2. Bengtsson, M. (2016), “How to plan and perform a qualitative study using content analysis”, NursingPlus Open, Vol. 2, pp. 8-14.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.npls.2016.01.001" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.npls.2016.01.001</a></dgdoi:pub-id>
4. Berman, S., Marshall, A. (2014), “Reinventing the rules of engagement: three strategies for winning the information technology race”, Strategy & Leadership, Vol. 42, No. 4, pp. 22-32.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1108/SL-05-2014-0036" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1108/SL-05-2014-0036</a></dgdoi:pub-id>
5. Bharadwaj, A. S. (2000), “A Resource-Based Perspective on Information Technology Capability and Firm Performance: An Empirical Investigation”, MIS Quarterly, Vol. 24, No. 1, pp. 169-196.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.2307/3250983" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.2307/3250983</a></dgdoi:pub-id>
6. Bowen, G. A. (2009), “Document Analysis as a Qualitative Research Method”, Qualitative Research Journal, Vol. 9, No. 2, pp. 27-40.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.3316/QRJ0902027" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.3316/QRJ0902027</a></dgdoi:pub-id>
7. Brislin, R. W. (1979), “Translation and Content Analysis of Oral and Written”, in Triandis, H. C., Berry, J. W. (Eds.), Handbook of Cross-Cultural Psychology Volume 2: Methodology, Boston / MA, Allyn & Bacon, pp. 389-438.
8. Chadwick, B. A., Bahar, H. M., Albrecht, S. L. (1984), „Content analysis”, in Chadwick, B. A., Bahr, H. M., Albrecht, S. L. (Eds.), Social Science Research Methods, New Jersey, Prentice-Hall, pp. 239-257.
9. Chicksand, D., Rehme, J. (2018), “Total value in business relationships: exploring the link between power and value appropriation”, Journal of Business & Industrial Marketing, Vol. 33, No. 2, pp. 174-182.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1108/JBIM-05-2016-0100" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1108/JBIM-05-2016-0100</a></dgdoi:pub-id>
10. Christensen, H. K. (2010), “Defining customer value as the driver of competitive advantage”, Strategy & Leadership, Vol. 38, No. 5, pp. 20-25.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1108/10878571011072048" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1108/10878571011072048</a></dgdoi:pub-id>
11. Clemons, E. K., Row, M. C. (1991), “Sustaining IT Advantage: The Role of Structural Differences”, MIS Quarterly, Vol. 15, No. 3, pp. 275-292.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.2307/249639" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.2307/249639</a></dgdoi:pub-id>
12. Cohen, J., Cohen, P., West, S. G., Aiken, L. S. (2003), Applied multiple regression/correlation analysis for the behavioral sciences, 3rd edition, Hillsdale, Erlbaum.
14. Cronbach, L. J. (1951), “Coefficient alpha and the internal structure of tests”, Psychometrika, Vol. 16, No. 3, pp. 297-334.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1007/BF02310555" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1007/BF02310555</a></dgdoi:pub-id>
15. Daulatkar, S., Sangle, P. S. (2016), “Proposed re-conceptualization of IT business value benefits”, Business Process Management Journal, Vol. 22, No. 3, pp. 522-545.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1108/BPMJ-11-2014-0113" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1108/BPMJ-11-2014-0113</a></dgdoi:pub-id>
16. Dixon-Woods, M., Agarwal, S., Jones, D., Young, B., Sutton, A. (2005), “Synthesising qualitative and quantitative evidence: a review of possible methods”, Journal of Health Services Research & Policy, Vol. 10, No. 1, pp. 45-53.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1177/135581960501000110" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1177/135581960501000110</a></dgdoi:pub-id>
17. Downe-Wamboldt, B. (1992), “Content analysis: Method, applications, and issues”, Health care for women international, Vol. 13, No. 3, pp. 313-321.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1080/07399339209516006" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1080/07399339209516006</a></dgdoi:pub-id>
19. Drnevich, P. L., Croson, D. C. (2013), “Information Technology and Business-Level-Strategy”, MIS Quarterly, Vol. 37, No. 2, pp. 483-509.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.25300/MISQ/2013/37.2.08" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.25300/MISQ/2013/37.2.08</a></dgdoi:pub-id>
20. Duc, N. N., Siengthai, S., Page, S. (2013), “A conceptual model of HRIS-Trust: an understanding of suppliers’/customers’ relationship”, Foresight, Vol. 15, No. 2, pp. 106-116.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1108/14636681311321112" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1108/14636681311321112</a></dgdoi:pub-id>
21. El-Mekawy, M., Rusu, L., Perjons, E. (2015), “An evaluation framework for comparing business-IT alignment models: A tool for supporting collaborative learning in organizations”, Computers in Human Behavior, Vol. 51, pp. 1229-1241.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.chb.2014.12.016" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.chb.2014.12.016</a></dgdoi:pub-id>
23. Feeny, D. F., Willcocks, L. P. (1998), “Core IS Capabilities for Exploiting Information Technology”, Sloan Management Review, Vol. 39, No. 3, pp. 9-22.
24. Gandelman, R. T., Cappelli, C., Santoro, F. M. (2017), “Toward a Prescriptive Catalog for IT Value”, in Proceedings of the 10th IADIS International Conference on Information Systems, Budapest, Hungary, pp. 225-228.
25. Gellweiler, C. (2017), “Bridging IT requirements to competitive advantage: The concept of IT value planning”, Procedia Computer Science, Vol. 121, pp. 145-151.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.procs.2017.11.020" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.procs.2017.11.020</a></dgdoi:pub-id>
26. Goh, S. C., Ryan P. J. (2008), “The organizational performance of learning companies: A longitudinal and competitor analysis using market and accounting financial data”, The Learning Organization, Vol. 15, No. 3, pp. 225-239.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1108/09696470810868855" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1108/09696470810868855</a></dgdoi:pub-id>
27. Han, S., Kuruzovich, J., Ravichandran, T. (2013), “Service Expansion of Product Firms in the Information Technology Industry: An Empirical Study”, Journal of Management Information Systems, Vol. 29, No. 4, pp. 127-158.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.2753/MIS0742-1222290405" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.2753/MIS0742-1222290405</a></dgdoi:pub-id>
29. IEEE (2017), “Guide to the Enterprise Body of Knowledge (EITBOK)”, available at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://eitbokwiki.org/Main_Page">http://eitbokwiki.org/Main_Page</ext-link> (01 March 2018)
32. ISACA (2012), COBIT V5 – A Business Framework for the Governance and Management of Enterprise IT, Rolling Meadows, IL, Information Systems Audit and Control Association.
33. Lederer, A. L., Salmela, H. (1996), “Toward a theory of strategic information systems planning”, Journal of Strategic Information Systems, Vol. 5, No. 3, pp. 237-253.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/S0963-8687(96)80005-9" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/S0963-8687(96)80005-9</a></dgdoi:pub-id>
34. Lieberman, M.B., Balasubramanian, N., Garcia-Castro, R. (2018), “Toward a dynamic notion of value creation and appropriation in firms: The concept and measurement of economic gain”, Strategic Management Journal, Vol. 39, No. 6, pp. 1546-1572.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1002/smj.2708" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1002/smj.2708</a></dgdoi:pub-id>
35. Luftman, J. (2003), “Assessing IT / Business Alignment”, Information Systems Management, Vol. 20, No. 4, pp. 9-15.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1201/1078/43647.20.4.20030901/77287.2" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1201/1078/43647.20.4.20030901/77287.2</a></dgdoi:pub-id>
36. Marrone, M., Kolbe, L. M. (2011), “Uncovering ITIL claims. IT executives’ perception on benefits and Business-IT alignment”, Information Systems and e-Business Management, Vol. 9, No. 3, pp. 363-380.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1007/s10257-010-0131-7" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1007/s10257-010-0131-7</a></dgdoi:pub-id>
37. Martins, P. V., Zacarias, M. (2017), “Applying the Business Process and Practice Alignment Meta-model: Daily Practices and Process Modelling”, Business Systems Research Journal, Vol. 8, No.1, pp. 1-16.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1515/bsrj-2017-0001" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1515/bsrj-2017-0001</a></dgdoi:pub-id>
39. McAfee, A., Brynjolfsson, E. (2008), “Investing in the IT that makes a competitive difference”, Harvard Business Review, Vol. 86, No. 7–8, pp. 98-107.
