When should you apply this technique?

This technique is used in a few different business analysis tasks in some knowledge areas of the BABOK® v3 guide. These tasks include the following:

Task

How is this technique applied?

Plan stakeholder engagement

To identify any risks that occur due to stakeholder attitudes or inability to participate in an initiative

Identify the business analysis performance improvements

To identify risks to the initiative as a consequence of stakeholders' inability to participate or their attitudes in relation to their participation in an initiative

Prepare for elicitation 

To help identify any risks that could disrupt or prevent the success of the elicitation activities

Manage stakeholder collaboration

To identify and manage the risks that relate to stakeholder participation, involvement, or engagement

Prioritize the requirements

To help understand any risks in the context of requirement prioritization activities

Assess the requirement changes

To determine the level of risk associated with a change introduced by an initiative

Analyze the current state

To identify any risks in relation to the current state

Assess the risks

To identify and manage any risks in the context of an initiative

Validate the requirements

To identify any risks that could prevent a requirement from delivering the anticipated value

Analyze the potential value and recommend a solution

To identify and manage any risks that could affect the potential value of a requirement

Analyze the performance measures

To identify and analyze risks by developing plans to help modify risks and/or manage them on an ongoing basis

Assess the solution limitations

To identify and manage any risks that could affect the potential value of a solution

Assess the enterprise limitations

To consider risks relating to technology, finance, and business where these risks could affect the potential value from being delivered to the enterprise

Recommend actions to increase the solution value

To evaluate different outcomes under specific conditions (in the context of risks)

This technique provides a way of recording, managing, and planning for strategic, operational, and initiative risks in a formal way. It can also be a useful source of information for future initiatives where similar risks might occur and, therefore, mitigation activities used in the past can potentially be reused in the future.

The next technique you need to include in your preparation is a roles and permissions matrix.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset