<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0123-3033</journal-id>
<journal-title><![CDATA[Ingeniería y competitividad]]></journal-title>
<abbrev-journal-title><![CDATA[Ing. compet.]]></abbrev-journal-title>
<issn>0123-3033</issn>
<publisher>
<publisher-name><![CDATA[Facultad de Ingeniería, Universidad del Valle]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0123-30332021000100007</article-id>
<article-id pub-id-type="doi">10.25100/iyc.v23i1.9503</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[A Systematic Literature Mapping: risk-based testing in software development]]></article-title>
<article-title xml:lang="es"><![CDATA[Un mapeo sistemático de literatura: pruebas basadas en riesgo en el desarrollo de software]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Bastidas]]></surname>
<given-names><![CDATA[María I.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Pardo]]></surname>
<given-names><![CDATA[César J.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ardila]]></surname>
<given-names><![CDATA[Carlos A.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad del Cauca Faculty of Electronic Engineering and Telecommunications Systems Engineering Program]]></institution>
<addr-line><![CDATA[Popayán ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2021</year>
</pub-date>
<volume>23</volume>
<numero>1</numero>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S0123-30332021000100007&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S0123-30332021000100007&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S0123-30332021000100007&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract Risk-based testing (RBT) is a type of test that helps identify product risks from the start of development, incorporating techniques that allow them to be identified and classified according to their impact and probability to create test cases for those selected requirements. However, in software development organizations the identified risks are related to the planning or cost of the project to guarantee product delivery and do not consider other risks as input for the creation of test cases and quality evaluation. of the product. Therefore, the objective of systematic mapping is based on identifying and determining the state of the art of publications related to RBT used in the software industry, in addition to metrics that incorporate or evaluate the performance of these types of tests and their benefits. The results show the proposals found on the software industry RBT and the importance of use as other types of software testing. Also, we present a preview of the Framework to support the RBT in global software development.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Las pruebas basadas en riesgos (PBR) son un tipo de prueba que ayuda a identificar los riesgos del producto desde el inicio de desarrollo, incorporando técnicas que permitan su identificación y ser clasificados según su impacto y probabilidad, de modo que permitan crear casos de prueba para aquellos requerimientos seleccionados. Sin embargo, en las organizaciones de desarrollo software los riesgos que se identifican tienen relación con la planificación o coste del proyecto para garantizar la entrega del producto y no consideran otros riesgos como elementos de entrada para la creación de casos de prueba y evaluación de la calidad del producto. Por lo tanto, el objetivo del mapeo sistemático se basa en identificar y determinar el estado del arte de las publicaciones relacionas con PBR utilizadas en la industria software, además de métricas que incorporen o evalúen el desempeño de este tipo de pruebas y sus beneficios. Los resultados obtenidos demuestran las propuestas encontradas sobre las PBR en la industria software y la importancia de uso como otro tipo de pruebas software. Así mismo, presentamos una vista previa de Framework para soportar las PBR en el desarrollo de software global.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Risk-based testing]]></kwd>
<kwd lng="en"><![CDATA[Risk assessment]]></kwd>
<kwd lng="en"><![CDATA[Software testing]]></kwd>
<kwd lng="en"><![CDATA[Systematic mapping]]></kwd>
<kwd lng="en"><![CDATA[Test management]]></kwd>
<kwd lng="es"><![CDATA[Evaluación de riesgos]]></kwd>
<kwd lng="es"><![CDATA[Gestión de pruebas]]></kwd>
<kwd lng="es"><![CDATA[Mapeo sistemático]]></kwd>
<kwd lng="es"><![CDATA[Pruebas basadas en riesgos]]></kwd>
<kwd lng="es"><![CDATA[Pruebas de software]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mera-Paz]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Análisis del proceso de pruebas de calidad de software]]></article-title>
<source><![CDATA[Ingeniería Solidaria]]></source>
<year>2016</year>
<volume>12</volume>
<numero>20</numero>
<issue>20</issue>
<page-range>163-76</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Felderer]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Ramler]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A multiple case study on risk-based testing in industry]]></article-title>
<source><![CDATA[International Journal on Software Tools for Technology Transfer]]></source>
<year>2014</year>
<volume>16</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>609-25</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gerrard]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Thompson]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[Risk-Based e-Business Testing]]></source>
<year>2002</year>
<edition>1st</edition>
<page-range>368</page-range><publisher-loc><![CDATA[Norwood USA ]]></publisher-loc>
<publisher-name><![CDATA[Artech House Publishers]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<collab>Großmann J.Felderer M.Viehmann J.Schieferdecker IK</collab>
<article-title xml:lang=""><![CDATA[A Taxonomy to Assess and Tailor Risk-Based Testing in Recent Testing Standards]]></article-title>
<source><![CDATA[IEEE Software]]></source>
<year>2019</year>
