Note: this thesis repository might be incomplete for certain programmes.

363 entries found.


Master ICT in Business



2017-2018
Student Thesis
Akkerman, FrisoMotivations for Adopting Green IT within Food Processing Organisations in the Netherlands
Bijnaar, RenéA Sustainable IT Governance Model for Dutch Municipal Organizations
Buitelaar, RubenBuilding the Data-Driven Organization: a Maturity Model and Assessment
Fowler, KevinImplementing Holacracy™: Exploratory Research into Practicing and Implementing Holacracy™ in Organizations and its Effect on the Organizations’ IT and Security
Mangion, RobertoAnalysis on the European Parliament’s Party Group Voting Trends
Mulders, SebastianRecommender Systems in Practice: A Business Value Driven Approach for Startups
Naron, AlexandraCybercrime as a Driver to Security Innovations in Dutch SMEs: A Comparative Case Study
Prikkel, ThomasReducing Manual Labor in Technology-Assisted Review
Ruijter, SanderData Mining in Business, a Case Study at Squeezely
Taounza, AbdessamadExploring new Channels of Public Service Delivery via Chatbots
Zhang, YifanA Marketing Research on Exploring the Application Prospects of SaaS BI in Small and Medium-sized Retail Enterprises

2016-2017
Student Thesis
Abulzahab, AbdulhadiBlockchain Technology and Its Implementation within Enterprise Information Systems
Ajodhia, KayleshAddressing Internet of Things Challenges in a Smart City based on a Novel Architectural Approach
Atef Ibraim, MohamedApplicability of Blockchain Technology in Telecommunications Service Management
Bakkenes, RobinTowards (limited) IT centralisation in decentral organisations - CONFIDENTIAL
Bhattarai, SurajBusiness Models with Blockchain: Exploring the Business Models of the Applications of Blockchain Technology in Start-up Enterprises
Boon, BenjaminData Driven Enterprise Architecture - CONFIDENTIAL
Bos, RalphBuilding and Evaluating an Enterprise Search Application – A Case study at UL Transaction Security
Boven, Bas vanRobust Real-time Action Classification using Single-Shot Convolutional Neural Networks - CONFIDENTIAL
Brouwer, HugoProduct Traceability: Use case assessment for blockchain technology – confidential
Cammel, SimoneMeasuring the status quo of big data analytics in Dutch academic hospitals
Çolakoğlu, HüseyinExploring information gathering behavior of niche players within IT ecosystems
Dekker, BramInteraction-based pattern analysis in a smart office environment CONFIDENTIAL
Deviani, VanessaA Framework for M-Government Citizen Complaint System. A Case Study in Jakarta Public Services - CONFIDENTIAL
Duwi Ari HaryantoIT Consumerization: Analyzing the Determinants of BYOD-Program Acceptance in Large Scale Company from Employees Perspective and its Effect on Company Attractiveness - CONFIDENTIAL
Gao, MingmingContingency Factors’ Impact on Data Governance Design and Implementation Success Factors - A case study in Digital Security Company - CONFIDENTIAL
Gersen, LéonAnalysis of Data Sources and Processes for Cash Flow Prediction in Small Seasonal Businesses
Himah, AndrewsmHealth Applications: Keeping Personal Electronic Health Records on Mobile Devices Confidential and Secure
Kharitonov, ArtemA framework for strategic intra- and inter-organizational adoption of the blockchain technology - CONFIDENTIAL
Khoenkhoen, SunnyExploring the impact of Business Intelligence and Data-analytics in the Emergency Department - CONFIDENTIAL
Koning, Patrick deNo Need to Read: Measuring the effects of Municipality Safety Plans on Crime Rates - CONFIDENTIAL
Kortekaas, LeonImpact of cloud on the traditional Shared Service Center - CONFIDENTIAL
Koutsougeras, ParisAssessment of Master Data Quality in a Multinational Environment - CONFIDENTIAL
Kreuse, RoyInformation Security Reporting at Strategic Level in the Dutch Financial industry - CONFIDENTIAL
Li, SufengData Quality Evaluation Framework for End-User Computing. A Case Study in a Dutch Insurance Company - CONFIDENTIAL
Lindert, Dylan teSmart energy management as a means towards improved energy efficiency
Liu, ZiweiA Maturity Model for Attribution Modeling Maturity Assessment
Malikbaba, NavidThe Beginning of Mobile 2.0: Exploring the determinants of consumer intentions with respect to conversational commerce on the WhatsApp platform
Mushofi Hasan, AhmadRapid Prototyping in Agile Product Development: A Case Study on Agile Software Companies - CONFIDENTIAL
Okot, PetraDescribing Hawala as Mobile Money (an ICT Innovation) - CONFIDENTIAL
Retnawati, FiaUnderstanding Intermediary Mobile Applications Technology Adoption– a UTAUT2, Self-Efficacy and Involvement Application in A Case Study of Indonesia OTA - CONFIDENTIAL
Rutten, TomEnhancing project portfolio selection in Agile environments -CONFIDENTIAL
Snelderweert, JeroenApplying Project Controls In Exploratory Projects - CONFIDENTIAL
Sufit, AdelaidoDecisions Factors in ERP Migration to SaaS, a Case Study at Perusahaan Listrik Negara (Indonesia’s State Electricity Corporation) - CONFIDENTIAL
Tsogas, KostasConceptualization and validation of a set of metrics to assist Data Driven Decision Making in an Agile setup. A case study of KLM - Royal Dutch Airlines
Velden, Thijs van derComparing Municipalities: Who is your partner in crime?
Vennemans, MauriceHow can machine learning be used in the data analysis pipeline to analyze and improve service desk processes? - CONFIDENTIAL
Westbroek, LucienIT value in the merger and acquisition process, the pre-merger phase and impact on the strategy - CONFIDENTIAL
Xypolytos, AchilleasA Security Assessment Framework
Yan, SixueAnalyzing experience as moderating variable for the relationship of s-commerce characteristics and trust
Yildirim, HuseyinPrivacy concerns and factors influencing individuals behavioral intention to use wearable devices at work - CONFIDENTIAL
Zheng, YUNPENGAn Empirical Study of Customer Co-creation in Social Media Based Product and Service Development - CONFIDENTIAL
Zhu, HanyuComparing the Use of Technology Among Industry Branches

