Loading: How Does Threat Modeling Work in Software Development?