Solved

Business Analysis Techniques for Information Systems

Posted on 2006-06-10
4
108 Views
Last Modified: 2008-03-03

Hi there,

I"m just starting out as a business analyst and it would be of great help to me if you could please clarify the following BA issues with me.

Can you please provide more information in terms of the most common techniques a BA should use when trying to create a software solution for a business in terms of the following:

1. Business gathering techniques?
2.Analysis and design techniques?

Also:

3. When gathering business requirements, at what point do you know that you have collect all you require from the business units? Is there a way to measure this?
4. When coming up with test cases, it's usual that it comes from the use cases you've generated in the analysis stage. But this doesn't necessarily ensure that it's a full prove test method - how is one able to determine a suitable number of test cases outside from the use cases?


Many thanks,
Neesh
0
Comment
Question by:Neesh75
4 Comments
 
LVL 31

Accepted Solution

by:
moorhouselondon earned 63 total points
ID: 16879954
1. Get the client to show you the procedures that the company currently uses.  Computer systems should mirror the way the business works, not the other way round *unless* the companies procedures are inefficient, but this will become apparent when talking to the client.  So if the company manufactures widgets, you might start by asking how the components to build the widgets are acquired - design, specification, purchase orders, delivery notes, invoices, QA.  Then you have to turn these component parts into widgets through some manufacturing process.  How is that manufacturing process administered?  ...and so on.  

2. Next, you draw a block diagram of the entire company's processes.  The way to think about this is to start off with one box with the company name on it, with one arrow going in, and one arrow coming out).  In: components.  Out: widgets  (the MD might like two arrows coming out: Money).  Not very useful, so you gradually carve up the block into smaller blocks, until you get to the stage where you know you can give it to a third party to implement it.  Note that a computer system such as this is not a computer system full stop.  There are interfaces between the computer system and humans which are crucial to the success of the overall process.  These interfaces can best be visualised as Forms, these forms can be integrated into the block diagram too.

3. Difficult to know without in-depth talks with the client.  The client should be made aware that anything that they haven't told you about is going to cause problems to the design later on when suddenly remembered.  The block diagram is your tool to talk to the client with.

4. Take actual business data and run it in parallel to the manual system.  Do the results differ?  Yes, then work still needs to be done.
0
 

Assisted Solution

by:jleemoore26
jleemoore26 earned 62 total points
ID: 16910535
Have you ever came acorss a methodology called PRINCE2 (the successor to PRINCE) ?  Projects In Controlled Environments ?  There are a few sites on the net that clearly explain the rules, documentation and processess involved with this methodology.  It is very informative and just what you may be looking for.  You can also find case studies on the net of companies that have successfully used this methodology.  This methodology includes clear definitions of boundaries (when to start various processes) etc..  It is a recognised project management methodology and you can sit exams to become a PRINCE Practitioner which, if you are starting out as a Business Analyst, may instill confidence in clients.

The level of detail I would need to go into to explain this methodology would be too much to post on this site, so a good starting point would be to go to www.prince2.com

Good luck
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

One of the biggest challenges facing freelancers is balancing multiple projects and deadlines. Organizational skills and time management are key to keeping up with projects and staying on track. Luckily, we’ve curated seven tools to help you focus o…
EE introduced a new rating method known as Level, which displays in your avatar as LVL. The new Level is a numeric ranking that is based on your Points. This article discusses the rationale behind the new method and provides the mathematical formula…
The Bounty Board allows you to request an article or video on any technical topic, or fulfill a bounty request to earn points. Watch this video to learn how to use the Bounty Board to get the content you want, earn points, and browse submitted bount…
Saved searches can save you time by quickly referencing commonly searched terms on any topic. Whether you are looking for questions you can answer or hoping to learn about a specific issue, a saved search can help you get the most out of your time o…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now