38 entries found.
Student |
Thesis |
Content |
Alaeikhanehshir, Mohammad | Business Intelligence Improvement: How to systematically maturate Business Intelligence within an organization - CONFIDENTIAL | |
An, Ran | Exploratory Research on the Concept of IT Debt | |
Andreyev, Alexander | Applying constellation of practices as the lens to understand agile transformation: case study - CONFIDENTIAL | |
Bacaoanu, Andrada | STEEP-M: a risk analysis framework for e-Participation projects | |
Bockhoven, Sandra | Organizational Implementation Fundamentals: a Case Study Validation at Jeugdzorg Nederland - CONFIDENTIAL | |
Cheloi, Raman | Assessing Cloud Computing Adoption in Governments via Enterprise Architecture Motivation Modeling. A Dutch Government Case Study - CONFIDENTIAL | |
Cui, Xi | Identification of Essential References Based on the Full Text of Scientific Papers and Its Application in Scientometrics | |
Douramanis, Michalis | Risk assessment for the cyber threats to networked critical infrastructure | |
Egmond, Dick van | IT Value Management through the total life cycle of investments at Dutch municipalities | |
Gkikas, Orestis | The Rubik‘™s cube model: A metadata driven approach to access control in modern ECM systems | |
Günther, Wendy | Measuring Enterprise Architecture Effectiveness: A Focus on Key Performance Indicators | |
Huang, Yunwei | Capability Maturity Model for Software Usage | |
Ibraimov, Sabri | Developing assistive technology products for visually impaired people from users‘ and stakeholders' perspectives | |
Ivanova, Elitsa | Business Performance Management at the Dutch Customs A Case Study on Continuous Monitoring methods related to the Big Learning Circle - CONFIDENTIAL | |
Khaoya, Zipporah | Data Privacy challenges in Mobile Money Transfers-The Kenyan Experience - CONFIDENTIAL | |
Kiousis, Georgios | Systems of Engagement: Smart Process Applications, Managing collaborative activities | |
Koeldiep, Warsha | Improving the creation of innovative IT solutions within Dutch universities Via a soft IT perspective | |
Kruitbosch, Eric | Assessing the decisions made prior to the use of Enterprise Architecture as a means to govern IT projects | |
Ladchartabi, Reza | JAMES: A Novel Way-Finding System for the Visually Impaired | |
Ladchartabi, Reza | JAMES, A Novel Way-Finding System for the Visually Impaired - CONFIDENTIAL | |
Liu, Fei | Coalition Formation during Technology Adoption | |
Long, Yu | Modeling Data Lineage in Enterprise Architecture - CONFIDENTIAL | |
Major, Vera | Service-Oriented Architecture. For Healthcare Governance a Thesis | |
Malik, Sharjeel | Transformative business models: bridging the gap between vendors, suppliers and customers - CONFIDENTIAL | |
Meuldijk, Leon | Infrastructure management according to Enterprise Architecture | |
Mooij, Bram de | Using Serious Games to raise awareness, train and reflect on Agile Project Management Methods in practice | |
Oedit Doebé, Amiet | Living Labs. Engaging the end user with Social Media | |
Osta, Jan-Paul van | Solving Dynamic Vehicle Routing Problems in Practice | |
Paris Soares, Iria | A reference model for physical asset management - CONFIDENTIAL | |
Ralli, Zoi | The IT aspect of Operational Risk | |
Rijnboutt, Eric | Interorganizational enterprise architectures | |
Silinskyte, Jurate | Understanding Bitcoin adoption: Unified Theory of Acceptance and Use of Technology (UTAUT) application | |
Taal, Jesper | Business Transformation: From Strategy to Enterprise Architecture - CONFIDENTIAL | |
Tom Altena | Cloud computing en MKB-organisaties in Nederland: hebben we een match? - CONFIDENTIAL | |
Trixie, Levina | Security in the Implementation of Electronic Health Records in Indonesia | |
Vasileios | Large scale identification of organizational name variants in bibliographic databases – CONFIDENTIAL | |
Visser, Leonard | A grounded theory research into the adoption of Continuous Auditing by internal auditors -CONFIDENTIAL | |
Vliet, Rody van der | Improving the effectiveness of ERP systems in organizations through the practical integration of business process models. An in-depth case study at a 3PL. | |