Investigation of Adherence Degree of Agile Requirements Engineering Practices in Non-Agile Software Development Organizations
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 1
Abstract
Requirements are critical for the success of software projects. Requirements are practically difficult to produce, as the hardest stage of building a software system is to decide what the system should do. Moreover, requirements errors are expensive to fix in the later phases of the software development life cycle. The rapidly changing business environment is highly challenging traditional Requirements Engineering (RE) practices. Most of the software development organizations are working in such dynamic environment, as a result, either by or without their awareness agile methodologies are adopted in various phases of their software development cycles. The aim of this paper is to investigate the adherence degree of agile RE practices in various software development organizations that are classifying themselves as adopting traditional (i.e. non-agile) software development methodologies. An approach is proposed for achieving this aim and it is applied on five different projects from four different organizations. The result shows that even the non-agile software development organizations are applying agile RE practices by different adherence degrees.
Authors and Affiliations
Mennatallah Ibrahim, Nagy Darwish
Identifying Dynamic Topics of Interest across Social Networks
Information propagation plays a significant role in online social networks, mining the latent information produced became crucial to understand how information is disseminated. It can be used for market prediction, rumor...
Predictive Method for Service Composition in Heterogeneous Environments within Client Requirements
Cloud computing is a new delivery model for Information Technology services. Many actors and parameters play an important role in provisioning of dynamically elastic and virtualized resources at the levels of infrastruct...
A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model
Internet of Things (IoT) has not yet reached a distinctive definition. A generic understanding of IoT is that it offers numerous services in many domains, utilizing conventional internet infrastructure by enabling differ...
Comparative Analysis of Raw Images and Meta Feature based Urdu OCR using CNN and LSTM
Urdu language uses cursive script which results in connected characters constituting ligatures. For identifying characters within ligatures of different scales (font sizes), Convolution Neural Network (CNN) and Long Shor...
Towards Analytical Modeling for Persuasive Design Choices in Mobile Apps
Persuasive technology has emerged as a new field of research in the past decade with its applications in various domains including web-designing, human-computer interaction, healthcare systems, and social networks. Altho...