Searched for: contributor:"Van den Berg, J. (mentor)"
(1 - 20 of 64)

Pages

document
Vos, J.B. (author)
master thesis 2017
document
Verkerke, A.T. (author)
Participation in cyberspace is of key importance for large organisations (and the functioning of our society), but to participate responsibly a comprehensive cyber approach is needed. Cyberspace is a dynamic and complex environment due to the hyper-connectedness and therefore such an approach should aim for cyber resilience to cope with this...
master thesis 2015
document
Shah, N.K. (author)
The trend of Bring Your Own Device (BYOD) is creating a new change related to enterprise IT in many organizations. The last years, especially from 2009 -2015 has resulted in proliferation of consumer device market consisting of new mobile devices with features which are very much similar to the features provided by PC workstations. The BYOD...
master thesis 2015
document
Wijnands, K.J. (author)
In the last years the impact of malware has become a huge problem. Each year, more and more new malware samples are discovered [2]. And the malware is becoming more sophisticated, for example ransomware. Ransomware encrypts personal documents, such as photos and word documents, and asks money to be able to decrypt these files, hence the name....
master thesis 2015
document
Van Holsteijn, F.A. (author)
The number of cyberattacks has been growing over time and is expected to keep growing. In order to prevent such attacks, countermeasures have to be put in place by IT security experts. These IT security experts are however often tied to budgets and do not have a good overview of the threats that are present. It is thus necessary to provide them...
master thesis 2015
document
Hattangadi, N. (author)
In recent years, information technology (IT) has grown from an enabling technology to an important technology we depend on in our everyday lives. For example, IT is required for the proper functioning of personal devices that store our personal information, but is also present in the on-board computers in pacemakers and systems controlling...
master thesis 2015
document
Pereira, N.M. (author)
Information Security is an important aspect of decision making in organisations today. Organisations use Information Security Risk Management to assess, respond to and monitor risk to its information systems. Information systems are complex technical systems and the management of Information Security depends on technology, processes and people....
master thesis 2015
document
Van der Valk, R.J.A. (author)
A significant amount of payments fail for seemingly ‘mysterious’ reasons when refused by an issuer (i.e. cardholder’s bank). The technical and social complexities, such as a principal-agent problem, hinder the development of policies or information architectures, which impose an issuer to share its ‘honest’ reason. In this thesis we propose a...
master thesis 2015
document
Van Santen, C.E. (author)
In the Netherlands the goal of the government is to increase the amount of electricity produced from wind turbines on land to 6000 MW by 2020. This ambitious goal asks for a different approach for these projects, because with the classic approach the development is too slow and invokes too much resistance in the local community. The largest...
master thesis 2014
document
Piltan, A. (author)
Studies show that Data-Driven Decision-Making grounded on large “volumes” of a wide “variety” of data with high-“velocity”, known as Big Data, can considerably enhance the organizational performance. However, the traditional way of capturing, storing, and analyzing digital data through on-premise Business Intelligence (BI) and Analytics systems...
master thesis 2014
document
Marin, J.C. (author)
Nowadays companies endure several challenges in order to succeed. They operate in dynamic environments in which customers are more demanding and active. The products and services they offer are similar in comparison with their competitors and one of the few key differentiators is improving business processes such as marketing, customer...
master thesis 2014
document
Oei, M.H.H. (author)
Operational Business Intelligence systems have a great potential for organisations make use of to differentiate themselves. This research aims to find factors that influence the acceptance of such a system in an organisational context. Special attention is given to the several perspectives of the involved stakeholders. Through a literature...
master thesis 2014
document
Spijkervet, L.L.J. (author)
In the last few years the amount of witnessed accidents (such as stolen information) following from cyber-attacks has increased. It is considered that organisations cannot keep up with adversaries by themselves anymore. For that reason organisations would have to collaborate with each other, by sharing information, to improve each other’s...
master thesis 2014
document
Harmsen, M. (author)
This study designed and tested (by means of a case study) an improved method for systematically reviewing (scientific) literature. The case study focused on the use of information and communication technology (ICT) in the field of human development. Findings with regard to ICT use indicate a potential 'digital divide' as ICT users were generally...
master thesis 2013
document
Van Vierssen Trip, F.W. (author)
The pharmaceutical industry is in a R&D productivity crisis. Rapidly increasing development costs, decreasing profitability of new medical entities and missing breakthrough innovation are afflicting the future of the pharmaceutical industry. This complex problem requires a systems thinking approach. In this study, we ought to map the general...
master thesis 2013
document
Verheij, B.A. (author)
This research concerned the process of big data solution adoption and the main issues that firms experience in this process. Using eight cases within the Dutch telecommunication and energy utility sectors, a conceptual model was constructed of issues in the process of big data solution adoption. Twelve main issues were identified in the process...
master thesis 2013
document
Samaras, V. (author)
In contemporary times IT plays a major role in enterprises’ business processes. Companies pursue the adoption of new technological trends in order to improve their business in terms of both performance and efficiency so that they can keep up with the fierce market competition. However, the introduc tion of cloud computing services and the...
master thesis 2013
document
Karypidis, C. (author)
The globalization of economy has significantly increased the role of online information exchange between transacting parties worldwide. Currently implemented trust models, such as Public Key Infrastructure, provide enough means to enable the secure exchange of data, but only within specified territories, thereby forming different trust domains...
master thesis 2013
document
Nieuwesteeg, B.F.H. (author)
This thesis scrutinizes the proportionality and describes the subsidiarity of proposals for security breach notification laws (hereafter: SBNLs) in the European Union. An SBNL obliges that a security breach within a company or government must be notified to affected customers and a supervisory authority. A law stands the proportionality test if...
master thesis 2013
document
Li, Z. (author)
Authorship verification is one subfield of authorship analysis. However, the majority of the research in the field of authorship analysis is on the authorship identification problem. The authorship verification problem has received less attention than the authorship identification problem. Thus, there is a demand for a study on the authorship...
master thesis 2013
Searched for: contributor:"Van den Berg, J. (mentor)"
(1 - 20 of 64)

Pages