<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Analyzing Transaction Codes with Data Requirements in Information Systems for Compliance Monitoring A Manufacturing Case Study for Computational Auditing</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<title level="a" type="main">Analyzing Transaction Codes with Data Requirements in Information Systems for Compliance Monitoring A Manufacturing Case Study for Computational Auditing</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">DF3B2782B803BBF8B4EC22606B033FBB</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T16:48+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Auditing</term>
					<term>Compliance</term>
					<term>Information systems</term>
					<term>Manufacturing</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Companies, especially manufacturers, are operating in increasing demands of variability and customizability nowadays. They are faced with a multitude of complex rules and regulations that must be complied with, as well as supply chain disruptions that threaten business. Smart manufacturers take advantage of advanced information and manufacturing technologies to enable flexibility in physical processes. However, existing information systems are far from being sufficient and efficient for compliance monitoring in serviceoriented manufacturing. Failure to interface well with different information systems is still a general phenomenon among manufacturers, leading to more problems such as delay of goods delivery or missing inventory. One of the main difficulties in fully integrating information systems arises from the highly flexible and volatile nature of manufacturing processes, which would need highly customizable and adaptive information systems. Moreover, improper human operations with transaction codes in information systems could hamper business processes. This research analyzes transaction codes in petri net model with data requirements investigating a manufacturing case. The results should provide insights for system integration and computational auditing.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Companies usually have complex supply chains in which some parts are purchased in one region but assembled or manufactured in another region, and eventually shipped and sold to other regions. Multinational companies are compelled to comply with international trade regulations while moving goods quickly and cost effectively. This is particularly challenging due to the lack of information systems tailored to compliance management that integrates seamlessly with a company's operational processes and Enterprise Resource Planning (ERP) environments, and at the same time covers key aspects of trade compliance and communication requirements. For instance, international companies are experiencing problems of adopting information systems to be compliant with customs during the process of custom clearance, due to the complex nature of the supply chain management across the border. Therefore, international supply chains are facing risks concerning compliance <ref type="bibr" target="#b0">[1]</ref>, such as altering shipping documentations, inter-company manipulations, and fictitious inventory. Inventory management deals with the management of materials on a quantity and value basis, including all internal and external movement of goods in an enterprise, and the planning, entering, and documenting of these movements. The business processes within a company are executed using orders. To access these orders or running programs in information systems more rapidly each function in information systems is associated with a transaction code.</p><p>This research aims to devise methods for the detection and mitigation of deviations by analyzing transaction codes in information systems for manufacturers. Meanwhile, an approach with data requirements will be designed to reduce compliance problems in supply chains. In order to achieve these objectives, the main research question is:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>How can incorrect inventory in ERP and compliance management systems be discovered by analyzing and detecting misusage of transaction codes?</head><p>This main objective leads to the following research steps:</p><p>Step 1: aims to discover how manufacturing and inventory management is performed and which components are typically used to assemble a product. To this end, we identify the main artifact used in the approach, i.e. transaction code diagram (further explained in Section 2.1) adopted for manufacturing and process models representing the internal organizational processes of a company.</p><p>Step 2: apply conformance checking methods to event logs in information systems to detect deviations from prescribed behaviors indicated by transaction code diagram.</p><p>Step 3: define appropriate data requirements for compliance in manufacturing and supply chains. Propose control methods to reduce misusage of transaction codes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Case Study of ABC for Compliance Monitoring</head><p>ABC (anonymized) relies on international supply chains for the manufacturing of electronic equipment. The materials that are necessary for the production of the machinery are purchased both inside and outside the EU. The non-EU materials are stored in the customs warehouse, where they could undergo manufacturing operations with customs supervision; i.e. bonded materials are in the EU but have not been formally imported, hence are exempted from payment of import duties. ABC has adopted several information systems to support manufacturing and inventory management: an ERP system, an interfacing system call TIBCO and a compliance management system called T&amp;T. The logistical and financial records are registered in an ERP system provided by SAP. The monthly declarations for Customs cannot directly be created from SAP, due to the fact it does not maintain the customs status of the goods. Therefore, customs relevant data are processed from SAP to T&amp;T. Based on SAP transaction codes, T&amp;T is able to recognize the customs relevant transaction code using a correlation table. Upon receiving goods from suppliers, T&amp;T recognizes whether the goods are free or bonded and process them differently.