration workaround.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.5.">Continue with SWORD Scores</head><p>While working with the SWORD Extractor, the Pattern Scores are constantly saved to the R working directory with the name "pattern_scores". This means that at any point in time, this table can be used in analyses in R outside of the tool. The table may also be exported using normal R-syntax for further research using different tools.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Maturity</head><p>While the GUI of the tool has not been used before, the SWORD framework has been applied in multiple studies to discover workarounds. Initially, the patterns in the framework have been defined in <ref type="bibr" target="#b6">[7]</ref>, based on a literature review and previous qualitative case studies in healthcare. In this study, three well-known workaround types were discovered in a real hospital dataset.</p><p>These patterns were further defined and implemented in a healthcare multiple case study where 11 previously undiscovered workaround types were found <ref type="bibr" target="#b5">[6]</ref>. This showed that the framework also proved useful for the discovery of workarounds. Outside of this domain, the SWORD framework was applied in an academic finance context, where two workaround types were discovered without using any domain knowledge <ref type="bibr" target="#b7">[8]</ref>. These types were then used to improve the underlying process.</p><p>As an extension to the framework, active learning, in combination with logistic regression, discovered an additional seven workaround types in a separate healthcare case study <ref type="bibr" target="#b9">[9]</ref>. With the SWORD framework forming a strong base for this study, active learning primarily decreased the time and effort necessary for interviews to determine which indicated cases indeed point to workarounds.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusion</head><p>In this work, we present the SWORD Extractor: an R-based tool that makes using the SWORD framework simpler by helping the user select relevant information from an event log and indicating which patterns are applicable to the data. A straightforward analysis can be performed directly within the tool by inspecting the pattern scores and individual indicated cases. It also supports more complex analyses in R, or any other tool by simply exporting the pattern scores. While this version is complete given the current level of related research, updates to the tool are planned for future work. We will discuss two of them here.</p><p>First, in the current version of the SWORD Extractor, all nine patterns used in previous research are available. The full SWORD framework consists of 22 patterns. Although some patterns may depend directly on very specific domain knowledge <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7]</ref>, including other SWORD patterns without such dependencies is a natural extension of the current tool. In addition, the SWORD framework itself is designed to be extendable, so such new patterns may also be added to the tool when they are discovered. To simplify any additions, new patterns can be easily added to the framework by design. It only requires the user to write the core: a function that calculates the pattern scores based on the log structure. This new pattern can then be integrated into the tool with a single function call. For details, we refer to the documentation.</p><p>Second, the visualization of the SWORD patterns follows previous work and is sufficient to rank traces and indicate cases that are likely workarounds. In some cases, this may require a detailed inspection of a case. More explanations from the tool about why a case would be ranked highly could speed up this process and help end users, especially those less experienced with reading event logs. There has not been any research into what visualizations are meaningful and understandable, but this would be an improvement that could improve accessibility even further.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Screenshot of SWORD using the Sepsis event log [10]. The top left section shows the Case View, the top right section shows the Selection List, the bottom left shows the Patterns Scores, and the bottom right shows the Pattern Options</figDesc><graphic coords="3,89.29,84.19,416.70,277.54" type="bitmap" /></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This publication is part of the WorkAround Mining (WAM!) project with project number 18490 which is (partly) financed by the Dutch Research Council (NWO).</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Theory of Workarounds</title>
		<author>
			<persName><forename type="first">S</forename><surname>Alter</surname></persName>
		</author>
		<idno type="DOI">10.17705/1cais.03455</idno>
	</analytic>
	<monogr>
		<title level="j">Communications of the Association for Information Systems</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
	<note>CAIS)</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Conceptualizing Workarounds: Meanings and Manifestations in Information Systems Research</title>
		<author>
			<persName><forename type="first">T</forename><surname>Ejnefjäll</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">J</forename><surname>Ågerfalk</surname></persName>
		</author>
		<idno type="DOI">10.17705/1cais.04520</idno>
	</analytic>
	<monogr>
		<title level="j">Communications of the Association for Information Systems</title>
		<imprint>
			<biblScope unit="page" from="340" to="363" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note>CAIS)</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Prevent, Redesign, Adopt or Ignore: Improving Healthcare using Knowledge of Workarounds</title>
		<author>
			<persName><forename type="first">I</forename><surname>Beerepoot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Van De Weerd</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 26th European Conference on Information Systems (ECIS)</title>
				<meeting>the 26th European Conference on Information Systems (ECIS)</meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Workarounds in retail work systems: prevent, redesign, adopt or ignore?</title>
		<author>
			<persName><forename type="first">I</forename><surname>Van De Weerd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Vollers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Beerepoot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Fantinato</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 27th European Conference on Information Systems (ECIS)</title>
				<meeting>the 27th European Conference on Information Systems (ECIS)</meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A process mining-based analysis of business process workarounds</title>
		<author>
			<persName><forename type="first">N</forename><surname>Outmazgin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Soffer</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10270-014-0420-6</idno>
	</analytic>
	<monogr>
		<title level="j">Software &amp; Systems Modeling</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="309" to="323" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
	<note>SoSyM)</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Putting the SWORD to the Test: Finding Workarounds with Process Mining</title>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Waal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Van De Weerd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Beerepoot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kappen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Haitjema</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Reijers</surname></persName>
		</author>
		<idno type="DOI">10.1007/s12599-023-00846-3</idno>
	</analytic>
	<monogr>
		<title level="j">Business &amp; Information Systems Engineering</title>
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
	<note>BISE</note>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">The SWORD is Mightier Than the Interview: A Framework for Semi-automatic WORkaround Detection</title>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Waal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Beerepoot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Van De Weerd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Reijers</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-16103-2_9</idno>
	</analytic>
	<monogr>
		<title level="m">Business Process Management (BPM)</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="91" to="106" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">From Automatic Workaround Detection to Process Improvement: A Case Study</title>
		<author>
			<persName><forename type="first">N</forename><surname>Outmazgin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Waal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Beerepoot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Hadar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Van De Weerd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Soffer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">BPM</title>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title/>
		<idno type="DOI">10.1007/978-3-031-41623-1</idno>
	</analytic>
	<monogr>
		<title level="j">Forum</title>
		<imprint>
			<biblScope unit="page" from="372" to="390" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Whetting the SWORD: Detecting Workarounds by Using Active Learning and Logistic Regression</title>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Waal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Van De Weerd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Haitjema</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kappen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Reijers</surname></persName>
		</author>
		<idno>doi:10125/106828</idno>
	</analytic>
	<monogr>
		<title level="m">Hawaiian International Conference on System Sciences (HICSS)</title>
				<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="page" from="3687" to="3696" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Sepsis cases -event log</title>
		<author>
			<persName><forename type="first">F</forename><surname>Mannhardt</surname></persName>
		</author>
		<idno type="DOI">10.4121/uuid:915d2bfb-7e84-49ad-a286-dc35f063a460</idno>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
	<note>Version 1. 4TU.ResearchData. dataset</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
