Friday, November 1, 2019
Use of Software Engineering Principles in Ensuring the Forensic Research Proposal
Use of Software Engineering Principles in Ensuring the Forensic Integrity of Digital Forensics - Research Proposal Example The methodologies and principles will be reviewed using a mixed research approach. Qualitative and quantitative research methods will be used in different stages of the study. Software engineering is part of software development. It works using distinct activities or phases with the intentions of improving management and planning. Software engineering methodologies and principles include the specific artifacts and deliverables created and completed in order to maintain or develop an application. Some of the most common methodologies in software engineering are prototyping, waterfall, iterative and incremental development, rapid application development, spiral development and extreme programming (Khurana, 2007). A software development process is a set of practices, methods, transformations and actions used to affirm and obtain software and its associated products. Information technology specialists have used many software development approaches. In most of the cases, a developmental or management team prefers a combination of approaches. Traditional methodologies such as waterfall have distinct phases known as software development lifecycle. Software engineers have discussed the issue of the organization of software development in order to deliver cheap, fast and better solutions for years. The best software engineering principle and methodology is the one that provides the power to choose and react fittingly and expeditiously to various changes within its environment (Watson & Jones, 2013). The methodology should also have an ability to be imposed within its surrounding. The suitable principle or methodology should also be flexible. Different methodologies can be used during the software engineering process of digital forensic software. Digital forensic software helps in investigating computer crimes. The software development process of this software is a very delicate, and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.