Skip to main content

Table 4 Decision matrix

From: A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development

  C1 C2 C3 C4 C5 C6 C7
A1 3.480,5.480,7.440 4.680,6.680,8.520 5.080,7.000,8.520 4.920,6.880,8.560 5.080,7.000,8.480 5.800,7.680,9.120 5.240,7.160,8.720
A2 4.760,6.760,8.560 5.320,7.280,8.880 4.680,6.680,8.480 5.560,7.560,9.080 5.560,7.440,8.840 5.160,7.040,8.560 5.000,7.000,8.600
A3 4.840,6.800,8.480 5.480,7.440,9.000 5.320,7.280,8.920 5.480,7.400,8.920 5.400,7.280,8.840 5.120,7.000,8.520 5.240,7.160,8.800
A4 4.600,6.600,8.320 5.160,7.080,8.640 4.760,6.720,8.400 4.680,6.640,8.360 4.920,6.800,8.440 4.680,6.680,8.480 4.520,6.520,8.240
A5 4.680,6.680,8.520 5.000,6.960,8.560 5.160,7.120,8.760 4.840,6.800,8.520 4.680,6.680,8.480 4.520,6.520,8.320 4.360,6.360,8.200