{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T06:08:21Z","timestamp":1749794901771,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031416224"},{"type":"electronic","value":"9783031416231"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-41623-1_20","type":"book-chapter","created":{"date-parts":[[2023,8,31]],"date-time":"2023-08-31T23:03:46Z","timestamp":1693523026000},"page":"337-354","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Detecting Weasels at\u00a0Work: A Theory-Driven Behavioural Process Mining Approach"],"prefix":"10.1007","author":[{"given":"Michael","family":"Leyer","sequence":"first","affiliation":[]},{"given":"Arthur H. M.","family":"ter Hofstede","sequence":"additional","affiliation":[]},{"given":"Rehan","family":"Syed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,1]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"van der Aalst, W.M.P.: Process Mining - Data Science in Action, Second Edition. Springer (2016)","key":"20_CR1","DOI":"10.1007\/978-3-662-49851-4"},{"unstructured":"Adams, M., ter Hofstede, A.H.M., Edmond, D., van der Aalst, W.M.P.: Facilitating flexibility and dynamic exception handling in workflows through worklets. In: Belo, O., Eder, J., Falc\u00e3o e Cunha, J., Pastor, O. (eds.) The 17th Conference on Advanced Information Systems Engineering (CAiSE 2005), Porto, Portugal, 13\u201317 June, 2005, CAiSE Forum, Short Paper Proceedings. CEUR Workshop Proceedings, vol. 161. CEUR-WS.org (2005)","key":"20_CR2"},{"unstructured":"Aysolmaz, B., Nemeth, M., Iren, D.: A method for objective performance benchmarking of teams with process mining and DEA. In: Rowe, F., et al. (eds.) 29th European Conference on Information Systems - Human Values Crisis in a Digitizing World, ECIS 2021, Marrakech (2021)","key":"20_CR3"},{"issue":"4","key":"20_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2022.101745","volume":"31","author":"P Badakhshan","year":"2022","unstructured":"Badakhshan, P., Wurm, B., Grisold, T., Geyer-Klingeberg, J., Mendling, J., vom Brocke, J.: Creating business value with process mining. J. Strateg. Inf. Syst. 31(4), 101745 (2022)","journal-title":"J. Strateg. Inf. Syst."},{"issue":"3","key":"20_CR5","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s11002-014-9325-y","volume":"26","author":"LI Bergkvist","year":"2015","unstructured":"Bergkvist, L.I.: Appropriate use of single-item measures is here to stay. Mark. Lett. 26(3), 245\u2013255 (2015)","journal-title":"Mark. Lett."},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-030-49435-3_4","volume-title":"Advanced Information Systems Engineering","author":"R Bidar","year":"2020","unstructured":"Bidar, R., ter Hofstede, A.H.M., Sindhgatta, R.: Co-destruction patterns in crowdsourcing. In: Dustdar, S., Yu, E., Salinesi, C., Rieu, D., Pant, V. (eds.) CAiSE 2020. LNCS, vol. 12127, pp. 54\u201369. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49435-3_4"},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.euroecorev.2017.10.004","volume":"101","author":"C Biener","year":"2018","unstructured":"Biener, C., Eling, M., Landmann, A., Pradhan, S.: Can group incentives alleviate moral hazard? the role of pro-social preferences. Eur. Econ. Rev. 101, 230\u2013249 (2018)","journal-title":"Eur. Econ. Rev."},{"issue":"3","key":"20_CR8","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1111\/ijsa.12040","volume":"21","author":"ME Brock","year":"2013","unstructured":"Brock, M.E., Martin, L.E., Buckley, M.R.: Time theft in organizations: the development of the time banditry questionnaire. Int. J. Sel. Assess. 21(3), 309\u2013321 (2013)","journal-title":"Int. J. Sel. Assess."},{"issue":"6","key":"20_CR9","first-page":"381","volume":"55","author":"LC Chullen","year":"2010","unstructured":"Chullen, L.C., Dunford, B.B., Angermeier, I., Boss, W.R., Boss, A.D.: Minimizing deviant behavior in healthcare organizations: the effects of supportive leadership and job design. J. Healthc. Manag. 55(6), 381\u201397 (2010)","journal-title":"J. Healthc. Manag."},{"issue":"1","key":"20_CR10","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1002\/job.243","volume":"25","author":"PD Dunlop","year":"2004","unstructured":"Dunlop, P.D., Lee, K.: Workplace deviance, organizational citizenship behavior, and business unit performance: the bad apples do spoil the whole barrel. J. Organ. Behav. 25(1), 67\u201380 (2004)","journal-title":"J. Organ. Behav."},{"issue":"1","key":"20_CR11","doi-asserted-by":"publisher","first-page":"57","DOI":"10.2307\/258191","volume":"14","author":"K Eisenhardt","year":"1989","unstructured":"Eisenhardt, K.: Agency theory: an assessment and review. Acad. Manag. Rev. 14(1), 57\u201374 (1989)","journal-title":"Acad. Manag. Rev."},{"key":"20_CR12","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1057\/9780230522343_6","volume-title":"Psychology, Rationality and Economic Behaviour: Challenging Standard Assumptions","author":"F Englmaier","year":"2005","unstructured":"Englmaier, F.: Moral hazard, contracts and social preferences: a survey. In: Agarwal, B., Vercelli, A. (eds.) Psychology, Rationality and Economic Behaviour: Challenging Standard Assumptions, pp. 125\u2013139. Palgrave Macmillan UK, London (2005)"},{"doi-asserted-by":"crossref","unstructured":"Haag, S., Eckhardt, A., Venkatesh, V.: Deviant affordances. when tensions, deadlocks, and nonconformance generate performance. Management Information Systems Quarterly Forthcoming (2023). 