{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T08:08:18Z","timestamp":1769328498151,"version":"3.49.0"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031161025","type":"print"},{"value":"9783031161032","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-16103-2_9","type":"book-chapter","created":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T21:05:56Z","timestamp":1662498356000},"page":"91-106","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["The SWORD is Mightier Than the\u00a0Interview: A Framework for\u00a0Semi-automatic WORkaround Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6514-7570","authenticated-orcid":false,"given":"Wouter","family":"van der Waal","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6301-9329","authenticated-orcid":false,"given":"Iris","family":"Beerepoot","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3420-6923","authenticated-orcid":false,"given":"Inge","family":"van de Weerd","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9634-5852","authenticated-orcid":false,"given":"Hajo A.","family":"Reijers","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,7]]},"reference":[{"issue":"2","key":"9_CR1","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/s0169-023x(03)00066-1","volume":"47","author":"WMP van der Aalst","year":"2003","unstructured":"van der Aalst, W.M.P., van Dongen, B.F., Herbst, J., Maruster, L., Schimm, G., Weijters, A.J.M.M.: Workflow mining: a survey of issues and approaches. Data Knowl. Eng. 47(2), 237\u2013267 (2003). https:\/\/doi.org\/10.1016\/s0169-023x(03)00066-1","journal-title":"Data Knowl. Eng."},{"key":"9_CR2","doi-asserted-by":"publisher","unstructured":"Alter, S.: Theory of workarounds. Commun. Assoc. Inf. Syst. 34 (2014). https:\/\/doi.org\/10.17705\/1cais.03455","DOI":"10.17705\/1cais.03455"},{"issue":"3","key":"9_CR3","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1057\/ejis.2008.14","volume":"17","author":"B Azad","year":"2008","unstructured":"Azad, B., King, N.: Enacting computer workaround practices within a medication dispensing system. Eur. J. Inf. Syst. 17(3), 264\u2013278 (2008). https:\/\/doi.org\/10.1057\/ejis.2008.14","journal-title":"Eur. J. Inf. Syst."},{"key":"9_CR4","doi-asserted-by":"publisher","unstructured":"Batista, E., Solanas, A.: Process mining in healthcare: a systematic review. In: 2018 9th International Conference on Information, Intelligence, Systems and Applications. IEEE, July 2018. https:\/\/doi.org\/10.1109\/iisa.2018.8633608","DOI":"10.1109\/iisa.2018.8633608"},{"key":"9_CR5","doi-asserted-by":"publisher","unstructured":"Beerepoot, I., Lu, X., van de Weerd, I., Reijers, H.A.: Seeing the signs of workarounds: a mixed-methods approach to the detection of nurses\u2019 process deviations. In: Proceedings of the Annual Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences (2021). https:\/\/doi.org\/10.24251\/hicss.2021.456","DOI":"10.24251\/hicss.2021.456"},{"key":"9_CR6","unstructured":"Beerepoot, I., van de Weerd, I.: Prevent, redesign, adopt or ignore: improving healthcare using knowledge of workarounds. In: Twenty-Sixth European Conference on Information Systems (2018)"},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.is.2017.12.006","volume":"74","author":"A Bolt","year":"2018","unstructured":"Bolt, A., de Leoni, M., van der Aalst, W.M.P.: Process variant comparison: using event logs to detect differences in behavior and business rules. Inf. Syst. 74, 53\u201366 (2018). https:\/\/doi.org\/10.1016\/j.is.2017.12.006","journal-title":"Inf. Syst."},{"issue":"11","key":"9_CR8","doi-asserted-by":"publisher","first-page":"5340","DOI":"10.1016\/j.eswa.2014.03.010","volume":"41","author":"D Borrego","year":"2014","unstructured":"Borrego, D., Barba, I.: Conformance checking and diagnosis for declarative business process models in data-aware scenarios. Expert Syst. Appl. 41(11), 5340\u20135352 (2014). https:\/\/doi.org\/10.1016\/j.eswa.2014.03.010","journal-title":"Expert Syst. Appl."},{"key":"9_CR9","doi-asserted-by":"publisher","unstructured":"Bose, R.P.J.C., van der Aalst, W.M.P.: Discovering signature patterns from event logs. In: 2013 IEEE Symposium on Computational Intelligence and Data Mining. IEEE, April 2013. https:\/\/doi.org\/10.1109\/cidm.2013.6597225","DOI":"10.1109\/cidm.2013.6597225"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.eswa.2016.08.040","volume":"65","author":"A Burattin","year":"2016","unstructured":"Burattin, A., Maggi, F.M., Sperduti, A.: Conformance checking based on multi-perspective declarative process models. Expert Syst. Appl. 65, 194\u2013211 (2016). https:\/\/doi.org\/10.1016\/j.eswa.2016.08.040","journal-title":"Expert Syst. Appl."