Evaluation of ICT Migration Plans in a Select Number of Companies in South Africa
Abstract
The rapid evolution of the Information and Communication Technology (ICT) industry has made ICT migration a critical component for companies seeking to enhance productivity, efficiency, and competitiveness. However, migration often presents challenges, including high costs, system compatibility issues, cybersecurity risks, and employee resistance to change. This study evaluates the ICT migration plans of selected companies in South Africa, examining their strategies, challenges, and overall effectiveness.
Using a mixed-methods approach, the research integrates qualitative and quantitative data collected through interviews, surveys, and document analysis. Companies are selected through purposive sampling to ensure diversity in industry, size, and ICT readiness. The study focuses on analyzing existing ICT infrastructure, identifying migration obstacles, assessing the success of implemented plans, and providing recommendations for improvement. Key assessment areas include cost-effectiveness, system scalability, cybersecurity measures, employee training, and post-migration performance. The findings of this study will contribute to the existing literature on ICT migration while offering practical insights for businesses aiming to implement or refine their migration strategies. Additionally, it will provide valuable recommendations for industries and IT professionals, facilitating smoother and more efficient ICT transitions in South Africa.
Downloads
References
W. F. Cascio, “Changes in workers, work, and organizations,” in Handbook of Psychology, vol. 12, 2003, pp. 401–422.
P. Mikalef and M. Gupta, “Artificial intelligence capability: Conceptualization, measurement calibration, and empirical study on its impact on organizational creativity and firm performance,” Inf. Manag., vol. 58, no. 3, p. 103434, 2021.
D. Al Kez et al., “Exploring the sustainability challenges facing digitalization and internet data centers,” J. Clean. Prod., vol. 371, p. 133633, 2022.
M. F. Gholami et al., “Challenges in migrating legacy software systems to the cloud—an empirical study,” Inf. Syst., vol. 67, pp. 100–113, 2017.
M. Liyanage et al., “Driving forces for multi-access edge computing (MEC) IoT integration in 5G,” ICT Express, vol. 7, no. 2, pp. 127–137, 2021.
N. Alsharari, “The implementation of enterprise resource planning (ERP) in the United Arab Emirates: A case of Musanada Corporation,” Int. J. Technol. Innov. Manag. (IJTIM), vol. 2, no. 1, 2022.
M. Kremers and H. Van Dissel, “Enterprise resource planning: ERP system migrations,” Commun. ACM, vol. 43, no. 4, pp. 53–56, 2000.
D. De Savigny and T. Adam, Systems Thinking for Health Systems Strengthening. World Health Organization, 2009.
B. Johansson et al., “Cloud ERP adoption opportunities and concerns: The role of organizational size,” in Proc. 48th Hawaii Int. Conf. Syst. Sci., 2015, pp. 1–10.
P. M. Bednar and C. Welch, “Socio-technical perspectives on smart working: Creating meaningful and sustainable systems,” Inf. Syst. Front., vol. 22, no. 2, pp. 281–298, 2020.
S. Malla and K. Christensen, “A survey on power management techniques for oversubscription of multi-tenant data centers,” ACM Comput. Surv. (CSUR), vol. 52, no. 1, pp. 1–31, 2019.
N. S. Madonsela, “Integration of the management information system for competitive positioning,” Procedia Manuf., vol. 43, pp. 375–382, 2020.
N. Ahmad, Q. N. Naveed, and N. Hoda, “Strategy and procedures for migration to the cloud computing,” in Proc. IEEE 5th Int. Conf. Eng. Technol. Appl. Sci. (ICETAS), 2018, pp. 1–6.
Q. He, J. Xu, T. Wang, and A. P. C. Chan, “Identifying the driving factors of successful megaproject construction management: Findings from three Chinese cases,” Front. Eng. Manag., vol. 8, no. 1, pp. 5–16, 2021.
A. Adel, “Future of industry 5.0 in society: Human-centric solutions, challenges and prospective research areas,” J. Cloud Comput.: Adv. Syst. Appl., vol. 11, no. 40, pp. 1–15, 2022.
T. Hermans, Translation in Systems: Descriptive and Systemic Approaches Explained. Routledge, 2019.
Y. Huang et al., “SSUR: An approach to optimizing virtual machine allocation strategy based on user requirements for cloud data center,” IEEE Trans. Green Commun. Netw., vol. 5, no. 2, pp. 670–681, 2021.
S. Okuno, F. Iikura, and Y. Watanabe, “Maintenance scheduling for cloud infrastructure with timing constraints of live migration,” in Proc. IEEE Int. Conf. Cloud Eng. (IC2E), 2019, pp. 1–6.
E. A. Abioye et al., “IoT-based monitoring and data-driven modelling of drip irrigation system for mustard leaf cultivation experiment,” Inf. Process. Agric., vol. 8, no. 2, pp. 270–283, 2021.
D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Future Gener. Comput. Syst., vol. 28, no. 3, pp. 583–592, 2012.
G. Dutta et al., “Digital transformation priorities of India’s discrete manufacturing SMEs–A conceptual study in perspective of Industry 4.0,” Compet. Rev.: Int. Bus. J., 2020.
J. D. Wells, W. L. Fuerst, and J. Choobineh, “Managing information technology (IT) for one-to-one customer interaction,” Inf. Manag., vol. 35, no. 1, pp. 53–62, 1999.
E. I. Aghimien, L. M. Aghimien, O. O. Petinrin, and D. O. Aghimien, “High-performance computing for computational modelling in built environment-related studies–A scientometric review,” J. Eng. Des. Technol., vol. 19, no. 5, pp. 1138–1157, 2021.
R. Akhter and S. A. Sofi, “Precision agriculture using IoT data analytics and machine learning,” J. King Saud Univ.-Comput. Inf. Sci., vol. 34, no. 8, pp. 5602–5618, 2022.
F. Elegbeleye and B. Isong, “A systematic review of challenges in teaching and learning computer programming modules,” Indones. J. Comput. Sci., vol. 14, no. 1, 2025.
H. Al-Samarraie and N. Saeed, “A systematic review of cloud computing tools for collaborative learning: Opportunities and challenges to the blended-learning environment,” Comput. Educ., vol. 124, pp. 77–91, 2018.
C. Ma, M. Y. Cheok, and N. V. Chok, “Economic recovery through multisector management resources in small and medium businesses in China,” Resour. Policy, vol. 80, p. 103181, 2023.
I. Bassey et al., “RFID-based design-theoretical framework for combating police impersonation in South Africa,” in Proc. 2nd Int. Conf. Inf. Secur. Cyber Forensics (InfoSec), 2015, pp. 1–6.


Copyright (c) 2025 Journal of Information Systems and Informatics

This work is licensed under a Creative Commons Attribution 4.0 International License.
- I certify that I have read, understand and agreed to the Journal of Information Systems and Informatics (Journal-ISI) submission guidelines, policies and submission declaration. Submission already using the provided template.
- I certify that all authors have approved the publication of this and there is no conflict of interest.
- I confirm that the manuscript is the authors' original work and the manuscript has not received prior publication and is not under consideration for publication elsewhere and has not been previously published.
- I confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- I confirm that the paper now submitted is not copied or plagiarized version of some other published work.
- I declare that I shall not submit the paper for publication in any other Journal or Magazine till the decision is made by journal editors.
- If the paper is finally accepted by the journal for publication, I confirm that I will either publish the paper immediately or withdraw it according to withdrawal policies
- I Agree that the paper published by this journal, I transfer copyright or assign exclusive rights to the publisher (including commercial rights)