Abstract
The authors review how to define a set of "negative requirements," or hazards, starting with elicitation and discovery of shall-not requirements through system integration and testing using a process called hazard mining.
| Original language | English (US) |
|---|---|
| Article number | 5196658 |
| Pages (from-to) | 46-52 |
| Number of pages | 7 |
| Journal | IT Professional |
| Volume | 12 |
| Issue number | 3 |
| DOIs | |
| State | Published - May 2010 |
All Science Journal Classification (ASJC) codes
- Software
- Hardware and Architecture
- Computer Science Applications