Doctoral Placements Since 2010
The following list reflects placement information at time of graduation from the MIS program:
2024
Name |
Placement |
Dissertation Title |
Zisu Wang |
University of Illinois Chicago |
Towards Better Management of Open Source Software Communities: Feedback Triage, Managerial Response, and Career Impact |
Benjamin Ampel |
Georgia State University |
Securing Cyberspace: AI-Enabled Cyber-Adversary Defense |
Fang Yu Lin |
University of Texas at San Antonio |
Artificial Intelligence-Enabled Information Privacy Analytics and Risk Assessment |
Steven Ullman |
University of Texas at San Antonio |
Artificial Intelligence-Enabled Vulnerability Management for IT Infrastructure: A Computational Design Science Approach |
Saiying Ge |
|
Decoding Deception and Collusion: Behavioral Analysis of Relational Messages and Interpersonal Relationships in Group Communication |
2023
Name |
Placement |
Dissertation Title |
Xunyu Chen |
Virginia Commonwealth University |
Intelligent Systems for Trust and Deception Recognition Through Human Behavioral Analysis |
Buomsoo Kim |
Iowa State University |
Computational Design Science Research to Solve Real-World Problems with High Impact |
David Kim |
University of Arizona |
Methods to Evaluate Cognitive Processes during Decision-Making using Human-Computer Interaction Devices |
Yuanxia Li |
Kennesaw State University |
Coupling Data Science and Design Science to Solve Real-World Business and Healthcare Challenges |
Xinran Wang |
Colorado State University |
Design and Use of Credibility Assessment Systems: Challenges and Solutions |
Manasvi Kumar |
Northeastern University |
Using Response Generation Behaviors to Improve the Quality of Survey Data |
2022
Name |
Placement |
Dissertation Title |
Yang Gu |
|
Natural Language Processing for Complex Tasks: Challenges and Solutions for Small Datasets in the Era of Deep Learning |
Hao Liu |
Deakin University |
Big Data-Driven Talent Analytics: A Deep Learning Approach |
2021
Name |
Placement |
Dissertation Title |
Bradley Dorn |
|
Using Linguistic Metrics and Task Characteristics to Investigate and Manage Group Deception |
Kyuhan Lee |
Arizona State University |
AI-Enabled Cybersecurity Analytics: Detecting and Defending Against Cyber Threats |
Sandeep Suntwal |
University of Colorado, Colorado Springs |
Towards A Trustworthy Cyberspace: A Behavioral and Design Science Approach |
Mohammadreza Ebrahimi |
University of South Florida |
AI-Enabled Cybersecurity Analytics: Detecting and Defending Against Cyber Threats |
Zhengchao Yang |
Walmart Global Tech |
Integrating Deep Learning and Network Science to Support Healthcare Management |
2020
Name |
Placement |
Dissertation Title |
Xuan Wei |
Shanghai Jiaotong University |
Data Science-Driven Crowd Intelligence and its Business Applications |
Zhipeng Chen |
|
Inferencing User Characteristics and Behaviors from Social Media with Applications in Regulatory Science |
Jiaheng Xie |
University of Delaware |
Big Data-Based Health Risk Analytics: A Deep Learning Approach |
Bradley Walls |
Arete |
Using AI to Transform Behavioral Data Into Actionable Insights |
2019
Name |
Placement |
Dissertation Title |
Luwen Huangfu |
San Diego State University |
Beyond Sentiment Polarity: Cognitive Theory-Based Emotion Type Analysis of Social Media Text for Business Applications |
Karthik Srinivasan |
University of Kansas |
Essays on preventive care and digital health analytics |
Shuo Yu |
Texas Tech University |
Mobile Health Analytics for Senior Care: A Data Mining and Deep Learning Approach |
Rich Yueh |
University of California, Riverside |
Capturing Self-Efficacy Behavioral Outcomes Through Human-Computer Interaction Devices |
Hongyi Zhu |
University of Texas at San Antonio |
