Business Analysis 632 v1
Business Analysis 632 v1
Developed by
Prof. Pradeep Pendse
On behalf of
Prin. L.N. Welingkar Institute of Management Development & Research
!
Advisory Board
Chairman
Prof. Dr. V.S. Prasad
Former Director (NAAC)
Former Vice-Chancellor
(Dr. B.R. Ambedkar Open University)
Board Members
1. Prof. Dr. Uday Salunkhe
2. Dr. B.P. Sabale
3. Prof. Dr. Vijay Khole
4. Prof. Anuradha Deshmukh
Group Director
Chancellor, D.Y. Patil University, Former Vice-Chancellor
Former Director
Welingkar Institute of Navi Mumbai
(Mumbai University) (YCMOU)
Management Ex Vice-Chancellor (YCMOU)
Prof. Dr. Pradeep Pendse BE, MMS, Ph.D. (all from University of
Mumbai) is at present the Dean for IT/e-Business/Business Design at
the Welingkar Institute of Management (WeSchool) which is among the top
20 B-Schools in India.
! !3
ABOUT THE AUTHOR
Through the 1990s and early 2000s, Prof. Pendse founded and lead a 100+
software and IT consulting firm called Hauser Infotech Managers (P) Ltd.
for nearly 15 years and served over 100 leading corporates such as KEC
Intl. Ltd., Mahindra Group, CEAT, Mattel Toys etc. as a Consulting CIO.
! !4
CONTENTS
Contents
! !5
BUSINESS ANALYSIS — AN OVERVIEW
Chapter 1
Business Analysis — An Overview
Objectives
Structure
! !6
BUSINESS ANALYSIS — AN OVERVIEW
! !7
BUSINESS ANALYSIS — AN OVERVIEW
The foremost priority for any business analyst will be to try understanding
following things:
! !8
BUSINESS ANALYSIS — AN OVERVIEW
Over the years, IT has become pervasive and is being applied to every
single human endeavour, from basic office automation to mainstream
business functions in industries such as banking, manufacturing, retail to
name a few and is now increasingly finding its way in every appliance,
device and equipment be a washing machine, car or a mobile phone. This
pervasive nature of IT has resulted in a need for knowing not just the
technology but the application domain.
! !9
BUSINESS ANALYSIS — AN OVERVIEW
! !10
BUSINESS ANALYSIS — AN OVERVIEW
! !11
BUSINESS ANALYSIS — AN OVERVIEW
! !12
BUSINESS ANALYSIS — AN OVERVIEW
To progress in a role everyone tries to be the best at what they do, the
same goes for BA’s.
! !13
BUSINESS ANALYSIS — AN OVERVIEW
delivered, the business truly owns that this is what they wanted and is
prepared to use it.
Great business analysts are both professional and good to work with.
They get stakeholders involved at the right times and in the right ways and
keep everything moving.
! !14
BUSINESS ANALYSIS — AN OVERVIEW
More than all of this, great business analysts have a strong eye for scope.
While it can be fun to figure out what we might pack if everything but the
kitchen sink fits into the car, great business analysts realize that
implementation constraints nearly always get in the way of achieving the
full vision the first time out, so they keep a close eye on value and
feasibility and guide their stakeholders toward a set of requirements that
can actually get implemented.
! !15
BUSINESS ANALYSIS — AN OVERVIEW
More complex than a simple list of “pros vs. cons,” this approach is
designed to produce the best outcome based only on the choices that are
available. For example, a project team must choose between 15 different
versions of software. To create consensus within the team, the BA develops
a matrix that includes 20 different variables, such as cost, ease of use and
operating system requirements, then has the team rank each software
version on each variable to arrive at the best choice.
! !16
BUSINESS ANALYSIS — AN OVERVIEW
Process can also contribute to inertia and apathy, which hinder creative
problem solving. BA are skilled at determining what processes are required
for the project to be executed properly – and which ones are superfluous.
For example, a BA might suggest streamlining a decision-making process
for purchase approvals or call attention to the fact that some employees
are being overly managed.
Often moderating or playing a lead role in meetings, BAs play crucial role
to fostering constructive debate by setting the tone and building trust
among all participants. They also make sure conversations which are
inclusive, positive and focused on the pertinent aspects of the project, not
individuals or personalities.
Elite BAs also interact with team members at their level and ensure team
members don’t feel vulnerable, which can destroy the creative process.
5. Minimizing anxiety and low morale: Anxiety often runs high when
team personalities clash. It’s normal – not everyone always gets along. But
it also can be prevented by creating norms and expectations within the
group and limiting the toxic effects of low morale.
It may sound simple, but BAs can foster one of the best habits of project
teams: to avoid criticism of clients, individuals or, really, anything except
the weather. A positive disposition is both infectious and highly productive,
so BAs are skilled at keeping the griping to a minimum. That extends to
the use of positive body language and non-confrontational phrases like
“what if,” which encourage collaboration and team problem solving.
! !17
BUSINESS ANALYSIS — AN OVERVIEW
While many of the extensions of the core BA role was discussed in the
context of software development companies, BA roles are fast emerging in
in-house IT departments of Corporates in every possible business domain.
The need to leverage IT for business success has lead to appointing
Business-oriented Chief Information Officers (as opposed to mere technical
leaders) and has lead to creating roles for BAs. The role of a BA in this
context is a combination of a Relationship manager/Account manager,
Project Manager, Business Analyst, IT Strategist, Change Manager and
Vendor Manager to varying degrees. This happens because in in-house IT
departments, the management expects the CIO and his team to think
about business processes and IT solutions which not merely align to
business strategy but at times influence and contribute to business
success. BAs in this role often are assigned to specific business units and
therefore treat these business units as their clients. Managing
expectations, initiating and convincing BUs to investing in IT in specific
areas, creating business impacts and maintaining relationship between IT
and the BU on the one side and the BU and vendors on the other side are
important aspects of a BA’s role. Since, BAs in this role often have to
outsource the actual development work, they may be required to strategize
for the solution, document the needs, select vendors, and manage the
project involving users and vendor personnel to achieve the stated goals.
! !18
BUSINESS ANALYSIS — AN OVERVIEW
The role of the BA is thus growing in the industry and is diverse and
important.
1.9 SUMMARY
• The BA role has evolved along with the evolution of the Software
Industry.
• The BA role has been separated from the erstwhile Systems Analyst role
played by technical people. The BA role is client facing and the BA speaks
the language of the clients’ domain.
! !19
BUSINESS ANALYSIS — AN OVERVIEW
1. The new Business Analyst role was carved out of the erstwhile Systems
Analysts’ role.
a. True
b. False
! !20
BUSINESS ANALYSIS — AN OVERVIEW
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
! !21
THE IIBA FRAMEWORK AND IIBA BOK
Chapter 2
The IIBA Framework And IIBA BOK
Objectives
Structure
2.3 Summary
! !22
THE IIBA FRAMEWORK AND IIBA BOK
At the time of writing this book, IIBA had very recently published the IIBA
BoK version 2.0. This was a substantial improvement over the previous
BoK version 1.6. What follows is a brief description of the BoK version 2.0.
The above figure shows the key knowledge areas IIBA's Body of Knowledge
version 2.0. Given below is a brief description about each of these
knowledge areas:
! !23
THE IIBA FRAMEWORK AND IIBA BOK
d. Estimate the effort, time and costs required for this phase.
f. Assign the roles and responsibilities to the BAs and associated team
members.
2. Enterprise Analysis
! !24
THE IIBA FRAMEWORK AND IIBA BOK
3. Requirements Analysis
4. Elicitation
b. E l i c i t a t i o n r e q u i r e s s t r o n g c o m m u n i c a t i o n , o b s e r va t i o n ,
inquisitiveness, listening skills, influencing skills among others.
! !25
THE IIBA FRAMEWORK AND IIBA BOK
d. Solution testing is also done after the solution is ready. This is usually
known as Functional testing. Functional testing involves the
verification of a solution from the standpoint of user expectations. It
is therefore necessary for the BA to identify the criteria for evaluating
and verifying a solution from a business and users' perspective. Such
acceptance criteria are often identified during the earlier phases of BA
activities and are handy for conducting a user acceptance test.
The IIBA framework thus provides a strong conceptual foundation for the
study and practice of Business Analysis. The IIBA BoK also describes each
knowledge area in greater detail in the form of input-process-output. A full
description of the IIBA BoK is beyond the scope of this book. However,
many of these aspects are covered in someways in later chapters.
! !26
THE IIBA FRAMEWORK AND IIBA BOK
2.3 SUMMARY
• The key knowledge areas as per the IIBA BoK version 2.0 are:
– Business Analysis Planning and Monitoring
– Requirements Management and Communication
– Elicitation
– Enterprise Analysis
– Requirements Analysis
– Solution Assessment and Validation
3. Explain briefly the key knowledge areas of IIBA BoK version 2.0.
! !27
THE IIBA FRAMEWORK AND IIBA BOK
2. The International Institute of Business Analysis (the IIBA) has over the
years, published a Body of _________ which describes the broad
framework for Business Analysts.
a. Industrialists
b. Knowledge
c. Professionals
d. Members
! !28
THE IIBA FRAMEWORK AND IIBA BOK
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
Video Lecture
! !29
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
Chapter 3
Business Analysis Planning And
Management
Objectives
Structure
! !30
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
Business Analysis Planning and Management as per IIBA BoK 2.0 consists
of planning the the following key tasks:
In addition, one must identify potential risks in the BA project. This could
include possibility of users' lack of knowledge of technology, non-
availability of key users for discussions during the BA phase etc.
! !31
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
! !32
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
! !33
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
! !34
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
Last but not the least, it is important to identify and manage risks which
may emerge during the Business Analysis Phase. Some risks can be
identified even at the start of the BA phase. For example, the study may
involve interacting with users who have no knowledge about Information
Technology or cannot speak in the language which the BA is comfortable
with etc. Certain risks are not very visible but need to be sensed. For
example, if the Business Analysis phase involves travel to a distant location
such as the client's country or a remote city etc., several risks related to
travel, ill-health of the BA etc. could affect either the quality of the work or
could delay it. These and many other risks which are contextual have to be
accounted for in the planning of the Business Analysis project.
Developing an effective plan involves identifying and outlining all the key
tasks that must be completed within the allotted time. With a detailed plan,
key stakeholders are able to see the estimated amount of time needed to
complete the analysis effort. In some cases, the Business Analyst may use
this plan as a basis of negotiation for more resources like more time, more
staff, etc. on the project.
! !35
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
This paper discusses some of the questions you should seek to answer in
your Business Analysis Plan:
! !36
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
“As for the future, your task is not to foresee it, but to enable it.” - Antoine
de Saint Exupery.
! !37
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
Planning your work can help you foresee and enable the vision you would
like to achieve on the project. Spend some time planning and you will face
fewer uncertainties down the road.
There are a few reasons why it is really good for a Business Analyst to
have some familiarity and practical skills when it comes to some basic (but
powerful) Project Planning Techniques. Apart from the fact that most
Business Analysts operate within a project environment and therefore
should really understand the main planning activities and cycles that is
happening around them, it can also be extremely useful for a Business
Analyst to be able to properly plan for their own Business Analysis
activities on a project using these Business Analysis Planning techniques.
Let’s now have a look at the three core Business Analysis Planning
Techniques that borrowed from the Project Management Profession which
will help you in your role as a great Business Analyst.
! !38
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
The steps to build this overall Project Plan / Project Schedule is as follows:
It is also very useful knowledge for a Business Analyst simply from the
perspective of adding even more value as a Business Analyst within a
project environment.
! !39
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
Let’s first define the specific terms you need to understand when
learning about the Work Breakdown Structure:
! !40
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
So now that you understand the concepts you need for starting to build
your Work Breakdown Structure. You should also take note that there is
another approach to determining all the required work for a project by
using a Product Breakdown Structure.
1. Give your Project a Name: Take a large “Post It” note and write the
Project Name on it. You then put that note at the very top (in the
middle) of the white board or table as if it was the position of the CEO
on an organisational chart.
2. Define your Phases: The second step you will do is to define which
phases you believe will be involved with your project. For example, if
you are planning a software development project you may want to have
phases such as: Initiation Phase, Analysis Phase, Design Phase, Build
Phase, Test Phase and Implementation Phase.
You should take the large “Post It” notes and write a Phase Name on
each of them. You will then stick them at the top of your white board
from left to right (leave as much space in between each Phase “Post It”
note as you can.
3. Define your Deliverables: Now that you have your Project Name and
Phases defined and up on the white board or the table, you can start
thinking about what key deliverables each phase will be delivering. For
example: Your Analysis Phase will probably be delivering the following
two deliverables (as a minimum): Business Requirements Document
and Business Analysis Approach Document. These are just two
! !41
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
examples but you can imagine the type of deliverables that you need to
think of here.
You should again take the large “Post It” notes and write the name of the
Deliverable on the note. You then stick these “Deliverables” under each
Phase (where they will be completed) as if they are the Phase’s sub-
ordinates on an organisational chart.
You now take the small “Post It” notes and write each task on the note
and stick the tasks underneath the corresponding Deliverable on your
white board or table. Once you have done all the tasks for each
deliverable you will have the framework for your WBS all set up and
ready for estimation.
5. Estimation
Now that you have all the Phases, Deliverables and Tasks outlined on the
White board or table you are ready to evaluate each task in terms of how
much effort is involved to complete this task. It is typically suggested
that you write the minimum number of days (or hours for a smaller
project) in one corner of the small “Post It” note and the maximum
number of days (or hours) in another corner of the “Post It” note. You
only do this for the Tasks because the tasks are the only things on your
WBS which requires effort to complete.
So now go through each Task with your team and agree on the minimum
and maximum values for each Task.
! !42
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
6. Milestones
With your team you should review all the Deliverables and Tasks and
decide which ones are deemed “milestones” for your project as it
progresses. For those milestones you should draw a diamond symbol on
the “Post It” note to illustrate that the particular item is a milestone for the
project.
Now you can stand back and admire the WBS. It is a great idea to mark
each Deliverable and Task in a way which will remind you which Task
belongs to which Deliverable and which Deliverable is part of which phase.
This is important especially for the next step where you will start and build
the Network Diagram.
You do this by taking all the ‘Post It’ notes which are the Tasks (put the
Deliverables & Phases aside) of your project. Start to take them one by one
and by starting on the left of the white board, you place it in the sequence
of execution. Part of the objective here is to figure out which tasks can run
in parallel and what dependencies exist between tasks.
! !43
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
Example:
!
Let’s say your Project is to make coffee. Pretend you have unlimited people
helping you do this project.
You would place Task 1: Put kettle on and Task 2: Find a cup in the same
invisible column on the white board on the left (working from left to right).
Then you will place Task 3 (drink the coffee) in the next invisible column
along.
Task 1 & 2 are not dependent on each other because they can be executed
at the same time and there were enough people helping to make the coffee
and therefore you place one below the other in the first invisible column.
! !44
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
You should now try and do this with all the Tasks in your real project.
