Sixteen limitations for five popular requirements prioritisation approaches

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

    12 Downloads (Pure)


    Software is an essential commodity that ensures mobile phones to the controls of an aeroplane work. There will always be more requirements for software than there is time and budget to achieve them, hence the need for various prioritisation approaches to decide which requirements to include in the software. There are also constraints for startups, such as small teams and multiple influencers, which must be considered when choosing a prioritisation approach. The wrong approach can waste resources and cause customer dissatisfaction. There is limited research linked to the limitations of requirements prioritisation approaches; however, this research helps to address the research gap. For example, the main contribution identifies 16 limitations associated with five popular prioritisation approaches combined with a framework which identifies the relationships between these limitations. The five requirement prioritisation approaches studied were analytic hierarchy process (AHP), quality functional deployment (QFD), the planning game, binary search tree, and $100 allocation.
    Original languageEnglish
    Title of host publicationEmerging Technologies for Innovation Management in the Software Industry
    EditorsVarun Gupta, Chetna Gupta
    PublisherIGI Global
    Number of pages21
    ISBN (Electronic)9781799890614
    ISBN (Print)9781799890591, 9781799890607
    Publication statusPublished - 1 May 2022

    Publication series

    NameAdvances in Systems Analysis, Software Engineering, and High Performance Computing (ASASEHPC) Book Series
    PublisherIGI Global
    ISSN (Print)2327-3453
    ISSN (Electronic)2327-3461


    • limitations
    • prioritisation
    • approaches
    • requirements


    Dive into the research topics of 'Sixteen limitations for five popular requirements prioritisation approaches'. Together they form a unique fingerprint.

    Cite this