User Tools

Site Tools


tutorial

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
tutorial [2014/04/09 14:01]
federica.paci@unitn.it [How to Empirically Evaluate your pet (Security but not only) Requirements Engineering Method]
tutorial [2021/01/29 10:58] (current)
Line 5: Line 5:
  
 In the second part, in order to show participants how the guidelines can be put into practice, we will engage them in a short experiment to evaluate the effectiveness of a security requirement elicitation method. At the end of the experiment we will look back at the experiment just run and reflect with the audience on what really happened behind the scenes and how different choices could have lead to different experiments or outright failure. In the second part, in order to show participants how the guidelines can be put into practice, we will engage them in a short experiment to evaluate the effectiveness of a security requirement elicitation method. At the end of the experiment we will look back at the experiment just run and reflect with the audience on what really happened behind the scenes and how different choices could have lead to different experiments or outright failure.
 +
 +===Important Links====
 +Please visit [[http://​webhotel.bth.se/​re14/​pages/​conference/​tutorials/#​T11|our page]] on the RE'14 official website. You can also download our [[http://​webhotel.bth.se/​re14/​pdf/​RE14tutorialflyerT11A4.pdf|flyer]].\\
 +[[http://​webhotel.bth.se/​re14/​pages/​conference/​registration/​|Early-bird registration is open!]] \\
 +Watch our video about previous experiments:​ [[http://​youtu.be/​hyxg56RTQsw|eRISE 2012]]
 +
 ====Relevance for the RE Conference and Intended Audience of the Tutorial==== ====Relevance for the RE Conference and Intended Audience of the Tutorial====
  
Line 15: Line 21:
 Over the last four years, we have run the E-RISE challenge (http://​securitylab.disi.unitn.it/​doku.php?​id=erise),​ a series of empirical experiments in which different researchers working in security requirements engineering across the world have seen their methodology applied by a number of students and practitioners on a number of case studies provided by industry. Over the last four years, we have run the E-RISE challenge (http://​securitylab.disi.unitn.it/​doku.php?​id=erise),​ a series of empirical experiments in which different researchers working in security requirements engineering across the world have seen their methodology applied by a number of students and practitioners on a number of case studies provided by industry.
  
-What we will illustrate in the tutorial is a distilled, concrete protocol that try to validate whether ​\emph{a method works in practice}, i.e. whether it can be used+What we will illustrate in the tutorial is a distilled, concrete protocol that try to validate whether ​//a method works in practice//, i.e. whether it can be used
   * //​effectively//​ and   * //​effectively//​ and
   * //​efficiently//​   * //​efficiently//​
Line 37: Line 43:
   - **Experiment** (2,5 hrs). We will show participants how guidelines can be put into practice. We will involve them into an experiment to evaluate the effectiveness of a security requirementselicitation method. ​   - **Experiment** (2,5 hrs). We will show participants how guidelines can be put into practice. We will involve them into an experiment to evaluate the effectiveness of a security requirementselicitation method. ​
    - **Reflection** (1 hr) After the practical exercise, we will dissect the experiment to explain and discuss ​    - **Reflection** (1 hr) After the practical exercise, we will dissect the experiment to explain and discuss ​
- 
        * how it complies with presented theoretical aspects        * how it complies with presented theoretical aspects
        * some of the tricky issues behind its organization        * some of the tricky issues behind its organization
tutorial.1397044903.txt.gz ยท Last modified: 2021/01/29 10:58 (external edit)