2015-2016
Student Thesis
Anastasopoulos, FoivosData Governance design for financial services organizations
Arif Rachman Yulliandi, AndiUnderstanding Crowdfunding Platform: An empirical study utilizing UTAUT2 Model Integrated with Personality Trait - CONFIDENTIAL
Badloe, NaweenMicrosoft Architecture with ArchiMate -CONFIDENTIAL
Bakker, JobBlockchain technology. An exploratory case study to identify the underlying principles and to determine the corresponding capabilities.
Ben Dahman, JaouadOptimizing organizational flexibility with Enterprise Architecture measures
Boer, Arno deEnterprise Architecture as an enabler for successful care-service delivery in a dynamic healthcare environment.
Boom, Sander van derThe influence of Cloud based elements on RfP’s
Chaidir AbadiEvaluating the Mobile Payment – Direct Carrier Billing - of digital content using UTAUT model, Personal Innovativeness and Trust: An Indonesia case study of direct carrier billing - CONFIDENTIAL
Cleton, PeterKnowledge Valorization Process Model. The Design of a Practical Process Model on the Subject of Knowledge Valorization
Cong, ChenExploring the Collective Trading Behaviors - CONFIDENTIAL
Deligianni, KatiaData-driven Innovation in NGOs
DessyEvaluating the influence of employee intention to adopt the digital workplace using UTAUT2 and Generational Cohort Theory: The Case of Telkom Indonesia
Ditmar, StephanICT enabled transformation of the Dutch insurance industry: a case study in business-IT alignment - CONFIDENTIAL
Ekefre, DavidA Comparison of Methods for Predicting Football Matches
Fan, ShenshenAdding Value to Software Development and Maintenance by Software Architecture Evolution Visualization
Fernando, DonIntention to Use Go-Jek Service Application in Indonesia by applying Task Technology Fit and Social Capital
Heere, MartinImpact of regional innovator networks on academic commercialization output -Evidence from 2 Dutch technological science parks-
Heijer, Peter denMindfulness Practices in Agile Project Organizations
Helm, Adriaan van derAdoption of the Internet of Things in a B2B environment: A focus on acceptance and challenges - CONFIDENTIAL
Hoekstra, FreekFunctionality based business application classification
Kracht, MarcelFast-track Enterprise Architecture And IT Delivery: An Implementation Approach - CONFIDENTIAL
Langras, DaniëlStrategic housing management: Decision support system for strategy selection. A Case Study at Eigen Haard - CONFIDENTIAL
Lê, MinEnterprise Architecture. Mapping of BMC, DEMO and ArchiMate
Leeuwen, Brian vanSPOCs in the Ivory Tower. Exploring business models for private online courses for professionals in the context of universities - CONFIDENTIAL
Loerakker, JeroenCombining Lean, Six Sigma, Customer Journey mapping and Agile. A study on Business Process Redesign at Royal FloraHolland - CONFIDENTIAL
Luo, YulinExploratory Research on Implementing Fog Concept in the Connected Vehicles Scenario
Manraj, AnilUnderstanding Consumers’ Adoption of Beacon Technology in Retail - CONFIDENTIAL
Marate, KarIshmaAdvice on how DevOps can support Change and Release Management at TomTom - CONFIDENTIAL
Pirvan, CristianPlayer three has joined the game: Industry platforms as facilitators for disruptive innovations
Qi, XinPrivacy Maturity Model: Towards Privacy-by-Design Best Practices
Romijn, KevinAgile Leadership, Shared Leadership, or No Leadership: Understanding the Balance of Leadership Styles and Decision Making Responsibilities in Agile Organizations
Santokhi, ShanyllaE-learning integration in developing countries with a case study of the Anton de Kom University of Suriname
Siskos, ChristosAn IT Healthcare Platform Driving Improvements in the Dutch Healthcare Process
Soekhoe, DeepakOn the Impact of Data Set Size in Transfer Learning using Deep Neural Networks
Stavropoulos, VasilisSport Data Analytics: Statistical analysis, comparisons and predictions for the next Olympic Games - CONFIDENTIAL
Stavrou, EleniRequirements prioritization in Agile environments: a model for effective prioritization
Sultani, YunusTechnical perspective of performance measurement system. Measuring and improving performance with Google analytics - CONFIDENTIAL
Unlu, IlhanStrategic Decision Making with use of Enterprise Architecture for Educational Institutions
Vlyssidis, KonstantinosTowards a Metric-based Security Model
Vries, Bas deImprovement of employment candidate selection using Data Mining - CONFIDENTIAL
Wijden, Kevin van derMarket specific processes in ERP systems. An explorative study on the bulb forcing process
Yang, ShuoLinking Science and Technology: Reference Matching for Co-citation Network Analysis
Zhang, YanHumor Recognition Based on Background Knowledge: A Preliminary Study

