{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T01:23:22Z","timestamp":1770513802327,"version":"3.49.0"},"reference-count":65,"publisher":"Emerald","issue":"9","license":[{"start":{"date-parts":[[2014,10,7]],"date-time":"2014-10-07T00:00:00Z","timestamp":1412640000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10,7]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 The purpose of this paper is to assess the business value of in-memory computing (IMC) technology by analyzing its organizational impact in different application scenarios. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 This research applies a multiple-case study methodology analyzing five cases of IMC application scenarios in five large European industrial and service-sector companies. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 Results show that IMC can deliver business value in various applications ranging from advanced analytic insights to support of real-time processes. This enables higher-level organizational advantages like data-driven decision making, superior transparency of operations, and experience with Big Data technology. The findings are summarized in a business value generation model which captures the business benefits along with preceding enabling changes in the organizational environment. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title>\n               <jats:p> \u2013 Results aid managers in identifying different application scenarios where IMC technology may generate value for their organizations from business and IT management perspectives. The research also sheds light on the socio-technical factors that influence the likelihood of success or failure of IMC initiatives. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 This research is among the first to model the business value creation process of in-memory technology based on insights from multiple implemented applications in different industries.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/imds-07-2014-0212","type":"journal-article","created":{"date-parts":[[2014,10,20]],"date-time":"2014-10-20T06:40:28Z","timestamp":1413787228000},"page":"1396-1414","source":"Crossref","is-referenced-by-count":18,"title":["Business value of in-memory technology \u2013 multiple-case study insights"],"prefix":"10.1108","volume":"114","author":[{"given":"Rieke","family":"B\u00e4renf\u00e4nger","sequence":"first","affiliation":[]},{"given":"Boris","family":"Otto","sequence":"additional","affiliation":[]},{"given":"Hubert","family":"\u00d6sterle","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020122801293236900_b1","doi-asserted-by":"crossref","unstructured":"Acker, O.\n               , \n                  Gr\u00f6ne, F.\n               , \n                  Blockus, A.\n                and \n                  Bange, C.\n                (2011), \u201cIn-memory analytics \u2013 strategies for real-time CRM\u201d, Journal of Database Marketing & Customer Strategy Management, Vol. 18 No. 2, pp. 129-136.","DOI":"10.1057\/dbm.2011.11"},{"key":"key2020122801293236900_b2","unstructured":"Baesens, B.\n               , \n                  Leuven, K.U.\n                and \n                  Vanthienen, J.\n                (2013), \u201cCall for papers misq special issue on transformational issues of big data and analytics in networked business\u201d, available at: www.misq.org\/skin\/frontend\/default\/misq\/pdf\/CurrentCalls\/BigDataCFP.pdf (accessed 16 May 2014)."},{"key":"key2020122801293236900_b3","unstructured":"Bakos, Y.J.\n                (1987), \u201cDependent variables for the study of firm and industry-level impacts of information technology\u201d, Working Paper (CISR WP No. 161), Center for Information Systems Research Sloan School of Management, Massachusetts Institute of Technology, Cambridge, MA, August."},{"key":"key2020122801293236900_b4","doi-asserted-by":"crossref","unstructured":"Barney, J.