Kimball University: Overcoming Obstacles When Gathering Business Requirements - InformationWeek
IoT
IoT
Software // Information Management
News
6/1/2007
04:48 PM
50%
50%

Kimball University: Overcoming Obstacles When Gathering Business Requirements

How do you cope with "abused users, overbooked users, comatose users, clueless users" and "know-it-all users" during the requirements-gathering stage of a data warehouse/BI project? Kimball group offers its advice for proactively working with (or around) the uncooperative, unavailable, uninsightful and irrepressible types who sometimes make it hard to know just what the business needs.

Margy Ross Margy Ross
For nearly two decades, Kimball Group has stressed the importance of focusing on the business and its requirements for data warehouse/business intelligence success. We've provided specific requirements-gathering tips and techniques in previous articles and our Toolkit books, but what happens when things don't go according to plan? This article describes seven common challenges you may encounter during the requirements-gathering process along with Kimball Group's recommendations for overcoming these obstacles.

Abused User Uncooperative business executives and managers who claim "we already told IT what we want" are typically abused users. These folks have been interviewed repeatedly in the past for DW/BI initiatives but have yet to see anything result from their efforts. They are frustrated by past false starts and may even refuse to meet with a requirements team again.

You should proactively determine who was involved and interviewed in earlier DW/BI attempts. Any requirements documentation from the prior project should be reviewed. Unfortunately, documentation is seldom sufficient to take the place of a face-to-face meeting with the business representatives again. When scheduling meetings with these abused users, it's helpful to acknowledge their participation in previous efforts and let them know that you have already reviewed the resulting documentation. The new session can be presented as a validation, rather than as another back-to-the-beginning interview.

Naturally, users will resist rehashing previously covered territory, but they may be more willing to meet if you are focused on understanding current priorities. Finally, this is probably a good time to select an alternative forum for gathering requirements. If interviews were conducted previously, use the earlier requirements documentation as a baseline for a session focused on gather details on changes within their business.

Overbooked User These disengaged business users are simply too busy to meet anytime soon. They may agree to a scheduled time but then not show up or send a substitute in their place. An e-mail message from the program sponsor to all the participants about their importance to the initiative will often nip this disorder in the bud. However, if this is a contagious malady and executive management is unwilling or unable to address the condition, stop before you waste more effort. It's a safe bet that business users who don't have time to meet to share their requirements won't have time to attend education sessions and incorporate new information and analyses into their daily jobs, resulting in a never-ending, uphill struggle for the DW/BI team. Get off this slippery slope before further damage is done. You may be able to locate a more cooperative business partner elsewhere in your organization.

Comatose User These business users respond to your classic, open-ended questions with monosyllabic, one-word responses. Fortunately, this is a relatively rare syndrome. Most often, their apathetic responses are due to external distractions totally unrelated to the DW/BI project. It's sometimes effective to ask these people questions from a more negative perspective. For example, rather than trying to get them to envision life outside the box, these users sometimes find it easier to tell you what's wrong inside the box.

If you have to pry information out of interviewees like this, it's senseless to prolong everyone's pain as these interviews quickly become no fun for anyone involved. Make a valiant attempt, but if it is still not working, abort the interview and schedule a replacement representative if the user is in a critical function or position.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll