MIS PhD Placement

MIS PhD Placement

Doctoral Placements Since 2010

The following list reflects placement information at time of graduation from the MIS program:

2024

Name Placement Dissertation Title
Zisu Wang University of Illinois Chicago Towards Better Management of Open Source Software Communities: Feedback Triage, Managerial Response, and Career Impact
Benjamin Ampel Georgia State University Securing Cyberspace: AI-Enabled Cyber-Adversary Defense
Fang Yu Lin University of Texas at San Antonio Artificial Intelligence-Enabled Information Privacy Analytics and Risk Assessment
Steven Ullman University of Texas at San Antonio Artificial Intelligence-Enabled Vulnerability Management for IT Infrastructure: A Computational Design Science Approach
Saiying Ge   Decoding Deception and Collusion: Behavioral Analysis of Relational Messages and Interpersonal Relationships in Group Communication

2023

Name Placement Dissertation Title
Xunyu Chen Virginia Commonwealth University Intelligent Systems for Trust and Deception Recognition Through Human Behavioral Analysis
Buomsoo Kim Iowa State University Computational Design Science Research to Solve Real-World Problems with High Impact
David Kim University of Arizona Methods to Evaluate Cognitive Processes during Decision-Making using Human-Computer Interaction Devices
Yuanxia Li Kennesaw State University Coupling Data Science and Design Science to Solve Real-World Business and Healthcare Challenges
Xinran Wang Colorado State University Design and Use of Credibility Assessment Systems: Challenges and Solutions
Manasvi Kumar Northeastern University Using Response Generation Behaviors to Improve the Quality of Survey Data

2022

Name Placement Dissertation Title
Yang Gu   Natural Language Processing for Complex Tasks: Challenges and Solutions for Small Datasets in the Era of Deep Learning
Hao Liu Deakin University Big Data-Driven Talent Analytics: A Deep Learning Approach

2021

Name Placement Dissertation Title
Bradley Dorn   Using Linguistic Metrics and Task Characteristics to Investigate and Manage Group Deception
Kyuhan Lee Arizona State University AI-Enabled Cybersecurity Analytics: Detecting and Defending Against Cyber Threats
Sandeep Suntwal University of Colorado, Colorado Springs Towards A Trustworthy Cyberspace: A Behavioral and Design Science Approach
Mohammadreza Ebrahimi University of South Florida AI-Enabled Cybersecurity Analytics: Detecting and Defending Against Cyber Threats
Zhengchao Yang Walmart Global Tech Integrating Deep Learning and Network Science to Support Healthcare Management

2020

Name Placement Dissertation Title
Xuan Wei Shanghai Jiaotong University Data Science-Driven Crowd Intelligence and its Business Applications
Zhipeng Chen   Inferencing User Characteristics and Behaviors from Social Media with Applications in Regulatory Science
Jiaheng Xie University of Delaware Big Data-Based Health Risk Analytics: A Deep Learning Approach
Bradley Walls Arete Using AI to Transform Behavioral Data Into Actionable Insights

2019

Name Placement Dissertation Title
Luwen Huangfu San Diego State University Beyond Sentiment Polarity: Cognitive Theory-Based Emotion Type Analysis of Social Media Text for Business Applications
Karthik Srinivasan University of Kansas Essays on preventive care and digital health analytics
Shuo Yu Texas Tech University Mobile Health Analytics for Senior Care: A Data Mining and Deep Learning Approach
Rich Yueh University of California, Riverside Capturing Self-Efficacy Behavioral Outcomes Through Human-Computer Interaction Devices
Hongyi Zhu University of Texas at San Antonio Developing Smart and Unobtrusive Mobile Home Care: A Deep Learning Approach
Yongcheng Zhan California Polytechnic State University Social Media Driven Public Health Informatics: Applications in Regulatory Science

2018

Name Placement Dissertation Title
Joseph Buckman Kansas State University Understanding Changes in Individual and Firm Behavior in Response to Security and Privacy Factors
Michael Byrd University of Arizona An Empirical Exploration of Countermeasures in HCI-based Deception Research
Steven Pentland Boise State University Human-Screening in Information Systems Research and Applications in Personnel Selection
Sagar Samtani University of South Florida Developing Proactive Cyber Threat Intelligence from the Online Hacker Community: A Computational Design Science Approach
Lee Allen Spitzley University at Albany, SUNY Using Narrative Financial Disclosures to Detect Financial Fraud
Wenli Zhang Iowa State University Natural Language Processing and Machine Learning for Chronic Disease Management

2017

Name Placement Dissertation Title
Yang Wang Purdue University, Krannert School of Management Essays on the Network Effects of Online Reviews
Yun Wang Microsoft Mining Massive Spatiotemporal Data for Actionable Intelligence
Weifang Li University of Georgia Towards Secure and Trustworthy Cyberspace: Social Media Analytics on Hacker Communities 

2016

Name Placement Dissertation Title
Victor Benjamin Arizona State University Securing Cyberspace: Analyzing Cybercriminal Communities through Web and Text Mining Perspectives
Devipsita Bhattacharya Post Doc Research Fellow with INSITE Network Theoretic Approaches for Understanding and Analyzing Social Media Based News Article Propagation
Qiang (David) Gao City University of New York Empirical Studies of Online Crowdfunding
Chenhui (Julian) Guo Michigan State University Empirical Studies about Incentives, Information Disclosure, and Social Interactions in Online Environments
Xiao Liu University of Utah Health Analytics for Pharmacovigilance: A Data and Text Mining Framework
Srikar Velicety University of Memphis Essays on Data Driven Insights from Crowd Sourcing, Social Media and Social Networks

