experiment_description
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| experiment_description [2014/01/08 21:23] – [An experiment on the effect of using a catalog of security requirements on elicitation effectiveness] federica.paci@unitn.it | experiment_description [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 9: | Line 9: | ||
| | | ||
| - | * **RQ1**: //Does the use of a catalog of security requirements lead to identify more security requirements?// | + | |
| - | * **RQ2** //Is participants' | + | |
| security requirements elicitation better than not using it?// | security requirements elicitation better than not using it?// | ||
| Line 33: | Line 33: | ||
| The null hypotheses coming from the research questions are the following: | The null hypotheses coming from the research questions are the following: | ||
| - | H1_0 //There will be no difference in the number of security requirements found with a catalog of security requirements and the one found without//. | + | * **H1**: |
| - | H2_0 //There will be no difference in the participants' | + | * **H2**: |
| security requirement with a catalog of security requirements and without.// | security requirement with a catalog of security requirements and without.// | ||
| - | |||
| ==== Experimental Design ==== | ==== Experimental Design ==== | ||
experiment_description.1389212611.txt.gz · Last modified: (external edit)
