skip to main content
article
Free Access

What is your software worth?

Published:01 September 2006Publication History
Skip Abstract Section

Abstract

By applying well-known principlesof intellectual property valuation,sales expectations, growth of maintained software, discounting to present value, and the like, a method is presented for valuingsoftware based on the income that use of the softwareis expected to generate in the future.

References

  1. Abba, W. Earned value management: Reconciling government and commercial practices. Program Manager 26, 58--69.]]Google ScholarGoogle Scholar
  2. Basili, V. Viewing maintenance as reuse-oriented software development. IEEE Software 7, 1 (Jan. 1990), 19--25.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Belady, L. and Lehman, M.M. An introduction to growth dynamics. Statistical Computer Performance Evaluation. W. Freiberger, Ed. Academic Press, 1972.]]Google ScholarGoogle Scholar
  4. Boehm, B. Software Engineering Economics. Prentice-Hall, 1981.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Damodaran, A. The Dark Side of Valuation: Valuing Old Tech, New Tech, and New Economy Companies. Prentice-Hall, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Glass, R.L. Facts and Fallacies of Software Engineering. Addison Wesley, Reading, PA. 2003.]]Google ScholarGoogle Scholar
  7. Jones, T.C. Estimating Software Costs. McGraw-Hill, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Lev, B. Intangibles, Management, Measurement and Reporting. Brookings Institution Press, 2001.]]Google ScholarGoogle Scholar
  9. Mahajan, V., Muller, E., and Wind, Y., Eds. New-Product Diffusion Models. International Series in Quantitative Marketing. Kluwer, 2000.]]Google ScholarGoogle Scholar
  10. Pigoski, T.M. Practical Software Maintenance---Best Practices for Managing Your Software Investment. IEEE Computer Society Press, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Smith, G. and Parr, R. Valuation of Intellectual Property and Intangible Assets, 3rd Edition. Wiley, 2000.]]Google ScholarGoogle Scholar
  12. Spolsky, J. Joel on Software. Apress, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. What is your software worth?

                  Recommendations

                  Reviews

                  Shantanu Bhattacharya

                  Software valuation is a complex task, since it involves the software's perceived value in the market, and the amount of returns the purchaser sees due to its usage. This article effectively and thoroughly covers some aspects of software valuation. Wiederhold discusses software valuation based on the size of the software, the functionality presented in the first version, and upgrades and maintenance. Some interesting facts about the relationship between the source lines of code (SLoC) and intellectual property (IP) value are mentioned. Software valuation also involves calculating the revenue generation potential of the software, which again depends on the window of opportunity and revenue gain brought by the software to the purchaser of the software. Often, this aspect is much more of a driving force than the SLoC and their relationship to the IP value. That is due to market forces being too dominant in deciding the valuation, and valuation being done at a time when the software is not yet ready. The cost of a software product often needs to be determined before its development, to determine its market potential. Online Computing Reviews Service

                  Access critical reviews of Computing literature here

                  Become a reviewer for Computing Reviews.

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in

                  Full Access

                  • Published in

                    cover image Communications of the ACM
                    Communications of the ACM  Volume 49, Issue 9
                    Privacy and security in highly dynamic systems
                    September 2006
                    100 pages
                    ISSN:0001-0782
                    EISSN:1557-7317
                    DOI:10.1145/1151030
                    Issue’s Table of Contents

                    Copyright © 2006 ACM

                    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 1 September 2006

                    Permissions

                    Request permissions about this article.

                    Request Permissions

                    Check for updates

                    Qualifiers

                    • article

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader

                  HTML Format

                  View this article in HTML Format .

                  View HTML Format