*Result*: An enhanced framework for securing software using iterative 4-D base security cycle appreciative inquiry.
*Further Information*
*This research paper focuses on addressing concerns related to security requirements elicitation by proposing a novel framework. The proposed framework aims to tackle the issues that arise in security requirements engineering, which require appropriate attention from specification techniques. The paper introduces a security elicitation framework designed to handle these concerns. The new security elicitation framework aims to incorporate the benefits of an existing elicitation technique (Appreciative Inquiry) while comprehensively addressing the activities performed during security requirements elicitation. These activities include: These activities include fact-finding, security requirements gathering, evaluation and rationalization, prioritization, and integration. By incorporating these activities, the new security elicitation framework enhances the existing Appreciative Inquiry (AI) technique to create an iterative, four-dimensional, base security cycle appreciative inquiry technique. One of the most significant challenges in system development is accurately eliciting security requirements. Since security requirements decisions are influenced by incomplete and inaccurate information, quantifying the security requirements is crucial for a project's success. [ABSTRACT FROM AUTHOR]*