This technique is used in a few different business analysis tasks in some knowledge areas of the BABOK® v3 guide. These tasks include the following:
Task |
How is this technique applied? |
Plan stakeholder engagement |
To identify any risks that occur due to stakeholder attitudes or inability to participate in an initiative |
Identify the business analysis performance improvements |
To identify risks to the initiative as a consequence of stakeholders' inability to participate or their attitudes in relation to their participation in an initiative |
Prepare for elicitation |
To help identify any risks that could disrupt or prevent the success of the elicitation activities |
Manage stakeholder collaboration |
To identify and manage the risks that relate to stakeholder participation, involvement, or engagement |
Prioritize the requirements |
To help understand any risks in the context of requirement prioritization activities |
Assess the requirement changes |
To determine the level of risk associated with a change introduced by an initiative |
Analyze the current state |
To identify any risks in relation to the current state |
Assess the risks |
To identify and manage any risks in the context of an initiative |
Validate the requirements |
To identify any risks that could prevent a requirement from delivering the anticipated value |
Analyze the potential value and recommend a solution |
To identify and manage any risks that could affect the potential value of a requirement |
Analyze the performance measures |
To identify and analyze risks by developing plans to help modify risks and/or manage them on an ongoing basis |
Assess the solution limitations |
To identify and manage any risks that could affect the potential value of a solution |
Assess the enterprise limitations |
To consider risks relating to technology, finance, and business where these risks could affect the potential value from being delivered to the enterprise |
Recommend actions to increase the solution value |
To evaluate different outcomes under specific conditions (in the context of risks) |
This technique provides a way of recording, managing, and planning for strategic, operational, and initiative risks in a formal way. It can also be a useful source of information for future initiatives where similar risks might occur and, therefore, mitigation activities used in the past can potentially be reused in the future.
The next technique you need to include in your preparation is a roles and permissions matrix.