<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>BSG (UK) &#187; Stuart Gomersall</title>
	<atom:link href="http://www.bsgdelivers.com/tag/stuart-gomersall/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.bsgdelivers.com</link>
	<description>Unlocking potential. Accelerating performance</description>
	<lastBuildDate>Fri, 12 Jun 2015 09:43:32 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=3.8.41</generator>
	<item>
		<title>Spreadsheets in the enterprise, considering availability (pt 3/5)</title>
		<link>http://www.bsgdelivers.com/2014/03/spreadsheets-enterprise-considering-availability-pt-35/</link>
		<comments>http://www.bsgdelivers.com/2014/03/spreadsheets-enterprise-considering-availability-pt-35/#comments</comments>
		<pubDate>Tue, 25 Mar 2014 13:36:04 +0000</pubDate>
		<dc:creator><![CDATA[bsgadmin]]></dc:creator>
				<category><![CDATA[bsg insight]]></category>
		<category><![CDATA[CIADA]]></category>
		<category><![CDATA[distributed development]]></category>
		<category><![CDATA[excel]]></category>
		<category><![CDATA[secure systems]]></category>
		<category><![CDATA[spreadsheets]]></category>
		<category><![CDATA[Stuart Gomersall]]></category>

		<guid isPermaLink="false">http://www.bsgdelivers.com/?p=1377</guid>
		<description><![CDATA[<p>This post looks at the perspective of availability &#8211; defined for this purpose as “concerns unwanted withholding of information”. Availability is simply the ability to get what you want from the system when you need it. There should not be any barriers outside of the checks and balances that manage the other security perspectives in the CIADA model. Given that Excel is a fairly robust and prevalent industry application, there are not many software ‘features’ that may deliberately or inadvertently withhold information from its own users; though a side thought would caution against passwords only known by one person which [&#038;hellip</p><p>The post <a rel="nofollow" href="http://www.bsgdelivers.com/2014/03/spreadsheets-enterprise-considering-availability-pt-35/">Spreadsheets in the enterprise, considering availability (pt 3/5)</a> appeared first on <a rel="nofollow" href="http://www.bsgdelivers.com">BSG (UK)</a>.</p>]]></description>
				<content:encoded><![CDATA[<p>This post looks at the perspective of availability &#8211; defined for this purpose as “concerns unwanted withholding of information”.</p>
<p>Availability is simply the ability to get what you want from the system when you need it. There should not be any barriers outside of the checks and balances that manage the other security perspectives in the CIADA model.</p>
<p>Given that Excel is a fairly robust and prevalent industry application, there are not many software ‘features’ that may deliberately or inadvertently withhold information from its own users; though a side thought would caution against passwords only known by one person which is a simple but important risk.</p>
<p>Beyond this, I am slightly at a loss with regards to the specific availability threats in the context of decision support and reporting with Excel. The threats would be largely similar to any system I think… maybe there is something I am missing under this heading.</p>
<p>Appropriateness and alternatives advice is thin on the ground given that the risks cross solutions. So… um… yeah… (tumbleweed).</p>
<p>Contact me if you think of anything deep and meaningful &#8211; tweet me using @stugom or email me using stuart [dot] gomersall at bsguk [dot] co [dot] uk &#8211; and we can revise this post with appropriate credits where due.</p>
<p>The post <a rel="nofollow" href="http://www.bsgdelivers.com/2014/03/spreadsheets-enterprise-considering-availability-pt-35/">Spreadsheets in the enterprise, considering availability (pt 3/5)</a> appeared first on <a rel="nofollow" href="http://www.bsgdelivers.com">BSG (UK)</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://www.bsgdelivers.com/2014/03/spreadsheets-enterprise-considering-availability-pt-35/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Spreadsheets in the enterprise, considering integrity (pt 2/5)</title>
		<link>http://www.bsgdelivers.com/2014/03/spreadsheets-in-the-enterprise-considering-integrity/</link>
		<comments>http://www.bsgdelivers.com/2014/03/spreadsheets-in-the-enterprise-considering-integrity/#comments</comments>
