0% found this document useful (0 votes)
9 views

Requirement Elicitation

This document outlines the process of requirements elicitation for business analysts, detailing the steps prior to gathering requirements, the significance of elicitation, and various techniques and tools used in the process. It emphasizes the importance of understanding user needs and stakeholder inputs to develop effective solutions. Additionally, it discusses new elicitation techniques and methodologies to enhance the requirements gathering process.

Uploaded by

Khalil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Requirement Elicitation

This document outlines the process of requirements elicitation for business analysts, detailing the steps prior to gathering requirements, the significance of elicitation, and various techniques and tools used in the process. It emphasizes the importance of understanding user needs and stakeholder inputs to develop effective solutions. Additionally, it discusses new elicitation techniques and methodologies to enhance the requirements gathering process.

Uploaded by

Khalil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 84

Certified Business

Analyst
Unit 5: Requirement Elicitation
Agenda

In this session, you will learn about:

• Steps Prior To Requirements Gathering


• What is Requirements Elicitation?
• Goals of Requirements Elicitation
• Prototypes and Scenarios
• The Significance of Requirements Elicitation
• Elicitation Methodology
• Tools and Techniques for Requirement
Elicitation

Private and Confidential 2


Step 5: Requirement Elicitation

1 2
BA
Basics of Requirements Planning,
Scope,
and vision
Develop
3
BRD &
validate
sol. Enterprise
Analysis
6

Req
Elicitation
Req Analysis 4
5 & Mgmnt

Private and Confidential 3


Steps Prior To Requirements Gathering

What are some of the


steps you should
complete before
leading a
requirements
gathering session?

Private and Confidential 4


Steps Prior To Requirements Gathering

Review the documents and inputs to determine


desired outcomes, objectives and open points

Prepare a meeting agenda

Define participant roles within your team

Generate initial questions for the interview

Private and Confidential 5


Steps Prior To Requirements Gathering

Decide among your teammates how to organize the


interview questions, how to facilitate the interview
session, and who will ask which questions and follow-
up questions

Review the high-level business requirements and


the “To-Be” business process design

Bring a shell of what you do know and what


questions you have for each area

Private and Confidential 6


What is Requirements Elicitation?

To Elicit:
To draw forth
To bring out

Elicitation is not a step or task to be performed at a certain


point. It is a set of techniques you actively apply appropriately
during the Requirements phase.
Private and Confidential 7
What is Requirements Elicitation?

Requirements elicitation is defined as a process to understand


a problem and its application domain.

THE PROBLEM APPLICATION DOMAIN

Private and Confidential 8


What is Requirements Elicitation?

ESTABLISH
USER REQUIREMENTS

ORGANIZATIONAL
NEEDS

INPUTS FROM
The problem and the application STAKEHOLDERS
domain are given in a form of
organizational needs and other inputs
from various different sources to
establish user requirements.
Private and Confidential 9
Goal of Requirements Elicitation

THE GOAL:
To identify as many requirements as
possible to prepare several alternate
Private and solutions
Confidential for the stated problem.
10
What Kind of Requirements?

Private and Confidential 11


Significance of Requirements Elicitation

Requirement Elicitation is very beneficial in

developing any new application.


Most systems fall short of delivering what is the expected outcome because of
wrong elicitation practice.

Private and Confidential 12


Significance of Requirements Elicitation

Without the elicitation


techniques, it will be fruitless to
fish around for requirements and
the needs / wants for developing
the system.

It provides a platform
to the developer to
construct a
framework of the
proposed system keeping in view
the wish list of stake holders.

Private and Confidential 13


Significance of Requirements Elicitation
This session is based on:
• Understanding elicitation techniques and
their usage in real time applications.
• Implement elicitation techniques for
knowing the needs of stakeholder so that
system developer can get clear view of
requirement for the developing system.

BONUS:
Knowing the
elicitation techniques
is one thing and how
to use them is
another. We have a
case study later in this
session

Private and Confidential 14


Significance of Requirements Techniques

Requirements elicitation techniques are


the means by which:

Determine the problems,


SYSTEMS ANALYST opportunities, and needs of
the customers

Construct systems that actually


resolve those problems, leverage
those opportunities, and/or
SYSTEMS DEVELOPER
address customers needs

Private and Confidential 15


Significance of Requirements Techniques

Requirements can The process should be in this way that it


should represent all the thoughts and
be derived by
requirements of stakeholder and all those
interacting with involved in the system.
stakeholder and Adopting the elicitation techniques makes
other resources. the above possible.