2014-2015
Student Thesis
Alberts, StanleyApplicability of Agile Scrum within IT infrastructure projects
Barendse, RemigiusICT enabled communication for patients with final stage neurodegenerative Parkinson’s disease: Development of a communication board prototype
Basit, Fate & Ramkhelawan, PrashantExploring the relationship between smartphone application‘™s business models, usage and culture
Boonen, FinneUnderstanding monetary driven and intrinsically motivated developers in open source projects
Chatzistefanou Stefanos & Siskos ChristosAn IT Healthcare Platform Driving Improvements in the Dutch Healthcare Process
Dimitrov, LazarUsage-based measurement of user satisfaction in mobile applications
He, HuihangInvestigating network automation at Capgemini
He, MiaoExploring the Relationship between Football Players’ Performance and Their Market Value
Howard, RogerRight of Subject Access. From request to response: An analysis of process performance
Huayller Zuleta, RamiroDeveloping Entrepreneurial Spirit and Skills Through Community Building at Universities: Role of Intermediaries
Ibraim, NazikeImpact of social media for student recruitment practices at Leiden University: ArchiMate based approach Leiden University case study - CONFIDENTIAL
Kamal, DharaThe Quest of synergizing multiple standards: Building a unified framework that gives insights on the relations between ITIL, ASL, BISL, TOGAF, PRINCE2 & COBIT - CONFIDENTIAL
Kerkvoorden, Nicko vanThe Accuracy of an RCA Tool to Identify the Fundamental Causes of an Underperforming Process - CONFIDENTIAL
Koppen, Alex vanSelf-Service Technology Adoption: A B2B Logistics Perspective
Koppens, StevenOptimizing Business Intelligence Through A Process-Centric Approach
Lee, BrettCombining Lean Six Sigma with the Design & Engineering Methodology for Organizations.- An exploration of opportunities.
Lie-Tjauw, FeliciaEvaluating the performance of Technology and Vendor selection in the architecture process - CONFIDENTIAL
Liotis, ChristosCharacterization and Establishment of Business-IT Alignment
Meer, Lucas van derMeasuring data governance: a structured method to assess data governance maturity
Middendorf, BoudewijnCyber Security in the Supply Chain
Offerman, TyronImproving IT Supported Organizational Change; Formalizing Organizational Implementation Fundamentals
Ohler, HendrikOrganizational optimization: Research into DEMO and LSS to optimize a organization and their possible contribution to developing a High Performance Organization - CONFIDENTIAL
Pielage, StijnMobile Business Intelligence & Analytics at KLM - CONFIDENTIAL
Ramkhelawan, Prashant and Basit, FateExploring the relationship between smartphone application‘™s business models, usage and culture
Rezai, MohsenAgile Maturity and Quality Metrics
Routsis, DimitriosMethod for automated reconciliation of risk rating data ‘“ With a design and implementation at ING
Sakareza, WillyMobile Payment in Indonesia - CONFIDENTIAL
Schoufour, SvenThe Application RationalizationIndicator model. A rationalization method that evaluates applications that are redundant in their functionality to help an organization with selecting the most suitable application for their business process. - CONFIDENTIAL
Tan, HuanExploratory Research on the Concept of Data Lakes
Venekamp, Klaas-JanThe industrial use of 3D printing and its potential for process innovation in the energy sector - CONFIDENTIAL
Verhoeven, MarcelContinuous auditing adoption in the public audit domain: An exploratory study using the Technology Acceptance Model. - CONFIDENTIAL
Vermeij, CoenSoftware Development Methods in Large Regulated Environments
Vodegel, ErikA Testing Framework for Mobile Apps: An Empirical Study at KLM - CONFIDENTIAL
Zhang, YaxinConceptual Data Model for Slot Machine Performance - CONFIDENTIAL
Zheng, LijinBenchmarking Enterprise IT Performance:Enterprise IT performance Measurement Model - CONFIDENTIAL
Zuijderduin, Gijs“Lean” Business Intelligence: “Testing a possible “lean” framework to implement Business Intelligence in small and middle-sized enterprises, organisations and business units.” - CONFIDENTIAL

