<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Analyzing Transaction Codes with Data Requirements in Information Systems for Compliance Monitoring</article-title>
      </title-group>
      <abstract>
        <p>Companies, especially manufacturers, are operating in increasing demands of variability and customizability nowadays. They are faced with a multitude of complex rules and regulations that must be complied with, as well as supply chain disruptions that threaten business. Smart manufacturers take advantage of advanced information and manufacturing technologies to enable flexibility in physical processes. However, existing information systems are far from being sufficient and efficient for compliance monitoring in serviceoriented manufacturing. Failure to interface well with different information systems is still a general phenomenon among manufacturers, leading to more problems such as delay of goods delivery or missing inventory. One of the main difficulties in fully integrating information systems arises from the highly flexible and volatile nature of manufacturing processes, which would need highly customizable and adaptive information systems. Moreover, improper human operations with transaction codes in information systems could hamper business processes. This research analyzes transaction codes in petri net model with data requirements investigating a manufacturing case. The results should provide insights for system integration and computational auditing.</p>
      </abstract>
      <kwd-group>
        <kwd>Auditing</kwd>
        <kwd>Compliance</kwd>
        <kwd>Information systems</kwd>
        <kwd>Manufacturing</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Companies usually have complex supply chains in which some parts are purchased in
one region but assembled or manufactured in another region, and eventually shipped
and sold to other regions. Multinational companies are compelled to comply with
international trade regulations while moving goods quickly and cost effectively. This
is particularly challenging due to the lack of information systems tailored to
compliance management that integrates seamlessly with a company’s operational processes
and Enterprise Resource Planning (ERP) environments, and at the same time covers
key aspects of trade compliance and communication requirements. For instance,
international companies are experiencing problems of adopting information systems to
be compliant with customs during the process of custom clearance, due to the
complex nature of the supply chain management across the border.</p>
      <p>
        Therefore, international supply chains are facing risks concerning compliance [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ],
such as altering shipping documentations, inter-company manipulations, and fictitious
inventory. Inventory management deals with the management of materials on a
quantity and value basis, including all internal and external movement of goods in an
enterprise, and the planning, entering, and documenting of these movements. The
business processes within a company are executed using orders. To access these orders or
running programs in information systems more rapidly each function in information
systems is associated with a transaction code.
      </p>
      <p>This research aims to devise methods for the detection and mitigation of deviations
by analyzing transaction codes in information systems for manufacturers. Meanwhile,
an approach with data requirements will be designed to reduce compliance problems
in supply chains. In order to achieve these objectives, the main research question is:</p>
      <p>How can incorrect inventory in ERP and compliance management systems be
discovered by analyzing and detecting misusage of transaction codes?</p>
      <p>This main objective leads to the following research steps:</p>
      <p>Step 1: aims to discover how manufacturing and inventory management is
performed and which components are typically used to assemble a product. To this end,
we identify the main artifact used in the approach, i.e. transaction code diagram
(further explained in Section 2.1) adopted for manufacturing and process models
representing the internal organizational processes of a company.</p>
      <p>Step 2: apply conformance checking methods to event logs in information systems
to detect deviations from prescribed behaviors indicated by transaction code diagram.</p>
      <p>Step 3: define appropriate data requirements for compliance in manufacturing and
supply chains. Propose control methods to reduce misusage of transaction codes.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Case Study of ABC for Compliance Monitoring</title>
      <p>ABC (anonymized) relies on international supply chains for the manufacturing of
electronic equipment. The materials that are necessary for the production of the
machinery are purchased both inside and outside the EU. The non-EU materials are
stored in the customs warehouse, where they could undergo manufacturing operations
with customs supervision; i.e. bonded materials are in the EU but have not been
formally imported, hence are exempted from payment of import duties.</p>
      <p>ABC has adopted several information systems to support manufacturing and
inventory management: an ERP system, an interfacing system call TIBCO and a
compliance management system called T&amp;T. The logistical and financial records are
registered in an ERP system provided by SAP. The monthly declarations for Customs
cannot directly be created from SAP, due to the fact it does not maintain the customs
status of the goods. Therefore, customs relevant data are processed from SAP to T&amp;T.
Based on SAP transaction codes, T&amp;T is able to recognize the customs relevant
transaction code using a correlation table. Upon receiving goods from suppliers, T&amp;T
recognizes whether the goods are free or bonded and process them differently.</p>
      <p>According to standard ERP operations, goods movements as material flow should
be recorded in terms of movement types, i.e. 3-digit transaction codes as information
flow. A transaction code (e.g. t-code in SAP) consists of letters, numbers or both.
Each type of material movement is given a unique movement type, followed after
transaction code. The same transaction code can be used for different movement
types. For example, MIGO-261 stands for ‘Goods issue for a production order’, and
MIGO-262 means ‘reversal of 261’, i.e. cancellation of the production order.</p>
      <p>In practice, some records are input manually into information systems at working
sites, specifically when the production orders are being implemented. In this
circumstance manual mistakes could happen. ABC regularly implements stock reconciliation
procedures between information systems. However, large inventory differences
underlying SAP and T&amp;T are discovered since 2013 until 2017.