<volume>37</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>40-9</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Souza]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Gusmao]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Alves]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Venancio]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Melo]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Measurement and Control for Risk-based Test Cases and Activities]]></article-title>
<collab>10th Latin American Test Workshop - LATW</collab>
<source><![CDATA[Rio de Janeiro,]]></source>
<year>2009</year>
<page-range>210-5</page-range><publisher-loc><![CDATA[Brasil ]]></publisher-loc>
<publisher-name><![CDATA[IEEE Institute of Electrical and Electronics Engineers]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schieferdecker]]></surname>
<given-names><![CDATA[IK]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Model-Based Testing]]></article-title>
<source><![CDATA[IEEE Software]]></source>
<year>2012</year>
<volume>29</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>14-8</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Felderer]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Ramler]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Integrating risk-based testing in industrial test processes]]></article-title>
<source><![CDATA[Software Quality Journal]]></source>
<year>2014</year>
<volume>22</volume>
<page-range>543-75</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hettiarachchi]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Do]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Choi]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Risk-based test case prioritization using a fuzzy expert system]]></article-title>
<source><![CDATA[Information and Software Technology]]></source>
<year>2016</year>
<volume>69</volume>
<numero>C</numero>
<issue>C</issue>
<page-range>1-15</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Felderer]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Schieferdecker]]></surname>
<given-names><![CDATA[IK]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A taxonomy of risk-based testing]]></article-title>
<source><![CDATA[International Journal on Software Tools for Technology Transfer]]></source>
<year>2014</year>
<volume>16</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>559-68</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Souza]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<source><![CDATA[RBTProcess: Modelo de Processo de Teste de Software baseado em Riscos]]></source>
<year>2008</year>
<publisher-loc><![CDATA[Brasil ]]></publisher-loc>
<publisher-name><![CDATA[Universidade de Pernambuco]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bastidas]]></surname>
<given-names><![CDATA[MI]]></given-names>
</name>
<name>
<surname><![CDATA[Calvache]]></surname>
<given-names><![CDATA[CJP]]></given-names>
</name>
<name>
<surname><![CDATA[Ardila]]></surname>
<given-names><![CDATA[CA]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Risk-Based Testing: Preliminary Findings Obtained From A Systematic Mapping Study of the Literature]]></article-title>
<collab>XIV Jornadas Iberoamericanas de Ingeniería de Software e Ingeniería del Conocimiento JIISIC&amp;apos;2019</collab>
<source><![CDATA[Cañas,]]></source>
<year>2019</year>
<page-range>107-19</page-range><publisher-loc><![CDATA[Costa Rica ]]></publisher-loc>
<publisher-name><![CDATA[Escuela Superior Politécnica de Chimborazo]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Felderer]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Ramler]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Risk orientation in software testing processes of small and medium enterprises an exploratory and comparative study]]></article-title>
<source><![CDATA[Software Quality Journal]]></source>
<year>2016</year>
<volume>24</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>519-48</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Felderer]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Haisjackl]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Breu]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Motz]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Integrating Manual and Automatic Risk Assessment for Risk-Based Testing]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Biffl]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Winkler]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Bergsmann]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[4th International Conference, SWQD 2012 LNBIP 94]]></source>
<year>2012</year>
<page-range>159-80</page-range><publisher-loc><![CDATA[Berlin, Heidelberg ]]></publisher-loc>
<publisher-name><![CDATA[Springer Cham]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ramler]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Felderer]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Leitner]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Lightweight Approach for Estimating Probability in Risk-Based Software Testing]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Großmann]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Felderer]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Seehusen]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<source><![CDATA[4th International Workshop, RISK 2016 LNCS 10224]]></source>
<year>2017</year>
<publisher-loc><![CDATA[Graz, Austria ]]></publisher-loc>
<publisher-name><![CDATA[Springer, Cham]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wagner]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Lochmann]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Heinemann]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Kläs]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Trendowicz]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Plösch]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The quamoco product quality modeling and assessment approach]]></article-title>
<collab>ICSE &amp;apos;12: Proceedings of the 34th International Conference on Software Engineering</collab>
<source><![CDATA[Zurich,]]></source>
<year>2012</year>
<page-range>1133-42</page-range><publisher-loc><![CDATA[Switzerland ]]></publisher-loc>
<publisher-name><![CDATA[IEEE Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Patón-Romero]]></surname>
<given-names><![CDATA[JD]]></given-names>
</name>
<name>
<surname><![CDATA[Piattini]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Modelos de madurez de Green IT un mapeo sistemático]]></article-title>
<source><![CDATA[International Journal of Information Systems and Software Engineering for Big Companies (IJISEBC)]]></source>
<year>2017</year>
<volume>4</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>53-61</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Genero]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Cruz-Lemus]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Piattini]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Métodos de investigación en ingeniería del software]]></source>
<year>2014</year>
<edition>1</edition>
<publisher-loc><![CDATA[España ]]></publisher-loc>
<publisher-name><![CDATA[RA-MA]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kitchenham]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Charters]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Guidelines for performing Systematic Literature Reviews in Software Engineering - Technical Report EBSE]]></source>
<year>2007</year>
<publisher-loc><![CDATA[UK ]]></publisher-loc>
<publisher-name><![CDATA[Keele University and Durham University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Petersen]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Feldt]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Mujtaba]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Mattsson]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Systematic mapping studies in software engineering]]></source>
<year>2008</year>
<conf-name><![CDATA[ EASE'08 Proceedings of the 12th international conference on Evaluation and Assessment in Software Engineering]]></conf-name>
<conf-loc>Swindon, UK </conf-loc>
<page-range>68-77</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Budgen]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Turner]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Brereton]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Kitchenham]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Using mapping studies in software engineering]]></article-title>
<source><![CDATA[Proceedings of PPIG 2008]]></source>
<year>2008</year>
<page-range>195-204</page-range><publisher-loc><![CDATA[Lancaster ]]></publisher-loc>
<publisher-name><![CDATA[Lancaster University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Amland]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Risk-based testing Risk analysis fundamentals and metrics for software testing including a financial application case study]]></article-title>
<source><![CDATA[Journal of Systems and Software]]></source>
<year>2000</year>
<volume>53</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>287-95</page-range></nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Foidl]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Felderer]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Integrating software quality models into risk-based testing]]></article-title>
<source><![CDATA[Software Quality Journal]]></source>
<year>2018</year>
<volume>26</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>809-47</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ramler]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Felderer]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Requirements for Integrating Defect Prediction and Risk-Based Testing]]></source>
<year>2016</year>
<conf-name><![CDATA[ 42nd EUROMICRO Conference on Software Engineering and Advanced Applications]]></conf-name>
<conf-loc>Limassol </conf-loc>
<page-range>359-62</page-range></nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Felderer]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Haisjackl]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Pekar]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Breu]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Exploratory Study on Risk Estimation in Risk-Based Testing Approaches]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Winkler]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Biffl]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Bergsmann]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[7th International Conference, SWQD 2015 LNBIP 200]]></source>
<year>2015</year>
<page-range>32-43</page-range><publisher-loc><![CDATA[Berlin, Heidelberg ]]></publisher-loc>
<publisher-name><![CDATA[Springer, Cham]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Felderer]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Ramler]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Experiences and Challenges of Introducing Risk-Based Testing in an Industrial Project]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Winkler]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Biffl]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Bergsmann]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[5th International Conference, SWQD 2013 LNBIP 133]]></source>
<year>2013</year>
<page-range>10-29</page-range><publisher-loc><![CDATA[Vienna, Austria ]]></publisher-loc>
<publisher-name><![CDATA[Springer, Cham]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Redmill]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[heory and practice of risk-based testing]]></article-title>
<source><![CDATA[Software Testing Verification &amp; Reliability]]></source>
<year>2005</year>
