Institution
DePaul University
Education•Chicago, Illinois, United States•
About: DePaul University is a education organization based out in Chicago, Illinois, United States. It is known for research contribution in the topics: Population & Context (language use). The organization has 5658 authors who have published 11562 publications receiving 295257 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: 3 experimental studies that build on moral disengagement theory by exploring lying in online environments indicate that people are more willing to lie when communicating via e-mail than via pen and paper and feel more justified in doing so.
Abstract: The authors present 3 experimental studies that build on moral disengagement theory by exploring lying in online environments. Findings indicate that, when e-mail is compared with pen and paper communication media (both of which are equal in terms of media richness, as both are text only), people are more willing to lie when communicating via e-mail than via pen and paper and feel more justified in doing so. The findings were consistent whether the task assured participants that their lie either would or would not be discovered by their counterparts. Implications for theory and practice are discussed.
88 citations
••
11 Sep 2006TL;DR: The underlying probabilistic network model is used to generate traces between requirements, design elements, code and other artifacts stored in distributed 3rd party case tools such as DOORS, rational rose, and source code repositories.
Abstract: Poirot is a web-based tool supporting traceability of distributed heterogeneous software artifacts. A probabilistic network model is used to generate traces between requirements, design elements, code and other artifacts stored in distributed 3rd party case tools such as DOORS, rational rose, and source code repositories. The tool is designed with extensibility in mind, so that additional artifact types and 3rd party case tools can be easily added. Trace results are displayed in both a textual and visual format. This paper briefly describes the underlying probabilistic model, and the user interface of the tool, and then discusses Poirot's deployment and use in an industrial setting.
88 citations
••
TL;DR: In this article, a situational model of ethical consideration in consumer behavior is proposed and examined for Personal vs. Vicarious effects using a path analytic approach, unique structures are reported for Personal and Vicarious situations in the evaluation of a seller's unethical behavior.
Abstract: The managerial ethics literature is used as a base for the inclusion of Ethical Attribution, as an element in the consumer's decision process. A situational model of ethical consideration in consumer behavior is proposed and examined for Personal vs. Vicarious effects. Using a path analytic approach, unique structures are reported for Personal and Vicarious situations in the evaluation of a seller's unethical behavior. An attributional paradigm is suggested to explain the results.
88 citations
••
TL;DR: Future research and practice may explore the Internet as a platform for promoting the healthy development of gay and bisexual male adolescents by providing a developmentally and culturally appropriate venue for the exploration and subsequent commitment to an integrated sexual orientation identity.
Abstract: One emerging avenue for the exploration of adolescents' sexual orientation identity development is the Internet, since it allows for varying degrees of anonymity and exploration. The purpose of this phenomenological study was to examine the role of the Internet in facilitating the sexual orientation identity development process of gay and bisexual male adolescents. Qualitative interviews were conducted with an ethnically diverse sample of 63 gay/bisexual male adolescents (ages 15-23). Participants reported using a range of Internet applications as they explored and came to accept their sexual orientation identity, with the intended purpose and degree of anonymity desired determining which applications were used. Youth reported that the Internet provided a range of functions with regard to the exploration and acceptance of their sexual orientation identity, including (1) increasing self-awareness of sexual orientation identity, (2) learning about gay/bisexual community life, (3) communicating with other gay/bisexual people, (4) meeting other gay/bisexual people, (5) finding comfort and acceptance with sexual orientation, and (6) facilitating the coming out process. Future research and practice may explore the Internet as a platform for promoting the healthy development of gay and bisexual male adolescents by providing a developmentally and culturally appropriate venue for the exploration and subsequent commitment to an integrated sexual orientation identity.
87 citations
••
02 Jun 2012TL;DR: This paper presents a novel approach for automating the construction of traceability links for architectural tactics using machine learning methods and lightweight structural analysis to detect tactic-related classes and train the trace algorithm using code extracted from performance-centric and safety-critical open source software systems.
Abstract: The software architectures of business, mission, or safety critical systems must be carefully designed to balance an exacting set of quality concerns describing characteristics such as security, reliability, and performance. Unfortunately, software architectures tend to degrade over time as maintainers modify the system without understanding the underlying architectural decisions. Although this problem can be mitigated by manually tracing architectural decisions into the code, the cost and effort required to do this can be prohibitively expensive. In this paper we therefore present a novel approach for automating the construction of traceability links for architectural tactics. Our approach utilizes machine learning methods and lightweight structural analysis to detect tactic-related classes. The detected tactic-related classes are then mapped to a Tactic Traceability Information Model. We train our trace algorithm using code extracted from fifteen performance-centric and safety-critical open source software systems and then evaluate it against the Apache Hadoop framework. Our results show that automatically generated traceability links can support software maintenance activities while helping to preserve architectural qualities.
87 citations
Authors
Showing all 5724 results
Name | H-index | Papers | Citations |
---|---|---|---|
C. N. R. Rao | 133 | 1646 | 86718 |
Mark T. Greenberg | 107 | 529 | 49878 |
Stanford T. Shulman | 85 | 502 | 34248 |
Paul Erdös | 85 | 640 | 34773 |
T. M. Crawford | 85 | 270 | 23805 |
Michael H. Dickinson | 79 | 196 | 23094 |
Hanan Samet | 75 | 369 | 25388 |
Stevan E. Hobfoll | 74 | 271 | 35870 |
Elias M. Stein | 69 | 189 | 44787 |
Julie A. Mennella | 68 | 178 | 13215 |
Raouf Boutaba | 67 | 519 | 23936 |
Paul C. Kuo | 64 | 389 | 13445 |
Gary L. Miller | 63 | 306 | 13010 |
Bamshad Mobasher | 63 | 243 | 18867 |
Gail McKoon | 62 | 125 | 14952 |