be noted that the research conducted only looked at
relevance, not at degree of importance.
Apart from completeness we predominantly
looked at relevance of the criteria that were identified.
There a more positive picture emerges. The nine new
criteria have been found without prompting and have
been used in practice for a concrete sourcing decision
within the target organization. That implies that they
are relevant and other organizations can consider
using them.
Likewise, eleven criteria emerged from the
interviews, which could be easily mapped on the
literature. For these a similar degree of confidence
can be expressed. Again these were found without
prompting and have already been used in a sourcing
decision practice. And they also have backing from
literature.
In the second part of the interviews we used the
list resulting from literature as input to the interviews.
Out of the fifteen remaining criteria, for thirteen
criteria examples were provided that they had been
used in an actual decision process. The evidence can
be considered slightly less strong since the
respondents required prompting for these criteria but
still examples of usage could be given. It is
reasonable to conclude that these criteria are also
relevant.
That leaves two criteria for which no actual usage
could be identified. However, L02 (Developing an
application on a de facto standard API protects the
application against changing supplier conditions) was
seen by all seven respondents to be a plausible
criterion nonetheless. This remarkable consensus
gives no evident reason to dismiss this criterion. L08
(lead time required to fix discovered vulnerabilities)
is also confirmed three times. All in all, there are
reasons to qualify the entire result as at least
‘plausible’.
Furthermore, the initial list presented in this study
is rather unrefined and needs additional processing.
Many criteria are overlapping and differ in the level
of abstraction and aggregation. E.g. criterion P04
rather broadly states the importance of “customer
wishes”. This is a more abstract formulation of the
very specifically formulated L20 (Government
requiring usage of specific accounting software).
L07, L08 and P09 all somehow focus on
vulnerabilities. L03 and L18 both consider license
issues. Because of this, the current set of criteria
cannot be seen as a set of independent criteria. Some
further classification is required. We decided against
doing so for the results of the literature study for two
reasons. One because the number of criteria resulting
was manageable and the other because we did not
want to run a risk of changing information by our
interpretations. The current list can be classified
further, but we decided to wait till additional criteria
have been identified.
Obviously, further research will be needed to
further validate this set of criteria and to add more
results and insights from practice. An ongoing effort
is required to discover more potentially useful
criteria, which may hopefully result in some sort of
saturation. After that the resulting list can be
classified in a more coherent and manageable form.
There is also the interesting aspect of (relative)
degree of importance of criteria. This is probably very
much context dependent and therefore local
assessment will be needed to make a “common
criteria list” operational in decision making practices
in software component sourcing. This would open up
a new line of research in which the decision making
process of the way in which software components are
sourced comes into focus.
REFERENCES
Bazeley, P., and Jackson, K. (Eds.). 2013. Qualitative data
analysis with NVivo. Sage Publications Limited.
Boehm, B., and Bhuta, J. 2008. Balancing opportunities and
risks in component-based software development. IEEE
Software, 25 (6), 56-63.
Chen, W., Li, J., Ma, J., Conradi, R., Ji, J., and Liu, C. 2007.
A survey of software development with open source
components in China's software industry. Lecture Notes
in Computer Science, Vol. LNCS 4470, pp. 208-220.
Cortellessa, V., Marinelli, F., and Potena, P. (2008). An
optimization framework for "build-or-buy" Decisions
in software architecture. Computers and Operations
Research, 35 (10), 3090 - 3106.
D’Souza D. F. and Wills A.C., 1997. Objects, Components,
And Frameworks with UML – the Catalysis Approach,
Addison-Wesley, Reading, Mass.
Daneshgar, F., Low, GC, and Worasinchai, L. 2013. An
investigation of "build vs. buy "decision for software
acquisition by small to medium enterprises.
Information and Software Technology, 55 (10), 1741-
1750.
Favaro, JM, Favaro, KR, and Favaro, PF. 1998. Value
based software reuse investment. Annals of Software
Engineering, 5 (1), 5-52.
Frakes, WB 2005. Software reuse research: status and
future. IEEE Transactions on Software Engineering, 31
(7), 529-536.
Jadhav AS, and Sonar RM 2011. Framework for evaluation
and selection of the software packages: A hybrid
knowledge based system approach. Journal of Systems
and Software,. 84 (8) 1394-1407.
Jha, PC, Bali, V., Narula, S., and Kalra, M. 2014. Optimal
component selection based on cohesion and coupling