\n                (1991), \u201cFirm resources and sustained competitive advantage\u201d, Journal of Management, Vol. 17 No. 1, pp. 99-120.","DOI":"10.1177\/014920639101700108"},{"key":"key2020122801293236900_b5","doi-asserted-by":"crossref","unstructured":"Barua, A.\n               , \n                  Kriebel, C.H.\n                and \n                  Mukhopadhyay, T.\n                (1995), \u201cInformation technologies and business value: an analytic and empirical investigation\u201d, Information Systems Research, Vol. 6 No. 1, pp. 21-23.","DOI":"10.1287\/isre.6.1.3"},{"key":"key2020122801293236900_b6","doi-asserted-by":"crossref","unstructured":"Bernstein, P.\n               , \n                  Brodie, M.\n               , \n                  Ceri, S.\n               , \n                  Dewitt, D.\n               , \n                  Franklin, M.\n               , \n                  Garcia-Molina, H.\n               , \n                  Gray, J.\n               , \n                  Held, J.\n               , \n                  Hellerstein, J.\n               , \n                  Jagadish, H.V.\n               , \n                  Lesk, M.\n               , \n                  Maier, D.\n               , \n                  Naughton, J.\n               , \n                  Pirahesh, H.\n               , \n                  Stonebraker, M.\n                and \n                  Ullman, J.\n                (1998), \u201cThe Asilomar report on database research\u201d, SIGMOD Record, Vol. 27 No. 4, pp. 74-80.","DOI":"10.1145\/306101.306137"},{"key":"key2020122801293236900_b7","doi-asserted-by":"crossref","unstructured":"Bharadwaj, A.S.\n                (2000), \u201cA resource-based perspective on information technology capability and firm performance: an empirical investigation\u201d, MIS Quarterly, Vol. 24 No. 1, pp. 169-196.","DOI":"10.2307\/3250983"},{"key":"key2020122801293236900_b8","unstructured":"Bharadwaj, A.S.\n               , \n                  Sambamurthy, V.\n                and \n                  Zmud, R.W.\n                (1999), \u201cIT capabilities: theoretical perspectives and empirical operationalization\u201d, in \n                  De, P.\n                and \n                  DeGross, J.I.\n                (Eds), Proceedings of the Twentieth International Conference on Information Systems ICIS, Association for Information Systems, Charlotte, NC, pp. 378-385."},{"key":"key2020122801293236900_b9","doi-asserted-by":"crossref","unstructured":"Bharadwaj, A.S.\n               , \n                  Sawy, O.A.\n                \n               \n                  El\n                and \n                  Pavlou, P.A.\n                (2013), \u201cDigital business strategy: toward a next generation of insights\u201d, MIS Quarterly, Vol. 37 No. 2, pp. 471-482.","DOI":"10.25300\/MISQ\/2013\/37:2.3"},{"key":"key2020122801293236900_b10","doi-asserted-by":"crossref","unstructured":"Bhatt, G.D.\n                and \n                  Grover, V.\n                (2005), \u201cTypes of information technology capabilities and their role in competitive advantage: an empirical study\u201d, Journal of Management Information Systems, Vol. 22 No. 2, pp. 253-277.","DOI":"10.1080\/07421222.2005.11045844"},{"key":"key2020122801293236900_b12","doi-asserted-by":"crossref","unstructured":"Brynjolfsson, E.\n                (1993), \u201cThe productivity paradox of information technology\u201d, Communications of the ACM, Vol. 36 No. 12, pp. 67-77.","DOI":"10.1145\/163298.163309"},{"key":"key2020122801293236900_b13","doi-asserted-by":"crossref","unstructured":"Chae, H.\n               , \n                  Koh, C.E.\n                and \n                  Prybutok, V.R.\n                (2014), \u201cInformation technology capability and firm performance: contradictory findings and their possible causes\u201d, MIS Quarterly, Vol. 38 No. 1, pp. 305-326.","DOI":"10.25300\/MISQ\/2014\/38.1.14"},{"key":"key2020122801293236900_b14","doi-asserted-by":"crossref","unstructured":"Chan, Y.E.