Doctoral Placements Since 2010
The following list reflects placement information at time of graduation from the MIS program:
2025
| Name | Placement | Dissertation Title | 
|---|
| Paul Weisgarber |  | Uncovering Intentional Response Distortion: A Digital Behavioral Biometric Approach | 
| Yanan Wang | University of Texas at Arlington | Towards Trustworthy AI: Computational Design Methods for AI Security and AI Alignment | 
2024
| Name | Placement | Dissertation Title | 
|---|
| Zisu Wang | University of Illinois Chicago | Towards Better Management of Open Source Software Communities: Feedback Triage, Managerial Response, and Career Impact | 
| Benjamin Ampel | Georgia State University | Securing Cyberspace: AI-Enabled Cyber-Adversary Defense | 
| Fang Yu Lin | University of Texas at San Antonio | Artificial Intelligence-Enabled Information Privacy Analytics and Risk Assessment | 
| Steven Ullman | University of Texas at San Antonio | Artificial Intelligence-Enabled Vulnerability Management for IT Infrastructure: A Computational Design Science Approach | 
| Saiying Ge |  | Decoding Deception and Collusion: Behavioral Analysis of Relational Messages and Interpersonal Relationships in Group Communication | 
2023
| Name | Placement | Dissertation Title | 
|---|
| Xunyu Chen | Virginia Commonwealth University | Intelligent Systems for Trust and Deception Recognition Through Human Behavioral Analysis | 
| Buomsoo Kim | Iowa State University | Computational Design Science Research to Solve Real-World Problems with High Impact | 
| David Kim | University of Arizona | Methods to Evaluate Cognitive Processes during Decision-Making using Human-Computer Interaction Devices | 
| Yuanxia Li | Kennesaw State University | Coupling Data Science and Design Science to Solve Real-World Business and Healthcare Challenges | 
| Xinran Wang | Colorado State University | Design and Use of Credibility Assessment Systems: Challenges and Solutions | 
| Manasvi Kumar | Northeastern University | Using Response Generation Behaviors to Improve the Quality of Survey Data | 
2022
| Name | Placement | Dissertation Title | 
|---|
| Yang Gu |  | Natural Language Processing for Complex Tasks: Challenges and Solutions for Small Datasets in the Era of Deep Learning | 
| Hao Liu | Deakin University | Big Data-Driven Talent Analytics: A Deep Learning Approach | 
2021
| Name | Placement | Dissertation Title | 
|---|
| Bradley Dorn |  | Using Linguistic Metrics and Task Characteristics to Investigate and Manage Group Deception | 
| Kyuhan Lee | Arizona State University | AI-Enabled Cybersecurity Analytics: Detecting and Defending Against Cyber Threats | 
| Sandeep Suntwal | University of Colorado, Colorado Springs | Towards A Trustworthy Cyberspace: A Behavioral and Design Science Approach | 
| Mohammadreza Ebrahimi | University of South Florida | AI-Enabled Cybersecurity Analytics: Detecting and Defending Against Cyber Threats | 
| Zhengchao Yang | Walmart Global Tech | Integrating Deep Learning and Network Science to Support Healthcare Management | 
2020
| Name | Placement | Dissertation Title | 
|---|
| Xuan Wei | Shanghai Jiaotong University | Data Science-Driven Crowd Intelligence and its Business Applications | 
| Zhipeng Chen |  | Inferencing User Characteristics and Behaviors from Social Media with Applications in Regulatory Science | 
| Jiaheng Xie | University of Delaware | Big Data-Based Health Risk Analytics: A Deep Learning Approach | 
| Bradley Walls | Arete | Using AI to Transform Behavioral Data Into Actionable Insights | 
2019
| Name | Placement | Dissertation Title | 
|---|
| Luwen Huangfu | San Diego State University | Beyond Sentiment Polarity: Cognitive Theory-Based Emotion Type Analysis of Social Media Text for Business Applications | 
| Karthik Srinivasan | University of Kansas | Essays on preventive care and digital health analytics | 
| Shuo Yu | Texas Tech University | Mobile Health Analytics for Senior Care: A Data Mining and Deep Learning Approach | 
