Note: this thesis repository might be incomplete for certain programmes.

42 entries found.


Master ICT in Business



2016-2017
Student Thesis
Abulzahab, AbdulhadiBlockchain Technology and Its Implementation within Enterprise Information Systems
Ajodhia, KayleshAddressing Internet of Things Challenges in a Smart City based on a Novel Architectural Approach
Atef Ibraim, MohamedApplicability of Blockchain Technology in Telecommunications Service Management
Bakkenes, RobinTowards (limited) IT centralisation in decentral organisations - CONFIDENTIAL
Bhattarai, SurajBusiness Models with Blockchain: Exploring the Business Models of the Applications of Blockchain Technology in Start-up Enterprises
Boon, BenjaminData Driven Enterprise Architecture - CONFIDENTIAL
Bos, RalphBuilding and Evaluating an Enterprise Search Application – A Case study at UL Transaction Security
Boven, Bas vanRobust Real-time Action Classification using Single-Shot Convolutional Neural Networks - CONFIDENTIAL
Brouwer, HugoProduct Traceability: Use case assessment for blockchain technology – confidential
Cammel, SimoneMeasuring the status quo of big data analytics in Dutch academic hospitals
Çolakoğlu, HüseyinExploring information gathering behavior of niche players within IT ecosystems
Dekker, BramInteraction-based pattern analysis in a smart office environment CONFIDENTIAL
Deviani, VanessaA Framework for M-Government Citizen Complaint System. A Case Study in Jakarta Public Services - CONFIDENTIAL
Duwi Ari HaryantoIT Consumerization: Analyzing the Determinants of BYOD-Program Acceptance in Large Scale Company from Employees Perspective and its Effect on Company Attractiveness - CONFIDENTIAL
Gao, MingmingContingency Factors’ Impact on Data Governance Design and Implementation Success Factors - A case study in Digital Security Company - CONFIDENTIAL
Gersen, LéonAnalysis of Data Sources and Processes for Cash Flow Prediction in Small Seasonal Businesses
Himah, AndrewsmHealth Applications: Keeping Personal Electronic Health Records on Mobile Devices Confidential and Secure
Kharitonov, ArtemA framework for strategic intra- and inter-organizational adoption of the blockchain technology - CONFIDENTIAL
Khoenkhoen, SunnyExploring the impact of Business Intelligence and Data-analytics in the Emergency Department - CONFIDENTIAL
Koning, Patrick deNo Need to Read: Measuring the effects of Municipality Safety Plans on Crime Rates - CONFIDENTIAL
Kortekaas, LeonImpact of cloud on the traditional Shared Service Center - CONFIDENTIAL
Koutsougeras, ParisAssessment of Master Data Quality in a Multinational Environment - CONFIDENTIAL
Kreuse, RoyInformation Security Reporting at Strategic Level in the Dutch Financial industry - CONFIDENTIAL
Li, SufengData Quality Evaluation Framework for End-User Computing. A Case Study in a Dutch Insurance Company - CONFIDENTIAL
Lindert, Dylan teSmart energy management as a means towards improved energy efficiency
Liu, ZiweiA Maturity Model for Attribution Modeling Maturity Assessment
Malikbaba, NavidThe Beginning of Mobile 2.0: Exploring the determinants of consumer intentions with respect to conversational commerce on the WhatsApp platform
Mushofi Hasan, AhmadRapid Prototyping in Agile Product Development: A Case Study on Agile Software Companies - CONFIDENTIAL
Okot, PetraDescribing Hawala as Mobile Money (an ICT Innovation) - CONFIDENTIAL
Retnawati, FiaUnderstanding Intermediary Mobile Applications Technology Adoption– a UTAUT2, Self-Efficacy and Involvement Application in A Case Study of Indonesia OTA - CONFIDENTIAL
Rutten, TomEnhancing project portfolio selection in Agile environments -CONFIDENTIAL
Snelderweert, JeroenApplying Project Controls In Exploratory Projects - CONFIDENTIAL
Sufit, AdelaidoDecisions Factors in ERP Migration to SaaS, a Case Study at Perusahaan Listrik Negara (Indonesia’s State Electricity Corporation) - CONFIDENTIAL
Tsogas, KostasConceptualization and validation of a set of metrics to assist Data Driven Decision Making in an Agile setup. A case study of KLM - Royal Dutch Airlines
Velden, Thijs van derComparing Municipalities: Who is your partner in crime?
Vennemans, MauriceHow can machine learning be used in the data analysis pipeline to analyze and improve service desk processes? - CONFIDENTIAL
Westbroek, LucienIT value in the merger and acquisition process, the pre-merger phase and impact on the strategy - CONFIDENTIAL
Xypolytos, AchilleasA Security Assessment Framework
Yan, SixueAnalyzing experience as moderating variable for the relationship of s-commerce characteristics and trust
Yildirim, HuseyinPrivacy concerns and factors influencing individuals behavioral intention to use wearable devices at work - CONFIDENTIAL
Zheng, YUNPENGAn Empirical Study of Customer Co-creation in Social Media Based Product and Service Development - CONFIDENTIAL
Zhu, HanyuComparing the Use of Technology Among Industry Branches