


This is a significant study that uses multi-criteria decision-making tools, specifically fuzzy TOPSIS, which used to evaluate different SRE methods for secure and trustworthy healthcare application development. The findings of this research study demonstrate various factors in the decision-making process for the selection of a reliable method for security requirements engineering. According to pairwise comparisons result with a 0.842 closeness coefficient (Ci), STORE methodology is the most effective security requirements engineering approach for trustworthy healthcare software development. The consistency ratios (CR) were found to be smaller than 10% (CR = 9.1% < 10%). For each of the 25 participants, comparison matrixes were formed based on the scores of their responses in the form. The impact of the recognized selection criteria for effective security requirements engineering approaches has been evaluated quantitatively. 25 security experts were asked to response the pairwise criteria comparison form. Effective SRE selection criteria were compared in pairs. The hierarchical model was evaluated by using fuzzy TOPSIS model. The study was planned and conducted to identify the most appropriate SRE approach for quality and trustworthy software development based on the security expert’s knowledge and experience. This study is aimed to present security experts’ perspective on the relative importance of the criteria for selecting effective SRE method by utilizing the multi-criteria decision making methods. Determining the most suitable security requirements engineering method for trustworthy healthcare software development is a challenging process.

Unfortunately, there is still a necessity to improve these security requirements engineering approaches. There are several Security Requirements Engineering (SRE) methodologies, framework, process, standards available today. Considering security requirements during trustworthy healthcare software development process is an essential part of the quality software development. Today’s healthcare organizations want to implement secure and quality healthcare software as cyber-security is a significant risk factor for healthcare data.