Private and Confidential 16


Elicitation Methodology

• Many requirements problems stem from issues of scope, communication, and


requirements volatility.
• There are elicitations techniques which address some of these issues.
• However, no technique is comprehensive enough to adequately cover all of these
issues in detail.
• Rather than advocating one technique over the others, a better approach to
requirements elicitation is to synthesize the various methods and techniques into a
methodology.

Private and Confidential 17


Tools and
Techniques
Requirement Gathering Techniques

Some common techniques for


gathering requirements include:
• Process flows
• Use cases
• Prototypes & scenarios
• Focus groups
• Interviews
• Fit-Gap analysis
• Questionnaires

Private and Confidential 19


Types of Requirements Techniques

Direct Approach Indirect Approach


• The purpose is to enhance the • Are used in order to obtain
understanding of the problems of information that cannot be easily
system that is currently in used. articulated directly.
• Most common techniques used are • Questioners, documents and data
Interviews, case study, Prototyping. analysis are its examples.
• With these tools a comprehensive • Point of significance in this
and comprehensive analysis of total approach is to get clarity using
procedure can been done. In here it figures and statistics.
is good to get the more knowledge • The results acquire from this type
about system and genuine data. of investigation are easy to measure
• Co-opertaion from business user, and an applicable test suggestion
his coherency and willingness is a can be driven from them.
must for success.

Private and Confidential 20


Process Flows

A process flow shows the


relationship between
major components in the
system

When
Pros Cons Participants
Appropriate
This method is Easily understood Difficult to This technique
ideally used to by users and represent is most
describe how stakeholders who multiple successful
current or future are part of the processes when all users
business processes process being occurring are
should be modeled developed simultaneously participants

Private and Confidential 21


Use Cases

Use cases describe a sequence of actions the application performs on behalf


of a particular user or an external application

Private and Confidential 22


Use Cases

When
Pros Cons Participants
Appropriate
Best used to Provides a user point Use cases do not This technique
describe a step- of view provide enough is most
by-step process Makes functional information to successful
of how the requirements easier enable when all users
system works for to explain and development are
end users understand for end activities participants
users and
stakeholders

Private and Confidential 23


Prototypes and Scenarios

Both prototypes and scenarios help


the client visualize how the solution
will look.

Private and Confidential 24


Prototypes

Prototyping is a technique
for building a quick draft of
a desired system, or parts
of that system

When Appropriate Pros Cons Participants

Illustrates the • Helps the developers and May be follow Most appropriate
capabilities of the reduce the development insufficient when
system to the users time & costs. analysis administered to
and designers • Invites the users to the ultimate users
contribute & give and stakeholders
productive feedback. of the system
• Prototypes may
demonstrate progress at
an early stage of
development

Private and Confidential 25


Scenario Building / Visualization

A facilitator talks to users


through visualization,
walks through current and
ideal online and offline
processes.

When Appropriate Pros Cons Participants

Especially helpful There is no physical Experiences with Most successful


when a system does prototype or system in similar systems could when users, not
not currently exist and front of them, so the user impede the flow of stakeholders, are
it is being used to isn’t restricted by what new ideas; users the participants
replace a process they see could omit steps or
currently tasks, especially if the
implemented task is repetitive
manually

Private and Confidential 26


Focus Groups

A focus group
brings together a
cross-section of
stakeholders and
end users into a
room and opens
lines of
communications.

Private and Confidential 27


Focus Groups

When
Pros Cons Participants
Appropriate
Focus groups are • Ability to solicit a wide • It may be Participants in
generally most variety of opinions in a intimidating for this exercise are
helpful at the relatively short period of subordinate normally a
beginning stages time stakeholders to combination of
of a project when contradict a stakeholders and
the entire value • Group dynamics stimulate supervisor. users traditionally
proposition is drawn from the
individual thought and
being validated give rise to “piggy-back” user groups and
ideas stakeholders.

Private and Confidential 28


Interviews
Interviews are one-on-one discussions where the interviewer is
able to get detailed feedback about a user’s tasks and
current interactions with the system

Private and Confidential 29


Interviews

When Appropriate Pros Cons Participants


• To be used if the interviewer • Allows the • Users intentions This exercise is
is familiar with the domain) interviewer to are often different most successful
and the ability to articulate ask follow-up than their actual when the
their knowledge questions to gain actions participants are
• Useful when the application more detailed ultimately end
is custom or replacing an insight • Follow-up users of the system
offline task questions may lead
• Also useful when an to getting stuck on
application already exists, as a single topic
an interview can help expose
potential enhancements to
that application

Private and Confidential 30


Fit/ Gap Analysis
Fit / Gap Analysis consists of comparing the This method is
capabilities of a software package with the specific to
current and/or desired future state of the development using
business, identifying gaps, and deciding how a software
to close them. package.

Organizational
Fit/Gap
Template

Private and Confidential 31


Fit/ Gap Analysis

When Appropriate Pros Cons Participants

A gap is closed by Forces the Can cause Requires a mix of


customizing the package, consideration of project to be lost business experts,
developing add-on software all relevant in details software experts,
or by changing the factors decision makers and
organization to adapt to the neutral facilitators
package

Private and Confidential 32


Questionnaires

Questionnaires are very important


technique in requirement elicitation
techniques as it helps to get the information
, opinions from many peoples w.r.t
statistical evidence for an assumption or
just suggestion.

Private and Confidential 33


Questionnaires

When Appropriate Pros Cons Participants


When direct interactions Can help get Pros may not be Requires a mix of
are not possible and when multifaceted applicable business experts,
we need to get opinions opinions software experts,
from multi category of decision makers and
people neutral facilitators

Private and Confidential 34


New Elicitation Techniques (1/2)

Acceptance and
Benchmarking Evaluation Criteria
and Market
Analysis
Business Rules
Analysis

Backlog
Management New Elicitation Decision Analysis
Techniques

Problem
Interface Analysis
Tracking

Metrics and Key Lessons Learned


Performance Process
Indicators

Private and Confidential 35


New Elicitation Techniques (2/2)

Business Model
Vendor Canvas
Assessment
Balanced Scorecard

Data Mining
New Elicitation Collaborative Game
Techniques

Business
Concept Modeling
Capability
Analysis

Mind Mapping Financial Analysis

Private and Confidential 36


New Elicitation Techniques – Backlog Management

Backlog Management used to;

Prioritize Relates to Agile


Record Track
remaining work Perspective
items

Inevitable nature of Changes w.r.t

Changing technology
Changes from customer Changes from vendor
environment

Changing regulations Changing business


conditions conditions-competition
Private and Confidential 37
New Elicitation Techniques – Backlog Management

Backlog Management

Backlog management is the


primary method of handling both
requirements prioritization and
change management in most agile
approaches.

The goal of backlog management is


to produce the highest customer
value by delivering capabilities
aligned with the organization’s
strategic goals.

Private and Confidential 38


New Elicitation Techniques – Backlog Management

Scrum in Brief

A collection of user 1 Prioritized by highest customer value


stories that include the
expected business
value.
2 User stories are refined as the acceptance
criteria are developed (ongoing)

As team collaborates with customer,


3 product backlog is updated with requests

Prioritize the current set of customer


4 requirements by highest customer value

Private and Confidential 39


New Elicitation Techniques - Benchmarking

Benchmarking

Benchmark studies are performed to compare the strengths and


Definition
weaknesses of an organization against its competitors.

Applicability

Business Solution
Business Bidding Requirement Analysis
Design

Private and Confidential 40


New Elicitation Techniques – Benchmarking (Contd)

Advantages & Disadvantages

Advantages Disadvantages

Benchmarking provides organizations with • Benchmarking is time consuming.


information about new and different • In addition, organizations may not have
methods, ideas, and tools to improve the expertise to conduct the analysis
organizational performance. and acquire or interpret useful
competitive information.
• Non Innovative: Because it involves
assessing solutions done elsewhere
already, with the intention of
reproducing them hence benchmarking
cannot help to conceive innovative
solution.

Private and Confidential 41


New Elicitation Techniques – Acceptance Criteria

Acceptance and Evaluation Criteria

Applicability
Definition

Requirement Elicitation
To define the requirements that must
be met in order for a solution to be Business Bidding
considered acceptable to key
stakeholders.

Private and Confidential 42


New Elicitation Techniques – Acceptance Criteria (Contd)

Advantages & Disadvantages

Advantages Disadvantages

• Agile methodologies may require that • Acceptance and evaluation criteria may
all requirements be expressed in the act inflexible
form of testable acceptance criteria. • This is because of contractual
• Acceptance criteria are also mandatory obligations and may be difficult to
when the requirements express change for legal or related reasons.
contractual obligations.

Private and Confidential 43


New Elicitation Techniques – Business Rules Analysis

Business Rules Analysis

It defines the rules that govern decisions


in an organization and also help to define,
challenges, or work in a way to facilitate Can make changes to policy without
altering processes.
of enable organizational operations.

Applicability
• Long lists of business rules
• Possibility of Business rules
Requirement Analysis contradictions
Requirement Documentation

Requirement Elicitation
Private and Confidential 44
New Elicitation Techniques – Decision Analysis

Decision Analysis

Definition It supports decision-making when dealing with:

Complex Situations Difficult Situations Uncertain Situations

Applicability

Requirement Analysis Requirement Documentation

Private and Confidential 45


New Elicitation Techniques – Decision Analysis (Contd)

Advantages and Disadvantages

Determines the expected value of D


Requires specialized knowledge
an alternative scenario to the I
organization A and skills
S
D
A
V
D
A
V
Provides quantitative measures to N Results of decision analysis may
make investment decisions A become more challenging
T
N
A
T
G
A
Assessment of Different E This is if decision- makers are not
G
alternatives significance for S qualified to understand the
stakeholders E limitations & assumptions behind it
S

Private and Confidential 46


New Elicitation Techniques – Interface Analysis

Interface Analysis

Definition

Applicability

Requirement Analysis
To identify interfaces
between solutions
and solution
components / legacy
or third party
systems and define
requirements that
elucidate how the
systems will interact Requirement Documentation
via the interfaces.
Private and Confidential 47
New Elicitation Techniques – Interface Analysis (Contd)

Advantages and Disadvantages

Advantages Disadvantages

Early identification of interfaces provides • Does not provide insight into other
an early, high-level view of cross aspects of the solution apart from filed
operations for planning mappings and related solutions.
• This is since the analysis does not
assess the internal components.
Impact on delivery scheduled date.

Collaboration with other legacy / third


party systems or projects.

Clearly laid out Specification of the


interfaces can avoid difficulties in
integrating multiple components.

Private and Confidential 48


New Elicitation Techniques – Lessons Learned Process

It is a way to compile and document:

Recommendations
Opportunities for
for improving the
improvement
performance of
Successes Failures future.

Applicability

Project Implementation Operations

Private and Confidential 49


New Elicitation Techniques – Lessons Learned Process (Contd)

Advantages and Disadvantages

Participants finger point and may


be reluctant to document and
D discuss problems
I
Useful for identifying opportunities A
S
for process improvement D
A
V
D
A
V
N May risk becoming a session for
A
T personal criticism of management
N
A style and improvement
T opportunities may be ignored
Builds team morale after a difficult G
A
period of projects or project E
phases G
S
E
S

Private and Confidential 50


New Elicitation Techniques –Performance Indicators

Metrics and Key Performance Indicators

Definition It measures the performance of solutions, solution components,


and other matters of interest to stakeholders.

Business Bidding Requirement


Elicitation

Applicability

Private and Confidential 51


New Elicitation Techniques –Performance Indicators (Contd)

Advantages and Disadvantages

vs
Advantages Disadvantages

Enables stakeholders to understand the Gathering excessive amounts of data


extent to which a solution meets an beyond what is needed will result in
objective, and effective of activities of additional costs in collecting, analyzing
developing the solution output. and reporting.

KPIs , metrics and reporting also


facilitate organizational alignment,
Individuals being measured are likely to
linking goals to objectives, supporting
act / react to increase their performance
solutions, underlying tasks, and
on those metrics.
resources and binds the entire ecosystem
together in some quantitative measures.

Private and Confidential 52


New Elicitation Techniques – Problem Tracking

Problem Tracking

Applicability
Definition

Requirement Validation
It is a way to track, manage and
resolute defects, issues, problems, Testing
and risks throughout business
analysis activities.
Project Implementation

Private and Confidential 53


New Elicitation Techniques – Problem Tracking (Contd)

Problem Tracking

Advantages

Organized method for Mechanism to


tracking and resolving communicate problems
risks, issues and defects. across the team.

Disadvantages

Probability of Failure if Probability of Failure if key


prioritization and team members are not
management of problems is available on a regular basis Time Consuming Activity
not done on a consistent to discuss the lists of
basis. problems.

Private and Confidential 54


New Elicitation Techniques – Sequence Diagrams

Sequence Diagrams

They are used to model the logic of usage • It may be used in object-oriented
scenarios, by showing the information analysis to validate class diagrams
passed between objects in the system against use cases, or
• To show the timing of interactions
through the execution of the scenario. between entities within the system
scope.

• It must be defined for each possible


Applicability scenario.
• Strictly speaking, a sequence diagram
requires a fully defined class model
Requirement Analysis
Requirement Documentation

Private and Confidential 55


New Elicitation Techniques – Vendor Assessment

Vendor Assessment

Definition

To assess the ability of a potential vendor to meet commitments


regarding a product or service.

Business Bidding Applicability Business Solution Design

Private and Confidential 56


New Elicitation Techniques – Vendor Assessment (Contd)

Vendor Assessment

Advantages Disadvantages

• An effective vendor assessment • Can be time-consuming to gather


enhances the probability of sufficient information on multiple
organization developing the vendors.
relationship with a worthy vendor • Some information may not be
and reduces the risk of developing readily available and hence it may
a relationship with an unsuitable get laborious and frustrating to
vendor. arrive at conclusive conclusions.
• This outcome leads to a likely • Risk of Vendors with new and
scenario of improving long-term innovative products or services
satisfaction with the decision. failing as they do not have a
significant lineage in the market.

Private and Confidential 57


New Elicitation Techniques – Balanced Scorecard

Balanced Scorecard

Used to manage performance in


any business model, organizational
structure, or business process and
relates to BPM Perspective and
Process Analysis.

The balanced scorecard is a strategic


planning and management system
that is used extensively
in business and industry worldwide
to align business activities to the
vision and strategy of the
organization, enhance internal and
external communications, and design
monitoring dashboards for key
elements for the organization.
Private and Confidential 58
New Elicitation Techniques – Balanced Scorecard (Contd)

Perspectives

The balanced scorecard encourages to view the organization from four


perspectives in order to:

Perspectives

Private and Confidential 59


Balanced Scorecard – L & G Perspective

The Learning & Growth Perspective This perspective includes


employee enablement, training
for individual and corporate self-
Learning Growth improvement.

1 In a knowledge oriented organization people are the main repository of


knowledge.

In the current climate of rapid technological change, it is becoming


necessary for knowledge workers to be in a continuous learning mode. 2
3 Metrics can be put into place to guide them on the same regarding their
progress chart and trackings.
In any case, learning and growth constitute the essential foundation for
success of any such organization. 4
Private and Confidential 60
Balanced Scorecard – The Business Process Perspective

Metrics based on this perspective allow the


employees to know how well their business is
running and whether its products and services
conform to customer requirements.

These metrics have to be


carefully designed by those
The Business who know these processes
Process Perspective very well.

This
perspective
refers to
internal
business
processes.

Private and Confidential 61


Balanced Scorecard – The Customer Perspective

The
These are leading
Customer indicators - if customers
Perspective are not satisfied, they will
eventually find other
suppliers that will meet
their needs.

Poor performance
There is sufficient proof
from this perspective
for an increasing
is thus a leading
realization of the
indicator of future
importance of customer
decremented growth,
focus and customer
even though the
satisfaction in any
current financial
business.
picture may look good.

Private and Confidential 62


Balanced Scorecard – The Financial Perspective

The It’s a larger known truth that timely and accurate


Financial financial data will always be a priority.
Perspective

In fact, often there is more than enough handling and


processing of financial data.

With the implementation of a corporate database, it is


hoped that more of the processing can be centralized and
automated.

Its also true that in the contemporary times there is an


exemplified focus on obtaining the using the financial
data.

Private and Confidential 63


New Elicitation Techniques – Business Model Canvas
The Business Model Canvas describes how an enterprise creates, delivers, and captures
value for and from its customers.
A business model canvas is comprised of nine building blocks that describe how an
organization intends to deliver value:

Key Partnerships Partners, supplier, which key resource are we acquiring from
partner, which key activities partners perform

Key Activities Which ones our value prop requires, distribution channels ,
customer relationships, revenue streams

Key Resources Which ones our value prop requires, distribution channels ,
customer relationships, revenue streams

Value Proposition What do we deliver to customer, which issues are being solved,
what bundles of products and services are being offered,
customer needs being satisfied & minimum viable product

Private and Confidential 64


New Elicitation Techniques – Business Model Canvas (Contd)

Business Model Canvas

Customer How to get, sustain and grow customers, customer relationships established,
Relationships how are they integrated with rest of business model, economics involved

Which ones are desirable by customer , which ones work best,


Channels cost effectiveness

Customer
For whom are we creating value , most imp customers
Segmentation

Costs inherent to business model , expensiveness of key resources


Cost Structure and activities

Revenue What value is customer willing to pay, what's their existing pay out ,
Streams revenue model and pricing strategies?

Private and Confidential 65


New Elicitation Techniques – Collaborative Game

Collaborative Game

• To improve the accuracy of elicitation, collaborative games allow stakeholders and the
team to build a joint understanding of a problem.
• After the high‐level requirements are noted, stakeholders work directly with the
development team directly to ensure that the work fulfills the requirements and is
performed correctly.

Private and Confidential 66


New Elicitation Techniques – Collaborative Game (Contd)

Collaborative Game

Collaborative games Collaborative Games


refer to several encourage participants
structured techniques in an elicitation
inspired by game play 1 activity to collaborate
and designed to
facilitate collaboration.
2 in building a joint
understanding of a
problem or a solution.

They can be used with most other


techniques simply by adapting how
we use the technique into a
structured facilitation with
collaboration.
Private and Confidential 67
New Elicitation Techniques - Collaborative Game (Contd)

To Use Collaborative Games for

Agreement
Problem
solving
New
Ideas
Unravelling
Tough complexity
decisions planning

Private and Confidential 68


New Elicitation Techniques - Collaborative Game (Contd)

Each group selected different models and deliberated within on How would
this impact things like:

Marketing Ordering Fulfillment


processes and process/systems processes/systems
systems

Private and Confidential 69


New Elicitation Techniques – Business Model Canvas
Usage in the BA Context
Business Model Canvas Type of change:

Merger/Acquisition
Which model / new Legacy to COTS
one? Implementation
How does the New Product
package software Launch
New start up Where does the
What is the change our model?
new product fit
business model? into the model?

Private and Confidential 70


New Elicitation Techniques – Business Model Canvas (Contd)
Usage in the BA Context
Business Model Canvas Type of change:

Any meeting where we want


to pull vs. simply push
information
Build games on to each
other to create a meaningful
Enhancement to a current meeting
process and/or system?
What aspects of our model Any technique and
does this impact? facilitation can become a
Opportunities we have not collaborative game
thought of ?

Private and Confidential 71


New Elicitation Techniques – Concept Modeling
A concept model organizes the business vocabulary needed to communicate consistently
and thoroughly about the know-how of a problem domain.

A concept model starts with a It also emphasizes rich vocabulary.


glossary of business terms and
definitions.

It puts a very high premium on


high-quality, design-independent The core concepts of a business
definitions, free of data or problem domain are typically
implementation biases. quite stable over time.
Private and Confidential 72
New Elicitation Techniques – Concept Modeling (Contd)

It is always about identifying the correct choice of terms


to use in communications, including statements of
business rules and requirements, especially where high
precision and subtle distinctions need to be made.

Private and Confidential 73


New Elicitation Techniques – Concept Modeling (Contd)

Concept models are can be especially effective where:

The organization seeks to organize, retain, build on, manage and


communicate core knowledge or know-how.

The project or initiative needs to capture 100s or 1,000s of business rules.

There is significant push-back from business stakeholders about the


perceived technical nature of data models, class diagrams, or data element
nomenclature and definition.

Outside-the-box solutions are sought when reengineering business processes


or other aspects of business capability.

The organization faces regulatory or compliance challenges.

Private and Confidential 74


New Elicitation Techniques – Financial Analysis

Financial Analysis

Financial analysts
and business analysts examine
Financial analysis (also referred to
the data of internal or external
as financial statement analysis or
accounting analysis or Analysis of finance) clients and use their findings
refers to an assessment of: to make recommendations
about business decisions.

Viability

Stability The financial


analyst studies
financial data,
Profitability
attempting to
spot trends and
make forecasts.
Of a business, sub-business or a project.
Private and Confidential 75
New Elicitation Techniques – Financial Analysis

Financial Analysis

This data involves the They study strategy, business


day-to-day operations models, processes and work
of the business. flows and technical systems.

They are called upon to


Business analysts look at check for shortcomings
company data and use and find opportunities for
their findings to help the company's operations
management make to be streamlined and
business decisions. improved.

Private and Confidential 76


New Elicitation Techniques – Mind Mapping
Mind Mapping This process can be
simplified by
Planning, taking notes,
applying mind maps
organizing ideas, creative
to structure the
problem solving, collaborating,
information obtained
summarizing, among other uses.
through a carefully
Areas of application thought-out
representation of
ideas, concepts,
thoughts, and
problems.

Used for Role of Business Analyst

Used to articulate and To primarily investigate, evaluate


capture thoughts, ideas, and scrutinize information
and information and obtained from stakeholders as
relates to Conduct well as any relevant
Elicitation. documentation.
Private and Confidential 77
New Elicitation Techniques – Mind Mapping

Mind Mapping

The fast-paced business


It is important to
environment of today
An example of its use is note that the mind
requires that BAs save
in preparing and
time, enhance
delivering
map is not a
effectiveness, and deliverable of the
presentations.
become more creative
in their thinking. business analyst
but is instead,
used in the
process of
understanding the
Mind maps are useful in business in order
organizing thoughts in
an easy and efficient to provide
way. comprehensive
recommendations.

Private and Confidential 78


New Elicitation Techniques – Business Capability Analysis

Business Capability Analysis

1
Provides a framework for scoping and planning by
generating a shared understanding of outcomes,
identifying alignment with strategy, and providing
a scope and prioritization filter.
2
It relates to BPM Perspective and Process
Analysis.

2
Business Capability Analysis involves modeling
what a business does or what it needs to do to
achieve its objectives and not how it achieves it
(via process/people).

Private and Confidential 79


New Elicitation Techniques – Business Capability Analysis

Business Capability Analysis

The results of such an analysis can deliver


value to the business in areas of:
Having a solid grasp of the
capabilities of the business can
Reduced cost Improved customer help in maintaining
service competitive advantage and
delivering on unique value
propositions to customers.

Increased turnaround
time
Private and Confidential 80
New Elicitation Techniques – Data Mining

Data Mining

Used to improve decision making by finding useful


patterns and insights from data and relates to BI Data analysis and data
Perspective. mining are a subset of
business intelligence (BI).

BI also incorporates data


warehousing, database
management systems, and
Online Analytical
Processing (OLAP).

Private and Confidential 81


New Elicitation Techniques – Data Mining

Data Mining

Data mining can be defined as the


process of:

The technologies are Extracting data


frequently used in
customer relationship
management (CRM)
to analyze patterns
and query customer
databases.
Analyzing it from many
Large quantities of dimensions or perspectives
data are searched and
analyzed to discover
useful patterns or
relationships, which
are then used to
predict future Producing a summary of the
behavior. information in a useful form
that identifies relationships
within the data

Private and Confidential 82


New Elicitation Techniques – Data Mining

Data Mining Types

Descriptive Predictive

Gives information about Makes forecasts based on


existing data the data.

Private and Confidential 83


&
Thank You
For Your
Attention

You might also like