2013-2014
Student Thesis
Alaeikhanehshir, MohammadBusiness Intelligence Improvement: How to systematically maturate Business Intelligence within an organization - CONFIDENTIAL
An, RanExploratory Research on the Concept of IT Debt
Andreyev, AlexanderApplying constellation of practices as the lens to understand agile transformation: case study - CONFIDENTIAL
Bacaoanu, AndradaSTEEP-M: a risk analysis framework for e-Participation projects
Bockhoven, SandraOrganizational Implementation Fundamentals: a Case Study Validation at Jeugdzorg Nederland - CONFIDENTIAL
Cheloi, RamanAssessing Cloud Computing Adoption in Governments via Enterprise Architecture Motivation Modeling. A Dutch Government Case Study - CONFIDENTIAL
Cui, XiIdentification of Essential References Based on the Full Text of Scientific Papers and Its Application in Scientometrics
Douramanis, MichalisRisk assessment for the cyber threats to networked critical infrastructure
Egmond, Dick vanIT Value Management through the total life cycle of investments at Dutch municipalities
Gkikas, OrestisThe Rubik‘™s cube model: A metadata driven approach to access control in modern ECM systems
Günther, WendyMeasuring Enterprise Architecture Effectiveness: A Focus on Key Performance Indicators
Huang, YunweiCapability Maturity Model for Software Usage
Ibraimov, SabriDeveloping assistive technology products for visually impaired people from users‘ and stakeholders' perspectives
Ivanova, ElitsaBusiness Performance Management at the Dutch Customs A Case Study on Continuous Monitoring methods related to the Big Learning Circle - CONFIDENTIAL
Khaoya, ZipporahData Privacy challenges in Mobile Money Transfers-The Kenyan Experience - CONFIDENTIAL
Kiousis, GeorgiosSystems of Engagement: Smart Process Applications, Managing collaborative activities
Koeldiep, WarshaImproving the creation of innovative IT solutions within Dutch universities Via a soft IT perspective
Kruitbosch, EricAssessing the decisions made prior to the use of Enterprise Architecture as a means to govern IT projects
Ladchartabi, RezaJAMES, A Novel Way-Finding System for the Visually Impaired - CONFIDENTIAL
Liu, FeiCoalition Formation during Technology Adoption
Long, YuModeling Data Lineage in Enterprise Architecture - CONFIDENTIAL
Major, VeraService-Oriented Architecture. For Healthcare Governance a Thesis
Malik, SharjeelTransformative business models: bridging the gap between vendors, suppliers and customers - CONFIDENTIAL
Meuldijk, LeonInfrastructure management according to Enterprise Architecture
Mooij, Bram deUsing Serious Games to raise awareness, train and reflect on Agile Project Management Methods in practice
Oedit Doebé, AmietLiving Labs. Engaging the end user with Social Media
Osta, Jan-Paul vanSolving Dynamic Vehicle Routing Problems in Practice
Paris Soares, IriaA reference model for physical asset management - CONFIDENTIAL
Ralli, ZoiThe IT aspect of Operational Risk
Rijnboutt, EricInterorganizational enterprise architectures
Silinskyte, JurateUnderstanding Bitcoin adoption: Unified Theory of Acceptance and Use of Technology (UTAUT) application
Taal, JesperBusiness Transformation: From Strategy to Enterprise Architecture - CONFIDENTIAL
Tom AltenaCloud computing en MKB-organisaties in Nederland: hebben we een match? - CONFIDENTIAL
Trixie, LevinaSecurity in the Implementation of Electronic Health Records in Indonesia
VasileiosLarge scale identification of organizational name variants in bibliographic databases – CONFIDENTIAL
Visser, LeonardA grounded theory research into the adoption of Continuous Auditing by internal auditors -CONFIDENTIAL
Vliet, Rody van derImproving the effectiveness of ERP systems in organizations through the practical integration of business process models. An in-depth case study at a 3PL.