</p><p>According to standard ERP operations, goods movements as material flow should be recorded in terms of movement types, i.e. 3-digit transaction codes as information flow. A transaction code (e.g. t-code in SAP) consists of letters, numbers or both. Each type of material movement is given a unique movement type, followed after transaction code. The same transaction code can be used for different movement types. For example, MIGO-261 stands for 'Goods issue for a production order', and MIGO-262 means 'reversal of 261', i.e. cancellation of the production order.</p><p>In practice, some records are input manually into information systems at working sites, specifically when the production orders are being implemented. In this circumstance manual mistakes could happen. ABC regularly implements stock reconciliation procedures between information systems. However, large inventory differences underlying SAP and T&amp;T are discovered since 2013 until 2017.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Transaction Code Diagram</head><p>To analyze transactions codes with data requirements, we derive a transaction code diagram representing the possible sequences of transaction codes that should be executed. Movement type is allowed per transaction code, and for each movement posted, a material document will be created and stored in the database. The movement type is important because it is used to control adjustment of inventories and the General Ledger account for financial purposes etc. We represent transaction code diagrams as Petri nets. A Petri net is a tuple (P,T,F,m i ,m f ) where P is a set of places, T is a set of transitions representing transaction codes, F ⊆(P ×T)∪(T ×P) is the flow relation connecting places and transitions, m i is the initial marking and m f is the final marking. Petri nets provide a formal semantics that can be exploited for automated analysis.  <ref type="figure" target="#fig_0">1</ref>. For example, movement type 261 initiates a "Goods issue for a production order". When some components are cancelled, the components should always be reversed by 262 even though there would be sophisticated manufacturing processes after 261. By the end of the production phase any remaining unused components are returned to the inventory and a 262 against this order should be posted. Below is the detailed description with the transactions codes used:</p><p>1. Create production order -CO01 2. Issue goods for production order -MIGO-261 3. WIP (Work in Process) -KKAX (or KKAO for mass production) 4. Good receipts(GR) from production to Inventory -MIGO-101 5. Transfer posting stock in quality inspection -MIGO-321 6. Variance calculation -KKS1 (or KKS2 for the whole plant) 7. Settlement -KO88 (or CO88 for the whole plant)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Conformance Checking</head><p>Process mining is a promising means to systematically analyze data recorded by information systems like ERP <ref type="bibr" target="#b1">[2]</ref>. It provides auditors a new and more comprehensive way for understanding the state of the control environment than the procedures that they rely on today. Process mining aims to extract knowledge from event logs. Event logs can be extracted from the contemporary information systems <ref type="bibr" target="#b2">[3]</ref>. Information systems capture activities happening in the "real world". To perform process mining on data, the digital traces captured in the information systems must be extracted and transformed into event logs. We assume the existence of an event log where each event refers to a case, an activity, and a point in time, i.e. timestamp. An event log can be seen as a collection of cases. A case can be seen as a trace/sequence of events.</p><p>Conformance checking aims at the detection of inconsistencies between a process model and its corresponding execution log <ref type="bibr" target="#b3">[4]</ref>. Logs represent observed execution sequences of activities from the normative process model. In the desirable case, logs completely comply with the behavior defined by the process model and are called valid execution sequences. In practice, observed execution sequences often deviate from predefined behavior.</p><p>As Fig. <ref type="figure" target="#fig_0">1</ref> shows, MIGO-262 is used when a production order needs partial quantity reversal. However, in this case the fault of using MIGO-101 happens. Some employees confuse the use of code 262 and 101, or they cannot distinguish whether these materials are received for cancellation reversal or production order. Instead of typing correct 262 as a reversal movement into systems to close the production order, they use 101 to receive goods instead. This fault may cause unnecessary duty repeatedly levied on the same goods, because 101 acts as an intermediate message may continue another duty levy process to production again automatically.</p><p>We analyzed ABC's 88538 records of monthly declarations to customs in 2012 and 41706 signals from compliance management system. In addition, data of two production orders in 2016 is used for conformance checking. Further analysis of the root causes of inventory differences can be categorized as three main reasons: Deviation from the standard operating procedure by employees as agreed in the workflow instructions; Misusage of the movement types in ERP by which items are incorrectly assigned in the returning stock; Constraints in the ERP system, i.e. infeasibility to customize for every new product as well as the flexible manufacturing process.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Data Requirements and Controls for Compliance Monitoring</head><p>The feasible control method is to enrich data requirements in ERP. A production order should not only define which material is to be processed, at which location, at what time and how much work is required. It also defines which resources are to be used and how the order costs are to be settled, especially regarding compliance status.</p><p>In the ABC case the compliance status refers to customs status of each material items.</p><p>As soon as a planned order or other request is generated from material requirements planning, the information is passed on to shop floor control. The order-relevant data including compliance status is also added to ensure complete order processing. The alternative solution is to place Internet of Things(IoT) / RFID sensors at each transition in the Petri net model for fault mitigation as Fig. <ref type="figure">2</ref> illustrates. The deployment shows a situation in which we can differentiate between 'easy' and 'difficult' cases. WoPeD (Workflow Petri Net Designer) is an open-source software developed for modelling, simulating and analyzing processes described by Petri nets. A built-in resource editor in WoPed allows for each process the definition of a resource model, i.e. roles, groups, and objects. Additionally, sensors in the transitions can have resource class assignments. Based on the capacity requirement per transition, we can calculate the capacity requirement of each resource class.