More on Adding Threat During Software Requirements Elicitation and Prioritization

Download Now
Provided by: International Journal of Engineering and Technology
Topic: Security
Format: PDF
There are two methods that are used to translate the customer requirements into software specification. First one is the Quality Function Deployment (QFD) and the second approach to the identification of software specification comes from the software engineering. Software requirements stipulate what must be accomplished, transformed, produced or provided. It is well documented that requirement engineering saves money. In this paper the authors have used the web surveys approach to elicit the software requirements for a railway projects. In this paper they have also added threat during software requirements elicitation and prioritization.
Download Now

Find By Topic