Business Analysis Articles

Nov 17, 2019
990 Views
0 Comments
If we look at the previously proposed process end to end, it starts with the customer journey. The journey is mapped to the internal business processes, systems, and data sources. For both the customer facing and internal parts of the journey user stories are created to document the gaps between the...
If we look at the previously proposed process end to end, it starts with the customer journey. The journey is mapped to the internal business processes, systems, and data sources. ...
This question has been asked several times before, and various answers have been advanced to settle this matter. A short answer is ‘Yes’. But, unfortunately, this answe...
Learning about mental models and how to apply them to their work is one of the best investments for business analysts interested in achieving the level of deep thinking that leads ...

Latest Articles

17771 Views
19 Likes
1 Comments

Trying to secure a business analyst job interview in an area in which you don’t have prior experience can be a huge challenge. It’s common for recruiters and hiring managers to screen out applicants--no matter how accomplished they seem to be from their resumes--simply because the candidate’s job history doesn’t include work in the target industry...  But how do you get your foot in the door when so many recruiters and hiring managers tend to ignore applications from a candidate whose background doesn’t match the role they are trying to fill? The following tips may help.

9124 Views
5 Likes
0 Comments
When security requirements are considered at all during the system life cycle, they tend to be general lists of security features such as password protection, firewalls, virus detection tools, and the like. These are, in fact, not security requirements at all but rather implementation mechanisms that are intended to satisfy unstated requirements, such as authenticated access. As a result, security requirements that are specific to the system and that provide for protection of essential services and assets are often neglected. In addition, the attacker perspective is not considered, with the result that security requirements, when they exist, are likely to be incomplete. We believe that a systematic approach to security requirements engineering will help to avoid the problem of generic lists of features and to take into account the attacker perspective. Several approaches to security requirements engineering are described here and references are provided for additional material that can help you ensure that your products effectively meet security requirements.
9906 Views
12 Likes
0 Comments

This is the last article in this current  “Deep Dive Models in Agile” series and covers Decision Models, which include both Decision Trees and Decision Tables. Decision Models include two RML System models (Decision Trees and Decision Tables) that detail the system logic that either controls user functions or decides what actions a system will take in various circumstances.

8855 Views
13 Likes
0 Comments
The point is, no amount of elegant programming can solve a system problem without someone who understands the overall system architecture, someone who understands how the business works. Attacking systems development without such orchestration, such as one program at a time, will not produce the desired results. That would be like trying to build a bridge without a set of blueprints; it would probably be disjointed and one end would likely not connect with the other in the middle. 
10585 Views
40 Likes
0 Comments

What is Leading with Influence?... It is about the ability to affect the actions, decisions, and thinking of others to accomplish key goals or tasks that you consider to be important. Simply put, leading with influence is about getting people to willingly follow the direction that you provide when you lack organizational authority. It is about leading when you are not in charge. As a Business Analyst, I want delivery partners on a project to follow the guidance I provide without having to demand their compliance.

11127 Views
3 Likes
0 Comments

While BABOK and other sources include Behavioral Characteristics as an essential underlying competency for business analysts, many analysts may have only a vague idea of how it applies to their personal work environment, or even exactly what behavioral characteristics are, so let’s define those first.... The term behavioral characteristics simply refers to an analyst’s workplace ethics and character. 

 
Detect language » English
 
11116 Views
9 Likes
0 Comments
The purpose of this brief article is to explain the connection between documenting requirements and contract type. Recently I consulted with a firm eliciting requirements for a new product. In this case, an internal business analyst team was documenting the product requirements by consulting with appropriate stakeholders. The follow-on project intent was to outsource the work to develop the product in the form of a contract.
15655 Views
49 Likes
4 Comments
I take the approach that as Business Analysts, the line between requirements and design is an imaginary line. We need to be pragmatic (abandon purist thinking) and not be afraid to wear the design cloak, to adopt design thinking. 

 

So how do we incorporate design thinking in Business Analysis in a value-add way? Take the following thoughts into consideration when working on your next project that involves building or significantly updating a customer-centric application.


Author: Michael Roy, Business Analysis Professional / Requirements Leader

Michael is a solutions-focused Business Analysis professional with extensive experience leading change initiatives at a tactical and strategic level.

 

9684 Views
2 Likes
0 Comments
Don't underestimate how pervasively across your organization business rule is misunderstood. What is a true business rule?

A true business rule is simply a criterion used in daily business operations to shape behavior or make decisions. The things that IT implements under today’s software platforms are not true business rules; rather, they are mostly encoded representations of business rules.
14989 Views
30 Likes
2 Comments
I bet everyone has, at least once in their career, heard the expression:

“We don’t need any up-front analysis: I already know what I want!”

Often these words are followed by a description of a specific type of solution, often an IT system, and often a specific vendor name. Perhaps our executive stakeholder has decided they need to migrate onto the newest platform, the organization needs a new ‘mobile app’, or we need to ‘move all of our data into the cloud’. I can imagine some people will be holding their heads in their hands as they read this paragraph…

14635 Views
5 Likes
0 Comments

iRise gives Business Analysts the tools they need to communicate clearly with both the business and its stakeholders.  They use working previews that can be virtually indistinguishable from the final product.  When business analysts uses iRise to elicit and document requirements: the business analyst becomes a powerful weapon to get to the right answer, ...

11172 Views
2 Likes
0 Comments
State Models include two RML Data models (State Tables and State Diagrams) that show the transition of an object through various states or statuses, including which transitions are valid and what triggers an object to transition state. A state is a short-form description of a stage in a data object’s life that influences the behavior of the system.

These two models are covered together in this paper because they generally show the same information, just in different ways. These models are great for any object which has state about which there might be business rules, like workflow processes!
21273 Views
3 Likes
0 Comments

The end products of requirements development for a business analytics project will be similar to those for any other project—a set of business, user, functional, and nonfunctional requirements. Process flows, use cases, and user stories can reveal that someone needs to generate analytics results, and performance requirements describe how quickly they need results, but none of these uncovers the complex knowledge required to implement the system... An effective elicitation strategy for business analysts (BAs) is to drive requirements specification based on the decisions that stakeholders need to make to achieve their business objectives.

3654 Views
1 Likes
0 Comments
A good business definition is not only good because it is clear and concise, but because it holds a clear, exclusive position within its full set of peers – i.e., the glossary for your business vocabulary. This discussion outlines five basic guidelines for ensuring the quality of a glossary holistically, focusing on avoiding naming anomalies, subtle redundancies, and avoiding circularities. Find out how you can become world-class at communicating the meaning of your business concepts. Part of the secret is a clear focus on seed concepts.
11096 Views
16 Likes
1 Comments

We hit a challenge however when we attempt to promote the value of Business Analysis to IT Management or the Business...  The reality is that simply promoting “better requirements” does not sell our value-add in terms that management from an IT or Business perspective understands... So how do we do this? Let me share five lessons learned based on my experience as a senior requirements management consultant. 

Page 10 of 67First   Previous   5  6  7  8  9  [10]  11  12  13  14  Next   Last   









Copyright 2006-2019 by Modern Analyst Media LLC