Vendor assessment in business analysis

Business analysts use vendor assessment to evaluate the ability of a vendor to deliver and support a product or service.

If the solution is being provided by an external vendors there may be particular requirements in regards to the involvement … Read the rest

SWOT analysis for business analysts

SWOT analysis is an uncomplicated but effective tool that is used to assess an organization’s strengths, weaknesses, opportunities, and threats in both internal and external environments.

SWOT analysis is used to identify the general state of an organization both
internally … Read the rest

Survey and questionnaires in business analysis

Business analysts use surveys and questionnaires to gather business analysis information such as information on customers, products, policies, and cultures from the stakeholders.

Surveys and questionnaires are used to present a set of questions to the stakeholders, whose responses are … Read the rest

Stakeholder mapping in business analysis

Business analysts use stakeholder lists to help analyze stakeholders and their attributes.

It is used to spot all potential sources of requirements so that solutions made involving stakeholder engagement, collaboration, and communication are the best options for the stakeholder and … Read the rest

Sequence diagrams in business analysis

Business analysts use sequence or event diagrams to model the logic of management scenarios by showing the information passed between objects in the system through the execution of the scenario.

A sequence diagram shows how processes are connected during a … Read the rest

Scope modelling in business analysis

Scope models describes the essence of one or more boundaries and place components inside or outside those boundaries.

Scope models are usually used to define the boundaries of control, change, a solution, or a need.

These models may show components … Read the rest

Roles and permissions matrix in business analysis

Business analysts use the roles and permissions matrix to designate responsibilities, identify roles, discover missing roles and communicate the results of a planned change.

Role and permission matrix involves identifying roles, connecting them with solution activities, and designating authorities who … Read the rest