Detecting Workarounds in Business Processes - a Deep Learning method for Analyzing Event Logs

Business processes performed in organizations often deviate from the abstract process models issued by designers. Workarounds that are carried out by process participants to increase the effectiveness or efficiency of their tasks are often viewed as negative deviations from prescribed business processes, interfering with their efficiency and quality requirements. But workarounds might also play an important role in identifying and re-structuring inefficient, dysfunctional, or obsolete processes. While ethnography or critical incident techniques can serve to identify how and why workarounds emerge, we need automated methods to detect workarounds in large data sets. We set out to design a method that implements a deeplearning-based approach for detecting workarounds in event logs. An evaluation with three public real-life event logs exhibits that the method can identify workarounds best in standardized business processes that contain fewer variations and a higher number of different activities. Our method is one of the first IT artifacts to bridge boundaries between the complementing research disciplines of organizational routines and business processes management.

[1]  S. Chatterjee,et al.  Design Science Research in Information Systems , 2010 .

[2]  Paul M. Leonardi,et al.  When Flexible Routines Meet Flexible Technologies: Affordance, Constraint, and the Imbrication of Human and Material Agencies , 2011, MIS Q..

[3]  Martin Matzner,et al.  Statistical Sequence Analysis For Business Process Mining And Organizational Routines , 2013, ECIS.

[4]  Sven Laumer,et al.  Information quality, user satisfaction, and the manifestation of workarounds: a qualitative and quantitative study of enterprise content management system users , 2017, Eur. J. Inf. Syst..

[5]  Yann LeCun,et al.  Generalization and network design strategies , 1989 .

[6]  Ricardo Seguel,et al.  Process Mining Manifesto , 2011, Business Process Management Workshops.

[7]  Helmut Krcmar,et al.  Toward an Ontology of Workarounds: A Literature Review on Existing Concepts , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).

[8]  Inge van de Weerd,et al.  Detecting Workarounds Using Domain Knowledge-driven Process Mining , 2018 .

[9]  Geoffrey E. Hinton,et al.  Reducing the Dimensionality of Data with Neural Networks , 2006, Science.

[10]  Salvatore T. March,et al.  Design and natural science research on information technology , 1995, Decis. Support Syst..

[11]  Suzanne Rivard,et al.  A Multilevel Model of Resistance to Information Technology Implementation , 2005, MIS Q..

[12]  Max Mühlhäuser,et al.  Analyzing business process anomalies using autoencoders , 2018, Machine Learning.

[13]  Les Gasser,et al.  The integration of computing and routine work , 1986, TOIS.

[14]  Flávia Maria Santoro,et al.  A formal representation for context-aware business processes , 2014, Comput. Ind..

[15]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[16]  Nelson E. King,et al.  Institutionalized computer workaround practices in a Mediterranean country: an examination of two organizations , 2012, Eur. J. Inf. Syst..

[17]  Verena Wolf,et al.  Conceptualizing the Impact of Workarounds - an Organizational Routines' Perspective , 2019, ECIS.

[18]  Inge van de Weerd,et al.  Prevent, Redesign, Adopt or Ignore: Improving Healthcare Using Knowledge of Workarounds , 2018, ECIS.

[19]  Helmut Krcmar,et al.  Workaround Aware Business Process Modeling , 2015, Wirtschaftsinformatik.

[20]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[21]  Hongming Cai,et al.  Predicting the Next Process Event Using Convolutional Neural Networks , 2018, 2018 IEEE International Conference on Progress in Informatics and Computing (PIC).

[22]  Nesi Outmazgin,et al.  Exploring Workaround Situations in Business Processes , 2012, Business Process Management Workshops.

[23]  Jörg Becker,et al.  Comprehensible Predictive Models for Business Processes , 2016, MIS Q..

[24]  Atsuto Maki,et al.  A systematic study of the class imbalance problem in convolutional neural networks , 2017, Neural Networks.

[25]  Philip Koopman,et al.  Work-arounds, Make-work, and Kludges , 2003, IEEE Intell. Syst..

[26]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.

[27]  Boudewijn F. van Dongen,et al.  XES, XESame, and ProM 6 , 2010, CAiSE Forum.

