By search term

By author

Articles

Showing 18 articles tagged with Management, ReqIF, Reuse or Security [max. 4 tags]

  • Practice
  • Cross-discipline
Mission Possible
Concept for the successful handling of integral NFRs in Scaled Agile Environments.
  • Opinions
  • Cross-discipline
A General Systems Thinking Perspective on the CPRE
This system is your system. This system is my system.
  • Practice
  • Methods
Learning from history: The case of Software Requirements Engineering
‘A large elephant is in the room but we are not able or brave or willing enough to point at it’
  • Methods
  • Opinions
Functional Requirements and their levels of granularity
What are the levels of granularity of functional requirements and why this is important
  • Practice
  • Opinions
Managing the Invisible
Ensuring Software Quality beyond Micromanagement
  • Methods
  • Practice
IT Requirements when Buying, not Making
Effective specifications to select off-the-shelf software
  • Practice
  • Methods
Cyber Security Requirements Engineering
Hands-on guidance for developing and managing security requirements
  • Skills
The Business Analysis Center of Excellence
How to build a strong foundation for business analysis and requirements engineering inside a company
  • Practice
Applying IREB RE practices in an agile environment
Are the practices recommended by the IREB CPRE-FL syllabus still useful in agile projects?
  • Practice
Building in security instead of testing it in
Eliciting security requirements needs a different process
  • Studies and Research
Poor requirements?
Welcome outsourcing!
  • Practice
Product Management
Effective product management is the critical success factor to make a product successful – across its life-cycle and across markets.
  • Practice
Open Up
How the ReqIF Standard for Requirements Exchange Disrupts the Tool Market.
  • Practice
Toward Better RE
The Main Thing is Keeping the Main Thing
the Main Thing
  • Practice
Product Owner in Scrum
State of the discussion: Requirements Engineering and Product Owner in Scrum
  • Methods
Opportunities & Approaches
Re-Use of Requirements via Libraries:
Opportunities & Approaches
  • Methods
  • Practice
A key technique
Delegation of requirement verification. A key technique for more mature requirements management.
  • Studies and Research
Requirements Reuse
Requirements Reuse with the PABRE Framework
Title Topic Author Date Reading time

Mission Possible

Practice Cross-discipline
11 minutes

A General Systems Thinking Perspective on the CPRE

Opinions Cross-discipline
17 minutes

Learning from history: The case of Software Requirements Engineering

Practice Methods
58 minutes

Functional Requirements and their levels of granularity

Methods Opinions
15 minutes

Managing the Invisible

Practice Opinions
13 minutes

IT Requirements when Buying, not Making

Methods Practice
31 minutes

Cyber Security Requirements Engineering

Practice Methods
14 minutes

The Business Analysis Center of Excellence

Skills
17 minutes

Applying IREB RE practices in an agile environment

Practice
17 minutes

Building in security instead of testing it in

Practice
14 minutes

Poor requirements?

Studies and Research
12 minutes

Product Management

Practice
16 minutes

Open Up

Practice
21 minutes

Toward Better RE

Practice
23 minutes

Product Owner in Scrum

Practice
9 minutes

Opportunities & Approaches

Methods
9 minutes

A key technique

Methods Practice
9 minutes

Requirements Reuse

Studies and Research
22 minutes