Abstract. This paper presents common weaknesses of requirements documents from commercial software projects that frequently cause problems in practice. Many documents contain exten...
The Common Criteria (CC) for Information Technology Security Evaluation provides comprehensive guidelines for the evaluation and certification of IT security regarding data securit...
Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Edga...
The concept of relevance has been heatedly debated in last decade. Not satisfied with the narrow and technical definition of system relevance, researchers turn to the subjective a...
Nowadays common practice indicates that the Requirement Engineering (RE) process critically influences the success of the system development life cycle. Several commercial tools ...
For users to trust and interpret the data in scientific digital libraries, they must be able to assess the integrity of those data. Criteria for data integrity vary by context, by ...
Jillian C. Wallis, Christine L. Borgman, Matthew S...