Single Window Systems
In the OIC Member States
99
5.1.4.
IT Architecture
Three challenges occur or relate to the IT architecture. The table below shows these challenges
and possible strategies and options to overcome these challenges.
Table 25: IT Architecture - Challenges and Options
Challenges
1. Inflexibility of IT Architecture
The IT architecture may not be flexible enough to adapt changes and re-use services. This makes
it costly to adapt a centralized architecture model to a decentralized environment, and
maintenance and changes come with high costs and risks if services are hardcoded
Currently, many SW software applications still rely on hardcoded services often due to
inheritance from legacy IT systems. In hardcoded software, the data is directly inputted into the
source code of SW software, instead of obtaining data from the common data repository.
Why does it matter?
Changes or integration of new functionalities with a hard coded approach is very costly and
complex. Changing hundreds of thousands lines of code with a many dependencies and linked
functionalities is an expensive and complex process that requires upmost effort, even for the most
skilled programmers.
2. Lack of Interoperability at the Data and Business Process Level
The IT architecture needs to have the ability to connect, integrate and support diverse and legacy
IT systems and applications. SWs therefore have to embed system-to-system connectivity or
services. This allows SWs to provide collaborative, networked and interconnected workflows and
business processes.
Interconnectivity has the following three dimensions:
process level whereby standardised and procedures build the foundation for a common
process and data model.
message interoperability whereby data is exchanged in a process based on the same
semantic structures and definitions.
technical interoperability, which translates into infrastructure requirements to support the
technical exchange of information.
Why does it matter?
The lack of interoperability is a major obstacle in view of compromising SW’s ability to provide
services, data and information to the users in a timely and accurate manner.
3. Ensure Data Protection
Security of the overall system and protection of stored data and data in transit is a crucial
requirement for SW. Data needs to be protected from unauthorized use with encryption