erise_2012
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
erise_2012 [2013/04/05 16:02] – [Participants] katsiaryna.labunets@unitn.it | erise_2012 [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 2: | Line 2: | ||
The eRISE 2012 challenge was conducted to empirically evaluate security engineering and risk analysis methods. The event was carried out in May and June 2012. The first part of experiment took place at the University of Trento, Italy, the second at Dauphine University, Paris, France. | The eRISE 2012 challenge was conducted to empirically evaluate security engineering and risk analysis methods. The event was carried out in May and June 2012. The first part of experiment took place at the University of Trento, Italy, the second at Dauphine University, Paris, France. | ||
- | To have a glimpse of eRISE 2012 you can look a video on YouTube [[http:// | + | To have a glimpse of eRISE 2012 you can look a video on YouTube [[http:// |
==== Participants ==== | ==== Participants ==== | ||
+ | {{ : | ||
In eRISE 2012 were involved the following participants: | In eRISE 2012 were involved the following participants: | ||
* **Customers** | * **Customers** | ||
- | * Marina Egea (Atos Research); | + | |
- | * Jorge Cuellar (Siemens AG); | + | |
* **Method Designers**: | * **Method Designers**: | ||
- | * Le Minh Sang Tran - SINTEF/ | + | |
- | * Kim Wuyts, Riccardo Scandariato - Katholieke Universiteit Leuven (LINDDUN) | + | |
- | * Thein Than Tun - Open University (Security Argumentation) | + | |
- | * Michalis Pavlidis - University of East London (Secure Tropos) | + | |
- | * Daniel G. Mellado - University of Castilla La Mancha (SREP) | + | |
* **Observers**: | * **Observers**: | ||
- | * Sarila Rana | + | |
- | * Martina Degramatica | + | |
- | * Deepa Nagaraj | + | |
- | * Elda Paja | + | |
- | * Jennifer Horkoff | + | |
* **Participants**: | * **Participants**: | ||
- | * 15 students were enrolled in the Master in Computer Science at the University of Trento and had a background in Security Engineering and Information Systems | + | |
- | * 27 professionals were attending a Master Course in Audit for Information System in Enterprises at Dauphine University. This master has an admission requirement of a minimum of five years of working experience in the field of Auditing in Information Systems | + | |
==== Evaluated Methods ==== | ==== Evaluated Methods ==== | ||
+ | |||
+ | {{ : | ||
The selection of the security requirements methods to be evaluated was driven | The selection of the security requirements methods to be evaluated was driven | ||
by three main factors: the number of citations, the fact that research on the | by three main factors: the number of citations, the fact that research on the | ||
Line 53: | Line 56: | ||
==== Experimental Procedure ==== | ==== Experimental Procedure ==== | ||
eRISE 2012 was conducted in three main phases: | eRISE 2012 was conducted in three main phases: | ||
- | + | {{ : | |
- | * **Training Phase** where participants attended tutorials on the methods under evaluation and on the eHealth and Smart Grid industrial cases | + | * **Training Phase** where participants attended tutorials on the methods under evaluation and on the eHealth and Smart Grid industrial cases: |
- | - May 7-9, 2012 at the University of Trento, | + | - May 7-9, 2012 at the University of Trento, Italy |
* **Application Phases**, where participants applied the methods to analyse security issues of the eHealth and Smart Grid industrial cases: | * **Application Phases**, where participants applied the methods to analyse security issues of the eHealth and Smart Grid industrial cases: | ||
- | - May 10-11, 2012 at the University of Trento, | + | - May 10-11, 2012 at the University of Trento, Italy |
- June 14-15, 2012 at Dauphine University, Paris, France | - June 14-15, 2012 at Dauphine University, Paris, France | ||
- | |||
* **Evaluation Phase**, where participants evaluated the methods through focused group interviews and post-it notes sessions while method designers and customers evaluated the final reports. The goal is to assess the correctness of the methods application and the quality of the security requirements identified by the participants. | * **Evaluation Phase**, where participants evaluated the methods through focused group interviews and post-it notes sessions while method designers and customers evaluated the final reports. The goal is to assess the correctness of the methods application and the quality of the security requirements identified by the participants. | ||
- June 15, 2012 Focus Groups and Post-it notes sessions with participants, | - June 15, 2012 Focus Groups and Post-it notes sessions with participants, | ||
- June 30- July 15, 2012 Reports Assessment by method designers and customers | - June 30- July 15, 2012 Reports Assessment by method designers and customers | ||
- | |||
==== Data Collection and Analysis ==== | ==== Data Collection and Analysis ==== | ||
We have collected different kinds of data: | We have collected different kinds of data: | ||
+ | {{ : | ||
* **Questionnaires** include questions on subjects' | * **Questionnaires** include questions on subjects' | ||
* **Q1** was administered at the beginning of the Training phase to collect participants' | * **Q1** was administered at the beginning of the Training phase to collect participants' | ||
* **Q2** was distributed at the end of the Training phase ({{: | * **Q2** was distributed at the end of the Training phase ({{: | ||
- | * **Q3** and **Q4** were administered during the two Application phases ({{: | + | * **Q3** and **Q4** were administered during the two Application phases ({{: |
- | * **Q5** was administered at the end of the Application phase to compare the method applied by the participants with other methods they may already knew ({{: | + | * **Q5** was administered at the end of the Application phase to compare the method applied by the participants with other methods they may already knew ({{: |
- | * **Audio/ | + | * **Audio/ |
* **Post-it Notes* ** list positive and negative aspects about the methods and the study itself; | * **Post-it Notes* ** list positive and negative aspects about the methods and the study itself; | ||
* **Focus Group Transcripts* ** report the discussion on the methods' | * **Focus Group Transcripts* ** report the discussion on the methods' | ||
Line 80: | Line 81: | ||
* These materials are available upon e-mail request. | * These materials are available upon e-mail request. | ||
- | === Data Analysis === | + | === Data Analysis === |
+ | |||
+ | {{: | ||
Questionnaires have been analyzed using // | Questionnaires have been analyzed using // |
erise_2012.1365170539.txt.gz · Last modified: (external edit)