14

Appendix A – Templates

We have used a variety of templates throughout this book.

The following templates are the ones that are all available. Please feel free to use these ideas as best practices, as best practices are good ideas:

  • Project intake form
  • Layout for a business case
  • Layout for a business case scenario description
  • A business case financial analysis
  • Layout for a risk assessment
  • Layout for a summary business case (for the conclusion and advice)
  • Layout information and measure plan
  • Layout for a KPI description
  • Table with the Inmon groups and a description of their roles

Project intake form

Part I – To be completed by the client

Project

Name:

Adjustment for existing application(s)

Yes, name:

No

Client details

Organizational unit client

Cost center number client

Client (budget manager)

Client role

Delegated client

Role delegated client

Contact person client

Role contact person

Relationship with other project(s)

Yes, name:

No

Project description

Briefly describe what the client wants to see realized.

Description of business unit

Briefly describe the function of the business unit for which the application is intended.

Non-functional requirements

Number of expected users

<10 | 10-50 | 50-100 | 100-250 | >250

Expected frequency of use

ad-hoc | daily | weekly | monthly | quarterly | yearly

expected mode of use

Standard reporting | Search interactively

Up-to-datedness of the data (refresh rate)

ad-hoc | daily | weekly | monthly | quarterly | yearly

Addition and or explanation

Data security check

A data security incident is a serious security breach. When protected, sensitive, or confidential data is stolen, used, viewed, stored, or transmitted by someone who is not authorized, a breach occurs. Other security concerns include data leaks, information leaks (who can see what), sensitive information leaks, and data spillage. As a result, when it comes to data and information usage, we must identify some specific elements.

Application/model/app

Dashboards and reports are critical for any organization, team, or department. The work cannot be completed without this information.

Essential | Important | Desirable | Unclassified

Confidentiality

The dashboards and reports are private and only available to a select group of managers and employees.

Essential | Important | Desirable | Unclassified

Access Control

What type of access control is required when confidentiality is required? What are the rules that we must follow? (Manager of team A – can see information about team A, and so on).

Add information:

Integrity

Incorrect information will not be tolerated (accountable environment). The organization suffers significant damage if the information is incorrect, incomplete, or late. Inaccurate data, such as inaccurate financial transactions, undermines trust in the organization.

Essential | Important | Desirable | Unclassified

Availability

Dashboards and reports are essential. The organization will suffer severe consequences if the information is not available.

Essential | Important | Desirable | Unclassified

Addition and or explanation

Data privacy check

Some countries have special legislation and regulations when it comes to data usage and data privacy. For example, in the Netherlands, there is a regulation called General Data Protection Regulations (GDPR). When it comes to regulations in the US it is a patchwork of rules. There is actually no specific privacy law except in relation to children but in the State of California, they have implemented data privacy regulations.

When it comes to using personal data we should take care and be aware upfront that we need to consider the privacy regulations for our project. There are several categories that we have to identify and classify.

Name, address, and city data

(Name, address, postal code, city of residence)

Yes

No

Identification data

(Passport, driver’s license, or social security number)

Yes

No

Application details

(Application letters, resume)

Yes

No

Contact details

(E-mail address, phone or fax number)

Yes

No

Salary details

(Salary details, social payments, income taxes, expense reimbursement)

Yes

No

Social media accounts

(LinkedIn, Twitter, WhatsApp, Facebook)

Yes

No

Image and sound recordings

(Video, photos, passport photographs)

Yes

No

Payment details

(Bank name, account number, name of account holder)

Yes

No

Addition and or explanation

When a checkbox is answered with “yes” it is advised to arrange a legislation and regulations check with your Privacy Officer.

Legislation – regulations check

Is privacy impact analysis needed?

Essential | Important | Desirable | Unclassified

Is a register of data needed?

Essential | Important | Desirable | Unclassified

Addition and/or explanation

Data ethics checklist

Data generation, use, collection, analysis, and dissemination are all aspects of data. We can do this with both unstructured and structured data. When we do so, there is a chance that the decisions we make will have an impact on individuals and the world. As a result, we must be open about how we use data in our projects.

1

Do we have to take care of laws and regulations in this data and analytics project?

The first critical step is to determine whether any legalizations or regulations are applicable to the project.

