Migration of Applications and Information Systems to Cloud Computing Infrastructure: Lessons from a South African Retail Bank
DOI:
https://doi.org/10.25159/2663-659X/16035Keywords:
data migration, cloud computing infrastructure, information systems strategy, technology acceptance theories, legacy information systemsAbstract
The aim of this study was to investigate the benefits and challenges of moving information systems to the cloud infrastructure as part of phasing out legacy systems and preventing digital fraud. This study employed a qualitative research methodology and used interviews, observations and document analysis as data collection methods. It was confined to one bank and is therefore classified as a case study. To protect the identity of this organisation, the researcher gave it a pseudonym called SA Retail Bank. The study yielded three major findings. Migration of applications to a cloud environment is characterised by several unexpected technical, regulatory and people challenges. However, the migration yields operational benefits such as reducing fraud, quick recovering of stolen moneys, and advancing Fourth Industrial Revolution technologies. Technology acceptance theories should also be prioritised to get the support of both internal users and customers. The findings of this study present important lessons for digital businesses in South Africa and abroad. The research yielded theoretical and practical contributions. Recommendations were also made for future research.
References
Alharthi, D. 2023. “Secure Cloud Migration Strategy (SCMS): A Safe Journey to the Cloud.” International Conference on Cyber Warfare and Security 18 (1): 1–6. https://doi.org/10.34190/iccws.18.1.1038. DOI: https://doi.org/10.34190/iccws.18.1.1038
Bandari, V. 2022. “Optimising IT Modernisation Through Cloud Migration: Strategies for Secure, Efficient and Cost-Effective Transition.” Applied Research in Artificial Intelligence and Cloud Computing 5 (1): 66–83.
Bogoviz, A. V., and Y. V. Ragulina (Eds.). 2020. Industry Competitiveness: Digitalization, Management, and Integration. Springer. https://doi.org/10.1007/978-3-030-40749-0. DOI: https://doi.org/10.1007/978-3-030-40749-0
Dagada, R. 2013. “Digital Banking Security, Risk and Credibility Concerns in South Africa.” Digital Banking Security 10 (3): 148–49.
Dagada, R. 2021. Digital Commerce Governance in the Era of Fourth Industrial Revolution in South Africa. Unisa.
Dagada, R. 2024. “Will Employees and Technology Continue to Coexist Despite Historic Tensions? African Journal of Employee Relations. https://doi.org/10.25159/2664-3731/13466. DOI: https://doi.org/10.25159/2664-3731/13466
Diamandis, P. H., and S. Kotler. 2020. The Future Is Faster Than You Think: How Converging Technologies Are Transforming Business, Industries, and Our Lives. Simon and Schuster.
Grabs, J., and S. L. Carodenuto. 2021. “Traders as Sustainability Governance Actors in Global Food Supply Chains: A Research Agenda.” Business Strategy and the Environment 30 (2): 1314–32. https://doi.org/10.1002/bse.2686. DOI: https://doi.org/10.1002/bse.2686
Greenhalgh, T., and R. Taylor. 1997. “How to Read a Paper: Papers That Go Beyond Numbers (Qualitative Research).” BMJ 315 (7110): 740–3. https://doi.org/10.1136/bmj.315.7110.740. DOI: https://doi.org/10.1136/bmj.315.7110.740
Hasan, M. H., M. H. Osma, N. I. Admodisastro, and M. F. Muhammad. 2023. “Legacy Systems to Cloud Migration: A Review from the Architectural Perspective.” Journal of Systems and Software, 202: 111702. https://doi.org/10.1016/j.jss.2023.111702. DOI: https://doi.org/10.1016/j.jss.2023.111702
Jangjou, M., and M. K. Sohrabi. 2022. “A Comprehensive Survey on Security Challenges in Different Network Layers in Cloud Computing.” Archives of Computational Methods in Engineering 29 (6): 3587–608. https://doi.org/10.1007/s11831-022-09708-9. DOI: https://doi.org/10.1007/s11831-022-09708-9
Kenny, N., A. Doyle, and F. Horgan. 2023. “Transformation Inclusion: Differentiating Qualitative Research Methods to Support Participation for Individuals with Complex Communication or Cognitive Profiles.” International Journal of Qualitative Methods 22. https://doi.org/10.1177/16094069221146992. DOI: https://doi.org/10.1177/16094069221146992
Kunduru, A. R. 2023. “Artificial Intelligence Advantages in Cloud Fintech Application Security.” Central Asian Journal of Mathematical Theory and Computer Science 4 (8): 48–53. https://cajmtcs.centralasianstudies.org/index.php/CAJMTCS/article/view/492.
Lanza, N. “The Ultimate Guide to Banking in the Cloud.” Accenture, 18 July 2022, https://bankingblog.accenture.com/the-ultimate-guide-to-banking-in-the-Cloud.
Li, Y., and S. Zhang. 2022. “Qualitative Data Analysis.” Applied Research Methods in Urban and Regional Planning 149–65. https://doi.org/10.1007/978-3-030-93574-0_8. DOI: https://doi.org/10.1007/978-3-030-93574-0_8
Mangalagowri, R., and R. Venkataraman. 2023. “Ensure Secured Data Transmission During Virtual Machine Migration Over Cloud Computing Environment.” International Journal of System Assurance Engineering and Management 1–12. https://doi.org/10.1007/s13198-022-01834-8. DOI: https://doi.org/10.1007/s13198-022-01834-8
Merriam, B. S. 1998. Qualitative Research and Case Study Applications in Education. Jossey-Bass.
Saidi, K., and D. Bardou. 2023. “Task Scheduling and VM Placement to Resource Allocation in Cloud Computing: Challenges and Opportunities.” Cluster Computing 26 (5): 3069–87. https://doi.org/10.1007/s10586-023-04098-4. DOI: https://doi.org/10.1007/s10586-023-04098-4
Shaikh, I., and M. Anwar. 2023. “Digital Bank Transactions and Performance of the Indian Banking Sector.” Applied Economics 55 (8): 839–52. https://doi.org/10.1080/00036846.2022.2094880. DOI: https://doi.org/10.1080/00036846.2022.2094880
Shrivastava, S. R., and P. S. Shrivastava. 2023. “Data Collection Process in Qualitative Research: Challenges and Potential Solutions.” Medical Journal of Dr.DY Patil Vidyapeeth 16 (3): 443–5. https://doi.org/10.4103/mjdrdypu.mjdrdypu_871_21. DOI: https://doi.org/10.4103/mjdrdypu.mjdrdypu_871_21
Stephanou, T., and R. Dagada, “The Impact of Information Security Awareness Training on Information Security Behavior: The Case of Further Research,” paper presented at the ISSA 2008 Conference, University of Johannesburg, 2–4 July 2008.