Another source of information might be the Performance Database (transaction ST03 and STAD).
A good alternative is security and audit logging. Security and audit logging keeps track of all programs and transactions in use. It offers a search engine to look for specific reports, transactions and users. The security portal in the SAP service marketplace (http://service.sap.com/security) contains much more information on how to setup security logging.
Dig Deeper on SAP ABAP
Related Q&A from Bert Vanstechelman
An SAP user wants to know the risks of changing time zones in ECC 6.0. Continue Reading
An SAP user wants to know how to access an SAP IDES 4.7 system via the Internet through SAP GUI. Continue Reading
A SearchSAP.com reader wants to know how an increase of indexes and tables after upgrade to SAP ECC 6.0 will affect the memory requirements of a DB2 ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.