MIS PhD Placement

MIS PhD Placement

Doctoral Placements Since 2010

The following list reflects placement information at time of graduation from the MIS program:

2024

NamePlacementDissertation Title
Zisu WangUniversity of Illinois ChicagoTowards Better Management of Open Source Software Communities: Feedback Triage, Managerial Response, and Career Impact
Benjamin AmpelGeorgia State UniversitySecuring Cyberspace: AI-Enabled Cyber-Adversary Defense
Fang Yu LinUniversity of Texas at San AntonioArtificial Intelligence-Enabled Information Privacy Analytics and Risk Assessment
Steven UllmanUniversity of Texas at San AntonioArtificial Intelligence-Enabled Vulnerability Management for IT Infrastructure: A Computational Design Science Approach
Saiying Ge Decoding Deception and Collusion: Behavioral Analysis of Relational Messages and Interpersonal Relationships in Group Communication

2023

NamePlacementDissertation Title
Xunyu ChenVirginia Commonwealth UniversityIntelligent Systems for Trust and Deception Recognition Through Human Behavioral Analysis
Buomsoo KimIowa State UniversityComputational Design Science Research to Solve Real-World Problems with High Impact
David KimUniversity of ArizonaMethods to Evaluate Cognitive Processes during Decision-Making using Human-Computer Interaction Devices
Yuanxia LiKennesaw State UniversityCoupling Data Science and Design Science to Solve Real-World Business and Healthcare Challenges
Xinran WangColorado State UniversityDesign and Use of Credibility Assessment Systems: Challenges and Solutions
Manasvi KumarNortheastern UniversityUsing Response Generation Behaviors to Improve the Quality of Survey Data

2022

NamePlacementDissertation Title
Yang Gu Natural Language Processing for Complex Tasks: Challenges and Solutions for Small Datasets in the Era of Deep Learning
Hao LiuDeakin UniversityBig Data-Driven Talent Analytics: A Deep Learning Approach

2021

NamePlacementDissertation Title
Bradley Dorn Using Linguistic Metrics and Task Characteristics to Investigate and Manage Group Deception
Kyuhan LeeArizona State UniversityAI-Enabled Cybersecurity Analytics: Detecting and Defending Against Cyber Threats
Sandeep SuntwalUniversity of Colorado, Colorado SpringsTowards A Trustworthy Cyberspace: A Behavioral and Design Science Approach
Mohammadreza EbrahimiUniversity of South FloridaAI-Enabled Cybersecurity Analytics: Detecting and Defending Against Cyber Threats
Zhengchao YangWalmart Global TechIntegrating Deep Learning and Network Science to Support Healthcare Management

2020

NamePlacementDissertation Title
Xuan WeiShanghai Jiaotong UniversityData Science-Driven Crowd Intelligence and its Business Applications
Zhipeng Chen Inferencing User Characteristics and Behaviors from Social Media with Applications in Regulatory Science
Jiaheng XieUniversity of DelawareBig Data-Based Health Risk Analytics: A Deep Learning Approach
Bradley WallsAreteUsing AI to Transform Behavioral Data Into Actionable Insights

2019

NamePlacementDissertation Title
Luwen HuangfuSan Diego State UniversityBeyond Sentiment Polarity: Cognitive Theory-Based Emotion Type Analysis of Social Media Text for Business Applications
Karthik SrinivasanUniversity of KansasEssays on preventive care and digital health analytics
Shuo YuTexas Tech UniversityMobile Health Analytics for Senior Care: A Data Mining and Deep Learning Approach
Rich YuehUniversity of California, RiversideCapturing Self-Efficacy Behavioral Outcomes Through Human-Computer Interaction Devices
Hongyi ZhuUniversity of Texas at San AntonioDeveloping Smart and Unobtrusive Mobile Home Care: A Deep Learning Approach
Yongcheng ZhanCalifornia Polytechnic State UniversitySocial Media Driven Public Health Informatics: Applications in Regulatory Science

2018

NamePlacementDissertation Title
Joseph BuckmanKansas State UniversityUnderstanding Changes in Individual and Firm Behavior in Response to Security and Privacy Factors
Michael ByrdUniversity of ArizonaAn Empirical Exploration of Countermeasures in HCI-based Deception Research
Steven PentlandBoise State UniversityHuman-Screening in Information Systems Research and Applications in Personnel Selection
Sagar SamtaniUniversity of South FloridaDeveloping Proactive Cyber Threat Intelligence from the Online Hacker Community: A Computational Design Science Approach
Lee Allen SpitzleyUniversity at Albany, SUNYUsing Narrative Financial Disclosures to Detect Financial Fraud
Wenli ZhangIowa State UniversityNatural Language Processing and Machine Learning for Chronic Disease Management

2017

NamePlacementDissertation Title
Yang WangPurdue University, Krannert School of ManagementEssays on the Network Effects of Online Reviews
Yun WangMicrosoftMining Massive Spatiotemporal Data for Actionable Intelligence
Weifang LiUniversity of GeorgiaTowards Secure and Trustworthy Cyberspace: Social Media Analytics on Hacker Communities 

2016

NamePlacementDissertation Title
Victor BenjaminArizona State UniversitySecuring Cyberspace: Analyzing Cybercriminal Communities through Web and Text Mining Perspectives
Devipsita BhattacharyaPost Doc Research Fellow with INSITENetwork Theoretic Approaches for Understanding and Analyzing Social Media Based News Article Propagation
Qiang (David) GaoCity University of New YorkEmpirical Studies of Online Crowdfunding
Chenhui (Julian) GuoMichigan State UniversityEmpirical Studies about Incentives, Information Disclosure, and Social Interactions in Online Environments
Xiao LiuUniversity of UtahHealth Analytics for Pharmacovigilance: A Data and Text Mining Framework
Srikar VelicetyUniversity of MemphisEssays on Data Driven Insights from Crowd Sourcing, Social Media and Social Networks

