International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 1 - Number 9 |
Year of Publication: 2010 |
Authors: Mohd. Sadiq, Mohd. Shahid, Shabbir Ahmad |
10.5120/200-339 |
Mohd. Sadiq, Mohd. Shahid, Shabbir Ahmad . Adding Threat during Software Requirements Elicitation and Prioritization. International Journal of Computer Applications. 1, 9 ( February 2010), 50-54. DOI=10.5120/200-339
Requirements may be defined as a demand or need. In software engineering, a requirement is a description of what a system should do. System may have dozen to thousands of requirements. Software requirements stipulate what must be accomplished, transformed, produced or provided. In the field of software engineering researchers, academicians and scientist have developed many models and framework to elicit and prioritize the software requirements. It is well documented that requirement engineering saves money. There are several techniques to elicit the software requirements like JAD, misuse, RAD etc. In this paper we have used the JAD approach to elicit the software requirements. In this paper we have proposed a framework to elicit the software requirements and also to prioritize the software requirements. The proposed framework will rank the requirements by the relative level of threat associated with each requirement.