This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
experiment_description [2014/01/08 21:26] federica.paci@unitn.it [Research Questions and Hypotheses Formulation] |
experiment_description [2021/01/29 10:58] (current) |
||
---|---|---|---|
Line 9: | Line 9: | ||
| | ||
- | * **RQ1**: //Does the use of a catalog of security requirements lead to identify more security requirements?// | + | * **RQ1**: //Does the use of a catalog of security requirements lead to identify more security requirements?// |
- | * **RQ2** //Is participants' perception of using a catalog of security requirements in | + | * **RQ2**: //Is participants' perception of using a catalog of security requirements in |
security requirements elicitation better than not using it?// | security requirements elicitation better than not using it?// | ||
Line 33: | Line 33: | ||
The null hypotheses coming from the research questions are the following: | The null hypotheses coming from the research questions are the following: | ||
- | * **H1_0** //There will be no difference in the number of security requirements found with a catalog of security requirements and the one found without//. | + | * **H1**: //There will be no difference in the number of security requirements found with a catalog of security requirements and the one found without//. |
- | * **H2_0** //There will be no difference in the participants' perception of eliciting | + | * **H2**: //There will be no difference in the participants' perception of eliciting |
security requirement with a catalog of security requirements and without.// | security requirement with a catalog of security requirements and without.// | ||