Misuse case

Results: 46



#Item
11Educational research / Organisation for Economic Co-operation and Development / Programme for International Student Assessment / Danish language / Denmark / Pie chart / Grade / Education / Europe / Scandinavia

Exploring a Case Study to Discover Issues Relevant to the Use and Misuse of Statistics

Add to Reading List

Source URL: www.esera.org

Language: English - Date: 2012-07-11 13:47:42
12Business / BT Group / Misuse case / Marketing / Silent call / Telephony

PDF Document

Add to Reading List

Source URL: www.btplc.com

Language: English - Date: 2010-02-05 05:25:08
13Software project management / Usability / Systems Modeling Language / Unified Modeling Language / Use case / Scenario / Stakeholder / Misuse case / Stakeholder analysis / Software development / Software requirements / Software

Use Case Terminology Use Case A use case expresses the behavioural portion of a contract between stakeholders of a system. It describes the system’s behaviour and interactions under various conditions as it responds t

Add to Reading List

Source URL: www.ukoln.ac.uk

Language: English - Date: 2005-12-13 04:39:36
14Product management / Software project management / Functional requirement / Requirement / Artifact / Misuse case / Software development / Software requirements / Software

Security Design Patterns – Overview –Software Development Lifecycle –Enterprise Software Design Process and Artifacts –Pattern Format

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
15Patent misuse / Civil law / Lear /  Inc. v. Adkins / Leegin Creative Leather Products /  Inc. v. PSKS /  Inc. / Case law / Patent law / United States patent law / Law / Anti-competitive behaviour

No ================================================================ In The Supreme Court of the United States

Add to Reading List

Source URL: sblog.s3.amazonaws.com

Language: English - Date: 2015-02-03 19:56:32
16Computer security / Cyberwarfare / Hacking / Crime prevention / National security / Attack patterns / Misuse case / Vulnerability / Penetration test / Software testing / Security / Computer network security

Building Security In Editor: Gary McGraw, Misuse and Abuse Cases: Getting Past the Positive

Add to Reading List

Source URL: cigital.com

Language: English - Date: 2013-11-26 20:39:33
17Privacy / Ethics / Schillings / Internet privacy

The Campbell Legacy A decade of ‘misuse of private information’ Newcastle Law School, 17 AprilThe 2004 decision of the House of Lords in Campbell v Mirror Group Newspapers was a significant case regarding priv

Add to Reading List

Source URL: www.ncl.ac.uk

Language: English - Date: 2015-03-11 05:28:41
18Software project management / Business process / Misuse case / Use case / Requirements analysis / Functional requirement / Requirement / Threat / Software development / Software requirements / Software

Capturing Security Requirements through Misuse Cases Guttorm Sindre Dept of Computer and Info. Sci. Norwegian Univ. of Sci. and Tech. [removed]

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2002-09-06 09:05:40
19Public safety / Data security / National security / Crime prevention / IT risk management / Information security / Threat / Vulnerability / Misuse case / Security / Computer security / Risk

Quantitative assessment of enterprise security system Ruth Breu, Frank Innerhofer–Oberperfler Artsiom Yautsiukhin

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2010-06-18 12:27:16
20Parts of speech / Honorifics / Honorific / Titles / Japanese honorifics / Japanese language / T–V distinction / Misuse case / Language / Linguistics / Sociolinguistics / Pragmatics

2-5 Development of a System to Point Out Misuse of Japanese Honorific SHIRADO Tamotsu We developed a computational system to indicate the misuse of honorifics in Japanese speech sentences. The misuse was checked by const

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 20:08:22
UPDATE