SlideShare a Scribd company logo
1 of 68
Overcome the Barriers to Good Requirements Management Info-Tech Research Group “ As a CIO, if you do not understand your business requirements process, quit.” -CIO, Information Services Organization
Introduction Info-Tech Research Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Executive Summary Info-Tech Research Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Info-Tech Research Group Case Studies and Best Practices Business Acumen Understanding Requirements Validating Requirements Assessing Requirements Business Requirements  Connect Project Success with Good Requirements Understand the Impacts of Poor Requirements Perform a Requirements Health Check on Your Organization
Less than 9 out of every 20 projects are considered successful, damaging the credibility of many IT organizations. ,[object Object],[object Object],t Info-Tech Research Group ,[object Object],Project success is defined differently depending on the organization, but staying on time and on budget are always considerations when evaluating the success of a project. A large majority of IT projects don’t meet timelines or stay on budget, and 62% of projects exceed both time and budget. Over Budget 84% Exceed Time Estimate 88% Poor requirements are cited as a major factor in both project delays and budget overruns % of IT leaders that state poor requirements lead to delayed and over budget projects Exceed Time Estimate Series 90% Over budget 93%
IT leaders cite poor requirements management as the leading cause of project failure.  0 Info-Tech Research Group The net result of a “poor requirement”? Requirements gathering is the most important stage in the project process. If you don’t collect those requirements properly, if business’s expectations are one thing, and yours are something else, the project is going to fail. -CIO, Real Estate “ ” Poor requirements come in a variety of forms, but they all fail to adequately specify the actual needs of end users and/or stakeholders. The net result of a poor requirement is that the solution will either fail to have a capability that is needed or it will include features that are unnecessary. In both cases, poor requirements run the risk of inflating the cost of the project. Poor requirements is the most cited cause of project problems For an overview explanation of requirements management, refer to Appendix I. ,[object Object],Poor requirements is cited as the major contributor to project problems 23% of the time, which is more than all other issues combined.
Employ tactics to effectively gather requirements to avoid   post-production rework. Info-Tech Research Group On average, 26% of projects require post-production rework – most of which could have been avoided with an improved requirements gathering process. When you look at statistics for why projects fail or why organizations struggle, it’s because they spend more time redoing stuff than actually doing it right the first time. -President & CEO, IIBA We consistently see  that defects in  requirements –  requirements that are  wrong, don’t meet the business need, ambiguous, etc. – take up about 20 to 30 percent of the effort on an average  project. That’s a huge amount of  overhead from poor requirements  technique. -VP Professional Development, International Institute of Business Analysis ” “ ,[object Object],[object Object],[object Object],[object Object],[object Object]
To minimize cost overruns, catch mistakes early – a correction during the design phase costs 1% of a correction post-release. ,[object Object],[object Object],Info-Tech Research Group Architect’s adage: "I can move lines on a page very easily, but it is tremendously expensive to move brick walls.”  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Projects possessing the following characteristics demand strong requirements processes to avoid escalating costs.
Recognize the need for trust and credibility with business partners. Info-Tech Research Group In organizations today it is common to hear IT staff talking about "the business“, and to hear IT’s internal and external customers referring to IT as “computer geeks”.   Its as though both exist in separate worlds where common language isn’t spoken.  In reality,  until both sides can develop alignment and synergy ,  the  organization cannot remain in business  without IT for very long. And without the business, IT’s rasion d’etre evaporates.  IT needs to spearhead the drive to forge a partnership  with their customers. The first hammer stroke is working with stakeholders to  develop best practices in business requirements management  in order to build trust and credibility. Info-Tech Insight:
Don’t fall into common requirements management traps. Follow the tips and tricks of your peers to learn  what not to do . Info-Tech Research Group Before you begin gathering requirements, have an open discussion with the project manager to define roles, expectations and the difference between a project issue and a requirements issue. “ We used to jump directly into projects - the BAs, the PMs and the stakeholders. I realized very quickly that  project managers are a fairly direct, controlling breed   because they have to be, and that you could easily have conflict between senior business analysts and the PMs. For example, we have had situations where there was pretty high tension, because a  project manager felt that they should be the only person talking to the sponsors .  For a long time, I didn’t really have the discussion with the project manager around, ‘This is how I see my role or the analyst’s role, and this is how we see the PM role, and here’s when it’s a requirements issue and here’s when it’s a project issue.  How do you want to handle communication to the business?”  You have to have that open discussion or the two are going to just run against each other.   We also started defining the difference between a project issue and a requirements issue, so we knew who needed to be involved if a problem arose. This upfront, open conversation helped us to  develop a sense of peer leadership instead of hierarchy   on projects.”  -Senior Systems Analyst, Insurance Industry The DON’Ts… The DO’s… Don’t leave role of BAs versus role of PM up for debate. Clearly define the role and expectations of the BA, the PM and the stakeholders. Don’t involve the technical analysts too early. Bring the developers and the designers into the conversation after the project objectives are defined. Don’t invest too much time, money and sweat equity in mockups. If they don’t work out, you may demoralize your IT group. Use mockups but keep them simple. They are meant to seek out issues and ideas, not offer a completed solution. Don’t forget to involve your stakeholders in review and assessment of requirements. Maintain dialogue and feedback loop with your stakeholders. Continuously assess and validate the requirements with them.
Define the objectives of the project before trying to solve the problem. Keep developers away until objectives are defined. Info-Tech Research Group “ I have let my  technical analysts become overbearing  on the requirements process before, and they start getting into what they think is easy to achieve as opposed to what’s needed.  Introduction of the technical analysts too soon  will get the group into solving a problem before they’ve defined what it is you’re actually trying to do.  I think this might be a guy thing - because I do this too. For example, my wife comes home and she’s got this picture and asks me to hang it.  Instead of asking where are we going to put it, how high should I hang it, how does this look, I’m immediately thinking, ‘I get to use this tool,’ and ‘oh, I don’t have any of those hooks.  I’d better go to Home Depot.’  I’m immediately off solving the problem.  In this analogy, the IT people are me, and  they have to be brought back to the part where they’re just listening to the business user  (my wife), talk about her requirements and think through those issues. She’s not going to walk in and say ‘I want it right here.’  It’s going to change.  That requirement will move. You want to get the IT guys in at some point, but how do you control them so they don’t solve the problem too soon?  It can ultimately lead to bad placement on the wall.” -CIO, Energy Industry
Assess the health of your organization’s requirements gathering practices to highlight areas for improvement.  Info-Tech Research Group Signs that your requirement management process needs  improvement : Perform your own health check. Use the “ Business Requirements Management Health Assessment Tool ” to assess the need for improvement.
Info-Tech Research Group Case Studies and Best Practices Business Acumen Understanding Requirements Validating Requirements Assessing Requirements Business Requirements  Connect Project Success with Good Requirements Understand the Impacts of Poor Requirements Perform a Requirements Health Check on Your Organization
There are four principles that support effective requirements management, leading to higher levels of project success.  Info-Tech Research Group ,[object Object],Understanding  Requirements ,[object Object],Business Acumen ,[object Object],Validating Requirements ,[object Object],Assessing Requirements
Follow the advice in the following case studies to overcome your own requirements management challenges. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Info-Tech Research Group Project Type ,[object Object],[object Object],[object Object],[object Object],Company Profile ,[object Object],[object Object],[object Object]
Business Acumen Info-Tech Research Group
A variety of techniques develop a thorough understanding of business operations, leading to improved project performance. 0 Info-Tech Research Group Percent of organizations with projects over budget  more than 30% of the time and over time 60% of the time Percent of organizations with projects on time and  on budget Becoming intimate with business operations leads to, on average, a 26% improvement in project on-time, on-budget performance. 67% Job Shadowing 33% 75% Use of Business Process Mapping 61% 75% Review Existing Business Documentation 67% 85% Use BAs Recruited from Business 39% Techniques for developing Business Acumen: Job Shadowing –  develop a program for IT staff to rotate through various business units, becoming familiar with roles, functions and operations.  Recruit BA’s from the Business  – Identify “super users” with excellent organizational, problem solving and relationship skills. Assign them the role of Business Analyst.  Review existing documentation -  Track down any existing documents or manuals that describe current systems and processes. This step could save a lot of time. Be sure to verify the documents' accuracy with stakeholders. Use business process mapping –  In the absence of existing documentation, conduct interviews and workshops with stakeholders and map out the business workflows, inputs, outputs and processes. Techniques to Gain Business Intimacy ,[object Object]
