×

Methodology for Selecting Software Packages  

December 31, 2020

Package Selection Best Practices

In the USA, up until 1980’s, most software systems were developed in-house. Most executives point of view was, “our business is different, and we must develop our own software to maintain competitive advantage”. Then came reality, most of the largest software development projects failed to meet the budget and timeline, and often received negative feedback from the users regarding the functionality or ease of use. Some of the software products like Oracle and SAP ERP systems, demonstrated advance capabilities, many organizations either purchased the software or outsourced their software development to specialized software suppliers like IBM. Most software products were, however, still developed as unique systems for each organization; that is, there was little standardization. Software vendors like Oracle and SAP, utilized standardized business process for their own proprietary software. However, these solutions often required specialized skills to modify the code or for customizing the software. This standardization process however, also benefitted software buyers by lowering transaction costs and risks, as it was now possible to choose among a proven set of applications. Moreover, standardization gave both vendors and buyers of software a way to capture and black-box best practices by embedding it into the standardized components of the system. These vendors proprietary standard systems however, essentially locked customers to a single software vendor to open software standards. In principle, software built on open standards allowed customers to source from any supplier that could supply software in accordance with open standards (for example, Java- and XML-based systems).

Open standards meant that prices dropped and functionality was enhanced, which resulted in a mass market for many software application types. In addition, software vendors had enough resources to make their software even more general-purpose oriented with larger feature sets that were organized into a product.  Software became even more standardized, and in the process, many local markets were annexed into global markets. For example, word processing software like Microsoft Word, was no longer produced specifically for a particular profession or industry or nation; instead, an almost universal office suite emerged, such as, Microsoft Office. The generalized software products could be configured in various ways (for example, program parameters, macro functionality, language support, and so on) to suit special needs among customers. These highly configurable general purpose software products came to be known as software packages.

Until recently in the IS academic community, there has been a tendency to focus on traditional studies of software development and implementation of large custom-made systems. This has been despite the leading trend that organizations use "shrink wrapped" or “Commercially available of the Shelf Software (COTS) systems where the core functionalities of the software are identical across all implementations in dozens, thousands or even millions of different organizations. When it comes to managing the process of identifying and evaluating packages, the IS academic community did not offer any education.

The aim of this article is to provide practitioners with a grounded set of principles to guide the selection of software packages. By principles, we mean a set of fundamental ideas that summarize important insights in software package acquisition that are not (yet) embedded into the practice of buying software. The principles are interdependent and together they form a whole that is larger than the sum of the parts.

 

Packaged software is a category of information systems for which all implementations are essentially similar; that is, the main functionalities may be common to all adopters. While the core components of a package are identical across all user organizations, the implementation into an individual organizational information infrastructure is usually configured in some manner to fit the requirements of the organization. For the purpose of this article, we define a standard software package as: a collection of software components which when combined perform a set of generalized tasks that are applicable to a range of users. As a package is adopted by many, it forms a standard because the core components are identical across all of its installations. The software package may be configured or customized to make it fit with specific requirements unique to the concrete implementation. This is accomplished by setting program parameters, installing add-on modules, or building interfaces with other software systems. Within an organization, the growing importance of system interconnections means the choice of software package has wide ripple effects for other parts of the organization whose software packages, implementations, and interests may not originally have been identified or considered in the decision process regarding a new software acquisition.

Packages are often referred to as "commercial off-the-shelf" or COTS software, but open source systems (for example, Open Office) or other types of nominally free software, for example, Firefox or Internet residing systems (for example, Google Apps) are other examples of packaged software. Some standard software packages require little adjustment on the part of the user before they can perform (for example, Internet Explorer), while other software packages are mere tools or platforms on top of which specific functionalities required by the user can be implemented (for example, ERP systems). Some setups of parameters may be common among several customers, in which case the vendor can offer standard solutions on top of which only site-specific configurations need to be made. For example, the ERP vendors like SAP and NKSoft nERP provides more than 25 industry solution portfolios for large enterprises that embed best practice (for example, SAP for oil and gas).

Methodology for Selecting Software Packages

In this article, we present the guiding methodology for making a better informed choice when selecting software packages. The methodology we label the founding principle because it is fundamental to the other six. For each methodology we provide examples that illustrate its importance.

