Blog Archives

system requirements document in story form example

the humble story of Tafe course enquirer   A long time ago, there was this man TAFE who was sitting on a bench. You can see the sadness in his eyes by his troubled past.   “I’m sorry TAFE we

Posted in Articles, Requirement Engineering

Why thinking of information security makes sense?

To fully understand why information security is important, we need to understand both the value of information and the consequences of such information being compromised. The Value of Information To understand the value of information, let’s start by examining some

Posted in Articles

Sensitive data ,Cloud data and the data privacy

Sensitive Data and Data privacy Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization. There are three main types of sensitive information: Personal information: Sensitive personally identifiable

Posted in Articles Tagged with:

Overengineering in IT projects

Software developers throw around this word, “overengineering,” “That code was overengineered.” “This is an overengineered solution.” Strangely enough, though, it’s hard to find an actual definition for the word. People are always giving examples of overengineered code, but rarely do

Posted in Articles Tagged with:

Australian Census 2016 Who Is Liable?

It was a dreary day in August, you were trying to finish work early to get home before the Census night deadline or risk paying a fine of $180 or more. You rushed home and sat down in front of

Posted in Articles

Ensuring data security with cloud encryption

  Cryptography has been with us since the dawn of human civilization.  People have wanted to keep sensitive information… from prying eyes long before the invention of the complex, computer-based encryption methods that we utilize today.  The ancient Greek protected

Posted in Articles

Cloud Concepts and the Impact on Business Analysts

Cloud Computing is generating significant interest and momentum. The cloud eco-system requires new considerations for the business analysis community to fully take advantage of cloud computing opportunities. This article provides links to key NIST Reference Architectures to provide a stable

Posted in Articles

Strategies on Dealing with Sensitive Data

Unless you are living under a rock or in a cave somewhere off grid, the not so United States of America chose a very eccentric leader earlier this week which made the last few days more or less a circus.

Posted in Articles

What is the BA’s role in shaping what customer data to store, if at all?

What is the BA’s role in shaping what customer data to store, if at all? Business analysts have a critical role to play in deciding what a customer data, if any, needs to be stored for a system in development

Posted in Articles

Ethics in ICT projects and Kaizen

Both small and large-scale ICT projects pose ethical questions for individuals including business analysts, developers, business product owners and strategy makers. Many questions may be raised including: What ethical standards are applicable for projects? Why are ethics important? When should

Posted in Articles