39 entries found.
Student |
Thesis |
Content |
Basten, Hans van | Explaining driving behavior in a connected car | |
Beems, Cas | Characteristics of value streams in practice | |
Bosch, Michael | An adoption framework to improve the adoption of BI, emphasing the role of documentation | |
Brochard, Marlo | Defining and measuring the maintainability of Splunk apps | |
Browne, Roos | Explainable AI Techniques for ML-based Financial Forecasting | |
Cheng, Xinning | Redesign Mutual Fund Settlement Process with Distributed Ledger Technology | |
Doppen, Thijmen | Self-Service Business Intelligence: Causal Factors for Success and Failure | |
Egberts, Jari | Bridging the gap between risk assessment and security operations | |
Farag, Seif | Towards Microservices architecture: A case study to improve decision-making | |
Hadi, Putu | Improving Satu Data Indonesia With FAIR Elements: A Model to Extend Satu Data Indonesia Principles in COVID-19 Data Management | |
Hasanovic, Mirhad | Technology Legitimation of Electronic Medical Records in Dutch Healthcare Settings | |
Heddes, Amrish | A Multilevel Service Design Method For (Corporate) Financial Institutions | |
Hobbs, Richard | Data Privacy Transformation – Legislations to Controls | |
Horssen, Daan van | Coping with Integrating Enterprise Architectures in Case of Mergers & Acquisitions | |
Jahangier, Dominic | Continuous Financial Monitoring using Data Analytics in SMEs | |
Kerckhoffs, Rutger | Modelling of Software Package Implementation: A Case Study | |
Klaver, Martijn | Traditional BI vs. advanced analytics competency centers | |
Kleisterlee, Wietze | Scaling down Doughnut Economics to Sustainable IT at the Organizational Level | |
Kroon, Udo | Smart Intelligence Beyond Borders: Understanding FCInet and Ma3tch Technology | |
Lachal, Ahmed | A CRITERIA DRIVEN METHOD FOR SELECTING INFORMATION EXTRACTION TOOLING FOR DATA LAKE OPTIMIZATION | |
Lale, Rajesh | Bimodal Architecture: The first Reference Architecture for setting-up a Bimodal IT platform | |
Lin, Yi | A FAIR Data Based BI Framework within the Healthcare Domain in Africa | |
Mayar, Matin | Qualitative Research on: eMental care Trust Barriers and Mitigation Measures Within the Dutch Mental Healthcare | |
Mohamed, Jousuf | A GDPR cloud migration risk strategy for retail banks | |
Prevaes, Dennis | Cybersecurity in the pension fund sector | |
Prima, Ryan | Use of Data Analytics for Fraud Investigation and Fraud Detection in A Global Health Technology Company | |
Ramsaransing, Brendon | Improving the Quality of Integrated Reporting A Mixed-Method Report on How Readability is Perceived Within Dutch Accountancy Companies. | |
Samnani, Malik | E-mail marketing in the post-GDPR era - A study of residual risks and recommended best practices | |
Sklaveniti, Stefania | The Relationship of Learning Agility and 21st Century Skills in the IT Industry’ | |
Sturis, Jurre | Toward an alignment model for security requirements for medical information processing organizations that are dependent on third parties | |
Tang, Tiantian | From Natural Language to UML Class Models: An Automated Solution Using NLP to Assist Requirements Analysis | |
Timmers, Lennart | Migrating and transforming self-hosted software products into a SaaS solution | |
Touhami, Mounaim Ben | Quantifying the Effectiveness of Cyber Security Awareness on Human Behavior | |
Valchev, Ivo | Effect of negative emotional display on contribution acceptance in open source projects: evidence from GitHub | |
Verbrugge, Damian | An assessment model for RPA process suitability and business goal contribution | |
Vermaase, Muriel | The value of anomaly detection with Isolation Forest in the financial audit | |
Visser, Arjan | A Perceived Architecture Description Development Process | |
Vlak, Martijn | Impact of the intelligent lockdown on the Dutch inter-industry transaction network | |
Vorm, Yorick van der | A comprehensive mapping of the software selection capability in terms of operational routines | |