3. Research Methodology
The following research methods have been investigated to meet the study goals:
Step 1: To investigate SRE strategies to help GSD organizations and practitioners manage SSD RE operations. Thereby, we performed a systematic literature review (SLR) approach and the preliminary findings of our published prior work [4].
Step 2: A questionnaire survey to verify and validate the categorization of security best practices of RE for GSD as identified through SLR [4].
Step 3: We have used the ISM technique to assess how categorizing security best practices of RE will help GSD organizations during the SSD and provide a thorough picture of their interaction. The research methodology used in this paper is illustrated in Figure 1.