Yes

No

Write any additional information here:

2

Is the data that we want to use available in an ethical manner and is this data suitable for usage?

We must be mindful of who owns the data and ensure that it is used in the manner intended by the owner!

Yes

No

Write any additional information here:

3

Is it possible to identify and check bias in the data that we have collected or used for our models?

People can be biased by their origin, and the same is true for data and the application of algorithms and business rules. The data we collect and store is not as objective as we believe! When using algorithms and business rules, we should be aware that the data we use to train the models can have an impact on people and possible human bias can be magnified, which results in undesirable outcomes.

To conclude, we must be able to identify, test, verify, and discuss the results.

Yes

No

Write any additional information here:

4

Can we identify and demonstrate bias in our created model or in the data used?

When we use data and apply various models, we may have used data that is biased. When we use that specific data set and apply the learning models, the model produces biased results. For example, a bias based on gender, age, equality, or racial elements.

We need to be aware that we must consider documenting, discussing, and evaluating our data usage choices. The message here is to avoid doing things simply because you can!

Yes

No

Write any additional information here:

5

Can the legal rights of individuals be impinged by the use of data?

When an individual’s legal rights are at stake, the organization must have permission and the right to use data for specific purposes. As an example, suppose an organization provides data to its direct partners, but different privacy conditions than the internal data usage may be addressed here. In the event of an incident, for example, they know the addresses and more detailed information from people, but certain data is not shared to protect those people’s privacy (such as names, address details, and other things on which someone can be individually identified).

It could also happen internally, for example, by logging information that is known at the employee level but is shared with users at the department or concern level. We should be aware of this in order to protect the privacy of each individual employee.

Yes

No

Write any additional information here:

6

Are we able to understand that the data we want to use is suitable for the purposes of our project?

When we begin an analytics or data science project, we must understand and ensure that the data we intend to use is appropriate for the purpose of our projects. Following that, we should be able to verify and validate the data for our project.

For example, when records or values are missing, the outcome or our algorithms and business rules can have a significant impact on the results, potentially producing a biased result.

Yes

No

Write any additional information here:

7

Do we have a multi-disciplinary team present to discuss the present dilemmas, and explore the possible usage of algorithms and the possible outcomes?

When it comes to assessing and discussing our own work, we need to focus on the dilemma and the outcomes that can occur with a multi-disciplinary team.

Yes

No

Write any additional information here:

8

Explainable AI by design? Are we able to define the role of an algorithm used and what processes are being followed (procedural transparency)?

It is critical for data engineers and data scientists who train models to understand the model’s behavior in order to detect errors or weaknesses. This is why we must correctly describe the used algorithms or business rules.

When data scientists and data engineers train a model, it is critical to understand the model’s behavior. They must be able to identify any flaws or errors.

Yes

No

Write any additional information here:

9

Explainable AI. Are we able to explain the algorithm or business rules to the guardians, stakeholders, and others whom it concerns?

Explainable AI is defined as the ability of a person to comprehend the reason for a decision. The decision is influenced by algorithms and business rules. To be able to understand the model’s decision, we must be able to explain the decision. We can do so by design, but we can also do it post-hoc by using an algorithm to understand the black-box model.

Yes

No

Write any additional information here:

Addition and/or explanation

Risks

Are organizational changes to be expected that could affect the progress of the project?

Yes

No

Has a project manager/leader/coordinator been appointed on the client side?

Yes

No

Is the contact person present full-time? Or is there a full-time backup?

Yes

No

Can a response time to questions of a maximum of 3 days be guaranteed?

Yes

No

Does the contact person have knowledge of the source systems and the source data?

Yes

No

Is all data available in the source systems?

Yes

No

 No, but the development/adaptation of the source systems is planned and will be released on the following date:

Are there interfaces with the source systems?

Yes

No

 No, we have to arrange this

Are there dependencies with external suppliers?

Yes

No

Are there dependencies with external suppliers?

Yes

No

Source system data (per source system)

Source system name

Source system type

Database

 Interface, an automated connection

 File, manual (e.g. MS Excel, CSV, and so on)

Cloud

Other

Owner source system (department)

Internal/external management organization

 Internal – name:

 External – name:

Contact person

Is the source system data model available?

Yes

No

Are field definitions available?