Developing Smart and Unobtrusive Mobile Home Care: A Deep Learning Approach |
Yongcheng Zhan |
California Polytechnic State University |
Social Media Driven Public Health Informatics: Applications in Regulatory Science |
2018
Name |
Placement |
Dissertation Title |
Joseph Buckman |
Kansas State University |
Understanding Changes in Individual and Firm Behavior in Response to Security and Privacy Factors |
Michael Byrd |
University of Arizona |
An Empirical Exploration of Countermeasures in HCI-based Deception Research |
Steven Pentland |
Boise State University |
Human-Screening in Information Systems Research and Applications in Personnel Selection |
Sagar Samtani |
University of South Florida |
Developing Proactive Cyber Threat Intelligence from the Online Hacker Community: A Computational Design Science Approach |
Lee Allen Spitzley |
University at Albany, SUNY |
Using Narrative Financial Disclosures to Detect Financial Fraud |
Wenli Zhang |
Iowa State University |
Natural Language Processing and Machine Learning for Chronic Disease Management |
2017
Name |
Placement |
Dissertation Title |
Yang Wang |
Purdue University, Krannert School of Management |
Essays on the Network Effects of Online Reviews |
Yun Wang |
Microsoft |
Mining Massive Spatiotemporal Data for Actionable Intelligence |
Weifang Li |
University of Georgia |
Towards Secure and Trustworthy Cyberspace: Social Media Analytics on Hacker Communities |
2016
Name |
Placement |
Dissertation Title |
Victor Benjamin |
Arizona State University |
Securing Cyberspace: Analyzing Cybercriminal Communities through Web and Text Mining Perspectives |
Devipsita Bhattacharya |
Post Doc Research Fellow with INSITE |
Network Theoretic Approaches for Understanding and Analyzing Social Media Based News Article Propagation |
Qiang (David) Gao |
City University of New York |
Empirical Studies of Online Crowdfunding |
Chenhui (Julian) Guo |
Michigan State University |
Empirical Studies about Incentives, Information Disclosure, and Social Interactions in Online Environments |
Xiao Liu |
University of Utah |
Health Analytics for Pharmacovigilance: A Data and Text Mining Framework |
Srikar Velicety |
University of Memphis |
Essays on Data Driven Insights from Crowd Sourcing, Social Media and Social Networks |
2015
Name |
Placement |
Dissertation Title |
Mark Grimes |
University of Houston |
Analysis of Human Computer Interaction Behavior for Assessment of Affect, Cognitive Load, and Credibility |
Shan (Jonathan) Jiang |
Penn State |
Statistical Modeling of Multi-dimensional Knowledge Diffusion Networks: An ERGM-based Framework |
Yu-Kai Lin |
Florida State University |
Health Analytics and Predictive Modeling: Four Essays on Health Informatics |
James Marquardson |
Northern Michigan University |
Achieving Alignment: System Design and Attitudinal Considerations to Increase the Persuasive Power of Technology |
Ryan Schuetzler |
University of Nebraska |
Dynamic Interviewing Agents: Effects on Deception, Nonverbal Behavior, and Social Desirability |
David Wilson |
University of Oklahoma |
Overcoming Information Privacy Concerns: Learning from Three Disclosure Contexts |
Shuo Zeng |
California State Polytechnic University |
Topics of Principal-Agent Service Contracts: Contract Analysis and Pooling Principals |
2014
Name |
Placement |
Dissertation Title |
Katherine Carl Payne |
Brigham Young University |
Automated Route Generation for Bicycle Tours of the United States |
Justin Giboney |
SUNY - Albany |
Development and Application of an Online Tool for Meta-Analyses Using Design Science Principles |
Jeffrey Proudfoot |
Bentley University |
Identifying Deception using Novel Technology-Based Approaches to Uncover Concealed Information |
2013
Name |
Placement |
Dissertation Title |
Yi-Da Chen |
