36 entries found.
Student |
Thesis |
Content |
Anastasiou, George | Automated Detection of Performance Regression in New Versions of PostGreSQL | |
Bachour, Daniella | A comparison of approaches on the analysis of the usability of Leiden University's website | |
Cristino, Noly | The Strength of the Local Content Requirement Regulation on ICT in Indonesia as a Policy Approach | |
De Sandre, Nicolo | A Multicriteria Evaluation of Blockchain Technologies in the Healthcare System | |
Doornhof, Christan | Understanding the motivation of employees and managers in an internal work marketplace within a professional consulting firm | |
Draijer, Wilco | The Creation and Integration of a Legal Information Retrieval System without Manual Query Construction | |
Els van, Victor | Agile transformations and Organizational Performance: the impact of maturity, employee satisfaction and transformation approach | |
Helling, Thomas | Anomaly detection in real-world networks | |
Hoogenboom, Cedric | An Enterprise Architecture Approach to Implementing the NIST Cyber Security Framework. | |
Koemans, Denny | Blockchain technology for a better secured IIoT network | |
Kommers, Sebastiaan | On the internet, no one knows you are a citizen. | |
Lefevere. Nick | An exploratory study of blockchain projects factors for success | |
Liu, Fen | An Empirical Study into The Reasons of Low Performance of Online Advertisements. | |
Loeffen, Fynn | The development of an information security governance maturity model for Dutch hospitals | |
Magoma, Annastansia | FAIR-based digital health in the East African Community: Designing an Eldoret FAIR Data Point | |
Mandeep, Malik | Exploring the use of Permissioned Blockchain Technology for supply chain Traceability | |
Meijerink, Corjan | Critical node analysis on supply chains: a network | |
Michael Ayas, Hamdi | Decision Support Systems and Business Intelligence for agile portfolio management | |
Neve, Jeroen | Roles, position and IT governance of the departmental CIO at the Dutch central government (Rijksoverheid) and its maturity potential. | |
Oedayrajsingh Varma, Vinay | Challenges in a Vested Outsourcing arrangement: a case study of a car manufacturer and IT service supplier | |
Oprins, Richard | AGILE: TRANSCENDING THE BORDERS OF IT. The emerging influence of feedback and creativity | |
Osenov, Ivan | Cryptocurrencies: Mutual relationships and event reactions | |
Passos, Anton | Software Quality Metrics in Practice | |
Putri, Hedlina Annisa | The Contribution of Digital Health Solution to Universal Access to Health in Bontang, East Kalimantan, Indonesia | |
Rasenberg, Mark | Automatic classication of handguns in CT images of cabin baggage using Convolutional Neural Networks. | |
Rashid, Raja | Trend Research and Strategic Forecasting | |
Soelaksana, Erik | Utilizing blockchain technology to reduce revenue loss caused by roaming fraud in the telecommunications industry | |
Veger, Lude | The influence of Enterprise Architecture on Enterprise Risk Management | |
Vergara Manrique, David | Applicability of diffusion models to forecast sales of Health Tech products | |
Virag, david | Security challenges and viable solutions for continuously connected near-autonomous vehicles | |
Wansleven, Dennis | Consumers' Technology Acceptance of mobile biometric authentication methods for nancial transactions | |
Wildvank, Tonny | An integrated multi-faceted system approach for improving the development of information systems | |
Wit de, Danny | What new forms of eco-systems can develop when markets shift to a combination of decentralized production, decentralized distribution, and a decentralized administration process? | |
Wortelboer, Martin | A framework for the deployment of Analytical Models for organizations in the Public Safety & National Security sector | |
Wu, Collin | A process model for no-code development towards a common understanding of the no-code development process | |
Yung, Jenny | Lightweight Requirements Engineering Metrics Designing and evaluating requirements engineering metrics for software development in complex IT environments – Case study | |