\n                (2000), \u201cIT value: the great divide between qualitative and quantitative and individual and organizational measures\u201d, Journal of Management Information Systems, Vol. 16 No. 4, pp. 225-261.","DOI":"10.1080\/07421222.2000.11518272"},{"key":"key2020122801293236900_b15","doi-asserted-by":"crossref","unstructured":"Chatfield, A.T.\n                and \n                  Yetton, P.\n                (2000), \u201cStrategic payoff from EDI as a function of EDI embededdness\u201d, Journal of Management Information Systems, Vol. 16 No. 4, pp. 195-224.","DOI":"10.1080\/07421222.2000.11518271"},{"key":"key2020122801293236900_b16","doi-asserted-by":"crossref","unstructured":"Chen, H.\n               , \n                  Chiang, R.H.L.\n                and \n                  Storey, V.C.\n                (2012), \u201cBusiness intelligence and analytics: from big data to big impact\u201d, MIS Quarterly, Vol. 36 No. 4, pp. 1165-1188.","DOI":"10.2307\/41703503"},{"key":"key2020122801293236900_b17","doi-asserted-by":"crossref","unstructured":"Conner, K.R.\n                (1991), \u201cA historical comparison of resource-based theory and five schools of thought within industrial organizational economics: do we have a new theory of the firm?\u201d, Journal of Management, Vol. 17 No. 1, pp. 121-154.","DOI":"10.1177\/014920639101700109"},{"key":"key2020122801293236900_b18","doi-asserted-by":"crossref","unstructured":"Darke, P.\n               , \n                  Shanks, G.\n                and \n                  Broadbent, M.\n                (1998), \u201cSuccessfully completing case study research: combining rigour, relevance and pragmatism\u201d, Information Systems Journal, Vol. 8 No. 4, pp. 273-289.","DOI":"10.1046\/j.1365-2575.1998.00040.x"},{"key":"key2020122801293236900_b19","unstructured":"Davenport, T.H.\n                and \n                  Snabe, J.H.\n                (2011), \u201cHow fast and flexible do you want your information, really?\u201d, MIT Sloan Management Review, Vol. 52 No. 3, pp. 57-63."},{"key":"key2020122801293236900_b20","doi-asserted-by":"crossref","unstructured":"DeWitt, D.J.\n               , \n                  Kat, R.H.\n               , \n                  Olken, F.\n               , \n                  Shapiro, L.D.\n               , \n                  Stonebraker, M.R.\n                and \n                  Wood, D.\n                (1984), \u201cImplementation techniques for main memory database systems\u201d, Proceedings of the 1984 ACM-SIGMOD International Conference on Management of Data Boston, MA, June, pp. 1-8.","DOI":"10.1145\/602259.602261"},{"key":"key2020122801293236900_b21","doi-asserted-by":"crossref","unstructured":"Dong, S.\n               , \n                  Xu, S.X.\n                and \n                  Zhu, K.X.\n                (2009), \u201cInformation technology in supply chains: the value of IT-enabled resources under competition\u201d, Information Systems Research, Vol. 20 No. 1, pp. 18-32.","DOI":"10.1287\/isre.1080.0195"},{"key":"key2020122801293236900_b22","doi-asserted-by":"crossref","unstructured":"Dub\u00e9, L.\n                and \n                  Par\u00e9, G.\n                (2003), \u201cRigor in information systems positivist case research: current practices, trends, and recommendations\u201d, MIS Quarterly, Vol. 27 No. 4, pp. 597-635.","DOI":"10.2307\/30036550"},{"key":"key2020122801293236900_b23","doi-asserted-by":"crossref","unstructured":"Dutta, A.\n               , \n                  Lee, H.L.\n                and \n                  Whang, S.\n                (2007), \u201cRFID and operations management: technology, value, and incentives\u201d, Production and Operations Management, Vol. 16 No. 5, pp. 646-655.","DOI":"10.1111\/j.1937-5956.2007.tb00286.x"},{"key":"key2020122801293236900_b24","doi-asserted-by":"crossref","unstructured":"Eich, M.H.\n                (1988), \u201cMars: the design of a main memory database machine\u201d, in \n                  Kitsuregawa, M.\n                and \n                  Tanaka, H.