This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | |||
erise [2015/11/05 18:51] katsiaryna.labunets@unitn.it |
erise [2017/02/28 13:43] katsiaryna.labunets@unitn.it [Research Questions] |
||
---|---|---|---|
Line 18: | Line 18: | ||
==== Research Questions ==== | ==== Research Questions ==== | ||
- | * **RQ1**//Are security requirements and risk methods effective when applied by someone different than their own inventor?// | + | * **RQ1** //Are security requirements and risk methods effective when applied by someone different than their own inventor?// |
* **RQ2** //Why are the methods effective? Why they are not?// | * **RQ2** //Why are the methods effective? Why they are not?// |