2.1</p>
      <sec id="sec-2-1">
        <title>Transaction Code Diagram</title>
        <p>To analyze transactions codes with data requirements, we derive a transaction code
diagram representing the possible sequences of transaction codes that should be
executed. Movement type is allowed per transaction code, and for each movement posted,
a material document will be created and stored in the database. The movement type is
important because it is used to control adjustment of inventories and the General
Ledger account for financial purposes etc.</p>
        <p>We represent transaction code diagrams as Petri nets. A Petri net is a tuple
(P,T,F,mi,mf) where P is a set of places, T is a set of transitions representing
transaction codes, F ⊆(P ×T)∪(T ×P) is the flow relation connecting places and transitions,
mi is the initial marking and mf is the final marking. Petri nets provide a formal
semantics that can be exploited for automated analysis.</p>
        <p>Start (p0)</p>
        <p>CO01 (t1)</p>
        <p>MIGO-261 (t2)
Production orders
(p1)</p>
        <p>Goods issued (p2)
MIGO-101</p>
        <p>(t4)
comPproocneesnsitnsg(p3)</p>
        <p>Processed components
(p4)</p>
        <p>KKAX(t3)
MIGO-321
(t5)
MIGO-262
(t8)</p>
        <p>KKS1 (t6)</p>
        <p>KO88 (t7)</p>
        <p>Inspection
completed (p5)</p>
        <p>Settled components
(p6)</p>
        <p>End (p7)
5. Transfer posting stock in quality inspection - MIGO-321
6. Variance calculation - KKS1 (or KKS2 for the whole plant)
7. Settlement - KO88 (or CO88 for the whole plant)
2.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>Conformance Checking</title>
        <p>
          Process mining is a promising means to systematically analyze data recorded by
information systems like ERP [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. It provides auditors a new and more comprehensive
way for understanding the state of the control environment than the procedures that
they rely on today. Process mining aims to extract knowledge from event logs. Event
logs can be extracted from the contemporary information systems [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. Information
systems capture activities happening in the “real world”. To perform process mining
on data, the digital traces captured in the information systems must be extracted and
transformed into event logs. We assume the existence of an event log where each
event refers to a case, an activity, and a point in time, i.e. timestamp. An event log can
be seen as a collection of cases. A case can be seen as a trace/sequence of events.
        </p>
        <p>
          Conformance checking aims at the detection of inconsistencies between a process
model and its corresponding execution log [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. Logs represent observed execution
sequences of activities from the normative process model. In the desirable case, logs
completely comply with the behavior defined by the process model and are called
valid execution sequences. In practice, observed execution sequences often deviate
from predefined behavior.
        </p>
        <p>As Fig. 1 shows, MIGO-262 is used when a production order needs partial quantity
reversal. However, in this case the fault of using MIGO-101 happens. Some
employees confuse the use of code 262 and 101, or they cannot distinguish whether these
materials are received for cancellation reversal or production order. Instead of typing
correct 262 as a reversal movement into systems to close the production order, they
use 101 to receive goods instead. This fault may cause unnecessary duty repeatedly
levied on the same goods, because 101 acts as an intermediate message may continue
another duty levy process to production again automatically.</p>
        <p>We analyzed ABC’s 88538 records of monthly declarations to customs in 2012 and
41706 signals from compliance management system. In addition, data of two
production orders in 2016 is used for conformance checking. Further analysis of the root
causes of inventory differences can be categorized as three main reasons: Deviation
from the standard operating procedure by employees as agreed in the workflow
instructions; Misusage of the movement types in ERP by which items are incorrectly
assigned in the returning stock; Constraints in the ERP system, i.e. infeasibility to
customize for every new product as well as the flexible manufacturing process.
2.3</p>
      </sec>
      <sec id="sec-2-3">
        <title>Data Requirements and Controls for Compliance Monitoring</title>
        <p>The feasible control method is to enrich data requirements in ERP. A production
order should not only define which material is to be processed, at which location, at
what time and how much work is required. It also defines which resources are to be
used and how the order costs are to be settled, especially regarding compliance status.
In the ABC case the compliance status refers to customs status of each material items.
As soon as a planned order or other request is generated from material requirements
planning, the information is passed on to shop floor control. The order-relevant data
including compliance status is also added to ensure complete order processing.</p>
        <p>The alternative solution is to place Internet of Things(IoT) / RFID sensors at each
transition in the Petri net model for fault mitigation as Fig. 2 illustrates. The
deployment shows a situation in which we can differentiate between 'easy' and 'difficult'
cases. WoPeD (Workflow Petri Net Designer) is an open-source software developed
for modelling, simulating and analyzing processes described by Petri nets. A built-in
resource editor in WoPed allows for each process the definition of a resource model,
i.e. roles, groups, and objects. Additionally, sensors in the transitions can have
resource class assignments. Based on the capacity requirement per transition, we can
calculate the capacity requirement of each resource class.