		<pubDate>Mon, 17 Mar 2014 18:15:55 +0000</pubDate>
		<dc:creator><![CDATA[bsgadmin]]></dc:creator>
				<category><![CDATA[bsg insight]]></category>
		<category><![CDATA[CIADA]]></category>
		<category><![CDATA[data integrity]]></category>
		<category><![CDATA[distributed development]]></category>
		<category><![CDATA[excel]]></category>
		<category><![CDATA[secure systems]]></category>
		<category><![CDATA[spreadsheets]]></category>
		<category><![CDATA[Stuart Gomersall]]></category>

		<guid isPermaLink="false">http://www.bsgdelivers.com/?p=1373</guid>
		<description><![CDATA[<p>Integrity This post looks at the perspective of integrity &#8211; defined for this purpose as “concerning the unwanted modification of data.” Modifying the data in a sensitive data set is a huge risk. Potential ruinous of the result in its entirety and in the context of a decision support system &#8211; it is the kind of thing that people lose jobs, homes and businesses over. Shockingly, people may even want to do this for selfish and malevolent reasons… and in an Excel world they can do this without a trace (almost &#8211; which is a thought for another post). The [&#038;hellip</p><p>The post <a rel="nofollow" href="http://www.bsgdelivers.com/2014/03/spreadsheets-in-the-enterprise-considering-integrity/">Spreadsheets in the enterprise, considering integrity (pt 2/5)</a> appeared first on <a rel="nofollow" href="http://www.bsgdelivers.com">BSG (UK)</a>.</p>]]></description>
				<content:encoded><![CDATA[<p>Integrity</p>
<p>This post looks at the perspective of integrity &#8211; defined for this purpose as “concerning the unwanted modification of data.”</p>
<p>Modifying the data in a sensitive data set is a huge risk. Potential ruinous of the result in its entirety and in the context of a decision support system &#8211; it is the kind of thing that people lose jobs, homes and businesses over. Shockingly, people may even want to do this for selfish and malevolent reasons… and in an Excel world they can do this without a trace (almost &#8211; which is a thought for another post).</p>
<p>The threat is multi-dimensional:<br />
1. Altering a data element directly &#8211; like lowering your own sales target in the evaluation sheet<br />
2. Altering referenced data &#8211; linking your sales total to salesman of the year Bob’s total<br />
3. Removing key data points &#8211; deleting Bob’s biggest sales account entirely<br />
4. the list goes on&#8230;</p>
<p>There are complex tools within Excel and, if you speak “formulae” and can trace through multiple sheets simultaneously then you’re all good, you could find the modifications. Which is cool, right? What could possibly go wrong? Well &#8211; how do you know you’ve found them all, how long have you got to do the searching and fixing? And most importantly, how do you even know that there is a data integrity problem in the first place? On top of all this, the “business case” for Excel is usually that it is quicker, but by the time you’ve done all of this digging, that business case no longer stacks up.</p>
<p>Of course, even transactional enterprise systems of any type are vulnerable to data threat. The difference is that an enterprise system is layered: the data source and the reporting are separated which is not the case in Excel.</p>
<p>To repeat the rallying cry. Use common sense, think about the data you are handling, analysing, modelling and use the appropriate systems and countermeasures to make your work simple at the same time minimising risk of breaches. Easy, right?</p>
<p>The post <a rel="nofollow" href="http://www.bsgdelivers.com/2014/03/spreadsheets-in-the-enterprise-considering-integrity/">Spreadsheets in the enterprise, considering integrity (pt 2/5)</a> appeared first on <a rel="nofollow" href="http://www.bsgdelivers.com">BSG (UK)</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://www.bsgdelivers.com/2014/03/spreadsheets-in-the-enterprise-considering-integrity/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Spreadsheets in the enterprise, considering confidentiality (pt 1/5)</title>
		<link>http://www.bsgdelivers.com/2014/03/spreadsheets-enterprise-considering-confidentiality/</link>
		<comments>http://www.bsgdelivers.com/2014/03/spreadsheets-enterprise-considering-confidentiality/#comments</comments>
