| Student |
Thesis |
Content |
| Boogaart, M. van den (Marianne) | Publiek-private samenwerking op data: Data deel bereidheid en de spanning tussen ‘controle houden’ versus ‘data delen en toegevoegde waarde creëren’ | |
| Eijkelkamp, C. (Charlotte) | A Framework for Responsible AI Use in HR | |
| Fatima, F. (Fehmeena) | Exploring Generative AI’s Influence on Team Collaboration | |
| Hegeman, M. (Meili) | Determining Project Priorities Using a Multi-Criteria Decision-Making Model | |
| Hotak, N. A. (Nisar Ahmad) | Developers’ perceived impact of generative AI approaches on code security | |
| Jafarpisheh, M. (Mohadesh) | Impact of Generative AI on Teamwork: Opportunities and Challenges - A Systematic Literature Review | |
| Jong, T. de (Tessa) | Evaluating LLMs in Practice: Enhancing Going Concern Assessments for Healthcare Organizations | |
| Kitagawa, S. (Saki) | ChatCOP: A Prototype Study of an LLM-Based Chatbot for Knowledge Sharing in a Police Cybercrime Unit | |
| Kos, N. (Nicky) | Navigating the DORA Landscape: A Study of Service Provider Readiness | |
| Lasroha, M. S. T. (Markus) | Improving SATUSEHAT Indonesia Data Availability and Privacy | |
| Lin, Z. (Zhengyu) | A Scalable Approach for De Novo FAIRification in Legacy Systems: Enabling Real-Time RDF Transformation, Semantic Integration, and Automated Data Upload | |
| Molema, Y. J. (Yorick) | Organizational Design Patterns for Managed Service Providers that Implemented Automatic IaaS Provisioning | |
| Nieuwdorp, L. (Lars) | A Privacy-preserving Fault Detection System for IoT Networks Using Blockchain, MPC, and Edge Computing | |
| Oprel, D. (Diederik) | A framework for a centralized external RPA orchestrator | |
| Papadaki, I. (Ioanna) | Influencing Purchase Intention Through Chatbots: The Interaction of Social Influence Tactics and Consumer Personality Traits. | |
| Schaik, C. O. van (Camiel) | Lowering the Barriers: A Best-Practice Approach to Cyber Supply Chain Risk Management | |
| Smith, B.S. (Bruno) | Exploring the Role, Effectiveness and Evaluation of Non-technical Practices in Secure Software Development, Currently Used in Organisations | |
| Utami, I. K. (Intan Kusumadewi) | Overcoming Challenges in Cross-Government Data and Information Exchange in Indonesia | |
| Visser, R.C. (Ruben) | Life Cycle and Development Best Practices of AdTech | |
| Vonk, J. (Justin) | The Impact of Employees’ GenAI Readiness on Work Experience: The Moderating Role of Chatbot Usage Intensity | |
| Wang, J. (Jiaxin) | Connecting across China and Europe with privacy preservation and regulatory compliance | |
| Westing, B. van (Bret) | From Silent Disco to Collective Rhythm: A Study on How Organisations Address Challenges in Enterprise Architecture Management | |
| Zheng, Y. (Yongheng) | AI Support for Complex Supply Chain Management – A literature review | |