| Rich Yueh | University of California, Riverside | Capturing Self-Efficacy Behavioral Outcomes Through Human-Computer Interaction Devices | 
| Hongyi Zhu | University of Texas at San Antonio | Developing Smart and Unobtrusive Mobile Home Care: A Deep Learning Approach | 
| Yongcheng Zhan | California Polytechnic State University | Social Media Driven Public Health Informatics: Applications in Regulatory Science | 
2018
| Name | Placement | Dissertation Title | 
|---|
| Joseph Buckman | Kansas State University | Understanding Changes in Individual and Firm Behavior in Response to Security and Privacy Factors | 
| Michael Byrd | University of Arizona | An Empirical Exploration of Countermeasures in HCI-based Deception Research | 
| Steven Pentland | Boise State University | Human-Screening in Information Systems Research and Applications in Personnel Selection | 
| Sagar Samtani | University of South Florida | Developing Proactive Cyber Threat Intelligence from the Online Hacker Community: A Computational Design Science Approach | 
| Lee Allen Spitzley | University at Albany, SUNY | Using Narrative Financial Disclosures to Detect Financial Fraud | 
| Wenli Zhang | Iowa State University | Natural Language Processing and Machine Learning for Chronic Disease Management | 
2017
| Name | Placement | Dissertation Title | 
|---|
| Yang Wang | Purdue University, Krannert School of Management | Essays on the Network Effects of Online Reviews | 
| Yun Wang | Microsoft | Mining Massive Spatiotemporal Data for Actionable Intelligence | 
| Weifang Li | University of Georgia | Towards Secure and Trustworthy Cyberspace: Social Media Analytics on Hacker Communities | 
2016
| Name | Placement | Dissertation Title | 
|---|
| Victor Benjamin | Arizona State University | Securing Cyberspace: Analyzing Cybercriminal Communities through Web and Text Mining Perspectives | 
| Devipsita Bhattacharya | Post Doc Research Fellow with INSITE | Network Theoretic Approaches for Understanding and Analyzing Social Media Based News Article Propagation | 
| Qiang (David) Gao | City University of New York | Empirical Studies of Online Crowdfunding | 
| Chenhui (Julian) Guo | Michigan State University | Empirical Studies about Incentives, Information Disclosure, and Social Interactions in Online Environments | 
| Xiao Liu | University of Utah | Health Analytics for Pharmacovigilance: A Data and Text Mining Framework | 
| Srikar Velicety | University of Memphis | Essays on Data Driven Insights from Crowd Sourcing, Social Media and Social Networks | 
2015
| Name | Placement | Dissertation Title | 
|---|
| Mark Grimes | University of Houston | Analysis of Human Computer Interaction Behavior for Assessment of Affect, Cognitive Load, and Credibility | 
| Shan (Jonathan) Jiang | Penn State | Statistical Modeling of Multi-dimensional Knowledge Diffusion Networks: An ERGM-based Framework | 
| Yu-Kai Lin | Florida State University | Health Analytics and Predictive Modeling: Four Essays on Health Informatics | 
| James Marquardson | Northern Michigan University | Achieving Alignment: System Design and Attitudinal Considerations to Increase the Persuasive Power of Technology | 
| Ryan Schuetzler | University of Nebraska | Dynamic Interviewing Agents: Effects on Deception, Nonverbal Behavior, and Social Desirability | 
| David Wilson | University of Oklahoma | Overcoming Information Privacy Concerns: Learning from Three Disclosure Contexts | 
| Shuo Zeng | California State Polytechnic University | Topics of Principal-Agent Service Contracts: Contract Analysis and Pooling Principals | 
2014
| Name | Placement | Dissertation Title | 
|---|
| Katherine Carl Payne | Brigham Young University | Automated Route Generation for Bicycle Tours of the United States | 
| Justin Giboney | SUNY - Albany | Development and Application of an Online Tool for Meta-Analyses Using Design Science Principles | 
| Jeffrey Proudfoot | Bentley University | Identifying Deception using Novel Technology-Based Approaches to Uncover Concealed Information | 
2013
| Name | Placement | Dissertation Title | 
|---|
| Yi-Da Chen | Northeastern University | The Dynamics of Task-related Discussion in the Pursuit of Radical Innovation: Innovation Project Teams as Interpretation Systems | 
| Jiesi Cheng | Google | Information Diffusion and Influence Propagation on Social Networks with Marketing Applications | 
| Christopher Diller | University of Nebraska-Omaha | An Exploration of Distributed Parallel Sorting in GSS | 
| Jeffrey Jenkins | Brigham Young University | Alleviating Insider Threats: Mitigation Strategies and Detection Techniques | 
2012
| Name | Placement | Dissertation Title | 
|---|
| Mary Burns | Montana State University | Examining Multiple Stages of IS Security Behavior by End-Users | 
| Shaokun Fan | City University, Hong Kong | A Process Driven Approach to Collaboration Management | 
| Tianjun Fu | Google | CSI in the Web 2.0 Age: Data Collection, Selection, and Investigation for knowledge Discovery | 
| Noyan Ilk | Florida State University | Essays on E-service Management:  Technical, Operational and Financial Perspectives | 
| Chang Heon Lee | Samsung Life Insurance | Dynamics of Advice Network and Knowledge Contribution: A Longitudinal Social Network Analysis | 
| Jian Ma | Colorado State University | People, Processes and Products: Case Studies in Open-Source Software Using Complex Networks | 
| Matthew Pickard | University of New Mexico | Persuasive Embodied Agents: Using Embodied Agents to Change People’s Behavior, Beliefs, and Assessments | 
| Nathan Twyman | University of Arizona | Automated Human Screening for Concealed Knowledge | 
| David Zimbra | Santa Clara University | Stakeholder and Sentiment Analysis in Web Forums | 
2011
| Name | Placement | Dissertation Title | 
|---|
| Yan Dang | Northern Arizona University | Theory-Informed Design and Evaluation of Web-Based Knowledge Management Systems | 
| Douglas Derrick | University of Nebraska-Omaha | Special-Purpose, Embodied Conversational Intelligence with Environmental Sensors (SPECIES) Agents: Implemented in an Automated Interviewing Kiosk | 
| Aaron Elkins | BORDERS Research Center | Vocalic Markers of Deception and Cognitive Dissonance for Automated Emotion Detection Systems | 
| Brent Langhals | U.S. Army | Using Eye and Head Based Psychophysiological Cues to Enhance Screener Vigilance | 
| Jun Liu | University of Arizona | W7 Model of Provenance and Its Application in the Context of Wikipedia | 
| Kevin Moffitt | Rochester Institute of Technology | Toward Enhancing Automated Credibility Assessment: A Model for Question Type Classification and a Tool for Linguistic Analysis | 
| Runpu (Aaron) Sun | Google | Using Social Media Intelligence to Support Business Knowledge Discovery and Decision Making :Approaches and Applications | 
| Yulei Zhang | Northern Arizona University | Knowledge Discovery in Social Media: Physical World, Online World, and Virtual World | 
2010
| Name | Placement | Dissertation Title | 
|---|
| Eyran Gisches | University of Arizona | Information Effects on Group Behavior in Networks | 
| Sean Humpherys | West Texas A&M | A System of Deception and Fraud Detection Using Reliable Linguistic Cues Including Hedging, Disfluencies, and Repeated Phrases | 
| Manlu Liu | Rochester Institute of Technology | Community Source as a New Approach to Enterprise Application Development: Exploration of Technological and Managerial Issues | 
| Hsin-Min Lu | National Taiwan University | Surveillance in the Information Age:  Tex Quantification, Anomaly Detection, and Empirical Evaluation | 
| Nichalin Suakkaphong | University of Arizona | Non-cooperative and Cooperative (Comparative) Games in Supply Chain Management | 
| Wei Wei | University of Arizona | Utilizing Social Bookmarking Tag Space for Web Content Discovery: A Social Network Analysis Approach | 
| Ping Yan | Websense, Inc. | Spatial-Temporal Data Analytics and Consumer Shopping Behavior Modeling |