3,041
Views
7
CrossRef citations to date
0
Altmetric
Research Articles

Detecting temporal workarounds in business processes – A deep-learning-based method for analysing event log data

ORCID Icon, ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon
Pages 76-100 | Received 24 Nov 2020, Accepted 02 Sep 2021, Published online: 07 Dec 2021

References

  • Abadi, M., Barham, P., Chen, J., Chen, Z., Davis, A., & Dean, J., … others. (2016). Tensorflow: A system for large-scale machine learning. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI2016) (pp. 265–283).
  • Al-Jebrni, A., Cai, H., & Jiang, L. (2018). Predicting the next process event using convolutional neural networks. In Proceedings of the International Conference on Progress in Informatics and Computing (PIC2018) (pp. 332–338).
  • Alter, S. (2014). Theory of workarounds. Communications of the Association for Information Systems, 34(55), 1041–1066. https://doi.org/10.17705/1CAIS.03455
  • Alter, S. (2015). A workaround design system for anticipating, designing, and/or preventing workarounds. In Proceedings of the 16th International Conference on Enterprise, Business- Process and Information Systems Modeling (BPMDS2015) (pp. 489–498). Springer.
  • Azad, B., & King, N. (2012). Institutionalized computer workaround practices in a mediterranean country: An examination of two organizations. European Journal of Information Systems, 21(4), 358–372. https://doi.org/10.1057/ejis.2011.48
  • Beerepoot, I., Lu, X., Van De Weerd, I., & Alexander Reijers, H. (2021). Seeing the signs of workarounds: A mixed-methods approach to the detection of nurses process deviations. In Proceedings of the 54th Hawaii International Conference on System Sciences (HICSS2021) (pp. 3763–3772).
  • Beerepoot, I., & van de Weerd, I. (2018). Prevent, redesign, adopt or ignore: improving healthcare using knowledge of workarounds. In Proccedings of the 26th European Conference on Information Systems (ECIS2018) (pp. 1–15).
  • Beerepoot, I., van de Weerd, I., & Reijers, H. A. (2018). Detecting workarounds using domain knowledge-driven process mining. In Proceedings of the 39th International Conference on Information Systems (ICIS2018) (p. 1).
  • Beerepoot, I., van de Weerd, I., & Reijers, H. A. (2019). Business process improvement activities: Differences in organizational size, culture, and resources. In Proceedings of the 17th International Conference on Business Process Management (BPM2019) (pp. 402–418).
  • Bergstra, J. S., Bardenet, R., Bengio, Y., & Kégl, B. (2011). Algorithms for hyper-parameter optimization. In Proceedings of the 24th International Conference on Neural Information Processing Systems (NIPS2011) (pp. 2546–2554).
  • Beverungen, D. (2014). Exploring the interplay of the design and emergence of business processes as organizational routines. Business & Information Systems Engineering, 6(4), 191–202. https://doi.org/10.1007/s12599-014-0335-3
  • Beverungen, D., Buijs, J. C., Becker, J., Di Ciccio, C., van der Aalst, W. M., Bartelheimer, C., & others. (2021). Seven paradoxes of business process management in a hyper-connected world. Business & Information Systems Engineering, 63(2), 145–156. https://doi.org/10.1007/s12599-020-00646-z
  • Bezerra, F., & Wainer, J. (2013). Algorithms for anomaly detection of traces in logs of process aware information systems. Information Systems, 38(1), 33–44. https://doi.org/10.1016/j.is.2012.04.004
  • Bezerra, F., Wainer, J., & van der Aalst, W. M. (2009). Anomaly detection using process mining. In Enterprise, Business-Process and Information Systems Modeling (EMMSAD2018) (pp. 149–161). Springer.
  • Bishop, C. M. (2006). Pattern recognition and machine learning. Springer.
  • Böhmer, K., & Rinderle-Ma, S. (2016). Multi-perspective anomaly detection in business process execution events. In OTM Confederated International Conferences” On the Move to Meaningful Internet Systems” (OTM2016) (pp. 80–98).
  • Borghesi, A., Bartolini, A., Lombardi, M., Milano, M., & Benini, L. (2019). Anomaly detection using autoencoders in high performance computing systems. In Proceedings of the 33rd Conference of the Association for the Advancement of Artificial Intelligence (AAAI2019) (pp. 9428–9433).
  • Boudreau, M.-C., & Robey, D. (2005). Enacting integrated information technology: A human agency perspective. Organization Science, 16(1), 3–18. https://doi.org/10.1287/orsc.1040.0103
  • Breuker, D., & Matzner, M. (2013). Statistical sequence analysis for business process mining and organizational routines. In Proceedings of the 21st European Conference on Information Systems (ECIS2013) (pp. 1–12).
  • Breuker, D., & Matzner, M. (2014). Performances of business processes and organizational routines: Similar research problems, different research methods-a literature review. In Proceedings of the 22nd European Conference on Information Systems (ECIS2014) (pp. 1–13).
  • Breuker, D., Matzner, M., Delfmann, P., & Becker, J. (2016). Comprehensible predictive models for business processes. MIS Quarterly, 40(4), 1009–1034. https://doi.org/10.25300/MISQ/2016/40.4.10
  • Buda, M., Maki, A., & Mazurowski, M. A. (2018). A systematic study of the class imbalance problem in convolutional neural networks. Neural Networks, 106, 249–259. https://doi.org/10.1016/j.neunet.2018.07.011
  • Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys, 41(3), 1–58. https://doi.org/10.1145/1541880.1541882
  • Cuzzocrea, A., Folino, F., Guarascio, M., & Pontieri, L. (2016). A multi-view multi-dimensional ensemble learning approach to mining business process deviances. In Proceedings of the International Joint Conference on Neural Networks (IJCNN) (pp. 3809–3816).
  • Da Cunha, J. V., & Carugati, A. (2009). Information technology and the first-line manager’s dilemma: Lessons from an ethnographic study. In Proceeding of the 17th European Conference on Information Systems (ECIS2009) (pp. 2834–2845).
  • DeSanctis, G., & Poole, M. S. (1994). Capturing the complexity in advanced technology use: Adaptive Structuration theory. Organization Science, 5(2), 121–147. https://doi.org/10.1287/orsc.5.2.121
  • Dunzer, S., Stierle, M., Matzner, M., & Baier, S. (2019). Conformance checking: A state-of-the-art literature review. In Proceedings of the 11th International Conference on Subject-Oriented Business Process Management (S-BPM2019) (pp. 1–10).
  • Ejnefjäll, T., & Ågerfalk, P. J. (2019). Conceptualizing workarounds: Meanings and manifestations in information systems research. Communications of the Association for Information Systems, 45(1), 341–363.
  • Folino, F., Folino, G., Guarascio, M., & Pontieri, L. (2020). A multi-view ensemble of deep models for the detection of deviant process instances. In Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases (ECML PKDD) (pp. 249–262).
  • Gasser, L. (1986). The integration of computing and routine work. ACM Transactions on Information Systems, 4(3), 205–225. https://doi.org/10.1145/214427.214429
  • Ghionna, L., Greco, G., Guzzo, A., & Pontieri, L. (2008). Outlier detection techniques for process mining applications. In Proceedings of the 17th International Symposium on Methodologies for Intelligent Systems (ISMIS2008) (pp. 150–159).
  • Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. MIT Press.
  • Gregor, S., & Hevner, A. (2013). Positioning and presenting design science research for maximum impact. MIS Quarterly, 37(2), 337–355. https://doi.org/10.25300/MISQ/2013/37.2.01
  • Grisold, T., Wurm, B., Mendling, J., & Vom Brocke, J. (2020). Using process mining to support theorizing about change in organizations. In Proceedings of the 53rd Hawaii International Conference on System Sciences (HICSS2020).
  • Guo, S., Jin, Z., Chen, Q., Gotz, D., Zha, H., & Cao, N. (2019). Visual anomaly detection in event sequence data. In IEEE International Conference on Big Data (BigData2019) (pp. 1125–1130).
  • Han, J., Pei, J., & Kamber, M. (2011). Data mining: Concepts and techniques (3rd ed.). Elsevier.
  • Haykin, S. S. (1998). Neural networks: A Comprehensive foundation (2nd ed.). Pearson Prentice Hall.
  • Hevner, A., March, S. T., Park, J., & Ram, S. (2004). Design science research in information systems. MIS Quarterly, 28(1), 75–105. https://doi.org/10.2307/25148625
  • Hinton, G. E., & Salakhutdinov, R. R. (2006). Reducing the dimensionality of data with neural networks. Science, 313(5786), 504–507. https://doi.org/10.1126/science.1127647
  • Hochreiter, S., & Schmidhuber, J. (1997). Long short-term memory. Neural Computation, 9(8), 1735–1780. https://doi.org/10.1162/neco.1997.9.8.1735
  • Ignatiadis, I., & Nandhakumar, J. (2009). The effect of ERP system workarounds on organizational control: An interpretivist case study. Scandinavian Journal of Information Systems, 21(2), 59–90. https://aisel.aisnet.org/sjis/vol21/iss2/3
  • Keskar, N. S., Mudigere, D., Nocedal, J., Smelyanskiy, M., & Tang, P. T. P. (2017). On large- batch training for deep learning: generalization gap and sharp minima. In Proceedings of the 5th International Conference on Learning Representations (ICLR2017) (pp. 1–16). openreview.net.