10.25300\/MISQ\/2022\/14340","key":"20_CR13","DOI":"10.2139\/ssrn.4059707"},{"issue":"2","key":"20_CR14","doi-asserted-by":"publisher","first-page":"324","DOI":"10.2307\/3003457","volume":"13","author":"B Holmstrom","year":"1982","unstructured":"Holmstrom, B.: Moral hazard in teams. The Bell J. of Econ. 13(2), 324\u2013340 (1982)","journal-title":"The Bell J. of Econ."},{"issue":"4","key":"20_CR15","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/0304-405X(76)90026-X","volume":"3","author":"M Jensen","year":"1976","unstructured":"Jensen, M., Meckling, W.: Theory of the firm: managerial behavior, agency costs and ownership structure. J. Financ. Econ. 3(4), 305\u2013360 (1976)","journal-title":"J. Financ. Econ."},{"issue":"1","key":"20_CR16","doi-asserted-by":"publisher","first-page":"366","DOI":"10.5465\/annals.2018.0174","volume":"14","author":"KC Kellogg","year":"2020","unstructured":"Kellogg, K.C., Valentine, M.A., Christin, A.: Algorithms at work: the new contested terrain of control. Acad. Manage. Ann. 14(1), 366\u2013410 (2020)","journal-title":"Acad. Manage. Ann."},{"issue":"2","key":"20_CR17","first-page":"285","volume":"30","author":"R Liden","year":"2004","unstructured":"Liden, R., Wayne, S., Jaworski, R., Bennet, N.: Social loafing: a field investigation. J. Manage. 30(2), 285\u2013304 (2004)","journal-title":"J. Manage."},{"issue":"1","key":"20_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3041218","volume":"8","author":"A Pika","year":"2017","unstructured":"Pika, A., Leyer, M., Wynn, M., Fidge, C., ter Hofstede, A., van der Aalst, W.: Mining resource profiles from event logs. ACM Trans. Manage. Inf. Syst. 8(1), 1\u201330 (2017)","journal-title":"ACM Trans. Manage. Inf. Syst."},{"issue":"10","key":"20_CR19","doi-asserted-by":"publisher","first-page":"1213","DOI":"10.1177\/00187267035610003","volume":"56","author":"D Salin","year":"2003","unstructured":"Salin, D.: Ways of explaining workplace bullying: a review of enabling, motivating and precipitating structures and processes in the work environment. Hum. Relat. 56(10), 1213\u20131232 (2003)","journal-title":"Hum. Relat."},{"key":"20_CR20","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/j.dss.2008.07.002","volume":"46","author":"M Song","year":"2008","unstructured":"Song, M., Van der Aalst, W.M.P.: Towards comprehensive support for organizational mining. Decis. Support Syst. 46, 300\u2013317 (2008)","journal-title":"Decis. Support Syst."},{"unstructured":"Toomer, J., Caldwell, C., Weitzenkorn, S., Clark, C.: Introduction: Catalytic Teamwork in Action, pp. 1\u20136. Emerald Publishing Limited (2018)","key":"20_CR21"},{"issue":"6","key":"20_CR22","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1108\/SCM-01-2018-0029","volume":"23","author":"H Treiblmaier","year":"2018","unstructured":"Treiblmaier, H.: The impact of the blockchain on the supply chain: a theory-based research framework and a call for action. Supply Chain Manage. Int. J. 23(6), 545\u2013559 (2018)","journal-title":"Supply Chain Manage. Int. J."},{"key":"20_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-031-16103-2_9","volume-title":"Business Process Management","author":"W van der Waal","year":"2022","unstructured":"van der Waal, W., Beerepoot, I., van de Weerd, I., Reijers, H.A.: The SWORD is mightier than the interview: a framework for semi-automatic workaround detection. In: Di Ciccio, C., Dijkman, R., del R\u00edo Ortega, A., Rinderle-Ma, S. (eds.) BPM 2022. LNCS, vol. 13420, pp. 91\u2013106. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-16103-2_9"},{"key":"20_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-030-85469-0_22","volume-title":"Business Process Management","author":"J Yang","year":"2021","unstructured":"Yang, J., Ouyang, C., ter Hofstede, A.H.M., van\u00a0der Aalst, W.M.P., Leyer, M.: Seeing the forest for the trees: group-oriented workforce analytics. In: Polyvyanyy, A., Wynn, M.T., Van Looy, A., Reichert, M. (eds.) BPM 2021. LNCS, vol. 12875, pp. 345\u2013362. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-85469-0_22"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Forum"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-41623-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T11:38:50Z","timestamp":1710329930000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-41623-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031416224","9783031416231"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-41623-1_20","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Process Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Utrecht","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bpm2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bpm2023.sites.uu.nl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"151","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"In addition, for the BPM Forum 23 papers were accepted. 18 papers of 42 submissions were accepted for the Blockchain- Educators- and RPA Forum.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}