By search term

By author

Articles

Showing 15 articles tagged with Attributes, Big Data, Reuse, Security or Template [max. 4 tags]

  • Cross-discipline
  • Practice
Conversation with an Artificial Intelligence
What does OpenAI’s ChatGPT say about RE?
  • Practice
  • Methods
Cyber Security Requirements Engineering
Hands-on guidance for developing and managing security requirements
  • Practice
  • Methods
RE for Testers
Why Testers should have a closer look into Requirements Engineering
  • Practice
Building in security instead of testing it in
Eliciting security requirements needs a different process
  • Methods
  • Cross-discipline
ReqInspector
An Approach for the Inspection of the Completeness of individual Software Requirements Specifications by Semantic Analysis of the Argument Structures
  • Studies and Research
Requirements Reuse
Requirements Reuse with the PABRE Framework
  • Practice
  • Methods
Readable requirements
Readable requirements are not a matter of course – or are they?
  • Methods
Automated Quality Assurance
Automated Quality Assurance of Software Requirements. The following contribution deals with the automated assurance of software requirements quality.
  • Methods
Opportunities & Approaches
Re-Use of Requirements via Libraries:
Opportunities & Approaches
  • Methods
  • Practice
IT Requirements when Buying, not Making
Effective specifications to select off-the-shelf software
  • Practice
Open Up
How the ReqIF Standard for Requirements Exchange Disrupts the Tool Market.
  • Methods
  • Skills
Data Science – the expanding frontier for Business Analysts
Evaluating Business Analysts‘ role in the Data Driven Economy
  • Methods
  • Practice
Innovation Arena
An agile and collaborative prioritization technique
  • Practice
  • Cross-discipline
Mission Possible
Concept for the successful handling of integral NFRs in Scaled Agile Environments.
  • Practice
Evolving and Improving the Requirements Approach to Big Data Projects
A Roadmap to Implementing Big Data Projects
Title Topic Author Date Reading time

Conversation with an Artificial Intelligence

Cross-discipline Practice
20 minutes

Cyber Security Requirements Engineering

Practice Methods
14 minutes

RE for Testers

Practice Methods
4 minutes

Building in security instead of testing it in

Practice
14 minutes

ReqInspector

Methods Cross-discipline
21 minutes

Requirements Reuse

Studies and Research
22 minutes

Readable requirements

Practice Methods
15 minutes

Automated Quality Assurance

Methods
21 minutes

Opportunities & Approaches

Methods
9 minutes

IT Requirements when Buying, not Making

Methods Practice
31 minutes

Open Up

Practice
21 minutes

Data Science – the expanding frontier for Business Analysts

Methods Skills
18 minutes

Innovation Arena

Methods Practice
32 minutes

Mission Possible

Practice Cross-discipline
11 minutes

Evolving and Improving the Requirements Approach to Big Data Projects

Practice
15 minutes