Thursday, November 23, 2017
30

This is a great presentation by Donald Firesmith covering the topic of Reusable Security Requirements.
 

[Read the rest of this article...]

30

There are many requirements elicitation methods, but we seldom see elicitation performed specifically for security requirements. One reason for this is that few elicitation methods are specifically directed at security requirements. Another factor is that organizations seldom address security requirements elicitation specifically and instead lump them in with other traditional requirements elicitation methods.

This article describes an approach for doing trade-off analysis among requirements elicitation methods. Several case studies were conducted in security requirements elicitation; the detailed results of one case study and brief results of two other case studies are presented here.

[Read the rest of this article...]

26

Gathering and managing requirements are fundamental challenges in project management. Most successful projects have high quality project requirements. Projects can fail due to poor requirements at any time during the project lifecycle without effective requirements management. The Project Manager needs to assess and understand the uniqueness of the requirements gathering process for his/her individual project.

[Read the rest of this article...]

22

The path to requirements elicitation is something that analysts are rarely taught. Everyone knows that it involves interviews and research, but within most organizations, exactly how the interviews and research should be conducted is nebulous.

[Read the rest of this article...]

18

There are a lot of problems associated with IT, such as computer performance, capacity planning, security, networking, disaster recovery, but probably the biggest problem is requirements definition. In other words, accurately defining the information needs of the end-user.

[Read the rest of this article...]

17

Topics of interest include experience papers, formal methods, emerging technologies, best practices, research proposals, evaluations and comparisons that focus on visualization techniques for requirements engineering activities.

[Read the rest of this article...]

17
12th Australian Workshop on Requirements Engineering Requirements Analysis for People, Businesses and Communities http://australia.theiiba.org/index...

[Read the rest of this article...]

16

The cancellation of the presidential helicopter brought everyone out of the wood work. The article's key point was "failure to manage requirements on the part of the government is a key cause of the cancellation." What started out as a $6.8B program grew to a $13B program. The president was quoted as saying "The helicopter I have now seems perfectly adequate."

[Read the rest of this article...]

14

Requirements gathering techniques include the easy to send, but sometimes hard to develop, survey method to obtain data from a wide variety of people located anywhere. Surveys, however, are notorious for many faults such as ambiguity and a lack of response.

But surveys can produce a large volume of information for the gathering parties to peruse and collate, so developing good surveys is important for both the respondents who have to understand the questions and for the collators to get useful data.

[Read the rest of this article...]

14

Modeling an enterprise is not a simple task, you have to consider different stakeholders with different requirements, but also with different preferences on how they would like to access the enterprise knowledge. This presentation outlines different solutions all based on a central repository, where your enterprise can get the most benefit out of the enterprise model.

[Read the rest of this article...]

Page 5 of 6First   Previous   1  2  3  4  [5]  6  Next   Last   
Copyright 2009-2014 by Modern Analyst Media LLC