REFERENCES

Alexander, I. (2003). Misuse Cases: Use Cases with Hostile Intent. IEEEE Software, 1(1), 66.


Cockburn, A. (2002). Writing Effective Use Cases. Technical Communication, 49(2), 240-242.


D'Amorim, F., & Borba, P. (2012). Modularity of Use Case Implementations. The Journal of Systems and Software, 85(1), 1012-1027.


Dedeke, A., & Lieberman, B. (2006). Qualifying Use Case Diagram Associations. IEEE Computer Society, 1(1), 1-29.


Dey, Pradip Peter, & Et al. (2012). Augmenting Use Case View for Modeling. World Academy of Science, Engineering and Technology, 72(1), 5.


Diaz, I., Losavio, F., Matteo, A., & Pastor, O. (2004). A specification patter for use cases. Information and management, 41(1), 961-975.


Dutiot, A., & Paech, B. (n.d.). Rationale-Based use Case Specifications. Requirements Engineering, 7(1), 3-19.


Lauesen, S. (2001). Task descriptions versus use cases. Requirements Engineering, 17(1), 3-18.


Li, L. (2002). Use Case Patterns. International Journal of Software Engineering and Knowledge Engineering, 12(1), 19-40.


Mahmood, A., & Et. Al. (2013). An Approach to generate test goals from Use Case scenarios. Information Technology Journal, 12(8), 1600-1606.


WEB RESOURCES

Website links

  • How-to-methods for Use Cases
  • Common Use Case diagrams
  • Example Use Cases
  • Art of Use Case design
  • Microsoft Use Cases
  • Example Use Case scenarios
  • Documenting your use case examples
  • Use cases in practice
  • Use case examples
  • Effective Samples of use cases
  •  

    Contact Info

    James R. Currey

    prepared for Prof.Sauter, IS 6840

    Email: jrc6d9@umsl.edu


    Links to other parts of the research:

  • Home
  • Use Cases
  • Misuse Cases