skip to main content
10.1145/2568225.2568318acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

How do professionals perceive legacy systems and software modernization?

Published:31 May 2014Publication History

ABSTRACT

Existing research in legacy system modernization has traditionally focused on technical challenges, and takes the standpoint that legacy systems are obsolete, yet crucial for an organization's operation. Nonetheless, it remains unclear whether practitioners in the industry also share this perception. This paper describes the outcome of an exploratory study in which 26 industrial practitioners were interviewed on what makes a software system a legacy system, what the main drivers are that lead to the modernization of such systems, and what challenges are faced during the modernization process. The findings of the interviews have been validated by means of a survey with 198 respondents. The results show that practitioners value their legacy systems highly, the challenges they face are not just technical, but also include business and organizational aspects.

References

  1. S. Adolph, W. Hall, and P. Kruchten. Using grounded theory to study the experience of software development. Empirical Software Engineering, 16(4):487–513, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. W. S. Adolph. Cash cow in the tar pit: Reengineering a legacy system. IEEE Software, 13(3):41–47, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Alderson and H. Shah. Viewpoints on legacy systems. Communications of the ACM, 42(3):115–116, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. A. Almonaies, J. R. Cordy, and T. R. Dean. Legacy system evolution towards service-oriented architecture. In International Workshop on SOA Migration and Evolution, pages 53–62, 2010.Google ScholarGoogle Scholar
  5. E. C. Arranga and F. P. Coyle. Cobol: Perception and reality. IEEE Computer, 30(3):126–128, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B. V. Batlajery, R. Khadka, A. M. Saeidi, S. Jansen, and J. Hage. Industrial perception of legacy software system and their modernization. TR UU-CS-2014-004, Utrecht University, 2014.Google ScholarGoogle Scholar
  7. L. A. Belady and M. M. Lehman. A model of large program development. IBM Systems Journal, 15(3):225–252, 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. K. Bennett. Legacy systems: Coping with success. IEEE Software, 12(1):19–23, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. K. H. Bennett and V. T. Rajlich. Software maintenance and evolution: A roadmap. In 22nd International Conference on Software Engineering, pages 73–87. ACM, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Bianchi, D. Caivano, V. Marengo, and G. Visaggio. Iterative reengineering of legacy systems. Transactions on Software Engineering, 29(3):225–241, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Bisbal, D. Lawless, B. Wu, and J. Grimson. Legacy information systems: Issues and directions. IEEE Software, 16(5):103–111, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Bisbal, D. Lawless, B. Wu, J. Grimson, R. Wade, V.and Richardson, and D. OSullivan. A survey of research into legacy system migration. TR TCD-CS-1997-01, Trinity College Dublin, 1997.Google ScholarGoogle Scholar
  13. M. L. Brodie. The promise of distributed computing and the challenges of legacy systems. In Advanced Database Systems, pages 1–28. Springer, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. L. Brodie and M. Stonebraker. DARWIN: On the incremental migration of legacy information systems. TR TR-022-10-92-165, GTE Labs Inc, 1993.Google ScholarGoogle Scholar
  15. M. L. Brodie and M. Stonebraker. Migrating legacy systems: Gateways, interfaces & the incremental approach. Morgan Kaufmann Publishers Inc., 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. G. Canfora, A. Cimitile, A. De Lucia, and G. A. Di Lucca. Decomposing legacy programs: A first step towards migrating to client–server platforms. Journal of Systems and Software, 54(2):99–110, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Colosimo, A. D. Lucia, G. Scanniello, and G. Tortora. Evaluating legacy system migration technologies through empirical studies. Information and Software Technology, 51(2):433–447, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. B. Cornelissen, A. Zaidman, A. van Deursen, L. Moonen, and R. Koschke. A systematic survey of program comprehension through dynamic analysis. Transactions on Software Engineering, 35(5):684–702, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. De Lucia, R. Francese, G. Scanniello, and G. Tortora. Developing legacy system migration methods and tools for technology transfer. Software: Practice and Experience, 38(13):1333–1364, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Easterbrook, J. Singer, M.-A. Storey, and D. Damian. Selecting empirical methods for software engineering research. In Guide to Advanced Empirical Software Engineering, pages 285–311. Springer, 2008.Google ScholarGoogle Scholar
  21. B. G. Glaser and A. L. Strauss. The discovery of grounded theory: Strategies for qualitative research. Aldine Transaction, Chicago, Illionios, 1967.Google ScholarGoogle Scholar
  22. M. Goedicke and U. Zdun. Piecemeal legacy migrating with an architectural pattern language: A case study. Journal of Software Maintenance and Evolution: Research and Practice, 14(1):1–30, 2002. Google ScholarGoogle ScholarCross RefCross Ref
  23. N. Golafshani. Understanding reliability and validity in qualitative research. The Qualitative Report, 8(4):597–607, 2003.Google ScholarGoogle Scholar
  24. W. Hasselbring, R. Reussner, H. Jaekel, J. Schlegelmilch, T. Teschke, and S. Krieghoff. The dublo architecture pattern for smooth migration of business information systems: An experience report. In 26th International Conference on Software Engineering, pages 117–126. IEEE, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. R. Khadka, A. Saeidi, A. Idu, J. Hage, and S. Jansen. Legacy to SOA evolution: A systematic literature review. In In AD Ionita, M. Litoiu, & G. Lewis (Eds.) Migrating Legacy Applications: Challenges in Service Oriented Architecture and Cloud Computing Environments, pages 40–70. IGI Global, 2013.Google ScholarGoogle Scholar