2015

NamePlacementDissertation Title
Mark GrimesUniversity of HoustonAnalysis of Human Computer Interaction Behavior for Assessment of Affect, Cognitive Load, and Credibility
Shan (Jonathan) JiangPenn StateStatistical Modeling of Multi-dimensional Knowledge Diffusion Networks: An ERGM-based Framework
Yu-Kai LinFlorida State UniversityHealth Analytics and Predictive Modeling: Four Essays on Health Informatics
James MarquardsonNorthern Michigan UniversityAchieving Alignment: System Design and Attitudinal Considerations to Increase the Persuasive Power of Technology
Ryan SchuetzlerUniversity of NebraskaDynamic Interviewing Agents: Effects on Deception, Nonverbal Behavior, and Social Desirability
David WilsonUniversity of OklahomaOvercoming Information Privacy Concerns: Learning from Three Disclosure Contexts
 Shuo ZengCalifornia State Polytechnic UniversityTopics of Principal-Agent Service Contracts: Contract Analysis and Pooling Principals

2014

NamePlacementDissertation Title
Katherine Carl PayneBrigham Young UniversityAutomated Route Generation for Bicycle Tours of the United States
Justin GiboneySUNY - AlbanyDevelopment and Application of an Online Tool for Meta-Analyses Using Design Science Principles
Jeffrey ProudfootBentley UniversityIdentifying Deception using Novel Technology-Based Approaches to Uncover Concealed Information

2013

NamePlacementDissertation Title
Yi-Da ChenNortheastern UniversityThe Dynamics of Task-related Discussion in the Pursuit of Radical Innovation: Innovation Project Teams as Interpretation Systems
Jiesi ChengGoogleInformation Diffusion and Influence Propagation on Social Networks with Marketing Applications
Christopher DillerUniversity of Nebraska-OmahaAn Exploration of Distributed Parallel Sorting in GSS
Jeffrey JenkinsBrigham Young UniversityAlleviating Insider Threats: Mitigation Strategies and Detection Techniques

2012

NamePlacementDissertation Title
Mary BurnsMontana State UniversityExamining Multiple Stages of IS Security Behavior by End-Users
Shaokun FanCity University, Hong KongA Process Driven Approach to Collaboration Management
Tianjun FuGoogleCSI in the Web 2.0 Age: Data Collection, Selection, and Investigation for knowledge Discovery
Noyan IlkFlorida State UniversityEssays on E-service Management:  Technical, Operational and Financial Perspectives
Chang Heon LeeSamsung Life InsuranceDynamics of Advice Network and Knowledge Contribution: A Longitudinal Social Network Analysis
Jian MaColorado State UniversityPeople, Processes and Products: Case Studies in Open-Source Software Using Complex Networks
Matthew PickardUniversity of New MexicoPersuasive Embodied Agents: Using Embodied Agents to Change People’s Behavior, Beliefs, and Assessments
Nathan TwymanUniversity of ArizonaAutomated Human Screening for Concealed Knowledge
David ZimbraSanta Clara UniversityStakeholder and Sentiment Analysis in Web Forums

2011

NamePlacementDissertation Title
Yan DangNorthern Arizona UniversityTheory-Informed Design and Evaluation of Web-Based Knowledge Management Systems
Douglas DerrickUniversity of Nebraska-OmahaSpecial-Purpose, Embodied Conversational Intelligence with Environmental Sensors (SPECIES) Agents: Implemented in an Automated Interviewing Kiosk
Aaron ElkinsBORDERS Research CenterVocalic Markers of Deception and Cognitive Dissonance for Automated Emotion Detection Systems
Brent LanghalsU.S. ArmyUsing Eye and Head Based Psychophysiological Cues to Enhance Screener Vigilance
Jun LiuUniversity of ArizonaW7 Model of Provenance and Its Application in the Context of Wikipedia
Kevin MoffittRochester Institute of TechnologyToward Enhancing Automated Credibility Assessment: A Model for Question Type Classification and a Tool for Linguistic Analysis 
Runpu (Aaron) SunGoogleUsing Social Media Intelligence to Support Business Knowledge Discovery and Decision Making :Approaches and Applications
 Yulei ZhangNorthern Arizona University Knowledge Discovery in Social Media: Physical World, Online World, and Virtual World

2010

NamePlacementDissertation Title
Eyran GischesUniversity of ArizonaInformation Effects on Group Behavior in Networks
Sean HumpherysWest Texas A&MA System of Deception and Fraud Detection Using Reliable Linguistic Cues Including Hedging, Disfluencies, and Repeated Phrases
Manlu LiuRochester Institute of TechnologyCommunity Source as a New Approach to Enterprise Application Development: Exploration of Technological and Managerial Issues
Hsin-Min LuNational Taiwan UniversitySurveillance in the Information Age:  Tex Quantification, Anomaly Detection, and Empirical Evaluation
Nichalin SuakkaphongUniversity of ArizonaNon-cooperative and Cooperative (Comparative) Games in Supply Chain Management
Wei WeiUniversity of ArizonaUtilizing Social Bookmarking Tag Space for Web Content Discovery: A Social Network Analysis Approach
Ping YanWebsense, Inc.Spatial-Temporal Data Analytics and Consumer Shopping Behavior Modeling