\n                (Eds), Database Machines and Knowledge Base Machines, Proceedings of the 5th International Workshop on Database Machines in Tokyo 1987, Kluwer Academic Publishers, Tokyo, pp. 325-338.","DOI":"10.1007\/978-1-4613-1679-4_24"},{"key":"key2020122801293236900_b25","doi-asserted-by":"crossref","unstructured":"Eisenhardt, K.M.\n                (1989), \u201cBuilding theories from case study research\u201d, The Academy of Management Review, Vol. 14 No. 4, pp. 532-550.","DOI":"10.5465\/amr.1989.4308385"},{"key":"key2020122801293236900_b26","doi-asserted-by":"crossref","unstructured":"Garcia-Molina, H.\n                and \n                  Salem, K.\n                (1992), \u201cMain memory database systems: an overview\u201d, IEEE Transactions on Knowledge and Data Engineering, Vol. 4 No. 6, pp. 509-516.","DOI":"10.1109\/69.180602"},{"key":"key2020122801293236900_b27","unstructured":"Gartner Inc.\n                (2013), \u201cGartner identifies the top 10 strategic technology trends for 2013\u201d, available at: www.gartner.com\/newsroom\/id\/2209615 (accessed 28 July 2013)."},{"key":"key2020122801293236900_b28","unstructured":"Gill, J.J.\n                (2007), \u201cShifting the BI paradigm with in-memory database technologies\u201d, Business Intelligence Journal, Vol. 12 No. 2, pp. 58-63."},{"key":"key2020122801293236900_b29","unstructured":"Harizopoulos, S.\n               , \n                  Abadi, D.J.\n               , \n                  Madden, S.\n                and \n                  Stonebraker, M.\n                (2008), \u201cOLTP through the looking glass, and what we found there\u201d, Proceedings of the 2008 ACM-SIGMOD International Conference on Management of Data, Vancouver, June, pp. 981-992, available at: http:\/\/dl.acm.org\/citation.cfm?id=1376713"},{"key":"key2020122801293236900_b30","doi-asserted-by":"crossref","unstructured":"Hitt, L.M.\n                and \n                  Brynjolfsson, E.\n                (1996), \u201cProductivity, business profitability, and consumer surplus: three different measures of information technology value\u201d, MIS Quarterly, Vol. 20 No. 2, pp. 121-142.","DOI":"10.2307\/249475"},{"key":"key2020122801293236900_b31","doi-asserted-by":"crossref","unstructured":"Krueger, J.\n               , \n                  Grund, M.\n               , \n                  Tinnefeld, C.\n               , \n                  Eckart, B.\n               , \n                  Zeier, A.\n                and \n                  Plattner, H.\n                (2010), \u201cHauptspeicherdatenbanken f\u00fcr Unternehmensanwendungen\u201d, Datenbank-Spektrum, Vol. 10 No. 3, pp. 143-158.","DOI":"10.1007\/s13222-010-0031-5"},{"key":"key2020122801293236900_b32","unstructured":"Lechtenb\u00f6rger, J.\n                and \n                  Vossen, G.\n                (2011), \u201cIn-memory database technology: challenges and opportunities\u201d, Business & Information Systems Engineering, Vol. 3 No. 6, pp. 390-391."},{"key":"key2020122801293236900_b33","doi-asserted-by":"crossref","unstructured":"Lee, A.S.\n                (1989), \u201cA scientific methodology for MIS case studies\u201d, MIS Quarterly, Vol. 13 No. 1, pp. 33-50.","DOI":"10.2307\/248698"},{"key":"key2020122801293236900_b34","doi-asserted-by":"crossref","unstructured":"Lee, H.\n                and \n                  \u00d6zer, \u00d6\n               , (2007), \u201cUnlocking the value of RFID\u201d, Production and Operations Management, Vol. 16 No. 1, pp. 40-64.","DOI":"10.1111\/j.1937-5956.2007.tb00165.x"},{"key":"key2020122801293236900_b35","unstructured":"Lehner, W.\n                (2011), \u201cIn-memory data management\u2019 \u2013 evolution or revolution?\u201d, Business & Information Systems Engineering, Vol. 3 No. 6, pp. 391-392."},{"key":"key2020122801293236900_b36","doi-asserted-by":"crossref","unstructured":"Li, S.\n               , \n                  Shang, J.\n                and \n                  Slaughter, S.A.