Northeastern University |
The Dynamics of Task-related Discussion in the Pursuit of Radical Innovation: Innovation Project Teams as Interpretation Systems |
Jiesi Cheng |
Google |
Information Diffusion and Influence Propagation on Social Networks with Marketing Applications |
Christopher Diller |
University of Nebraska-Omaha |
An Exploration of Distributed Parallel Sorting in GSS |
Jeffrey Jenkins |
Brigham Young University |
Alleviating Insider Threats: Mitigation Strategies and Detection Techniques |
2012
Name |
Placement |
Dissertation Title |
Mary Burns |
Montana State University |
Examining Multiple Stages of IS Security Behavior by End-Users |
Shaokun Fan |
City University, Hong Kong |
A Process Driven Approach to Collaboration Management |
Tianjun Fu |
Google |
CSI in the Web 2.0 Age: Data Collection, Selection, and Investigation for knowledge Discovery |
Noyan Ilk |
Florida State University |
Essays on E-service Management: Technical, Operational and Financial Perspectives |
Chang Heon Lee |
Samsung Life Insurance |
Dynamics of Advice Network and Knowledge Contribution: A Longitudinal Social Network Analysis |
Jian Ma |
Colorado State University |
People, Processes and Products: Case Studies in Open-Source Software Using Complex Networks |
Matthew Pickard |
University of New Mexico |
Persuasive Embodied Agents: Using Embodied Agents to Change People’s Behavior, Beliefs, and Assessments |
Nathan Twyman |
University of Arizona |
Automated Human Screening for Concealed Knowledge |
David Zimbra |
Santa Clara University |
Stakeholder and Sentiment Analysis in Web Forums |
2011
Name |
Placement |
Dissertation Title |
Yan Dang |
Northern Arizona University |
Theory-Informed Design and Evaluation of Web-Based Knowledge Management Systems |
Douglas Derrick |
University of Nebraska-Omaha |
Special-Purpose, Embodied Conversational Intelligence with Environmental Sensors (SPECIES) Agents: Implemented in an Automated Interviewing Kiosk |
Aaron Elkins |
BORDERS Research Center |
Vocalic Markers of Deception and Cognitive Dissonance for Automated Emotion Detection Systems |
Brent Langhals |
U.S. Army |
Using Eye and Head Based Psychophysiological Cues to Enhance Screener Vigilance |
Jun Liu |
University of Arizona |
W7 Model of Provenance and Its Application in the Context of Wikipedia |
Kevin Moffitt |
Rochester Institute of Technology |
Toward Enhancing Automated Credibility Assessment: A Model for Question Type Classification and a Tool for Linguistic Analysis |
Runpu (Aaron) Sun |
Google |
Using Social Media Intelligence to Support Business Knowledge Discovery and Decision Making :Approaches and Applications |
Yulei Zhang |
Northern Arizona University |
Knowledge Discovery in Social Media: Physical World, Online World, and Virtual World |
2010
Name |
Placement |
Dissertation Title |
Eyran Gisches |
University of Arizona |
Information Effects on Group Behavior in Networks |
Sean Humpherys |
West Texas A&M |
A System of Deception and Fraud Detection Using Reliable Linguistic Cues Including Hedging, Disfluencies, and Repeated Phrases |
Manlu Liu |
Rochester Institute of Technology |
Community Source as a New Approach to Enterprise Application Development: Exploration of Technological and Managerial Issues |
Hsin-Min Lu |
National Taiwan University |
Surveillance in the Information Age: Tex Quantification, Anomaly Detection, and Empirical Evaluation |
Nichalin Suakkaphong |
University of Arizona |
Non-cooperative and Cooperative (Comparative) Games in Supply Chain Management |
Wei Wei |
University of Arizona |
Utilizing Social Bookmarking Tag Space for Web Content Discovery: A Social Network Analysis Approach |
Ping Yan |
Websense, Inc. |
Spatial-Temporal Data Analytics and Consumer Shopping Behavior Modeling |