This is an old revision of the document!
An experiment on the effect of using a catalog of security requirements on elicitation effectiveness