Abstract is missing.
- A review of practice and problems in requirements engineering in small and medium software enterprises in ThailandSupha Khankaew, Stephen Riddle. 1-8 [doi]
- Systematic reviews in requirements engineering: A tertiary studyMuneera Bano, Didar Zowghi, Naveed Ikram. 9-16 [doi]
- How smartphone users assess the value/risk trade-off of apps: An observational studyMariano Ceccato, Alessandro Marchetto, Anna Perini, Angelo Susi. 17-24 [doi]
- Security triage: A report of a lean security requirements methodology for cost-effective security analysisMatteo Giacalone, Rocco Mammoliti, Fabio Massacci, Federica Paci, Rodolfo Perugino, Claudio Selli. 25-27 [doi]
- An experiment on comparing textual vs. visual industrial methods for security risk assessmentKatsiaryna Labunets, Federica Paci, Fabio Massacci, Raminder S. Ruprai. 28-35 [doi]
- Security requirement elicitation techniques: The comparison of misuse cases and issue based information systemsNaveed Ikram, Surayya Siddiqui, Naurin Farooq Khan. 36-43 [doi]
- An experiment design for validating a test case generation strategy from requirements modelsMaria Fernanda Granda. 44-47 [doi]
- A framework for understanding collaborative creativity in requirements engineering: Empirical validationMartin Mahaux, LeMai Nguyen, Luisa Mich, Alistair Mavin. 48-55 [doi]
- Eliciting contextual requirements at design time: A case studyAlessia Knauss, Daniela Damian, Kurt Schneider. 56-63 [doi]
- What stakeholders need to know about requirementsWalid Maalej, Zijad Kurtanovic, Alexander Felfernig. 64-71 [doi]
- A framework to resolve requirements engineering issues in software development outsourcingJaved Iqbal, Rodina Ahmed, Sabrina Marczak. 72-75 [doi]
- Users' voice and service selection: An empirical studyMuneera Bano, Didar Zowghi. 76-79 [doi]