{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T14:55:39Z","timestamp":1773413739138,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2568225.2568318","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"36-47","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":69,"title":["How do professionals perceive legacy systems and software modernization?"],"prefix":"10.1145","author":[{"given":"Ravi","family":"Khadka","sequence":"first","affiliation":[{"name":"Utrecht University, Netherlands"}]},{"given":"Belfrit V.","family":"Batlajery","sequence":"additional","affiliation":[{"name":"Utrecht University, Netherlands"}]},{"given":"Amir M.","family":"Saeidi","sequence":"additional","affiliation":[{"name":"Utrecht University, Netherlands"}]},{"given":"Slinger","family":"Jansen","sequence":"additional","affiliation":[{"name":"Utrecht University, Netherlands"}]},{"given":"Jurriaan","family":"Hage","sequence":"additional","affiliation":[{"name":"Utrecht University, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-010-9152-6"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.493019"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/295685.295722"},{"key":"e_1_3_2_1_4_1","first-page":"62","volume-title":"International Workshop on SOA Migration and Evolution","author":"Almonaies A. A.","year":"2010","unstructured":"A. A. Almonaies , J. R. Cordy , and T. R. Dean . Legacy system evolution towards service-oriented architecture . In International Workshop on SOA Migration and Evolution , pages 53\u2013 62 , 2010 . A. A. Almonaies, J. R. Cordy, and T. R. Dean. Legacy system evolution towards service-oriented architecture. In International Workshop on SOA Migration and Evolution, pages 53\u201362, 2010."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.573683"},{"key":"e_1_3_2_1_6_1","volume-title":"Industrial perception of legacy software system and their modernization. TR UU-CS-2014-004","author":"Batlajery B. V.","year":"2014","unstructured":"B. V. Batlajery , R. Khadka , A. M. Saeidi , S. Jansen , and J. Hage . Industrial perception of legacy software system and their modernization. TR UU-CS-2014-004 , Utrecht University , 2014 . B. V. Batlajery, R. Khadka, A. M. Saeidi, S. Jansen, and J. Hage. Industrial perception of legacy software system and their modernization. TR UU-CS-2014-004, Utrecht University, 2014."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.153.0225"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.363157"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336534"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1183932"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.795108"},{"key":"e_1_3_2_1_12_1","volume-title":"A survey of research into legacy system migration. TR TCD-CS-1997-01","author":"Bisbal J.","year":"1997","unstructured":"J. Bisbal , D. Lawless , B. Wu , J. Grimson , R. Wade , V.and Richardson, and D. O Sullivan . A survey of research into legacy system migration. TR TCD-CS-1997-01 , Trinity College Dublin , 1997 . J. Bisbal, D. Lawless, B. Wu, J. Grimson, R. Wade, V.and Richardson, and D. OSullivan. A survey of research into legacy system migration. TR TCD-CS-1997-01, Trinity College Dublin, 1997."},{"key":"e_1_3_2_1_13_1","first-page":"28","volume-title":"Advanced Database Systems","author":"Brodie M. L.","unstructured":"M. L. Brodie . The promise of distributed computing and the challenges of legacy systems . In Advanced Database Systems , pages 1\u2013 28 . Springer, 1992. M. L. Brodie. The promise of distributed computing and the challenges of legacy systems. In Advanced Database Systems, pages 1\u201328. Springer, 1992."},{"key":"e_1_3_2_1_14_1","volume-title":"DARWIN: On the incremental migration of legacy information systems. TR TR-022-10-92-165","author":"Brodie M. L.","year":"1993","unstructured":"M. L. Brodie and M. Stonebraker . DARWIN: On the incremental migration of legacy information systems. TR TR-022-10-92-165 , GTE Labs Inc , 1993 . M. L. Brodie and M. Stonebraker. DARWIN: On the incremental migration of legacy information systems. TR TR-022-10-92-165, GTE Labs Inc, 1993."},{"key":"e_1_3_2_1_15_1","volume-title":"Migrating legacy systems: Gateways, interfaces & the incremental approach","author":"Brodie M. L.","year":"1995","unstructured":"M. L. Brodie and M. Stonebraker . Migrating legacy systems: Gateways, interfaces & the incremental approach . Morgan Kaufmann Publishers Inc ., 1995 . M. L. Brodie and M. Stonebraker. Migrating legacy systems: Gateways, interfaces & the incremental approach. Morgan Kaufmann Publishers Inc., 1995."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(00)00030-3"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.05.012"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.28"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.v38:13"},{"key":"e_1_3_2_1_20_1","volume-title":"Springer","author":"Easterbrook S.","year":"2008","unstructured":"S. Easterbrook , J. Singer , M.