[28]  Jacques Wainer,et al.  Algorithms for anomaly detection of traces in logs of process aware information systems , 2013, Inf. Syst..

[29]  Hani Safadi,et al.  International Conference on Information Systems ( ICIS ) 1-1-2010 THE ROLE OF WORKAROUNDS DURING AN OPENSOURCE ELECTRONIC MEDICAL RECORD SYSTEM IMPLEMENTATION , 2013 .

[30]  Kate Revoredo,et al.  Predictive Business Process Monitoringwith Context Information from Documents , 2019, ECIS.

[31]  Steven L. Alter,et al.  USF Scholarship: a digital repository @ Gleeson Library | Geschke Center , 2016 .

[32]  Ilia Bider,et al.  ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING , 2009, EMMSAD 2009.

[33]  Chiara Di Francescomarino Predictive Business Process Monitoring , 2019, Encyclopedia of Big Data Technologies.

[34]  Timothy Dozat,et al.  Incorporating Nesterov Momentum into Adam , 2016 .

[35]  Inge van de Weerd,et al.  Business Process Improvement Activities: Differences in Organizational Size, Culture, and Resources , 2019, BPM.

[36]  David A. Clifton,et al.  A review of novelty detection , 2014, Signal Process..

[37]  Martin Matzner,et al.  A Next Click Recommender System for Web-based Service Analytics with Context-aware LSTMs , 2020, HICSS.

[38]  Anita L. Tucker,et al.  Designed for workarounds: a qualitative study of the causes of operational failures in hospitals. , 2014, The Permanente journal.

[39]  Marlon Dumas,et al.  Outcome-Oriented Predictive Process Monitoring: Review and Benchmark , 2017 .

[40]  Tuure Tuunanen,et al.  Design Science Research Evaluation , 2012, DESRIST.

[41]  Helmut Krcmar,et al.  Why Managers Tolerate Workarounds - The Role of Information Systems , 2014, AMCIS.

[42]  D. Sandy Staples,et al.  Developing a Shared Taxonomy of Workaround Behaviors for the Information Systems Field , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).

[43]  Hani Safadi,et al.  THE ROLE OF WORKAROUNDS DURING AN OPEN - SOURCE ELECTRONIC MEDICAL RECORD SYSTEM IMPLEMENTATION Research-in-Progress , 2010 .

[44]  Steven L. Alter A Workaround Design System for Anticipating, Designing, and/or Preventing Workarounds , 2015, BMMDS/EMMSAD.

[45]  Fabrizio Maria Maggi,et al.  Predictive Process Monitoring Methods: Which One Suits Me Best? , 2018, BPM.

[46]  Pnina Soffer,et al.  A process mining-based analysis of business process work-arounds , 2014, Software & Systems Modeling.

[47]  Ioannis Ignatiadis,et al.  The Effect of ERP System Workarounds on Organizational Control: An interpretivist case study , 2009, Scand. J. Inf. Syst..

[48]  Netta Iivari,et al.  Information technology and the first-line manager's dilemma: Lessons from an ethnographic study , 2009 .

[49]  Alan R. Hevner,et al.  POSITIONING AND PRESENTING DESIGN SCIENCE RESEARCH FOR MAXIMUM IMPACT 1 , 2013 .

[50]  Stefanie Rinderle-Ma,et al.  Multi-perspective Anomaly Detection in Business Process Execution Events , 2016, OTM Conferences.

[51]  Marie-Claude Boudreau,et al.  Enacting Integrated Information Technology: A Human Agency Perspective , 2005, Organ. Sci..

[52]  Martin Matzner,et al.  Performances of Business Processes and Organizational Routines: Similar Research Problems, Different Research Methods - a literature Review , 2014, ECIS.

[53]  S. Hyakin,et al.  Neural Networks: A Comprehensive Foundation , 1994 .

[54]  Pnina Soffer,et al.  Business Process Workarounds: What Can and Cannot Be Detected by Process Mining , 2013, BMMDS/EMMSAD.

[55]  Max Mühlhäuser,et al.  BINet: Multi-perspective Business Process Anomaly Classification , 2019, Inf. Syst..

[56]  Daniel L. Sherrell,et al.  Communications of the Association for Information Systems , 1999 .