3.1 Step 1: Identifying RE best Security Practices for GSD
Organizations
We used a systematic literature review (SLR) approach to investigate
current RE security best practices for GSD, and our initial findings
were recently presented at a conference
[27]. The current paper extends our
previous published study, exploring the RE security practices in the GSD
context with industrial practitioners. We performed the following steps
to perform the empirical study [4].