Forums for the Business Analyst

 
  Modern Analyst Forums  Business and Sy...  Requirements  JAD Facilitation
Previous Previous
 
Next Next
New Post 6/26/2019 1:22 PM
User is offline heisenburger
1 posts
No Ranking


JAD Facilitation 

Hello all,

The client wants to implement an ‘out of the box’ solution that will capture rep and client signatures and initials on top of an already existing . Essentially, this will be process re-engineering to provide the rep and client a seamless experience signing forms electronically. As a facilitator, can you provide me tips/insight to start the discussion and elicitate requirements from the stakeholders?

Steve

 
New Post 7/16/2019 9:12 AM
User is offline Stewart F
119 posts
7th Level Poster


Re: JAD Facilitation 

 

This is interesting, because my initial thought when I read your question was, "Isn't that rather open to Fraud?"

However, lets park that just for a second. 

So first of all, you will want to know the scope of this request. What documents/emails/requests etc, will this electronic signature be used for? Who will it be used for? Are there any people this doesn't apply to?

Secondly, I would imagine you will need some form of Audit trail to show them that an 'e-signature' has been used, and a report function which tells the person that it has happened? This can possibly configured so that it can be turned off, or maybe have a dashboard so they can investigate it themselves?

Thirdly, are their any levels (for example for financial transactions) where there is a threshold. So for example, lets say they were using the e-signature to request a payment, does that User have a 'credit limit' that they can authorise up to?

Fourthly, is there a override feature, for example when they want to use a real signature or add a note  to it? 

Some of these may depend on what the functionality is used for exactly. So to help you I would go into 'Path' mode. To do this, just either build yourself a Process diagram or think of each step - what are the possible outcomes and does your new functionality have the ability to handle that possible path? It doesn't matter how obscure it is (although don't drop down to "What happens if a meteorite hits the building") it might happen. If your stakeholders don't want to include it, then that's fine, but get them to put that in writing so you can cover your back. 

As a facilitator, start off with some simple questions about the general idea of the project, then gradually go into detail about certain points. The conversation should be fairly natural. If you think of something later, or you aren't sure about something then ask them again. Its also always a good idea to put all of your notes into an email and get them to confirm that's what they mean. Call it a very early draft of your Requirements Document ! 

If you have any particular questions then feel free to ask.  

 

 
Previous Previous
 
Next Next
  Modern Analyst Forums  Business and Sy...  Requirements  JAD Facilitation

Community Blog - Latest Posts

Leveraging Blockchain Technology for Enhanced Data Security in Business Operations
In an age where data breaches and cyberattacks are becoming more frequent and sophisticated, businesses are searching for robust solutions to safeguard their data. Blockchain technology has emerged as a promising tool in this quest, offering a way to secure data with unparalleled reliability. Although initially known for powering cryptocurrencies l...
Building software products that solve actual customer concerns and generate business success is not an easy fit. Product executives battle strong competition, tight timelines, and high expectations, all while seeking to offer value. While success gives the opportunity to showcase approaches and frameworks, the reality is that building excellent pro...
Business Impact Analysis(BIA): Assessing the Potential Impact of a Cybersecurity Incident on Business Operations
In today’s highly interconnected society, businesses depend on technology even more than before. While offering opportunities for innovation and creativity, businesses are exposed to various cybersecurity threats that can disrupt operations, damage reputation, and result in substantial financial losses. It is crucial to carry out a comprehens...

 



Upcoming Live Webinars




 

Copyright 2006-2025 by Modern Analyst Media LLC