The seven steps within our methodology were derived from utilizing the methods for our customers over the last 27 years and from our understanding of software acquisition. This approach provided us with in-depth knowledge of a number of standards decisions made by actual organizations. Our customers are mostly companies with $600M to $50B in revenue with 5,000 to 150,000 employees.

 

The First Step or “Fundamental Principle”: When you buy COTS software you join its network.

Prior to the emergence of packaged software, any organization that was using software in effect committed itself not only to a software product but also to a particular software vendor's continued ability to deliver new functionalities, as organizational requirements evolved and new technology became available. In the present day, most of these commitments and dependencies have evolved from local software vendors to global standard software packages that can be sourced from, and configured by, many independent software vendors with the necessary competences and technical skills.

The users and vendors of a software package constitute a network of parties that share a common interest in its destiny. The network is virtual, in the sense that the members probably do not know each other but nevertheless share a common interest in protecting their investments and ensuring the continued evolution of the package. The network indirectly also has other interests in common; for example, the training and education of personnel. An organization's purchase and implementation of a particular software package thus means that the organization has joined the network associated with the software package, and the level of commitment is equal to the size of the investment (buying and configuring the software and the training of personnel, and so on). To a large extent, the investment represents sunk costs, which make risk mitigation activities even more central.

The users and vendors of a software package constitute a network of parties that share a common interest in its destiny.

Open source packages, on the contrary, are not owned by a single entity; instead, the software is designed specifically to promote shared ownership. Open source software can appear unattractive and risky to some because there is no central point of control from which advice about the software package and its future development can be sought. Others view these properties as strengths since they protect the standard package from the opportunistic actions of profit maximizing software vendors. We shall not conclude the heated debate over open source here, but merely emphasise that organizations adopting a software package need to be alerted to the intimate connection between a software package and its associated network.

Step Two: Take a long-term perspective: Look ahead but reason back.

Many choices made in the early stages of an organization's use of computers have turned out to have surprisingly long-lasting consequences, as both software and data standards have been shown to be very persistent. Many application types have historically developed in an evolutionary manner, where the first simple implementations were custom built by innovators, and then spread to a small number of early adopters. As the application type benefited its adopters, competing systems became available on the market, and finally the application type became a commodity, possibly to be bundled with other software application types into larger software packages. A similar evolution trajectory will likely describe the development of future application types that first appear as isolated systems. As a consequence, organizations must take a long-term perspective and envision a more complex and connected future, or else they risk implementing tomorrow's legacy systems.

We emphasize this long-term perspective of software packages. As the pace of change in the computer industry reduces the effective lifespan of most hardware and software to a few years, the organizational data and the standards that define them are more durable. An organization's standard package choice therefore involves participation in networks that may last a decade or often longer. This step is useful to include when comparing a proprietary software package from a local vendor with that of a software package built upon an open global standard.

Step Three: When choosing packaged software, there is safety in numbers.

 

One route to mitigating the perceived risk in purchasing packaged software is to choose a package based on its historical and current success, as measured by the financial success of the software package's vendor and the size of the associated network. Flocking behavior is a low risk strategy that is worth pursuing for software support of non-core functionality and for companies that consider themselves followers. Below, we describe two scenarios representing opposite outcomes of a competition between software packages; namely, blind alleys and one-way streets.

The blind alley scenario refers to the situation where an organization has adopted a package that is losing its market share to competing packages. In a special case of the blind alley scenario (for example i2 Software in early year 2000), the losing package manages to capture a niche market network where it may sustain itself for years or even perpetually, giving organizations the choice of staying with the incumbent vendor or giving them time to look for migration paths toward a standard package with more perceived vitality.

The one-way street scenario describes the situation where the organization is left with little choice when it comes to buying upgrades or expansions to the package. This is the case when the purchase of a particular package in effect obliges the organization to place future purchases with the same software family because the product has low compatibility with other families of software or packages. In this situation, the organization may find itself chained to the vendor because the costs involved in switching to another package are prohibitively high, and the organization is in effect locked-in. This is quite common for ERP systems where once the initial choice between (for example, Oracle Financial Systems and SAP), has been made, it becomes prohibitively expensive to switch. Sometimes, a package may be so successful in the market that there are few if any viable alternative products available to the organization, an example of which is the current choice of operating systems for PCs being limited to Microsoft Windows, creating a near monopoly. However monopolies are constantly challenged and they are often short lived in the software business, as we saw i2, Netscape and dBase lost their lucrative position in the market.

