Title of article :
Adding Threat during Software Requirements Elicitation and Prioritization
Author/Authors :
Mohd. Sadiq، نويسنده , , Mohd. Shahid، نويسنده , , Shabbir Ahmad، نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2010
Abstract :
Requirements may be defined as a demand or need. In software engineering, a requirement is a description of what a system should do. System may have dozen to thousands of requirements. Software requirements stipulate what must be accomplished, transformed, produced or provided. In the field of software engineering researchers, academicians and scientist have developed many models and framework to elicit and prioritize the software requirements. It is well documented that requirement engineering saves money. There are several techniques to elicit the software requirements like JAD, misuse, RAD etc. In this paper we have used the JAD approach to elicit the software requirements. In this paper we have proposed a framework to elicit the software requirements and also to prioritize the software requirements. The proposed framework will rank the requirements by the relative level of threat associated with each requirement.
Keywords :
Analytic Hierarchy Process , and Quality Function Deployment , Software requirements , Elicitation techniques
Journal title :
International Journal of Computer Applications
Journal title :
International Journal of Computer Applications