  26. R. Khadka, A. Saeidi, S. Jansen, J. Hage, and G. Haas. Migrating a large scale legacy application to SOA: Challenges and lessons learned. In 20th Working Conference on Reverse Engineering, pages 425–432. IEEE, 2013.Google ScholarGoogle Scholar
  27. B. Kitchenham and S. L. Pfleeger. Principles of survey research: Part 5: Populations and samples. Software Engineering Notes, 27(5):17–20, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. Lavery, C. Boldyreff, B. Ling, and C. Allison. Modelling the evolution of legacy systems to web-based systems. Journal of Software Maintenance and Evolution: Research and Practice, 16(1-2):5–30, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. B. P. Lientz, E. B. Swanson, and G. E. Tompkins. Characteristics of application software maintenance. Communications of the ACM, 21(6):466–471, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. J. Liu, D. Batory, and C. Lengauer. Feature-oriented refactoring of legacy applications. In 28th International Conference on Software Engineering, pages 112–121. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. A. Mehta and G. T. Heineman. Evolving legacy system features into fine-grained components. In 24th International Conference on Software Engineering, pages 417–427. ACM, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. M. Mortensen, S. Ghosh, and J. M. Bieman. Aspect-oriented refactoring of legacy applications: An evaluation. Transactions on Software Engineering, 38(1):118–140, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. S. Murer, B. Bonati, and F. J. Furrer. Managed evolution: A strategy for very large information systems. Springer, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. NASCIO. Digital states at risk modernizing legacy systems. Technical report, NASCIO, 2008.Google ScholarGoogle Scholar
  35. K. A. Nasr, H.-G. Gross, and A. van Deursen. Realizing service migration in industry–lessons learned. Journal of Software: Evolution and Process, 25(6):639–661, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  36. A. Quilici. Reverse engineering of legacy systems: A path toward success. In 17th International Conference on Software Engineering, pages 333–336. ACM, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. M. Razavian and P. Lago. A frame of reference for SOA migration. In Towards a Service-Based Internet, pages 150–162. Springer, 2010.Google ScholarGoogle Scholar
  38. M. Razavian and P. Lago. A survey of SOA migration in industry. In G. Kappel, Z. Maamar, and H. R. Motahari-Nezhad, editors, Service-Oriented Computing, volume 7084 of LNCS, pages 618–626. Springer, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. P. Runeson and M. Höst. Guidelines for conducting and reporting case study research in software engineering. Empirical Software Engineering, 14(2):131–164, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. R. C. Seacord, D. Plakosh, and L. A. Grace. Modernizing legacy systems: Software technologies, engineering processes, and business practices. Addison-Wesley Professional, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. H. M. Sneed. Software renewal: A case study. IEEE Software, 1(3):56–63, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. H. M. Sneed. Risks involved in reengineering projects. In 6th Working Conference on Reverse Engineering, pages 204–211. IEEE, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. SQuaRE. Systems and software quality requirements and evaluation (SQuaRE)– system and software quality models. Standard ISO/IEC 25010, ISO, 2011.Google ScholarGoogle Scholar
  44. E. Stroulia, M. El-Ramly, and P. Sorenson. From legacy to web through interaction modeling. In 18th International Conference on Software Maintenance, pages 320–329. IEEE, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. T. Sucharov and P. Rice. The burden of legacy. Online: http://www.ncc.co.uk/article/?articleid=15665, 2008.Google ScholarGoogle Scholar
  46. P. Thiran, J.-L. Hainaut, G.-J. Houben, and D. Benslimane. Wrapper-based evolution of legacy information systems. Transactions on Software Engineering and Methodology, 15(4):329–359, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. M. Torchiano, M. Di Penta, F. Ricca, A. De Lucia, and F. Lanubile. Migration of information systems in the Italian industry: A state of the practice survey. Information and Software Technology, 53(1):71–86, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. A. van Deursen, P. Klint, and C. Verhoef. Research issues in the renovation of legacy systems. In 2nd International Conference on Fundamental Approaches to Software Engineering, pages 1–21. Springer, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. M. van Sinderen. Challenges and solutions in enterprise computing. Enterprise Information Systems, 2(4):341–346, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. N. Veerman. Revitalizing modifiability of legacy assets. Journal of Software Maintenance and Evolution: Research and Practice, 16(4-5):219–254, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. I. Warren and D. Avallone. The renaissance of legacy systems. Springer, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. B. W. Weide, W. D. Heym, and J. E. Hollingsworth. Reverse engineering of legacy code exposed. In 17th International Conference on Software Engineering, pages 327–331. ACM, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. N. H. Weiderman, J. K. Bergey, D. B. Smith, and S. R. Tilley. Approaches to legacy system evolution. TR CMU/SEI-97-TR-O14, DTIC Document, 1997.Google ScholarGoogle Scholar
  54. B. Wu, D. Lawless, J. Bisbal, R. Richardson, J. Grimson, V. Wade, and D. OSullivan. The butterfly methodology: A gateway-free approach for migrating legacy information systems. In 3rd IEEE International Conference on Engineering of Complex Computer Systems, pages 200–205. IEEE, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. How do professionals perceive legacy systems and software modernization?

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ICSE 2014: Proceedings of the 36th International Conference on Software Engineering
        May 2014
        1139 pages
        ISBN:9781450327565
        DOI:10.1145/2568225

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 31 May 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate276of1,856submissions,15%

        Upcoming Conference

        ICSE 2025

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader