Workaround Mining Lab
Workarounds occur when users start shaping a technology to their own needs, particularly by intentionally using an information system in ways it was not designed or by executing bypasses to complete work. The use of workarounds is widespread in many organisations. We are interested in investigating these workarounds, since they contain valuable information on how processes and information systems could be improved.
In our workaround mining lab, we investigate the emergence, evolution, and diffusion of workarounds in organisations. We do this with different research methods, such as interviews, observations, and process mining, in which we use algorithms that identify trends and patterns contained in event logs recorded by information systems.
This research is funded by the NWO Open Technology Project "WorkAround Mining (WAM!): Mining the emergence, evolution, and diffusion of workarounds in health information systems" (18490).
- Email: email@example.comAssociate Professor
- Email: firstname.lastname@example.orgLecturerResearcher
- Email: email@example.comPhD Candidate
van der Waal, W., van de Weerd, I., Beerepoot, I., and Reijers, H. A. (2022). The SWORD is Mightier than the Interview: A Framework for Semi-automatic WORkaround Detection. Accepted for publication in Proceedings of the 20th International Conference on Business Process Management (BPM 2022).
Beerepoot, I., Lu X., van de Weerd, I. &; Reijers, H.A. (2021). Seeing the Signs of Workarounds: A mixed-methods approach to the detection of nurses’ process deviations. Proceedings of the 54th Annual Hawaii International Conference on System Sciences (HICSS 2021), 3763. Download
van Andel, V., Beerepoot, I., Lu, X., van de Weerd, I., & Reijers, H. A. (2021). DEUCE: A methodology for detecting unauthorized access of electronic health records using process mining. In Proceedings of the 29th European Conference on Information Systems (ECIS 2021), Marrakech, Morocco. Download
Beerepoot, I., Koorn, J., van de Weerd, I., van den Hooff, B., Leopold, H. & Reijers, H.A. (2019). Working around health information systems: the role of power. In Proceedings of the 40th International Conference on Information Systems (ICIS 2019), Munich, Germany. Download
van de Weerd, I., Vollers, P., Beerepoot, I. & Fantinato, M. (2019). Workaround in retail work systems: prevent, redesign, adopt or ignore? In Proceedings of the 27th European Conference on Information Systems (ECIS 2019), Stockholm & Uppsala, Sweden. Download
Beerepoot, I., Ouali, A., van de Weer, I. & Reijers, H. A. (2019). Working Around Health Information Systems: To Accept Or Not To Accept? In Proceedings of the 27th European Conference on Information Systems (ECIS), Stockholm & Uppsala, Sweden. Download
Beerepoot, I. & van de Weerd, I. (2018). Prevent, redesign, adopt or ignore: Improving healthcare using knowledge of workarounds. In Proceedings of the European Conference on Information Systems, Portsmouth, UK. Download