User Tools

Site Tools


experiment_description

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
experiment_description [2014/01/08 21:23] – [An experiment on the effect of using a catalog of security requirements on elicitation effectiveness] federica.paci@unitn.itexperiment_description [2021/01/29 10:58] (current) – external edit 127.0.0.1
Line 9: Line 9:
      
  
-* **RQ1**: //Does the use of a catalog of security requirements lead to identify more security requirements?//+  * **RQ1**: //Does the use of a catalog of security requirements lead to identify more security requirements?//
  
-* **RQ2** //Is participants' perception of using a catalog of security requirements in+  * **RQ2**//Is participants' perception of using a catalog of security requirements in
 security requirements elicitation better than not using it?// security requirements elicitation better than not using it?//
  
Line 33: Line 33:
 The null hypotheses coming from the research questions are the following: The null hypotheses coming from the research questions are the following:
  
-H1_0 //There will be no difference in the number of security requirements found with a catalog of security requirements and the one found without//.+  * **H1**: //There will be no difference in the number of security requirements found with a catalog of security requirements and the one found without//.
  
-H2_0 //There will be no difference in the participants' perception of eliciting+  * **H2**: //There will be no difference in the participants' perception of eliciting
 security requirement with a catalog of security requirements and without.// security requirement with a catalog of security requirements and without.//
- 
  
 ==== Experimental Design ==== ==== Experimental Design ====
experiment_description.1389212611.txt.gz · Last modified: (external edit)

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki