Doctoral Placements Since 2007
The following list reflects placement information at time of graduation from the MIS program.
2018 | ||
---|---|---|
Name | Placement | Dissertation Title |
Joseph Buckman | Kansas State University | Understanding Changes in Individual and Firm Behavior in Response to Security and Privacy Factors |
Michael Byrd | Neuro-ID Inc. | An Empirical Exploration of Countermeasures in HCI-based Deception Research |
Steven Pentland | Boise State University | Human-Screening in Information Systems Research and Applications in Personnel Selection |
Sagar Samtani | University of South Florida | Developing Proactive Cyber Threat Intelligence from the Online Hacker Community: A Computational Design Science Approach |
Lee Spitzley | University at Albany, SUNY | Using Narrative Financial Disclosures to Detect Financial Fraud |
Rich Yueh | University of CA, Riverside | Capturing Self-Efficacy Behavioral Outcomes Through Human-Computer Interaction Devices |
Wenli Zhang | Iowa State University | Natural Language Processing and Machine Learning for Chronic Disease Management and Prevention: Focus on Asthma |
2017 | ||
Name | Placement | Dissertation Title |
Yang Wang | Purdue University | Essays on the Network Effects of Online Reviews |
Yun Wang | Microsoft | Mining Massive Spatiotemporal Data for Actionable Intelligence |
Weifang Li | University of Georgia | Towards Secure and Trustworthy Cyberspace: Social Media Analytics on Hacker Communities |
2016 | ||
Name | Placement | Dissertation Title |
Victor Benjamin | Arizona State University | Securing Cyberspace: Analyzing Cybercriminal Communities through Web and Text Mining Perspectives |
Devipsita Bhattacharya | University of Arizona | Network Theoretic Approaches for Understanding and Analyzing Social Media Based News Article Propagation |
Qiang (David) Gao | City University of New York | Empirical Studies of Online Crowdfunding |
Chenhui (Julian) Guo | Michigan State University | Empirical Studies about Incentives, Information Disclosure, and Social Interactions in Online Environments |
Xiao Liu | University of Utah | Health Analytics for Pharmacovigilance: A Data and Text Mining Framework |
Srikar Velicety | University of Memphis | Essays on Data Driven Insights from Crowd Sourcing, Social Media and Social Networks |
2015 | ||
Name | Placement | Dissertation Title |
Mark Grimes | University of Houston | Analysis of Human Computer Interaction Behavior for Assessment of Affect, Cognitive Load, and Credibility |
Shan (Jonathan) Jiang | Penn State | Statistical Modeling of Multi-dimensional Knowledge Diffusion Networks: An ERGM-based Framework |
Yu-Kai Lin | Florida State University | Health Analytics and Predictive Modeling: Four Essays on Health Informatics |
James Marquardson | Northern Michigan University | Achieving Alignment: System Design and Attitudinal Considerations to Increase the Persuasive Power of Technology |
Ryan Schuetzler | University of Nebraska | Dynamic Interviewing Agents: Effects on Deception, Nonverbal Behavior, and Social Desirability |
David Wilson | University of Oklahoma | Overcoming Information Privacy Concerns: Learning from Three Disclosure Contexts |
Shuo Zeng | California State Polytechnic University | Topics of Principal-Agent Service Contracts: Contract Analysis and Pooling Principals |
2014 | ||
Name | Placement | Dissertation Title |
Katherine Carl Payne | Brigham Young University | Automated Route Generation for Bicycle Tours of the United States |
Justin Giboney | SUNY - Albany | Development and Application of an Online Tool for Meta-Analyses Using Design Science Principles |
Jeffrey Proudfoot | Bentley University | Identifying Deception using Novel Technology-Based Approaches to Uncover Concealed Information |
2013 | ||
Name | Placement | Dissertation Title |
Yi-Da Chen | Northeastern University | The Dynamics of Task-related Discussion in the Pursuit of Radical Innovation: Innovation Project Teams as Interpretation Systems |
Jiesi Cheng | Information Diffusion and Influence Propagation on Social Networks with Marketing Applications | |
Christopher Diller | University of Nebraska-Omaha | An Exploration of Distributed Parallel Sorting in GSS |
Jeffrey Jenkins | Brigham Young University | Alleviating Insider Threats: Mitigation Strategies and Detection Techniques |
2012 | ||
Name | Placement | Dissertation Title |
Mary Burns | Montana State University | Examining Multiple Stages of IS Security Behavior by End-Users |
Shaokun Fan | City University, Hong Kong | A Process Driven Approach to Collaboration Management |
Tianjun Fu | CSI in the Web 2.0 Age: Data Collection, Selection, and Investigation for knowledge Discovery | |
Noyan Ilk | Florida State University | Essays on E-service Management: Technical, Operational and Financial Perspectives |
Chang Heon Lee | Samsung Life Insurance | Dynamics of Advice Network and Knowledge Contribution: A Longitudinal Social Network Analysis |
Jian Ma | Colorado State University | People, Processes and Products: Case Studies in Open-Source Software Using Complex Networks |
Matthew Pickard | University of New Mexico | Persuasive Embodied Agents: Using Embodied Agents to Change People’s Behavior, Beliefs, and Assessments |
Nathan Twyman | University of Arizona | Automated Human Screening for Concealed Knowledge |
David Zimbra | Santa Clara University | Stakeholder and Sentiment Analysis in Web Forums |
2011 | ||
Name | Placement | Dissertation Title |
Yan Dang | Northern Arizona University | Theory-Informed Design and Evaluation of Web-Based Knowledge Management Systems |
Douglas Derrick | University of Nebraska-Omaha | Special-Purpose, Embodied Conversational Intelligence with Environmental Sensors (SPECIES) Agents: Implemented in an Automated Interviewing Kiosk |
Aaron Elkins | BORDERS Research Center | Vocalic Markers of Deception and Cognitive Dissonance for Automated Emotion Detection Systems |
Brent Langhals | U.S. Army | Using Eye and Head Based Psychophysiological Cues to Enhance Screener Vigilance |
Jun Liu | University of Arizona | W7 Model of Provenance and Its Application in the Context of Wikipedia |
Kevin Moffitt | Rochester Institute of Technology | Toward Enhancing Automated Credibility Assessment: A Model for Question Type Classification and a Tool for Linguistic Analysis |
Runpu (Aaron) Sun | Using Social Media Intelligence to Support Business Knowledge Discovery and Decision Making :Approaches and Applications | |
Yulei Zhang | Northern Arizona University | Knowledge Discovery in Social Media: Physical World, Online World, and Virtual World |
2010 | ||
Name | Placement | Dissertation Title |
Eyran Gisches | University of Arizona | Information Effects on Group Behavior in Networks |
Sean Humpherys | West Texas A&M | A System of Deception and Fraud Detection Using Reliable Linguistic Cues Including Hedging, Disfluencies, and Repeated Phrases |
Manlu Liu | Rochester Institute of Technology | Community Source as a New Approach to Enterprise Application Development: Exploration of Technological and Managerial Issues |
Hsin-Min Lu | National Taiwan University | Surveillance in the Information Age: Tex Quantification, Anomaly Detection, and Empirical Evaluation |
Nichalin Suakkaphong | University of Arizona | Non-cooperative and Cooperative (Comparative) Games in Supply Chain Management |
Wei Wei | University of Arizona | Utilizing Social Bookmarking Tag Space for Web Content Discovery: A Social Network Analysis Approach |
Ping Yan | Websense, Inc. | Spatial-Temporal Data Analytics and Consumer Shopping Behavior Modeling |
2009 | ||
Name | Placement | Dissertation |
Daning Hu | City University, Hong Kong | Modeling and Predicting Social Network Evolution for Knowledge Management |
Xin Li | City University, Hong Kong | Graph-based Learning for Information Systems |
Mark Patton | University of Arizona | Automated Assessment of Truth and Deception in a Rapid Assessment Environment Using Kiosk Based Avatars |
2008 | ||
Name | Placement | Dissertation Title |
Siddharth Kaza | Towson University | Instance, Evolution, and Predictive Modeling of Social Networks |
Nicole Velasquez | Pepperdine University | An Examination of Work Practices and Tool Use in High Risk Environments |
Jerod Wilkerson | Penn State University | Closing the Defect Reduction Gap Between Software Inspection and Test-Driven Development: Applying Mutation Analysis to Iterative Test-First Programming |
Ming Yuan | An Automatic Classification Approach to Idea Organization in Group Support Systems | |
Ling Zhu | Long Island University | Institutional Environment for B2B E-Commerce Adoption |
2007 | ||
Name | Placement | Dissertation Title |
Kelly John Fadel | Utah State University | Infusion of Information Systems: The Role of Adaptation Individual Cognitions |
Yousub Hwang | University of Seoul | Facilitating Web service Discovery and Publishing: A Theoretical Framework, a Prototype System, and Evaluation |
Matthew Jensen | University of Oklahoma | The Effects of an Expert System on Novice and Professional Decision Making With Application In Deception Detection |
Jiexun (Jason) Li | Drexel University | Feature Construction, Selection, and Consolidation for Knowledge Discovery |
Ying Liu | California State University | Multi-criterion Market Segmentation: A Unified Model, Implementation and Evaluation |
Thomas Oliver Meservy | University of Memphis | Augmenting Human Intellect: Automatic Recognition of Nonverbal Behavior with Application in Deception Detection |
Surendra Sarnikar | Dakota State University | Automating Knowledge Flows by Extending Conventional Information Retrieval and Workflow Technologies |
Robert Schumaker | Iona College | Knowledge Acquisition, Delivery and Prediction through Text Mining |
Theo Sagita Song | University of Toledo | Identity Verification and Conflict in Distributed Teams |
Xiaoyun Sun | City University, Hong Kong | Dataflow Analysis and Workflow Design in Business Process Management |
Yiwan Zhang | FedEx | Channel Preference of Knowledge Sourcing |