- Skills
- Cross-discipline
By search term
By topic
By tag
- Testing (9)
- Agile (29)
- Approaches (42)
- Attributes (4)
- Business Analysis (21)
- Elicitation (27)
- Estimation (5)
- Prioritization (7)
- Team (17)
- User Story (11)
- Template (3)
- Framework (10)
- Goals (8)
- Reuse (2)
- Software Engineering (9)
- Traceability (9)
- Perception (10)
- Management (14)
- Verification (6)
- Study (15)
- Development (12)
- CPRE (5)
- Automation (6)
- Documentation (20)
- Software Quality (10)
- ReqIF (1)
- Standards (6)
- Analysis (19)
- Business Value (10)
- Metrics (5)
- Validation (10)
- Modeling (14)
- Security (3)
- SysML (3)
- Stakeholder (12)
- Big Data (4)
- Opinion (15)
- Literature (4)
By author
- Howard Podeswa (3)
- Rainer Grau (2)
- Erik van Veenendaal (1)
- Cristina Palomares (1)
- Carme Quer (1)
- Xavier Franch (2)
- Mats Wessberg (1)
- Kim Lauenroth (2)
- Joseph Aracic (1)
- IREB (1)
- Jens Schirpenbach (1)
- Alexander Rachmann (1)
- Jesko Schneider (1)
- Frank Engel (1)
- Dr. Ralph R. Young (2)
- Maria-Therese Teichmann (1)
- Eva Gebetsroither (1)
- Corinna Unterfurtner (1)
- Alexandra Kreuzeder (1)
- Harry Sneed (2)
Articles
Showing 31 articles tagged with Perception, Security, Traceability or User Story [max. 4 tags]
What makes an excellent BA and are women more suited to the role?
- Practice
- Methods
Why Testers should have a closer look into Requirements Engineering
- Practice
- Opinions
Requirements Engineering at Dutch Railways
- Cross-discipline
- Methods
How you can use the natural partitioning of business events to flexibly synchronise your agile development.
- Methods
An application of the IREB Handbook of Requirements Modeling
- Methods
Re-Use of Requirements via Libraries:
Opportunities & Approaches
Opportunities & Approaches
- Practice
- Cross-discipline
Agreed, unambiguous and based on inventions
- Methods
- Skills
How to create awareness for some of the difficulties requirements engineers face
- Studies and Research
- Practice
Preliminary Results from an Ongoing Study
- Practice
- Opinions
When every new iteration can violate previously satisfied requirements
- Practice
- Cross-discipline
Concept for the successful handling of integral NFRs in Scaled Agile Environments.
- Methods
- Practice
Improving requirements quality by effort estimates
- Methods
How modeling can be useful to better define and trace requirements
- Practice
- Methods
Hands-on guidance for developing and managing security requirements
- Practice
Eliciting security requirements needs a different process
- Methods
An approach for iterative and requirements-based quality assurance in DevOps
- Studies and Research
A statistical analysis and trends from 2009 to 2015
- Opinions
- Cross-discipline
This system is your system. This system is my system.
- Practice
- Studies and Research
How Product Owners (POs), Business Analysts and Requirements Engineers Use Agile Requirements Engineering (RE) to optimize the work of the team and maximize the value delivered to stakeholders.
- Methods
- Opinions
How to use requirements gathering techniques to determine product requirements from non-verbal subjects
- Methods
Reverse Modeling and Up-To-Date Evolution of Functional Requirements in Alignment with Tests
- Practice
- Methods
When requirements and the product are elaborated concurrently
- Cross-discipline
- Practice
What does OpenAI’s ChatGPT say about RE?
- Methods
- Practice
Strategies for building manageable requirements hierarchies in complex problem domains
- Cross-discipline
What does it mean to say „requirement“? An inquiry into the abilities of the human mind and the meaning of the word „requirement“.
- Studies and Research
Requirements Reuse with the PABRE Framework
- Cross-discipline
- Skills
How requirements engineers can benefit from applying the NLP communication techniques
- Cross-discipline
- Skills
How requirements engineers can benefit from applying the NLP communication techniques
- Cross-discipline
Neuropsychological Insights on Creativity
- Methods
From Requirements to Code
- Methods
- Practice
An agile and collaborative prioritization technique