{"title":"Capturing, Organizing, and Reusing Knowledge of NFRs: An NFR Pattern Approach","authors":"Sam Supakkul, Tom Hill, E. Oladimeji, L. Chung","doi":"10.1109/MARK.2009.2","DOIUrl":null,"url":null,"abstract":"Properly dealing with nonfunctional requirements (NFRs) such as security, cost, and usability, requires a large body of knowledge. However, it is difficult for average requirements engineers to possess necessary knowledge and use it correctly. This paper presents an NFR pattern framework for capturing NFR knowledge using goal, problem, causal attribution, solution/means, and requirements patterns that can be reused to help produce earlyphase and latephase NFR related requirements. The NFR patterns may be organized using generalization, aggregation, and classification relationships. Reusing the patterns is defined in terms of search and apply operations. The approach is illustrated using a running example based on the TJX incident, the largest credit card theft in history, to demonstrate how knowledge of the incident and mitigation techniques from security standards could be captured and used to help understand and prevent such incident.","PeriodicalId":143105,"journal":{"name":"2009 Second International Workshop on Managing Requirements Knowledge","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Second International Workshop on Managing Requirements Knowledge","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MARK.2009.2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
Properly dealing with nonfunctional requirements (NFRs) such as security, cost, and usability, requires a large body of knowledge. However, it is difficult for average requirements engineers to possess necessary knowledge and use it correctly. This paper presents an NFR pattern framework for capturing NFR knowledge using goal, problem, causal attribution, solution/means, and requirements patterns that can be reused to help produce earlyphase and latephase NFR related requirements. The NFR patterns may be organized using generalization, aggregation, and classification relationships. Reusing the patterns is defined in terms of search and apply operations. The approach is illustrated using a running example based on the TJX incident, the largest credit card theft in history, to demonstrate how knowledge of the incident and mitigation techniques from security standards could be captured and used to help understand and prevent such incident.