- Cross-discipline
- Practice
By search term
By topic
By tag
- Testing (9)
- Agile (29)
- Approaches (42)
- Attributes (4)
- Business Analysis (21)
- Elicitation (27)
- Estimation (5)
- Prioritization (7)
- Team (17)
- User Story (11)
- Template (3)
- Framework (10)
- Goals (8)
- Reuse (2)
- Software Engineering (9)
- Traceability (9)
- Perception (10)
- Management (14)
- Verification (6)
- Study (15)
- Development (12)
- CPRE (5)
- Automation (6)
- Documentation (20)
- Software Quality (10)
- ReqIF (1)
- Standards (6)
- Analysis (19)
- Business Value (10)
- Metrics (5)
- Validation (10)
- Modeling (14)
- Security (3)
- SysML (3)
- Stakeholder (12)
- Big Data (4)
- Opinion (15)
- Literature (4)
By author
- Howard Podeswa (3)
- Rainer Grau (2)
- Erik van Veenendaal (1)
- Cristina Palomares (1)
- Carme Quer (1)
- Xavier Franch (2)
- Mats Wessberg (1)
- Kim Lauenroth (2)
- Joseph Aracic (1)
- IREB (1)
- Jens Schirpenbach (1)
- Alexander Rachmann (1)
- Jesko Schneider (1)
- Frank Engel (1)
- Dr. Ralph R. Young (2)
- Maria-Therese Teichmann (1)
- Eva Gebetsroither (1)
- Corinna Unterfurtner (1)
- Alexandra Kreuzeder (1)
- Harry Sneed (2)
Articles
Showing 13 articles tagged with Reuse, Security or Software Engineering
What does OpenAI’s ChatGPT say about RE?
- Practice
- Studies and Research
How Product Owners (POs), Business Analysts and Requirements Engineers Use Agile Requirements Engineering (RE) to optimize the work of the team and maximize the value delivered to stakeholders.
- Practice
- Cross-discipline
Concept for the successful handling of integral NFRs in Scaled Agile Environments.
- Opinions
Views of a real RE pioneer
- Practice
- Methods
‘A large elephant is in the room but we are not able or brave or willing enough to point at it’
- Methods
- Practice
Improving requirements quality by effort estimates
- Practice
- Methods
A short and fun elicitation workshop for Agile teams and architects
- Methods
A framework to drive requirements management
- Practice
- Methods
Hands-on guidance for developing and managing security requirements
- Practice
Eliciting security requirements needs a different process
- Practice
State of the discussion: Requirements Engineering and Product Owner in Scrum
- Methods
Re-Use of Requirements via Libraries:
Opportunities & Approaches
Opportunities & Approaches
- Studies and Research
Requirements Reuse with the PABRE Framework