Factors shaping vendor differentiation in the Business Intelligence software industry
DOI:
https://doi.org/10.37380/jisib.v2i3.48Keywords:
Business Intelligence, Software production, Application Integration, Pricing Strategies, Security Issues, DefinitionsAbstract
This paper is investigating, through a mixed-method research combining interviews and an online survey, how BI vendors differentiate themselves when it comes to application integration, security issues and pricing strategies. The conclusion is that BI vendors differentiated themselves mainly by having individual definitions of what BI is. Buyers are therefore advised to compare vendors through the vendor’s definition of Business Intelligence. Security issues were mainly user centric and pricing strategies implied that vendors approach buyers in a similar way where they offered standardized software bundles that would require some degree of customization in order for the buyer to derive the maximum benefit from the applications. It can be deduced from the obtained results that most competitive BI vendors are acting more homogenous towards buyers when they offer their products and handle customers, compared to niche BI vendors.References
Ballard, C., White, C., McDonald, S., Myllymaki, J., McDowell, S., Goerlich, O., et al. (2005). Business Performance Management...Meets Business Intelligence. North Castle Drive Armonk: IBM Redbooks.
Bennet, M. P., & Kosc, J. (2002). The Basics of Software Licensing. Journal of Investment Compliance, Vol. 2, No. 4, pp. 18-29.
Bhingarde, N., Arora, H., & Simon, E. (2008). SaaS and Corporate Actions. Wall Street & Technology, Vol. 26, No.1, p. 36.
Blansfield, D. (2003). A New Urgency. Business Performance Management, pp. 4-5.
Bontis, N., & Chung, H. (2000). The evolution of software pricing: from box licenses to application service provider models. Internet Research: Electronic Networking Applications and Policy, Vol. 10 No. 3, pp. 246-255.
Bose, R. (2006). Understanding management data systems for enterprise performance management. Industrial Management & Data Systems, Vol. 106 No. 1, pp. 43-59.
Chou, D. C., Tripuramallu, H. B., & Chou, A. Y. (2005). BI and ERP integration. Information Management & Computer Security, Vol. 13 No. 5, pp. 340-349.
Clifton, H. D., & Sutcliffe, A. G. (1990). Business Information Systems. Hemel Hempstead, Hertfordshire, UK: Prentice Hall.
Denning, D. E. (1999). Information Warfare and Security. Addison-Wesley: New York.
Fuld, L. (1991). A Receipe for Business Intelligence Success. The Journal of Business Strategy, pp. 12-18.
Gulledge, T. (2006). What is integration? Industrial Management & Data Systems, Vol. 106 No.1, pp. 5-20.
Hedgebeth, D. (2007). Data-driven decision making for the enterprise: an overview of business intelligence applications. VINE: The journal of information and knowledge management systems, Vol. 37 No. 4, pp. 414-420.
Howson, C. (2008). Successful Business Intelligence - Secrets to Making BI a Killer App. Columbus, OH: McGraw-Hill.
Indart, B. (2006). Operationalizing Business Intelligence - Turning Insight into Action. Business Intelligence Journal, Vol. 11 No. 2, pp. 35-38.
Langit, L. (2007). Foundations of SQL Server 2005 Business Intelligence. Berkeley, CA: Apress.
Lashar, D. J. (2008). Are You Ready for SaaS? Customer Relationship Management, Vol. 12, No. 2, pp. 12.
Lee, R. G., & Dale, B. G. (1998). Business process management: a review and evaluation. Business Process Management Journal, Vol. 4 No. 3, pp. 214-225.
Liebowitz, J. (1999). Knowledge Management Handbook. Boca Raton, FL: CRC Press LLC.
Loshin, D. (2003). Business Intelligence - The Savvy Manager's Guide. San Francisco: Morgan Kaufmann Publishers.
PricewaterhouseCooper (2007), Software Pricing Trends: How vendors can capitalize on the shift to new revenue models, Retrieved June 20, 2008, from http://www.pwc.com/
Rasmussen, N. H., Goldy, P. S., & Solli, P. O. (2002). Financial Business Intelligence. New York: John Wiley & Sons, Inc.
Sanderson, E., & Forcht, K. A. (1996). Information security in business environments. Information Management & Computer Security, Vol. 4, No. 1, S. pp. 32-37.
Solberg Søilen, K. (2005). Introduction to Private and Public Intelligence. Lund, Sweden: Studentlitteratur.
Wright, S., & Calof, J. L. (2006). The quest for competitive, business and marketing intelligence. European Journal of Marketing, Vol. 40 No. 5/6, pp. 453-465.
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).