Please use this identifier to cite or link to this item: http://hdl.handle.net/1942/36203
Title: Workaround mining in health information systems
Authors: van der Waal, Wouter
van de Weerd, Inge
Beerepoot, Iris
MARTIN, Niels 
Reijers, Hajo A.
Issue Date: 2021
Source: International Workshop on Process-Oriented Data Science for Healthcare, Eindhoven, 01/11/2021-04/11/2021
Abstract: Introduction Workarounds are process variants that differ from set procedures, usually when a user perceives a block on the designed path [2]. For example, when a patient needs medication, a physician may have to prescribe it. If this has not happened in time, a nurse might solve the problem by prescribing onetime medication instead. Knowledge about workarounds can be useful to prevent dangerous situations or optimize difficult procedures. Finding workarounds is easier said than done, however. Most workarounds have been discovered through interviews with experts. While this has resulted in valuable information, it takes a lot of time. More important, there may be workarounds that experts were unaware of or were not willing to share [9]. We propose an objective method to detect workarounds using existing event logs from health information systems. The authors from [9] use a deep learning method to detect workarounds from an event log. However, the explainability of neural networks is generally low [8]. In [7], it is shown that we can detect workarounds using a rule-based system. For example, we can detect a certain workaround by defining a set of authorized users for an activity and searching the log for any deviations of the rule. While this method will find specified patterns, most rules cannot be generalized to detect new workarounds. Approach To detect workarounds, we use data on process instances. Depending on the workaround type, we look at different process perspectives [1]. For example, the time spent on a process can be used to discover Time-workarounds. Starting from this data, we can approach this as a classification problem. This means we can use classical machine learning methods, such as Naive Bayes [5] or Support Vector Machines [6]. These methods are especially powerful if the possible classes (workaround and normative) are dissimilar. For example, they would perform well if workarounds take longer to complete than normative process instances. As an alternative, we will look at clustering algorithms, such as k-means [4] and DBSCAN [3]. These algorithms work very well if occurrences of the same class are very similar to each other. So if, for example, the normative process instances would all take about the same time, clustering algorithms would group them together. While results from this approach are more difficult to interpret, it does have the advantage that is does not require more expert input beforehand. Expected Contributions This research will provide a novel approach for datadriven workaround discovery. We will determine which process instance dimensions are interesting for distinguishing between normative process variants and workarounds. Most likely, this will differ between different types of workarounds. In addition, we can find new workarounds. It would be valuable to know why these workarounds were not discovered through interviews. Otherwise, they are still interesting for the hospital in the traditional sense. In conclusion, we propose a more objective approach for workaround discovery. Aside from being less labour-intensive, it would give a more complete view of the workarounds that exist, allowing hospitals to address the problematic ones or adjust the procedures.
Keywords: Health Information Systems;Workarounds;Machine Learning
Document URI: http://hdl.handle.net/1942/36203
Link to publication/dataset: https://pods4h.com/wp-content/uploads/2021/10/ICPM2021_PODS4H_paper_ext_abst_222.pdf
Category: C2
Type: Conference Material
Appears in Collections:Research publications

Files in This Item:
File Description SizeFormat 
PODS4H abstract - final.pdfConference material138.17 kBAdobe PDFView/Open
Show full item record

Page view(s)

30
checked on Sep 7, 2022

Download(s)

2
checked on Sep 7, 2022

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.