This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
erise [2015/11/05 18:51] katsiaryna.labunets@unitn.it |
erise [2021/01/29 10:58] (current) |
||
---|---|---|---|
Line 18: | Line 18: | ||
==== Research Questions ==== | ==== Research Questions ==== | ||
- | * **RQ1**//Are security requirements and risk methods effective when applied by someone different than their own inventor?// | + | * **RQ1** //Are security requirements and risk methods effective when applied by someone different than their own inventor?// |
* **RQ2** //Why are the methods effective? Why they are not?// | * **RQ2** //Why are the methods effective? Why they are not?// |