- Methods
- Practice
      By search term
      
    
    
      By topic
      
    
    
      By tag
      
    - Testing (9)
- Agile (32)
- Approaches (48)
- Attributes (4)
- Business Analysis (26)
- Elicitation (29)
- Estimation (5)
- Prioritization (7)
- Team (20)
- User Story (13)
- Template (3)
- Framework (11)
- Goals (9)
- Reuse (2)
- Software Engineering (14)
- Traceability (9)
- Perception (10)
- Management (17)
- Verification (6)
- Study (15)
- Development (16)
- CPRE (5)
- Automation (6)
- Documentation (22)
- Software Quality (11)
- ReqIF (1)
- Standards (8)
- Analysis (20)
- Business Value (13)
- Metrics (5)
- Validation (12)
- Modeling (14)
- Security (5)
- SysML (3)
- Stakeholder (13)
- Big Data (4)
- Opinion (18)
- Literature (4)
- AI (3)
- Digital Design (3)
      By author
      
  - Howard Podeswa (3)
- Rainer Grau (2)
- Erik van Veenendaal (1)
- Cristina Palomares (1)
- Carme Quer (1)
- Xavier Franch (2)
- Mats Wessberg (1)
- Kim Lauenroth (2)
- Joseph Aracic (1)
- IREB (1)
- Jens Schirpenbach (1)
- Alexander Rachmann (1)
- Jesko Schneider (1)
- Frank Engel (1)
- Dr. Ralph R. Young (2)
- Maria-Therese Teichmann (1)
- Eva Gebetsroither (1)
- Corinna Unterfurtner (1)
- Alexandra Kreuzeder (1)
- Harry Sneed (2)
Articles
Showing 34 articles tagged with Analysis, Modeling, ReqIF or Security [max. 4 tags]
    GDPR compliance supports better overall protection
    
  
  
- Methods
- Practice
    Neglecting personal data protection is not an option
    
  
  
- Practice
- Methods
    Strategies for Enhanced Digital User Experience
    
  
  
- Methods
- Practice
    Classifying product techniques by requirements type
    
  
  
- Methods
- Practice
    Strategies for building manageable requirements hierarchies in complex problem domains
    
  
  
- Practice
- Studies and Research
    How Product Owners (POs), Business Analysts and Requirements Engineers Use Agile Requirements Engineering (RE) to optimize the work of the team and maximize the value delivered to stakeholders.
    
  
  
- Methods
- Skills
    Endeavours to improve the situation are finally rewarded
    
  
  
- Practice
- Cross-discipline
    Concept for the successful handling of integral NFRs in Scaled Agile Environments.
    
  
  
- Opinions
- Cross-discipline
    This system is your system. This system is my system.
    
  
  
- Cross-discipline
- Methods
    How you can use the natural partitioning of business events to flexibly synchronise your agile development.
    
  
  
- Methods
    An application of the IREB Handbook of Requirements Modeling
    
  
  
- Methods
- Practice
    How applying Lean Startup, Design Thinking, and others, impact the task of modeling requirements
    
  
  
- Opinions
    Views of a real RE pioneer
    
  
  
- Methods
- Cross-discipline
    The Future How Viewpoint.
    
  
  
- Practice
- Methods
    ‘A large elephant is in the room but we are not able or brave or willing enough to point at it’
    
  
  
- Methods
- Cross-discipline
    An Approach for the Inspection of the Completeness of individual Software Requirements Specifications by Semantic Analysis of the Argument Structures
    
  
  
- Methods
- Skills
    Evaluating Business Analysts‘ role in the Data Driven Economy
    
  
  
- Methods
    Using verbs’ valency to improve requirements’ quality
    
  
  
- Methods
- Opinions
    How to use requirements gathering techniques to determine product requirements from non-verbal subjects
    
  
  
- Methods
    From Requirements to Code
    
  
  
- Practice
- Cross-discipline
    How bias will affect even the simplest of specifications
    
  
  
- Methods
- Practice
    Smart use of constraints leads to cleaner requirements that  are easy to test
    
  
  
- Methods
- Practice
    An Example from the Automation Industry
    
  
  
- Methods
- Studies and Research
    Driving innovation with crowd-based techniques
    
  
  
- Methods
- Skills
    How to create awareness for some of the difficulties requirements engineers face
    
  
  
- Studies and Research
    Results of research project announced in a previous issue.
    
  
  
- Practice
- Methods
    Hands-on guidance for developing and managing security requirements
    
  
  
- Methods
    How can the standard UML FSM be improved to better serve the requirements engineer?
    
  
  
- Methods
    How modeling can be useful to better define and trace requirements
    
  
  
- Practice
    Eliciting security requirements needs a different process
    
  
  
- Practice
    Part 2: The Art of Assigning Software Development
    
  
  
- Methods
    Reverse Modeling and Up-To-Date Evolution of Functional Requirements in Alignment with Tests
    
  
  
- Practice
    Effective product management is the critical success factor to make a product successful – across its life-cycle and across markets.
    
  
  
- Practice
    How the ReqIF Standard for Requirements Exchange Disrupts the Tool Market.
    
  
  
 
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
               
              