\n                (2010), \u201cWhy do software firms fail? Capabilities, competitive actions, and firm survival in the software industry from 1995 to 2007\u201d, Information Systems Research, Vol. 21 No. 3, pp. 631-654.","DOI":"10.1287\/isre.1100.0281"},{"key":"key2020122801293236900_b37","doi-asserted-by":"crossref","unstructured":"Liu, H.\n               , \n                  Ke, W.\n               , \n                  Wei, K.K.\n                and \n                  Hua, Z.\n                (2013), \u201cThe impact of IT capabilities on firm performance: the mediating roles of absorptive capacity and supply chain agility\u201d, Decision Support Systems, Vol. 54 No. 3, pp. 1452-1462.","DOI":"10.1016\/j.dss.2012.12.016"},{"key":"key2020122801293236900_b38","unstructured":"Lu, H.\n               , \n                  Ng, Y.Y.\n                and \n                  Tian, Z.\n                (2000), \u201cT-tree or B-tree: main memory database index structure revisited\u201d, Proceedings of the 11th Australasian Database Conference ADC, January, IEEE Computer Society, Canberra, pp. 65-73."},{"key":"key2020122801293236900_b39","doi-asserted-by":"crossref","unstructured":"Mata, F.J.\n               , \n                  Fuerst, W.L.\n                and \n                  Barney, J.B.\n                (1995), \u201cInformation technology and sustained competitive advantage: a resource-based analysis\u201d, MIS Quarterly, Vol. 19 No. 4, pp. 487-506.","DOI":"10.2307\/249630"},{"key":"key2020122801293236900_b40","doi-asserted-by":"crossref","unstructured":"Melville, N.\n               , \n                  Kraemer, K.\n                and \n                  Gurbaxani, V.\n                (2004), \u201cReview: information technology and organizational performance: an integrative model of IT business value\u201d, MIS Quarterly, Vol. 28 No. 2, pp. 283-322.","DOI":"10.2307\/25148636"},{"key":"key2020122801293236900_b41","doi-asserted-by":"crossref","unstructured":"Mukhopadhyay, T.\n               , \n                  Kekre, S.\n                and \n                  Kalathur, S.\n                (1996), \u201cBusiness value of information technology: a study of electronic data interchange\u201d, MIS Quarterly, Vol. 19 No. 2, pp. 137-156.","DOI":"10.2307\/249685"},{"key":"key2020122801293236900_b42","unstructured":"Miles, M.B.\n                and \n                  Huberman, A.M.\n                (1994), Qualitative Data Analysis: An Expanded Sourcebook, Sage Publications Inc., Thousand Oaks, London, New Delhi."},{"key":"key2020122801293236900_b43","unstructured":"Peppard, J.\n               , \n                  Ward, J.\n                and \n                  Daniel, E.\n                (2007), \u201cManaging the realization of business benefits from IT investments\u201d, MIS Quarterly Executive, Vol. 6 No. 1, pp. 1-11."},{"key":"key2020122801293236900_b44","doi-asserted-by":"crossref","unstructured":"Piller, G.\n                and \n                  Hagedorn, J.\n                (2011), \u201cEinsatzpotenziale f\u00fcr In-Memory Data Management in betrieblichen Anwendungssystemen\u201d [German; \u201cPotential Uses of In-Memory Data Management in business information systems\u201c]\u201d, Wirtschaftsinformatik & Management, Vol. 5 No. 5, pp. 1-10.","DOI":"10.1365\/s35764-011-0073-y"},{"key":"#cr-split#-key2020122801293236900_b45.1","unstructured":"Piller, G.  and   Hagedorn, J.  (2012), \"In-Memory Data Management im Einzelhandel: Einsatzbereiche und Nutzenpotentiale\" [German"},{"key":"#cr-split#-key2020122801293236900_b45.2","unstructured":"\"In-Memory Data Management in Retail: Fields of Application and Value Potential\"]\", in   Mattfeld, D.C.  and   Robra-Bissantz, S.  (Eds), Multikonferenz Wirtschaftsinformatik 2012 (MKWI 2012) February - March 2013, GITO Verlag, Braunschweig, pp. 59-70."},{"key":"key2020122801293236900_b46","doi-asserted-by":"crossref","unstructured":"Pinsonneault, A.\n                and \n                  Rivard, S.\n                (1998), \u201cInformation technology and the nature of managerial work: from the productivity paradox to the icarus paradox\u201d, MIS Quarterly, Vol. 22 No. 3, pp. 287-312.","DOI":"10.2307\/249667"},{"key":"key2020122801293236900_b47","doi-asserted-by":"crossref","unstructured":"Plattner, H.