 

Step Four: Focus on compatibility

Because of the long life expectancy of organizational data stored in some (often proprietary) format (see Principle Two), backward compatibility between software systems becomes a major factor when organizations consider new software investments. Sometimes software adheres to one common standard, enabling user organizations to choose among competing packages based on features such as price, performance, usability, etc. Most often, however, compatibility is not a clear binary issue. As standards and packages evolve and vendors compete against each other, packages may converge or diverge on some features, such as, reaching or breaking compatibility. Of course, this development can be caused by legitimate technical design and implementation decisions, but it may also be caused by the vendor's perceived advantage in changing the degree of compatibility or interoperability with competing packages.

A vendor may differentiate its package from the competition by adding proprietary features and unwarranted proprietary extensions to an open standard. There are some calls for the execution of this predatory business technique of "embrace, extend, and extinguish," and often Microsoft is associated with an almost flawless execution of the technique. Only the lawsuits that doubtlessly follow spoil the perfection. One historical example is the fight between Sun and Microsoft over Java and extensions to Java. The practice of adding proprietary extensions to an (open) standard is successful when some adopters find the proprietary features attractive and implement them. However, it is important to be aware that proprietary features that might be useful for the singular adopter are in fact false gold for the network at large. Every time a proprietary feature is implemented it adds to the switching costs, meaning that it will be harder to pull away from the software package that embeds the proprietary extensions. For the network, it means that proprietary features become entrenched as de facto standards, and for the community in general, it becomes an insurmountable barrier to change, thus diminishing the value of a standard.

Organizations should keep their options open by buying packaged software that is close to compatible standards; and if they are already using proprietary standard packages, they should keep their eyes open for gateway standards as a way to break an existing lock-in to a proprietary extension. At the very least, organizations should be conscious of the adoption of proprietary extensions, document their use in the organization, and consider which steps will be necessary to discontinue their use in the future; that is, a viable exit strategy.

Generic COTs software packages do not meet all the requirements of an organization; there are therefore plenty of options offered as part of the package to configure it as needed. Often local practices or cultural issues add to the desire to customize or localize the package. Customization is different from configuration in that customization is more radical and adds functionality that was not an intended generic feature in the original package. Customization is more lucrative for local software vendors compared to selling the package itself. For the adopting organization, the option to customize may appear shiny, but for several reasons, could turn out to be false gold. First of all, the customization is often expensive and represents sunk costs that, in practice, limit the choices when the package or service contract is up for renewal. Second, when upgrading the software to the next version, usually all customization have to be re-implemented. In addition, the new features of the next version are obviously not part of the customization that was implemented from the previous version.8 Beatty and Williams5 recommend "un-customizing customizations" before any upgrade is attempted because they are found to form major technical obstacles and are the main threat to achieving a Return on Investment. Instead, we propose that an upgrade is an opportunity to review critically existing customizations in order to determine whether they are really needed, and if so, to determine if they are supported in the new version and eligible for elimination. In line with this, we advocate avoiding any comprehensive customization of packaged software, unless absolutely necessary.

 

Step Five: Choose a software package with accessible knowledge.

When an organization chooses to use custom-built software, it must carry the entire burden of training and retaining personnel to develop the necessary skills to use the software. The use of packages, however, promises access to knowledge of the package's application and implementation. Ideally, the network of organizations using a package is matched by a network of individuals competent in configuring and using it, but often the supply and demand of certain skills is not aligned, as is pointed out by Light. If there is an unmet demand for knowledge and skills, both user and vendor organizations suffer. One historical example of misaligned networks is that of ERP systems, where the number of people with knowledge and skills of the configuration of SAP systems is far less than the demand from user organizations. The result is disproportionately high costs for the people component of SAP implementations and delayed projects with reduced or poor functionality.

