{"title":"NFR知识的获取、组织和重用:一种NFR模式方法","authors":"Sam Supakkul, Tom Hill, E. Oladimeji, L. Chung","doi":"10.1109/MARK.2009.2","DOIUrl":null,"url":null,"abstract":"Properly dealing with nonfunctional requirements (NFRs) such as security, cost, and usability, requires a large body of knowledge. However, it is difficult for average requirements engineers to possess necessary knowledge and use it correctly. This paper presents an NFR pattern framework for capturing NFR knowledge using goal, problem, causal attribution, solution/means, and requirements patterns that can be reused to help produce earlyphase and latephase NFR related requirements. The NFR patterns may be organized using generalization, aggregation, and classification relationships. Reusing the patterns is defined in terms of search and apply operations. The approach is illustrated using a running example based on the TJX incident, the largest credit card theft in history, to demonstrate how knowledge of the incident and mitigation techniques from security standards could be captured and used to help understand and prevent such incident.","PeriodicalId":143105,"journal":{"name":"2009 Second International Workshop on Managing Requirements Knowledge","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Capturing, Organizing, and Reusing Knowledge of NFRs: An NFR Pattern Approach\",\"authors\":\"Sam Supakkul, Tom Hill, E. Oladimeji, L. Chung\",\"doi\":\"10.1109/MARK.2009.2\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Properly dealing with nonfunctional requirements (NFRs) such as security, cost, and usability, requires a large body of knowledge. However, it is difficult for average requirements engineers to possess necessary knowledge and use it correctly. This paper presents an NFR pattern framework for capturing NFR knowledge using goal, problem, causal attribution, solution/means, and requirements patterns that can be reused to help produce earlyphase and latephase NFR related requirements. The NFR patterns may be organized using generalization, aggregation, and classification relationships. Reusing the patterns is defined in terms of search and apply operations. The approach is illustrated using a running example based on the TJX incident, the largest credit card theft in history, to demonstrate how knowledge of the incident and mitigation techniques from security standards could be captured and used to help understand and prevent such incident.\",\"PeriodicalId\":143105,\"journal\":{\"name\":\"2009 Second International Workshop on Managing Requirements Knowledge\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Second International Workshop on Managing Requirements Knowledge\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MARK.2009.2\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Second International Workshop on Managing Requirements Knowledge","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MARK.2009.2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Capturing, Organizing, and Reusing Knowledge of NFRs: An NFR Pattern Approach
Properly dealing with nonfunctional requirements (NFRs) such as security, cost, and usability, requires a large body of knowledge. However, it is difficult for average requirements engineers to possess necessary knowledge and use it correctly. This paper presents an NFR pattern framework for capturing NFR knowledge using goal, problem, causal attribution, solution/means, and requirements patterns that can be reused to help produce earlyphase and latephase NFR related requirements. The NFR patterns may be organized using generalization, aggregation, and classification relationships. Reusing the patterns is defined in terms of search and apply operations. The approach is illustrated using a running example based on the TJX incident, the largest credit card theft in history, to demonstrate how knowledge of the incident and mitigation techniques from security standards could be captured and used to help understand and prevent such incident.