		<pubDate>Mon, 10 Mar 2014 10:36:40 +0000</pubDate>
		<dc:creator><![CDATA[bsgadmin]]></dc:creator>
				<category><![CDATA[practitioner experience]]></category>
		<category><![CDATA[CIADA]]></category>
		<category><![CDATA[distributed development]]></category>
		<category><![CDATA[excel]]></category>
		<category><![CDATA[secure systems]]></category>
		<category><![CDATA[spreadsheets]]></category>
		<category><![CDATA[Stuart Gomersall]]></category>

		<guid isPermaLink="false">http://www.bsgdelivers.com/?p=1248</guid>
		<description><![CDATA[<p>Confidentiality For the sake of this post, I’ll define confidentiality as “concerns regarding the unwanted disclosure of information.” Confidentiality is complex as it is both role-driven and time-driven, i.e. sensitive data may only be applicable to me in my current role and for a specific timeframe after which it may become stale and elicit invalid results. Without deploying additional layers (e.g. using the file system layer to assign access via login to specific roles) neither angle is covered by Excel (or any Office-style application). Access is blanket applied &#8211; you are in or out of the loop. Hidden sheets help, [&#038;hellip</p><p>The post <a rel="nofollow" href="http://www.bsgdelivers.com/2014/03/spreadsheets-enterprise-considering-confidentiality/">Spreadsheets in the enterprise, considering confidentiality (pt 1/5)</a> appeared first on <a rel="nofollow" href="http://www.bsgdelivers.com">BSG (UK)</a>.</p>]]></description>
				<content:encoded><![CDATA[<p>Confidentiality</p>
<p>For the sake of this post, I’ll define confidentiality as “concerns regarding the unwanted disclosure of information.”</p>
<p>Confidentiality is complex as it is both role-driven and time-driven, i.e. sensitive data may only be applicable to me in my current role and for a specific timeframe after which it may become stale and elicit invalid results.</p>
<p>Without deploying additional layers (e.g. using the file system layer to assign access via login to specific roles) neither angle is covered by Excel (or any Office-style application). Access is blanket applied &#8211; you are in or out of the loop. Hidden sheets help, but security by obscurity is never a great design choice and is not sustainable. And let’s not get started on the concept of using a tool designed for collaboration with others as a store of sensitive and/or confidential information &#8211; it is certainly paradoxical!</p>
<p>All of the above really depends on the inherent “value” of the data (or asset) you are trying to secure, if it is public information then, by all means, use Excel. For example, the Guardian makes chart data available via Excel for further analysis. Sensitive financial or people data is another matter. It is crucial to apply a set of reasonable countermeasures to data and systems based on the valuation of the asset from each perspective of the CIADA model.</p>
<p>Assessing the alternatives available to maintain data confidentiality may be simple. If the alternatives are very obscure, very expensive or a change management bridge too far then go back to your valuation of the asset. You may be inflating the valuation based on an incorrect view from the relevant stakeholders. Or maybe rudimentary controls are appropriate as countermeasures.</p>
<p>My rallying cry is simple. Excel is fine, in context. Be sure to complete the valuation of the information asset as well assessment and deployment of appropriate countermeasures over the blind use of a collaboration tool.</p>
<p>The post <a rel="nofollow" href="http://www.bsgdelivers.com/2014/03/spreadsheets-enterprise-considering-confidentiality/">Spreadsheets in the enterprise, considering confidentiality (pt 1/5)</a> appeared first on <a rel="nofollow" href="http://www.bsgdelivers.com">BSG (UK)</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://www.bsgdelivers.com/2014/03/spreadsheets-enterprise-considering-confidentiality/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Excel for decision making. What could possibly go wrong?</title>
		<link>http://www.bsgdelivers.com/2013/05/decisions-based-on-excel-models-what-could-possibly-go-wrong/</link>
		<comments>http://www.bsgdelivers.com/2013/05/decisions-based-on-excel-models-what-could-possibly-go-wrong/#comments</comments>