  • Koopman, P., & Hoffman, R. R. (2003). Work-arounds, make-work, and kludges. IEEE Intelligent Systems, 18(6), 70–75. https://doi.org/10.1109/MIS.2003.1249172
  • Lapointe, L., & Rivard, S. (2005). A multilevel model of resistance to information technology implementation. MIS Quarterly, 29(3), 461–491. https://doi.org/10.2307/25148692
  • Laumer, S., Maier, C., & Weitzel, T. (2017). Information quality, user satisfaction, and the manifestation of workarounds: A qualitative and quantitative study of enterprise content management system users. European Journal of Information Systems, 26(4), 333–360. https://doi.org/10.1057/s41303-016-0029-7
  • LeCun, Y. (1989). Generalization and network design strategies. In Connectionism in perspective. pp. 1-9. Elsevier: Citeseer.
  • LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436–444. https://doi.org/10.1038/nature14539
  • Leonardi, P. M. (2011). When flexible routines meet flexible technologies: Affordance, constraint, and the imbrication of human and material agencies. MIS Quarterly, 35(1), 147–167. https://doi.org/10.2307/23043493
  • Lu, X., Fahland, D., van Den Biggelaar, F. J., & van der Aalst, W. M. (2016). Detecting deviating behaviors without models. In Proceedings of the Business Process Management Workshops 2015 (BPMWS2015) (pp. 126–139). Springer.
  • Malaurent, J., & Karanasios, S. (2020). Learning from workaround practices: The challenge of enterprise system implementations in multinational corporations. Information Systems Journal, 30(4), 639–663. https://doi.org/10.1111/isj.12272
  • Nolle, T., Luettgen, S., Seeliger, A., & Mühlhäuser, M. (2018). Analyzing business process anomalies using autoencoders. Machine Learning, 107(11), 1875–1893. https://doi.org/10.1007/s10994-018-5702-8
  • Nolle, T., Luettgen, S., Seeliger, A., & Mühlhäuser, M. (2019). BINet: Multi-perspective business process anomaly classification. Information Systems, 103:101772.
  • Outmazgin, N. (2012). Exploring workaround situations in business processes. In Proceedings of the Business Process Management Workshops 2012 (BPM2012) (pp. 426–437). Springer.
  • Outmazgin, N., & Soffer, P. (2013). Business process workarounds: What can and cannot be detected by process mining. In Proceedings of the 14th International Conference on Enterprise, Business-Process and Information Systems Modeling (BPMDS2013) (pp. 48–62). Springer.
  • Outmazgin, N., & Soffer, P. (2016). A process mining-based analysis of business process workarounds. Software & Systems Modeling, 15(2), 309–323. https://doi.org/10.1007/s10270-014-0420-6
  • Pauwels, S., & Calders, T. (2019). Detecting anomalies in hybrid business process logs. ACM SIGAPP Applied Computing Review, 19(2), 18–30. https://doi.org/10.1145/3357385.3357387
  • Pentland, B. T., Liu, P., Kremser, W., & Hærem, T. (2020). The dynamics of drift in digitized processes. MIS Quarterly,(44(1), 19-48-. https://doi.org/10.25300/MISQ/2020/14458
  • Pentland, B. T., Recker, J., & Wyner, G. (2017). Rediscovering Handoffs. Academy of Management Discoveries, 3(3), 284–301. https://doi.org/10.5465/amd.2016.0018
  • Pimentel, M. A., Clifton, D. A., Clifton, L., & Tarassenko, L. (2014). A review of novelty detection. Signal Processing, 99, 215–249. https://doi.org/10.1016/j.sigpro.2013.12.026
  • Polato, M., Sperduti, A., Burattin, A., & de Leoni, M. (2014). Data-aware remaining time prediction of business process instances. In Proceeding of the International Joint Conference on Neural Networks (IJCNN2014) (pp. 816–823). IEEE.
  • Ramezani, E., Fahland, D., & van der Aalst, W. M. (2012). Where did i misbehave? Diagnostic information in compliance checking. In Proceedings of the 10th International Conference on Business Process Management (BPM2012) (pp. 262–278). Springer.
