[1]
“Using threats to validity to replicate experiments in requirements elicitation software”, IyU, vol. 17, no. 1, pp. 59–76, Apr. 2013, doi: 10.11144/Javeriana.iyu17-1.uttv.