Legacy System Evaluation, Security Risks, And Continued Usage Acceptance