Oct 26, 2025
1684 Views
0 Comments
Every analyst knows the blank-page problem — the kickoff meeting is tomorrow, the requirements are vague, and the only thing clear is that you’ll need to bring order to chaos. Large Language Models (LLMs) like ChatGPT and Gemini are quickly changing how Business and Systems Analysts tack...
Every analyst knows the blank-page problem — the kickoff meeting is tomorrow, the requirements are vague, and the only thing clear is that you’ll need to bring order to...
Striking a balance between usability and security is a challenging yet crucial responsibility for business analysts, demanding a blend of technical expertise, empathy, and strategi...
You have to determine which quality requirements are most important to your project’s success, and then state specific objectives for them so designers can make appropriate c...

More Articles

23003 Views
13 Likes
0 Comments
When security requirements are considered at all during the system life cycle, they tend to be general lists of security features such as password protection, firewalls, virus detection tools, and the like. These are, in fact, not security requirements at all but rather implementation mechanisms that are intended to satisfy unstated requirements, such as authenticated access. As a result, security requirements that are specific to the system and that provide for protection of essential services and assets are often neglected. In addition, the attacker perspective is not considered, with the result that security requirements, when they exist, are likely to be incomplete. We believe that a systematic approach to security requirements engineering will help to avoid the problem of generic lists of features and to take into account the attacker perspective. Several approaches to security requirements engineering are described here and references are provided for additional material that can help you ensure that your products effectively meet security requirements.
21082 Views
20 Likes
0 Comments

This is the last article in this current  “Deep Dive Models in Agile” series and covers Decision Models, which include both Decision Trees and Decision Tables. Decision Models include two RML System models (Decision Trees and Decision Tables) that detail the system logic that either controls user functions or decides what actions a system will take in various circumstances.

19457 Views
13 Likes
0 Comments
The point is, no amount of elegant programming can solve a system problem without someone who understands the overall system architecture, someone who understands how the business works. Attacking systems development without such orchestration, such as one program at a time, will not produce the desired results. That would be like trying to build a bridge without a set of blueprints; it would probably be disjointed and one end would likely not connect with the other in the middle. 
22874 Views
42 Likes
0 Comments

What is Leading with Influence?... It is about the ability to affect the actions, decisions, and thinking of others to accomplish key goals or tasks that you consider to be important. Simply put, leading with influence is about getting people to willingly follow the direction that you provide when you lack organizational authority. It is about leading when you are not in charge. As a Business Analyst, I want delivery partners on a project to follow the guidance I provide without having to demand their compliance.

24316 Views
3 Likes
0 Comments

While BABOK and other sources include Behavioral Characteristics as an essential underlying competency for business analysts, many analysts may have only a vague idea of how it applies to their personal work environment, or even exactly what behavioral characteristics are, so let’s define those first.... The term behavioral characteristics simply refers to an analyst’s workplace ethics and character. 

 
Detect language » English
 
Page 93 of 100First   Previous   88  89  90  91  92  [93]  94  95  96  97  Next   Last   

Templates & Aides

Templates & AidesTemplates & Aides: find and share business analysis templates as well as other useful aides (cheat sheets, posters, reference guides) in our Templates & Aides repository.  Here are some examples:
* Requirements Template
* Use Case Template
* BPMN Cheat Sheet

Community Blog - Latest Posts

Driving Social Value Through Business Analysis
When people discuss business analysis, they typically think of requirements, processes, or systems. But one of the most rewarding projects I’ve worked on was very different: improving how my company reported its social value. Social value is about the positive impact an organisation makes beyond profit, things like sustainability and commu...
  Introduction In today’s fast-paced digital landscape, the role of the business analyst is evolving faster than ever. No longer just requirement gatherers, modern BAs are strategic partners who bridge business needs with technology solutions. Whether you're a seasoned analyst or just starting your journey, mastering the right ...
    Introduction Quantum computing has transitioned from a theoretical concept in academia to a technology on the verge of becoming real, with real potential for multiple industries. Therefore, understanding quantum computing will be increasingly important for business analysts, as it will be the most significant development ...

 



Upcoming Live Webinars

 




Copyright 2006-2025 by Modern Analyst Media LLC