Critical Path
Once you have all your Project tasks outlined in the way described you
have achieved two key project planning results. You know what sequence
you need to execute the tasks in and you also know which tasks is
dependent on other tasks. You now have to determine what the duration of
the project is by working out what is the longest time-frame the project
needs to execute all the tasks. Keep in mind that the number of people
who you would have available to execute your project has not been
determined yet. It is now just about understanding based on the sequence
and dependencies what is the quickest and the slowest duration of the
project.
When you determine the critical path, you need to identify each task in
each invisible column on the Network Diagram with the maximum duration
assigned to it. Remember how you placed a minimum and maximum
duration on each task? Now is the time to use this maximum number. So,
for each task that you identify in each invisible column with the highest
maximum value, you should make a circle around the maximum duration
for that task (preferably in a new colour). Once you have determined the
highest maximum task for task in the invisible column and you marked
them out you should add the maximum durations for all these tasks
together. Once you come up with a total duration you will know that
maximum length of time the project should take. These tasks you
identified forms what is referred to as the critical path of your project. If
any of the tasks on the critical path is taking longer to finish than the
maximum duration that was planned for, your project is effectively running
over the critical path and is therefore running late. This is why project
managers are often very focused on doing whatever they can to stay within
the critical path of the projects!
! !45
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
Finally, you can take a similar exercise to determine the quickest that
project can be completed by identifying, marking and adding up the
highest minimum duration values for each invisible column on your
Network Diagram. This is another great measure for project managers
because they will know that regardless of how many people they assign to
their project, the project would need at least that minimum number of
days to be completed.
You have now successfully created the Network Diagram for your Project
Plan. You now only need to finish Step 3 of Building the Project Plan before
you completed!
This final step of creating the Gantt Chart or Project Schedule is where
people often start. Starting with this step is not a great way to build a
project plan because you have not considered the WBS step or Network
Diagram step in any detail. It means you will be guessing a lot of the tasks,
their dependencies and durations while trying to start directly within a
calendar-based planning tool. It is really valuable to first complete the WBS
and then the Network Diagram before drafting the Schedule.
So, what does this step really entail? In short, it is a combination of your
WBS (Phase, Deliverable, Milestones and Tasks!) and Network diagram
(Sequence and Dependencies) with the additional layer of a calendar and
resources. You are essentially combining all your steps with a calendar
where you are able to see specific calendar months and assign and share
tasks among resources for your project. It shows you the “real” duration of
the project in calendar months rather than work effort required.
Use a Gantt Chart (MS Project) to put this together electronically rather
than the “Post It” notes.
In Conclusion
! !46
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
Planning activities. Once you applied these three steps in practice, you will
never stop using it – promise! Give it a go!
Swiss cheese has holes in various places on different slices of cheese when
you cut it up. Let’s imagine these holes reflect weaknesses in the system
where mistakes can pass through, afterall no system is perfect. One
mistake passing through a hole in one slice of cheese might remain
unnoticed and not lead to a business catastrophe, if it's corrected. If the
mistake slips through all the holes however, across all the layers of cheese
(defences) when all the holes are in alignment, a catatrosphe might result.
The Swiss cheese effect, also known as the “cumulative act effect”, is
based on the contribution of James Reason, a psychologist who explained
systemic failure using four levels of human error: preconditions for unsafe
acts, unsafe acts, organizational factors/influences and unsafe supervision.
The principle of the Swiss cheese model has been successfully applied to
safety engineering and healthcare practices across the world.
Human systems are likened to multiple slices of swiss cheese. The idea is
that since each slice of cheese acts as a layer of defence, it would take a
lot for an error to pass through the system before it’s noticed and resolved.
! !47
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
Though there are many holes in the cheese, they rarely line up to create a
clear passage through it.
Failures can come from any section of an organization and they may be
interconnected. A failed software implementation may have happened for
multiple reasons like bad project management, inaccurate requirements,
poor training, etc. If organizational problems or failures are thoroughly
analyzed and addressed from multiple angles, they can be resolved
completely and provide learning opportunities for project teams.
! !48
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
3.6 SUMMARY
1. What is Business Analysis Planning and Management? What are the key
tasks it consists of?
! !49
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
3. Business Analysts must identify and estimate the effort required in the
Business Analysis activities in a ground up fashion, say in __________
and depending on the available time decide the number of BAs required
to complete these activities and the BA phase.
a. Man-hours
b. Man-days
c. Both A & B of the above
d. None of the above
! !50
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
! !51
BUSINESS ANALYSIS PLANNING AND MANAGEMENT
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
Video Lecture
! !52
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
Chapter 4
Requirements Elicitation, Gathering And
Analysis
Objectives
Structure
! !53
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
4.12 Summary
! !54
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
The IIBA BoK ver 2.0 describes all the above across the following broad
processes:
! !55
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
! !56
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
Elicitation Process
There are several effective techniques a Business Analysis (BA) can use to
obtain the requirements. Each method has strengths and weaknesses that
affect the quality of the requirements that are elicited.
1. What methods are appropriate for both the stakeholder and elicitor? and
What is Elicitation?
! !57
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
Elicitation Techniques
After securing the proper stakeholders, an analyst must determine the best
techniques for eliciting requirements.
! !58
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
A. Conduct Elicitation
! !59
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
It’s a process of interacting with customers and end-users to find out about
the domain requirements, what services the system should provide, and
the other constrains.
Then you organize the related requirements into sub components and
prioritize them, and finally, you refine them by removing any ambiguous
requirements that may raise from some conflicts.
! !60
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
It shows that it’s an iterative process with a feedback from each activity to
another. The process cycle starts with requirements discovery and ends
with the requirements document. The cycle ends when the requirements
document is complete.
1. Requirements Discovery
It’s the process of interacting with, and gathering the requirements from,
the stakeholders about the required system and the existing system (if
exist).
That’s because stakeholders may not know what exactly they want the
software to do, or they may give un-realistic requirements.
! !61
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
They may give different requirements, which will result in conflict between
the requirements, so we have to discover and resolve these conflicts.
Interviews
In practice, interviews usually use mixture of both. Usually, start with the
open-ended questions, and then use the closed-ended questions to be
more specific about some requirements that aren’t clear yet.
Interviews are good to get an overall understanding of what stakeholders
need, how they might interact with the new system, and the difficulties
they face with the current system.
! !62
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
The use cases and scenarios are two different techniques, but, usually they
are used together.
Use cases identify interactions between the system and its users or even
other external systems (using graphical notations), while a scenario is a
textual description of one or more of these interactions.
! !63
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
a. Actors: Are those who interact with the system; human or other
systems
c. Connection: Lines that links between the actors and the interactions.
Now, we are going to use scenarios to describe the interactions in each use
case textually. They should have a format and include the following:
ii. A description of the flow of the events or interactions with the system
Here is the example of a scenario for the use case example above
! !64
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
Description It shows how a student can register for a course and view
personal info
Post- The student registered his/her course list for the semester.
condition
4 Press on “Register”.
Scenario
Use case and scenarios are effective techniques for eliciting the
requirements. But, because they focus on the interactions with the system,
they aren’t effective for eliciting high-level business, non-functional, or
domain requirements.
! !65
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
What we do here will help us in the decision of identifying the most suitable
architectural design patterns.
One of the reasons is the conflicts that may arise as a result of having
different stakeholders involved. Why? Because it’s hard to satisfy all
parties, if it’s not impossible.
Prioritizing your requirements will help you later to focus on the essentials
and core features of the system, so you can meet the user expectations. It
can be achieved by giving every piece of function a priority level. So,
functions with higher priorities need higher attention and focus.
4. Requirements Specification
It’s the process of writing down the user and system requirements into a
document. The requirements should be clear, easy to understand, complete
and consistent.
! !66
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
They add detail and explain how the user requirements should be
provided by the system. They shouldn’t be concerned with how the
system should be implemented or designed.
! !67
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
Notation Description
Create your own format for writing the requirements. For example, you can
write the requirements in this format:
“A/The (Actor) shall (do something), By (how; explain how the user can
trigger this feature), In order to/so that (why; explain the benefits or the
objects of this requirement).
! !68
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
When we say “a system”, this word is very vague, we need to define what
exactly is the part of the system that will take care of this requirement.
Don’t use abbreviations, and acronyms, and If you want to, you have to
add what’s called “Appendix”. It defines all the abbreviations and acronyms
in your specification and their relevant meaning.
Inputs Current sugar reading (r2), the previous two readings (r0 and
r1)
Action Comp Dose is zero if the sugar level is stable or falling or if the
level is increasing but the rate of increase is decreasing. If the
level is increasing and the rate of increase is increasing, then
CompDose is computed by dividing the difference between the
current sugar level and the previous level by 4 and rounding
the result. If the result, is rounded to zero then CompDose is
set to the minimum dose that can be delivered.
Requires Two previous readings so that the rate of change of sugar level
can be computed.
! !69
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
Side-effects None
Number - Title
Description
Inputs
Processing
Outputs
Pre-condition
Post-condition
It should include both; user and system requirements. Usually, the user
requirements are defined in an introduction to the system requirements.
! !70
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
! !71
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
The requirement document has a diverse set of users, ranging from the
customers till the system engineers.
The diversity of possible users means that the requirements document has
to be a compromise between communicating the requirements to
customers, defining the requirements in detail for developers and testers,
and information about predicted changes. It can help system designers to
avoid restrictive design decisions and help the system maintenance
engineers to adapt the system to new requirements.
Each user story has estimated time of completion, and priority. Related
user stories are grouped together.
Requirements Validation
These problems can lead to extensive rework costs when they are
discovered in the later stages, or after the system is in service.
! !72
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
There are some techniques you can use to validate the requirements, and
you may use one or more of them together, depending on your needs.
Requirements Reviews
Then they may negotiate with the customer on how to solve the problems
and errors found.
Prototyping
! !73
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
Test-case Generation
The term “tests” here doesn’t mean to write and run some code for every
function. It means to write a textual description of the “inputs”, “expected
value”, and “steps taken” to perform each function.
Summary of
Date run Time run Tester Pass/Fall
Failure
Assumptions:
Here you write your assumptions; the pre-conditions; or the initial state.
Exclusions:
Write the steps that should be taken by the user for this function
! !74
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
It’s difficult to show that a set of requirements does in fact meet a user’s
need. Because users need to use the system in operation and imagine how
that system would fit into their work. So, it’s inevitable that there will be
further requirements changes.
! !75
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
! !76
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
• Study of negative
Information Security and various
events – what should
forms of industry specific
not be allowed?
compliances are becoming
• Study of specific
Compliance/ extremely important – hence the
6 compliances, e.g.,
Security study should focus on the
Basel III in Banking,
existing and requirements for
SOX in most export
information security and
oriented companies
compliance requirements if any.
etc.
! !77
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
The table shows some of the important perspectives, the brief attributes of
each perspective and the tools which could be used by the BA to gather
requirements about that perspective.
While a discussion of each of the tools and techniques is beyond the scope
of this subject, the later chapters do give some examples of use of some of
the more prominent ones from a BA's point of view. A more elaborate
! !78
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
description of most of these tools has been covered in the course material
for IT for Management.
! !79
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
• Stakeholder/User may fear that his own job may be replaced by the
proposed IT based system
! !80
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
Not overcoming the five BIG challenges of eliciting requirements can have
dire consequences for the success of your project. The challenges of poor
requirements definition and management result in cost overruns, missed
due dates, poorly designed products and, ultimately, a failure to deliver
what the customer needs.
! !81
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
1. Cultural Challenges
Many projects do not allow sufficient time in the project plan to adequately
elicit requirements, document them, and track & control them throughout
the project’s life cycle.
! !82
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
2. Communications
These challenges are described well in this example: The fact remains that
when trying to build something for which there are no existing, time-tested
design patterns, or when the gap between the patterns and the problem is
large, there is no guarantee of ever finding a solution that meets
requirements.
3. Understanding/Knowledge
Challenges include:
4. Staff/People
Challenges include:
• Wrong people involved
• Developers do not like users and vice versa
• The right people may not be available often or long enough
• We may wear out our welcome.
! !83
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
Challenges include:
• No trade-off analysis
Conclusion
! !84
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
• Studying stakeholders and seeking the involvement and time from the
most effective among them – escalating where support is lacking
• Studying the process from multiple perspectives and not relying entirely
on what users/stakeholders have to share – this could include speaking
to stakeholder/user, direct observation of work done by stakeholder/user,
tracing paper flows across the office, inspecting real-life data and
transaction documents, verifying discussions with one person with
another person in the same department or a receiving process – these
and other methods shown the table above must be used to cross verify
and gather more holistic requirements
! !85
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
On the other hand after meeting the user and capturing some part of his
process and requirement, the BA must use various visual modeling
techniques such as data flow diagrams, object models etc. as a means of
thinking and understanding the needs. The diagrams invariably generate a
lot of questions in the mind often the BA for which he can seek clarification
during the next meeting.
! !86
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
The BA during every visit is also observing the broader environment in the
client organization or what has been show in the model above as the larger
context in which the process under study is expected to perform.
The model is highly iterative and the BA must go through several rounds of
capture-modeling cycles to ensure completeness in requirements
gathering.
4.12 SUMMARY
! !87
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
3. Explain the key perspectives and tools for studying a business process.
! !88
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
! !89
REQUIREMENTS ELICITATION, GATHERING AND ANALYSIS
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
! !90
THE FLOW PERSPECTIVE
Chapter 5
The Flow Perspective
Objectives
• To learn various methods for studying flows and the pros and cons of
each
Structure
5.3 Summary
! !91
THE FLOW PERSPECTIVE
The study of flows can be done at a deeper level as well where the BA is
seeking to not merely identify the functions required but the underlying
process logic. The study of flow can be done at four levels:
• Workflow level which traces actual work done perhaps from desk to desk
• Data flow or information flow level
• Broad process level
• Service level
Data flows or information flows are best studied using data flow diagrams
and focus only on processes and the flow, store and transformation of data
or information in these processes. Data flow diagrams do not intend to
imply sequence of execution or timing. They only indicate several
concurrent processes each passing information to other processes through
information flows.
Broad process level studies typically use higher level process mapping tools
such as the Business Process Modelling Notation (BPMN) or activity
diagrams. These study of a broad process such as say a Executive
Recruitment process which may have several sequential steps, a few
decision situations such as accept or reject a candidate, and a few looped
steps such as if candidate is offered the job does not accept it go back and
approach the next best candidate etc.
! !92
THE FLOW PERSPECTIVE
This could lead to understanding how decisions are taken or how data is
transformed to information by the process.
This diagram is ideally suited for study of detailed workflows and when
analyzing business processes in great details for the purpose of
understanding inherent process logic, sequence of activities and timing.
! !93
THE FLOW PERSPECTIVE
• Uses a few simple symbols used in flowcharting such as the activity box,
decision diamond/branched flows, sequential flows and looped flows and
generating parallel flows (known as swim lanes) and synchronizing them
if required.
• The distinct advantage of the activity diagram over the conventional flow
chart is that it allows the creation of multiple parallel flows. This helps in
representing real-life workflow and process situations. For example,
copies of a document could be sent to several departments in parallel for
process from the point of view of that department – A customer order
can for example be copied to the Production Planning, the Despatch, the
Commercial department, design department etc. so that they could
respectively carry out activities such as production planning, planning of
packaging material, transport and other dispatch documentation,
commercial department to carry out commercial clearances with the
customer and design department to ensure the design/customization of
the product as per customers' requirements. Even more interesting is the
fact that the activity diagram allows the synchronization of these flows –
thus in the previous example dispatch will not be allowed until
commercial clearance, production etc. have taken place.
! !94
THE FLOW PERSPECTIVE
The control flow is drawn from one operation to another. This flow can be
sequential, branched, or concurrent. Activity diagrams deal with all type of
flow control by using different elements such as fork, join, etc.
The basic purposes of activity diagrams are similar to other four diagrams.
It captures the dynamic behaviour of the system. Other four diagrams are
used to show the message flow from one object to another but activity
diagram is used to show message flow from one activity to another.
It does not show any message flow from one activity to another. Activity
diagram is sometimes considered as the flowchart. Although, the diagrams
look like a flowchart, they are not. It shows different flows such as parallel,
branched, concurrent, and single.
! !95
THE FLOW PERSPECTIVE
(a) Activities
(b) Association
(c) Conditions
(d) Constraints
! !96
THE FLOW PERSPECTIVE
After receiving the order request, condition checks are performed to check
if it is normal or special order. After the types of order is identified,
dispatch activity is performed and that is marked as the termination of the
process.
The basic usage of activity diagram is similar to other four UML diagrams.
The specific usage is to model the control flow from one activity to another.
This control flow does not include messages.
Activity diagram is suitable for modelling the activity flow of the system. An
application can have multiple systems. Activity diagram also captures these
systems and describes the flow from one system to another. This specific
usage is not available in other diagrams. These systems can be database,
external queues, or any other system.
! !97
THE FLOW PERSPECTIVE
We will now look into the practical applications of the activity diagram.
From the above discussion, it is clear that an activity diagram is drawn
from a very high level. So, it gives high level view of a system. This high-
level view is mainly for business users or any other person who is not a
technical person.
This diagram is used to model the activities which are nothing but business
requirements. The diagram has more impact on business understanding
rather than on implementation details.
Data flow diagrams can be drawn in the form of higher level abstractions
indicating broad processes and later expanded into more detailed diagrams
! !98
THE FLOW PERSPECTIVE
The data flow diagram, however, does not imply timing, sequence or
dependence. Decisions if any taken in business are converted to decision
processes with inflowing data and outgoing decision outcomes
communicated to another process.
! !99
THE FLOW PERSPECTIVE
A data flow diagram (DFD) maps out the flow of information for any
process or system. It uses defined symbols like rectangles, circles and
arrows, plus short text labels, to show data inputs, outputs, storage points
and the routes between each destination.
Like all the best diagrams and charts, a DFD can often visually “say” things
that would be hard to explain in words, and they work for both technical
and Non-technical audiences, from developer to CEO. That’s why DFDs
remain so popular after all these years. While they work well for data flow
software and systems, they are less applicable nowadays to visualizing
interactive, real-time or database-oriented software or systems.
! !100
THE FLOW PERSPECTIVE
• The system scope and boundaries are clearly indicated on the diagrams
(more will be described about the boundaries of systems and each DFD
later in this chapter).
! !101
THE FLOW PERSPECTIVE
Note
There are essentially two different types of notations for data flow
diagrams. Two common systems of symbols are named after their
creators:
Yourdon & Coad or Gane & Sarson are defining different visual
representations for processes, data stores, data flow and external entities.
Yourdon and Coad type data flow diagrams are usually used for system
analysis and design, while Gane and Sarson type DFDs are more common
for visualizing information systems.
Visually, the biggest difference between the two ways of drawing data flow
diagrams is how processes look. In the Yourdon and Coad way, processes
are depicted as circles, while in the Gane and Sarson diagram the
processes are squares with rounded corners sometimes called lozenges.
There are other symbol variations in use as well, so the important thing to
keep in mind is to be clear and consistent in the shapes and notations you
use to communicate and collaborate with others.
! !102
THE FLOW PERSPECTIVE
Using any convention’s DFD rules or guidelines, the symbols depict the four
components of data flow diagrams.
The picture below shows the standard shapes for both methodologies.
! !103
THE FLOW PERSPECTIVE
1. External entity: External entities are objects outside the system, with
which the system communicates. External entities are sources and
destinations of the system's inputs and outputs. The sources from which
information flows into the system and the recipients of information
leaving the system. External entities are notated as ovals.
3. Data store: Data stores are repositories of data in the system. They
are sometimes also referred to as files. Files or repositories that hold
information for later use, such as a database table or a membership
form. Each data store receives a simple label, such as “Orders.” Data
stores are notated as rectangles with two parts.
4. Data flow: The data inputs to and outputs from these activities.
Dataflow are pipelines through which packets of information flow. The
route that data takes between the external entities, processes and data
stores. It portrays the interface between the other components and is
shown with arrows; Label the arrows with the name of the data that
moves through it. It is typically labelled with a short data name, like
“Billing details.”
! !104
THE FLOW PERSPECTIVE
2. Each data store should have at least one data flow in and one data flow
out.
A data flow diagram can dive into progressively more detail by using levels
and layers, zeroing in on a particular piece. DFD levels are numbered 0, 1
or 2, and occasionally go to even Level 3 or beyond.
The necessary level of detail depends on the scope of what you are trying
to accomplish.
• DFD Level 0 is also called a Context Diagram. It’s a basic overview of the
whole system or process being analyzed or modelled. It’s designed to be
an at-a-glance view, showing the system as a single high-level process,
with its relationship to external entities. It should be easily understood
by a wide audience, including stakeholders, business analysts, data
analysts and developers.
! !105
THE FLOW PERSPECTIVE
• DFD Level 2 then goes one step deeper into parts of Level 1. Simply
break processes down into more detailed sub processes. It may require
more text to reach the necessary level of detail about the system’s
functioning.
Using DFD layers, the cascading levels can be nested directly in the
diagram, providing a cleaner look with easy access to the deeper dive.
Now that you have some background knowledge on data flow diagrams
and how they are categorized, you’re ready to build your own DFD. The
process can be broken down into 5 steps:
! !106
THE FLOW PERSPECTIVE
The example below shows how information flows between various entities
via an online community. Data flows to and from the external entities,
representing both input and output. The center node, “online community,”
is the general process.
! !107
THE FLOW PERSPECTIVE
!
Sharing your data flow diagram
After completing your DFD, the next step is sharing it. You didn’t create it
just to keep to yourself—whether it’s team members, your boss, or
stakeholders, chances are somebody else needs to see it. If you create a
data flow diagram, you’ll have a variety of sharing options at your disposal.
Diagrams can be sent directly within, giving the recipient access to the
document. Depending on the recipient’s role, you can give them permission
! !108
THE FLOW PERSPECTIVE
to edit or send the diagram as view only. Extensive integrations allow for
diagram sharing across several other platforms including G Suite and
Slack.
Before actually creating your data flow diagram, you’ll need to determine
whether a physical or logical DFD best suits your needs. If you’re new to
data flow diagrams, don’t worry—the distinction is pretty straightforward.
Both physical and logical data flow diagrams can describe the same
information flow. In coordination they provide more detail than either
diagram would independently. As you decide which to use, keep in mind
that you may need both.
! !109
THE FLOW PERSPECTIVE
By starting with a current logical DFD, you map the flow of business
actions as they exist, which can highlight any shortcomings or
inefficiencies. Or, you may already know the type of functionality you’re
seeking to add, and the current logical DFD will help to reveal process
steps that may need to be dropped or changed.
The discipline of mapping out the current logical flow will help everyone
involved to gain a deeper understanding and reveal mistaken assumptions,
misunderstandings or shortcomings.
Then, with a solid understanding of the current business activities, you can
model a better way with a new state logical DFD, showing new features
and functioning based on what the business analysis has revealed.
This new logical DFD models what data flows are necessary to create the
better functioning, no matter what the technical solution or how the
system will be implemented.
After the new logical DFD is drawn, it in turn can be used to figure out the
best method to implement the business activities in an upgraded system.
This becomes the basis for the new physical DFD, depicting that physical
! !110
THE FLOW PERSPECTIVE
In this sense, the physical DFD becomes the method of giving the business
what it needs. It’s the “how” fueling the “what.” The physical DFD then
provides the basis of an implementation plan to provide the new software,
hardware, people or other physical pieces needed to run the business
process.
DFD in software engineering: This is where data flow diagrams got their
main start in the 1970s. DFDs can provide a focused approached to
technical development, in which more research is done up front to get to
coding.
! !111
THE FLOW PERSPECTIVE
Process Charts are one of the simpler forms of workflow charting and are
still in regular usage but are less common than they once were. This is
unfortunate since it was the ubiquitous nature of the process chart that
made it a common "language" between different groups of people and
across different industries.
The different kinds of process chart share a common core set of symbols,
though some have additional symbols for specific and specialised process
steps. The common symbols (of which there are only five) were first
promulgated by the American Society of Mechanical Engineers and have
become known as the ASME symbols.
! !112
THE FLOW PERSPECTIVE
In a "full" process chart, where all symbols are used, it is common to chart
the process from the "viewpoint" of the material being processed, the
worker carrying out the work or, less commonly, a piece of equipment.
Thus, the same symbols can be used in different ways. As a simple
example, a piece of equipment can be represented on an equipment-type
! !113
THE FLOW PERSPECTIVE
With many definitions going around and multiple ways to go about it,
business process modeling can be a bit confusing, especially for a beginner.
But when you go deeper you’ll realize that there isn’t much of a difference
in most approaches. This business process modeling tutorial will help you
learn more about the various definitions, features, history behind BPM.
! !114
THE FLOW PERSPECTIVE
With all above being true, it can be summarized as how work gets done in
an Enterprise or an organization.
BPM has emerged rapidly throughout the last two to three decades and has
replaced previous organizational efficiency practices such as the Time and
Motion Study (TMS) or Total Quality Management (TQM). Such demand for
BPM is a result of,
1. Technical nature,
! !115
THE FLOW PERSPECTIVE
! !116
THE FLOW PERSPECTIVE
Even though Business Process Modeling is a very effective way for business
organizations to keep track of their inner workings, many beginner
modelers tend to design them incorrectly and make mistakes, which
decrease their potential. The following are certain tips and suggestions you
! !117
THE FLOW PERSPECTIVE
should keep in mind when designing your very own Business Process
Model.
Because you’re drawing the process model you might be aware of the
inner working and the logic behind the processes. But remember that
these models are used by analysts and consultants to identify flaws in
the process and improve them. It will be hard to give recommendations
when they don’t fully understand the logic behind the processes.
Although your using a software to model your processes more often than
not you need to take a printout or email an attachment to show them to
your colleagues or clients. So, printer friendly modeling is always a good
idea.
! !118
THE FLOW PERSPECTIVE
! !119
THE FLOW PERSPECTIVE
Again, remember that the objective is to improve the process even if it’s
an alternative path.
! !120
THE FLOW PERSPECTIVE
!
e. Business process models help to visualize the processes to make
better decision
! !121
THE FLOW PERSPECTIVE
! !122
THE FLOW PERSPECTIVE
Studies of many wildly successful companies has often shown that they
succeeded not only because of better ideas or better business models. But
also, because they constantly refined and improve their processes through
business process modeling.
! !123
THE FLOW PERSPECTIVE
A slight improvement in one activity here and another one there leads to
an overall better process. And those little refinements help organizations
run efficiently and give the edge over their competitors.
The Business Process Modelling Notation (BPMN) which has the potential to
become a standard form of documenting a business process combines all
the above elements plus several more. It has outlined several specialized
symbols to indicate types of events such as timer events etc. each with
their distinct symbol.
However, the BA must be judicious and frugal when using a wide variety of
symbols since they can only make it difficult to interpret. Comments and
annotations can at times simplify and reduce the need for a great variety of
symbols.
Process diagrams have the advantage that Non-IT people can easily relate
to them.
! !124
THE FLOW PERSPECTIVE
5.3 SUMMARY
• Several techniques can be used for studying and analyzing the flow
perspective. The more prominent among these are the Activity diagram,
the Data flow diagram, the BPMN and other process charts – there are
pros and cons of each tool.
1. What do you mean by flow perspective? What are the various levels of
flows in an organization?
2. Describe the various diagramming tools for studying flows. Also explain,
the pros and cons of each flow in detail.
! !125
THE FLOW PERSPECTIVE
3. For which of the following reason data flow diagrams can be used
effectively by a Business Analysts?
a. Defining the scope of the proposed solution – i.e., which processes,
stores and flows are included in the solution and which are deemed
to be outside the boundary of the solution.
b. It helps in understanding the board set of processes and functions
needed for an organization.
c. It helps in visualizing a new process – by either combining, splitting
or redefining existing processes.
d. All of the above
! !126
THE FLOW PERSPECTIVE
5. The Business Process Modelling Notation (BPMN) which has the potential
to become a __________ form of documenting a business process
combines all the above elements plus several more; It has outlined
several specialized symbols to indicate types of events such as timer
events etc.
a. special
b. standard
c. specific
d. several
! !127
THE FLOW PERSPECTIVE
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
! !128
THE INFORMATION PERSPECTIVE
Chapter 6
The Information Perspective
Objectives
Structure
6.2 What BAs Must Know about Information Concepts and Information
Systems?
6.4 Summary
! !129
THE INFORMATION PERSPECTIVE
• Many decisions are still taken based on gut feel because relevant
information is not available either in time, form or where it is required.
! !130
THE INFORMATION PERSPECTIVE
Sr.
Information Concept Implication for Business Analyst
No.
1 Data when processed • BAs must try and understand the role of the
and relevant becomes person and therefore what is relevant to him.
information What is
relevant depends on • At higher levels, people prefer summarized,
the role of the person, consolidated information which gives them a
his hierarchical position sense of whether they are in control or not.
etc.
! !131
THE INFORMATION PERSPECTIVE
! !132
THE INFORMATION PERSPECTIVE
! !133
THE INFORMATION PERSPECTIVE
! !134
THE INFORMATION PERSPECTIVE
Apart from the obvious benefits which a computer has over human beings
such as speed, accuracy, consistency, repeatability, diligence, ability to
work non-stop etc. computer based systems tend to contribute in four
broad ways:
The BA must understand these impacts on IT and consciously aim for such
business impacts. It is seen that in many companies in which large
integrated software have been implemented without a proper goal focus,
the benefits accrued from such investments have been limited to
automation or transactions and operational management. However, higher
order benefits were not accured due to lack of focus. Many Enterprise
solutions and consulting firms and equally many end-user companies are
therefore focusing on extracting this value of IT by creating awareness
among users about possibility of exploiting existing applications for higher
order benefits.
! !135
THE INFORMATION PERSPECTIVE
6.4 SUMMARY
• The two quick ways to judge whether information systems are effective is
to check if each person in the organization gets the information he needs
and whether decisions in the organizations are taken on the basis of such
information.
• This understanding will ensure that the BA understands the needs for
information of all stakeholders in an organization.
2. What must the BAs know about the Information Concepts and
Information System?
