Abdul Babar

Learn More
The scope of requirements engineering must include high-level business objectives and strategies to achieve traceability between IT and business needs in order to ensure alignment. However, we must also deal with the evolution of business strategy. Enterprise IT evolution is a complex task. This paper presents the first steps in a research project that(More)
Context identification is an important feature of goal modelling techniques. It helps to understand wider organisational systems during requirements engineering. The goal of this paper is to identify domain context for the process driven requirements modelling technique MAP. We present our preliminary research on adding domain context to MAP by using(More)
Integration of requirements engineering techniques has been common and proven beneficial. Map is a strategy-driven modelling technique that elicits requirements in terms of intentions and strategies. B-SCP is an approach to address alignment between requirements and business strategy. To address the problem of strategic requirements evolution in B-SCP, we(More)
Requirements engineering describes how an IT implementation will support business functions. Most IT systems are operational in nature and typical requirements engineering techniques and methods are usually adequate in capturing and documenting the requirements for such systems. Jackson's problem frames is a technique that is suitable for straightforward IT(More)
We present a software development approach that aligns a requirements elicitation technique with a formal method of software specification abstraction. The goal/strategy modeling technique Map augmented with Jackson's context diagrams (representing environment) is used to elicit requirements and the B-method is used to translate Map requirements into formal(More)
Outsourcing of information and communication technologies (ICT) and related services is an established and growing industry. Recent trends, such as the move toward multi-sourcing have increased the complexity and risk of these outsourcing arrangements. There is a critical research need to identify the risks faced by both the organisations that outsource ICT(More)