Putting the SWORD to the Test: Finding Workarounds with Process Mining

Wouter van der Waal*, Inge van de Weerd, Iris Beerepoot, Xixi Lu, Teus Kappen, Saskia Haitjema, Hajo Reijers

*Corresponding author for this work

Research output: Contribution to journalArticleAcademicpeer-review

Abstract

Workarounds, or deviations from standardized operating procedures, can indicate discrepancies between theory and practice in work processes. Traditionally, observations and interviews have been used to identify workarounds, but these methods can be time-consuming and may not capture all workarounds. The paper presents the Semi-automated WORkaround Detection (SWORD) framework, which leverages event log traces to help process analysts identify workarounds. The framework is evaluated in a multiple-case study of two hospital departments. The results of the study indicate that with SWORD we were able to identify 11 unique workaround types, with limited knowledge about the actual processes. The framework thus supports the discovery of workarounds while minimizing the dependence on domain knowledge, which limits the time investment required by domain experts. The findings highlight the importance of leveraging technology to improve the detection of workarounds and to support process improvement efforts in organizations.
Original languageEnglish
Pages (from-to)171–190
Number of pages20
JournalBusiness Informatics Systems Engineering
Volume67
Issue number2
Early online date29 Jan 2024
DOIs
Publication statusPublished - 2025

Bibliographical note

Publisher Copyright:
© 2024, The Author(s).

Funding

This publication is part of the WorkAround Mining (WAM!) project with project number 18490 which is partly financed by the Dutch Research Council (NWO). We would like to thank M.C.H. de Groot, PhD for his help during data extraction, as well as B. Vrijsen, MD and L.G. Exalto, MD, PhD for their time to evaluate our findings.

FundersFunder number
Nederlandse Organisatie voor Wetenschappelijk Onderzoek

    Keywords

    • Event data
    • Pattern detection
    • Process mining
    • Workaround

    Fingerprint

    Dive into the research topics of 'Putting the SWORD to the Test: Finding Workarounds with Process Mining'. Together they form a unique fingerprint.

    Cite this