Articles

Showing 12 articles tagged with Business Value, Prioritization, ReqIF or Security [max. 4 tags]

  • Methods
  • Cross-discipline
How Will It Work?
The Future How Viewpoint.
  • Practice
  • Opinions
Mastering Business Requirements
Insights for 13 crucial challenges
  • Practice
  • Methods
Learning from history: The case of Software Requirements Engineering
‘A large elephant is in the room but we are not able or brave or willing enough to point at it’
  • Methods
  • Skills
Data Science – the expanding frontier for Business Analysts
Evaluating Business Analysts‘ role in the Data Driven Economy
  • Opinions
Sharing My Doubts on Shall / Should / Will etc.
When shall does not need to be must
  • Methods
KCycle: Knowledge-Based & Agile Software Quality Assurance
An approach for iterative and requirements-based quality assurance in DevOps
  • Practice
  • Methods
Cyber Security Requirements Engineering
Hands-on guidance for developing and managing security requirements
  • Practice
Building in security instead of testing it in
Eliciting security requirements needs a different process
  • Practice
  • Studies and Research
Project Value Delivered
The True Measure of Requirements Quality.
  • Practice
Product Management
Effective product management is the critical success factor to make a product successful – across its life-cycle and across markets.
  • Practice
Open Up
How the ReqIF Standard for Requirements Exchange Disrupts the Tool Market.
  • Methods
  • Practice
Innovation Arena
An agile and collaborative prioritization technique