{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T15:53:41Z","timestamp":1770911621778,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031416224","type":"print"},{"value":"9783031416231","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-41623-1_22","type":"book-chapter","created":{"date-parts":[[2023,8,31]],"date-time":"2023-08-31T23:03:46Z","timestamp":1693523026000},"page":"372-390","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["From Automatic Workaround Detection to Process Improvement: A Case Study"],"prefix":"10.1007","author":[{"given":"Nesi","family":"Outmazgin","sequence":"first","affiliation":[]},{"given":"Wouter","family":"van der Waal","sequence":"additional","affiliation":[]},{"given":"Iris","family":"Beerepoot","sequence":"additional","affiliation":[]},{"given":"Irit","family":"Hadar","sequence":"additional","affiliation":[]},{"given":"Inge","family":"van de Weerd","sequence":"additional","affiliation":[]},{"given":"Pnina","family":"Soffer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,1]]},"reference":[{"key":"22_CR1","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.procs.2017.11.018","volume":"121","author":"PV Martins","year":"2017","unstructured":"Martins, P.V., Zacarias, M.: An agile business process improvement methodology. Procedia Comput. Sci. 121, 129\u2013136 (2017)","journal-title":"Procedia Comput. Sci."},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.is.2018.06.007","volume":"84","author":"S Satyal","year":"2019","unstructured":"Satyal, S., Weber, I., Paik, H.Y., Di Ciccio, C., Mendling, J.: Business process improvement with the AB-BPM methodology. Inf. Syst. 84, 283\u2013298 (2019)","journal-title":"Inf. Syst."},{"issue":"1","key":"22_CR3","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s12599-015-0417-x","volume":"58","author":"RJ Vanwersch","year":"2016","unstructured":"Vanwersch, R.J., et al.: A critical evaluation and framework of business process improvement methods. Bus. Inf. Syst. Eng. 58(1), 43\u201353 (2016)","journal-title":"Bus. Inf. Syst. Eng."},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Boudreau, P., Vieru, D., Paquette, G., Heon, M.: The workarounds process as a source of knowledge creation and management. In: Hawaii International Conference on System Sciences (HICSS), pp. 4292\u20134301. IEEE (2016)","DOI":"10.1109\/HICSS.2016.532"},{"key":"22_CR5","unstructured":"R\u00f6der, N., Wiesche, M., Schermann, M., Krcmar, H.: Workaround aware business process modeling. In: Wirtschaftsinformatik, pp. 482\u2013496 (2015)"},{"key":"22_CR6","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/978-3-319-19237-6_31","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"S Alter","year":"2015","unstructured":"Alter, S.: A workaround design system for anticipating, designing, and\/or preventing workarounds. In: Gaaloul, K., Schmidt, R., Nurcan, S., Guerreiro, S., Ma, Q. (eds.) CAISE 2015. LNBIP, vol. 214, pp. 489\u2013498. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19237-6_31"},{"key":"22_CR7","unstructured":"Van de Weerd, I., Vollers, P., Beerepoot, I., Fantinato, M.: Workarounds in retail work systems: prevent, redesign, adopt or ignore?. ECIS 2019 (2019)\u200f"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Friedman, A., et al.: A typology of electronic health record workarounds in small-to-medium size primary care practices. J. Am. Med. Inform. Asso. (21) e78\u2013e83 (2014)","DOI":"10.1136\/amiajnl-2013-001686"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Ferneley, E.H., Sobreperez, P.: Resist, comply or workaround? an examination of different facets of user engagement with information systems. Eu. J. Inform. Syst. 15(4), 345\u2013356 (2006)","DOI":"10.1057\/palgrave.ejis.3000629"},{"key":"22_CR10","unstructured":"R\u00f6der, N., Wiesche, M., Schermann, M., Krcmar, H.: Why managers tolerate workarounds\u2013the role of information systems (2014)"},{"key":"22_CR11","unstructured":"Koppel, R., Smith, S., Blythe, J., Kothari, V.: Workarounds to computer access in healthcare organizations: you want my password or a dead patient?. In: Driving Quality in Informatics: Fulfilling the Promise, pp. 215\u2013220. IOS Press (2015)"},{"key":"22_CR12","unstructured":"Weinzierl, S., Wolf, V., Pauli, T., Beverungen, D., Matzner, M.: Detecting workarounds in business processes-a deep learning method for analyzing event logs. In: Proceedings of the 28th European Conference on Information Systems (ECIS) (2020)\u200f"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Beerepoot, I., Lu, X., Van De Weerd, I., Alexander Reijers, H.: Seeing the Signs of Workarounds: A Mixed-Methods Approach to the Detection of Nurses\u2019 Process Deviations (2021)\u200f","DOI":"10.24251\/HICSS.2021.456"},{"key":"22_CR14","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/978-3-030-37453-2_28","volume-title":"Business Process Management Workshops","author":"I Beerepoot","year":"2019","unstructured":"Beerepoot, I., van de Weerd, I., Reijers, H.A.: The potential of workarounds for improving processes. In: Di Francescomarino, C., Dijkman, R., Zdun, U. (eds.) BPM 2019. LNBIP, vol. 362, pp. 338\u2013350. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-37453-2_28"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Soffer, P., Outmazgin, N., Hadar, I., Tzafrir, S.: Why work around the process? Analyzing workarounds through the lens of the theory of planned behavior. Bus. Inform. Syst. Eng. (2023)","DOI":"10.1007\/s12599-023-00802-1"},{"key":"22_CR16","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1080\/08870446.2011.613995","volume":"26","author":"I Ajzen","year":"2011","unstructured":"Ajzen, I.: The theory of planned behavior: Reactions and reflections. Psychol. Health 26, 1113\u20131127 (2011)","journal-title":"Psychol. Health"},{"issue":"1","key":"22_CR17","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1080\/2573234X.2021.1978337","volume":"5","author":"S Weinzierl","year":"2022","unstructured":"Weinzierl, S., Wolf, V., Pauli, T., Beverungen, D., Matzner, M.: Detecting temporal workarounds in business processes\u2013a deep-learning-based method for analyzing event log data. J. Bus. Anal. 5(1), 76\u2013100 (2022)","journal-title":"J. Bus. Anal."},{"issue":"2","key":"22_CR18","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s10270-014-0420-6","volume":"15","author":"N Outmazgin","year":"2014","unstructured":"Outmazgin, N., Soffer, P.: A process mining-based analysis of business process work-arounds. Softw. Syst. Model. 15(2), 309\u2013323 (2014). https:\/\/doi.org\/10.1007\/s10270-014-0420-6","journal-title":"Softw. Syst. Model."},{"key":"22_CR19","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-031-16103-2_9","volume-title":"Business Process Management: 20th International Conference, BPM 2022, M\u00fcnster, Germany, September 11\u201316, 2022, Proceedings","author":"Wouter van der Waal","year":"2022","unstructured":"van der Waal, Wouter, Beerepoot, Iris, van de Weerd, Inge, Reijers, Hajo A.: The SWORD is mightier than the\u00a0interview: a framework for\u00a0semi-automatic WORkaround detection. In: Di Ciccio, C., Dijkman, R., del R\u00edo, A., Ortega, S.R.-M. (eds.) Business Process Management: 20th International Conference, BPM 2022, M\u00fcnster, Germany, September 11\u201316, 2022, Proceedings, pp. 91\u2013106. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-16103-2_9"},{"issue":"4","key":"22_CR20","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s00607-015-0441-1","volume":"98","author":"F Mannhardt","year":"2015","unstructured":"Mannhardt, F., de Leoni, M., Reijers, H.A., van der Aalst, W.M.P.: Balanced multi-perspective checking of process conformance. Computing 98(4), 407\u2013437 (2015). https:\/\/doi.org\/10.1007\/s00607-015-0441-1","journal-title":"Computing"},{"key":"22_CR21","doi-asserted-by":"publisher","unstructured":"Beerepoot, I., Lu, X., van de Weerd, I., Reijers, H.A.: Seeing the signs of workarounds: a mixed-methods approach to the detection of nurses\u2019 process deviations. In: Proceedings of the Annual Hawaii International Conference on System Sciences (HICSS), pp. 3763\u20133772 (2021). https:\/\/doi.org\/10.24251\/hicss.2021.456","DOI":"10.24251\/hicss.2021.456"},{"key":"22_CR22","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-319-19069-3_19","volume-title":"Advanced Information Systems Engineering: 27th International Conference, CAiSE 2015, Stockholm, Sweden, June 8-12, 2015, Proceedings","author":"ML van Eck","year":"2015","unstructured":"van Eck, M.L., Xixi, L., Leemans, S.J.J., van der Aalst, W.M.P.: PM: a process mining project methodology. In: Zdravkovic, J., Kirikova, M., Johannesson, P. (eds.) Advanced Information Systems Engineering: 27th International Conference, CAiSE 2015, Stockholm, Sweden, June 8-12, 2015, Proceedings, pp. 297\u2013313. Springer International Publishing, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19069-3_19"},{"key":"22_CR23","unstructured":"Miles, M.B., Huberman, A.M., Salda\u00f1a, J.: Qualitative Data Analysis: A Methods Sourcebook. 3rd edn. Sage Publications (2014)"},{"key":"22_CR24","doi-asserted-by":"publisher","unstructured":"Outmazgin, N., Soffer, P., Hadar, I.: Workarounds in business processes: a goal-based analysis. In: Dustdar, S., Eric, Yu., Salinesi, C., Rieu, D., Pant, V. (eds.) CAiSE 2020. LNCS, vol. 12127, pp. 368\u2013383. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49435-3_23","DOI":"10.1007\/978-3-030-49435-3_23"},{"key":"22_CR25","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/978-3-030-26619-6_26","volume-title":"Business Process Management: 17th International Conference, BPM 2019, Vienna, Austria, September 1\u20136, 2019, Proceedings","author":"I Beerepoot","year":"2019","unstructured":"Beerepoot, I., van de Weerd, I., Reijers, H.A.: Business process improvement activities: differences in organizational size, culture, and resources. In: Hildebrandt, T., van Dongen, B.F., R\u00f6glinger, M., Mendling, J. (eds.) Business Process Management: 17th International Conference, BPM 2019, Vienna, Austria, September 1\u20136, 2019, Proceedings, pp. 402\u2013418. Springer International Publishing, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26619-6_26"},{"key":"22_CR26","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-030-79186-5_4","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"Y Dubinsky","year":"2021","unstructured":"Dubinsky, Y., Soffer, P.: Detecting the \u201cSplit-Cases\u201d workaround in event logs. In: Augusto, A., Gill, A., Nurcan, S., Reinhartz-Berger, I., Schmidt, R., Zdravkovic, J. (eds.) BPMDS\/EMMSAD -2021. LNBIP, vol. 421, pp. 47\u201361. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-79186-5_4"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Forum"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-41623-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T11:38:22Z","timestamp":1710329902000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-41623-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031416224","9783031416231"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-41623-1_22","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Process Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Utrecht","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bpm2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bpm2023.sites.uu.nl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"151","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"In addition, for the BPM Forum 23 papers were accepted. 18 papers of 42 submissions were accepted for the Blockchain- Educators- and RPA Forum.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}