Skip to main content

Table 4 Decision matrix

From: A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development

 

C1

C2

C3

C4

C5

C6

C7

A1

3.480,5.480,7.440

4.680,6.680,8.520

5.080,7.000,8.520

4.920,6.880,8.560

5.080,7.000,8.480

5.800,7.680,9.120

5.240,7.160,8.720

A2

4.760,6.760,8.560

5.320,7.280,8.880

4.680,6.680,8.480

5.560,7.560,9.080

5.560,7.440,8.840

5.160,7.040,8.560

5.000,7.000,8.600

A3

4.840,6.800,8.480

5.480,7.440,9.000

5.320,7.280,8.920

5.480,7.400,8.920

5.400,7.280,8.840

5.120,7.000,8.520

5.240,7.160,8.800

A4

4.600,6.600,8.320

5.160,7.080,8.640

4.760,6.720,8.400

4.680,6.640,8.360

4.920,6.800,8.440

4.680,6.680,8.480

4.520,6.520,8.240

A5

4.680,6.680,8.520

5.000,6.960,8.560

5.160,7.120,8.760

4.840,6.800,8.520

4.680,6.680,8.480

4.520,6.520,8.320

4.360,6.360,8.200