Yes

No

Particularities

Size of data delivery (number of files)

Number of expected rows

Additional information

Source system data (per source system)

Source system name

Source system type

Database

 Interface, an automated connection

 File, manual (e.g. MS Excel, CSV, and so on)

Cloud

Other

Owner source system (department)

Internal/external management organization

 Internal – name:

 External – name:

Contact person

Is the source system data model available?

Yes

No

Are field definitions available?

Yes

No

Particularities

Size of data delivery (number of files)

Number of expected rows

Additional information

Part II – to be completed by the contractor/internal supplier, and so on.

Other project data

Project number

Date of intake

The appointed project manager or project leader

Date intake forwarded to the contact person

Name of the person who did the intake

Relationship with other projects?

 Yes, name of project:

No

The first functional requests that are known

Indicate in the table below as completely and concretely as possible which functional requirements you set for the application. The MoSCoW method is used to set priorities:

  • Must have this – this requirement must be delivered in the final result
  • Should have this if at all possible – this requirement is highly desirable
  • Could have this if it does not affect anything else – this requirement should only be addressed if there is enough time
  • Would have this – this requirement will not be discussed now, but could be interesting in the future and is noted in the backlog

Complexity:

  • Low/middle/high/very high
  • The standard level of change complexity is middle

Description of the functional requirements

MoSCoW

Complexity

Intended for the type of use?

Other elements that were agreed upon

STARR TEMPLATE

Name project :

Name project member :

Date :

S Situation

Describe the circumstances under which the your project took place (reason, parties involved, where, etc.)

T Task

Describe the exact assignment you worked on (and who was your project leader, client ), or that you assigned to yourself. Indicate what your role/position was in this project

A Activities

Describe the approach you used (activities; tools; preparation)

R Results

How was the result assessed, by whom and on what basis?

R Reflect

Why do you consider this your best practice, how do you look back to the work that you have done? Relate to the complexity of the situation and/or development in feedback you’ve received.

Layout for a business case

  1. Reasons for your project – A brief introduction, a description of the problem, and the project’s main goal (why).
  2. The options or scenarios – The following elements create a scenario: an introduction, pros and cons, and strategic contribution. Figure 13.10 shows an example of how to write your scenarios or options.
  3. Qualitative benefits – Try to emphasize the advantages that your project will bring to your company (without the financial calculations for now).
  4. Risks – Which high-impact risks did you identify? There are several risks that we should investigate, control, and describe.
  5. Financial analysis – There are a few things to consider when conducting a thorough financial analysis of your project. It not only makes all project costs visible, but it also explains why you need to include them in your budget. The same principle applies to the future value that your business case can provide. Always plan three years ahead of time, and consider the costs of maintaining dashboards and reports. The majority of the benefits will be quantitative (in eurodollars), but some will be qualitative.
  6. Conclusion and advice – It’s time to wrap up the business case and recommend an option to your board of directors and management team.

Layout for a business case scenario description

Name

Option 1

Description

Pros

Cons

Strategic contribution

A business case financial analysis

In the next example, we will guide you through a financial analysis for a fictive small project. In Chapter 13, Managing Data and Analytics Projects, the business case is described in more detail.

Describe and calculate the one-time project costs:

QUANTITATIVE ANALYSIS

YEAR 1

YEAR 2

YEAR 3

TOTAL

One-time project costs

$ 0,00

$ 0,00

$ 0,00

$ 0,00

$ 0,00

$ 0,00

$ 0,00

$ 0,00

TOTAL ONE-OFF COSTS

$ 0,00

$ 0,00

$ 0,00

$ 0,00

Describe and calculate the annual recurring costs:

RECURRING COSTS

YEAR 1

YEAR 2

YEAR 3

TOTAL

$ 0,00

$ 0,00

$ 0,00

$ 0,00

$ 0,00

$ 0,00

$ 0,00

$ 0,00

TOTAL RECURRING COSTS

$ 0,00

$ 0,00

$ 0,00

$ 0,00

Describe and calculate the quantitative benefits:

QUANTITATIVE BENEFITS

YEAR 1

YEAR 2

YEAR 3

TOTAL

Value

$ 0,00

$ 0,00

$ 0,00

$ 0,00

$ 0,00

$ 0,00

$ 0,00

$ 0,00

TOTAL BENEFITS (VALUE)

$ 0,00

$ 0,00

$ 0,00

$ 0,00

When one-time costs, recurring cost, and the possible value is calculated it’s time to perform a quantitative analysis. With this analysis, you will be able to determine if the project could be of value to your organization.