A lesson in understanding business operations:  A manufacturing company goes analog. Info-Tech Research Group Eliciting information… With non-traditional methods… Resulted in clear understanding of workflows. + = ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What Happened? The stakeholders opened up…  What did they learn?  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A lesson in understanding business operations:  What could IT leaders do in different scenarios? Info-Tech Research Group ,[object Object],[object Object],System Integration/Large Enterprise ,[object Object],[object Object],[object Object]
Commonly, the business will not be able to fully articulate strategy and goals. Avoid premature project launch until these key linchpins are in place. Info-Tech Research Group Barrier Solution ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Assigning a Business Analyst improves the likelihood of the project being on budget by 5% and on time by 19%. 0 Info-Tech Research Group Skilled BAs contribute to the success of projects by improving requirements management. Info-Tech Insight: Only 21% of Info-Tech clients assign a Business Analyst to every project. While recognizing the value, IT leaders are often constrained by staffing budgets and skills gaps in their organization.  Assign a BA Do not assign BA Assign a BA 20% Project  Over Budget 14% 15% Project  Overtime 33% Do not assign BA Organizations that do not assign a BA to all projects are 19% more likely to miss project deadlines. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Assign the Business Analyst as the pivot, ensuring understanding between both IT and the business Info-Tech Research Group They need to have a variety of characteristics, but at their heart, underlying it all, there has to be a little geekette or geek in them. -CIO, Financial Services Industry ” “ They have to be able to speak business speak, and translate that into speak that the developers and architects can make use of.  They have to take technical issues to the business decision makers with options, in a way they can understand – so translate back from techie to business as well.  -Senior Systems Analyst, Insurance  Industry They have to listen to what the  business is trying to do, not be judgmental about that, and then come up with ideas about how that could be accomplished. -IT Leader, Electric Energy Provider ” ” “ “ Info-Tech Insight: You are not doing your job if the BA feels they are constantly being dumped on. The  BA can be the quarterback, but not the whole team  . Make the BA role a formal one. Use the Info-Tech “ Business Requirements Analyst ” job description template to create the role in your organization.
Encourage training for existing BAs and require it of new ones. Info-Tech Research Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The DNA of a Good BA ,[object Object],[object Object],[object Object],[object Object],[object Object],Some training techniques that have proven successful: For more information on formal certification of the BA, refer to Appendix I.
Debate your alternatives when recruiting BAs – success can be achieved with BAs from the business or from IT. Info-Tech Research Group There is ongoing debate as to whether BAs should be recruited internally, externally or a mixture of both. With pros and cons for each argument, in the end, it comes down to the skills and competencies of the individual, and how they are cultivated in the organization. “ They’re bridging the gap between the technical part of IT and the actual process of the business. “ “ They certainly don’t have any chops that would allow them to have any level of discussion that would leave the technical people wailing away thinking of them as a credible interface.”
Implement a BA reporting structure that will best enable a productive relationship with the business.  Info-Tech Research Group There are two schools of thought when it comes to where a BA should report and the right answer depends on the organization. Some advocate for the BA reporting to a business leader, others, that they report to IT. Structure the organizational reporting to provide the business with the least amount of angst, however indicate the accountability of the role to work collaboratively with IT. … for truly exceptional BAs the reporting structure is of little importance, as they can navigate the political structures and needs of either IT or the business side of the house by exercising advanced relationship and facilitation skills. Reporting structure is frequently a result of corporate "empire building"... and therefore has little association with actual business value. -Program Manager, Communications  ” “ Report to the Business Report to IT Pros ,[object Object],[object Object],[object Object],Cons ,[object Object],[object Object],[object Object]
Understanding Requirements Info-Tech Research Group
Accurately determine and describe the informational, functional and usability needs of the business to define good requirements. 0 Info-Tech Research Group 72% Business & IT  participate in requirements prioritization 88% 87% Assign a BA to all projects Employ Steering Committees Document all requirements using standard templates 72% Organizations use the following tactics to define and understand business requirements to ensure understanding. Steering Committee: Final decision maker for requirements conflicts.  Stakeholder engagement: Agreement on requirement priority ensures that critical functionality does not get left on the table. Business Analyst: The BA models business requirements for both stakeholder and IT consumption.  Documentation Standards: Agreed upon standards for communicating requirements ensure that misunderstanding is minimized. ,[object Object]
A lesson in understanding business needs:  An insurance company unites diverse stakeholders. Info-Tech Research Group Getting to the right stakeholders… By meeting on their terms… Resulted in agreement on requirements… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],+ = ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What Happened? Stakeholders worked together… What were the lessons learned?  ,[object Object],[object Object],[object Object]
A lesson in understanding business needs:   What could IT leaders do in different scenarios. Info-Tech Research Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Third Party Solution/Medium Enterprise ,[object Object],[object Object],[object Object],System Replacement/Medium Enterprise
Use specialized techniques to elicit requirements in ways that avoid the inherent limitations of stakeholder self-reports. Info-Tech Research Group 1 Have at least one collaborative session Group sessions sort out disagreements between stakeholders. They encourage  creative input as individuals become inspired by the ideas of others.   Don’t follow the process blindly Each interaction with a stakeholder is an opportunity to better understand their needs. Think critically about the information they provide and ask follow up questions. Use more than one elicitation technique to complement differences in each method. Techniques are outlined in the following slides. Use a variety of elicitation techniques. When choosing requirements techniques, keep the following in mind: 4 5 6 Choose at least one face-to-face technique. Interaction with end users through shadowing, prototyping, interviewing, or structured demonstrations can reveal valuable non-verbal information (e.g. reactions, difficulties, etc.) about requirements.     Select an audience that is representative of key interest groups. Even a seemingly perfect combination of elicitation techniques can be undermined if the process ignores critical stakeholders.  Missing stakeholders means missing requirements. Don't let the elicitation process eclipse project deadlines. Limit the number of techniques you choose to 2 or 3. Any requirements that are missed can be caught when testing prototypes. Avoid elicitation paralysis. 2 3 See Appendix I for a detailed list and descriptions of elicitation techniques.
IT and the business are partners in developing the requirements, but IT assumes primary responsibility for the quality. 0 Info-Tech Research Group ,[object Object],[object Object],Specific  –  What exactly do we want this to do? Measurable  –  How will we know we have met expectations?  Achievable   –  Can we deliver within existing constraints of time, budget and technical performance? Results  –  How will this requirement improve or change business operations? Timely  –  What is the “best-before date” for this requirement? Ensure requirements meet the standards of quality. For qualities of highly usable requirements and guidance on requirements gathering and documentation, use the Info-Tech “ Characteristics of  Requirements Checklist ”.
Missed stakeholders and conflicting stakeholder perspectives are two key barriers that must be overcome. Info-Tech Research Group Barrier Solution ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Validating Requirements Info-Tech Research Group
Implement a feedback loop to test IT’s understanding of requirements, or risk misinterpreted expectations. 0 Info-Tech Research Group Play back the requirements to the business to ensure that IT has a solid understanding of what the business is asking for. Employ agile project methodology 56% Require business sign off of requirements 67% Consult business stakeholders in all project phases 72% Formally walk through requirements with business and IT 69% % of organizations using validation techniques ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A lesson in validating changing requirements:  A research company becomes more Agile. Rapidly changing requirements… With a process for managing the changes… Results in successful projects ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],+ = ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What happened? A successful process launch… What did they learn?  Info-Tech Research Group ,[object Object],[object Object],[object Object]
A lesson in validating changing requirements:  What could IT leaders do in different scenarios. Info-Tech Research Group ,[object Object],[object Object],[object Object]
Adopt Agile methodology for projects with frequently changing requirements Info-Tech Research Group Define System System Owner Customers Release Roadmap Track and Adjust Plan  Releases Iterative Development Release Accept Work  Products Agile Development  is based on iterative development, where requirements and solutions are developed through the collaboration of cross functional teams.  Agile methods follow a disciplined project management process based on frequent inspection and adaptation. Functional deliverables are small and time boxed. The best practices allow for rapid, small, high-quality releases that align development with customer needs and company goals.
Implement requirements change control to avoid  project scope creep Most projects will experience changes to requirements regardless of how accurate the initial requirements are. Change requests can result from changes to business operations or strategy, new constraints, or something missed initially. Unless properly managed, requirements changes will have a significant negative impact on your project costs, timelines and scope as resources scramble to address unplanned functionality without understanding the need for the change. Info-Tech Research Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Set up a process and stick to it. Use Info-Tech’s “ Business Requirements Change Request Template ” and “ Business Requirements Change Log ” to record and track the status of requirements change requests.
Requirements management tools help larger projects and organizations to manage changing requirements ,[object Object],[object Object],[object Object],Info-Tech Research Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],For dealing with a variety of projects and thousands of requirements, moving to a database approach to managing requirements allows a metrics-based management of requirements that is simply not practical with paper document-oriented approaches.  Source: International Council on Systems Engineering (INCOSE)
Recognize when stakeholders finally reach a consensus on requirements Info-Tech Research Group A B C D ,[object Object],[object Object],[object Object],[object Object],[object Object],E F G
Don’t close the feedback loop too early. Develop an escalation framework to address requirements conflicts.  Info-Tech Research Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Another stakeholder group exists: IT.  Even if all business units agree, the requirements might not deliver value, be out of scope, or IT may not have the capability to meet them. IT has to work with the business to develop alternate solutions and work within the escalation framework to resolve conflicts arising from IT constraints. Info-Tech Insight: Consensus is the goal – but what if it can’t be achieved?   Requirements within a collection often conflict with requirements in that or another collection.
Decide when good enough is good enough. Know when to commit. 0 Info-Tech Research Group IT Commitment.  When does IT commit to a target of meeting the defined requirements?  IT commits when stakeholders have signed off on the requirements.  During design, issues may arise that mean IT will not be able to build or meet all requirements as defined.  IT will initiate requirements change control to document, communicate and resolve the issue with the business and reach a new commitment. Confirm Decisions. How is consensus communicated? Document!  Don’t make assumptions.  Provide detailed documentation of requirements, issues and decisions to all stakeholders Close the feedback loop.  When are requirements “good enough,” to move on to the next stage in the project? This depends on the nature of the project – its size, complexity and timeline. Requirements are good enough when: Stakeholders have reached consensus on requirements. Conflicts are resolved. Enough detail has been provided for the designers/developers to understand and proceed.  Stakeholders have signed off. “ See first that the design is wise and just: that ascertained, pursue it resolutely do not for one repulse forego the purpose that you resolved to effect.”   - William Shakespeare
Take the advice of your peers to overcome barriers when validating requirements with the business. Info-Tech Research Group Barrier Solution ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Alternatives Recommendation Info-Tech Research Group
Recommend solutions that will deliver the same or better value faster or for less cost. 0 Info-Tech Research Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ensure presence of developers/ designers at requirements  69% Formally Assign a Solution Architect 79% Provide value, risk and impact for change requests 48% Developing good requirements entails much more than just “gathering” stakeholder information % of organizations using assessment techniques ,[object Object]
A lesson in proposing alternate solutions: A financial institution fails to communicate constraints. Rigorous Requirements Gathering… Without Understanding Constraints… Resulted in Project Failure ,[object Object],[object Object],[object Object],[object Object],[object Object],+ = ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What Happened? A Failure to Communicate… What did they learn?  ,[object Object],[object Object],[object Object],Info-Tech Research Group
A lesson in proposing alternate solutions:   What could IT leaders do in different scenarios Info-Tech Research Group ,[object Object],[object Object],[object Object]
Clients that get requirements wrong overspend on the acquisition, customization and implementation of their solutions. Document for clarity. Info-Tech Research Group Document for accuracy. Use Info-Tech’s “ Business Requirements Document Template ,” to collect stakeholder requirements ,[object Object],[object Object],[object Object],[object Object]
Document business requirements with proven modeling techniques. ,[object Object],[object Object],[object Object],Info-Tech Research Group Pictures are worth a thousand words. See Info-Tech’s “ Use Case Template ” for guidance on creating a detailed view of requirements. 5 Ways to Optimize a Use Case Model  1. Describe the proposed functions. 2. Represent a discrete unit of interaction between a user (human or machine) and the system. This interaction is a single unit of meaningful work, such as  Create Account  or  View Account Details .  3. Provide the detailed view of the requirements.  4. Provide a high-level flow but do not attempt to design the actual product.  5. Describe the functionality to be built in the proposed system.
Improve the business results by defining good usability requirements.  ,[object Object],[object Object],[object Object],Use  Info-Tech's “Usability Goals and Requirements” template  to set targets and necessities which will help improve the enterprise's bottom line. Info-Tech Research Group Document for accuracy. Use Info-Tech's “ Usability Goals and Requirements " template to help set usability targets and necessities.
Consider you peers’ solutions to overcoming common barriers when assessing requirements and offering alternatives. Info-Tech Research Group Barrier Solution ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary Info-Tech Research Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Appendix I: Tools Info-Tech Research Group ,[object Object],[object Object],[object Object],[object Object]
Follow the Requirements Management Process to ensure the solution will meet business objectives. ,[object Object],[object Object],[object Object],[object Object],[object Object],The IEEE  “Guide to the Software Engineering Body of Knowledge” (SWEBOK)   Info-Tech Research Group
Formal certification for Business Analysts offers benefits for both the BA and the organization Info-Tech Research Group The International Institute of Business Analysis (IIBA) offers professional certification for Business Analysts.  The Certified Business Analyst Professional ®(CBAP) certification offers benefits to both analysts and the organizations that employ them. For more information visit:  http://www.theiiba.org/AM/Template.cfm?Section=Certification   Benefits to the Analyst ,[object Object],[object Object],[object Object],[object Object],[object Object],Benefits to the Employer ,[object Object],[object Object],[object Object],[object Object],[object Object]
Choose the right elicitation techniques by understanding the pros and cons of each approach. Info-Tech Research Group Elicitation Technique Strengths Weaknesses Structured Interviews ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Survey Questionnaire ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Choose the right elicitation techniques by understanding the pros and cons of each approach. (cont’d) Info-Tech Research Group Elicitation Technique Strengths Weaknesses Focus Groups & Workshops ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Shadowing/ Observation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Choose the right elicitation techniques by understanding the pros and cons of each approach. (cont’d) Info-Tech Research Group Elicitation Technique Strengths Weaknesses Storyboards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Prototyping ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Use Cases ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Choose the right elicitation techniques by understanding the pros and cons of each approach. (cont’d) Info-Tech Research Group Elicitation Technique Strengths Weaknesses Structured Demos ,[object Object],[object Object],[object Object],[object Object],[object Object],Document Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
  INCOSE SE Tools Database: Requirements Management Tool Summaries and Vendor Contact Information (March 4, 2010) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Info-Tech Research Group
INCOSE SE Tools Database: Requirements Management  Tool Summaries and Vendor Contact Information (March 4, 2010) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cont’d Info-Tech Research Group
Appendix II: Methodology Info-Tech Research Group ,[object Object],[object Object],[object Object],[object Object]
Appendix III: Top Level Graphs Info-Tech Research Group
 
