AllFreePapers.com - All Free Papers and Essays for All Students
Search

Process Modelling as Per Babok

Autor:   •  September 1, 2016  •  Exam  •  266 Words (2 Pages)  •  888 Views

Page 1 of 2

Process Modelling as per Babok (Pg. 318 V.3) is a graphical model used to show how work is allotted sequentially. It works across defined tasks and activities through an enterprise. It is normally constructed at multiple levels, and each component in the process is explained in detail precession.it generally describes the context or a part of the solution. It also provides a visual and a text description and is mostly intended for a non-technical person to understand the process flow of solution process.

Here we study RePAS project, created for Summerfields University with a proposal of a new routing process to the electronic system for tracking the applications and faster processing.

 Details of all the tasks in the processes, and the actors of each task

  1. Business Analysis Planning and monitoring (Select and Identify stakeholders)
  2. Stakeholder Analysis (Roles, requirements, responsibilities, needs)
  3. Plan Requirements Management
  4. Elicitation
  5. Requirement Analysis
  6. Solution assessment and validation

 (https://www.iiba.org/Learning-Development/Webinars/Public-Archive/2011/Business-Process-Modeling-Webinar-pdf.aspx)

Stake Holder (Dean of the University)

Subject Matter Expert (Principal Architect Summerfields University)

Data Architect (Subject matter expert)

Heads of all the four departments of the university (Stake Holders)

Teachers and students (End Users)

  • Reports/information needed by each actor to effectively manage this process

1.The Dean of the college needs a daily report on the forms processed.

2.The Heads of the departments need reports on Processed/Held/Rejected status of the Applications

3. The Auditing team needs report on total Grant received on the closing date of every month

4.The IT team needs reports on the exceptions encountered during processing the application.

  • Security requirements on data and system
  • Data needs to be encrypted
  • Has to go through 3 verification process until final submission.

[pic 1]

...

Download as:   txt (2 Kb)   pdf (60.2 Kb)   docx (304.4 Kb)  
Continue for 1 more page »