Generating event logs from non-process-aware systems enabling business process mining

Ricardo Pérez-Castillo, Barbara Weber, Jakob Pinggera, Stefan Zugal, Ignacio García-Rodríguez de Guzmán, Mario Piattini

Research output: Contribution to journalJournal articleResearchpeer-review


As information systems age they become legacy information systems (LISs), embedding business knowledge not present in other artefacts. LISs must be modernised when their maintainability falls below acceptable limits but the embedded business knowledge is valuable information that must be preserved to align the modernised versions of LISs with organisations’ real-world business processes. Business process mining permits the discovery and preservation of all meaningful embedded business knowledge by using event logs, which represent the business activities executed by an information system. Event logs can be easily obtained through the execution of process-aware information systems (PAISs). However, several non-process-aware information systems also implicitly support organisations’ business processes. This article presents a technique for obtaining event logs from traditional information systems (without any in-built logging functionality) by statically analysing and modifying LISs. The technique allows the modified systems to dynamically record event logs. The approach is validated with a case study involving a healthcare information system used in Austrian hospitals, which shows the technique obtains event logs that effectively and efficiently enable the discovery of embedded business processes. This implies the techniques provided within the process mining field, which are based on event logs, may also be applied to traditional information systems.
Original languageEnglish
JournalEnterprise Information Systems
Issue number3
Pages (from-to)301-355
Publication statusPublished - 2011
Externally publishedYes


  • Process mining
  • Event log
  • Dynamic analysis
  • Modernisation
  • Legacy system


Dive into the research topics of 'Generating event logs from non-process-aware systems enabling business process mining'. Together they form a unique fingerprint.

Cite this