tutorial
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| tutorial [2014/04/09 14:03] – [Structure of the Tutorial] federica.paci@unitn.it | tutorial [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 5: | Line 5: | ||
| In the second part, in order to show participants how the guidelines can be put into practice, we will engage them in a short experiment to evaluate the effectiveness of a security requirement elicitation method. At the end of the experiment we will look back at the experiment just run and reflect with the audience on what really happened behind the scenes and how different choices could have lead to different experiments or outright failure. | In the second part, in order to show participants how the guidelines can be put into practice, we will engage them in a short experiment to evaluate the effectiveness of a security requirement elicitation method. At the end of the experiment we will look back at the experiment just run and reflect with the audience on what really happened behind the scenes and how different choices could have lead to different experiments or outright failure. | ||
| + | |||
| + | ===Important Links==== | ||
| + | Please visit [[http:// | ||
| + | [[http:// | ||
| + | Watch our video about previous experiments: | ||
| + | |||
| ====Relevance for the RE Conference and Intended Audience of the Tutorial==== | ====Relevance for the RE Conference and Intended Audience of the Tutorial==== | ||
tutorial.1397044998.txt.gz · Last modified: (external edit)
