Doctoral Placements Since 2007

The following list reflects placement information at time of graduation from the MIS program. 

Name Placement Dissertation Title
Joseph Buckman Kansas State University Understanding Changes in Individual and Firm Behavior in Response to Security and Privacy Factors
Michael Byrd Neuro-ID Inc. An Empirical Exploration of Countermeasures in HCI-based Deception Research
Steven Pentland Boise State University Human-Screening in Information Systems Research and Applications in Personnel Selection
Sagar Samtani University of South Florida Developing Proactive Cyber Threat Intelligence from the Online Hacker Community: A Computational Design Science Approach
Lee Spitzley University at Albany, SUNY Using Narrative Financial Disclosures to Detect Financial Fraud
Rich Yueh University of CA, Riverside Capturing Self-Efficacy Behavioral Outcomes Through Human-Computer Interaction Devices
Wenli Zhang Iowa State University Natural Language Processing and Machine Learning for Chronic Disease Management and Prevention: Focus on Asthma
Name Placement Dissertation Title
Yang Wang Purdue University Essays on the Network Effects of Online Reviews
Yun Wang Microsoft Mining Massive Spatiotemporal Data for Actionable Intelligence
Weifang Li University of Georgia Towards Secure and Trustworthy Cyberspace: Social Media Analytics on Hacker Communities 
Name Placement Dissertation Title
Victor Benjamin Arizona State University Securing Cyberspace: Analyzing Cybercriminal Communities through Web and Text Mining Perspectives
Devipsita Bhattacharya University of Arizona Network Theoretic Approaches for Understanding and Analyzing Social Media Based News Article Propagation
Qiang (David) Gao City University of New York Empirical Studies of Online Crowdfunding
Chenhui (Julian) Guo Michigan State University Empirical Studies about Incentives, Information Disclosure, and Social Interactions in Online Environments
Xiao Liu University of Utah Health Analytics for Pharmacovigilance: A Data and Text Mining Framework
Srikar Velicety University of Memphis Essays on Data Driven Insights from Crowd Sourcing, Social Media and Social Networks
Name Placement Dissertation Title
Mark Grimes University of Houston Analysis of Human Computer Interaction Behavior for Assessment of Affect, Cognitive Load, and Credibility
Shan (Jonathan) Jiang Penn State Statistical Modeling of Multi-dimensional Knowledge Diffusion Networks: An ERGM-based Framework
Yu-Kai Lin Florida State University Health Analytics and Predictive Modeling: Four Essays on Health Informatics
James Marquardson Northern Michigan University Achieving Alignment: System Design and Attitudinal Considerations to Increase the Persuasive Power of Technology
Ryan Schuetzler University of Nebraska Dynamic Interviewing Agents: Effects on Deception, Nonverbal Behavior, and Social Desirability
David Wilson University of Oklahoma Overcoming Information Privacy Concerns: Learning from Three Disclosure Contexts
 Shuo Zeng  California State Polytechnic University Topics of Principal-Agent Service Contracts: Contract Analysis and Pooling Principals
Name Placement Dissertation Title
Katherine Carl Payne Brigham Young University Automated Route Generation for Bicycle Tours of the United States
Justin Giboney SUNY - Albany Development and Application of an Online Tool for Meta-Analyses Using Design Science Principles
Jeffrey Proudfoot Bentley University Identifying Deception using Novel Technology-Based Approaches to Uncover Concealed Information
Name Placement Dissertation Title
Yi-Da Chen Northeastern University The Dynamics of Task-related Discussion in the Pursuit of Radical Innovation: Innovation Project Teams as Interpretation Systems
Jiesi Cheng Google Information Diffusion and Influence Propagation on Social Networks with Marketing Applications
Christopher Diller University of Nebraska-Omaha An Exploration of Distributed Parallel Sorting in GSS
Jeffrey Jenkins Brigham Young University Alleviating Insider Threats: Mitigation Strategies and Detection Techniques
Name Placement Dissertation Title
Mary Burns Montana State University Examining Multiple Stages of IS Security Behavior by End-Users
Shaokun Fan City University, Hong Kong A Process Driven Approach to Collaboration Management
Tianjun Fu Google CSI in the Web 2.0 Age: Data Collection, Selection, and Investigation for knowledge Discovery
Noyan Ilk Florida State University Essays on E-service Management:  Technical, Operational and Financial Perspectives
Chang Heon Lee Samsung Life Insurance Dynamics of Advice Network and Knowledge Contribution: A Longitudinal Social Network Analysis
Jian Ma Colorado State University People, Processes and Products: Case Studies in Open-Source Software Using Complex Networks