! !136
THE INFORMATION PERSPECTIVE
! !137
THE INFORMATION PERSPECTIVE
! !138
THE INFORMATION PERSPECTIVE
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
Video Lecture
! !139
THE DYNAMIC PERSPECTIVE
Chapter 7
The Dynamic Perspective
Objectives
Structure
7.5 Summary
! !140
THE DYNAMIC PERSPECTIVE
Study of process flows using any of the tools described in the chapter on
flow perspective can mislead a BA into thinking that the flow diagram
completely describes the process. The process diagrams tend to show only
the static aspect of a business process – i.e., to say what happens on
‘under normal situation’. In practice, a variety of business situations could
challenge the smooth running of these processes. Thus, the success or
otherwise of a business process or an IT solution is decided not merely by
its smooth functioning on a normal day but also its ability to respond
effectively to a wide variety of business situations which may arise.
! !141
THE DYNAMIC PERSPECTIVE
Customer
! !142
THE DYNAMIC PERSPECTIVE
Staff Member
Thus, from the foregoing, you will notice that it is much easier to focus on
one object or a pair of interacting objects and derive possible situations,
events or object behaviours.
The state transition method studies an object in real life in terms of its
states and its transition from one state to another. Thus, the state of a bulb
is either ‘on’ or ‘off’ and what triggers the transition is the movement of the
switch by a person.
! !143
THE DYNAMIC PERSPECTIVE
The above diagram shows the states and transition of the account of a
bank customer. The transitions from one state to another are indicated with
an initial ‘/’ and a descriptor of the transition. A transition is seen as a
process while the state is a relatively stable condition of the object.
! !144
THE DYNAMIC PERSPECTIVE
The state transition diagram however can be a powerful tool for a process
analyst/designer for designing a process for exemplary customer
experience. For example, in the above case of bank account, we can ask a
question as to how may we provide a great customer experience while
opening a new bank account. This question can lead to a brainstorming of
possible solutions which overcome various customer painpoints and
experience goals. Thus, for example, we could offer all entry of new
accounting forms online subject to submission of the requisite documents
at a branch along with a printout of the online form at the branch for KYC
(know your customer) purposes. We could also think of sending a bank
executive to the residence of the customer. The executive can fill up all the
forms and take the customer's signature. By visiting the customer's
premises, the executive is also assured of finding all the requisite
documents. Often times, it is seen that the customer has to make multiple
visits to the bank solely because he has not carried the requisite
documents at one time. Further, even the customer does not have a photo
copy of the document. The executive takes a photo on his camera or
mobile phone and print it at the bank. He can even click the customer's
photo in case he does not have one. Thus, the customer gets a single
window process and that too at his doorstep.
! !145
THE DYNAMIC PERSPECTIVE
Thus, states when inspected can provide a great opportunity for process
innovation.
State-transition diagrams describe all of the states that an object can have,
the events under which an object changes state (transitions), the
conditions that must be fulfilled before the transition will occur (guards),
and the activities undertaken during the life of an object (actions).
State transition diagrams have been used right from the beginning in
object-oriented modelling. State transition diagrams give an explicit, even
a formal definition of behaviour.
The basic idea is to define a machine that has a number of states (hence
the term finite state machine). The machine receives events from the
outside world, and each event can cause the machine to transition from
one state to another. Thus, you can get a good sense of what events
should occur, and what effect they can have on the object.
! !146
THE DYNAMIC PERSPECTIVE
!
A big disadvantage is that you have to define all the possible states of a
system. While this is all right for small systems, it soon breaks down in
larger systems as there is an exponential growth in the number of states.
This state explosion problem leads to state transition diagrams becoming
far too complex for much practical use.
! !147
THE DYNAMIC PERSPECTIVE
Processes that are long (and can be interrupted) are bound to states;
these are called activities.
Transitions can also have a condition attached to them, which means that
the transition only occurs if the condition is true.
State models are ideal for describing the behaviour of a single object. They
are also formal, so tools can be built which can execute them.
Their biggest limitation is that they are not good at describing behaviour
that involved several objects. For these cases, use an interaction
diagram or an activity diagram.
People often do not find drawing state diagrams for several objects to be a
natural way of describing a process. In these cases you can try either
drawing a single state diagram for the process, or use an activity diagram.
This defines the basic behaviour, which then need to split across a number
of objects.
It is the model on which the system and the tests are based. Any system
where you get a different output for the same input, depending on what
has happened before, is a finite state system.
! !148
THE DYNAMIC PERSPECTIVE
1. This can be used when a tester is testing the application for a finite set
of input values.
2. When the tester is trying to test sequence of events that occur in the
application under test. I.e., this will allow the tester to test the
application behaviour for a sequence of input values.
!
2. Transition from one state to another
! !149
THE DYNAMIC PERSPECTIVE
4. Actions that result from a transition (an error message or being given
the cash.)
There are two main ways to represent or design state transition, State
transition diagram and state transition table.
In state transition diagram the states are shown in boxed texts, and the
transition is represented by arrows. It is also called State Chart or Graph.
It is useful in identifying valid transitions.
In state transition table all the states are listed on the left side and the
events are described on the top. Each cell in the table represents the state
of the system after the event has occurred. It is also called State Table. It
is useful in identifying invalid transitions.
Example 1:
Let's consider an ATM system function where if the user enters the invalid
password three times the account will be locked.
In this system, if the user enters a valid password in any of the first three
attempts the user will be logged in successfully. If the user enters the
invalid password in the first or second, try the user will be asked to re-
enter the password. And finally, if the user enters incorrect password 3rd
time, the account will be blocked.
! !150
THE DYNAMIC PERSPECTIVE
In the diagram whenever the user enters the correct PIN he is moved to
Access granted state, and if he enters the wrong password he is moved to
next try and if he does the same for the 3rd time the account blocked state
is reached.
S1) Start S5 S2
S2) 1st attempt S5 S3
! !151
THE DYNAMIC PERSPECTIVE
In the table when the user enters the correct PIN, state is transitioned to
S5 which is Access granted. And if the user enters a wrong password he is
moved to next state. If he does the same 3rd time, he will reach the
account blocked state.
Example 2:
Please be patient. The Video will load in some time. If you still face issue
viewing video, click here.
In the flight reservation login screen, consider you have to enter correct
agent name and password to access the flight reservation application.
It gives you the access to the application with correct password and login
name, but what if you entered the wrong password.
The application allows three attempts, and if users enter the wrong
password at 4th attempt, the system closes the application automatically.
The State Graphs helps you determine valid transitions to be tested. In this
case, testing with the correct password and with an incorrect password is
compulsory. For the test scenarios, log-in on 2nd, 3rd and 4th attempt
anyone could be tested. You can use State Table to determine invalid
system transitions.
! !152
THE DYNAMIC PERSPECTIVE
!
In a state Table, all the valid states are listed on the left side of the table,
and the events that cause them on the top.
Each cell represents the state system will move to when the corresponding
event occurs.
For example, while in S1 state you enter a correct password you are taken
to state S6 (Access Granted). Suppose if you have entered the wrong
password at first attempt you will be taken to state S3 or 2nd Try.
Two invalid states are highlighted using this method. Suppose you are in
state S6 that is you are already logged into the application, and you open
another instance of flight reservation and enter valid or invalid passwords
for the same agent. System response for such a scenario needs to be
tested.
! !153
THE DYNAMIC PERSPECTIVE
Advantages Disadvantages
This testing technique will provide a The main disadvantage of this testing
pictorial or tabular representation of technique is that we can't rely in this
system behavior which will make the technique every time. For example, if the
tester to cover and understand the system is not a finite system (not in
system behavior effectively. sequential order), this technique cannot
be used.
By using this testing, technique Another disadvantage is that you have to
tester can verify that all the define all the possible states of a system.
conditions are covered, and the While this is all right for small systems, it
results are captured soon breaks down into larger systems as
there is an exponential progression in the
number of states.
! !154
THE DYNAMIC PERSPECTIVE
Notation
For those not familiar with the notation used for state-transition diagrams,
some explanation is in order.
Syntax Testing
Let's begin with the simplest kind of testing-syntax testing. Syntax Testing,
a black box testing technique, involves testing the System inputs and it is
usually automated because syntax testing produces a large number of
tests. Internal and external inputs have to conform the below formats:
You do not need to know the answers to any of these questions before
asking them. It is the process of asking and answering that is most
! !155
THE DYNAMIC PERSPECTIVE
important. Listen to the answers you are given. Are people confident about
their answers? Can they explain them rationally?
Correct:
1. Does each state-transition diagram have one and only one initial state?
5. If multiple guards exist for a single event, are the guards mutually
exclusive?
6. Does each state have exactly one transition for each possible event-
guard combination?
9. Is every "real" state in the world represented by one and only one state
on the diagram?
! !156
THE DYNAMIC PERSPECTIVE
Complete:
1. Are all of the required states, events, guards, transitions, and actions
shown on the diagram?
Correct:
3. Are all of the required states, events, guards, transitions, and actions
properly defined?
! !157
THE DYNAMIC PERSPECTIVE
Consistent:
Traceability Testing
Significance of Traceability:
Consistent:
! !158
THE DYNAMIC PERSPECTIVE
Conclusion
7.5 SUMMARY
• Processes and systems may work well on a normal day but fail during
abnormal situations.
• The Object events method is one approach to study and analyze the
dynamics associated with a business process or a system.
! !159
THE DYNAMIC PERSPECTIVE
3. The state transition method studies an event in real life in terms of its
states and its transition from one state to another.
a. True
b. False
! !160
THE DYNAMIC PERSPECTIVE
! !161
THE DYNAMIC PERSPECTIVE
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
Video Lecture
! !162
BUSINESS RULES PERSPECTIVE
Chapter 8
Business Rules Perspective
Objectives
! !163
BUSINESS RULES PERSPECTIVE
Business rules are a key aspect of a business process. Business rules can
either be structured and nearly automatic. On the other hand, business
rules may have an element of fuzziness, could be discretionary or
situational and may require experience and judgement. Hence, the first
type of business rules could be automated while the second may require
either heuristics and specially designed decision support systems. A third
kind of rule may be completely beyond the bounds of easy automation
perhaps because of the combinatorial explosion which formal algorithmic
methods could lead to or the sheer irrational and impractical solutions
which many mathematical models could provide. The BA must be careful
before committing to the automation of the last type of business rule. For
example, a leading insulator manufacturer wishes to optimize the output of
his furnace in which insulators of various sizes and shapes made for
various customers need to be placed for glazing. The ability of the
shopfloor scheduler to fully occupy the cubic volume offered by the furnace
while ensuring that the insulators do not touch each other and yet fit
comfortably in the furnace without damage or breakage is key to getting
the maximum output from each production cycle of the furnance. Trying to
develop a computerized loading pattern for the furnace may look like an
interesting automation assignment but is fraught with quite a few
challenges. The BA must be aware that he does not commit to such
assignments unless he has had past experience about his teams' capability
in handling such challenges.
! !164
BUSINESS RULES PERSPECTIVE
Rules are the constraints and conditions that define how the enterprise
functions and should be analyzed with the help of Business needs.
! !165
BUSINESS RULES PERSPECTIVE
Business Rules originate from three components namely, terms, facts and
rules. Terms stand for clear definition, facts feed terms, and rules feed
facts.
! !166
BUSINESS RULES PERSPECTIVE
"
Business Rules can concern:
b. Policy: Example: Eliminate any product with < 10% contribution to the
Business after its initial 8 years
! !167
BUSINESS RULES PERSPECTIVE
2. Business Rules guide process flow or how the system works. A Business
rule should be isolated from the process implementing it. Market
experts recommend that BAs should isolate the process flow from
what’s known, meaning the process should be separated from the
various Business Rules. This guarantees that changes to a Business rule
can be made without changing the related process. Since rules are
neither process nor procedure, they should not be contained in
processes themselves.
! !168
BUSINESS RULES PERSPECTIVE
3. Business Rules are only active or legitimate when stated clearly. They
should not be abstract concepts in a person’s mind but should be
explicitly stated using a simple and comprehensible format.
! !169
BUSINESS RULES PERSPECTIVE
Conclusion
Business Rules can be easily analyzed when they are documented and
managed independent of the processes enforcing them. Occasionally, when
not planned properly, Business Rules may contradict one another when
combined. Business Rules should be progressively maintained to see that
they stay relevant to the enterprise.
The things that IT implements under today’s software platforms are not
true business rules; rather, they are mostly encoded representations of
business rules.
1. True business rules are about running the business, not its systems.
Your company would need its true business rules even if it had no software.
True business rules apply no matter whether activities are automated or
not
! !170
BUSINESS RULES PERSPECTIVE
1. Business rules must be written. (If you are part of an agile project
that believes otherwise, you need to rethink.)
For business rules the two relevant modes are alethic and deontic.
1. Alethic rules are true 'by definition'. As such they cannot be violated.
They are about how concepts, knowledge, or information are defined or
structured.
! !171
BUSINESS RULES PERSPECTIVE
2. Deontic rules are rules that can be violated. They are rules about
behaviour, not concepts, knowledge, or information. Deontic rules are
really about people, what they must and must not do, even if their
activity (and the rules) are automated.
Both kinds of rules are important, of course, but deontic rules are people
rules since, businesses are about the activity of people. This situation is
very different than in the semantic web, for example, where it's all about
only knowledge.
Under modal logic, every rule must therefore 'claim' one of two modes. (In
practice, the 'claim' arises naturally from the syntax of a rule statement or
as a meta-property.)
Why doesn't the definitional rule say "business rule" like the one for
behavioural rule?
Because some definitional rules are not 'under business jurisdiction' (in
other words, business has no choice about them). Examples include the
'law' of gravity and all the rules of mathematics. Those rules are simply
universally true.
! !172
BUSINESS RULES PERSPECTIVE
Informal norms, however, are more difficult to identify. For example, after
developing a software for the purchase department of a company, the
users who were essentially buyers in the purchase department felt that the
software was difficult to use since it showed a long list of thousands of
items purchased by the company in the drop-down box making it difficult
for them to complete the transaction quickly. The BA replied that since the
company dealt with 30000 items the list was bound to be long. He then
! !173
BUSINESS RULES PERSPECTIVE
discovered that the buyers had a not so formal work division among
themselves wherein a group of items were handled by a buyer. Hence,
when he raised a purchase order, he would ideally like to see the list of
items which he dealt with and not the entire 30000 items. This came a
surprise since this seemed to be an unwritten business rule. It was more of
a working arrangement or norm. Discovering such norms can be difficult
but important to ensure a better user experience as can be seen from the
above case.
There are various ways for analyzing and structuring business rules. Some
of these include:
! !174
BUSINESS RULES PERSPECTIVE
can have only one boss, i.e., he reports to only one other employee. On
the other hand, an employee can have many people reporting into him. As
per the theory of span of control, we may decide that an employee cannot
have more than 8 subordinates. Thus, in this fictitious organization, we
have identified the two basic business rules pertaining to the boss
subordinate relationship. In some other organization, they may have more
number of relationships between employees – for example, an employee
may be a performance coach for another employee, or an employee may
have a direct boss as well as a dotted line boss (indirect or administrative
versus functional boss). Equally another organization may not believe in
the concept of span of control and could allow a boss to have more than 8
subordinates.
One way that business rules contribute to a clearer picture of any given
business process is through a kind of binary concept. Typically, business
theory experts see a business rule as either true or false. Here, business
rules can be used in business planning in many of the same ways that they
are used for algorithm development in programming.
One example is the use of business rules on a flow chart that clearly shows
how a defined true or false case will absolutely affect the next step in a
business process.
For example, a business can come up with business rules that are self-
imposed in order to meet leadership’s own goals, or in the pursuit of
compliance with external standards.
! !175
BUSINESS RULES PERSPECTIVE
!
Experts also point out that while there is a system of strategic processes
governing business rules, the business rules themselves are not strategic,
but simply directive in nature.
Consider the rule: A log-in must be cancelled if the user enters the
wrong password more than 5 times. Business rule?
The tests for distinguishing business rules from system or IT rules are
straightforward. There are five basic tests. A rule must pass all five tests
before it can be considered a true business rule.
This test entails the question, 'Would a worker who is duly authorized and
capable, know what to do or not to do when she reads it?' Consider the
statement: No shirt, no service. Probably passes the practicable test.
Now consider this statement: Come as you are. Probably not practicable. A
worker can't read it and know exactly what to do or not to do. The
statement must be interpreted into some form that truly is practicable
(e.g., No swimming suits.). More about practicable later.
! !176
BUSINESS RULES PERSPECTIVE
Test 2. The rule must be about the business, not about either a
system that supports the business, or a platform used to
implement such a system.
A rule of thumb is this: If you threw away the system — any system, even
pencil and paper — would the rule still be important in running the
business? Business people should be managing business things, not system
things.
Now back to the original rule: A log-in must be cancelled if the user enters
the wrong password more than 5 times.This rule satisfies tests 1 and 3,
but not 2. Not a business rule.
How about this example: No cash, no order. This rule does satisfy all three
tests. So, yes, business rule.
Does this clear distinction between business rules and system or platform
rules ever break down? One commonly-cited example where the line might
blur is with security rules. However, such rules often pertain directly to a
system or the data in it.
This rule satisfies test 1 above — it's practicable — but not 2 and maybe
not 3. So, not a business rule. Does that mean the rule is any less
important to the business? No. It's a rule all right, simply not a business
rule.
! !177
BUSINESS RULES PERSPECTIVE
Two Additional Tests for when a Rule can be Considered a Business Rule
are as Follows.
"Under business jurisdiction" is taken to mean that the business can enact,
revise, and discontinue the business rule as it sees fit. If a rule is not under
business jurisdiction in that sense, then it is not a business rule. For
example, the law of gravity is obviously not a business rule. Neither are
accepted rules of mathematics.
If some guidance is given but does not tend to remove some degree of
freedom, it still might be useful, but it is not a rule per se. Such guidance
is called an advice.
Is it important then to write the advice down (i.e., capture and manage it)?
Maybe. Suppose the statement reflects the final resolution of a long-
standing debate in the company about how old a person must be to hold a
bank account. Some say 21, others 18, some 12, and some say there
should be no age restriction at all. Finally, the issue is resolved in favour of
no age restriction. It's definitely worth writing that down!
! !178
BUSINESS RULES PERSPECTIVE
Now consider this statement: An order Rs. 1,000 or less may be accepted
on credit without a credit check. This statement of advice is different. It
suggests a business rule that possibly hasn't been captured yet: An order
over Rs. 1,000 must not be accepted on credit without a credit check. Let's
assume the business needs this rule and considers it valid.
In that case, you should write the business rule down — not the advice —
because only the business rule actually removes any degree of freedom.
Just because the advice says an order `1,000 or less may be accepted on
credit without a credit check, that does not necessarily mean an order over
`1,000 must not. A statement of advice only says just what it says.
! !179
BUSINESS RULES PERSPECTIVE
Just because business rules are practicable does not imply they are always
automatable — many are not. For instance, consider the business rule: A
hard hat must be worn in a construction site. Non-automatable rules need
to be implemented within user activity. In many ways, managing non-
automatable rules is even more difficult than managing automatable ones.
They definitely have a place in your rulebook.
! !180
BUSINESS RULES PERSPECTIVE
Add to this the fact that rule changes or additions are often externally
imposed (by government or regulators), and organizations face significant
risks associated with complying with such new or changed rules in an
efficient, effective, and timely manner. Similarly, most system
replacements or “legacy system modernization” efforts fail, usually after
the expenditure of hundreds of thousands or millions of dollars.
! !181
BUSINESS RULES PERSPECTIVE
Many business rules are hidden in application code. This may be due to the
complexity of many insurance application systems and to the fact that
those systems may be undocumented or poorly documented (or the
validity of any documentation may be in question). Staff members may not
even be explicitly aware that these business rules exist.
The products of business analysis and the use of a business rules approach
can provide clear direction for the discovery of business rules and the
ability to trace business rules to the processes, events, roles, and data that
they impact. Business process models have “decision” points (indicated by
a diamond). For all but the most rudimentary of decisions, these indicate
the application of a business rule. The creation of a use case description
generates questions that are answered by the discovery of business rules.
The analysis of data entities and their attributes trigger the discovery of
business rules through the exploration of “how does A relate to B?”
Assessment of a business role (possibly through the creation of “personas”
– Sally is a twenty-something, tech-savvy individual who hates to have to
“look things up”) can also trigger discovery of business rules.
! !182
BUSINESS RULES PERSPECTIVE
Imagine you are asked to define business requirements and constraints for
a set of business rules as part of the design of a solution. What approach
would you use?
The definition of the business rules of the solution were part of the design
phase. Because most traditional requirements engineering approaches
focus on defining requirements for IT systems, it was found that using
these kinds of approaches for defining business rules requirements is not
suitable.
Below given are the practical 3 step approach that can be used to define
business requirements for business rules and decisions.
This first step is to gather the relevant knowledge sources that can help
specify how the decision is made and how the business rule should work.
For example: policies, regulation, sources of expertise and best practices
on which the business rule is based. As part of the requirements, it is not
necessary yet to describe the behaviour of the business rule in complete
detail. Only refer to the relevant knowledge sources and add a high-level
description if you like. Important constraints from law and regulations
should be made clear here as well.
The second step is to define where the business rule applies. This question
should be answered from a business perspective. Therefore, the best way
to determine this requirement is to indicate as part of which business
process (step) the business rule needs to be described. Business processes
define the order of activities that are executed to produce a result to the
customer. A business rule can often be assigned to a single activity or set
of activities. Reference material like existing business process models from
the organization, high level business function models, or business process
! !183
BUSINESS RULES PERSPECTIVE
reference models from the industry can all serve as a starting point. The
level of detail used to answer the 'Where' question depends on the
availability of this material. If possible, use the organization's existing
business process models. If nothing is available you can still describe in
words using business terminology where the business rule applies.
However, this is far less accurate.
The final step is about data. A business rule is based on a combined set of
information or data elements. For example, the business rule for whether
an insurance claim is accepted, depends on the amount claimed and the
payment behaviour of the customer. Part of the set of requirements of a
business rule, is to define the essential data elements that are necessary
as input to the business rule. Without these data elements available, it is
not possible to execute the business rule. Existing data dictionaries or data
models can be used as starting point.
In addition, it can help to describe where the data should come from e.g.
which system, which department, which external party, etc.
! !184
BUSINESS RULES PERSPECTIVE
Next steps
If you describe these three aspects together, this forms a complete set of
requirements for the business rule. A business rule designer can use this
information as input to make a detailed design of the business rule.
Furthermore, the set of requirements can serve as input for the execution
of rules in a business rules engine. In that case a next step is needed to
define technical requirements that arise from constraints of the chosen
implementation platform.
Rules
1 2 3 4
Existing Customer Y Y
Zero Discount Y
5% Discount Y Y
10% Discount Y
As can be seen, there are two parts to the table, viz., Conditions and
Actions. Each column represents a distinct rule within the rule set of giving
discounts to customers. Each rule consists of a set of conditions which are
marked as ‘Y’ and the corresponding actions which should be taken. The
rule is to be read from top to bottom in a given column.
! !185
BUSINESS RULES PERSPECTIVE
Thus, for example, for the condition that the ‘Customer is new’ and has
purchased less than Rs. 1000/- the salesperson should give zero discount
but to tempt the customer to come again he should give a discount
voucher on the next purchase.
• The decision table only has ‘Y’ and blanks – this like 0 or 1, i.e., binary. If
a database table of this nature is created, the billing software can pick up
the correct rule based on the conditions inherent in the data being
entered and apply the rule. This is indeed the principle of building
business rule tables and business rule engines. The advantage of this
approach is that the rule is not coded in the software as was
conventionally done and if the rule changes only table values need to be
changed rather than having to change the programs. Thus, for example,
in the above case if it is decided to give a 5% discount in rule 1, 10%
discount in the rest of the rules, the values in the rule table need to be
changed and nothing else. This helps the software to be moregeneric and
the parameterization lies in the table.If two retail outlets are allowed to
give different discounts, they need to only change the values without
touching the programs which can remain common to both the stores.
! !186
BUSINESS RULES PERSPECTIVE
!
The above figure shows an AND gate. This implies that if and only if all the
conditions listed below the AND gate are ‘True’ (or .T.) then the output, i.e.,
‘bill is approved for payment’ becomes true. If any of the conditions fails,
the bill is not approved.
Having identified the basic conditions for the above business rule,the BA
can further analyze it by asking the question – what does it mean by ‘Qty
ok’ or ‘Quality Ok’? Here he may have expand the above diagram to include
the conditions which lead to the state of Qty ok and quality ok. Perhaps
from real life, one can say the qty ok means that the delivered quantity on
the challan and the qty mentioned on the bill match. Further, it may also
require that the quantity on the bill <= (Qty mentioned in Puchase Order)
— (quantity already billed previously)
! !187
BUSINESS RULES PERSPECTIVE
It would be obvious from the previous example that to make the business
rule more rigourous, more conditions must be added to the AND gate. For
example if we wish add the condition that the Delivery time is equal to the
delivery time indicated in the Purchase Order. This additional condition
makes the business rule tougher thereby making the overall purchase and
store processes more stricter.
!
On the contrary if we wish to simplify the business rules, we have three
options:
• Remove a few conditions in the above AND gate — for example in small
companies where there are no formal purchase orders, the condition
pertaining to the purchase order is less thereby providing flexibility to do
cash purchase.
! !188
BUSINESS RULES PERSPECTIVE
8.11 SUMMARY
• Some of the business rules are well structured and can therefore easy to
automate.
• Several other types of business rules can be more difficult to find and can
be identified through observation and interaction with people in that
domain. Such business rules may include norms, practices etc.
! !189
BUSINESS RULES PERSPECTIVE
4. Write a note on remodelling the business rule using the Business Rules
Diagram.
! !190
BUSINESS RULES PERSPECTIVE
5. Business rules __________ begins with the desired end state assuming
the decision is taken and allows the BA to visualize the various Boolean
conditions which need to be met to arrive at this final decision state.
a. Policies
b. Diagram
c. Steps
d. Tests
! !191
BUSINESS RULES PERSPECTIVE
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
Video Lecture
! !192
THE HUMAN FACTORS PERSPECTIVE
Chapter 9
The Human Factors Perspective
Objectives
• To appreciate the need for the study of Human factors in the context of
Business Analysis
Structure
! !193
THE HUMAN FACTORS PERSPECTIVE
Gone are the days when Information technology was used only by a select
few in the central IT department. Increasingly lay users, people on the
streets, in rural areas and just about any one may interact with IT. It is
therefore important to understand the profile and characteristics of users of
people who are likely to use a solution.
It is this human centered approach which has made devices such as mobile
phones, smart phones, tablets so intuitive and accepted by society at
large.
! !194
THE HUMAN FACTORS PERSPECTIVE
! !195
THE HUMAN FACTORS PERSPECTIVE
The subject of HCI is about using the understanding of human factors and
design principles to design man-machine interaction which make machines
more usable and effective tool in the hands of human users.
The goals of HCI and usability are to make machines more usable. More
specifically usability can be described in terms of:
• Ease of learning
! !196
THE HUMAN FACTORS PERSPECTIVE
The development of the silicon chip has changed the way humans work,
play, and communicate. Although it may sound like a cliché, computers are
literally everywhere, and they are advancing at an astonishing rate. The
invention of new hardware, software, and interaction styles are opening up
new possibilities for computing every day. One of the biggest challenges
faced by HCI is keeping one step ahead of new technologies and new
methods of interaction. HCI research must match the evolution of
technology if the usability and efficiency of future devices and software is
to be ensured. The fundamental challenge is guaranteeing new designs
offer good HCI as well as harnessing the potential functionality of the new
technology.
Therefore, it may be useful for our community to lay out grand challenges
that steer the direction of future research, design, and commercial
development.
! !197
THE HUMAN FACTORS PERSPECTIVE
! !198
THE HUMAN FACTORS PERSPECTIVE
! !199
THE HUMAN FACTORS PERSPECTIVE
! !200
THE HUMAN FACTORS PERSPECTIVE
! !201
THE HUMAN FACTORS PERSPECTIVE
In the early days of computing only highly trained specialists could use
computers, and these were massive expensive machines really only found
in industry and research. Today, computers are everywhere, and the range
of knowledge and experience of different users is very broad. Unlike 30
years ago, the majority of computer users nowadays have not received
intensive specialised training.
Daily Life
Today computers permeate every aspect of our daily lives. Even if a person
does not directly own or use a computer, their life is affected in some way
by computing. ATM machines, train ticket vending machines, and hot
drinks dispensing machines are just a few examples of computer interfaces
a person can come into contact with daily without needing to own a
personal computer. HCI is an important factor when designing any of these
systems or interfaces. Regardless if an interface is for an ATM or a desktop
computer, HCI principles should be consulted and considered to ensure the
creation of a safe, usable, and efficient interface.
! !202
THE HUMAN FACTORS PERSPECTIVE
Accessibility
HCI is a key consideration when designing systems that are not only
usable, but also accessible to people with disabilities. The core philosophy
of HCI is to provide safe, usable, and efficient systems to everyone, and
this includes those with different sets of abilities and different ranges of
expertise and knowledge. Any system properly designed with HCI user-
centered techniques and principles will also be maximally accessible to
those with disabilities.
Software Success
Good use of HCI principles and techniques is not only important for the end
user, but also is a very high priority for software development companies.
If a software product is unusable and causes frustration, no person will use
the program by choice, and as a result, sales will be negatively affected.
Untrained users
Today, very few computer users actually read the manual accompanying
the software, if one exists. Only very specialised and advanced programs
require training and an extensive manual. Computer users expect to
understand the main functionality of an average program within a few
minutes of interacting with it. HCI provides designers with the principles,
techniques, and tools necessary to design effective interfaces that are
obvious and easy to use, and do not require training.