},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1007\/978-3-319-98648-7_27","volume-title":"Business Process Management","author":"C Di Francescomarino","year":"2018","unstructured":"Di Francescomarino, C., Ghidini, C., Maggi, F.M., Milani, F.: Predictive process monitoring methods: which one suits me best? In: Weske, M., Montali, M., Weber, I., vom Brocke, J. (eds.) BPM 2018. LNCS, vol. 11080, pp. 462\u2013479. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98648-7_27"},{"key":"9_CR12","doi-asserted-by":"publisher","unstructured":"Dunzer, S., Stierle, M., Matzner, M., Baier, S.: Conformance checking: a state-of-the-art literature review. In: Proceedings of the 11th International Conference on Subject-Oriented Business Process Management. ACM Press (2019). https:\/\/doi.org\/10.1145\/3329007.3329014","DOI":"10.1145\/3329007.3329014"},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"340","DOI":"10.17705\/1cais.04520","volume":"45","author":"T Ejnefj\u00e4ll","year":"2019","unstructured":"Ejnefj\u00e4ll, T., \u00c5gerfalk, P.J.: Conceptualizing workarounds: meanings and manifestations in information systems research. Commun. Assoc. Inf. Syst. 45, 340\u2013363 (2019). https:\/\/doi.org\/10.17705\/1cais.04520","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"9_CR14","unstructured":"Ester, M., Kriegel, H.P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining (1996)"},{"issue":"2","key":"9_CR15","first-page":"3","volume":"21","author":"I Ignatiadis","year":"2009","unstructured":"Ignatiadis, I., Nandhakumar, J.: The effect of ERP system workarounds on organizational control: an interpretivist case study. Scand. J. Inf. Syst. 21(2), 3 (2009)","journal-title":"Scand. J. Inf. Syst."},{"key":"9_CR16","unstructured":"Ilie, V.: Psychological reactance and user workarounds. a study in the context of electronic medical records implementations. In: ECIS (2013)"},{"key":"9_CR17","unstructured":"Lauer, T., Rajagopalan, B.: Examining the relationship between acceptance and resistance in system implementation. In: AMCIS 2002 Proceedings, p. 179 (2002)"},{"key":"9_CR18","doi-asserted-by":"publisher","unstructured":"Lazovik, A., Aiello, M., Papazoglou, M.: Associating assertions with business processes and monitoring their execution. In: Proceedings of the 2nd International Conference on Service Oriented Computing. ACM Press (2004). https:\/\/doi.org\/10.1145\/1035167.1035182","DOI":"10.1145\/1035167.1035182"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-642-40176-3_10","volume-title":"Business Process Management","author":"M de Leoni","year":"2013","unstructured":"de Leoni, M., van der Aalst, W.M.P.: Aligning event logs and process models for multi-perspective conformance checking: an approach based on integer linear programming. In: Daniel, F., Wang, J., Weber, B. (eds.) BPM 2013. LNCS, vol. 8094, pp. 113\u2013129. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40176-3_10"},{"key":"9_CR20","doi-asserted-by":"publisher","unstructured":"Lo, D., Cheng, H., Han, J., Khoo, S.C., Sun, C.: Classification of software behaviors for failure detection. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM Press (2009). https:\/\/doi.org\/10.1145\/1557019.1557083","DOI":"10.1145\/1557019.1557083"},{"key":"9_CR21","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-319-42887-1_11","volume-title":"Business Process Management Workshops","author":"X Lu","year":"2016","unstructured":"Lu, X., Fahland, D., van den Biggelaar, F.J.H.M., van der Aalst, W.M.P.: Detecting deviating behaviors without models. In: Reichert, M., Reijers, H.A. (eds.) BPM 2015. LNBIP, vol. 256, pp. 126\u2013139. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-42887-1_11"},{"key":"9_CR22","doi-asserted-by":"publisher","unstructured":"Mahbub, K., Spanoudakis, G.: A framework for requirents monitoring of service based systems. In: Proceedings of the 2nd International Conference on Service Oriented Computing, pp. 84\u201393. ACM Press (2004). https:\/\/doi.org\/10.1145\/1035167.1035181","DOI":"10.1145\/1035167.1035181"},{"issue":"4","key":"9_CR23","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s00607-015-0441-1","volume":"98","author":"F Mannhardt","year":"2015","unstructured":"Mannhardt, F., de Leoni, M., Reijers, H.A., van der Aalst, W.M.P.: Balanced multi-perspective checking of process conformance. Computing 98(4), 407\u2013437 (2015). https:\/\/doi.org\/10.1007\/s00607-015-0441-1","journal-title":"Computing"},{"key":"9_CR24","unstructured":"Nguyen, H., Dumas, M., La Rosa, M., Maggi, F.M., Suriadi, S.: Business process deviance mining: review and evaluation. arXiv preprint arXiv:1608.08252, August 2016"},{"key":"9_CR25","doi-asserted-by":"publisher","unstructured":"Osuna, E., Freund, R., Girosi, F.: An improved training algorithm for support vector machines. In: Neural Networks for Signal Processing VII. Proceedings of the 1997 IEEE Signal Processing Society Workshop, pp. 276\u2013285. IEEE (1997). https:\/\/doi.org\/10.1109\/nnsp.1997.622408","DOI":"10.1109\/nnsp.1997.622408"},{"key":"9_CR26","series-title":"The Springer Series on Challenges in Machine Learning","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-319-98131-4_2","volume-title":"Explainable and Interpretable Models in Computer Vision and Machine Learning","author":"G Ras","year":"2018","unstructured":"Ras, G., van Gerven, M., Haselager, P.: Explanation methods in deep learning: users, values, concerns and challenges. In: Escalante, H.J., et al. (eds.) Explainable and Interpretable Models in Computer Vision and Machine Learning. TSSCML, pp. 19\u201336. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98131-4_2"},{"issue":"2","key":"9_CR27","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.is.2011.01.003","volume":"37","author":"\u00c1 Rebuge","year":"2012","unstructured":"Rebuge, \u00c1., Ferreira, D.R.: Business process analysis in healthcare environments: a methodology based on process mining. Inf. Syst. 37(2), 99\u2013116 (2012). https:\/\/doi.org\/10.1016\/j.is.2011.01.003","journal-title":"Inf. Syst."},{"key":"9_CR28","unstructured":"R\u00f6der, N., Wiesche, M., Schermann, M.: A situational perspective on workarounds in IT-enabled business processes: a multiple case study. In: ECIS (2014)"},{"issue":"1","key":"9_CR29","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A Rozinat","year":"2008","unstructured":"Rozinat, A., van der Aalst, W.M.P.: Conformance checking of processes based on monitoring real behavior. Inf. Syst. 33(1), 64\u201395 (2008). https:\/\/doi.org\/10.1016\/j.is.2007.07.001","journal-title":"Inf. Syst."},{"key":"9_CR30","unstructured":"Swennen, M., et al.: Capturing resource behaviour from event logs. In: SIMPDA, pp. 130\u2013134 (2016)"},{"key":"9_CR31","doi-asserted-by":"publisher","first-page":"106557","DOI":"10.1016\/j.knosys.2020.106557","volume":"211","author":"F Taymouri","year":"2021","unstructured":"Taymouri, F., La Rosa, M., Dumas, M., Maggi, F.M.: Business process variant analysis: survey and classification. Knowl. Based Syst. 211, 106557 (2021). https:\/\/doi.org\/10.1016\/j.knosys.2020.106557","journal-title":"Knowl. Based Syst."},{"issue":"4","key":"9_CR32","doi-asserted-by":"publisher","first-page":"1124","DOI":"10.1287\/mnsc.2015.2170","volume":"62","author":"AL Tucker","year":"2016","unstructured":"Tucker, A.L.: The impact of workaround difficulty on frontline employees\u2019 response to operational failures: a laboratory experiment on medication administration. Manag. Sci. 62(4), 1124\u20131144 (2016). https:\/\/doi.org\/10.1287\/mnsc.2015.2170","journal-title":"Manag. Sci."},{"key":"9_CR33","unstructured":"Weinzierl, S., Wolf, V., Pauli, T., Beverungen, D., Matzner, M.: Detecting workarounds in business processes-a deep learning method for analyzing event logs. In: Proceedings of the 28th European Conference on Information Systems, May 2020"},{"key":"9_CR34","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.dss.2017.04.004","volume":"100","author":"MT Wynn","year":"2017","unstructured":"Wynn, M.T., et al.: ProcessProfiler3D: a visualisation framework for log-based process performance comparison. Decis. Support Syst. 100, 93\u2013108 (2017). https:\/\/doi.org\/10.1016\/j.dss.2017.04.004","journal-title":"Decis. Support Syst."}],"container-title":["Lecture Notes in Computer Science","Business Process Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-16103-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:08:36Z","timestamp":1710259716000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-16103-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031161025","9783031161032"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-16103-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Process Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"M\u00fcnster","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bpm2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bpm2022.uni-muenster.de","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"98","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the BPM Forum 13 papers have been accepted out of the total of 98 submissions. The Blockchain, RPA and CEE Forum accepted 20 papers out of a total of 40 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}