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 2. An example of sensor deployment in Petri net model for fault mitigation</head><p>Given an expected supply of components and a number of assumptions about their processing, we can use simulation and/or the queueing theory to determine the capacity requirement during a particular period. Two different algorithms are implemented, both based on stochastic distributions of arrival rate, task service times and XOR branching probabilities [5]: Firstly, a quantitative simulator engine for the random construction of execution traces, allowing to derive quantitative properties like average waiting or completion time. Secondly, a capacity planner in order to calculate the optimal number of resource objects for each resource class.</p><p>Suppose the sensor in goods issue for an 'easy' case of free components takes an average of 10 minutes, whereas for a 'difficult' case of bonded components (extra information needs to be registered) it takes an average of 15 minutes. The sensor in variance calculation for an easy case of bonded goods (no need to pay duties) takes an average of 5 minutes, whereas for a difficult case of free components it takes an average of 20 minutes. On average, 70% cases are classified as bonded goods, 30% as free goods. Suppose four resource classes are in this case: Bonded, Free, Production and Finance. A resource belongs to either Production or Finance, but not to both.</p><p>It is assumed that the time taken to perform those activities which require no resources is negligible. For the others, the average processing time in minutes is shown.</p><p>For example, the sensor in activity 'Bonded' 'Goods issue' takes an average of 15 minutes. In general, 85% of the bonded goods issue cases have been moved to WIP and 15% are reversed. If we know the number λ of new components arrive each day, then we can calculate the capacity requirement of sensors for each activity.</p><p>Because there are always fluctuations in the supply of components and the processing times, it is not always possible to make full use of the capacity available. It is therefore not sensible to assume that the resources will be utilized to their full capacity. To illustrate this, let us examine a process with 80% capacity. When λ=50, WePed gives the results that the minimum number of sensors for Finance is 1.11, Production 3.74, Bonded 2.71, Free 2.15. We can calculate the results under other conditions once the actual situation and operational data in ABC is available.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Conclusion</head><p>This research aims to support businesses like ABC for compliance monitoring in manufacturing. Through tracing abnormal movement sequence patterns, deviations can be distinguished. Ideally the results of these research should be applied in ERP and compliance management systems as an active fault detection and mitigation module. Once the system detects abnormal code input, it can generate alerts and a composite recommendation of internal controls immediately and directly to the relevant managers. If these deviations can be found in the early period, it is more likely and easier to timely correct them in order to eliminate or minimize their negative impacts.</p><p>To this end, we analyze transaction codes based on data analytics using process mining and propose data requirements that allow: 1. identifying different deviation scenarios related to trade and compliance; 2. checking whether processes are in place and functioning as intended; 3. assessing the impact of transaction codes misusage in compliance monitoring; 4. providing recommendations about internal controls and risk mitigation mechanisms depending on different types of misusages and deviations.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. An example of transaction code diagram regarding production process</figDesc></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Risk management: The reinvention of internal control and the changing role of internal audit</title>
		<author>
			<persName><forename type="first">L</forename><surname>Spira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Page</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Accounting, Auditing &amp; Accountability Journal</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="640" to="661" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">The case for process mining in auditing: Sources of value added and areas of application</title>
		<author>
			<persName><forename type="first">M</forename><surname>Jans</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Alles</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Vasarhelyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Accounting Information Systems</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="1" to="20" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Business process mining: An industrial application</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Reijers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>Weijters</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">F</forename><surname>Van Dongen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>De Medeiros</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Song</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems</title>
		<imprint>
			<biblScope unit="volume">32</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="713" to="732" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Conformance checking of processes based on monitoring real behavior</title>
		<author>
			<persName><forename type="first">A</forename><surname>Rozinat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="64" to="95" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">M</forename><surname>Van Hee</surname></persName>
		</author>
		<title level="m">Workflow Management: Models, Methods</title>
				<imprint>
			<publisher>and Systems MIT Press</publisher>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
