- Methods
- Practice
By search term
By topic
By tag
- Testing (9)
- Agile (29)
- Approaches (42)
- Attributes (4)
- Business Analysis (21)
- Elicitation (27)
- Estimation (5)
- Prioritization (7)
- Team (17)
- User Story (11)
- Template (3)
- Framework (10)
- Goals (8)
- Reuse (2)
- Software Engineering (9)
- Traceability (9)
- Perception (10)
- Management (14)
- Verification (6)
- Study (15)
- Development (12)
- CPRE (5)
- Automation (6)
- Documentation (20)
- Software Quality (10)
- ReqIF (1)
- Standards (6)
- Analysis (19)
- Business Value (10)
- Metrics (5)
- Validation (10)
- Modeling (14)
- Security (3)
- SysML (3)
- Stakeholder (12)
- Big Data (4)
- Opinion (15)
- Literature (4)
By author
- Howard Podeswa (3)
- Rainer Grau (2)
- Erik van Veenendaal (1)
- Cristina Palomares (1)
- Carme Quer (1)
- Xavier Franch (2)
- Mats Wessberg (1)
- Kim Lauenroth (2)
- Joseph Aracic (1)
- IREB (1)
- Jens Schirpenbach (1)
- Alexander Rachmann (1)
- Jesko Schneider (1)
- Frank Engel (1)
- Dr. Ralph R. Young (2)
- Maria-Therese Teichmann (1)
- Eva Gebetsroither (1)
- Corinna Unterfurtner (1)
- Alexandra Kreuzeder (1)
- Harry Sneed (2)
Articles
Showing 22 articles tagged with Business Value, Security, Validation or Verification [max. 4 tags]
Classifying product techniques by requirements type
- Methods
- Practice
Strategies for building manageable requirements hierarchies in complex problem domains
- Practice
- Studies and Research
How Product Owners (POs), Business Analysts and Requirements Engineers Use Agile Requirements Engineering (RE) to optimize the work of the team and maximize the value delivered to stakeholders.
- Practice
- Cross-discipline
Concept for the successful handling of integral NFRs in Scaled Agile Environments.
- Cross-discipline
- Methods
How you can use the natural partitioning of business events to flexibly synchronise your agile development.
- Methods
- Practice
How applying Lean Startup, Design Thinking, and others, impact the task of modeling requirements
- Practice
- Methods
It seems evident to test designs or prototypes of software with end-users. But what about requirements?
- Methods
- Cross-discipline
The Future How Viewpoint.
- Practice
- Opinions
Insights for 13 crucial challenges
- Methods
- Skills
Evaluating Business Analysts‘ role in the Data Driven Economy
- Methods
- Practice
An Example from the Automation Industry
- Methods
- Practice
Effective specifications to select off-the-shelf software
- Practice
- Methods
Hands-on guidance for developing and managing security requirements
- Practice
Are the practices recommended by the IREB CPRE-FL syllabus still useful in agile projects?
- Practice
Eliciting security requirements needs a different process
- Methods
Reverse Modeling and Up-To-Date Evolution of Functional Requirements in Alignment with Tests
- Studies and Research
Welcome outsourcing!
- Methods
Verification and Validation of System Requirements by Animation and Automated Formal Analysis.
- Methods
A new approach for requirements validation and rigorous verification.
- Practice
- Studies and Research
The True Measure of Requirements Quality.
- Practice
Effective product management is the critical success factor to make a product successful – across its life-cycle and across markets.
- Methods
- Practice
Delegation of requirement verification. A key technique for more mature requirements management.