scispace - formally typeset
Search or ask a question
Institution

DePaul University

EducationChicago, Illinois, United States
About: DePaul University is a education organization based out in Chicago, Illinois, United States. It is known for research contribution in the topics: Population & Context (language use). The organization has 5658 authors who have published 11562 publications receiving 295257 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: 3 experimental studies that build on moral disengagement theory by exploring lying in online environments indicate that people are more willing to lie when communicating via e-mail than via pen and paper and feel more justified in doing so.
Abstract: The authors present 3 experimental studies that build on moral disengagement theory by exploring lying in online environments. Findings indicate that, when e-mail is compared with pen and paper communication media (both of which are equal in terms of media richness, as both are text only), people are more willing to lie when communicating via e-mail than via pen and paper and feel more justified in doing so. The findings were consistent whether the task assured participants that their lie either would or would not be discovered by their counterparts. Implications for theory and practice are discussed.

88 citations

Proceedings ArticleDOI
11 Sep 2006
TL;DR: The underlying probabilistic network model is used to generate traces between requirements, design elements, code and other artifacts stored in distributed 3rd party case tools such as DOORS, rational rose, and source code repositories.
Abstract: Poirot is a web-based tool supporting traceability of distributed heterogeneous software artifacts. A probabilistic network model is used to generate traces between requirements, design elements, code and other artifacts stored in distributed 3rd party case tools such as DOORS, rational rose, and source code repositories. The tool is designed with extensibility in mind, so that additional artifact types and 3rd party case tools can be easily added. Trace results are displayed in both a textual and visual format. This paper briefly describes the underlying probabilistic model, and the user interface of the tool, and then discusses Poirot's deployment and use in an industrial setting.

88 citations

Journal ArticleDOI
TL;DR: In this article, a situational model of ethical consideration in consumer behavior is proposed and examined for Personal vs. Vicarious effects using a path analytic approach, unique structures are reported for Personal and Vicarious situations in the evaluation of a seller's unethical behavior.
Abstract: The managerial ethics literature is used as a base for the inclusion of Ethical Attribution, as an element in the consumer's decision process. A situational model of ethical consideration in consumer behavior is proposed and examined for Personal vs. Vicarious effects. Using a path analytic approach, unique structures are reported for Personal and Vicarious situations in the evaluation of a seller's unethical behavior. An attributional paradigm is suggested to explain the results.

88 citations

Journal ArticleDOI
TL;DR: Future research and practice may explore the Internet as a platform for promoting the healthy development of gay and bisexual male adolescents by providing a developmentally and culturally appropriate venue for the exploration and subsequent commitment to an integrated sexual orientation identity.
Abstract: One emerging avenue for the exploration of adolescents' sexual orientation identity development is the Internet, since it allows for varying degrees of anonymity and exploration. The purpose of this phenomenological study was to examine the role of the Internet in facilitating the sexual orientation identity development process of gay and bisexual male adolescents. Qualitative interviews were conducted with an ethnically diverse sample of 63 gay/bisexual male adolescents (ages 15-23). Participants reported using a range of Internet applications as they explored and came to accept their sexual orientation identity, with the intended purpose and degree of anonymity desired determining which applications were used. Youth reported that the Internet provided a range of functions with regard to the exploration and acceptance of their sexual orientation identity, including (1) increasing self-awareness of sexual orientation identity, (2) learning about gay/bisexual community life, (3) communicating with other gay/bisexual people, (4) meeting other gay/bisexual people, (5) finding comfort and acceptance with sexual orientation, and (6) facilitating the coming out process. Future research and practice may explore the Internet as a platform for promoting the healthy development of gay and bisexual male adolescents by providing a developmentally and culturally appropriate venue for the exploration and subsequent commitment to an integrated sexual orientation identity.

87 citations

Proceedings ArticleDOI
02 Jun 2012
TL;DR: This paper presents a novel approach for automating the construction of traceability links for architectural tactics using machine learning methods and lightweight structural analysis to detect tactic-related classes and train the trace algorithm using code extracted from performance-centric and safety-critical open source software systems.
Abstract: The software architectures of business, mission, or safety critical systems must be carefully designed to balance an exacting set of quality concerns describing characteristics such as security, reliability, and performance. Unfortunately, software architectures tend to degrade over time as maintainers modify the system without understanding the underlying architectural decisions. Although this problem can be mitigated by manually tracing architectural decisions into the code, the cost and effort required to do this can be prohibitively expensive. In this paper we therefore present a novel approach for automating the construction of traceability links for architectural tactics. Our approach utilizes machine learning methods and lightweight structural analysis to detect tactic-related classes. The detected tactic-related classes are then mapped to a Tactic Traceability Information Model. We train our trace algorithm using code extracted from fifteen performance-centric and safety-critical open source software systems and then evaluate it against the Apache Hadoop framework. Our results show that automatically generated traceability links can support software maintenance activities while helping to preserve architectural qualities.

87 citations


Authors

Showing all 5724 results

NameH-indexPapersCitations
C. N. R. Rao133164686718
Mark T. Greenberg10752949878
Stanford T. Shulman8550234248
Paul Erdös8564034773
T. M. Crawford8527023805
Michael H. Dickinson7919623094
Hanan Samet7536925388
Stevan E. Hobfoll7427135870
Elias M. Stein6918944787
Julie A. Mennella6817813215
Raouf Boutaba6751923936
Paul C. Kuo6438913445
Gary L. Miller6330613010
Bamshad Mobasher6324318867
Gail McKoon6212514952
Network Information
Related Institutions (5)
Florida International University
31.1K papers, 934.2K citations

85% related

City University of New York
56.5K papers, 1.7M citations

84% related

George Mason University
39.9K papers, 1.3M citations

83% related

San Diego State University
27.9K papers, 1.1M citations

83% related

Georgia State University
35.8K papers, 1.1M citations

83% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202326
2022100
2021518
2020498
2019452
2018463