Articles

Showing 11 articles tagged with Big Data, Reuse, Security or Stakeholder [max. 4 tags]

  • Methods
  • Cross-discipline
ReqInspector
An Approach for the Inspection of the Completeness of individual Software Requirements Specifications by Semantic Analysis of the Argument Structures
  • Methods
  • Skills
Data Science – the expanding frontier for Business Analysts
Evaluating Business Analysts‘ role in the Data Driven Economy
  • Methods
  • Opinions
Challenges in the elicitation and determination of precise requirements from animal stakeholders
How to use requirements gathering techniques to determine product requirements from non-verbal subjects
  • Practice
  • Methods
Discover Quality Requirements with the Mini-QAW
A short and fun elicitation workshop for Agile teams and architects
  • Studies and Research
Requirements Engineering in Research Projects: Food for Thought
Lessons learned from a European Framework Project
  • Practice
Evolving and Improving the Requirements Approach to Big Data Projects
A Roadmap to Implementing Big Data Projects
  • Skills
Survival Kit for the RE Guy
Anecdotes from a Requirements Engineer in the Real World
  • Practice
  • Methods
Cyber Security Requirements Engineering
Hands-on guidance for developing and managing security requirements
  • Practice
Building in security instead of testing it in
Eliciting security requirements needs a different process
  • Methods
Opportunities & Approaches
Re-Use of Requirements via Libraries:
Opportunities & Approaches
  • Studies and Research
Requirements Reuse
Requirements Reuse with the PABRE Framework