{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:52:54Z","timestamp":1743094374360,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031525230"},{"type":"electronic","value":"9783031525247"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-52524-7_2","type":"book-chapter","created":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T05:35:04Z","timestamp":1705988104000},"page":"17-29","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Impact of\u00a0the\u00a0Evolution of\u00a0Operating Systems on\u00a0Older Web Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1146-464X","authenticated-orcid":false,"given":"Ant\u00f3nio","family":"Godinho","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5610-7147","authenticated-orcid":false,"given":"Jos\u00e9","family":"Rosado","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7846-8397","authenticated-orcid":false,"given":"Filipe","family":"S\u00e1","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3916-5182","authenticated-orcid":false,"given":"Filipe","family":"Cardoso","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,24]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"F\u00fcrnweger, A., Auer, M., Biffl, S.: Software evolution of legacy systems. In: ICEIS 2016, p. 413 (2016)","DOI":"10.5220\/0005771104130424"},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Zerouali, A., Mens, T., Robles, G., Gonzalez-Barahona, J.M.: On the relation between outdated docker containers, severity vulnerabilities, and bugs. In: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), Hangzhou, China, pp. 491\u2013501 (2019). https:\/\/doi.org\/10.1109\/SANER.2019.8668013","DOI":"10.1109\/SANER.2019.8668013"},{"issue":"3","key":"2_CR3","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1177\/1460458210377468","volume":"16","author":"G Narayana Samy","year":"2010","unstructured":"Narayana Samy, G., Ahmad, R., Ismail, Z.: Security threats categories in healthcare information systems. Health Inform. J. 16(3), 201\u2013209 (2010). https:\/\/doi.org\/10.1177\/1460458210377468","journal-title":"Health Inform. J."},{"key":"2_CR4","doi-asserted-by":"publisher","unstructured":"Zerouali, A., Cosentino, V., Mens, T., Robles, G., Gonzalez-Barahona, J.M.: On the impact of outdated and vulnerable Javascript packages in docker images. In: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), Hangzhou, China, pp. 619\u2013623 (2019). https:\/\/doi.org\/10.1109\/SANER.2019.8667984","DOI":"10.1109\/SANER.2019.8667984"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Savor, T., et al.: Continuous deployment at Facebook and OANDA. In: Proceedings of the 38th International Conference on Software Engineering Companion (2016)","DOI":"10.1145\/2889160.2889223"},{"issue":"4","key":"2_CR6","first-page":"242","volume":"28","author":"E Goodman","year":"2011","unstructured":"Goodman, E., Loh, L.: Organizational change: a critical challenge for team effectiveness. Bus. Inf. Rev. 28(4), 242\u2013250 (2011)","journal-title":"Bus. Inf. Rev."},{"key":"2_CR7","doi-asserted-by":"publisher","unstructured":"Acar, Y., Stransky, C., Wermke, D., Weir, C., Mazurek, M.L., Fahl, S.: Developers need support, too: a survey of security advice for software developers. In: 2017 IEEE Cybersecurity Development (SecDev), Cambridge, MA, USA, pp. 22\u201326 (2017). https:\/\/doi.org\/10.1109\/SecDev.2017.17","DOI":"10.1109\/SecDev.2017.17"},{"key":"2_CR8","unstructured":"Christensen, C.M.: The innovator\u2019s Dilemma: When New Technologies Cause Great Firms to Fail. Harvard Business Review Press (2013)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Hossain, M.M., Fotouhi, M., Hasan, R.: Towards an analysis of security issues, challenges, and open problems in the internet of things. In: 2015 IEEE world Congress on Services. IEEE (2015)","DOI":"10.1109\/SERVICES.2015.12"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"101660","DOI":"10.1016\/j.scs.2019.101660","volume":"50","author":"H Habibzadeh","year":"2019","unstructured":"Habibzadeh, H., et al.: A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities. Sustain. Cities Soc. 50, 101660 (2019)","journal-title":"Sustain. Cities Soc."