Risk Identification at the Interface between Business Case and Requirements
暂无分享,去创建一个
[1] Jaap Gordijn,et al. Understanding Business Strategies of Networked Value Constellations Using Goal- and Value Modeling , 2006, 14th IEEE International Requirements Engineering Conference (RE'06).
[2] Neil A. M. Maiden,et al. What are the day-to-day factors that are preventing business analysts from effective business analysis? , 2011, 2011 IEEE 19th International Requirements Engineering Conference.
[3] John Mylopoulos,et al. Business Process-Based Regulation Compliance: The Case of the Sarbanes-Oxley Act , 2007, 15th IEEE International Requirements Engineering Conference (RE 2007).
[4] B SeamanCarolyn. Qualitative Methods in Empirical Studies of Software Engineering , 1999 .
[5] Austen Rainer,et al. Case Study Research in Software Engineering - Guidelines and Examples , 2012 .
[6] George Robson. Europump extends quarterly order intake surveys , 2002 .
[7] James D. Palmer,et al. Software risk management: requirements-based risk metrics , 1994, Proceedings of IEEE International Conference on Systems, Man and Cybernetics.
[8] John A. Adam,et al. Guesstimation: Solving the World's Problems on the Back of a Cocktail Napkin , 2008 .
[9] Barry W. Boehm,et al. Value-based software engineering: reinventing , 2003, SOEN.
[10] Janice Singer,et al. Studying Software Engineers: Data Collection Techniques for Software Field Studies , 2005, Empirical Software Engineering.
[11] Daniela E. Damian,et al. Selecting Empirical Methods for Software Engineering Research , 2008, Guide to Advanced Empirical Software Engineering.
[12] Irina Rychkova,et al. Early Requirements and Business-IT Alignment with SEAM for Business , 2007, 15th IEEE International Requirements Engineering Conference (RE 2007).
[13] Jon Atle Gulla,et al. On the challenges of business modeling in large-scale reengineering projects , 2000, Proceedings Fourth International Conference on Requirements Engineering. ICRE 2000. (Cat. No.98TB100219).
[14] Christof Ebert,et al. Improving the Exchange of Requirements and Specifications between Business Partners , 2009, 2009 17th IEEE International Requirements Engineering Conference.
[15] Carolyn B. Seaman,et al. Qualitative Methods in Empirical Studies of Software Engineering , 1999, IEEE Trans. Software Eng..
[16] Janis A. Bubenko,et al. Challenges in requirements engineering , 1995, Proceedings of 1995 IEEE International Symposium on Requirements Engineering (RE'95).
[17] J. Knottnerus,et al. Real world research. , 2010, Journal of clinical epidemiology.
[18] Walker Royce. Software Project Management , 1998 .
[19] Marjo Kauppinen,et al. Linking the business view to requirements engineering: long-term product planning by roadmapping , 2005, 13th IEEE International Conference on Requirements Engineering (RE'05).
[20] Kalle Lyytinen,et al. A Framework for software risk management , 1996, Scand. J. Inf. Syst..
[21] Tomoko Nagata,et al. "Business process" oriented requirements engineering process , 2005, 13th IEEE International Conference on Requirements Engineering (RE'05).
[22] Tom DeMarco. All Late Projects Are the Same , 2011, IEEE Software.
[23] W. Duncan. A GUIDE TO THE PROJECT MANAGEMENT BODY OF KNOWLEDGE , 1996 .
[24] Vladan Devedzic,et al. Software Project Management , 2001 .
[25] Claes Wohlin,et al. A Value-Based Approach in Requirements Engineering: Explaining Some of the Fundamental Concepts , 2007, REFSQ.
[26] J Ropponen,et al. Can software risk management improve system development: an exploratory study , 1997 .
[27] Anthony Finkelstein,et al. Software acquisition: a business strategy analysis , 2001, Proceedings Fifth IEEE International Symposium on Requirements Engineering.
[28] P. I. Zorkoczy. Oxford surveys in information technology; vol. 2, 1985 , 1985 .