Скачать книгу

How do you gather Software as a secure service requirements?

      <--- Score

      5. What is the definition of success?

      <--- Score

      6. Are all requirements met?

      <--- Score

      7. Are resources adequate for the scope?

      <--- Score

      8. Is the improvement team aware of the different versions of a process: what they think it is vs. what it actually is vs. what it should be vs. what it could be?

      <--- Score

      9. What gets examined?

      <--- Score

      10. Has your scope been defined?

      <--- Score

      11. What are the Software as a secure service tasks and definitions?

      <--- Score

      12. How and when will the baselines be defined?

      <--- Score

      13. What are the compelling stakeholder reasons for embarking on Software as a secure service?

      <--- Score

      14. How often are the team meetings?

      <--- Score

      15. Does the team have regular meetings?

      <--- Score

      16. What is out of scope?

      <--- Score

      17. Are different versions of process maps needed to account for the different types of inputs?

      <--- Score

      18. Are there different segments of customers?

      <--- Score

      19. Has the Software as a secure service work been fairly and/or equitably divided and delegated among team members who are qualified and capable to perform the work? Has everyone contributed?

      <--- Score

      20. Is it clearly defined in and to your organization what you do?

      <--- Score

      21. Is there a critical path to deliver Software as a secure service results?

      <--- Score

      22. Who approved the Software as a secure service scope?

      <--- Score

      23. How do you manage changes in Software as a secure service requirements?

      <--- Score

      24. Has the direction changed at all during the course of Software as a secure service? If so, when did it change and why?

      <--- Score

      25. Has the improvement team collected the ‘voice of the customer’ (obtained feedback – qualitative and quantitative)?

      <--- Score

      26. Do you have organizational privacy requirements?

      <--- Score

      27. What are the rough order estimates on cost savings/opportunities that Software as a secure service brings?

      <--- Score

      28. How will the Software as a secure service team and the group measure complete success of Software as a secure service?

      <--- Score

      29. Is the team sponsored by a champion or stakeholder leader?

      <--- Score

      30. Are customer(s) identified and segmented according to their different needs and requirements?

      <--- Score

      31. How do you catch Software as a secure service definition inconsistencies?

      <--- Score

      32. Is full participation by members in regularly held team meetings guaranteed?

      <--- Score

      33. Have all of the relationships been defined properly?

      <--- Score

      34. Will team members regularly document their Software as a secure service work?

      <--- Score

      35. Will team members perform Software as a secure service work when assigned and in a timely fashion?

      <--- Score

      36. What is in the scope and what is not in scope?

      <--- Score

      37. What sources do you use to gather information for a Software as a secure service study?

      <--- Score

      38. Are accountability and ownership for Software as a secure service clearly defined?

      <--- Score

      39. When is the estimated completion date?

      <--- Score

      40. Is there regularly 100% attendance at the team meetings? If not, have appointed substitutes attended to preserve cross-functionality and full representation?

      <--- Score

      41. Is the Software as a secure service scope manageable?

      <--- Score

      42. Is there a Software as a secure service management charter, including stakeholder case, problem and goal statements, scope, milestones, roles and responsibilities, communication plan?

      <--- Score

      43. When are meeting minutes sent out? Who is on the distribution list?

      <--- Score

      44. What is the worst case scenario?

      <--- Score

      45. What happens if Software as a secure service’s scope changes?

      <--- Score

      46. What critical content must be communicated – who, what, when, where, and how?

      <--- Score

      47. How do you build the right business case?

      <--- Score

      48. Has a Software as a secure service requirement not been met?

      <--- Score

      49. Are the Software as a secure service requirements testable?

      <--- Score

      50. What are the tasks and definitions?

      <--- Score

      51. Is Software as a secure service required?

      <--- Score

      52. Are stakeholder processes mapped?

      <--- Score

      53. Is the Software as a secure service scope complete and appropriately sized?

      <--- Score

      54. Is scope creep really all bad news?

      <--- Score

      55. Who are the Software as a secure service improvement team members, including Management Leads and Coaches?

      <--- Score

      56. What key stakeholder process output measure(s) does Software as a secure service leverage and how?

      <--- Score

      57. Are the Software as a secure service requirements complete?

      <--- Score

      58. Is the team equipped with available and reliable resources?

Скачать книгу