This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
erise_2012 [2013/04/08 17:58] katsiaryna.labunets@unitn.it [Data Collection and Analysis] |
erise_2012 [2013/04/08 17:58] katsiaryna.labunets@unitn.it [Experimental Procedure] |
||
---|---|---|---|
Line 54: | Line 54: | ||
==== Experimental Procedure ==== | ==== Experimental Procedure ==== | ||
- | eRISE 2012 was conducted in three main phases: {{ :research_activities:erise:erise_2012:photo:training01.jpeg?250|}} | + | eRISE 2012 was conducted in three main phases: |
+ | {{ :research_activities:erise:erise_2012:photo:application_01.jpeg?250|}} | ||
* **Training Phase** where participants attended tutorials on the methods under evaluation and on the eHealth and Smart Grid industrial cases: | * **Training Phase** where participants attended tutorials on the methods under evaluation and on the eHealth and Smart Grid industrial cases: | ||
- May 7-9, 2012 at the University of Trento, Trento, Italy | - May 7-9, 2012 at the University of Trento, Trento, Italy | ||
Line 60: | Line 61: | ||
- May 10-11, 2012 at the University of Trento, Trento, Italy | - May 10-11, 2012 at the University of Trento, Trento, Italy | ||
- June 14-15, 2012 at Dauphine University, Paris, France | - June 14-15, 2012 at Dauphine University, Paris, France | ||
- | {{ :research_activities:erise:erise_2012:photo:application_01.jpeg?250|}} | ||
* **Evaluation Phase**, where participants evaluated the methods through focused group interviews and post-it notes sessions while method designers and customers evaluated the final reports. The goal is to assess the correctness of the methods application and the quality of the security requirements identified by the participants. | * **Evaluation Phase**, where participants evaluated the methods through focused group interviews and post-it notes sessions while method designers and customers evaluated the final reports. The goal is to assess the correctness of the methods application and the quality of the security requirements identified by the participants. | ||
- June 15, 2012 Focus Groups and Post-it notes sessions with participants, at Dauphine University, Paris, France | - June 15, 2012 Focus Groups and Post-it notes sessions with participants, at Dauphine University, Paris, France |