Matthew Pickard University of New Mexico Persuasive Embodied Agents: Using Embodied Agents to Change People’s Behavior, Beliefs, and Assessments
Nathan Twyman University of Arizona Automated Human Screening for Concealed Knowledge
David Zimbra Santa Clara University Stakeholder and Sentiment Analysis in Web Forums
Name Placement Dissertation Title
Yan Dang Northern Arizona University Theory-Informed Design and Evaluation of Web-Based Knowledge Management Systems
Douglas Derrick University of Nebraska-Omaha Special-Purpose, Embodied Conversational Intelligence with Environmental Sensors (SPECIES) Agents: Implemented in an Automated Interviewing Kiosk
Aaron Elkins BORDERS Research Center Vocalic Markers of Deception and Cognitive Dissonance for Automated Emotion Detection Systems
Brent Langhals U.S. Army Using Eye and Head Based Psychophysiological Cues to Enhance Screener Vigilance
Jun Liu University of Arizona W7 Model of Provenance and Its Application in the Context of Wikipedia
Kevin Moffitt Rochester Institute of Technology Toward Enhancing Automated Credibility Assessment: A Model for Question Type Classification and a Tool for Linguistic Analysis 
Runpu (Aaron) Sun Google Using Social Media Intelligence to Support Business Knowledge Discovery and Decision Making :Approaches and Applications
 Yulei Zhang Northern Arizona University  Knowledge Discovery in Social Media: Physical World, Online World, and Virtual World
Name Placement Dissertation Title
Eyran Gisches University of Arizona Information Effects on Group Behavior in Networks
Sean Humpherys West Texas A&M A System of Deception and Fraud Detection Using Reliable Linguistic Cues Including Hedging, Disfluencies, and Repeated Phrases
Manlu Liu Rochester Institute of Technology Community Source as a New Approach to Enterprise Application Development: Exploration of Technological and Managerial Issues
Hsin-Min Lu National Taiwan University Surveillance in the Information Age:  Tex Quantification, Anomaly Detection, and Empirical Evaluation
Nichalin Suakkaphong University of Arizona Non-cooperative and Cooperative (Comparative) Games in Supply Chain Management
Wei Wei University of Arizona Utilizing Social Bookmarking Tag Space for Web Content Discovery: A Social Network Analysis Approach
Ping Yan Websense, Inc. Spatial-Temporal Data Analytics and Consumer Shopping Behavior Modeling
Name Placement Dissertation
Daning Hu City University, Hong Kong Modeling and Predicting Social Network Evolution for Knowledge Management
Xin Li   City University, Hong Kong Graph-based Learning for Information Systems 
Mark Patton  University of Arizona Automated Assessment of Truth and Deception in a Rapid Assessment Environment Using Kiosk Based Avatars
Name Placement Dissertation Title
Siddharth Kaza Towson University Instance, Evolution, and Predictive Modeling of Social Networks
Nicole Velasquez Pepperdine University An Examination of Work Practices and Tool Use in High Risk Environments
Jerod Wilkerson Penn State University Closing the Defect Reduction Gap Between Software Inspection and Test-Driven Development: Applying Mutation Analysis to Iterative Test-First Programming
 Ming Yuan Google An Automatic Classification Approach to Idea Organization in Group Support Systems
Ling Zhu  Long Island University Institutional Environment for B2B E-Commerce Adoption
Name Placement Dissertation Title
Kelly John Fadel Utah State University Infusion of Information Systems: The Role of Adaptation Individual Cognitions
Yousub Hwang University of Seoul Facilitating Web service Discovery and Publishing: A Theoretical Framework, a Prototype System, and Evaluation
Matthew Jensen University of Oklahoma The Effects of an Expert System on Novice and Professional Decision Making With Application In Deception Detection
Jiexun (Jason) Li Drexel University Feature Construction, Selection, and Consolidation for Knowledge Discovery
Ying Liu California State University Multi-criterion Market Segmentation: A Unified Model, Implementation and Evaluation
Thomas Oliver Meservy University of Memphis Augmenting Human Intellect: Automatic Recognition of Nonverbal Behavior with Application in Deception Detection
Surendra Sarnikar Dakota State University Automating Knowledge Flows by Extending Conventional Information Retrieval and Workflow Technologies 
Robert Schumaker Iona College Knowledge Acquisition, Delivery and Prediction through Text Mining
Theo Sagita Song University of Toledo Identity Verification and Conflict in Distributed Teams
Xiaoyun Sun City University, Hong Kong Dataflow Analysis and Workflow Design in Business Process Management
Yiwan Zhang FedEx Channel Preference of Knowledge Sourcing