[HTML][HTML] A holistic framework to improve the uptake and impact of eHealth technologies
JEWC van Gemert-Pijnen, N Nijland… - Journal of medical …, 2011 - jmir.org
Background: Many eHealth technologies are not successful in realizing sustainable
innovations in health care practices. One of the reasons for this is that the current …
innovations in health care practices. One of the reasons for this is that the current …
A systematic review on the relationship between user involvement and system success
Context For more than four decades it has been intuitively accepted that user involvement
(UI) during system development lifecycle leads to system success. However when the …
(UI) during system development lifecycle leads to system success. However when the …
Requirements engineering: a roadmap
Requirements Engineering: A Roadmap Page 1 Requirements Engineering: A Roadmap
Bashar Nuseibeh & Steve Easterbrook Key Research Pointers Better modelling and analysis of …
Bashar Nuseibeh & Steve Easterbrook Key Research Pointers Better modelling and analysis of …
Research directions in requirements engineering
In this paper, we review current requirements engineering (RE) research and identify future
research directions suggested by emerging software needs. First, we overview the state of …
research directions suggested by emerging software needs. First, we overview the state of …
[BUCH][B] The requirements engineering handbook
RR Young - 2004 - books.google.com
Gathering customer requirements is a key activity for develo** software that meets the
customer's needs. A concise and practical overview of everything a requirement's analyst …
customer's needs. A concise and practical overview of everything a requirement's analyst …
StakeRare: using social networks and collaborative filtering for large-scale requirements elicitation
Requirements elicitation is the software engineering activity in which stakeholder needs are
understood. It involves identifying and prioritizing requirements—a process difficult to scale …
understood. It involves identifying and prioritizing requirements—a process difficult to scale …
[HTML][HTML] STORE: Security threat oriented requirements engineering methodology
As we are continuously depending on information technology applications by adopting
electronic channels and software applications for our business, online transaction and …
electronic channels and software applications for our business, online transaction and …
Develo** successful environmental decision support systems: Challenges and best practices
Environmental decision support systems (EDSSs), or DSS applied in the environmental
field, have been developed for over 40 years now. However, most of these tools fail to find …
field, have been developed for over 40 years now. However, most of these tools fail to find …
[HTML][HTML] Why business modeling is crucial in the development of eHealth technologies
The impact and uptake of information and communication technologies that support health
care are rather low. Current frameworks for eHealth development suffer from a lack of fitting …
care are rather low. Current frameworks for eHealth development suffer from a lack of fitting …
P-STORE: Extension of STORE methodology to elicit privacy requirements
Implementing security and privacy requirements at every level of the software development
cycle is imperative for ensuring optimum usability as well as the users' satisfaction. Software …
cycle is imperative for ensuring optimum usability as well as the users' satisfaction. Software …