2012-2013
Student Thesis
Altinay Soyer, SeherData Quality Management, A Solvency II Perspective
Arora, SwatiEnsuring success of Transition and Transformation in Sourcing. Success Factors and Effective Recommendations - CONFIDENTIAL
Berg, Elizabeth van denAn analysis of the impact of automation of human computer interfaces in the airplane industry
Blikman, RicardoRanking of Multi-Word Terms
Bruin, Wouter deIncreasing the Benefits of Enterprise Architecture
Cervellin, AndreaAssessment of Mobile Application Succes: Measurement Framework and Decision Support System - CONFIDENTIAL
Choden, TsheringEmpirical Analysis of Release Based Delivery, an agile approach to software development in a large organization
Ferwerda, AdryA longitudinal study on the effects of introducing MD*/DSL modeling on productivity in software maintenance
Genova, RaliExtending the Context of Agility ‘“ A Conceptual Model for Program and Portfolio Management of Agile Software Development Projects.
Hoedelmans, MartijnA Guide for the Selection of a Project Specific Software Development Type - CONFIDENTIAL
Horz, JeannetteManaging portfolios of agile software development projects: how do organizations do it?
Jagbandhan, JaswantPlatform-as-a-Service impacting Enterprise Agility
Kaldenbach, MichaelCross-Border Innovation Intermediary: Insights from Institutional Perspective
Kinneging, XanderEnterprise Architecture & Quality Management Integration. An explorative study - CONFIDENTIAL
Kroon, EgbertMaintenance staff, please board the project, you are delaying the handover: A research on the artifacts of knowledge transfer in Agile software development projects - CONFIDENTIAL
Liu, SimonA Case study to look at the adherence of Industial Process Descriptions for Global Software Development
Lo, JamesMeasuring agile projects for portfolio management using project outcome
Masey, JonathanA conceptual model: Identifying the drivers of pricing elasticity in Electronics.
Mathoera, AshwinAn information architecture design for the Cold Phase of the POPULATION CARE process: an explorative study
Paliogiorgos, FotiosGlobal Digital Marketing at Adidas
Philippo, Erik-JanAn Empirical Evaluation of the Impact of Requirement Ambiguity on Software Projects in a Financial Organisation
Rhijn, Herman vanEnterprise Design for a digital study and work environment. Changes in educational logistics
Sluijsmans, BasInformation exchange in the Dutch Public sector. A case study into the Digital Client Dossier - CONFIDENTIAL
Soerdjbali, SurajHow to improve fundraising in small Dutch charities using an app and user engagement
Veger, EdwinMining the Wiki Game
Wahyuni, IrnaProviding Mobile Money to Unbanked Customers
Wel, Roy vanHow can organizations cope with Agile software development practices?
Wiering, DavidBring Your Own Device. An implementation model
Zhang, SophieAn Exploratory Examination of the Practicability of COBIT framework

2012
Student Thesis
Alexandra CaraghiuleaStrategic Business!IT Alignment:Defining an innovative alignment model for IT governance improvement in major financial groups
Andres Hernan Zapata ChavezIT Estimation process: Accuracy and Value Creation
Georgios ValaourasFinancial Bootstrapping in small Technology-based Firms. Exploring the practices, motivation and influencing factors of using alternative sources of financing
Harry FulgencioLiving Lab: Innovation through Pastiche. A research linking disparate and discorded ontology)
Marco KanisMapping the IT Security Risks in the laaS Cloud
Marco SchönfelderData Movement Analysis of Automotive CAE Processes in a Development Environment
Marin GoedegebureInfluence of inspirational leadership on virtual teams in global software development, testing and support
Martin BouterseSocial Engineering and Phishing Part I & II - CONFIDENTIAL
Martine KeaExposing Technology Impact via Enterprise Architecture. An Intel Active Management Technology Case Study
Peter HendriksFinding the role of disease-specific, standardised Electronic Health Records in a Hospital‘™s Information Architecture, closing the Policy-Practice Gap; A case-Study approach
Ricardo Alanis BarreraValue of IT Consulting Services: Service and Relationship Quality as Value Generators -CONFIDENTIAL
Rick van den HengelBenefits and Change Management. ‘How can the benefits management approach and change management improve IS/IT investments from a business point of view?' -CONFIDENTIAL
Robin van den BroekIntegrating Testing and Quality Assurance into the Agile Software Development Process Scrum
Rut Elsa Torres VargasA Quality Model for UML Models and Its Application to Industrial Case Studies
Sander HutmanExtraction of spreadsheet model for OLAP database
Soroush Setodeh HaghighiThe Matchmaking Process in high-tech open Innovation R&D Paradigm from Guanxi Perspective: the case of China
Xiaoran LiuData Quality Issues in Reporting in Investment Management at ING and Recommended Solutions -CONFIDENTIAL

2011
Student Thesis
Adrian KentschExploratory Recommendations Using Wikipedia's Linking Structure
Bogumila SobolewskaBusiness value of online communities in public sector
Christian SchoutenThe search for a set of relevant KPI's
Clemens TimmermansThe changing laws of business agility, A case study on improving business agility in case of legislative change
Gengsi SunIntroducing RPB model for stakeholder management in ING lending transformation programme
Jelle de GrootIncorporating Software Quality in the Capitalization of Software as an Asset
Kas RamjiawanWat Is de toegevoegde waarde van Enterprise Architectuur bij het realiseren van bedrijfsdoelstellingen?
Marco HofmanText mining in Dutch reports with a specific vocabulary
Matthijs BiermanEmpirical research into Gateway-reviews at the Dutch national government -CONFIDENTIAL
Michael de GrootVirtual Collaborative Work as Weak Ties
Petr HylInstability Evolution in International Joint Ventures
Robbert van EijkWeb Tracking Detection System (TDS) An effective strategy to reduce systematic monitoring and profiling of user habits across websites
Ruben van de WoudenHow does the relationship between behavioral uncertainty and trust evolve in an interorganizational relation?
Sjaak KootApplying the Capability Approach to ICT4D Projects, an Organisational Perspective
Soerin BipatHow can the adaptation behavior of IT project managers, within the Dutch government, be explained in situations of political involvement?

2010
Student Thesis
Arjan AssinkSocial Media as a recruitment tool
Christian WittenbergIs Outsourcing Killing or Kindling Innovation?
Dimitiros KritsilisTrust and Globally Distributed Software Development (GDSD) teams: Exploring the importance of building and maintaining trust among distributed team members from the perspective of GDSD project management.
Erwin MargesAlignment of Information Systems for Innovative Objectives: The case of the SAVE ENERGY Architecture in a Living Lab Experiment
Georgios RoussakisDesigning IT Organizations: Analyzing Important Design Options and providing a Decision Support Framework
Istran DulosRequirements reviewing in a software factory: A case study
Jan UdesHaalbaarheidsonderzoek naar de mogelijkheden van e-learning ten behoeve van een veiliger gebruik van sociale netwerk sites door licht verstandelijk beperkte kinderen
Klaas-Dirk van OpstalPlatform based software development
Marco KatwijkTransparant decision making for the IT Project portfolio
Matheus VlasveldWeb 2.0. patterns, The implications on web content management, document management and knowledge management
Raluca ToaderAn analysis of the effects of security requirements on planned project resources
Rene de GrootRealization of operational excellence in virtual network organizations
Reyner KarnaliThe Adoption of e-Commerce Enabled Supply Chain Management by the Indonesian Grocery Industry
Sander van der ZonProcess improvement of the purchase process via an enterprise architecture maturity model
Stefan GuijtBusiness Intelligence Risk Framework. A new approach for auditing a Business Intelligence environment. - CONFIDENTIAL
Teppo HellesInstitutional Influences to Business Strategy in Emerging Economies: A strategic planning framework for multinational corporations contemplating market entry into China
Tiantian GuA comparison of critical success factors among Non-University based Business Incubators in the Netherlands
Tim van MeursLean Software Development The role of processes and of preconditions for success
Ying HuaEvaluation of a Diphone-based Synthesis Method for a Chinese Text-to-speech system

2009
Student Thesis
Andre JonkerValue of ‘œCollaboration Platform‘For Knowledge Intensive Small and Medium-Sized Enterprises (KI-SMEs)
Carl SuaresProject Management Steps towards professionalization
Constantijn BakkerTowards balancing business- and it interests in architectural design decisions
Dejan RadosavljevikPrepaid Churn Modeling Using Customer Experience Management Key Performance Indicators
Fabian IflandExternal IT Application Complexity and its impact on the organization
Gerrit van der MeijdenIT Project Standards In A Globally Distributed Organization
Jan VisserBeheersing of afstemming
Jos de GrootBusiness IT Alignment and a Market Orientation
Jurjen BorstThe weight of Corporate Culture in the ERP Software Selection Process
Lei ZengChange Management in Software Process Improvement, the case of a global financial group
Libing QiuA Comparison of Process Descriptions and Specifications in the Offshored Software Development Industry
Peter BargonBuilding a Cost Effective Vendor Management Service
Qiaoya WangApplying Density Estimation Model to Driving Behavior Analysis
Qingjing YangAudit: An Integration Oriented Internal Control and Monitor Tool for Process Management --A Case study of Canon CR process
Raymond de VosNetworks and information technology: Citizens taking responsibility and participate within a changing health care environment
Rene Noorduin GreccoLocal Governments, How Change Process Analysis Can be Used to Explain Why E-Participation Projects Fail
Sandhya LalloesinghExploring the operational working routines in the domain of virtual projects
Stef CobelensExploring in-game advertising in first person shooters
Stefan ZhelyazkovBusiness Value of software in SMEs
Yuguang ShiApplication of Kriging on Auto Insurance Premium Calculation Modeling

2008
Student Thesis
Bauke FahnerEA Framework
Chen LiAn Exploratory Research about Comparison between Current Care Process and Telemedicine Care Process
Christos MileosExamining the Relationship between IT Governance Software and Business Value of IT: A Questionnaire Based Approach
Chung-ming TsaiAccount sales
Di YuBuilding dynamic capabilities of project development: a study on management practices in a global IT project
Egon GleisbergEmploying Criteria for Prioritizing and Selecting Projects for the IT Portfolio
Folkert van WagenbergAssessment of Business-information security alignment
Jasper OdijkAlignment of IT and business strategies: A case study of strategic alignment and its underlying processes and capabilities at homecare service organizations
Jorge Andres Osorio SochoEvaluation of different strategies for the implementation of RUP within KLM. Using a simulation-based methodology of systems thinking called systems dynamics
Konstantinos SklirisAdoption of computer mediated communication systems in virtual trams
Panagiotis VodinasChange Management in Information systems - Implementations that Depend Heavily on External Partners
Patrick den OudstenAdoption of open source CRM: towards a framework for open source CRM adoption
Robert LamanAssessing the added value of project management methods ‘“ the case of InFraMe
Sanna TauriainenCorporate culture & Knowledge Sharing
Sonny Juma Nyekoe-Business models for Telecentres in developing countries: Sustainability for Social Entrepreneurs
Tao MaA Way of Improving Sales Process
Ting WangA process study on end users‘™ post-adoptive behavior
Tsoe Loong LiMeasuring performance of not-for-profit organizations
Wojchiech ChowanskiTowards flash crowd proof web services
Xin WangAspect-oriented Programming Aided High-level test automation enhancement
Xinyu JiangStrategic decision-making on ICT R&D projects: Integation of Real Option Reasoning with Technology Roadmapping

2007
Student Thesis
A. ClairmontA process oriented approach for identifying the expected business value of an IT investment: The POVI method
A. HanninkService innovation management in MVNOs
A. SoekhoeClient-oriented innovation in the Dutch home care ‘“ Archimate contributes to the design of an ECT care platform
Ch. SatbhaiMainframe capacity planning
G. VasquezThe role of datamining in the provision of relative value of growth
H. van DoornRelevant factors for developing and implementing a policy for corporate social responsibility, The role of the ICT department
J. HardersPlanning in disruptive environments
K.-J. MolendijkMatching project stuation and software development methods
M. StolwijkOrganizational and automation modelling aspects of the ANSI RBAC standard
M.Y. (Casey) YapAn exploratory study: virtual worlds and political participation
N. XuExplanation interfaces in recommender systems, model in ABN AMRO
R. SiebelingOrganizational knowledge creation and transfer through distributed systems
R. SneijersStrategic alignment from an enterprise architecture perpective: An investigation in the Dutch casualty insurance industry
R. SparnaaijBridging the gap between intra-organizational mobile collaboration scenarios and tools
S. BlomCorporate social responsibility and online shopping
S. ButtBusiness software integration maturity model
S. van den BeltAnalysing IT risk management tools
W. HeijstekEmpirical investigations into rational unified process effort distribution in industrial software engineering projects
Y. ZhangAn empirical study on abnormal returns from M&A activities in ICT industry
Z. NiRecommendations for an improved transactional forecasting tool
Z. XuSecure employee knowledge exchange in multinational cooperation ‘“ A theoretical model