Given an expected supply of components and a number of assumptions about their
processing, we can use simulation and/or the queueing theory to determine the
capacity requirement during a particular period. Two different algorithms are implemented,
both based on stochastic distributions of arrival rate, task service times and XOR
branching probabilities [5]: Firstly, a quantitative simulator engine for the random
construction of execution traces, allowing to derive quantitative properties like
average waiting or completion time. Secondly, a capacity planner in order to calculate the
optimal number of resource objects for each resource class.</p>
        <p>Suppose the sensor in goods issue for an ‘easy’ case of free components takes an
average of 10 minutes, whereas for a ‘difficult’ case of bonded components (extra
information needs to be registered) it takes an average of 15 minutes. The sensor in
variance calculation for an easy case of bonded goods (no need to pay duties) takes an
average of 5 minutes, whereas for a difficult case of free components it takes an
average of 20 minutes. On average, 70% cases are classified as bonded goods, 30% as free
goods. Suppose four resource classes are in this case: Bonded, Free, Production and
Finance. A resource belongs to either Production or Finance, but not to both.</p>
        <p>It is assumed that the time taken to perform those activities which require no
resources is negligible. For the others, the average processing time in minutes is shown.
For example, the sensor in activity ‘Bonded’ ‘Goods issue’ takes an average of 15
minutes. In general, 85% of the bonded goods issue cases have been moved to WIP
and 15% are reversed. If we know the number λ of new components arrive each day,
then we can calculate the capacity requirement of sensors for each activity.</p>
        <p>Because there are always fluctuations in the supply of components and the
processing times, it is not always possible to make full use of the capacity available. It is
therefore not sensible to assume that the resources will be utilized to their full
capacity. To illustrate this, let us examine a process with 80% capacity. When λ=50, WePed
gives the results that the minimum number of sensors for Finance is 1.11, Production
3.74, Bonded 2.71, Free 2.15. We can calculate the results under other conditions
once the actual situation and operational data in ABC is available.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Conclusion</title>
      <p>This research aims to support businesses like ABC for compliance monitoring in
manufacturing. Through tracing abnormal movement sequence patterns, deviations
can be distinguished. Ideally the results of these research should be applied in ERP
and compliance management systems as an active fault detection and mitigation
module. Once the system detects abnormal code input, it can generate alerts and a
composite recommendation of internal controls immediately and directly to the relevant
managers. If these deviations can be found in the early period, it is more likely and
easier to timely correct them in order to eliminate or minimize their negative impacts.
To this end, we analyze transaction codes based on data analytics using process
mining and propose data requirements that allow:
1. identifying different deviation scenarios related to trade and compliance;
2. checking whether processes are in place and functioning as intended;
3. assessing the impact of transaction codes misusage in compliance monitoring;
4. providing recommendations about internal controls and risk mitigation
mechanisms depending on different types of misusages and deviations.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Spira</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Page</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Risk management: The reinvention of internal control and the changing role of internal audit</article-title>
          .
          <source>Accounting, Auditing &amp; Accountability Journal</source>
          .
          <volume>16</volume>
          (
          <issue>4</issue>
          ),
          <fpage>640</fpage>
          -
          <lpage>661</lpage>
          (
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Jans</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alles</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vasarhelyi</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>The case for process mining in auditing: Sources of value added and areas of application</article-title>
          .
          <source>International Journal of Accounting Information Systems</source>
          .
          <volume>14</volume>
          (
          <issue>1</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>20</lpage>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reijers</surname>
            ,
            <given-names>H. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weijters</surname>
            , A. J., van Dongen,
            <given-names>B. F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De Medeiros</surname>
            ,
            <given-names>A. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Song</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , et al.:
          <article-title>Business process mining: An industrial application</article-title>
          .
          <source>Information Systems</source>
          ,
          <volume>32</volume>
          (
          <issue>5</issue>
          ),
          <fpage>713</fpage>
          -
          <lpage>732</lpage>
          (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Rozinat</surname>
          </string-name>
          , A.,
          <string-name>
            <surname>van der Aalst</surname>
          </string-name>
          , W.:
          <article-title>Conformance checking of processes based on monitoring real behavior</article-title>
          .
          <source>Information Systems</source>
          .
          <volume>33</volume>
          (
          <issue>1</issue>
          ),
          <fpage>64</fpage>
          -
          <lpage>95</lpage>
          (
          <year>2008</year>
          ). W.
          <string-name>
            <surname>M. P. van der Aalst</surname>
          </string-name>
          ,
          <string-name>
            <surname>K M. van Hee</surname>
          </string-name>
          :
          <article-title>Workflow Management: Models, Methods, and Systems</article-title>
          MIT Press (
          <year>2002</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>