! !203
THE HUMAN FACTORS PERSPECTIVE
Although the devices used by majority of public are still some kind of plain
command/action setups using not very sophisticated physical apparatus,
the flow of research is directed to design intelligent and adaptive
interfaces. The exact theoretical definition of the concept of intelligence or
being smart is not known or at least not publicly agreeable. However, one
can define these concepts by the apparent growth and improvement in
functionality and usability of new devices in market.
First there were typewriters, then keyboards and now touch screen tablet
PCs that you can write on using your own handwriting, and they recognize
it change it to text and if not already made, tools that transcript whatever
you say automatically so you do not need to write at all. One important
factor in new generation of interfaces is to differentiate between using
intelligence in the making of the interface (Intelligent HCI) or in the way
that the interface interacts with users (Adaptive HCI).
Intelligent HCI designs are interfaces that incorporate at least some kind of
intelligence in perception from and/or response to users. A few examples
are speech enabled interfaces that use natural language to interact with
user and devices that visually track user’s movements or gaze and respond
accordingly.
Adaptive HCI designs, on the other hand, may not use intelligence in the
creation of interface but use it in the way they continue to interact with
users. An adaptive HCI might be a website using regular GUI (Graphical
! !204
THE HUMAN FACTORS PERSPECTIVE
User Interface) for selling various products. This website would be adaptive
-to some extent- if it has the ability to recognize the user and keeps a
memory of his searches and purchases and intelligently search, find, and
suggest products on sale that it thinks user might need. Most of these
kinds of adaptation are the ones that deal with cognitive and affective
levels of user activity.
Another example that uses both intelligent and adaptive interface is a PDA
or a tablet PC that has the handwriting recognition ability and it can adapt
to the handwriting of the logged in user so to improve its performance by
remembering the corrections that the user made to the recognized text.
! !205
THE HUMAN FACTORS PERSPECTIVE
1. The First Wave was the mainframe era, many people one computer.
2. Then it was the Second Wave, one person one computer which was
called PC era and
Most important factor of a HCI design is its configuration. In fact, any given
interface is generally defined by the number and diversity of inputs and
outputs it provides. Architecture of a HCI system shows what these inputs
and outputs are and how they work together. Following sections explain
different configurations and designs upon which an interface is based.
Based on the nature of different modalities, they can be divided into three
categories:
1. Visual-Based
2. Audio-Based
3. Sensor-Based
The next sub-sections describe each category and provide examples and
references to each modality.
! !206
THE HUMAN FACTORS PERSPECTIVE
Visual-Based HCI
Body movement tracking and gesture recognition are usually the main
focus of this area and can have different purposes but they are mostly
used for direct interaction of human and computer in a command and
action scenario.
! !207
THE HUMAN FACTORS PERSPECTIVE
Audio-Based HCI
• Speech Recognition
• Speaker Recognition
• Auditory Emotion Analysis
• Human-Made Noise/Sign Detections (Gasp, Sigh, Laugh, Cry, etc.)
• Musical Interaction
Sensor-Based HCI
! !208
THE HUMAN FACTORS PERSPECTIVE
Some of these sensors have been around for a while and some of them are
very new technologies. Pen-Based sensors are specifically of interest in
mobile devices and are related to pen gesture and handwriting recognition
areas.
A few research works are also done on area of taste and smell sensors;
however, they are not as popular as other areas.
! !209
THE HUMAN FACTORS PERSPECTIVE
One fundamental issue with usability of any device arises when the users
mental model of how such a device works deviates from the actual
interaction which he experiences. For example, we often hear users lament
how it is tedious to get a report from an ERP system whereas they can get
it in the manner in which they want in simple spreadsheet. What they do
not realize it does not help to apply the mental model of spreadsheet to a
transaction processing system. The BA should be able to identify major
shifts in the mental models required for users in a given environment and
notify the same to the designer so that the design could be made in a
manner which facilitates easy transition to new proposed system.
Use cases must therefore be reviewed from the usability standpoint before
accepting them for implementation.
Many a time, BAs and other project team members believe that we should
first get the functionality right and then beautify the screens. However, it is
often seen that good design has to be visualized right from the start to
avoid subsequent changes and client dissatisfaction.
! !210
THE HUMAN FACTORS PERSPECTIVE
• Usability goals
• Cultural and other aspects – e.g., the use of appropriate symbols, colors
suited in that culture
! !211
THE HUMAN FACTORS PERSPECTIVE
9.12 SUMMARY
! !212
THE HUMAN FACTORS PERSPECTIVE
1. Explain the need for the study of human factors in the context of
Business Analysis.
! !213
THE HUMAN FACTORS PERSPECTIVE
! !214
THE HUMAN FACTORS PERSPECTIVE
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
Video Lecture
! !215
SECURITY AND COMPLIANCE PERSPECTIVE
Chapter 10
Security And Compliance Perspective
Objectives
Structure
10.2 What is Negative Testing and Tips on Writing Negative Test Cases?
10.6 Summary
! !216
SECURITY AND COMPLIANCE PERSPECTIVE
These standards also require regular review of the processes and therefore
it is equally important to provide for audit trails to demonstrate that the
controls are working and provide evidence of this.
! !217
SECURITY AND COMPLIANCE PERSPECTIVE
Many of us know that there are different types of testing needs to perform
to make application defect free like Functional testing, Integration testing,
system testing, regression testing, sanity testing, smoke testing, alpha and
beta testing, UAT testing etc.
If we think deeper, then you definitely realize that each testing activity is
further divided in to two different categories:
Negative testing
! !218
SECURITY AND COMPLIANCE PERSPECTIVE
In negative testing, we find different ways to make the application cry i.e.
it crashes and handles that crash in a graceful way.
For example, if there is a text box which can take only numeric values,
enter an alphabet and test it. It should be able to handle that input and
throw an expected outcome which could be an error message or a pop-up
box saying “invalid value entered” etc.
Let’s take one more example to understand negative test scenario related
to a music application. Say an application named “Abc” can add up to 100
songs at a time in the playlist, so here 100 is our boundary value and when
we enter 101 song to the existing playlist, what would be the outcome?
Will that throw an exception? Or a warning message to the user? Or will it
restrict user to add more songs? Or will application crash?
These were few expected outcomes and reaction of the application to this
test scenario will depend on the requirements. Different music applications
will have different expected results for the same test case.
Stress testing, Load testing and Stability testing are parts of negative
testing.
If you closely observe, you will notice that there can be multiple positive
and negative scenarios in every example. Effective testing is when you
optimize an endless list of positive and negative scenarios in such a way
that you achieve sufficient testing.
Also, you will see a common pattern on how the scenarios are devised.
There are two basic parameters or techniques that formed a basis for
designing sufficient amount of positive and negative test cases.
! !219
SECURITY AND COMPLIANCE PERSPECTIVE
! !220
SECURITY AND COMPLIANCE PERSPECTIVE
2. Equivalence Partitioning:
In Equivalence partitioning, the test data are segregated into various
partitions. These partitions are referred to as equivalence data classes. It is
assumed that the various input data (data can be a condition) in each
partition behave the same way. Hence, only one particular condition or
situation needs to be tested from each partition as if one works then all the
others in that partition is assumed to work. Similarly, if one condition in a
partition doesn’t work, then none of the others will work.
Therefore, it’s now very apparent that valid data classes (in the partitions)
will comprise of positive testing whereas invalid data classes will comprise
of negative testing.
In the same VLAN example above, the values can be divided into say two
partitions.
Those who understand and strive for high standards and quality will
doubtlessly enforce negative testing as a must in the quality process.
! !221
SECURITY AND COMPLIANCE PERSPECTIVE
While positive testing ensures that the business use case is validated,
negative testing ensures that the delivered software has no flaws that can
be a deterrent in its usage by the customer.
We will see how to write negative test cases with an example. Same rules
will apply to any software application.
Now, for above 3 requirements, let’s make few negative test scenarios.
Test case 5: Try and add more than 2000 people in the friend list. (This
can be automated, manually it will take a lot of time)
Test case 6: Enter a birth year which calculates your age in negative.
Test case 7: Enter a birth year which calculates your age in minor
category.
! !222
SECURITY AND COMPLIANCE PERSPECTIVE
• If you load input data from a file, change its contents so that it contains
both valid and invalid data values. Please keep in mind that when using
invalid values, you need to build your test so that an error message is
not considered as an unexpected window and if this message appears,
the test passes successfully, which means that the tested application
works correctly.
• If you input some data manually, create both a test with the correct input
value and a test with invalid data. For example, try to create a file with
an invalid name (for example, *NewFile.txt). In this case, the application
must show an error message (for example, "Invalid file name. The file
name must start with a letter, digit or underscore.") or fail to create the
file.
As you can see, negative testing improves the testing coverage of your
application. Using the negative and positive testing approaches together
allows you to test your applications with any possible input data (both valid
and invalid) and can help you make your application more stable and
reliable.
! !223
SECURITY AND COMPLIANCE PERSPECTIVE
A negative scenario is based out of the box thinking and has no limitations
of how much you can explore. Bugs found during Negative Testing are
always crucial since they are found by keeping user in mind. It requires
skills and better understanding of the application to test it in a negative
way. Tester can also automate negative test case and automation can also
be used to load the application with data or to do stress testing on it. When
you want a high-quality application, both testing should be given equal
importance.
Since testing is time and cost consuming task, deciding 'what', 'how' and
'how much' to test is really important. We have to choose wisely whether
we have to do negative testing in our system or not. So, let's have a look
on the importance of negative testing.
! !224
SECURITY AND COMPLIANCE PERSPECTIVE
A. Organization Perspective
Maybe we can't build a 100% error free system, but we have to make sure
that we have done everything to prevent a failure, in order to achieve that
we should do negative testing.
The impact is one factor which we have to consider. Consider we have done
positive testing on an e-commerce site and make sure everything is fine.
But what if there is a loophole in our system that someone can do SQL
injection and erase all our data. That will be a great security breach. To
avoid this type of cases, one has to do negative testing too.
For applications open for public, mainly websites we have to always keep in
mind that we don't have much control the using procedure of the
application, so we have to do negative testing to make sure that all such
cases are covered and contained.
Another thing we need to take care is that there are lot of black hackers
out there who is looking for an opportunity to destroy the system. Hacking
is an important case covered in negative testing
B. Client Perspective
The only concern to the client regarding negative testing is that the cost.
But once the impact is analyzed it is up to the client to decide whether to
do or not negative testing.
! !225
SECURITY AND COMPLIANCE PERSPECTIVE
Like all other testing techniques, there are pros and cons for negative
testing mainly based on the 'where', 'when' and 'how' to use. Let's take a
look on this.
Pros
2. Doing negative testing makes sure that all possible cases are covered.
Intentionally or unintentionally there is a chance of negative test cases
to occur. So, to make sure all cases are covered we have to do negative
testing along with positive testing.
3. Negative testing will make more confidence to the client before going
live.
Cons
4. Chance that team spends more time and energy on negative testing.
There is a chance that testers spend a lot of time and energy in
negative testing that results in a lower concentration in positive testing
! !226
SECURITY AND COMPLIANCE PERSPECTIVE
Negative test cases are designed to test the software in ways it was not
intended to be used, and should be a part of your testing effort.
Below are the top 10 negative test cases you should consider when
designing your test effort:
! !227
SECURITY AND COMPLIANCE PERSPECTIVE
8. Date Validity
For date fields, it is important to ensure that invalid dates are not allowed
(04/31/2007 is an invalid date). Your test cases should also check for leap
years (every 4th and 400th year is a leap year).
! !228
SECURITY AND COMPLIANCE PERSPECTIVE
Trusting the results of your software tests is one of the most delicate
subjects and thinking negatively about it is an important aspect today. It is
said that testers should not only test for the positive results i.e. whether
the system functions as expected with valid inputs, but also check for
negative value tests i.e. if the application works with quality under
provided invalid inputs.
It is always seen that 85% of the test cases passed are related to only
70% of the total requirements. The other 30% are for failed negative value
testing which is often overlooked. So, the final aim of any software testing
should be to make it 100% reliable and quality application.
Positive Testing
Any software system is highly vulnerable to inappropriate data. This seems
scary, isn’t it? The end users sooner or later always find a way to divert
from the ethical ways, which is dangerous and risky. The positive testing
helps the administrators to quickly understand & learn these practices to
fix issues in no time.
! !229
SECURITY AND COMPLIANCE PERSPECTIVE
Negative Testing
Done to identify known set of test Done with unknown set of test
4
conditions conditions
To check whether all client
Anything that is not mentioned in the
5 requirements are met while doing
client requirement is tested
the project
! !230
SECURITY AND COMPLIANCE PERSPECTIVE
10.6 SUMMARY
• Along with security comes compliances of various kinds – some which are
industry specific while others which are broader in nature. Each
compliance and governance standard specifies the need for adequate
controls and the evidence that these controls work.
• For compliance and governance – the BA must study these standards and
identify requirements for controls and for providing evidences and audit
trails.
! !231
SECURITY AND COMPLIANCE PERSPECTIVE
! !232
SECURITY AND COMPLIANCE PERSPECTIVE
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
Video Lecture
! !233
THE ENTERPRISE PERSPECTIVE
Chapter 11
The Enterprise Perspective
Objectives
• To learn about various tools and frameworks for the analysis of the
enterprise
Structure
! !234
THE ENTERPRISE PERSPECTIVE
For convenience, we could divide the analysis of the enterprise into several
layers – one above the other as follows:
While the study of the first two layers is generally part of any requirements
study, a study of the other contextual layers helps in identifying any
expectations about the business process or the IT application which may
arise from them.
! !235
THE ENTERPRISE PERSPECTIVE
! !236
THE ENTERPRISE PERSPECTIVE
! !237
THE ENTERPRISE PERSPECTIVE
! !238
THE ENTERPRISE PERSPECTIVE
that the proposed solution will consume and weighs against the tangible
benefits that the solution will offer.
Many able consultants, both individuals and firms, offer enterprise analysis
services that are useful to organizations that may be less experienced or
familiar with enterprise analysis. A few examples of these services include
! !239
THE ENTERPRISE PERSPECTIVE
The IIBA BoK version 2.0 describes Enterprise Analysis as being composed
of the following subprocesses:
! !240
THE ENTERPRISE PERSPECTIVE
• Employees
- May wish to see their earnings and deductions so far and estimated for
the year.
• Payroll executive
• Payroll Manager
- Would expect the software to help improve the scalability, accuracy and
productivity of his payroll department.
! !241
THE ENTERPRISE PERSPECTIVE
• CEO/President HR
- He may also need decision support to work out the Cost to Company
(CTC ) for a given band, level, grade , designation so that he can
identify ways to plan financial incentives.
• Accounts
- They also need to book the data to be sent to them in a manner which
can easily be merged into the accounting system.
! !242
THE ENTERPRISE PERSPECTIVE
One of the frameworks which can help an analyst to study these various
stakeholders from an enterprise point of view is the Zachman's framework.
Perspecti
ves and
questions
to ask
Data Process Network People Time Need
Planner
Stakehol
ders Process
Owner
Designer
Developer
System
Integrator
User
The Zachman's framework has two dimensions. The rows represents the
various stakeholders and the columns represent the various perspectives
which each of these stakeholders may have.
