Note: this thesis repository might be incomplete for certain programmes.

37 entries found.


Master ICT in Business



2013-2014
Student Thesis
Alaeikhanehshir, MohammadBusiness Intelligence Improvement: How to systematically maturate Business Intelligence within an organization - CONFIDENTIAL
An, RanExploratory Research on the Concept of IT Debt
Andreyev, AlexanderApplying constellation of practices as the lens to understand agile transformation: case study - CONFIDENTIAL
Bacaoanu, AndradaSTEEP-M: a risk analysis framework for e-Participation projects
Bockhoven, SandraOrganizational Implementation Fundamentals: a Case Study Validation at Jeugdzorg Nederland - CONFIDENTIAL
Cheloi, RamanAssessing Cloud Computing Adoption in Governments via Enterprise Architecture Motivation Modeling. A Dutch Government Case Study - CONFIDENTIAL
Cui, XiIdentification of Essential References Based on the Full Text of Scientific Papers and Its Application in Scientometrics
Douramanis, MichalisRisk assessment for the cyber threats to networked critical infrastructure
Egmond, Dick vanIT Value Management through the total life cycle of investments at Dutch municipalities
Gkikas, OrestisThe Rubik‘™s cube model: A metadata driven approach to access control in modern ECM systems
Günther, WendyMeasuring Enterprise Architecture Effectiveness: A Focus on Key Performance Indicators
Huang, YunweiCapability Maturity Model for Software Usage
Ibraimov, SabriDeveloping assistive technology products for visually impaired people from users‘ and stakeholders' perspectives
Ivanova, ElitsaBusiness Performance Management at the Dutch Customs A Case Study on Continuous Monitoring methods related to the Big Learning Circle - CONFIDENTIAL
Khaoya, ZipporahData Privacy challenges in Mobile Money Transfers-The Kenyan Experience - CONFIDENTIAL
Kiousis, GeorgiosSystems of Engagement: Smart Process Applications, Managing collaborative activities
Koeldiep, WarshaImproving the creation of innovative IT solutions within Dutch universities Via a soft IT perspective
Kruitbosch, EricAssessing the decisions made prior to the use of Enterprise Architecture as a means to govern IT projects
Ladchartabi, RezaJAMES, A Novel Way-Finding System for the Visually Impaired - CONFIDENTIAL
Liu, FeiCoalition Formation during Technology Adoption
Long, YuModeling Data Lineage in Enterprise Architecture - CONFIDENTIAL
Major, VeraService-Oriented Architecture. For Healthcare Governance a Thesis
Malik, SharjeelTransformative business models: bridging the gap between vendors, suppliers and customers - CONFIDENTIAL
Meuldijk, LeonInfrastructure management according to Enterprise Architecture
Mooij, Bram deUsing Serious Games to raise awareness, train and reflect on Agile Project Management Methods in practice
Oedit Doebé, AmietLiving Labs. Engaging the end user with Social Media
Osta, Jan-Paul vanSolving Dynamic Vehicle Routing Problems in Practice
Paris Soares, IriaA reference model for physical asset management - CONFIDENTIAL
Ralli, ZoiThe IT aspect of Operational Risk
Rijnboutt, EricInterorganizational enterprise architectures
Silinskyte, JurateUnderstanding Bitcoin adoption: Unified Theory of Acceptance and Use of Technology (UTAUT) application
Taal, JesperBusiness Transformation: From Strategy to Enterprise Architecture - CONFIDENTIAL
Tom AltenaCloud computing en MKB-organisaties in Nederland: hebben we een match? - CONFIDENTIAL
Trixie, LevinaSecurity in the Implementation of Electronic Health Records in Indonesia
VasileiosLarge scale identification of organizational name variants in bibliographic databases – CONFIDENTIAL
Visser, LeonardA grounded theory research into the adoption of Continuous Auditing by internal auditors -CONFIDENTIAL
Vliet, Rody van derImproving the effectiveness of ERP systems in organizations through the practical integration of business process models. An in-depth case study at a 3PL.