Searched for: department:"ICT"
(1 - 20 of 61)

Pages

document
du Toit, K. (author)
Under NPG, public managers have been commissioned to seek out new imaginative ways of creating public value. One such new perspective is the business model concept, which has become a useful stepping stone towards building new strategic tools for public entrepreneurship. The problem is that the business model concept needs to be adapted to...
master thesis 2017
document
Hidalgo, C.A. (author)
master thesis 2016
document
Antoniou, D. (author)
This thesis is a coding scheme with which people can perform simulated phishing tests in systematic way. This enables the making of evidence-based phishing and allows for future analysis of the phishing results.
master thesis 2015
document
Shah, N.K. (author)
The trend of Bring Your Own Device (BYOD) is creating a new change related to enterprise IT in many organizations. The last years, especially from 2009 -2015 has resulted in proliferation of consumer device market consisting of new mobile devices with features which are very much similar to the features provided by PC workstations. The BYOD...
master thesis 2015
document
Mercan, S. (author)
master thesis 2015
document
Pushpakumar, H. (author)
Cyber threats are becoming more sophisticated and varied. The range of possible attacks that organizations face is higher than in the past. Analysis shows that the number of cyber incidents involving government agencies has increased by 35 percent between 2010 and 2013. E-government is a potential target to attacks of various kinds from a range...
master thesis 2015
document
Pieper, S.J. (author)
Access to financing is a serious concern for many Small and Medium-sized Enterprises (SMEs) in need of cash. Invoice financing ? in which a business sells its accounts receivables ? has not been well adopted, seemingly due to the information intensive transactions that it requires. This paper describes the design of a digital Multi-sided...
master thesis 2015
document
Jiang, Y. (author)
master thesis 2015
document
Sweep, T.B. (author)
A common problem within the accounting profession is the problem of audit timeliness. At this moment, the problem is becoming more urgent in the real-time economy. A potential solution to the problem arises from the introduction of CCM systems. However, for this solution to succeed, the CCM system itself should be audited which turned out to be...
master thesis 2015
document
FEI Tianqi, T. (author)
Global trade needs effective supply chains to ensure global sourcing at cost-effective rates and to position their products on international markets. Global Supply chains involve complex systems and multiple stakeholders among countries and organizations. In addition it requires high visibility and transparency in information flow. Compliance...
master thesis 2015
document
Sippe, R. (author)
Big data is a broad term that is related to the collection, storage and analysis of large volumes of data. The term big data is often associated with the popular 3V’s model, which defined that data is growing significantly in the characteristics volume, variety and velocity. In this research we defined big data as: the collection, storage and...
master thesis 2015
document
Madian, A.C. (author)
The EU Innovation Union identified that innovations are needed to boost economic growth performance, where SMEs are considered vital for these goals. To achieve this, business model innovation (BMI) is identified as the new area to innovate and also source of future competitive advantage. Furthermore, business model changes as a form of...
master thesis 2015
document
Madian, A.C. (author)
Innovation has been regarded by European Commission (EU) as the important factor for economic growth. Small and Medium Enterprises (SMEs) are known as the source of these innovations, thus the source of economic growth. SMEs role during economic crisis is crucial as they can create employment. But they are still have pressing problems in finding...
master thesis 2015
document
Blok, J.S. (author)
The SIM card is as a secure authentication and identification means and that can be used for services that reach beyond the mobile world. Therefore this research tries identify markets where the SIM could possibly be exploited by applying the concept of control points.
master thesis 2015
document
Taouil, B. (author)
Background This research paper is concerned with providing the reader with a framework to facilitate the transformation of norms and values of an enterprise into IT requirements necessary for the construction of an IT project. Within the literature there are many studies whose purpose is to appropriate the reader with an understanding of how to...
master thesis 2015
document
Van Schijndel, K. (author)
master thesis 2015
document
Zulfa, A. (author)
Governments all over the world seek to increase the quality of public e-services offered to citizens. One way of doing this is through collaboration with private sectors and citizens in delivering the e-services. Yet, there is little discussion about their collaboration in stage models that provide a guide in public e-service development....
master thesis 2015
document
Hattangadi, N. (author)
In recent years, information technology (IT) has grown from an enabling technology to an important technology we depend on in our everyday lives. For example, IT is required for the proper functioning of personal devices that store our personal information, but is also present in the on-board computers in pacemakers and systems controlling...
master thesis 2015
document
De Vries, F.A.K.S. (author)
This report presents a research that deepens the understanding of how data-analysis is changing the financial audit of financial institutions in practice from multiple perspectives. Main used research method is a case study at an audit firm. Within the firm, two engagements with intensified use of data-analysis, or ‘pilot cases’, were selected...
master thesis 2015
document
Poulis, K. (author)
This research focuses on how private companies can use open data in order to innovate. The research investigates how certain resources and moderating variables can influence the open data use by the companies. The research used four research methods in order to collect the necessary data: Literature review, open data scenario, interviews, and...
master thesis 2015
Searched for: department:"ICT"
(1 - 20 of 61)

Pages