• Planner CEO/President HR
• Process Owner – Payroll Manager
• Designer/Developer/System Integrator – are all roles within the
development team
• User – could include direct users such as the employee, payroll
executives and indirect users such as accounts executives etc.
! !243
THE ENTERPRISE PERSPECTIVE
For example, the question 'where?' (Network) with reference to the user as
a stakeholder would raise questions such as:
You will realize that the Zachman’s framework helps the analyst to
generate a plethora of questions to ask – most of these questions are
either at a process level, management level or enterprise level. Hence,
Zachman’s framework is a very powerful tool for enterprise analysis if used
effectively by the analyst.
! !244
THE ENTERPRISE PERSPECTIVE
clients' place and the developers and other technical teammates are
located in the offshore base. Hence, he has to study the requirements from
the standpoint of the designers, integrators etc. Several functional as well
non-functional requirements such as performance expectations, interface
requirements, security requirements, target hardware and software
platforms for which the solution is designed are important from the inputs
which the BA should capture during his on-site visit since they are of
immense importance to the technical team.
! !245
THE ENTERPRISE PERSPECTIVE
! !246
THE ENTERPRISE PERSPECTIVE
2. How (function): how does the business work, i.e., what are the
business' processes?
4. Who (people): who are the people that run the business, what are the
business units and their hierarchy?
5. When (time): when are the business processes performed, i.e., what
are the business schedules and workflows?
6. Why (motivation): why is the solution the one chosen? How was that
derived from? What motivates the performance of certain activities?
! !247
THE ENTERPRISE PERSPECTIVE
3. Designer's View (System Logic): This view outlines how the system
will satisfy the organization's information needs. The representation is
free from solution specific aspects or production specific constraints.
a. Each cell in the Zachman Framework must be aligned with the cells
immediately above and below it.
b. All the cells in each row also must be aligned with each other.
! !248
THE ENTERPRISE PERSPECTIVE
"
The Zachman Framework is an ontology (In information technology, an
ontology is the working model of entities and interactions in some
particular domain of knowledge or practices) which helps to create the
structure rather than a methodology which provides the transforming
process. In practice, Zachman Framework is quite popular, since it can be
applied with other frameworks that emphasize the process.
! !249
THE ENTERPRISE PERSPECTIVE
The identified current state serves as a baseline for defining a gap between
the existing and required new capabilities.
! !250
THE ENTERPRISE PERSPECTIVE
The defined solution approach and required new capabilities enable the
definition of solution scope. Solution scope should be aligned with project
scope.
The business case is the output of EA. It specifies the business need,
required new capabilities, approach to the realization of the specified new
capabilities, project and solution scope, time and cost estimations,
assumptions and constraints, and finally justification of feasibility to
undertake the project.
The table below summarises some of the techniques which could be used
at various levels of the Zachman's framework.
! !251
THE ENTERPRISE PERSPECTIVE
! !252
THE ENTERPRISE PERSPECTIVE
While applying the Zachman's framework and many other tools and
techniques, the focus tends to be on the tangible business aspects. The BA
must however keep in mind that business processes and software solutions
work in human organizations. The Zachman’s framework does require the
BA to look at the people aspect. This usually tends to be in the form of the
experience of users with technology, motivation to use the solution etc.
However, the larger cultural context of the organization, the underlying
philosophies of running business, current levels of positive energy within
the organizations etc. are important aspects to study.
While the business case is about the need and value of a solution to an
organization, the practicality of the solution in atleast four ways, viz.,
financial (economic), technical, operational and schedule needs to be
assessed.
! !253
THE ENTERPRISE PERSPECTIVE
The above table indicates the broad approach required for investments in
solutions depending on two broad dimensions, viz., Costs and Benefits –
each being either soft meaning difficult to quantify exactly (or nebulous) or
hard where they can be precisely measured.
! !254
THE ENTERPRISE PERSPECTIVE
they meet with success they may lead to the discovery of a turnaround or
strategic solution for the business.
Similarly, many handheld devices are recommended these days. One of the
operational issue with these handheld devices is the charging of the
battery. As long as the handheld device is assigned to a defined person and
he carries it with him and takes the responsibility of charging it there is
less problem. But if it is assigned to a central department who issues it for
a limited period for a given task, the onus of charging the battery falls on
the issuing department. This creates an operational bottleneck since this
department would perhaps have to charge 50, 110 or even more handheld
devices before issuing every day.
! !255
THE ENTERPRISE PERSPECTIVE
The above are two simple examples of how operational feasibility needs to
be studied with great care and the requisite manual procedures associated
with the IT systems need to be considered will looking at the feasibility of
the solution.
This refers to the possibility of completing the IT project within the given
schedule expected by the users and business planners. The constraints
could come from many directions. For example
• the sheer timing during the year, for e.g., last quarter of a financial year
is a difficult time to get business users' support for implementing
anything new due to year-end target pressures,
! !256
THE ENTERPRISE PERSPECTIVE
• other competing projects and the demand for any common resources.
Thus, BA should check the possibility and the upfront risk which an new IT
initiative may face due to some of the above factors making it difficult to
complete it during the given schedule.
11.13 SUMMARY
• Finally, the assessment of the value which and IT initiative brings to the
organization needs to be assessed. The value of the solution must be
analysed. This is embodied in a Business Case.
! !257
THE ENTERPRISE PERSPECTIVE
3. Describe the various tools and frameworks required for the analysis of
the enterprise.
2. Which of the following is a layer that we could divide the analysis of the
enterprise into one above the other for convenience?
a. The immediate layer which includes the process itself or the IT
application
b. Processes and IT applications with which it has to interact and
interface
c. The external competitive business environment
d. All of the above
! !258
THE ENTERPRISE PERSPECTIVE
! !259
THE ENTERPRISE PERSPECTIVE
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
Video Lecture
! !260
VISUALIZING IT BASED SOLUTIONS
Chapter 12
Visualizing IT Based Solutions
Objectives
Structure
! !261
VISUALIZING IT BASED SOLUTIONS
! !262
VISUALIZING IT BASED SOLUTIONS
!
Defining the Scope by Drawing a Boundary in a Data Flow Diagram
The use case method is a popular method among BAs for visualizing IT
solutions. The Use case method can be summarized as follows:
• Visualize the actual dialog between the user and the system in executing
the use case
! !263
VISUALIZING IT BASED SOLUTIONS
One way to identify such users is to send out a mail to all departments
announcing your intent to develop a particular solution covering a certain
business process and asking them about their expectations from such a
system.
The purpose of identifying direct and indirect users is that while the former
would require design of a dialog which best suits the users' background
and motivation for using the system, the latter would require the design of
an interaction suited to the agent of such a user as well as the supply of
output such as reports etc. which the indirect user seeks to have from the
system.
! !264
VISUALIZING IT BASED SOLUTIONS
The BA must, therefore, always ask this question as whether there is any
external stakeholder who may expect something or can benefit from access
to the proposed solution.
Writing a use case is akin to writing a dialog – in this case between a user
and the system. This is usually written first at a higher level in the
language easily understood by a user. Such use cases are known as
functional use cases. Gradually, once the technology associated with
implementing the use case is decided, the use case can be modified to
reflect technical level details in the interaction. Such use cases may or may
not be understood by lay end-users. They are therefore known as technical
use cases.
For most part, BAs writing functional use cases. However, since the nature
of the interface device such as website, desktop screen, smart phone, ATM
etc. is already known. Many BAs write use cases which include the use of
appropriate technical terms such as screen, home page etc. which are by
and large understood by end-users.
! !265
VISUALIZING IT BASED SOLUTIONS
Here are Some Steps to Guide you through the Writing Process. These
Steps Are Divided in Three Parts
Part 1
For example, you could write use cases about logging into a system,
managing an account or creating a new order.
For example, if you were writing a use case about how an ATM machine
functions, the stakeholders would include the bankers and the ATM owners.
They are not present when the user uses the ATM machine to withdraw
cash. However, they must be satisfied that systems are in place to verify
! !266
VISUALIZING IT BASED SOLUTIONS
the amount of money in the user’s account before dispensing cash and to
create a log of transactions in the event of a dispute.
Part 2
All of these elements are required in every use case. Use cases accumulate
scenarios. They define how a user uses a system, what happens when the
system succeeds, and what happens when it fails. Each scenario describes
a procedure and what happens as each step progresses.
a. Users are all of the people who will engage in the activities described in
the use case. For example, if you are writing a use case for logging into
a software system, the users would be anyone who must log in.
b. Preconditions are those elements that must be in place prior to the start
of the use case. For example, users with permission to use the system
have been identified and entered into the system ahead of time, so the
system will recognize their usernames and passwords when entered.
c. The basic flow is the procedure the users use to achieve the primary
goal of the system and how the system responds to their actions. For
! !267
VISUALIZING IT BASED SOLUTIONS
example, the user inputs a username and a password, and the system
allows the user in.
d. Alternate flows explain less common actions. For example, the user is
on a different computer and must answer a security question.
e. Exception flows detail what happens when the user cannot achieve the
goal. For example, the user inputs an invalid user name or password.
f. Post conditions are those elements that must be present when the use
case is completed. For example, the user can proceed to use the
software.
a. Alternate flows and exception flows are written to describe the actions
when there are obstacles to the goal.
b. If the user is denied access because the system didn’t recognize her
computer, she may be prompted to verify her identity by answering a
security question.
! !268
VISUALIZING IT BASED SOLUTIONS
Part 3
The use case explains the goal of the technology or process, not how the
technology functions. In other words, a use case about logging in to
software does not include how the code must be written or how the
technological components are connected. It simply focuses on what the
user needs to do and how the software responds.
a. Get the level of detail right. For example, if writing a use case about
implementing technology, don't exclude details about how the
software responds to users.
Use cases do not need to include complex flow charts or visual diagrams
that explain the process. Simple flow charts can often be used to clarify
information. However, the use case should be largely word-based. The
style of writing should be very simple so that others can read and
comprehend it without specific training.
Writing a good use case helps you learn exactly how a piece of software or
business process works. It educates you and the reader about the correct
use of applicable vocabulary. This way, you know you are not using
! !269
VISUALIZING IT BASED SOLUTIONS
Author: XYZ
! !270
VISUALIZING IT BASED SOLUTIONS
Date: …/.../...
Version: 1.0
The above describes the normal flow – the alternate flows and exceptions
are shown below:
Alternate flows:
Exceptions
! !271
VISUALIZING IT BASED SOLUTIONS
• The header block of a use case looks like the source code of a program.
It contains information to identify the use case. As the functionality of
the device is changed, the first place to implement the change is in the
Use case document and later make those changes in the actual program
corresponding to the use case.
• The pre-condition is a declaration about the state of the system and the
user at before the logic for the use case begins. Thus, in the case above,
the customer has already put his ATM card and the ATM has validated
him and the ATM is now ready to interact with him. This takes away the
need to describe the interaction related to validation. In fact, it may be a
better idea to write a separate use case on validating and logging in a
customer. This use case could be a prerequisite for all other transaction
use cases for the ATM customer and there would be no need to write it
many times.
• The dialog is usually written assuming the normal or usual choices which
a user could make. The other options are treated as alternate flows.
Thus, in the above example, the customer is assumed to select the
option ‘Amount is ok Y’ in most circumstances. The alternate flow is when
the customer wishes to change the amount to be withdrawn. These
alternate flows are documented separately.
• Exceptions are all possibilities of things which could go wrong during the
interaction. These could include failure of the device or some part of it,
user mistakes etc. These BA should then think about appropriate
solutions to these exceptions.
! !272
VISUALIZING IT BASED SOLUTIONS
keypad etc. since the technology is known. In case the nature of the
technology is unknown or we wish to consciously leave the choice of the
technology open at this point of time, we could prefer a technology
neutral description – for example we could say the ATM asks without
assuming the nature of the interface.
• Based on the above use case, the screens required to manage this
interaction which would also include prompts, messages, error messages
etc. can be identified and designed.
Use Cases can also be used as a means of estimation of effort and for
project sizing. Although this is not a perfect science as yet considerable
papers have been written on the same. The length of the use case and
complexity of the dialog in the use case can be the basis for estimation.
Hence, if a software solution has 50 use cases, they can be classified into
simple, medium and complex and accordingly effort could be estimated.
However, one limitation of use cases is that they represent only the
interactive elements of a system. There could several back-end updation
and other processes which are not visible in the use case dialog. This
makes estimation a little difficult.
! !273
VISUALIZING IT BASED SOLUTIONS
Increasingly, lay users interact with systems. Hence, the interaction and
the design of the device should be such that it not only makes it user-
friendly, but also easy to learn, to remember, is safe and secure. In
consumer devices, the design should be a step further and provide a
unique customer experience or delight through the aesthetic look and feel
and its other features.
A use case is a written description of how users will perform tasks on your
website. It outlines, from a user’s point of view, a system’s behaviour as it
responds to a request. Each use case is represented as a sequence of
simple steps, beginning with a user's goal and ending when that goal is
fulfilled.
Use cases add value because they help explain how the system should
behave and, in the process, they also help brainstorm what could go
wrong. They provide a list of goals and this list can be used to establish
the cost and complexity of the system. Project teams can then negotiate
which functions become requirements and are built.
3. Scenarios can help identify usability targets and likely task completion
times.
! !274
VISUALIZING IT BASED SOLUTIONS
Depending on how in depth and complex you want or need to get, use
cases describe a combination of the following elements:
d. Preconditions: what must be true or happen before and after the use
case runs.
e. Triggers: this is the event that causes the use case to be initiated.
! !275
VISUALIZING IT BASED SOLUTIONS
Method
2. Identify intended users, their tasks and the general context. This
information will provide the basis for the scenarios to be created by the
development team.
5. Create an outline of the users' activities, goals and motivations for using
the system being designed, and the tasks they will perform.
8. The session can be videotaped for later review or transcribed for wider
distribution.
9. The results from scenario building sessions can be used to plan user-
based evaluations.
! !276
VISUALIZING IT BASED SOLUTIONS
Practical Guidelines
Try to generate scenarios to cover a wide range of situations, not just the
most common ones or those of most interest to the design team.
Try to include problem situations that will test the system concept, not just
straightforward scenarios.
Work through the scenarios fully and judge the system on that basis rather
than trying to change the system half way through.
Scenarios can also be used later to explore how the interface would be
operated.
Next Steps
Use the scenarios as a basis for developing more specific usability
requirements.
! !277
VISUALIZING IT BASED SOLUTIONS
Meanings of Usability
The word "usability" has become a catch-phrase for products that work
better for their users, but it is difficult to pin down just what people mean
by it is ‘usability.’
! !278
VISUALIZING IT BASED SOLUTIONS
1. Effective
2. Efficient
3. Engaging
4. Error Tolerant
5. Easy to Learn
Effective
! !279
VISUALIZING IT BASED SOLUTIONS
The quality of the user assistance built into the interface can have a strong
impact on effectiveness. The effectiveness of an interface often relies on
the presentation of choices in a way that is clearly understandable to the
user. The more informative an interface can be, the better users are able to
work in it without problems. Good interface terminology will be in the
user’s language and appropriate to the task.
Efficient
Efficiency can be described as the speed (with accuracy) in which users can
complete the tasks for which they use the product. ISO 9241 defines
efficiency as the total resources expended in a task. Efficiency metrics
include the number of clicks or keystrokes required or the total ‘time on
task’
It is important to be sure to define the task from the user’s point of view,
rather than as a single, granular interaction. For example, a knowledge
base which doled out small snippets of information might be very efficient
if each retrieval was considered one task, but inefficient when the entire
task of learning enough to answer a user’s question is considered.
Making the right choices for efficient use of the software depends on an
understanding of the users and how they prefer to work. For example, are
they likely to use the interface infrequently or to be habitual users who
might learn hidden controls and shortcuts? Do they use the keyboard,
mouse or other input devices? For example, keyboard shortcuts can be
extremely efficient for proficient users who work with the interface
intensively. If they are the primary interaction tool, they can slow down
! !280
VISUALIZING IT BASED SOLUTIONS
users who are unfamiliar with them, or with the software. Similarly, an
interface structured around a set of hierarchical choices which may be the
best solution for one-time or infrequent users, might be frustratingly slow
as the only way of interacting with a frequently-used program.
Engaging
Error Tolerant
The ultimate goal is a system which has no errors. But, product developers
are human, and computer systems far from perfect, so errors may occur.
An error tolerant program is designed to prevent errors caused by the
user’s interaction, and to help the user in recovering from any errors that
do occur.
Note that a highly usable interface might treat error messages as part of
the interface, including not only a clear description of the problem, but also
direct links to choices for a path to correct the problem. Errors might also
occur because the designer did not predict the full range of ways that a
user might interact with the program. For example, if a required element is
missing simply presenting a way to fill in, that data can make an error
message look more like a wizard. If a choice is not made, it can be
! !281
VISUALIZING IT BASED SOLUTIONS
For those errors which are out of the control of the interface – system
failures or other disasters - take a lesson from flight attendants and
quietly, calmly guide the user through the process of helping the program
recover from the problem.
d. Plan for the unexpected. Allow for users to add new entries, take
exceptional routes through the interface or make choices you did not
predict. Be polite about "correcting" mistakes that may arise from this
lack of foresight.
Easy to Learn
One of the biggest objections to "usability" comes from people who fear
that it will be used to create products with a low barrier to entry, but which
are not powerful enough for long, sustained use.
But learning goes on for the life of the use of a product. Users may require
access to new functionality, expand their scope of work, explore new
options or change their own workflow or process. These changes might be
instigated by external changes in the environment or might be the result of
exploration within the interface.
! !282
VISUALIZING IT BASED SOLUTIONS
Finding the right balance between the usability characteristics for the
specific design context is an important part of the user analysis. The
difference in emphasis is helpful in understanding distinctions between user
groups and in thinking through the implications for the interface design.
Two fictional examples show this at work.
a. Effective: Users were most concerned that they had accurately found
all of the options which applied to them, and that they understood all
the implications of any choice they made.
b. Easy to Learn: The site used infrequently. When they did visit it, users
needed information about difficult life events, often under personal
! !283
VISUALIZING IT BASED SOLUTIONS
stress. Users did not expect to gain any mastery of the site and wanted
guidance through any procedures.
e. Error Tolerant: They assumed that they could trust the site to make
calculations correctly. This characteristic was last in their priority,
assuming that the system would not make mistakes.
a. Efficient: The users saw registration as a simple task and were not
willing to spend much time on it, especially compared to filling in a
paper form.
b. Error Tolerant: They were concerned that the system might make
mistakes in processing their choices, and wanted good validation,
confirmation and error notification during the process. They also wanted
to be sure that they could change their minds without needing to start
the process over.
! !284
VISUALIZING IT BASED SOLUTIONS
e. Easy to Learn: Because they saw the task as simple, users assumed
that they would be able to complete it without assistance.
Although the examples above are fictional, they illustrate one way to use
the five usability characteristics to understand the user requirements and
mental model for a task. By breaking down the generalized concept of
usability into specific areas, the users can be understood in a multi-
dimensional way, and usability becomes more than a simple requirement
that the program be "easy to use.”
There are several benefits of this exercise. The first is to help specify the
user groups. When a group of statements seems correct for one user, but
not for another, this may be exposing important differences in user
requirements. Another is to force the user analyst into a clear and concise
expression of user needs. Finally, it can be a useful tool to build a
consensus within a team on the user analysis.
This exercise can be done at the beginning of a project, even before any
user analysis or observation has been done. In this version, the work
focuses on the group’s current understanding of users. Points of
disagreement indicate a need for better understanding of users. Points of
agreement can be confirmed through analysis. The set of statements for
each identified target user group serves as a benchmark for future work.
After user analysis, the exercise is repeated. Places where the team’s initial
version differs significantly from the post-analysis version, it needs careful
attention to be sure the implications for the design are understood.
! !285
VISUALIZING IT BASED SOLUTIONS
Usability goals can also be tied to the five characteristics. Each user need
statement can be turned into a usability goal or requirements. For
example, requirements can be specified with a range of acceptable values,
such as:
3. Engaging: "At least 80% of employees will express comfort with using
the online system rather than visiting the HR office."
4. Error Tolerant: "The system will validate all housing, meal and tutorial
choices and allow the user to confirm pricing for these options before
completing the registration."
An interface that fails in this will not be usable, even if it meets other
requirements. In fact, this basic failure will likely cause failures in other
areas. For example, if the registration is difficult to learn, users are likely to
take longer to complete the task, exceeding efficiency targets, and be less
accurate, failing in effectiveness.
! !286
VISUALIZING IT BASED SOLUTIONS
Understanding specific targets for these usability goals also helps plan
usability evaluation. The testing techniques selected may vary, depending
on which of the characteristics you are most interested in. Some can be
tested with early prototypes or even paper mockups, but others require
working software or very high-fidelity prototypes.
Time (or count clicks or page views) realistic tasks. Must use
Efficient
working versions of the software and plausible sample data.
Evaluate tasks for how accurately they were completed, and
Effective
how often they produce errors.
Conclusion
The five E’s (effective, efficient, engaging, error tolerant, easy to learn)
provide the practitioner with a set of characteristics which can be used to
organize and analyze information from users. They offer trace-ability from
initial information-gathering through requirements setting and finally in
evaluation. This might allow the understanding of the specific needs around
each characteristic to grow or be an opportunity to confirm whether the
user requirements were chosen correctly in the early stages of the project.
! !287
VISUALIZING IT BASED SOLUTIONS
In either case, they let you go beyond "ease of use" in a practical way and
help make it easier to make products more usable.
The IIBA version 2.0 describes the various processes associated with
solutions. Some of these include:
• Define needs
• Define solution scope
• Define approach to solution
• Solution verification
• Solution validation
The IIBA version 2.0 does not directly deal with the topic of Solution
visualization perhaps rightly so because this could be within the purview of
the software designer and not the BA. However, in practice, it is found that
since the BA is the only person travelling to client location he has the best
opportunity to bounce off thoughts about the solution with the user. Hence
as described in the chapter on requirements gathering, it may be ideal to
model the requirements while still on site and develop a vision for the
solution — parts of which could be discussed with the user along with the
requirements. This would serve as a good input for the designer who works
offshore.
The IIBA version 2, however, does lay emphasis on solution verification and
validation. This is usually done with the help of test cases identified during
the requirement analysis phase where sample transactions which can be
used as acceptance criteria are identified. Also the documented
requirements serve as a basis for verifying and validating the solution.
! !288
VISUALIZING IT BASED SOLUTIONS
12.14 SUMMARY
! !289
VISUALIZING IT BASED SOLUTIONS
3. Indirect users are those users who may directly interact with the system
but may not be beneficiary of information and other outcomes of the
system.
a. True
b. False
! !290
VISUALIZING IT BASED SOLUTIONS
! !291
VISUALIZING IT BASED SOLUTIONS
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
Video Lecture
! !292
REQUIREMENTS DOCUMENTATION
Chapter 13
Requirements Documentation
Objectives
Structure
13.9 Summary
! !293
REQUIREMENTS DOCUMENTATION
• It ensures that the requirements expressed are taken forward into the
design of the solution.
! !294
REQUIREMENTS DOCUMENTATION
• It is readable.
• It does not have any vague words such as ‘some’, ‘few’, ‘etc.’ but actually
lists out what needs to be enumerated.
! !295
REQUIREMENTS DOCUMENTATION
i. Solution glossary
!
! !296
REQUIREMENTS DOCUMENTATION
a. Current State Analysis: Once a project has been mandated and the
Project Initiation Document (PID) is drafted, a business analyst can
start to work on requirements gathering. In my experience the best way
to tackle this task is to start from current state analysis. It helps
understand the business need, primary pain points, business processes
affected, the stakeholders involved in these processes, and so on.
!
The main purpose of the analysis is to present the “AS IS” state: the
existing business context, background, business functions and existing
business processes, and finally stakeholders involved in these business
processes. Depending on the project nature, some components of the
underlying infrastructure can be included in the document as well.
A Current State Analysis document lists the key pain points within the
identified business processes and tasks within them and highlights the
areas where a change is expected.
! !297
REQUIREMENTS DOCUMENTATION
The business analyst adds the high-level requirements which are within
the scope of the project and marks each requirement as compulsory or
optional. To clearly define the project scope and avoid ambiguity, all out-
of-scope requirements are also listed at the end of the section.
Based on the results of the current state analysis, the business analyst
describes the current business context, the key business processes and
services used to support them. After that the required changes are
mapped to the current business context. It can be a good idea to present
! !298
REQUIREMENTS DOCUMENTATION
First, the business analyst recaps the problem statement from the
Project Vision artifacts. The solution statement describes the target
audience of the solution, what will be satisfied by the solution and what
the key benefits will be. The statement of differentiation of the solution
from possible alternative options is added as a conclusive point in
positioning of the solution.
The next section presents the business context in its future "to be" state.
It's a good idea to include a diagram illustrating the key changes and
additions to the existing state, as well as a brief narrative to clarify the
proposed changes.
Similarly, to the Project Vision document, the features that are out of
scope are clearly listed in the last section to make sure everyone is on
the same page with regards to what will be implemented.
! !299
REQUIREMENTS DOCUMENTATION
It also describes the future state: the proposed business processes and
the “to be” information environment. The new processes are
accompanied with narratives to facilitate communication of the proposed
! !300
REQUIREMENTS DOCUMENTATION
changes to stakeholders and business end users. This “as is” section
reiterates the findings of the Current State Analysis document, however
here they are aligned with the changes to supporting business services.
f. Use Case Model: The Use Case Model lists all the scenarios for using
the solution required by the business stakeholders. It is useful to
describe the solution as a set of functional areas and group the
scenarios as per functional area. Such an approach allows to use this
document more efficiently in communication with the business
stakeholders as they can easily refer to the sections of their interest.
The model lists all possible scenarios in scope, their brief summary,
actors involved in each scenario, frequency of use, triggering events and
the two possible outcomes – success and failure.
! !301
REQUIREMENTS DOCUMENTATION
! !302
REQUIREMENTS DOCUMENTATION
It's a good practice to divide the solution into functional areas. These
functional areas serve as small knowledge domains for the stakeholders
involved in the project. This document serves as a reference point for all
the previously discussed documents.
! !303
REQUIREMENTS DOCUMENTATION
• Functional Requirements
! !304
REQUIREMENTS DOCUMENTATION
• Non-functional Requirements
! !305
REQUIREMENTS DOCUMENTATION
! !306
REQUIREMENTS DOCUMENTATION
! !307
REQUIREMENTS DOCUMENTATION
! !308
REQUIREMENTS DOCUMENTATION
! !309
REQUIREMENTS DOCUMENTATION
With that said, what's the point of building a system no one wants to use?
Until analysts can specify systems that stakeholders can use effectively,
one that exceeds their expectations (functional requirements), they are like
architects building houses no one wants to live in.
! !310
REQUIREMENTS DOCUMENTATION
According to BABOK V2, NFRs may be developed for the user community or
the developer community. While users worry about usability, learnability
and reliability, the developer community are mostly concerned about
scalability, maintainability and the like.
! !311
REQUIREMENTS DOCUMENTATION
! !312
REQUIREMENTS DOCUMENTATION
Introduction:
Detailed Requirements:
1.1 Each Student would be given a Smart card. The smart card shall
contain a Student Identifier (could be alphanumeric), his/her name, course
(e.g., PGDM), batch (e.g., 2002-2004), date of birth, sex etc.
1.2 Some of the student data should be printed along with his/ her
photograph on the Smart Card. Thus, the Smart Card could be used as an
id-card as well.
1.3 Since the smart card may contain e-cash in future, each student
would have a PIN number as in an ATM card. The student should change
this PIN number ASAP to prevent misuse. The PIN would be used in this
system for authentication while recording attendance.
1.4 Each Classroom would be equipped with a Smart Card reader (Chip
reader) which would be connected to the PC in the classroom.
The Office Administration would key in the all the master tables required
such as the Course Master, Faculty Master, Batch Master etc.
! !313
REQUIREMENTS DOCUMENTATION
2.1 Each class would have a student coordinator for every subject.
2.2 The Subject Coordinator will start up the computer before the class,
launch the attendance application and swipe his/her card, use his PIN No
to run the application and start up the attendance recording process by
entering the course and batch codes. The system would show a list of
subjects from which the coordinator would select the subject code. He will
then confirm that these are ok and allow the attendance recording to
proceed.
2.3 Other students would swipe their cards and type in their PIN number to
record the attendance.
2.4 The Faculty would swipe his/her card. Type the PIN Number and
authenticate the attendance recorded by the students.
2.5 The Student coordinator will then run the upload process which will
upload the attendance to the database on server.
3.1 The system would help the course coordinators to get detailed and
summaries of attendance records by course, student and subject. The
report formats are enclosed in Annexure.
3.2 The System will provide for an option for purging the data.
4.1 The system would be designed to work on the existing PCs in the
classrooms and the Win2k Servers.
! !314
REQUIREMENTS DOCUMENTATION
Do not comment on the solution itself but rather the structure and
completeness of the requirements documentation.
IEEE Format
• Interface requirements with other systems, for e.g., the lecturer swipes
his card. This can be used to signal that a lecture was taken and visiting
faculty payments could be calculated based on this.
! !315
REQUIREMENTS DOCUMENTATION
Functional Requirements
Admin Coordinator
Object : Student
• Comes late
• Goes early
• Comes early
• Is absent
• Forget to carry his card
• Has lot or misplaced the card
• Tries to swipe someone else’s card (proxy), etc.
! !316
REQUIREMENTS DOCUMENTATION
13.9 SUMMARY
• The IEEE format for requirements documentation read along with the
characteristics of good requirements documentation and other tips for
good documentation should be imbibed and practiced.
! !317
REQUIREMENTS DOCUMENTATION
! !318
REQUIREMENTS DOCUMENTATION
! !319
REQUIREMENTS DOCUMENTATION
REFERENCE MATERIAL
Click on the links below to view additional reference material for this
chapter
Summary
PPT
MCQ
Video Lecture
! !320