 
 
 
 

More Related Content

What's hot

Smart Contracts AI Article
Smart Contracts AI ArticleSmart Contracts AI Article
Smart Contracts AI ArticleShannon Copeland
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
IT Survey: UK and Germany SMEs
IT Survey: UK and Germany SMEsIT Survey: UK and Germany SMEs
IT Survey: UK and Germany SMEsSolarWinds
 
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...EMC
 
CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?John Newton
 
Top ECM Trends in Digital Enterprise
Top ECM Trends in Digital EnterpriseTop ECM Trends in Digital Enterprise
Top ECM Trends in Digital EnterpriseJohn Newton
 
Intel Corporate Change Agent
Intel Corporate Change AgentIntel Corporate Change Agent
Intel Corporate Change AgentRichard Platt
 
3gamma whitepaper the state of it service management in agile organizations (...
3gamma whitepaper the state of it service management in agile organizations (...3gamma whitepaper the state of it service management in agile organizations (...
3gamma whitepaper the state of it service management in agile organizations (...Jens Ekberg
 
Survey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management SolutionsSurvey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management SolutionsSolarWinds
 
Vertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPVertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPLuke Arrington
 
Traversing the M&A Minefield
Traversing the M&A MinefieldTraversing the M&A Minefield
Traversing the M&A MinefieldDave Refault
 
Agile wp digital_a
Agile wp digital_aAgile wp digital_a
Agile wp digital_a3gamma
 
Business - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITDinesh O Bareja
 
8 common brick walls that slow down not-for-profits
8 common brick walls that slow down not-for-profits8 common brick walls that slow down not-for-profits
8 common brick walls that slow down not-for-profitsGreentree International
 
How Green is India and Green IT Mars Vapours Solution
How Green is India and Green IT Mars Vapours SolutionHow Green is India and Green IT Mars Vapours Solution
How Green is India and Green IT Mars Vapours SolutionLeo Zalki
 
IS Issue: IT Integration during M&A
IS Issue: IT Integration during M&AIS Issue: IT Integration during M&A
IS Issue: IT Integration during M&AAmit_Pawar
 
Minimize IT Project Failures!
Minimize IT Project Failures!Minimize IT Project Failures!
Minimize IT Project Failures!ITPSB Pty Ltd
 
Stop Blaming The Software - Corporate Profiling for IT Project Success
Stop Blaming The Software - Corporate Profiling for IT Project SuccessStop Blaming The Software - Corporate Profiling for IT Project Success
Stop Blaming The Software - Corporate Profiling for IT Project SuccessITPSB Pty Ltd
 
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034Maru Schietekat
 

What's hot (20)

Smart Contracts AI Article
Smart Contracts AI ArticleSmart Contracts AI Article
Smart Contracts AI Article
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
IT Survey: UK and Germany SMEs
IT Survey: UK and Germany SMEsIT Survey: UK and Germany SMEs
IT Survey: UK and Germany SMEs
 
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
 
CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?
 