43. Palinkas, L. A., Horwitz, S. M., Green, C. A., Wisdom, J. P., Duan, N., Hoagwood, K. (2015), “Purposeful sampling for qualitative data collection and analysis in mixed method implementation research”, Administration and Policy in Mental Health and Mental Health Services Research, Vol. 42, No. 5, pp. 533-544.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1007/s10488-013-0528-y" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1007/s10488-013-0528-y</a></dgdoi:pub-id>
44. Peppard, J., Ward, J. (2004), “Beyond strategic information systems: towards an IS capability”, Journal of Strategic Information Systems, Vol. 13, No. 2, pp. 167-194.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.jsis.2004.02.002" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.jsis.2004.02.002</a></dgdoi:pub-id>
45. Peppard, J., Ward, J. (2005), “Unlocking Sustained Business Value from IT Investments”, California Management Review, Vol. 48, No. 1, pp. 52-70.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.2307/41166327" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.2307/41166327</a></dgdoi:pub-id>
46. Peppard, J., Ward, J. (2016), The Strategic Management of Information Systems – Building a Digital Strategy. 4th edition. Hoboken/NJ, John Wiley & Sons.
47. Pope, C., Ziebland, S., Mays, N. (2000), “Qualitative research in health care Analysing qualitative data”, British Medical Journal, Vol. 320, pp. 114-116.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1136/bmj.320.7227.114" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1136/bmj.320.7227.114</a></dgdoi:pub-id>
50. Prasad, B. D. (2008), “Content Analysis – A method in Social Science Research”, in Lal Das, D. K., Bhaskaran, V. (Eds.), Research methods for Social Work, New Delhi, Rawat, pp. 173-193.
51. Robertson, F. A., Samy, M. (2015), “Factors affecting the diffusion of integrated reporting – a UK FTSE 100 perspective”, Sustainability Accounting, Management and Policy Journal, Vol. 6, No. 2, pp. 190-223.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1108/SAMPJ-07-2014-0044" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1108/SAMPJ-07-2014-0044</a></dgdoi:pub-id>
52. Sandelowski, M. (1995), “Sample Size in Qualitative Research”, Research in Nursing & Health, Vol. 18, No. 2, pp. 179-183.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1002/nur.4770180211" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1002/nur.4770180211</a></dgdoi:pub-id>
53. Sandelowski, M. (2000), “Whatever Happened to Qualitative Description?”, Research in Nursing & Health, Vol. 23, No. 4, pp. 334-340.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1002/1098-240X(200008)23:4<" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1002/1098-240X(200008)23:4<</a>;334::AID-NUR9>3.0.CO;2-G</dgdoi:pub-id>
55. Singh, R., Paliwal, P. (2012), “Customers’ value appraisals-suppliers’ value propositions interaction process in developing new services: A case study from the natural gas industry”, International Journal of Energy Sector Management, Vol. 6 No. 2, pp. 255–272.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1108/17506221211242103" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1108/17506221211242103</a></dgdoi:pub-id>
56. Stemler, S. (2001), “An Overview of Content Analysis”, Practical Assessment, Research & Evaluation”, Vol. 7, No. 17, available at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://PAREonline.net/getvn.asp?v=7&n=17">http://PAREonline.net/getvn.asp?v=7&n=17</ext-link> (10 March 2018),
57. Stempel, G. H. (1989), “Content analysis”, in Stempel, G. H., Westley, B. H. (Eds.), Research methods in mass communications, Englewood Cliffs / NJ, Prentice-Hall.
58. Tallon, P. P. (2007), “Does IT pay to focus? An analysis of IT business value under single and multi-focused business strategies”, Journal of Strategic Information Systems, Vol. 16, No. 3, pp. 278-300.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.jsis.2007.04.001" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.jsis.2007.04.001</a></dgdoi:pub-id>
60. Treacy, M., Wiersema, F. (1995), The discipline of market leaders: Choose your customers, narrow your focus, dominate your market, Reading/MA, Addison-Wesley.
61. Van de Ven, A. H. (2007), Engaged Scholarship: A Guide for Organizational and Social Research, New York, Oxford University Press.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1093/oso/9780199226290.001.0001" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1093/oso/9780199226290.001.0001</a></dgdoi:pub-id>
63. Vishnevskiy, K., Karasev, O., Meissner, D. (2016), “Integrated roadmaps for strategic management and planning”, Technological Forecasting & Social Change, Vol. 110, pp. 153-166.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.techfore.2015.10.020" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.techfore.2015.10.020</a></dgdoi:pub-id>
64. Wade, M., Hulland, J. (2004), “Review: The Resource-Based View and Information Systems Research: Review, Extension, and Suggestions for Future Research”, MIS Quarterly, Vol. 28 No. 1, pp. 107–142.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.2307/25148626" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.2307/25148626</a></dgdoi:pub-id>
65. Ward, J. M. (2012), “Information systems strategy: Quo vadis?”, Journal of Strategic Information Systems, Vol. 21, No. 2, pp. 165-171.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.jsis.2012.05.002" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.jsis.2012.05.002</a></dgdoi:pub-id>