2006
Student Thesis
Alastair ComleyConcluding knowledge transfers: a case study about SSA Global Inc.
Ariadi NugrohoModeling web service orchestration with paradigm
Bastiaan MaatThe need for fusing head & neck cancer data. Can more date provide a better data mining model for predicting survivability of head & neck cancer patient?
Chong GaoSimulation and optimization on analytical and collaborative customer relationship management
Ender AtalayData warehouse success: the Impact of System - and data quality on the typical organization
Jelmer CormontApplying requirements engineering to knowledge management practice
Jeroen GoddijnImplementing competency management in knowledge intensive ICT organization
Jing WuInformation visualization in enterprise news portal
Junfeng LiangModeling coordination in ICT and business worlds
Kamran HeydariService management in the mobile phone industry
Lei TaoUsing genetic programming to find optimal purchase-ordering rules
Lianzhuang QuRoad to a virtual homecare organization
Marnix EedensSelf-service technology acceptance: an assessment of differences in propensity to use self-service technologies among passenger segments in an airport environment
Patrick DitmarIntrinsic software quality management through the use of a CMM-based assessment model
Prewies GajaHow an IT system could intensify the interaction between salespersons and R&D in new product development in a configure-to-order-oriented company
Richard GerdingResearching IT-Governance in a credit management company
Rui ChenApplication of collaborative filtering algorithm in Bioinformatics
Soeris RamautarKPI for software requirements
Tjeerd TesselaarConcluding knowledge transfers: a case study about SSA Global Inc.
Tristen RaboenA wireless short message framework model in electronic business
Xiang DingRoad to a virtual homecare organization
Yin ZhouCoordination modelling and design of adaptive learning content to content management system: paradigm modelling in the case study of BioTune project

2005
Student Thesis
Arno SpierenburgThe learning-effects of ICT mediation on the formal and network governance of the buyer and seller of information intensive systems in long-term business relationships
Bin LiConstructing a high-level, fundamental, generic, and secure e-commerce software architecture by using UMLsec for the small and midsize logistic enterprises
Daniel van HiltenWhat is the impact of cultural differences on multi-site software development?
Giljan ValICT for the innovative office - using models in a study on the innovative office and its ICT aspects
Harm SnippeIT-governance in executive agencies
Hendrik EngelsData warehousing in The Netherlands: stages of growth and associated issues
Jeroen PrommenschenckelRisk analysis in information security
Lina SunMaking the right offer to the right customer: strategies for real world multi product decision
Lodewijk BenjaminseCreating and sharing knowledge with expertpanels
Marinus RiemensCommunicating with enterprise architecture. About how enterprise architecture can be used for decision support
Matthijs KerkvlietDifferences in success of executed ICT projects
Meikun JiaIT outsourcing to China - risk assessment
Min XieSpecification of e-business process model for the PayPal online payment process using Reo
Patrick KoenSarbanes-Oxley; getting a grip on technical IT infrastructure
Robin van KoppenBusiness chain intelligence
Sergio Prieto BallonCrime data mining
Shanshan WangTrust improving extension for B2B e-marketplaces: a case study in China
Susanne StevensChange impact analysis and enterprise architecture. The Archimate model
Wei RenHow to use CobiT in health care organization's IT auditing
Wei ShenPeer-to-peer based knowledge management system
Wei ZhangEvolving trading rules with a hybrid genetic programming and evolution strategies approach
Willem VolkeriWhat is the impact of cultural differences on multi-site software development?
Yongzhi LiSpecification of coordination behaviors in software architecture using the Reo coordination language
Zhaochun SunImprove data reliability for fused data in data mining

2004
Student Thesis
Evert-Jan de BruinMethods for impact analysis at UWV
Hongliang WangDesigning attack resistance in evolving mobile architecture
Jeroen DerwortOnline soccer manager going global
Jing LiMarket based accounting study on components of goodwill in acquisitions:­Aan empirical study in ICT industry
Lingjun MengArtificial immune system for knowledge discovery
Rabia FatehmahomedZenc goes international. Vergelijkend onderzoek naar overheidsprocessen in Nederland en Belgie