experiment_description
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
experiment_description [2014/01/08 21:23] – [An experiment on the effect of using a catalog of security requirements on elicitation effectiveness] federica.paci@unitn.it | experiment_description [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 9: | Line 9: | ||
| | ||
- | * **RQ1**: //Does the use of a catalog of security requirements lead to identify more security requirements?// | + | |
- | * **RQ2** //Is participants' | + | |
security requirements elicitation better than not using it?// | security requirements elicitation better than not using it?// | ||
Line 33: | Line 33: | ||
The null hypotheses coming from the research questions are the following: | The null hypotheses coming from the research questions are the following: | ||
- | H1_0 //There will be no difference in the number of security requirements found with a catalog of security requirements and the one found without//. | + | * **H1**: |
- | H2_0 //There will be no difference in the participants' | + | * **H2**: |
security requirement with a catalog of security requirements and without.// | security requirement with a catalog of security requirements and without.// | ||
- | |||
==== Experimental Design ==== | ==== Experimental Design ==== |
experiment_description.1389212611.txt.gz · Last modified: (external edit)