-A. Storey , and D. Damian . Selecting empirical methods for software engineering research. In Guide to Advanced Empirical Software Engineering, pages 285\u2013311 . Springer , 2008 . S. Easterbrook, J. Singer, M.-A. Storey, and D. Damian. Selecting empirical methods for software engineering research. In Guide to Advanced Empirical Software Engineering, pages 285\u2013311. Springer, 2008."},{"key":"e_1_3_2_1_21_1","volume-title":"Aldine Transaction","author":"Glaser B. G.","year":"1967","unstructured":"B. G. Glaser and A. L. Strauss . The discovery of grounded theory: Strategies for qualitative research . Aldine Transaction , Chicago, Illionios , 1967 . B. G. Glaser and A. L. Strauss. The discovery of grounded theory: Strategies for qualitative research. Aldine Transaction, Chicago, Illionios, 1967."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.243"},{"issue":"4","key":"e_1_3_2_1_23_1","first-page":"597","article-title":"Understanding reliability and validity in qualitative research","volume":"8","author":"Golafshani N.","year":"2003","unstructured":"N. Golafshani . Understanding reliability and validity in qualitative research . The Qualitative Report , 8 ( 4 ): 597 \u2013 607 , 2003 . N. Golafshani. Understanding reliability and validity in qualitative research. The Qualitative Report, 8(4):597\u2013607, 2003.","journal-title":"The Qualitative Report"},{"key":"e_1_3_2_1_24_1","first-page":"126","volume-title":"26th International Conference on Software Engineering","author":"Hasselbring W.","unstructured":"W. Hasselbring , R. Reussner , H. Jaekel , J. Schlegelmilch , T. Teschke , and S. Krieghoff . The dublo architecture pattern for smooth migration of business information systems: An experience report . In 26th International Conference on Software Engineering , pages 117\u2013 126 . IEEE, 2004. W. Hasselbring, R. Reussner, H. Jaekel, J. Schlegelmilch, T. Teschke, and S. Krieghoff. The dublo architecture pattern for smooth migration of business information systems: An experience report. In 26th International Conference on Software Engineering, pages 117\u2013126. IEEE, 2004."},{"key":"e_1_3_2_1_25_1","first-page":"70","volume-title":"AD Ionita, M. Litoiu, & G","author":"Khadka R.","unstructured":"R. Khadka , A. Saeidi , A. Idu , J. Hage , and S. Jansen . Legacy to SOA evolution: A systematic literature review . In In AD Ionita, M. Litoiu, & G . Lewis (Eds.) Migrating Legacy Applications : Challenges in Service Oriented Architecture and Cloud Computing Environments , pages 40\u2013 70 . IGI Global, 2013. R. Khadka, A. Saeidi, A. Idu, J. Hage, and S. Jansen. Legacy to SOA evolution: A systematic literature review. In In AD Ionita, M. Litoiu, & G. Lewis (Eds.) Migrating Legacy Applications: Challenges in Service Oriented Architecture and Cloud Computing Environments, pages 40\u201370. IGI Global, 2013."},{"key":"e_1_3_2_1_26_1","first-page":"432","volume-title":"20th Working Conference on Reverse Engineering","author":"Khadka R.","unstructured":"R. Khadka , A. Saeidi , S. Jansen , J. Hage , and G. Haas . Migrating a large scale legacy application to SOA: Challenges and lessons learned . In 20th Working Conference on Reverse Engineering , pages 425\u2013 432 . IEEE, 2013. R. Khadka, A. Saeidi, S. Jansen, J. Hage, and G. Haas. Migrating a large scale legacy application to SOA: Challenges and lessons learned. In 20th Working Conference on Reverse Engineering, pages 425\u2013432. IEEE, 2013."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/571681.571686"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.282"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/359511.359522"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134303"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581391"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.109"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1951640"},{"key":"e_1_3_2_1_34_1","volume-title":"NASCIO","author":"NASCIO.","year":"2008","unstructured":"NASCIO. Digital states at risk modernizing legacy systems. Technical report , NASCIO , 2008 . NASCIO. Digital states at risk modernizing legacy systems. Technical report, NASCIO, 2008."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.540"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/225014.225046"},{"key":"e_1_3_2_1_37_1","volume-title":"Springer","author":"Razavian M.","year":"2010","unstructured":"M. Razavian and P. Lago . A frame of reference for SOA migration. In Towards a Service-Based Internet, pages 150\u2013162 . Springer , 2010 . M. Razavian and P. Lago. A frame of reference for SOA migration. In Towards a Service-Based Internet, pages 150\u2013162. Springer, 2010."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25535-9_48"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9102-8"},{"key":"e_1_3_2_1_40_1","volume-title":"Modernizing legacy systems: Software technologies, engineering processes, and business practices","author":"Seacord R. C.","year":"2003","unstructured":"R. C. Seacord , D. Plakosh , and L. A. Grace . Modernizing legacy systems: Software technologies, engineering processes, and business practices . Addison-Wesley Professional , 2003 . R. C. Seacord, D. Plakosh, and L. A. Grace. Modernizing legacy systems: Software technologies, engineering processes, and business practices. Addison-Wesley Professional, 2003."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1984.234710"},{"key":"e_1_3_2_1_42_1","first-page":"211","volume-title":"6th Working Conference on Reverse Engineering","author":"Sneed H. M.","unstructured":"H. M. Sneed . Risks involved in reengineering projects . In 6th Working Conference on Reverse Engineering , pages 204\u2013 211 . IEEE, 1999. H. M. Sneed. Risks involved in reengineering projects. In 6th Working Conference on Reverse Engineering, pages 204\u2013211. IEEE, 1999."},{"key":"e_1_3_2_1_43_1","volume-title":"ISO","author":"RE.","year":"2011","unstructured":"SQua RE. Systems and software quality requirements and evaluation (SQuaRE)\u2013 system and software quality models. Standard ISO\/IEC 25010 , ISO , 2011 . SQuaRE. Systems and software quality requirements and evaluation (SQuaRE)\u2013 system and software quality models. Standard ISO\/IEC 25010, ISO, 2011."},{"key":"e_1_3_2_1_44_1","first-page":"329","volume-title":"18th International Conference on Software Maintenance","author":"Stroulia E.","unstructured":"E. Stroulia , M. El-Ramly , and P. Sorenson . From legacy to web through interaction modeling . In 18th International Conference on Software Maintenance , pages 320\u2013 329 . IEEE, 2002. E. Stroulia, M. El-Ramly, and P. Sorenson. From legacy to web through interaction modeling. In 18th International Conference on Software Maintenance, pages 320\u2013329. IEEE, 2002."},{"key":"e_1_3_2_1_45_1","volume-title":"The burden of legacy. Online: http:\/\/www.ncc.co.uk\/article\/?articleid=15665","author":"Sucharov T.","year":"2008","unstructured":"T. Sucharov and P. Rice . The burden of legacy. Online: http:\/\/www.ncc.co.uk\/article\/?articleid=15665 , 2008 . T. Sucharov and P. Rice. The burden of legacy. Online: http:\/\/www.ncc.co.uk\/article\/?articleid=15665, 2008."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1178625.1178626"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.08.002"},{"key":"e_1_3_2_1_48_1","first-page":"21","volume-title":"2nd International Conference on Fundamental Approaches to Software Engineering","author":"van Deursen A.","unstructured":"A. van Deursen , P. Klint , and C. Verhoef . Research issues in the renovation of legacy systems . In 2nd International Conference on Fundamental Approaches to Software Engineering , pages 1\u2013 21 . Springer, 1999. A. van Deursen, P. Klint, and C. Verhoef. Research issues in the renovation of legacy systems. In 2nd International Conference on Fundamental Approaches to Software Engineering, pages 1\u201321. Springer, 1999."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517570802442063"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.v16:4\/5"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/553441"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/225014.225045"},{"key":"e_1_3_2_1_53_1","volume-title":"DTIC Document","author":"Weiderman N. H.","year":"1997","unstructured":"N. H. Weiderman , J. K. Bergey , D. B. Smith , and S. R. Tilley . Approaches to legacy system evolution. TR CMU\/SEI-97-TR-O14 , DTIC Document , 1997 . N. H. Weiderman, J. K. Bergey, D. B. Smith, and S. R. Tilley. Approaches to legacy system evolution. TR CMU\/SEI-97-TR-O14, DTIC Document, 1997."},{"key":"e_1_3_2_1_54_1","first-page":"205","volume-title":"3rd IEEE International Conference on Engineering of Complex Computer Systems","author":"Wu B.","unstructured":"B. Wu , D. Lawless , J. Bisbal , R. Richardson , J. Grimson , V. Wade , and D. O Sullivan . The butterfly methodology: A gateway-free approach for migrating legacy information systems . In 3rd IEEE International Conference on Engineering of Complex Computer Systems , pages 200\u2013 205 . IEEE, 1997. B. Wu, D. Lawless, J. Bisbal, R. Richardson, J. Grimson, V. Wade, and D. OSullivan. The butterfly methodology: A gateway-free approach for migrating legacy information systems. In 3rd IEEE International Conference on Engineering of Complex Computer Systems, pages 200\u2013205. IEEE, 1997."}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","location":"Hyderabad India","acronym":"ICSE '14","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."]},"container-title":["Proceedings of the 36th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2568225.2568318","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2568225.2568318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:37Z","timestamp":1750230097000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2568225.2568318"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":54,"alternative-id":["10.1145\/2568225.2568318","10.1145\/2568225"],"URL":"https:\/\/doi.org\/10.1145\/2568225.2568318","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}