Quantitative Analysis of Requirement Elicitation Techniques through FANP: Security Perspective
Virendra Singh1, Dhirendra Pandey2, Mohd Waris Khan3, Kavita Sahu4
1Virendra Singh, Department of Inforamation Technology, Babasaheb Bhimrao Ambedkar University, Lucknow-226025, Uttar Pradesh, India.
2Dhirendra Pandey*, Department of Inforamation Technology, Babasaheb Bhimrao Ambedkar University, Lucknow-226025, Uttar Pradesh, India.
3Mohd Waris Khan, Department of Inforamation Technology, Babasaheb Bhimrao Ambedkar University, Lucknow-226025, Uttar Pradesh, India.
4Kavita Sahu, Department of Computer Science Dr. Shankutala Misra National Rehabilation University Lucknow-226017 Uttar Pradesh, India.

Manuscript received on January 01, 2020. | Revised Manuscript received on January 20, 2020. | Manuscript published on January 30, 2020. | PP: 3550-3558 | Volume-8 Issue-5, January 2020. | Retrieval Number: E6402018520/2020©BEIESP | DOI: 10.35940/ijrte.E6402.018520

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The last few decades have shown an incredible rise in the production of different types of software according to the user’s needs. Requirement Elicitation techniques for security requirements are one of the most crucial stage of software development life cycle. Based on the Analytical Network Process (ANP) process, this paper analyzes the weighting of elicitation techniques for security requirements in the production of software applications. In other words, the elicitation strategies of security requirements play an important role in the development of secure software. It also analyzes the relationship between security requirement elicitation techniques and their objectives through the use of ANP method and also demonstrates the application of fuzzy ANP method to achieve higher accuracy. When developing a secure software framework, the results provide a better platform. With these facts in mind, the proposed study will also clarify the priority weights of security requirement elicitation techniques that can be used to analyze trade-offs between competing software security requirement elicitation techniques and provide a new way for developers when constructing the secure software.
Keywords: Questionnaire, Brainstorming, Data Analysis, Group Discussion, Interview, Observation, Prototyping, Requirement Workshop, Multi-Criteria Decision-Making (MCDM), Analytic Network Process (ANP).
Scope of the Article: Data Analytics.