Articles

Showing 15 articles tagged with Attributes, Reuse, Security or Testing [max. 4 tags]

  • Methods
  • Opinions
Challenges in the elicitation and determination of precise requirements from animal stakeholders
How to use requirements gathering techniques to determine product requirements from non-verbal subjects
  • Methods
KCycle: Knowledge-Based & Agile Software Quality Assurance
An approach for iterative and requirements-based quality assurance in DevOps
  • Opinions
Sharing My Doubts on Acceptance Criteria
Do you know what acceptance criteria are?
  • Methods
  • Practice
IT Requirements when Buying, not Making
Effective specifications to select off-the-shelf software
  • Practice
  • Methods
Cyber Security Requirements Engineering
Hands-on guidance for developing and managing security requirements
  • Practice
Building in security instead of testing it in
Eliciting security requirements needs a different process
  • Methods
The Recover Approach
Reverse Modeling and Up-To-Date Evolution of Functional Requirements in Alignment with Tests
  • Practice
Open Up
How the ReqIF Standard for Requirements Exchange Disrupts the Tool Market.
  • Methods
Automated Quality Assurance
Automated Quality Assurance of Software Requirements. The following contribution deals with the automated assurance of software requirements quality.
  • Methods
Opportunities & Approaches
Re-Use of Requirements via Libraries:
Opportunities & Approaches
  • Methods
Think Like a Scientist
Using Hypothesis Testing and Metrics to Drive Requirements Elicitation
  • Studies and Research
Requirements Reuse
Requirements Reuse with the PABRE Framework
  • Practice
  • Methods
RE for Testers
Why Testers should have a closer look into Requirements Engineering
  • Methods
  • Practice
Innovation Arena
An agile and collaborative prioritization technique
  • Skills
Five Questions
Transitioning successfully from the IT side to business – and 5 questions you should ask yourself before moving from the tech side to Business Analysis