{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:30:09Z","timestamp":1777894209990,"version":"3.51.4"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T00:00:00Z","timestamp":1706486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T00:00:00Z","timestamp":1706486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Bus Inf Syst Eng"],"published-print":{"date-parts":[[2025,4]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Workarounds, or deviations from standardized operating procedures, can indicate discrepancies between theory and practice in work processes. Traditionally, observations and interviews have been used to identify workarounds, but these methods can be time-consuming and may not capture all workarounds. The paper presents the Semi-automated WORkaround Detection (SWORD) framework, which leverages event log traces to help process analysts identify workarounds. The framework is evaluated in a multiple-case study of two hospital departments. The results of the study indicate that with SWORD we were able to identify 11 unique workaround types, with limited knowledge about the actual processes. The framework thus supports the discovery of workarounds while minimizing the dependence on domain knowledge, which limits the time investment required by domain experts. The findings highlight the importance of leveraging technology to improve the detection of workarounds and to support process improvement efforts in organizations.<\/jats:p>","DOI":"10.1007\/s12599-023-00846-3","type":"journal-article","created":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T08:02:53Z","timestamp":1706515373000},"page":"171-190","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Putting the SWORD to the Test: Finding Workarounds with Process Mining"],"prefix":"10.1007","volume":"67","author":[{"given":"Wouter","family":"van der Waal","sequence":"first","affiliation":[]},{"given":"Inge","family":"van de Weerd","sequence":"additional","affiliation":[]},{"given":"Iris","family":"Beerepoot","sequence":"additional","affiliation":[]},{"given":"Xixi","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Teus","family":"Kappen","sequence":"additional","affiliation":[]},{"given":"Saskia","family":"Haitjema","sequence":"additional","affiliation":[]},{"given":"Hajo A.","family":"Reijers","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,29]]},"reference":[{"key":"846_CR1","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.17705\/1CAIS.03455","volume":"34","author":"S Alter","year":"2014","unstructured":"Alter S (2014) Theory of workarounds. CAIS 34:1041\u20131066","journal-title":"CAIS"},{"issue":"3","key":"846_CR2","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1057\/ejis.2008.14","volume":"17","author":"B Azad","year":"2008","unstructured":"Azad B, King N (2008) Enacting computer workaround practices within a medication dispensing system. Eur J Inf Syst 17(3):264\u2013278","journal-title":"Eur J Inf Syst"},{"key":"846_CR3","doi-asserted-by":"crossref","unstructured":"Batista E, Solanas A (2018) Process mining in healthcare: a systematic review. In: 2018 9th international conference on information. intelligence, systems and applications (IISA), pp 1\u20136","DOI":"10.1109\/IISA.2018.8633608"},{"key":"846_CR4","unstructured":"Beerepoot I, Koorn J, van\u00a0de Weerd I, van\u00a0den Hooff B, Leopold H, Reijers HA (2019a) Working around health information systems: the role of power. In: Fortieth international conference on information systems (ICIS)"},{"key":"846_CR5","doi-asserted-by":"crossref","unstructured":"Beerepoot I, Lu X, van\u00a0de Weerd I, Reijers HA (2021) Seeing the signs of workarounds: a mixed-methods approach to the detection of nurses\u2019 process deviations. In: Proceedings of the annual Hawaii international conference on system sciences (HICSS), pp 3763\u20133772","DOI":"10.24251\/HICSS.2021.456"},{"key":"846_CR6","unstructured":"Beerepoot I, Ouali A, van\u00a0de Weerd I, Reijers HA (2019b) Working around health information systems: to accept or not to accept? In: Twenty-seventh European conference on information systems"},{"key":"846_CR7","unstructured":"Beerepoot I, van\u00a0de Weerd I (2018) Prevent, redesign, adopt or ignore: improving healthcare using knowledge of workarounds. In: Proceedings of the 26th European conference on information systems (ECIS), pp 1\u201315"},{"key":"846_CR8","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.is.2017.12.006","volume":"74","author":"A Bolt","year":"2018","unstructured":"Bolt A, de Leoni M, van der Aalst WMP (2018) Process variant comparison: using event logs to detect differences in behavior and business rules. Inf Syst 74:53\u201366","journal-title":"Inf Syst"},{"issue":"11","key":"846_CR9","doi-asserted-by":"publisher","first-page":"5340","DOI":"10.1016\/j.eswa.2014.03.010","volume":"41","author":"D Borrego","year":"2014","unstructured":"Borrego D, Barba I (2014) Conformance checking and diagnosis for declarative business process models in data-aware scenarios. Expert Syst Appl 41(11):5340\u20135352","journal-title":"Expert Syst Appl"},{"key":"846_CR10","doi-asserted-by":"crossref","unstructured":"Bose RPJC, van\u00a0der Aalst WMP (2013) Discovering signature patterns from event logs. In: IEEE symposium on computational intelligence and data mining (CIDM), pp 111\u2013118","DOI":"10.1109\/CIDM.2013.6597225"},{"key":"846_CR11","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.eswa.2016.08.040","volume":"65","author":"A Burattin","year":"2016","unstructured":"Burattin A, Maggi FM, Sperduti A (2016) Conformance checking based on multi-perspective declarative process models. Expert Syst Appl 65:194\u2013211","journal-title":"Expert Syst Appl"},{"key":"846_CR12","unstructured":"Ciccio CD, Marrella A, Russo A (2012) Knowledge-intensive processes: an overview of contemporary approaches. In: 1st international workshop on knowledge-intensive business processes (KiBP 2012) pp 33\u201347"},{"key":"846_CR13","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-642-40176-3_10","volume":"8094","author":"M de Leoni","year":"2013","unstructured":"de Leoni M, van der Aalst WMP (2013) Aligning event logs and process models for multi-perspective conformance checking: an approach based on integer linear programming. Lect Notes Comput Sci 8094:113\u2013129","journal-title":"Lect Notes Comput Sci"},{"key":"846_CR14","doi-asserted-by":"crossref","unstructured":"Di\u00a0Francescomarino C, Ghidini C, Maggi FM, Milani F (2018) Predictive process monitoring methods: which one suits me best? In: Business process management (BPM), pp 462\u2013479","DOI":"10.1007\/978-3-319-98648-7_27"},{"key":"846_CR15","doi-asserted-by":"crossref","unstructured":"Dunzer S, Stierle M, Matzner M, Baier S (2019) Conformance checking: a state-of-the-art literature review. In: Proceedings of the 11th international conference on subject-oriented business process management (S-BPM), pp 1\u201310","DOI":"10.1145\/3329007.3329014"},{"key":"846_CR16","doi-asserted-by":"crossref","unstructured":"Ejnefj\u00e4ll T, \u00c5gerfalk PJ (2019) Conceptualizing workarounds: meanings and manifestations in information systems research. CAIS 340\u2013363","DOI":"10.17705\/1CAIS.04520"},{"key":"846_CR17","unstructured":"Ester M, Kriegel HP, Sander J, Xu X (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of the 2nd international conference on knowledge discovery and data mining (KDD), pp 226\u2013231"},{"issue":"1","key":"846_CR18","doi-asserted-by":"publisher","first-page":"94","DOI":"10.2307\/3556620","volume":"48","author":"MS Feldman","year":"2003","unstructured":"Feldman MS, Pentland BT (2003) Reconceptualizing organizational routines as a source of flexibility and change. Admin Sci Q 48(1):94\u2013118","journal-title":"Admin Sci Q"},{"issue":"4","key":"846_CR19","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1177\/14761270221130876","volume":"20","author":"MS Feldman","year":"2022","unstructured":"Feldman MS, Pentland BT (2022) Routine dynamics: toward a critical conversation. Strat Organ 20(4):846\u2013859","journal-title":"Strat Organ"},{"key":"846_CR20","volume-title":"Discovering statistics using IBM SPSS","author":"A Field","year":"2017","unstructured":"Field A (2017) Discovering statistics using IBM SPSS. Sage, Thousand Oaks"},{"issue":"1","key":"846_CR21","first-page":"8","volume":"2","author":"G Hofstede","year":"2011","unstructured":"Hofstede G (2011) Dimensionalizing cultures: the Hofstede model in context. Online Read Psychol Cult 2(1):8","journal-title":"Online Read Psychol Cult"},{"issue":"1","key":"846_CR22","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1046\/j.1365-2753.2001.00280.x","volume":"7","author":"JD Holden","year":"2001","unstructured":"Holden JD (2001) Hawthorne effects and research into professional practice. J Eval Clin Pract 7(1):65\u201370","journal-title":"J Eval Clin Pract"},{"issue":"2","key":"846_CR23","first-page":"3","volume":"21","author":"I Ignatiadis","year":"2009","unstructured":"Ignatiadis I, Nandhakumar J (2009) The effect of ERP system workarounds on organizational control: an interpretivist