\n                and \n                  Zeier, A.\n                (2011), In-Memory Data Management: An Inflection Point for Enterprise Applications, Springer, Berlin Heidelberg.","DOI":"10.1007\/978-3-642-19363-7_3"},{"key":"key2020122801293236900_b48","doi-asserted-by":"crossref","unstructured":"Quan, J.\n               , \n                  Hu, Q.\n                and \n                  Hart, P.J.\n                (2003), \u201cInformation technology investments and firms performance \u2013 a duopoly perspective\u201d, Journal of Management Information Systems, Vol. 20 No. 3, pp. 121-158.","DOI":"10.1080\/07421222.2003.11045773"},{"key":"key2020122801293236900_b49","doi-asserted-by":"crossref","unstructured":"Ravichandran, T.\n                and \n                  Lertwongsatien, C.\n                (2005), \u201cEffect of information systems resources and capabilities on firm performance: a resource-based perspective\u201d, Journal of Management Information Systems, Vol. 21 No. 4, pp. 237-276.","DOI":"10.1080\/07421222.2005.11045820"},{"key":"key2020122801293236900_b50","unstructured":"Ross, J.W.\n               , \n                  Beath, C.M.\n                and \n                  Goodhue, D.L.\n                (1996), \u201cDevelop long-term competitiveness through IT assets\u201d, Sloan Management Review, Vol. 38 No. 1, pp. 31-43."},{"key":"key2020122801293236900_b51","unstructured":"Russom, P.\n                (2011), \u201cBig data analytics\u201d, TDWI Best Practices Report, TDWI, Renton, WA, Fourth quarter."},{"key":"key2020122801293236900_b52","unstructured":"Sch\u00fctte, R.\n                (2012), \u201cIn-memory technologies: considerations on justification and application in large systems\u201d, Business & Information Systems Engineering, Vol. 4 No. 4, pp. 215-216."},{"key":"key2020122801293236900_b53","doi-asserted-by":"crossref","unstructured":"Sircar, S.\n               , \n                  Turnbow, J.L.\n                and \n                  Bordoloi, B.\n                (2000), \u201cA framework for assessing the relationship between information technology investments and firm performance\u201d, Journal of Management Information Systems, Vol. 16 No. 4, pp. 69-97.","DOI":"10.1080\/07421222.2000.11518266"},{"key":"key2020122801293236900_b54","unstructured":"Soh, C.\n                and \n                  Markus, M.L.\n                (1995), \u201cHow IT creates business value: a process theory synthesis\u201d, in \n                  DeGross, J.I.\n               , \n                  Ariav, G.\n               , \n                  Beath, C.\n               , \n                  Hoyer, R.\n                and \n                  Kemerer, G.\n                (Eds), Proceedings of the Sixteenth International Conference on Information Systems (ICIS 1995), December, Association for Information Systems, Amsterdam, pp. 29-41."},{"key":"key2020122801293236900_b55","unstructured":"Stonebraker, M.\n                (2011), \u201cMy Top 10 assertions about data warehouses\u201d, Communications of the ACM, Vol. 54 No. 5, pp. 4-6."},{"key":"key2020122801293236900_b56","doi-asserted-by":"crossref","unstructured":"Tanriverdi, H.\n                (2006), \u201cPerformance effects of information technology synergies in multibusiness firms\u201d, MIS Quarterly, Vol. 30 No. 1, pp. 57-77.","DOI":"10.2307\/25148717"},{"key":"key2020122801293236900_b57","doi-asserted-by":"crossref","unstructured":"Tzeng, S.-F.\n               , \n                  Chen, W.-H.\n                and \n                  Pai, F.-Y.\n                (2008), \u201cEvaluating the business value of RFID: evidence from five case studies\u201d, International Journal of Production Economics, Vol. 112 No. 2, pp. 601-613.","DOI":"10.1016\/j.ijpe.2007.05.009"},{"key":"key2020122801293236900_b58","unstructured":"Vizard, M.