THE USEFULNESS OF RE PRACTICES IN S/W DEVELOPMENT

Requirement Engineering (RE) research has reported that incomplete requirement specification, uncontrolled changing requirement, unsecure and outdated requirement elicitation, and lack of user involvements are major reasons of software failure. The presented research paper introduces various requirement engineering issues, which can be helpful to develop effective, secure, updated, and quality requirement engineering process for software development. A systematic review on requirement engineering practices along with our published research work including RE process model, Information Requirement Engineering (IRE), Security Requirement Engineering (SRE), and requirement modeling is highlighted, as well as measurement analysis of proposed RE process model is also described in this research article.

[1]  J. Flavell Metacognition and Cognitive Monitoring: A New Area of Cognitive-Developmental Inquiry. , 1979 .

[2]  Jawed I. A. Siddiqi,et al.  Requirements Engineering: The Emerging Wisdom , 1996, IEEE Softw..

[3]  John H. Baumert,et al.  Software Measures and the Capability Maturity Model , 1992 .

[4]  Michael Diaz,et al.  How Software Process Improvement Helped Motorola , 1997, IEEE Softw..

[5]  Bill Curtis,et al.  A field study of the software design process for large systems , 1988, CACM.

[6]  Karl E. Wiegers,et al.  Software Requirements , 1999 .

[7]  Pankaj Jalote,et al.  An Integrated Approach to Software Engineering , 1997, Undergraduate Texts in Computer Science.

[8]  David Lorge Parnas,et al.  Software Engineering Programs Are Not Computer Science Programs , 1999, IEEE Softw..

[9]  Dhirendra Pandey,et al.  An Effective Requirement Engineering Process Model for Software Development and Requirements Management , 2010, 2010 International Conference on Advances in Recent Technologies in Communication and Computing.

[10]  Donald J. Reifer,et al.  Requirements Management: The Search for Nirvana , 2000 .

[11]  Bill Curtis Software Process Improvement: Methods and Lessons Learned , 1997, Proceedings of the (19th) International Conference on Software Engineering.

[12]  Andreas L. Opdahl,et al.  Templates for Misuse Case Description , 2001 .

[13]  Ugrasen Suman,et al.  Security Requirement Engineering Issues in Risk Management , 2011 .

[14]  Dhirendra Pandey,et al.  An Approach to Information Requirement Engineering , 2011, 2011 International Conference on Information Science and Applications.