case study. Scand J Inf Syst 21(2):3","journal-title":"Scand J Inf Syst"},{"key":"846_CR24","unstructured":"Ilie V (2013) Psychological reactance and user workarounds. a study in the context of electronic medical records implementations. In: Proceedings of the 21st European conference on information systems (ECIS), p\u00a024"},{"key":"846_CR25","doi-asserted-by":"crossref","unstructured":"Lazovik A, Aiello M, Papazoglou M (2004) Associating assertions with business processes and monitoring their execution. In: Proceedings of the 2nd international conference on service oriented computing (ICSOC), pp 94\u2013104","DOI":"10.1145\/1035167.1035182"},{"key":"846_CR26","doi-asserted-by":"crossref","unstructured":"Lo D, Cheng H, Han J, Khoo SC, Sun C (2009) Classification of software behaviors for failure detection. In: Proceedings of the 15th international conference on knowledge discovery and data mining (KDD), pp 557\u2013566","DOI":"10.1145\/1557019.1557083"},{"key":"846_CR27","doi-asserted-by":"crossref","unstructured":"Lu X, Fahland D, van\u00a0den Biggelaar FJHM, van\u00a0der Aalst WMP (2016) Detecting deviating behaviors without models. In: Business process management workshops, pp 126\u2013139","DOI":"10.1007\/978-3-319-42887-1_11"},{"key":"846_CR28","doi-asserted-by":"crossref","unstructured":"Mahbub K, Spanoudakis G (2004) A framework for requirents monitoring of service based systems. In: Proceedings of the 2nd international conference on service oriented computing (ICSOC), pp 84\u201393","DOI":"10.1145\/1035167.1035181"},{"issue":"4","key":"846_CR29","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s00607-015-0441-1","volume":"98","author":"F Mannhardt","year":"2015","unstructured":"Mannhardt F, de Leoni M, Reijers HA, van der Aalst WMP (2015) Balanced multi-perspective checking of process conformance. Computing 98(4):407\u2013437","journal-title":"Computing"},{"key":"846_CR30","unstructured":"Nguyen H, Dumas M, La\u00a0Rosa M, Maggi FM, Suriadi S (2016) Business process deviance mining: review and evaluation. ArXiv e-prints arXiv:https:\/\/arxiv.org\/pdf\/1608.08252pdf, accessed 20 Nov 2023"},{"key":"846_CR31","doi-asserted-by":"crossref","unstructured":"Osuna E, Freund R, Girosi F (1997) An improved training algorithm for support vector machines. In: Neural networks for signal processing VII. proceedings of the 1997 IEEE signal processing society workshop, pp 276\u2013285","DOI":"10.1109\/NNSP.1997.622408"},{"issue":"2","key":"846_CR32","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s10270-014-0420-6","volume":"15","author":"N Outmazgin","year":"2014","unstructured":"Outmazgin N, Soffer P (2014) A process mining-based analysis of business process work-arounds. Softw Syst Model 15(2):309\u2013323","journal-title":"Softw Syst Model"},{"key":"846_CR33","doi-asserted-by":"crossref","unstructured":"Ras G, van Gerven M, Haselager P (2018) Explanation methods in deep learning: users, values, concerns and challenges. In: Explainable and interpretable models in computer vision and machine learning, pp 19\u201336","DOI":"10.1007\/978-3-319-98131-4_2"},{"issue":"2","key":"846_CR34","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.is.2011.01.003","volume":"37","author":"\u00c1 Rebuge","year":"2012","unstructured":"Rebuge \u00c1, Ferreira DR (2012) Business process analysis in healthcare environments: a methodology based on process mining. Inf Syst 37(2):99\u2013116","journal-title":"Inf Syst"},{"key":"846_CR35","unstructured":"R\u00f6der N, Wiesche M, Schermann M (2014) A situational perspective on workarounds in IT-enabled business processes: a multiple case study. In: Proceedings of the 22nd European conference on information systems (ECIS), pp 1\u201315"},{"issue":"1","key":"846_CR36","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A Rozinat","year":"2008","unstructured":"Rozinat A, van der Aalst WMP (2008) Conformance checking of processes based on monitoring real behavior. Inf Syst 33(1):64\u201395","journal-title":"Inf Syst"},{"key":"846_CR37","unstructured":"Safadi H, Faraj S (2010) The role of workarounds during an opensource electronic medical record system implementation. In: Thirty first international conference on information systems ICIS"},{"key":"846_CR38","unstructured":"Swennen M, Martin N, Janssenswillen G, Jans M, Depaire B, Caris A, Vanhoof K (2016) Capturing resource behaviour from event logs. In: Proceedings of the 6th international symposium on data-driven process discovery and analysis (SIMPDA), pp 130\u2013134"},{"issue":"106","key":"846_CR39","first-page":"557","volume":"211","author":"F