More on Adding Threat during Software Requirements Elicitation and Prioritization - Volume 2 Number 3 (Jun 2010) - IJET
  • Jun 20, 2018 News! [CFP] 2018 the annual meeting of IJET Editorial Board, ICEDA 2018, will be held in Nha Trang, Vietnam during October 20-22, 2018.   [Click]
  • Aug 06, 2018 News! Vol.9, No.1- Vol.9, No.4 has been indexed by EI(Inspec)!   [Click]
  • Aug 16, 2018 News!Vol.10, No. 6 has been published with online version.   [Click]
General Information
Editor-in-chief
Prof. T. Hikmet Karakoc
Anadolu University, Faculty of Aeronautics and Astronautics, Turkey

IJET 2010 Vol.2(3): 286-290 ISSN: 1793-8236
DOI: 10.7763/IJET.2010.V2.135

More on Adding Threat during Software Requirements Elicitation and Prioritization

Mohd. Sadiq, Javed Ahmad, Abdul Rahman, R. Suman and Shweta Khandelwal

Abstract—There are two methods that are used to translate the customer requirements into software specification. First one is the Quality Function Deployment (QFD) and the second approach to the identification of software specification comes from the software engineering. Software requirements stipulate what must be accomplished, transformed, produced or provided. It is well documented that requirement engineering saves money. In this paper we have used the Web Surveys approach to elicit the software requirements for a railway projects. In this paper we have also added threat during software requirements elicitation and prioritization.

Index Terms—Software, QFP, Elicitation, and Prioritizationof Software Requirements.

Mohd. Sadiq is with the Jamia Millia Islamia (A Central University), NewDelhi-25, India. (Phone: 09891667600; email: sadiq.jmi@gmail.com).
Javed Ahmad, Guest Lecturer in Computer Engineering, is with the JamiaMillia Islamia (A Central University), New Delhi-25, India. (Phone:09891667600; email: er.jav.cs@gmail.com).
Abdul Rahman , R. Suman, Shweta Khandelwal are M.Tech. scholarswith the Department of Computer science Engineering, AFSET, Dhauj, Faridabad, Haryana, India. (Phone: +91 9313569986; email:rahman.jhansi@gmail.com, sumanaggrawal@gmail.com,shweta_af@rediffmail.com).

[PDF]

Cite: Mohd. Sadiq, Javed Ahmad, Abdul Rahman, R. Suman and Shweta Khandelwal, "More on Adding Threat during Software Requirements Elicitation and Prioritization," International Journal of Engineering and Technology vol. 2, no. 3, pp. 286-290, 2010.

Copyright © 2008-2017. International Journal of Engineering and Technology. All rights reserved. 
E-mail: ijet@vip.163.com