Top ECM Trends in Digital Enterprise
Top ECM Trends in Digital EnterpriseTop ECM Trends in Digital Enterprise
Top ECM Trends in Digital Enterprise
 
Intel Corporate Change Agent
Intel Corporate Change AgentIntel Corporate Change Agent
Intel Corporate Change Agent
 
3gamma whitepaper the state of it service management in agile organizations (...
3gamma whitepaper the state of it service management in agile organizations (...3gamma whitepaper the state of it service management in agile organizations (...
3gamma whitepaper the state of it service management in agile organizations (...
 
Survey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management SolutionsSurvey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management Solutions
 
Vertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPVertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WP
 
Non Profit IT pyramid
Non Profit IT pyramidNon Profit IT pyramid
Non Profit IT pyramid
 
Traversing the M&A Minefield
Traversing the M&A MinefieldTraversing the M&A Minefield
Traversing the M&A Minefield
 
Agile wp digital_a
Agile wp digital_aAgile wp digital_a
Agile wp digital_a
 
Business - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of IT
 
8 common brick walls that slow down not-for-profits
8 common brick walls that slow down not-for-profits8 common brick walls that slow down not-for-profits
8 common brick walls that slow down not-for-profits
 
How Green is India and Green IT Mars Vapours Solution
How Green is India and Green IT Mars Vapours SolutionHow Green is India and Green IT Mars Vapours Solution
How Green is India and Green IT Mars Vapours Solution
 
IS Issue: IT Integration during M&A
IS Issue: IT Integration during M&AIS Issue: IT Integration during M&A
IS Issue: IT Integration during M&A
 
Minimize IT Project Failures!
Minimize IT Project Failures!Minimize IT Project Failures!
Minimize IT Project Failures!
 
Stop Blaming The Software - Corporate Profiling for IT Project Success
Stop Blaming The Software - Corporate Profiling for IT Project SuccessStop Blaming The Software - Corporate Profiling for IT Project Success
Stop Blaming The Software - Corporate Profiling for IT Project Success
 
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
Delphix_IDC_Analyst_Report_Holistic.pdf-aliId=496034
 

Viewers also liked

Software Engineering: Models
Software Engineering: ModelsSoftware Engineering: Models
Software Engineering: ModelsDavid Millard
 
Software Requirement Elicitation Techniques http://www.imran.xyz
Software Requirement Elicitation Techniques http://www.imran.xyzSoftware Requirement Elicitation Techniques http://www.imran.xyz
Software Requirement Elicitation Techniques http://www.imran.xyzImran Hussain Khan
 
TP-Sistemas Información I (335) (2012-1) (primer momento)
TP-Sistemas Información I (335) (2012-1) (primer momento)TP-Sistemas Información I (335) (2012-1) (primer momento)
TP-Sistemas Información I (335) (2012-1) (primer momento)rubenferm
 
Barriers of communication
Barriers of communicationBarriers of communication
Barriers of communicationUdit Jain
 
What Exactly are the Techniques of Software Verification & Validation
What Exactly are the Techniques of Software Verification & ValidationWhat Exactly are the Techniques of Software Verification & Validation
What Exactly are the Techniques of Software Verification & ValidationYogindernath Gupta
 
verification and validation
verification and validationverification and validation
verification and validationDinesh Pasi
 
Fases De Analisis
Fases De AnalisisFases De Analisis
Fases De AnalisisJosse Perez
 
Sample Business Requirement Document
Sample Business Requirement DocumentSample Business Requirement Document
Sample Business Requirement DocumentIsabel Elaine Leong
 
Example requirements specification
Example requirements specificationExample requirements specification
Example requirements specificationindrisrozas
 
Requirements Gathering Best Practice Pack
Requirements Gathering Best Practice PackRequirements Gathering Best Practice Pack
Requirements Gathering Best Practice PackAmy Slater
 
Requirement elicitation
Requirement elicitationRequirement elicitation
Requirement elicitationvivacemente
 
Business requirements gathering and analysis
Business requirements gathering and analysisBusiness requirements gathering and analysis
Business requirements gathering and analysisMena M. Eissa
 

Viewers also liked (14)

Software Engineering: Models
Software Engineering: ModelsSoftware Engineering: Models
Software Engineering: Models
 
Software Requirement Elicitation Techniques http://www.imran.xyz
Software Requirement Elicitation Techniques http://www.imran.xyzSoftware Requirement Elicitation Techniques http://www.imran.xyz
Software Requirement Elicitation Techniques http://www.imran.xyz
 
TP-Sistemas Información I (335) (2012-1) (primer momento)
TP-Sistemas Información I (335) (2012-1) (primer momento)TP-Sistemas Información I (335) (2012-1) (primer momento)
TP-Sistemas Información I (335) (2012-1) (primer momento)
 
Barriers of communication
Barriers of communicationBarriers of communication
Barriers of communication
 
What Exactly are the Techniques of Software Verification & Validation
What Exactly are the Techniques of Software Verification & ValidationWhat Exactly are the Techniques of Software Verification & Validation
What Exactly are the Techniques of Software Verification & Validation
 
verification and validation
verification and validationverification and validation
verification and validation
 
Fases De Analisis
Fases De AnalisisFases De Analisis
Fases De Analisis
 
Software Process Models
Software Process ModelsSoftware Process Models
Software Process Models
 
Sample Business Requirement Document
Sample Business Requirement DocumentSample Business Requirement Document
Sample Business Requirement Document
 
Example requirements specification
Example requirements specificationExample requirements specification
Example requirements specification
 
Requirements Gathering Best Practice Pack
Requirements Gathering Best Practice PackRequirements Gathering Best Practice Pack
Requirements Gathering Best Practice Pack
 
Waterfall model
Waterfall modelWaterfall model
Waterfall model
 
Requirement elicitation
Requirement elicitationRequirement elicitation
Requirement elicitation
 
Business requirements gathering and analysis
Business requirements gathering and analysisBusiness requirements gathering and analysis
Business requirements gathering and analysis
 

Similar to Overcome barriers to good req mgmt

Ba process plan- IGATE Global Solutions LTD
Ba process plan- IGATE Global Solutions LTDBa process plan- IGATE Global Solutions LTD
Ba process plan- IGATE Global Solutions LTDDebarata Basu
 
The picture is indeed meant to startle — he doesn’t like the facts.docx
The picture is indeed meant to startle — he doesn’t like the facts.docxThe picture is indeed meant to startle — he doesn’t like the facts.docx
The picture is indeed meant to startle — he doesn’t like the facts.docxssusera34210
 