  • Röder, N., Wiesche, M., Schermann, M., & Krcmar, H. (2014). Why managers tolerate workarounds-the role of information systems. In Proceedings of the 20th American Conference on Information Systems (AMCIS2014) (pp. 1–13). AIS.
  • Röder, N., Wiesche, M., Schermann, M., & Krcmar, H. (2015a). Embracing a relational view of workarounds: An affordance perspective. In Proceedings of the 20th DIGIT Workshop (DIGIT2015). AIS.
  • Röder, N., Wiesche, M., Schermann, M., & Krcmar, H. (2015b). Workaround aware business process modeling. In Proceedings of the 12th International Conference on Wirtschaftsinformatik (WI2019) (pp. 482–496). AIS.
  • Röder, N., Wiesche, M., Schermann, M., & Krcmar, H. (2016). Toward an ontology of workarounds: A literature review on existing concepts. In Proceedings of the 49th Hawaii International Conference on System Sciences (HICSS2016) (pp. 5177–5186). IEEE.
  • Safadi, H., & Faraj, S. (2010). The role of workarounds during an open source electronic medical record system implementation. In Proceedings of the 31st International Conference on Information Systems (ICIS2010) (pp. 1–10). AIS.
  • Steeman, W. (2013). BPI Challenge 2013. Ghent University. Online;accessed 2019-03-29. https://data.4tu.nl/repository/\uuid:a7ce5c55-03a7-4583-b855-98b86e1a2b07
  • Stierle, M., Weinzierl, S., Harl, M., & Matzner, M. (2021). A technique for determining relevance scores of process activities using graph-based neural networks. Decision Support Systems, 144(2021), 113511. https://doi.org/10.1016/j.dss.2021.113511
  • Tucker, A. L., Heisler, W. S., & Janisse, L. D. (2014). Designed for workarounds: A qualitative study of the causes of operational failures in hospitals. The Permanente Journal, 18(3), 33. https://doi.org/10.7812/TPP/13-141
  • van der Aalst, W. M. P. (2016). Process mining: Data science in action (2nd ed.). Springer.
  • van der Aalst, W. M. P., Adriansyah, A., De Medeiros, A. K. A., Arcieri, F., Baier, T., & Blickle, T., … others. (2011). Process mining manifesto. In Proceedings of the Business Process Mangement Workshops (BPMWS2011) (pp. 169–194). Springer.
  • van Dongen, B. F. (2012). BPI Challenge 2012. [Online;accessed 2020-10-06]. Eindhoven University of Technology. https://data.4tu.nl/repository/uuid:3926db30-f712-4394-aebc-75976070e91f
  • van Dongen, B. F. (2019). BPI Challenge 2019. [Online;accessed 2020-10-06]. Eindhoven University of Technology. https://data.4tu.nl/repository/uuid:a7ce5c55-03a7-4583-b855-98b86e1a2b07
  • van Dongen, B. F. (2020). BPI Challenge 2020. [Online;accessed 2020-10-06]. Eindhoven University of Technology. https://data.4tu.nl/collections/BPIChallenge2020/5065541
  • Verbeek, H., Buijs, J., van Dongen, B., & van der Aalst, W. (2010). XES, XESame, and ProM 6. In Proceedings of the 22nd International Conference on Advanced Information Systems Engineering Forum (CAiSEForum2010) (pp. 60–75). Springer.
  • Weinzierl, S., Revoredo, K. C., & Matzner, M. (2019). Predictive business process monitoring with context information from documents. In Proceedings of the 27th European Conference on Information Systems (ECIS2019) (pp. 1–10). AIS.
  • Weinzierl, S., Stierle, M., Zilker, S., & Matzner, M. (2020). A next click recommender system for web-based service analytics with context-aware LSTMs. In Proceedings of the 53rd Hawaii International Conference on System Sciences (HICSS2020) (pp. 1542–1551). IEEE.
  • Weinzierl, S., Wolf, V., Pauli, T., Beverungen, D., & Matzner, M. (2020). Detecting workarounds in business processes-a deep learning method for analyzing event logs. In Proceedings of the 28th European Conference on Information Systems (ECIS2020) (pp. 1–16). AIS.
  • Wolf, V., & Beverungen, D. (2019). Conceptualizing the impact of workarounds-an organizational routines’ perspective. In Proceedings of the 27th European Conference on Information Systems (ECIS2019) (pp. 1–11). AIS.
  • Zainuddin, E., & Staples, S. (2016). Developing a shared taxonomy of workaround behaviors for the information systems field. In Proceedings of the 49th Hawaii International Conference on System Sciences (HICSS2016) (pp. 5278–5287). IEEE.