Skip to main content

Exploring the Characteristics of NFR Methods – A Dialogue About Two Approaches

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4542))

Abstract

It is not easy to choose a method for eliciting, detailing and documenting non-functional requirements (NFR) among the variety of existing methods. In order to explore typical characteristics of such methods, we compare two approaches which specify NFR: MOQARE and the IESE-NFR-method. Both aim at deriving detailed requirements from quality attributes, but use different concepts and processes. Our analysis led to ideas for incremental improvement of each method and also to deeper insight into NFR methods.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. McDermott, J., Fox, C.: Using Abuse Case Models for Security Requirements Analysis. In: 15th Annual Computer Security Applications Conference, pp. 55–56 (1999)

    Google Scholar 

  2. Sindre, G., Opdahl, A.L.: Eliciting Security Requirements by Misuse Cases. TOOLS Pacific 2000, pp. 120–131 (2000)

    Google Scholar 

  3. Sindre, G., Opdahl, A.L.: Templates for Misuse Case Description. In: REFSQ - International Workshop on Requirements Engineering – Foundation for Software Quality, pp. 125–136 (2001)

    Google Scholar 

  4. Chung, L., Nixon, B.A., Yu, E., Mylopoulos, J.: Non-Functional Requirements in Software Engineering. Kluwer Academic Publishers, Boston, MA (2000)

    MATH  Google Scholar 

  5. van Lamsweerde, A.: Goal-Oriented Requirements Engineering: A Guided Tour. In: Proceedings 5th International Symposium on Requirements Engineering, pp. 249–263 (2001)

    Google Scholar 

  6. Herrmann, A., Paech, B.: Quality Misuse. In: REFSQ - International Workshop on Requirements Engineering – Foundation for Software Quality (2005)

    Google Scholar 

  7. Kerkow, D., Doerr, J., Paech, B., Olsson, T., Koenig, T.: Elicitation and Documentation of Non-functional Requirements for Sociotechnical Systems. In: Maté,, Silva (eds.) Requirements Engineering for Sociotechnical Systems, Idea Group, Inc, USA (2004)

    Google Scholar 

  8. Doerr, J., Kerkow, D., Koenig, T., Olsson, T., Suzuki, T.: Non-Functional Requirements in Industry - Three Case Studies Adopting an Experience-based NFR Method. In: Proceedings 13th IEEE International Conference on Requirements Engineering, pp. 373–384 (2005)

    Google Scholar 

  9. Diallo, M.H., Romero-Mariona, J., Sim, S.E., Richardson, D.J.: A Comparative Evaluation of Three Approaches to Specifying Security Requirements. In: REFSQ - International Workshop on Requirements Engineering – Foundation for Software Quality (2006)

    Google Scholar 

  10. Al-Subaie, H.S.F., Maibaum, T.S.E.: Evaluating the Effectiveness of a Goal-Oriented Requirements Engineering Method. Fourth International Workshop on Comparative Evaluation in Requirements Engineering (CERE), in conjunction with the International Conference on Requirements Engineering (2006)

    Google Scholar 

  11. Paech, B., Kerkow, D.: Non-functional requirements engineering – quality is essential. In: REFSQ - International Workshop on Requirements Engineering – Foundation for Software Quality, pp. 237–250 (2004)

    Google Scholar 

  12. Bohm, D.: Der Dialog. Das offene Gespräch am Ende der Diskussionen. Stuttgart, Klett-Cotta (1998)

    Google Scholar 

  13. Bohm, D., Factor, D., Garrett, P.: Dialogue - A proposal (1991), [December 29th 2006], http://www.david-bohm.net/dialogue/dialogue_proposal.html

  14. Doerr, J., Kerkow, D., von Knethen, A., Paech, B.: Eliciting Efficiency Requirements with Use Cases. In: REFSQ - International Workshop on Requirements Engineering – Foundation for Software Quality, pp. 23–32 (2003)

    Google Scholar 

  15. ISO 9126: International Standard ISO/IEC 9126. Information technology – Software product evaluation – Quality characteristics and guidelines for their use.

    Google Scholar 

  16. Herrmann, A., Paech, B., Plaza, D.: ICRAD: An Integrated Process for Requirements Conflict Solution and Architectural Design. IJSEKE (International Journal of Software Engineering and Knowledge Engineering) 16(6) 2006 (to appear)

    Google Scholar 

  17. Cysneiros, L.M., Yu, E., Leite, J.C.S.P.: Cataloguing Non-Functional Requirements as Softgoal Networks. In: Proceedings of Requirements Engineering for Adaptable Architectures, 11th International Requirements Engineering Conference, pp. 13–20 (2003)

    Google Scholar 

  18. Sindre, G., Firesmith, D.G., Opdahl, A.L.: A Reuse Based Approach to Determining Security Requirements. In: REFSQ - International Workshop on Requirements Engineering – Foundation for Software Quality (2003)

    Google Scholar 

  19. Firesmith, D.G.: Specifying Reusable Security Requirements. Journal of Object Technology 3(1), 61–75 (2004)

    Google Scholar 

  20. Ruhe, G., Bomarius, F.: Learning Software Organizations. Springer, Heidelberg (2000)

    Google Scholar 

  21. Houdek, F.: Software quality improvement by using an experience factory. In: Dumke, R., Lehner, F., Abran, A. (eds.) Software Metrics – Research and Practice in Software Measurement, Deutscher Universitätsverlag, pp. 167–182. Springer, Heidelberg (1997)

    Google Scholar 

  22. Schank, R.C., Abelson, R.P.: Knowledge and Memory: The Real Story. Wyer, Jr. R.S. (ed.) Knowledge and Memory: The Real Story. Hillsdale, NJ. Lawrence Erlbaum Associates, pp. 1–85 (1995)

    Google Scholar 

  23. Cysneiros, L.N., Leite, J.C.S.P: Driving Non-Functional Requirements to Use Cases and Scenarios. XV Brazilian Symposium on Software Engineering (2001)

    Google Scholar 

  24. Boehm, B., Rombach, H.D., Zelkowitz, M.V. (eds.): Foundations of Empirical Software Engineering: The Legacy of Victor R. Basili. Springer, Heidelberg (2005)

    Google Scholar 

  25. Biffl, S., Aurum, A., Boehm, B., Erdogmus, H., Grünbacher, P. (eds.): Value-Based Software Engineering. Springer, Heidelberg (2005)

    Google Scholar 

  26. Cockton, G.: From quality in use to value in the world, CHI ’04 extended abstracts on Human factors in computing systems. Vienna, Austria (2004)

    Google Scholar 

  27. Cockton, G.: Value-centred HCI. In: NordiCHI ’04. Proceedings of the Third Nordic Conference on Human-Computer interaction, Tampere, Finland, October 23–27, 2004, vol. 82, pp. 149–160. ACM Press, New York (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Pete Sawyer Barbara Paech Patrick Heymans

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Herrmann, A., Kerkow, D., Doerr, J. (2007). Exploring the Characteristics of NFR Methods – A Dialogue About Two Approaches. In: Sawyer, P., Paech, B., Heymans, P. (eds) Requirements Engineering: Foundation for Software Quality. REFSQ 2007. Lecture Notes in Computer Science, vol 4542. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73031-6_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73031-6_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73030-9

  • Online ISBN: 978-3-540-73031-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics