Powered by
2014 IEEE 22nd International Requirements Engineering Conference (RE),
August 25-29, 2014,
Karlskrona, Sweden
Keynotes
Startups and Requirements (Keynote)
Anthony I. Wasserman
(Carnegie Mellon University, USA)
Tech startups typically approach requirements gathering differently from the process that is used to develop requirements in existing businesses and for existing products. Many of these startups operate in "stealth mode", taking care to minimize the number of people with whom they share their innovative ideas. It's common for these startups to create a succession of early releases, and apply user feedback from those releases to evolve the features and functions of their products.
This talk describes various approaches used by tech startups to define product requirements, and contrasts those approaches with those used in more traditional requirements engineering activities.
@InProceedings{RE14p1,
author = {Anthony I. Wasserman},
title = {Startups and Requirements (Keynote)},
booktitle = {Proc.\ RE},
publisher = {IEEE},
pages = {1--1},
doi = {},
year = {2014},
}
Now More Than Ever: Privacy and Security Are Required (Keynote)
Annie I. Antón
(Georgia Tech, USA)
Properly protecting information is in all our best interests,
but it is a complex undertaking. The fact that regulation is often
written by non-technologists, introduces additional challenges and
obstacles. Moreover, those who design systems that collect, store, and
maintain sensitive information have an obligation to design systems
holistically within this broader context of regulatory and legal
compliance. There are questions that should be asked when developing new
requirements for information systems. For example, how do we build
systems to handle data that must be kept secure and private when relevant
regulations tie your hands? When building a system that maintains health
or financial records for a large number of people, what do we need to do
to protect the information against theft and abuse, keep the information
private, AND at the same time, satisfy all governing privacy/security
laws and
restrictions? Moreover, how do we know that we've satisfied those laws?
How
do we monitor for compliance while ensuring that we're monitoring the
right
things? And, how do you accomplish all this in a way that can be expressed
clearly to end-users and legislators (or auditors) so they can be
confident
you are doing the right things? We've been working on technologies to make
these tasks simpler, and in some senses, automatic. In this talk, I will
describe some of the research that we have been conducting to address
these
problems.
@InProceedings{RE14p2,
author = {Annie I. Antón},
title = {Now More Than Ever: Privacy and Security Are Required (Keynote)},
booktitle = {Proc.\ RE},
publisher = {IEEE},
pages = {2--2},
doi = {},
year = {2014},
}
proc time: 0.27