Vendors employ various strategies for ensuring a pool of knowledgeable users for their software.11 One strategy is to produce free or low cost versions so that interested people will be more likely to sample it. Another variation is to make "academic versions" of the software package available as free downloads, or to bundle the package with textbooks used in educational institutions. The process of institutionalizing skills is more complex for packages based on open source (sendmail, emacs, Linux, among others), where there may be no single trusted certifying institution corresponding to the owner or vendor of a package. Instead, other forms of legitimization are used, such as a person's rank in recommender-systems such as discussion Web sites. Such online networks also make it possible to determine the contributions of a particular member, enabling potential employers to retrieve an account of a person's skills in regard to a particular software package.

The co-development of the two networks (that of the vendors and that of the users) has high path dependence to the point of being quasi irreversible. For a new competing software package that starts with essentially no network; the existing network forms a formidable entry barrier that is difficult to break.6 If the new package is proprietary and the owners are willing to invest, one way for the new standard package to achieve a critical mass of users is for the owner to bear some or all of the costs for the organizations willing to switch. An alternative approach is to invest in building gateway features into the new standard package, thus easing the transition from an incumbent package.  When Microsoft Word was winning over the majority of the word processing market from WordPerfect in the first half of the 1990s, Microsoft sought to circumvent the knowledge barriers by providing WordPerfect users an easy passage. Microsoft Word featured two gateways: an alternative user interface where Microsoft Word could be made to emulate the keyboard shortcuts of WordPerfect, and "Help for WordPerfect users" where the use of Microsoft Word was explained in terms that WordPerfect users were accustomed to. We suggest using this principle to assess the available knowledge base for the software package.

 

Step Six: Choose packaged software with the right type of standardization.

Standardization can be achieved at various levels and in many forms in packaged software. Here, we provide an overview of the most common types of standardization because it is important to choose the type that is right for the particular organization, according to its available resources and constraints.

Standardization of user interface is a common strategy employed to limit the need for user training. After some experimental implementations of information systems of a particular type, a dominant design typically emerges, resulting in striking similarities of user interfaces among different software systems. Referring to Web site design users spend most of their time on other sites, and therefore prefer new Web sites to be designed similar to the sites with which they are familiar. Dominant designs sometimes become static and end up as anachronisms when the surroundings change. For example, the diskette icon featured in most software applications invokes the "save" function, even though no files are ever saved to diskettes and personal computers no longer have disk drives.

In standardization of output, the software package's only compatibility restraint is that it must produce an output that can be used by recipient users or software. One example is that of Web page production, where different departments in an organization may use very different production techniques as long as their Web pages satisfy agreed-upon requirements. This standardization strategy has the strength of allowing users greater freedom to optimize and personalize their production methods. The strategy also has serious drawbacks if the users ever need to share intermediate data; we would thus not recommend this strategy for most organizational standardization issues.

An organization might choose standardization of data structure for one of two reasons: seeking backward compatibility with data stored in legacy systems, or seeking to ensure access to the data from other information systems in the future; that is, forward compatibility. By choosing an open standard, an organization can usually choose between numerous compatible software packages, thus bringing the simple advantage of choice. The disadvantage is that the user organization must abstain from using any proprietary features or extensions of the packages chosen (the false gold mentioned in Principle Four) in order to maintain strict data standardization. Examples of data standards with wide vendor support are the all-purpose information formatting languages XML and the database query language SQL, although both are also subject to standard deviations among the implementations from various vendors.

By choosing an open standard, an organization can usually choose between numerous compatible software packages, thus bringing the simple advantage of choice.

More advanced modes of standardization of data interfaces include interconnectivity and interoperability. Interoperable information systems are able to communicate during the execution of a particular task. An everyday example is that the functionality of an electronic spreadsheet program can be employed by a word processing program to perform a calculation inside a text document. More advanced implementations allow interoperability between software running on separate computers - even in different locations or organizations such as most Web services organized in serviced oriented architectures (SOA). Features such as these will have far-reaching implications for the implementation of standard software packages and inter-organizational information systems in the coming years.

 

Organizations may choose standardization of skills by employing only people with a particular education or skill set, or if necessary, to carry the cost of training new employees to some formalized level of training (see Step Five). Organizations can choose to standardize two types of skills: generic or specific skills. Generic skills are skills that are acquired through education, such as critical thinking, programming, business knowledge, and so on specific skills encompass a user's qualifications with a particular software package, and these may be certified by the product's vendor or a trusted third party (see Step Five). Every major vendor in the packaged software market has such certification programs, and many are even updated on a continual basis, forcing certificate holders to take new exams in order to preserve their status.

One might argue that if all are using the same standard software package, where does competitive advantage come from? As a rule of thumb, we recommend organizations to follow and standardize in all non-core areas to bring down costs, and in order to differentiate themselves, organizations must be prepared to lead (be an early adopter) and tolerate a higher degree of standard uncertainty in core areas. We will return to the issue of competitive advantage in the conclusion.

 

Step Seven: All journeys start with a first step.

In a market of fast update cycles and many options, some buyers may assume a wait-and-see position, while they let the rest of the market test out competing products, determine the necessary feature sets, and so on. Of course, this strategy will mitigate the risks of investing time and money in a software package which later loses in the market, but we advise organizations not to fall into the wait-and-see trap for the following two reasons. First, a winner will only emerge when organizations actually buy software, so an organization stands a greater chance of finding software that fits its needs if it plays an active role in the selection process (invest in the package).

We promote a view of buying software as a continuous process of constantly trying to match available packages with a base of already installed information systems, while anticipating future organizational needs and advantages in technology.

Second, the further development of packages is inevitable, and thus it is very likely that while an organization is waiting for a package to appear in the marketplace for a perfect fit, its requirements may have changed. In fact, it may never be possible to find a perfect match.36 After a prolonged sampling process and the organization finally selecting a software package, activities such as conversion of legacy data may turn into considerable tasks, as there may be no personnel with expertise in both the legacy system and the new software package. Therefore, the best strategy to ensure that a better package is there tomorrow is to adopt its predecessor today by joining its network. Being part of the network will also ensure that special needs are noted and incorporated into the next version of the package.


Conclusion

Software packages are often the choice for most of the largest companies in the world. Yet, there is little available advice on how to evaluate and choose among the offered packages. This article highlights seven steps that are related to selecting and assessing software packages. The steps extend beyond the two obvious but narrow factors of price and immediate features, to include a wider networked and multilateral view of software packages. We promote a view of buying software as a continuous process of constantly trying to match available packages with a base of already installed information systems, while anticipating future organizational needs and advantages in technology. Companies should seek to select the package that fits their situation. However, this is not a unilateral decision, as other companies' actions also contribute to the destiny of the package. Software packages are networked and built around standards that allow (and disallow) connection to other software systems and these considerations must be added to the equation, too. It is therefore necessary to adopt a multilateral approach that asserts the benefits of participation from as many parties as possible in the selection process.

The proposed steps are useful in several ways. First, they form a reference point for IT managers when engaging in software acquisition. Second, without the steps, IT managers would have to spend much time condensing these foundations from available theoretical and empirical sources. Third, the steps help IT managers ensure that vital aspects of the software package acquisition process have not been left out or neglected. Finally, the set of steps is an invitation to formulate a disagreement and start a discussion on what constitutes sound software acquisition practices.

Here is a checklist that IT managers can consider in addition to the usual technical features and price, when evaluating a software package purchase:

    • 1.       Identify the COTS vendors for your industry and functionality you are seeking?
    • 2.       How many companies are already using the COTS package?
    • 3.       How many integrator can configure the COTS package?
    • 4.       What is the history of the COTS package?
    • 5.       Is the COTS built upon open standards?
    • 6.       How does it fit with other systems?
    • 7.       What kind of standardization does the package represent?
    • 8.       Is customization of the package necessary?
    • 9.       Is there an accessible knowledge base for the implementation and exploitation of the package?
    • 10.   What are the costs of switching to an alternative package?
    • 11.   What are the implications of postponing a decision to adopt?
    • 12.   In what direction is the package evolving? And is our company headed the same way?

 

The steps outlined in the article can be used prior to making an investment and be used to monitor the vitality of existing packages.