<volume>15</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>3-20</page-range></nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Felderer]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Haisjackl]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Pekar]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Breu]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Risk Assessment Framework for Software Testing]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Margaria]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Steffen]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[6th International Symposium, ISoLA 2014 LNCS 8803 - Part II]]></source>
<year>2014</year>
<page-range>292-308</page-range><publisher-loc><![CDATA[Corfu, Greece ]]></publisher-loc>
<publisher-name><![CDATA[Springer, Cham]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<label>28</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chamarthi]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Reddy]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Empirical Methodology of Testing Using FMEA and Quality Metrics]]></article-title>
<source><![CDATA[2018 International Conference on Inventive Research in Computing Applications (ICIRCA 2018)]]></source>
<year>2018</year>
<page-range>85-90</page-range><publisher-loc><![CDATA[Coimbatore, India ]]></publisher-loc>
<publisher-name><![CDATA[IEEE Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<label>29</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Souza]]></surname>
<given-names><![CDATA[EP]]></given-names>
</name>
<name>
<surname><![CDATA[Gusmao]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Risk-Based Testing: A Case Study]]></article-title>
<source><![CDATA[7th International Conference of Information Technology: New Generations (ITNG)]]></source>
<year>2010</year>
<page-range>1032-7</page-range><publisher-loc><![CDATA[Las Vegas, NV ]]></publisher-loc>
<publisher-name><![CDATA[IEEE Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<label>30</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[van Veenendaal]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<source><![CDATA[The PRISMA Approach: Practical Risk-Based Testing]]></source>
<year>2012</year>
<edition>1st</edition>
<page-range>136</page-range><publisher-name><![CDATA[UTN Publishers]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<label>31</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sherrell]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Bowen]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Puppala]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<source><![CDATA[A Tool for Risk-Based Testing]]></source>
<year>2007</year>
<publisher-loc><![CDATA[Tennessee ]]></publisher-loc>
<publisher-name><![CDATA[University of Memphis]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B32">
<label>32</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dahiya]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
<name>
<surname><![CDATA[Solanki]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Dhankhar]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Risk-Based Testing: Identifying, Assessing, Mitigating &amp; Managing Risks Efficiently in Software Testing]]></article-title>
<source><![CDATA[Int J Adv Res Eng Technol]]></source>
<year>2020</year>
<volume>11</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>192-203</page-range></nlm-citation>
</ref>
<ref id="B33">
<label>33</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jahan]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Feng]]></surname>
<given-names><![CDATA[Z]]></given-names>
</name>
<name>
<surname><![CDATA[Hasan-Mahmud]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Risk-Based Test Case Prioritization by Correlating System Methods and Their Associated Risks]]></article-title>
<source><![CDATA[Arab J Sci Eng]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B34">
<label>34</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pardo]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Pino]]></surname>
<given-names><![CDATA[FJ]]></given-names>
</name>
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Piattini]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Baldassarre]]></surname>
<given-names><![CDATA[MT]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An ontology for the harmonization of multiple standards and models]]></article-title>
<source><![CDATA[Computer Standards &amp; Interfaces]]></source>
<year>2012</year>
<volume>34</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>48-59</page-range></nlm-citation>
</ref>
<ref id="B35">
<label>35</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Centelles]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Taxonomías para la categorización y la organización de la información en sitios web]]></source>
<year>2005</year>
<publisher-name><![CDATA[Hipertext.net]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<label>36</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yin]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Case Study Research, Design and Methods]]></source>
<year>2009</year>
<edition>4th</edition>
<page-range>59-60</page-range><publisher-loc><![CDATA[Thousand Oaks, CA ]]></publisher-loc>
<publisher-name><![CDATA[SAGE Publications, Inc]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<label>37</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pardo]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Pino]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Baldassarre]]></surname>
<given-names><![CDATA[MT]]></given-names>
</name>
<name>
<surname><![CDATA[Piattini]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[From chaos to the systematic harmonization of multiple reference models: A harmonization framework applied in two case studies]]></article-title>
<source><![CDATA[Journal of Systems and Software]]></source>
<year>2013</year>
<volume>86</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>125-43</page-range></nlm-citation>
</ref>
<ref id="B38">
<label>38</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cugola]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Ghezzi]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Software processes: a retrospective and a path to the future]]></article-title>
<source><![CDATA[Software Process: Improvement and Practice]]></source>
<year>1998</year>
<volume>4</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>101-23</page-range></nlm-citation>
</ref>
<ref id="B39">
<label>39</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Bertoa]]></surname>
<given-names><![CDATA[MF]]></given-names>
</name>
<name>
<surname><![CDATA[Calero]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Vallecillo]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Ruíz]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Piattini]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Towards a consistent terminology for software measurement]]></article-title>
<source><![CDATA[Information &amp; Software Technology]]></source>
<year>2006</year>
<volume>48</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>631-44</page-range></nlm-citation>
</ref>
<ref id="B40">
<label>40</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fuggetta]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Software process: a roadmap]]></source>
<year>2000</year>
<conf-name><![CDATA[ ICSE &#8217;00: Proceedings of the Conference on The Future of Software Engineering]]></conf-name>
<conf-loc>New York </conf-loc>
<page-range>25-34</page-range></nlm-citation>
</ref>
<ref id="B41">
<label>41</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Burford]]></surname>
<given-names><![CDATA[BJ]]></given-names>
</name>
<name>
<surname><![CDATA[Welch]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Waters]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Tugwell]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Moher]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[O&#8217;Neill]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Testing the PRISMA-Equity 2012 Reporting Guideline: the Perspectives of Systematic Review Authors]]></article-title>
<source><![CDATA[PLoS One]]></source>
<year>2013</year>
<volume>8</volume>
<numero>10</numero>
<issue>10</issue>
</nlm-citation>
</ref>
<ref id="B42">
<label>42</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Grosan]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Abraham]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Intelligent Systems A Modern Approach]]></source>
<year>2011</year>
<publisher-loc><![CDATA[Berlin, Heidelberg ]]></publisher-loc>
<publisher-name><![CDATA[Intelligent Systems Reference Library]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B43">
<label>43</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lessmann]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Baesens]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Mues]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Pietsch]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Benchmarking classification models for software defect prediction: A proposed framework and novel findings]]></article-title>
<source><![CDATA[IEEE Transactions on Software Engineering]]></source>
<year>2008</year>
<volume>34</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>485-96</page-range></nlm-citation>
</ref>
<ref id="B44">
<label>44</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Graham]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[van Veenendaal]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Evans]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Black]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Foundations of software testing ISTQB Certification]]></source>
<year>2008</year>
<edition>Revised Ed</edition>
<page-range>258</page-range><publisher-loc><![CDATA[London ]]></publisher-loc>
<publisher-name><![CDATA[Cengage Learning EMEA]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B45">
<label>45</label><nlm-citation citation-type="book">
<collab>International Standard Organization (ISO)</collab>
<source><![CDATA[ISO/IEC/IEEE DIS 29119-2 Software and systems engineering. Software testing. Part 2: Test processes]]></source>
<year>2013</year>
<page-range>50</page-range><publisher-name><![CDATA[ISO - International Organization for Standardization]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B46">
<label>46</label><nlm-citation citation-type="">
<collab>European Telecommunications Standards Institute (ETSI)</collab>
<source><![CDATA[Methods for Testing &amp; Specification MTS - Risk-based Security Assessment and Testing Methodologies]]></source>
<year>2016</year>
<publisher-loc><![CDATA[Francia ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B47">
<label>47</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Muller]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Meucci]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[The owasp Testing Guide 4.0]]></source>
<year>2014</year>
<page-range>224</page-range><publisher-loc><![CDATA[Maryland (USA) ]]></publisher-loc>
<publisher-name><![CDATA[The OWASP Foundation]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B48">
<label>48</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[&#352;olc]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Applying of Method FMEA (Failure Mode and Effects Analysis) in the Logistics Process]]></article-title>
<source><![CDATA[ARSA - 5th Advanced Research in Scientific Areas]]></source>
<year>2012</year>
<page-range>1906-11</page-range><publisher-name><![CDATA[EDIS - Publishing Institution of the University of Zilina]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B49">
<label>49</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Steinmacher]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Chaves]]></surname>
<given-names><![CDATA[AP]]></given-names>
</name>
<name>
<surname><![CDATA[Gerosa]]></surname>
<given-names><![CDATA[MA]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Awareness Support in Global Software Development: A Systematic Review Based on the 3C Collaboration Model]]></article-title>
<source><![CDATA[Comput Support Coop Work]]></source>
<year>2013</year>
<volume>22</volume>
<page-range>113-58</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
