1 / 13

Practical exercise 2 Stakeholder analysis

Practical exercise 2 Stakeholder analysis. Exercise overview. Emails Consider needs of different stakeholders The creators of the resource Repository manager as its curator Users of the resource Apply FBS-based analysis from InSPECT method Identify actual behaviours

acastle
Télécharger la présentation

Practical exercise 2 Stakeholder analysis

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Practical exercise 2 Stakeholder analysis

  2. Exercise overview • Emails • Consider needs of different stakeholders • The creators of the resource • Repository manager as its curator • Users of the resource • Apply FBS-based analysis from InSPECT method • Identify actual behaviours • Turn behaviours into functions • Express results as technical properties • Cross-match properties to those from Object Analysis

  3. • Identify Stakeholders • Creator – view, annotate • Researcher corresponds during research with colleagues, peers, administrators etc. • Recipient – reuses content • Student wants to understand research lifecycles by studying real-world practice • Custodian – evidential chain • Maintains permanent email record for externally-funded projects, alongside data and eprint outputs

  4. • Select object type for analysis • Emails from Object Analysis phase

  5. • Determine actual behaviours • What does the creator do? • Example: adds attachments in formats shared with recipient • What is the re-user expecting to do? • Example: copy and paste text into report • What requirements does the custodian have? • Example: provide authentic copy of email exchange for FOI request

  6. • Determine actual behaviours - practical • Split into groups • Identify 2-5 behaviours for each stakeholder • There may be repetition across stakeholders • 10mins

  7. Classifybehaviours into set of functions • Taking your behaviours from the exercise, we turn them into functions e.g. “Know that emails were sent/received with attachments” >> “Identify association of attachments” (Category: structure)

  8. • Cross-match functions • Which functions can you see match those from the Object Analysis stage?

  9. • Assign acceptable value boundaries • This stage might not be needed in all cases • An example from audio files is loss of stereo channels – that might be acceptable to some users (e.g. oral historians) but not for others (e.g. musicians) • What might your various stakeholders accept?

  10. • Review and finalise • What behaviours did you determine for the different stakeholders? • What functions did you identify? • What correlation between object and stakeholder properties? • This process may be iterative in the real world, and repeated for a new/changed Designated Community or Archive

More Related