7 Steps to Transform Your Enterprise Architecture Practice
7 Steps to Transform Your Enterprise Architecture Practice7 Steps to Transform Your Enterprise Architecture Practice
7 Steps to Transform Your Enterprise Architecture Practicepenni333
 
The Value PMLC Process Capability
The Value PMLC Process CapabilityThe Value PMLC Process Capability
The Value PMLC Process CapabilityBill Monroe
 
Effective Business Analysis
Effective Business AnalysisEffective Business Analysis
Effective Business AnalysisKailash Sumana
 
Creating Optimized Business Relationships - Article #1
Creating Optimized Business Relationships - Article #1Creating Optimized Business Relationships - Article #1
Creating Optimized Business Relationships - Article #1Lawrence Dillon
 
How to Reach Peak Performance With the Product Management Organizational Heal...
How to Reach Peak Performance With the Product Management Organizational Heal...How to Reach Peak Performance With the Product Management Organizational Heal...
How to Reach Peak Performance With the Product Management Organizational Heal...Aggregage
 
Kick-Starting Digital Transformation: Four IT Strategies
Kick-Starting Digital Transformation: Four IT StrategiesKick-Starting Digital Transformation: Four IT Strategies
Kick-Starting Digital Transformation: Four IT StrategiesCognizant
 
Aligning Business and Technology for Competitive Advantage
Aligning Business and Technology for Competitive AdvantageAligning Business and Technology for Competitive Advantage
Aligning Business and Technology for Competitive AdvantageDijitle
 
Improve success DevOps
Improve success DevOpsImprove success DevOps
Improve success DevOpsAbhishek Sood
 
IT Project Success through Corporate Profiling
IT Project Success through Corporate ProfilingIT Project Success through Corporate Profiling
IT Project Success through Corporate ProfilingITPSB Pty Ltd
 
Minimizing Business Risk in IT Projects
Minimizing Business Risk in IT ProjectsMinimizing Business Risk in IT Projects
Minimizing Business Risk in IT ProjectsITPSB Pty Ltd
 
Cfo insights evaluating_it
Cfo insights evaluating_itCfo insights evaluating_it
Cfo insights evaluating_itKamalakar Yadav
 
7 factors responsible for the failure of it projects converted (1)
7 factors responsible for the failure of it projects converted (1)7 factors responsible for the failure of it projects converted (1)
7 factors responsible for the failure of it projects converted (1)RutujaJagtap19
 
12 Guidelines For Success in Data Quality Projects
12 Guidelines For Success in Data Quality Projects12 Guidelines For Success in Data Quality Projects
12 Guidelines For Success in Data Quality ProjectsInnovative_Systems
 
Optimizing Digital Business Outcomes
Optimizing Digital Business OutcomesOptimizing Digital Business Outcomes
Optimizing Digital Business OutcomesBob Kantor
 
Optimize Your Execution by Aligning Business and IT
Optimize Your Execution by Aligning Business and ITOptimize Your Execution by Aligning Business and IT
Optimize Your Execution by Aligning Business and ITcapstera
 
Aligning business and tech thru capabilities - A capstera thought paper
Aligning business and tech thru capabilities  - A capstera thought paperAligning business and tech thru capabilities  - A capstera thought paper
Aligning business and tech thru capabilities - A capstera thought paperSatyaIluri
 
Chapter 9 Changing Your Requirements-Gathering Mind-Set Th.docx
Chapter 9 Changing Your Requirements-Gathering Mind-Set Th.docxChapter 9 Changing Your Requirements-Gathering Mind-Set Th.docx
Chapter 9 Changing Your Requirements-Gathering Mind-Set Th.docxchristinemaritza
 

Similar to Overcome barriers to good req mgmt (20)

Ba process plan- IGATE Global Solutions LTD
Ba process plan- IGATE Global Solutions LTDBa process plan- IGATE Global Solutions LTD
Ba process plan- IGATE Global Solutions LTD
 
The picture is indeed meant to startle — he doesn’t like the facts.docx
The picture is indeed meant to startle — he doesn’t like the facts.docxThe picture is indeed meant to startle — he doesn’t like the facts.docx
The picture is indeed meant to startle — he doesn’t like the facts.docx
 
7 Steps to Transform Your Enterprise Architecture Practice
7 Steps to Transform Your Enterprise Architecture Practice7 Steps to Transform Your Enterprise Architecture Practice
7 Steps to Transform Your Enterprise Architecture Practice
 
Getting it right
Getting it right Getting it right
Getting it right
 
The Value PMLC Process Capability
The Value PMLC Process CapabilityThe Value PMLC Process Capability
The Value PMLC Process Capability
 
Effective Business Analysis
Effective Business AnalysisEffective Business Analysis
Effective Business Analysis
 
Creating Optimized Business Relationships - Article #1
Creating Optimized Business Relationships - Article #1Creating Optimized Business Relationships - Article #1
Creating Optimized Business Relationships - Article #1
 
How to Reach Peak Performance With the Product Management Organizational Heal...
How to Reach Peak Performance With the Product Management Organizational Heal...How to Reach Peak Performance With the Product Management Organizational Heal...
How to Reach Peak Performance With the Product Management Organizational Heal...
 
Kick-Starting Digital Transformation: Four IT Strategies
Kick-Starting Digital Transformation: Four IT StrategiesKick-Starting Digital Transformation: Four IT Strategies
Kick-Starting Digital Transformation: Four IT Strategies
 
Aligning Business and Technology for Competitive Advantage
Aligning Business and Technology for Competitive AdvantageAligning Business and Technology for Competitive Advantage
Aligning Business and Technology for Competitive Advantage
 
Improve success DevOps
Improve success DevOpsImprove success DevOps
Improve success DevOps
 
IT Project Success through Corporate Profiling
IT Project Success through Corporate ProfilingIT Project Success through Corporate Profiling
IT Project Success through Corporate Profiling
 
Minimizing Business Risk in IT Projects
Minimizing Business Risk in IT ProjectsMinimizing Business Risk in IT Projects
Minimizing Business Risk in IT Projects
 
Cfo insights evaluating_it
Cfo insights evaluating_itCfo insights evaluating_it
Cfo insights evaluating_it
 
7 factors responsible for the failure of it projects converted (1)
7 factors responsible for the failure of it projects converted (1)7 factors responsible for the failure of it projects converted (1)
7 factors responsible for the failure of it projects converted (1)
 
12 Guidelines For Success in Data Quality Projects
12 Guidelines For Success in Data Quality Projects12 Guidelines For Success in Data Quality Projects
12 Guidelines For Success in Data Quality Projects
 
Optimizing Digital Business Outcomes
Optimizing Digital Business OutcomesOptimizing Digital Business Outcomes
Optimizing Digital Business Outcomes
 
Optimize Your Execution by Aligning Business and IT
Optimize Your Execution by Aligning Business and ITOptimize Your Execution by Aligning Business and IT
Optimize Your Execution by Aligning Business and IT
 
Aligning business and tech thru capabilities - A capstera thought paper
Aligning business and tech thru capabilities  - A capstera thought paperAligning business and tech thru capabilities  - A capstera thought paper
Aligning business and tech thru capabilities - A capstera thought paper
 
Chapter 9 Changing Your Requirements-Gathering Mind-Set Th.docx
Chapter 9 Changing Your Requirements-Gathering Mind-Set Th.docxChapter 9 Changing Your Requirements-Gathering Mind-Set Th.docx
Chapter 9 Changing Your Requirements-Gathering Mind-Set Th.docx
 

More from Info-Tech Research Group

Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionInfo-Tech Research Group
 
Master Contract Review and Negotiation For Software Agreements-sample
Master Contract Review and Negotiation For Software Agreements-sampleMaster Contract Review and Negotiation For Software Agreements-sample
Master Contract Review and Negotiation For Software Agreements-sampleInfo-Tech Research Group
 
Improve IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapImprove IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapInfo-Tech Research Group
 
Build a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramBuild a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramInfo-Tech Research Group
 
Optimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and PrioritizationOptimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and PrioritizationInfo-Tech Research Group
 
Modernize Communications and Collaboration Infrastructure
Modernize Communications and Collaboration InfrastructureModernize Communications and Collaboration Infrastructure
Modernize Communications and Collaboration InfrastructureInfo-Tech Research Group
 
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsCraft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsInfo-Tech Research Group
 
Develop a Project Portfolio Management Strategy
Develop a Project Portfolio Management StrategyDevelop a Project Portfolio Management Strategy
Develop a Project Portfolio Management StrategyInfo-Tech Research Group
 
Implement an enterprise service bus revised
Implement an enterprise service bus    revisedImplement an enterprise service bus    revised
Implement an enterprise service bus revisedInfo-Tech Research Group
 

More from Info-Tech Research Group (20)

Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
 
Create a Winning BPI Playbook
Create a Winning BPI PlaybookCreate a Winning BPI Playbook
Create a Winning BPI Playbook
 
Master Contract Review and Negotiation For Software Agreements-sample
Master Contract Review and Negotiation For Software Agreements-sampleMaster Contract Review and Negotiation For Software Agreements-sample
Master Contract Review and Negotiation For Software Agreements-sample
 
Optimize Change Management
Optimize Change ManagementOptimize Change Management
Optimize Change Management
 
Improve IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapImprove IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure Roadmap
 
Build a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramBuild a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management Program
 
Standardize the Service Desk
Standardize the Service DeskStandardize the Service Desk
Standardize the Service Desk
 
Optimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and PrioritizationOptimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and Prioritization
 
Modernize Communications and Collaboration Infrastructure
Modernize Communications and Collaboration InfrastructureModernize Communications and Collaboration Infrastructure
Modernize Communications and Collaboration Infrastructure
 
Optimize the IT Operating Model
Optimize the IT Operating ModelOptimize the IT Operating Model
Optimize the IT Operating Model
 
Info-Tech Membership Overview
Info-Tech Membership OverviewInfo-Tech Membership Overview
Info-Tech Membership Overview
 
Define an EA Operating Model
Define an EA Operating ModelDefine an EA Operating Model
Define an EA Operating Model
 
Become a Transformational CIO
Become a Transformational CIOBecome a Transformational CIO
Become a Transformational CIO
 
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsCraft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
 
Build and Information Security Strategy
Build and Information Security StrategyBuild and Information Security Strategy
Build and Information Security Strategy
 
Build an Application Integration Strategy
Build an Application Integration StrategyBuild an Application Integration Strategy
Build an Application Integration Strategy
 
Develop a Project Portfolio Management Strategy
Develop a Project Portfolio Management StrategyDevelop a Project Portfolio Management Strategy
Develop a Project Portfolio Management Strategy
 
Implement an enterprise service bus revised
Implement an enterprise service bus    revisedImplement an enterprise service bus    revised
Implement an enterprise service bus revised
 
Implement a Shared Services Model
Implement a Shared Services ModelImplement a Shared Services Model
Implement a Shared Services Model
 
Assess and Optimize EA Capability
Assess and Optimize EA CapabilityAssess and Optimize EA Capability
Assess and Optimize EA Capability
 

Recently uploaded

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Overcome barriers to good req mgmt

  • 1. Overcome the Barriers to Good Requirements Management Info-Tech Research Group “ As a CIO, if you do not understand your business requirements process, quit.” -CIO, Information Services Organization
  • 2.
  • 3.
  • 4. Info-Tech Research Group Case Studies and Best Practices Business Acumen Understanding Requirements Validating Requirements Assessing Requirements Business Requirements Connect Project Success with Good Requirements Understand the Impacts of Poor Requirements Perform a Requirements Health Check on Your Organization
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Recognize the need for trust and credibility with business partners. Info-Tech Research Group In organizations today it is common to hear IT staff talking about "the business“, and to hear IT’s internal and external customers referring to IT as “computer geeks”. Its as though both exist in separate worlds where common language isn’t spoken. In reality, until both sides can develop alignment and synergy , the organization cannot remain in business without IT for very long. And without the business, IT’s rasion d’etre evaporates. IT needs to spearhead the drive to forge a partnership with their customers. The first hammer stroke is working with stakeholders to develop best practices in business requirements management in order to build trust and credibility. Info-Tech Insight:
  • 10. Don’t fall into common requirements management traps. Follow the tips and tricks of your peers to learn what not to do . Info-Tech Research Group Before you begin gathering requirements, have an open discussion with the project manager to define roles, expectations and the difference between a project issue and a requirements issue. “ We used to jump directly into projects - the BAs, the PMs and the stakeholders. I realized very quickly that project managers are a fairly direct, controlling breed because they have to be, and that you could easily have conflict between senior business analysts and the PMs. For example, we have had situations where there was pretty high tension, because a project manager felt that they should be the only person talking to the sponsors . For a long time, I didn’t really have the discussion with the project manager around, ‘This is how I see my role or the analyst’s role, and this is how we see the PM role, and here’s when it’s a requirements issue and here’s when it’s a project issue. How do you want to handle communication to the business?” You have to have that open discussion or the two are going to just run against each other. We also started defining the difference between a project issue and a requirements issue, so we knew who needed to be involved if a problem arose. This upfront, open conversation helped us to develop a sense of peer leadership instead of hierarchy on projects.” -Senior Systems Analyst, Insurance Industry The DON’Ts… The DO’s… Don’t leave role of BAs versus role of PM up for debate. Clearly define the role and expectations of the BA, the PM and the stakeholders. Don’t involve the technical analysts too early. Bring the developers and the designers into the conversation after the project objectives are defined. Don’t invest too much time, money and sweat equity in mockups. If they don’t work out, you may demoralize your IT group. Use mockups but keep them simple. They are meant to seek out issues and ideas, not offer a completed solution. Don’t forget to involve your stakeholders in review and assessment of requirements. Maintain dialogue and feedback loop with your stakeholders. Continuously assess and validate the requirements with them.
  • 11. Define the objectives of the project before trying to solve the problem. Keep developers away until objectives are defined. Info-Tech Research Group “ I have let my technical analysts become overbearing on the requirements process before, and they start getting into what they think is easy to achieve as opposed to what’s needed. Introduction of the technical analysts too soon will get the group into solving a problem before they’ve defined what it is you’re actually trying to do. I think this might be a guy thing - because I do this too. For example, my wife comes home and she’s got this picture and asks me to hang it. Instead of asking where are we going to put it, how high should I hang it, how does this look, I’m immediately thinking, ‘I get to use this tool,’ and ‘oh, I don’t have any of those hooks. I’d better go to Home Depot.’ I’m immediately off solving the problem. In this analogy, the IT people are me, and they have to be brought back to the part where they’re just listening to the business user (my wife), talk about her requirements and think through those issues. She’s not going to walk in and say ‘I want it right here.’ It’s going to change. That requirement will move. You want to get the IT guys in at some point, but how do you control them so they don’t solve the problem too soon? It can ultimately lead to bad placement on the wall.” -CIO, Energy Industry
  • 12. Assess the health of your organization’s requirements gathering practices to highlight areas for improvement. Info-Tech Research Group Signs that your requirement management process needs improvement : Perform your own health check. Use the “ Business Requirements Management Health Assessment Tool ” to assess the need for improvement.
  • 13. Info-Tech Research Group Case Studies and Best Practices Business Acumen Understanding Requirements Validating Requirements Assessing Requirements Business Requirements Connect Project Success with Good Requirements Understand the Impacts of Poor Requirements Perform a Requirements Health Check on Your Organization
  • 14.
  • 15.
  • 16. Business Acumen Info-Tech Research Group
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. Assign the Business Analyst as the pivot, ensuring understanding between both IT and the business Info-Tech Research Group They need to have a variety of characteristics, but at their heart, underlying it all, there has to be a little geekette or geek in them. -CIO, Financial Services Industry ” “ They have to be able to speak business speak, and translate that into speak that the developers and architects can make use of. They have to take technical issues to the business decision makers with options, in a way they can understand – so translate back from techie to business as well. -Senior Systems Analyst, Insurance Industry They have to listen to what the business is trying to do, not be judgmental about that, and then come up with ideas about how that could be accomplished. -IT Leader, Electric Energy Provider ” ” “ “ Info-Tech Insight: You are not doing your job if the BA feels they are constantly being dumped on. The BA can be the quarterback, but not the whole team  . Make the BA role a formal one. Use the Info-Tech “ Business Requirements Analyst ” job description template to create the role in your organization.
  • 23.
  • 24. Debate your alternatives when recruiting BAs – success can be achieved with BAs from the business or from IT. Info-Tech Research Group There is ongoing debate as to whether BAs should be recruited internally, externally or a mixture of both. With pros and cons for each argument, in the end, it comes down to the skills and competencies of the individual, and how they are cultivated in the organization. “ They’re bridging the gap between the technical part of IT and the actual process of the business. “ “ They certainly don’t have any chops that would allow them to have any level of discussion that would leave the technical people wailing away thinking of them as a credible interface.”
  • 25.
  • 27.
  • 28.
  • 29.
  • 30. Use specialized techniques to elicit requirements in ways that avoid the inherent limitations of stakeholder self-reports. Info-Tech Research Group 1 Have at least one collaborative session Group sessions sort out disagreements between stakeholders. They encourage creative input as individuals become inspired by the ideas of others.  Don’t follow the process blindly Each interaction with a stakeholder is an opportunity to better understand their needs. Think critically about the information they provide and ask follow up questions. Use more than one elicitation technique to complement differences in each method. Techniques are outlined in the following slides. Use a variety of elicitation techniques. When choosing requirements techniques, keep the following in mind: 4 5 6 Choose at least one face-to-face technique. Interaction with end users through shadowing, prototyping, interviewing, or structured demonstrations can reveal valuable non-verbal information (e.g. reactions, difficulties, etc.) about requirements.   Select an audience that is representative of key interest groups. Even a seemingly perfect combination of elicitation techniques can be undermined if the process ignores critical stakeholders. Missing stakeholders means missing requirements. Don't let the elicitation process eclipse project deadlines. Limit the number of techniques you choose to 2 or 3. Any requirements that are missed can be caught when testing prototypes. Avoid elicitation paralysis. 2 3 See Appendix I for a detailed list and descriptions of elicitation techniques.
  • 31.
  • 32.
  • 34.
  • 35.
  • 36.
  • 37. Adopt Agile methodology for projects with frequently changing requirements Info-Tech Research Group Define System System Owner Customers Release Roadmap Track and Adjust Plan Releases Iterative Development Release Accept Work Products Agile Development is based on iterative development, where requirements and solutions are developed through the collaboration of cross functional teams. Agile methods follow a disciplined project management process based on frequent inspection and adaptation. Functional deliverables are small and time boxed. The best practices allow for rapid, small, high-quality releases that align development with customer needs and company goals.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. Decide when good enough is good enough. Know when to commit. 0 Info-Tech Research Group IT Commitment. When does IT commit to a target of meeting the defined requirements? IT commits when stakeholders have signed off on the requirements. During design, issues may arise that mean IT will not be able to build or meet all requirements as defined. IT will initiate requirements change control to document, communicate and resolve the issue with the business and reach a new commitment. Confirm Decisions. How is consensus communicated? Document! Don’t make assumptions. Provide detailed documentation of requirements, issues and decisions to all stakeholders Close the feedback loop. When are requirements “good enough,” to move on to the next stage in the project? This depends on the nature of the project – its size, complexity and timeline. Requirements are good enough when: Stakeholders have reached consensus on requirements. Conflicts are resolved. Enough detail has been provided for the designers/developers to understand and proceed. Stakeholders have signed off. “ See first that the design is wise and just: that ascertained, pursue it resolutely do not for one repulse forego the purpose that you resolved to effect.” - William Shakespeare
  • 43.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63. Appendix III: Top Level Graphs Info-Tech Research Group
  • 64.  
  • 65.  
  • 66.  
  • 67.  
  • 68.