By search term By topic Skills (13) Methods (38) Practice (36) Studies and Research (16) Cross-discipline (12) Opinions (16) By tag Testing (7) Agile (22) Approaches (36) Attributes (4) Business Analysis (14) Elicitation (20) Estimation (5) Prioritization (4) Team (16) User Story (7) Template (2) Framework (7) Goals (8) Reuse (2) Software Engineering (7) Traceability (7) Perception (9) Management (11) Verification (4) Study (14) Development (9) CPRE (4) Automation (5) Documentation (14) Software Quality (9) ReqIF (1) Standards (3) Analysis (13) Business Value (5) Metrics (5) Validation (8) Modeling (9) Security (2) SysML (2) Stakeholder (8) Big Data (3) Opinion (13) Literature (2)
Practice Methods Cyber Security Requirements Engineering Hands-on guidance for developing and managing security requirements Written by Christof Ebert 29. October 2015 · 14 minutes read Read article Practice Building in security instead of testing it in Eliciting security requirements needs a different process Written by Edward van Deursen Jan Jaap Cannegieter 30. April 2015 · 14 minutes read · 2 Comments Read article Practice Open Up How the ReqIF Standard for Requirements Exchange Disrupts the Tool Market. Written by Michael Jastram 30. July 2014 · 21 minutes read · 4 Comments Read article