\n                (2013), \u201cMcLaren has a need for HANA speed\u201d, CIO Insight, 28 May, available at: www.cioinsight.com\/it-management\/innovation\/mclaren-has-a-need-for-hana-speed\/ (accessed 14 August 2013)."},{"key":"key2020122801293236900_b11","doi-asserted-by":"crossref","unstructured":"Vom Brocke, J.\n               , \n                  Debortoli, S.\n               , \n                  M\u00fcller, O.\n                and \n                  Reuter, N.\n                (2014), \u201cHow in-memory technology can create business value: insights from the Hilti case\u201d, Communications of the Association for Information Systems, Vol. 34, Article 7, pp. 151-168.","DOI":"10.17705\/1CAIS.03407"},{"key":"key2020122801293236900_b59","doi-asserted-by":"crossref","unstructured":"Wang, N.\n               , \n                  Liang, H.\n               , \n                  Zhong, W.\n               , \n                  Xue, Y.\n                and \n                  Xiao, J.\n                (2012), \u201cResource structuring or capability building? An empirical study of the business value of information technology\u201d, Journal of Management Information Systems, Vol. 29 No. 2, pp. 325-367.","DOI":"10.2753\/MIS0742-1222290211"},{"key":"key2020122801293236900_b60","doi-asserted-by":"crossref","unstructured":"Weill, P.\n                (1992), \u201cThe relationship between investment in information technology and firm performance: a study of the valve manufacturing sector\u201d, Information Systems Research, Vol. 3 No. 4, pp. 307-333.","DOI":"10.1287\/isre.3.4.307"},{"key":"key2020122801293236900_b61","unstructured":"Wessel, P.\n               , \n                  K\u00f6ffer, S.\n                and \n                  Becker, J.\n                (2013), \u201cAuswirkungen von In-Memory-Datenmanagement auf Gesch\u00e4ftsprozesse im Business Intelligence\u201d (German; \u201cEffects of In-Memory Data Management on business processes in Business Intelligence\u201d)\u201d, in \n                  Alt, R.\n                and \n                  Franczyk, B.\n                (Eds), 11th International Conference on Wirtschaftsinformatik (WI2013), February \u2013 March, Leipzig, pp. 1781-1795."},{"key":"key2020122801293236900_b62","unstructured":"Wust, J.\n               , \n                  Krueger, J.\n               , \n                  Blessing, S.\n               , \n                  Tosun, C.\n               , \n                  Zeier, A.\n                and \n                  Plattner, H.\n                (2011), \u201cxSellerate\u201d, in \n                  Lehner, W.\n                and \n                  Piller, G.\n                (Eds), Proceedings of IMDM 2011 Conference on Innovative Business Applications With In-Memory Data Management, December, Gesellschaft f\u00fcr Informatik e.v., Mainz, pp. 35-44."},{"key":"key2020122801293236900_b63","unstructured":"Yin, R.K.\n                (2013), Case Study Research: Design and Methods, SAGE Publications Inc., Thousand Oaks, CA."},{"key":"key2020122801293236900_b64","doi-asserted-by":"crossref","unstructured":"Zeier, A.\n               , \n                  Kr\u00fcger, J.\n                and \n                  M\u00fcller, J.\n                (2011), \u201cPotential of in-memory technologies\u201d, Business & Information Systems Engineering, Vol. 3 No. 6, p. -.","DOI":"10.1007\/s12599-011-0188-y"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/IMDS-07-2014-0212","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMDS-07-2014-0212\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMDS-07-2014-0212\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:52:39Z","timestamp":1753393959000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/114\/9\/1396-1414\/177335"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,7]]},"references-count":65,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2014,10,7]]}},"alternative-id":["10.1108\/IMDS-07-2014-0212"],"URL":"https:\/\/doi.org\/10.1108\/imds-07-2014-0212","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2014,10,7]]}}}