QUANTITATIVE ANALYSIS

YEAR 1

YEAR 2

YEAR 3

TOTAL

BENEFITS

Total of benefits

$ 0,00

$ 0,00

$ 0,00

$ 0,00

$ 0,00

$ 0,00

$ 0,00

$ 0,00

TOTAL BENEFITS

$ 0,00

$ 0,00

$ 0,00

$ 0,00

COSTS

ONE-TIME PROJECT COSTS

$ 0,00

$ 0,00

$ 0,00

$ 0,00

RECURRING COSTS

$ 0,00

$ 0,00

$ 0,00

$ 0,00

TOTAL COSTS

$ 0,00

$ 0,00

$ 0,00

$ 0,00

NET BENEFITS (+) / COSTS (-)

$ 0,00

$ 0,00

$ 0,00

$ 0,00

Layout for a risk assessment

Which high-impact risks did you identify? Rate their chance of occurring from 1-5, along with the potential impact also from 1-5, and multiply to get the total score.

Nr.

Risk

Chance of occurrence

Impact

Score

1

Extracting historical data can cause performance issues.

5

5

25

2

Inconsistent data from several sources that do not align. Therefore, the insights will not be trusted.

4

4

16

3

4

5

Layout for a summary business case

The following is an example of using a table with the business case elements to make a thorough choice based on an array of advice.

Option 1

Option 2

Option 3

Option 4

Description

No changes

Having a new tool

Change existing visualizations

Complete new infrastructure and cockpit

Benefits

None

High

Medium

High/medium

Cons

High

Low

Medium

Very high

Strategic contribution

None

High

Medium

Medium

Actors

None

4

5

8

Project duration

None

4 sprints of 2 weeks

2 sprints of 2 weeks

6 sprints of 2 weeks

Costs

None

Medium (write the value of your financial analysis here)

Low (write the value of your financial analysis here)

Very high (write the value of your financial analysis here)

Maintenance

None

Medium (write the value of your financial analysis here)

Low (write the value of your financial analysis here)

High (write the value of your financial analysis here)

Layout information and measure plan

Elements that should be written down in an information measure plan are as follows:

  1. An introduction:
    1. A short description of your information measure plan
    2. A problem analysis
    3. The objectives of your project
    4. The scope (what are you going to do and what not)
  2. The information necessity for management:
    1. Describe the KPIs and reports that are needed
    2. Who your users are (have a look at Figure 7.16, Chapter 7)
    3. Describe the desired level of granularity (the level of detail)
    4. Describe the nonfunctional requirements (see the intake form that we added here in the template chapter)
  3. User stories/use cases/requirements:
    1. User story 1
    2. User story 2
    3. And so on
  4. Data sources:
    1. Desired sources
    2. Data quality check
    3. Describe the missing data
    4. Describe the metadata
  5. The solution:
    1. Describe the dashboard and reports (follow the DARs principle – see Chapter 7)
    2. Describe and sketch the data flow
    3. Design the dashboard (using the chatting and sketching technique that is described in Chapter 7)
  6. Appendix : A
    1. Design decisions
    2. Remarks

Layout for a KPI description

Name of KPI

Definition of KPI

Owner of KPI

What is the purpose of usage?

Frequency

Department

Type of graph

Additional information

Unit of measure

Data source

Required tables

Reporting period

Data owner

Data steward

Date of KPI approval

Norm

KPI

Table with the Inmon groups and a description of their roles

Who is my public?

Farmers

Tourists

Explorers

Miners

Managing board

X

Middle management

X

Team manager

X

Team lead

Controller

X

Process advisor

X

Business analysts

X

Analysts

X

Data analysts

X

Data scientists

X

A short description of the Inmon classifications used in the table: Farmers have defined, predictable requirements. Tourists are practically equivalent to farmers, but they must utilize filters to look at the data differently and understand the findings. Explorers seek to examine existing indicators from several perspectives (dimensions) and interact thoroughly with dashboards and reports for data-informed decision-making. Miners are more of a scientific field; they are our data scientists, and they want a lot of freedom to investigate anomalies in the data (looking for the golden egg).

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.224.64.248