- Practice
- Studies and Research
By search term
By topic
By tag
- Testing (9)
- Agile (29)
- Approaches (42)
- Attributes (4)
- Business Analysis (21)
- Elicitation (27)
- Estimation (5)
- Prioritization (7)
- Team (17)
- User Story (11)
- Template (3)
- Framework (10)
- Goals (8)
- Reuse (2)
- Software Engineering (9)
- Traceability (9)
- Perception (10)
- Management (14)
- Verification (6)
- Study (15)
- Development (12)
- CPRE (5)
- Automation (6)
- Documentation (20)
- Software Quality (10)
- ReqIF (1)
- Standards (6)
- Analysis (19)
- Business Value (10)
- Metrics (5)
- Validation (10)
- Modeling (14)
- Security (3)
- SysML (3)
- Stakeholder (12)
- Big Data (4)
- Opinion (15)
- Literature (4)
By author
- Howard Podeswa (3)
- Rainer Grau (2)
- Erik van Veenendaal (1)
- Cristina Palomares (1)
- Carme Quer (1)
- Xavier Franch (2)
- Mats Wessberg (1)
- Kim Lauenroth (2)
- Joseph Aracic (1)
- IREB (1)
- Jens Schirpenbach (1)
- Alexander Rachmann (1)
- Jesko Schneider (1)
- Frank Engel (1)
- Dr. Ralph R. Young (2)
- Maria-Therese Teichmann (1)
- Eva Gebetsroither (1)
- Corinna Unterfurtner (1)
- Alexandra Kreuzeder (1)
- Harry Sneed (2)
Articles
Showing 17 articles tagged with Development, Security or Standards
How Product Owners (POs), Business Analysts and Requirements Engineers Use Agile Requirements Engineering (RE) to optimize the work of the team and maximize the value delivered to stakeholders.
- Methods
- Practice
Improving requirements quality by effort estimates
- Studies and Research
- Practice
Preliminary Results from an Ongoing Study
- Cross-discipline
- Skills
RE is one discipline in the mix of disciplines that SE orchestrates. Not understanding the role of RE properly can hold practitioners back
- Skills
How to build a strong foundation for business analysis and requirements engineering inside a company
- Practice
State of the discussion: Requirements Engineering and Product Owner in Scrum
- Practice
How the ReqIF Standard for Requirements Exchange Disrupts the Tool Market.
- Practice
- Cross-discipline
Concept for the successful handling of integral NFRs in Scaled Agile Environments.
- Practice
- Methods
‘A large elephant is in the room but we are not able or brave or willing enough to point at it’
- Practice
- Opinions
When every new iteration can violate previously satisfied requirements
- Practice
- Methods
A short and fun elicitation workshop for Agile teams and architects
- Practice
- Methods
Hands-on guidance for developing and managing security requirements
- Methods
- Skills
Endeavours to improve the situation are finally rewarded
- Methods
- Opinions
How to use requirements gathering techniques to determine product requirements from non-verbal subjects
- Practice
Eliciting security requirements needs a different process
- Practice
- Methods
When requirements and the product are elaborated concurrently
- Opinions
- Cross-discipline
This system is your system. This system is my system.