Security requirement elicitation techniques: The comparison of misuse cases and issue based information systems

Naveed Ikram, Surayya Siddiqui, Naurin Farooq Khan. Security requirement elicitation techniques: The comparison of misuse cases and issue based information systems. In Maya Daneva, Richard Berntsson-Svensson, Xavier Franch, Nazim H. Madhavji, Sabrina Marzcak, editors, 4th IEEE International Workshop on Empirical Requirements Engineering, EmpiRE 2014, Karlskrona, Sweden, August 25, 2014. pages 36-43, IEEE, 2014. [doi]

Abstract

Abstract is missing.