{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T18:40:31Z","timestamp":1756406431082,"version":"3.44.0"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Umm Al-Qura University, Saudi Arabia","award":["25UQU4310136GSSR05"],"award-info":[{"award-number":["25UQU4310136GSSR05"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3589942","type":"journal-article","created":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T17:39:52Z","timestamp":1752687592000},"page":"142546-142560","source":"Crossref","is-referenced-by-count":0,"title":["RECTV: Enhancing Agile Decision-Making in Startups Through Value-Driven Requirements Prioritization"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8912-9585","authenticated-orcid":false,"given":"Fr\u00e9d\u00e9ric","family":"Pattyn","sequence":"first","affiliation":[{"name":"Business Informatics and Operations Management, Ghent University, Ghent, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8111-1911","authenticated-orcid":false,"given":"Rafaqat","family":"Kazmi","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, The Islamia University of Bahawalpur, Bahawalpur, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3454-4788","authenticated-orcid":false,"given":"Peter","family":"Goetz","sequence":"additional","affiliation":[{"name":"New Data Vision Ltd., Antwerp, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6881-1131","authenticated-orcid":false,"given":"Afnan","family":"Aldhahri","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, College of Computing, Umm Al-Qura University, Makkah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1722-8763","authenticated-orcid":false,"family":"Aqsa","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Wuhan University, Wuhan, China"}]}],"member":"263","reference":[{"volume-title":"Moscow","year":"1937","author":"Schl\u00f6gel","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICICICT1.2017.8342602"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.33093\/jiwe.2022.1.1.1"},{"volume-title":"Moscow Diary","year":"1986","author":"Benjamin","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1093\/jnci\/80.1.14"},{"volume-title":"My Three Years in Moscow","year":"2018","author":"Smith","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecolmodel.2010.04.021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/iwsib66663.2025.00006"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.11648\/j.ijsmit.20251101.14"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5815\/ijmecs.2015.11.06"},{"issue":"2","key":"ref11","first-page":"15","article-title":"Hierarchical multi-agent reinforcement learning framework with cloud-based coordination for scalable regulatory enforcement in financial systems","volume":"3","author":"Sonani","year":"2023","journal-title":"Spectr. Res."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1108\/09604521111100243"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1108\/02656711311299863"},{"issue":"1","key":"ref14","first-page":"9","article-title":"Secure performance optimization in multi-tenant cloud environments","volume":"1","author":"Govindarajan","year":"2020","journal-title":"Ann. Appl. Sci."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1108\/JWL-10-2015-0077"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/s13643-023-02257-7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-024-00606-y"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TechDebt52882.2021.00017"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2004.12.005"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jhydrol.2016.03.026"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5194\/acp-14-317-2014"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijsu.2019.10.015"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3389\/fnhum.2016.00160"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/15366367.2017.1348108"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1093\/ije\/dyw040"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2016.7586590"},{"issue":"2","key":"ref27","first-page":"82","article-title":"A review of the traditional and current language teaching methods","volume":"3","author":"Renau","year":"2016","journal-title":"Int. J. Innov. Res. Educ. Sci."},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1177\/0963721416649624"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015332"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2016.2519378"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN60692.2024.10539138"},{"key":"ref32","first-page":"9","article-title":"Assessing the effectiveness of MoSCoW prioritization in software development: A holistic analysis across methodologies","volume":"10","author":"Vijayakumar","year":"2024","journal-title":"EAI Endorsed Trans. Internet Things"},{"key":"ref33","first-page":"50","article-title":"Decision support for requirements prioritization in software engineering","author":"Nesterenko","year":"3806"},{"key":"ref34","first-page":"421","article-title":"A framework of type-2 neutrosophic for requirements prioritization","volume":"53","author":"Eldrandaly","year":"2023","journal-title":"Neutrosophic Sets Syst."},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-015-0260-8"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070758"},{"key":"ref37","first-page":"25","article-title":"Prioritization of value based services of software by using AHP and fuzzy Kano model","volume-title":"Proc. Int. Conf. Comput. Social Sci.","volume":"8","author":"Bakhitar"},{"issue":"2","key":"ref38","first-page":"17","article-title":"Quality based prioritization: An approach for prioritizing software requirements","volume":"9","author":"Mkpojiogu","year":"2017","journal-title":"J. Telecommun."},{"issue":"7","key":"ref39","first-page":"49","article-title":"Risk management frameworks: Adapt, don\u2019t adopt: Here\u2019s a primer on how to use two well-known approaches","volume":"95","author":"Frigo","year":"2014","journal-title":"Strategic Finance"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2014.09.104"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1108\/MD-07-2017-0663"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.4301\/s1807-17752017000100002"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.4324\/9781351029780"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11082130.pdf?arnumber=11082130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T18:10:49Z","timestamp":1756404649000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11082130\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3589942","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}