A Specification for Designing Requirement Prioritization Artifacts
نویسنده
چکیده
The importance of prioritizing requirements stems from the fact that not all requirements can usually be met with available time and resource constraints. Although several papers have been published in this domain, they mainly focus on descriptive research endeavors to suggest different requirement prioritization approaches. Prescriptive research dealing with design science for a systematic and holistic understanding of the prioritization process is still scarce. The gap motivates our research, which aims at arriving at a set of design principles that explains the form and function of software requirement prioritization artifacts. We resort to a non-experimental approach using content analysis to identify and analyze articles on requirement prioritization published up to 2009 in order to arrive at the set of initial design principles. This subsequently is evaluated based on expert feedbacks. We close the paper by indicating our research continuation plans, and highlighting issues for future considerations.
منابع مشابه
A Proposition of a Set of Design Principles for Requirement Prioritization Artifacts
Prioritization of requirements towards finalizing the intended requirement set has considerable received attention from academicians and practitioners. Articles proposing requirement prioritization artifacts have focused mostly on describing these artifacts. There is no attempt to uncover the principles that guide the design of these artifacts towards holistic understanding of the prioritizatio...
متن کاملInternational Journal of Intellectual Advancements and Research in Engineering Computations Priority based test case generation for Multi object
While performing regression testing, an appropriate choice for test case ordering allows the tester to early discover faults in source code. To this end, test case prioritization techniques can be used. Several existing test case prioritization techniques leave out the execution cost of test cases and exploit a single objective function (e.g., code or requirements coverage). In this paper, we p...
متن کاملMapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملTest Case Prioritization Using Fuzzy Logic Based on Requirement Prioritizing
Boolean expressions are popularly used for modelling decisions or conditions in specifications or source programs and they are very much prone to introduction of faults. Even for a Boolean expression with few numbers of literals the possible number of test cases can be quite large. Boolean expressions with n variables require 2 n test cases to distinguish from faulty expression. In practice, n ...
متن کاملMore on Adding Threat during Software Requirements Elicitation and Prioritization
There are two methods that are used to translate the customer requirements into software specification. First one is the Quality Function Deployment (QFD) and the second approach to the identification of software specification comes from the software engineering. Software requirements stipulate what must be accomplished, transformed, produced or provided. It is well documented that requirement ...
متن کامل