},{"key":"2_CR11","unstructured":"Microsoft. Internet information services (IIS) - microsoft lifecycle. Microsoft Lifecycle\u2014Microsoft Docs. https:\/\/docs.microsoft.com\/en-us\/lifecycle\/products\/internet-information-services-iis. Accessed 15 Nov 2021"},{"key":"2_CR12","unstructured":"Benjamin, D.: Modernizing transport security. Google Online Security Blog (2018). https:\/\/security.googleblog.com\/2018\/10\/modernizing-transport-security.html. Accessed 18 Nov 2021"},{"key":"2_CR13","unstructured":"Thomson, M.: Removing old versions of TLS. Mozilla Security Blog (2018). https:\/\/blog.mozilla.org\/security\/2018\/10\/15\/removing-old-versions-of-tls\/. Accessed 18 Nov 2021"},{"key":"2_CR14","unstructured":"Pflug, K.: Modernizing TLS connections in Microsoft edge and internet explorer 11. Microsoft Edge Blog (2020). https:\/\/blogs.windows.com\/msedgedev\/2018\/10\/15\/modernizing-tls-edge-ie11\/. Accessed 18 Nov 2021"},{"key":"2_CR15","unstructured":"Wood, C.: Deprecation of legacy TLS 1.0 and 1.1 versions. WebKit (2018). https:\/\/webkit.org\/blog\/8462\/deprecation-of-legacy-tls-1-0-and-1-1-versions\/. Accessed 18 Nov 2021"},{"key":"2_CR16","unstructured":"Laflamme, R.: Chrome 81 features and release date. Insightportal (2020). https:\/\/www.insightportal.io\/news\/all-news\/chrome-81-beta-features-and-release-date. Accessed 18 Nov 2021"},{"key":"2_CR17","unstructured":"[MSFT], R., Rich Lander [MSFT] Program Manager, 6, A., Asthana, A., 6, S., [MSFT], S., Cheong00. Introducing.NET 5 (2021). https:\/\/devblogs.microsoft.com\/dotnet\/introducing-net-5\/. Accessed 28 May 2022"},{"key":"2_CR18","unstructured":"Microsoft. Microsoft.NET Framework - Microsoft Lifecycle (n.d.). https:\/\/docs.microsoft.com\/en-gb\/lifecycle\/products\/microsoft-net-framework. Accessed 28 May 2022"},{"key":"2_CR19","unstructured":"Hanselman, S.: Moving old apps from IIS6 to IIS8 and why Classic Mode exists (2013). https:\/\/www.hanselman.com\/blog\/moving-old-apps-from-iis6-to-iis8-and-why-classic-mode-exists. Accessed 15 Nov 2022"},{"key":"2_CR20","unstructured":".NET Team. Visual basic support planned for.NET 5.0 (2020). https:\/\/devblogs.microsoft.com\/vbteam\/visual-basic-support-planned-for-net-5-0\/. Accessed 15 Nov 2022"},{"key":"2_CR21","unstructured":"Kyrnin, J.: Avoid inline styles for CSS design. ThoughtCo (2020). https:\/\/www.thoughtco.com\/avoid-inline-styles-for-css-3466846. Accessed 24 Nov 2021"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Shenoy, A., Prabhu, A.: CSS Framework Alternatives: Explore Five Lightweight Alternatives to Bootstrap and Foundation with Project Examples. Apress (2018)","DOI":"10.1007\/978-1-4842-3399-3"},{"issue":"10","key":"2_CR23","first-page":"349","volume":"2","author":"SS Gaikwad","year":"2019","unstructured":"Gaikwad, S.S., Adkar, P.: A review paper on bootstrap framework. IRE J. 2(10), 349\u2013351 (2019)","journal-title":"IRE J."},{"key":"2_CR24","unstructured":"Mark Otto, J.: Bootstrap (2022). https:\/\/getbootstrap.com\/. Accessed 17 Nov 2022"},{"key":"2_CR25","unstructured":"HaiyingYu. Edit configuration of an ASP.NET application - ASP.NET. Edit configuration of an ASP.NET application - ASP.NET\u2014Microsoft Docs (n.d.). https:\/\/docs.microsoft.com\/pt-PT\/troubleshoot\/developer\/webapps\/aspnet\/development\/edit-web-config. Accessed 4 Mar 2022"},{"key":"2_CR26","unstructured":"Anderson, R.: Login class (system.web.ui.webcontrols). (System.Web.UI.WebControls)\u2014Microsoft Docs (n.d.). https:\/\/docs.microsoft.com\/en-us\/dotnet\/api\/system.web.ui.webcontrols.login?view=netframework-4.8. Accessed 7 Mar 2022"},{"key":"2_CR27","unstructured":"Code converter C# to VB and VB TO C#. Telerik. (n.d.). https:\/\/converter.telerik.com\/. Accessed 29 Nov 2021"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Smart Objects and Technologies for Social Good"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-52524-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T22:01:31Z","timestamp":1731103291000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-52524-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031525230","9783031525247"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-52524-7_2","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"24 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GOODTECHS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Objects and Technologies for Social Good","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Leiria","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"goodtechs2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}