Taymouri","year":"2021","unstructured":"Taymouri F, La Rosa M, Dumas M, Maggi FM (2021) Business process variant analysis: survey and classification. Knowl Based Syst 211(106):557","journal-title":"Knowl Based Syst"},{"issue":"4","key":"846_CR40","doi-asserted-by":"publisher","first-page":"1124","DOI":"10.1287\/mnsc.2015.2170","volume":"62","author":"AL Tucker","year":"2016","unstructured":"Tucker AL (2016) The impact of workaround difficulty on frontline employees\u2019 response to operational failures: a laboratory experiment on medication administration. Manag Sci 62(4):1124\u20131144","journal-title":"Manag Sci"},{"issue":"2","key":"846_CR41","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/S0169-023X(03)00066-1","volume":"47","author":"WMP van der Aalst","year":"2003","unstructured":"van der Aalst WMP, van Dongen BF, Herbst J, Maruster L, Schimm G, Weijters AJMM (2003) Workflow mining: a survey of issues and approaches. Data Knowl Eng 47(2):237\u2013267","journal-title":"Data Knowl Eng"},{"key":"846_CR42","unstructured":"van\u00a0de Weerd I, Vollers P, Beerepoot I, Fantinato M (2019) Workarounds in retail work systems: prevent, redesign, adopt or ignore? In: Proceedings of the 27th European conference on information systems (ECIS), pp 1\u201315"},{"key":"846_CR43","doi-asserted-by":"crossref","unstructured":"van\u00a0der Waal W, Beerepoot I, van\u00a0de Weerd I, Reijers HA (2022) The SWORD is mightier than the interview: a framework for semi-automatic workaround detection. In: Business process management (BPM), pp 91\u2013106","DOI":"10.1007\/978-3-031-16103-2_9"},{"issue":"1","key":"846_CR44","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1197\/jamia.M2378","volume":"15","author":"AA Vogelsmeier","year":"2008","unstructured":"Vogelsmeier AA, Halbesleben JRB, Scott-Cawiezell JR (2008) Technology implementation and workarounds in the nursing home. J Am Med Inform Assoc 15(1):114\u2013119","journal-title":"J Am Med Inform Assoc"},{"issue":"1","key":"846_CR45","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1080\/2573234X.2021.1978337","volume":"5","author":"S Weinzierl","year":"2022","unstructured":"Weinzierl S, Wolf V, Pauli T, Beverungen D, Matzner M (2022) Detecting temporal workarounds in business processes\u2013a deep-learning-based method for analysing event log data. J Bus Anal 5(1):76\u2013100","journal-title":"J Bus Anal"},{"key":"846_CR46","doi-asserted-by":"crossref","unstructured":"Weinzierl S, Wolf V, Pauli T, Beverungen D, Matzner M (2020) Detecting workarounds in business processes-a deep learning method for analyzing event logs. In: Proceedings of the 28th European conference on information systems (ECIS), pp 1\u201316","DOI":"10.1080\/2573234X.2021.1978337"},{"key":"846_CR47","doi-asserted-by":"crossref","unstructured":"Wolf V, Beverungen D (2019) Conceptualizing the impact of workarounds: an organizational routines perspective. In: Proceedings of the 27th European conference on information systems (ECIS), pp 1\u201311","DOI":"10.24251\/HICSS.2019.724"},{"key":"846_CR48","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.dss.2017.04.004","volume":"100","author":"MT Wynn","year":"2017","unstructured":"Wynn MT, Poppe E, Xu J, ter Hofstede AHM, Brown R, Pini A, van der Aalst WMP (2017) ProcessProfiler3D: a visualisation framework for log-based process performance comparison. Decis Support Syst 100:93\u2013108","journal-title":"Decis Support Syst"},{"key":"846_CR49","volume-title":"Case study research: design and methods,","author":"RK Yin","year":"2009","unstructured":"Yin RK (2009) Case study research: design and methods, vol 5, 4th edn. Sage, Thousand Oaks","edition":"4"}],"container-title":["Business &amp; Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-023-00846-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12599-023-00846-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-023-00846-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T09:01:04Z","timestamp":1741856464000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12599-023-00846-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,29]]},"references-count":49,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["846"],"URL":"https:\/\/doi.org\/10.1007\/s12599-023-00846-3","relation":{},"ISSN":["2363-7005","1867-0202"],"issn-type":[{"value":"2363-7005","type":"print"},{"value":"1867-0202","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,29]]},"assertion":[{"value":"21 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}