2021
DOI: 10.1016/j.jss.2020.110868
|View full text |Cite
|
Sign up to set email alerts
|

A taxonomy of service identification approaches for legacy software systems modernization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
30
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 39 publications
(30 citation statements)
references
References 16 publications
0
30
0
Order By: Relevance
“…Existing research covers a variety of topics, starting from decisionmaking over process strategies [3] to quality assurance [6] and organizational aspects [9]. The challenging question of service identification techniques in general [1] and for microservices specifically is targeted by several dozen studies [10,12]. However, our empirical research has shown that this extensive body of scientific literature is mostly unknown to practitioners and therefore rarely leveraged [9].…”
Section: The Academia-industry Gapmentioning
confidence: 99%
See 1 more Smart Citation
“…Existing research covers a variety of topics, starting from decisionmaking over process strategies [3] to quality assurance [6] and organizational aspects [9]. The challenging question of service identification techniques in general [1] and for microservices specifically is targeted by several dozen studies [10,12]. However, our empirical research has shown that this extensive body of scientific literature is mostly unknown to practitioners and therefore rarely leveraged [9].…”
Section: The Academia-industry Gapmentioning
confidence: 99%
“…2) Architectural Refactoring The secondary studies by Abdellatif et al [1], Bajaj et al [3], Schroer et al [13], Ponce et al [12], and Fritzsch et al [10] provide a holistic overview of this major technical challenge in a migration. Our earlier study [10] attempted a classification of approaches based on their underlying techniques.…”
Section: ) Migration Processmentioning
confidence: 99%
“…Therefore, to achieve the return of the investment made, the ICT hardware and software are used for a long period until they are classified as legacy systems. This long usage period makes legacy systems increasingly important to the organisation [1,2]. They maintain important business logic and data needed in the daily business operations [3].…”
Section: Introductionmentioning
confidence: 99%
“…Hence, legacy systems continue to play an important role in the implementation of ICT today. Large organisations still use these systems in operating their businesses including in the delivery of critical services [1,2]. However, legacy systems that are associated with the use of obsolete technologies pose difficulties to organisations in implementing daily operations.…”
Section: Introductionmentioning
confidence: 99%
“…Examples of uncertainty incorporate client firms' low switching costs and perceived risks, SaaS vendors' low customization and control over future SaaS development, process dependence, and information security. Unlike traditional IT-based innovation that focuses on a firm's internal resource management (e.g., process improvement), the extent to which SaaS firms create value relies on their ability to leverage both internal and external resources at the post-adoption stage such as leveraging resources provided by SaaS vendors through good management of the firm vendor relationship (e.g., absorbing SaaS best practices for task improvement) [1]. Few studies focus on SaaS-based innovation at the post-adoption stage that reflects both SaaS features and value creation from the firm-vendor relationship [2].…”
Section: Introductionmentioning
confidence: 99%