		<pubDate>Fri, 24 May 2013 13:31:36 +0000</pubDate>
		<dc:creator><![CDATA[Michael Railton]]></dc:creator>
				<category><![CDATA[bsg insight]]></category>
		<category><![CDATA[CIADA]]></category>
		<category><![CDATA[distributed development]]></category>
		<category><![CDATA[excel]]></category>
		<category><![CDATA[secure systems]]></category>
		<category><![CDATA[Stuart Gomersall]]></category>

		<guid isPermaLink="false">http://www.bsgdelivers.com/?p=1038</guid>
		<description><![CDATA[<p>The post <a rel="nofollow" href="http://www.bsgdelivers.com/2013/05/decisions-based-on-excel-models-what-could-possibly-go-wrong/">Excel for decision making. What could possibly go wrong?</a> appeared first on <a rel="nofollow" href="http://www.bsgdelivers.com">BSG (UK)</a>.</p>]]></description>
				<content:encoded><![CDATA[<p>The post <a rel="nofollow" href="http://www.bsgdelivers.com/2013/05/decisions-based-on-excel-models-what-could-possibly-go-wrong/">Excel for decision making. What could possibly go wrong?</a> appeared first on <a rel="nofollow" href="http://www.bsgdelivers.com">BSG (UK)</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://www.bsgdelivers.com/2013/05/decisions-based-on-excel-models-what-could-possibly-go-wrong/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Are there senses of a BA? &#8211; Stuart Gomersall</title>
		<link>http://www.bsgdelivers.com/2012/08/are-there-senses-of-a-ba-stuart-gomersall/</link>
		<comments>http://www.bsgdelivers.com/2012/08/are-there-senses-of-a-ba-stuart-gomersall/#comments</comments>
		<pubDate>Fri, 31 Aug 2012 15:19:12 +0000</pubDate>
		<dc:creator><![CDATA[Michael Railton]]></dc:creator>
				<category><![CDATA[practitioner experience]]></category>
		<category><![CDATA[business analysis]]></category>
		<category><![CDATA[Stuart Gomersall]]></category>

		<guid isPermaLink="false">http://s460473375.websitehome.co.uk/bsguk/?p=213</guid>
		<description><![CDATA[<p>So there are 5 special senses, we all know that. There are more subtle &#8216;senses&#8217; like a sense of fear amongst others. But what are the senses of a Business Analyst? Someone who makes letters and numbers in a spreadsheet into a successful system or change initiative. Someone who makes the impossible possible. Someone who tames the wilderness. Here are some thoughts on the emergent senses of the evolving BA. &#62; Common sense Several of my contemporaries, notably @ukadrianreed, have highlighted how common sense is a thing missing from many BA&#8217;s armoury at the moment. I fear that BA&#8217;s get [&#038;hellip</p><p>The post <a rel="nofollow" href="http://www.bsgdelivers.com/2012/08/are-there-senses-of-a-ba-stuart-gomersall/">Are there senses of a BA? &#8211; Stuart Gomersall</a> appeared first on <a rel="nofollow" href="http://www.bsgdelivers.com">BSG (UK)</a>.</p>]]></description>
				<content:encoded><![CDATA[<div id="post-body-995692464968625738" itemprop="description articleBody">
<p>So there are 5 special senses, we all know that. There are more subtle &#8216;senses&#8217; like a sense of fear amongst others. But what are the senses of a Business Analyst? Someone who makes letters and numbers in a spreadsheet into a successful system or change initiative. Someone who makes the impossible possible. Someone who tames the wilderness.</p>
<p>Here are some thoughts on the emergent senses of the evolving BA.</p>
<p>&gt; Common sense<br />
Several of my contemporaries, notably <a href="https://twitter.com/UKAdrianReed">@ukadrianreed</a>, have highlighted how common sense is a thing missing from many BA&#8217;s armoury at the moment. I fear that BA&#8217;s get carried away in seeking to please and getting the validation of that coveted &#8216;sign-off&#8217; which so blinds us all to the reality and practicality of making commitments on speculative requirements. I wholeheartedly believe that this is a key sensory talent that BA&#8217;s need more than ever and it will ensure their survival out in the project wilderness. And it is an unforgiving wilderness at the moment in the change space!</p>
<p>&gt; Sense of clarity<br />
Engaging with people of all kinds is complicated. When developers say the only problem with their system is the user, the BA should take heed. Users are the source of our requirements, they will make all requirements high priority (or Must Have &#8211; if you are a Muscovite) and they will bamboozle you with complex rules, spreadsheet models and bizarre user interface needs. It takes a smart BA to sense ambiguity, dissonance and omission of requirements from the user community. Ever had scope creep? Users are wild creatures, unpredictable. Never smile at a crocodile; and never forget a senior user&#8217;s requirement to login &#8220;just like Facebook&#8221;</p>
<p>&gt; Sense of proportion of things<br />
As I noted earlier, users tend to get requirements trigger happy &#8211; and all requirements tend to be must have&#8217;s. I guess it&#8217;s natural, if I ask you what you want tomorrow, it is unlikely you will settle for less than you have today will you? This is where the relative priority of requirements or features is a much better method than absolute requirement prioritisation. It forces users to rank requirements. No two requirements are equal, the jungle has a natural order and so do requirements.</p>
<p>&gt; Sense of connectedness<br />
As a caveat to the relative prioritisation of requirements above, I believe it is incredibly important to note that sometimes &#8211; depending on how you have completed your requirements, some requirements may be inextricably linked to one another. It means that a simple ranking process helps, but has exceptions. But where would we be without the odd exception to the rule?</p>
<p>Further to this, but linked to the sense of clarity, it is important to realise connectedness in relation to dissonance and omission. Dissonance may occur (and often does) where requirements contradict each other and sadly, yet predictably, we never notice this in the sessions when the users are relaying their needs and neither do they! But sometimes, things are not connected on the surface. A keen and experienced BA will sense the dissonance; gurus may even do so in the middle of a workshop. Omission is to requirements as the platypus is to land mammals &#8211; an entirely unexpected cousin.</p>
<p>&gt; Sense of perspective<br />
As an agent of change, BAs realise that sometimes it is more important to know enough to move ahead, than to know everything right now. The BA profession is not a career stepping stone to being psychic; requirements change over time, they evolve. Much like any king of the jungle, projects and requirements are emergent and as much as we try to manage change &#8211; the state of flux is natural. From change control to Agile, all we are try to do is manage the inevitable. It is perhaps better to have a strong sense of perspective, what do we need to know to move ahead: does this validate or invalidate the perceived project benefits? Am I comfortable living on the edge of certainty and uncertainty?</p>
<p>&gt; Sense of style<br />
A business analyst should be creative, imaginative and innovative. Your delivery should have a sense of style that inspires others, wants them to engage with you, your work and be energised by engaging the change that the BA is representing in the project. There is nothing less engaging that boring workshops, black and white models and lots of text. In order to get ahead in the jungle, fauna and flora need to attract others to their wares. Like bright flowers for pollination, BA&#8217;s need to attract stakeholders and users to their artefacts to improve the probability of project success through engagement and buy-in.</p>
<p>Looking back on my starting question: I think yes. There are &#8216;senses&#8217; to a BA. Furthermore, we might even have specialised sensory tools to receive the stimuli that drive those senses&#8230;</p>
<p>But for now, as BA&#8217;s evolve, the project wilderness is what it is. Happy evolving.</p>
</div>
<p>The post <a rel="nofollow" href="http://www.bsgdelivers.com/2012/08/are-there-senses-of-a-ba-stuart-gomersall/">Are there senses of a BA? &#8211; Stuart Gomersall</a> appeared first on <a rel="nofollow" href="http://www.bsgdelivers.com">BSG (UK)</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://www.bsgdelivers.com/2012/08/are-there-senses-of-a-ba-stuart-gomersall/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: bsgdelivers.com @ 2026-05-02 11:41:57 by W3 Total Cache -->