Musawwer Khan1, Islam Ali1, Wasif Nisar1, Muhammad Qaiser Saleem2, Ali S. Ahmed2, Haysam E. Elamin3, Waqar Mehmood4, Muhammad Shafiq5,*
Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 543-555, 2022, DOI:10.32604/iasc.2022.016120
- 26 October 2021
Abstract Due to various issues such as lack of agility, low performance, security issues, and high maintenance costs, the organization replaces its legacy information system (LIS). However, with the expansion of information technology, the security of the old system has received great attention. The protection of legacy data and information is critical to the organization. However, achieving safety through modernization, redevelopment, or redesign of LIS is a time-consuming and costly solution, especially in small and medium enterprises (SMEs). In addition, newly developed systems often lose inherent business rules, data integrity, and user trust. In this paper,… More >