2015

Name Placement Dissertation Title
Mark Grimes University of Houston Analysis of Human Computer Interaction Behavior for Assessment of Affect, Cognitive Load, and Credibility
Shan (Jonathan) Jiang Penn State Statistical Modeling of Multi-dimensional Knowledge Diffusion Networks: An ERGM-based Framework
Yu-Kai Lin Florida State University Health Analytics and Predictive Modeling: Four Essays on Health Informatics
James Marquardson Northern Michigan University Achieving Alignment: System Design and Attitudinal Considerations to Increase the Persuasive Power of Technology
Ryan Schuetzler University of Nebraska Dynamic Interviewing Agents: Effects on Deception, Nonverbal Behavior, and Social Desirability
David Wilson University of Oklahoma Overcoming Information Privacy Concerns: Learning from Three Disclosure Contexts
 Shuo Zeng California State Polytechnic University Topics of Principal-Agent Service Contracts: Contract Analysis and Pooling Principals

2014

Name Placement Dissertation Title
Katherine Carl Payne Brigham Young University Automated Route Generation for Bicycle Tours of the United States
Justin Giboney SUNY - Albany Development and Application of an Online Tool for Meta-Analyses Using Design Science Principles
Jeffrey Proudfoot Bentley University Identifying Deception using Novel Technology-Based Approaches to Uncover Concealed Information

2013

Name Placement Dissertation Title
Yi-Da Chen Northeastern University The Dynamics of Task-related Discussion in the Pursuit of Radical Innovation: Innovation Project Teams as Interpretation Systems
Jiesi Cheng Google Information Diffusion and Influence Propagation on Social Networks with Marketing Applications
Christopher Diller University of Nebraska-Omaha An Exploration of Distributed Parallel Sorting in GSS
Jeffrey Jenkins Brigham Young University Alleviating Insider Threats: Mitigation Strategies and Detection Techniques

2012

Name Placement Dissertation Title
Mary Burns Montana State University Examining Multiple Stages of IS Security Behavior by End-Users
Shaokun Fan City University, Hong Kong A Process Driven Approach to Collaboration Management
Tianjun Fu Google CSI in the Web 2.0 Age: Data Collection, Selection, and Investigation for knowledge Discovery
Noyan Ilk Florida State University Essays on E-service Management:  Technical, Operational and Financial Perspectives
Chang Heon Lee Samsung Life Insurance Dynamics of Advice Network and Knowledge Contribution: A Longitudinal Social Network Analysis
Jian Ma Colorado State University People, Processes and Products: Case Studies in Open-Source Software Using Complex Networks
Matthew Pickard University of New Mexico Persuasive Embodied Agents: Using Embodied Agents to Change People’s Behavior, Beliefs, and Assessments
Nathan Twyman University of Arizona Automated Human Screening for Concealed Knowledge
David Zimbra Santa Clara University Stakeholder and Sentiment Analysis in Web Forums

2011

Name Placement Dissertation Title
Yan Dang Northern Arizona University Theory-Informed Design and Evaluation of Web-Based Knowledge Management Systems
Douglas Derrick University of Nebraska-Omaha Special-Purpose, Embodied Conversational Intelligence with Environmental Sensors (SPECIES) Agents: Implemented in an Automated Interviewing Kiosk
Aaron Elkins BORDERS Research Center Vocalic Markers of Deception and Cognitive Dissonance for Automated Emotion Detection Systems
Brent Langhals U.S. Army Using Eye and Head Based Psychophysiological Cues to Enhance Screener Vigilance
Jun Liu University of Arizona W7 Model of Provenance and Its Application in the Context of Wikipedia
Kevin Moffitt Rochester Institute of Technology Toward Enhancing Automated Credibility Assessment: A Model for Question Type Classification and a Tool for Linguistic Analysis 
Runpu (Aaron) Sun Google Using Social Media Intelligence to Support Business Knowledge Discovery and Decision Making :Approaches and Applications
 Yulei Zhang Northern Arizona University  Knowledge Discovery in Social Media: Physical World, Online World, and Virtual World

2010

Name Placement Dissertation Title
Eyran Gisches University of Arizona Information Effects on Group Behavior in Networks
Sean Humpherys West Texas A&M A System of Deception and Fraud Detection Using Reliable Linguistic Cues Including Hedging, Disfluencies, and Repeated Phrases
Manlu Liu Rochester Institute of Technology Community Source as a New Approach to Enterprise Application Development: Exploration of Technological and Managerial Issues
Hsin-Min Lu National Taiwan University Surveillance in the Information Age:  Tex Quantification, Anomaly Detection, and Empirical Evaluation
Nichalin Suakkaphong University of Arizona Non-cooperative and Cooperative (Comparative) Games in Supply Chain Management
Wei Wei University of Arizona Utilizing Social Bookmarking Tag Space for Web Content Discovery: A Social Network Analysis Approach
Ping Yan Websense, Inc. Spatial-Temporal Data Analytics and Consumer Shopping Behavior Modeling