Abstract
It is not easy to choose a method for eliciting, detailing and documenting non-functional requirements (NFR) among the variety of existing methods. In order to explore typical characteristics of such methods, we compare two approaches which specify NFR: MOQARE and the IESE-NFR-method. Both aim at deriving detailed requirements from quality attributes, but use different concepts and processes. Our analysis led to ideas for incremental improvement of each method and also to deeper insight into NFR methods.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
McDermott, J., Fox, C.: Using Abuse Case Models for Security Requirements Analysis. In: 15th Annual Computer Security Applications Conference, pp. 55–56 (1999)
Sindre, G., Opdahl, A.L.: Eliciting Security Requirements by Misuse Cases. TOOLS Pacific 2000, pp. 120–131 (2000)
Sindre, G., Opdahl, A.L.: Templates for Misuse Case Description. In: REFSQ - International Workshop on Requirements Engineering – Foundation for Software Quality, pp. 125–136 (2001)
Chung, L., Nixon, B.A., Yu, E., Mylopoulos, J.: Non-Functional Requirements in Software Engineering. Kluwer Academic Publishers, Boston, MA (2000)
van Lamsweerde, A.: Goal-Oriented Requirements Engineering: A Guided Tour. In: Proceedings 5th International Symposium on Requirements Engineering, pp. 249–263 (2001)
Herrmann, A., Paech, B.: Quality Misuse. In: REFSQ - International Workshop on Requirements Engineering – Foundation for Software Quality (2005)
Kerkow, D., Doerr, J., Paech, B., Olsson, T., Koenig, T.: Elicitation and Documentation of Non-functional Requirements for Sociotechnical Systems. In: Maté,, Silva (eds.) Requirements Engineering for Sociotechnical Systems, Idea Group, Inc, USA (2004)
Doerr, J., Kerkow, D., Koenig, T., Olsson, T., Suzuki, T.: Non-Functional Requirements in Industry - Three Case Studies Adopting an Experience-based NFR Method. In: Proceedings 13th IEEE International Conference on Requirements Engineering, pp. 373–384 (2005)
Diallo, M.H., Romero-Mariona, J., Sim, S.E., Richardson, D.J.: A Comparative Evaluation of Three Approaches to Specifying Security Requirements. In: REFSQ - International Workshop on Requirements Engineering – Foundation for Software Quality (2006)
Al-Subaie, H.S.F., Maibaum, T.S.E.: Evaluating the Effectiveness of a Goal-Oriented Requirements Engineering Method. Fourth International Workshop on Comparative Evaluation in Requirements Engineering (CERE), in conjunction with the International Conference on Requirements Engineering (2006)
Paech, B., Kerkow, D.: Non-functional requirements engineering – quality is essential. In: REFSQ - International Workshop on Requirements Engineering – Foundation for Software Quality, pp. 237–250 (2004)
Bohm, D.: Der Dialog. Das offene Gespräch am Ende der Diskussionen. Stuttgart, Klett-Cotta (1998)
Bohm, D., Factor, D., Garrett, P.: Dialogue - A proposal (1991), [December 29th 2006], http://www.david-bohm.net/dialogue/dialogue_proposal.html
Doerr, J., Kerkow, D., von Knethen, A., Paech, B.: Eliciting Efficiency Requirements with Use Cases. In: REFSQ - International Workshop on Requirements Engineering – Foundation for Software Quality, pp. 23–32 (2003)
ISO 9126: International Standard ISO/IEC 9126. Information technology – Software product evaluation – Quality characteristics and guidelines for their use.
Herrmann, A., Paech, B., Plaza, D.: ICRAD: An Integrated Process for Requirements Conflict Solution and Architectural Design. IJSEKE (International Journal of Software Engineering and Knowledge Engineering) 16(6) 2006 (to appear)
Cysneiros, L.M., Yu, E., Leite, J.C.S.P.: Cataloguing Non-Functional Requirements as Softgoal Networks. In: Proceedings of Requirements Engineering for Adaptable Architectures, 11th International Requirements Engineering Conference, pp. 13–20 (2003)
Sindre, G., Firesmith, D.G., Opdahl, A.L.: A Reuse Based Approach to Determining Security Requirements. In: REFSQ - International Workshop on Requirements Engineering – Foundation for Software Quality (2003)
Firesmith, D.G.: Specifying Reusable Security Requirements. Journal of Object Technology 3(1), 61–75 (2004)
Ruhe, G., Bomarius, F.: Learning Software Organizations. Springer, Heidelberg (2000)
Houdek, F.: Software quality improvement by using an experience factory. In: Dumke, R., Lehner, F., Abran, A. (eds.) Software Metrics – Research and Practice in Software Measurement, Deutscher Universitätsverlag, pp. 167–182. Springer, Heidelberg (1997)
Schank, R.C., Abelson, R.P.: Knowledge and Memory: The Real Story. Wyer, Jr. R.S. (ed.) Knowledge and Memory: The Real Story. Hillsdale, NJ. Lawrence Erlbaum Associates, pp. 1–85 (1995)
Cysneiros, L.N., Leite, J.C.S.P: Driving Non-Functional Requirements to Use Cases and Scenarios. XV Brazilian Symposium on Software Engineering (2001)
Boehm, B., Rombach, H.D., Zelkowitz, M.V. (eds.): Foundations of Empirical Software Engineering: The Legacy of Victor R. Basili. Springer, Heidelberg (2005)
Biffl, S., Aurum, A., Boehm, B., Erdogmus, H., Grünbacher, P. (eds.): Value-Based Software Engineering. Springer, Heidelberg (2005)
Cockton, G.: From quality in use to value in the world, CHI ’04 extended abstracts on Human factors in computing systems. Vienna, Austria (2004)
Cockton, G.: Value-centred HCI. In: NordiCHI ’04. Proceedings of the Third Nordic Conference on Human-Computer interaction, Tampere, Finland, October 23–27, 2004, vol. 82, pp. 149–160. ACM Press, New York (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Herrmann, A., Kerkow, D., Doerr, J. (2007). Exploring the Characteristics of NFR Methods – A Dialogue About Two Approaches. In: Sawyer, P., Paech, B., Heymans, P. (eds) Requirements Engineering: Foundation for Software Quality. REFSQ 2007. Lecture Notes in Computer Science, vol 4542. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73031-6_24
Download citation
DOI: https://doi.org/10.1007/978-3-540-73031-6_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73030-9
Online ISBN: 978-3-540-73031-6
eBook Packages: Computer ScienceComputer Science (R0)