Abuse case

Abuse case is a specification model for security requirements used in the software development industry. The term Abuse Case is an adaptation of use… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1999-2017
02419992017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Child abuse has been one of global issue recently. There are big number of child abuse case in every country in the world. It… (More)
Is this relevant?
2016
2016
a Department of Nursing, College of Medicine, National Cheng Kung University and Hospital, Tainan, Taiwan b Department of Nursing… (More)
Is this relevant?
Review
2013
Review
2013
This study aimed to identify the factors that have the greatest influence on UK social care and health sector professionals… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2011
2011
This paper proposes an enhanced use-misuse case model that allows both safety and security requirements to be captured during… (More)
Is this relevant?
2010
2010
1 This work is derived from the participation of the authors in a research project financed by the Junta de Castilla y León… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2007
2007
The present study examines the impact abuse type, family response, and respondent gender have on attributions of blame in a… (More)
  • table 1
Is this relevant?
2007
2007
The empirical literature on variables affecting jury decision-making has focused primarily on cases with male perpetrators almost… (More)
  • table I
  • table II
Is this relevant?
2006
2006
In the era of the information society, it is important to secure systems against security breaches. To understand and model such… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Review
2004
Review
2004
Religious beliefs can foster, encourage, and justify child abuse, yet religious motivations for child abuse and neglect have been… (More)
  • table 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?