3. Research Methodology
The following research methods have been investigated to meet the study
goals:
Step 1: To investigate SRE strategies to help GSD organizations
and practitioners manage SSD RE operations. Thereby, we performed a
systematic literature review (SLR) approach and the preliminary findings
of our published prior work [4].
Step 2: A questionnaire survey to verify and validate the
categorization of security best practices of RE for GSD as identified
through SLR [4].
Step 3: We have used the ISM technique to assess how
categorizing security best practices of RE will help GSD organizations
during the SSD and provide a thorough picture of their interaction. The
research methodology used in this paper is illustrated in Figure 1.