When we talk, we can discuss your business and work out the best place to start. Every business needs different things, so we can mix and match elements of the systems to suit your business. Installing the systems follows the three stages below.
There are Ten Steps in the Business Investigation and Analysts System and Three Checkpoints when a decision is made to stop at that Step or continue onto the next Checkpoint.
Prepare an information-investigation plan to determine the solution. First, we identify the information needed to define the problem and solution. Then, where can we find the information? Next, how can we obtain the information? Finally, what order to get the information?
Output: Document Analysis. Information Investigation Plan (IIP).
In this step, we define the problem owner, prepare an information-gathering plan to determine the problem, and elicit information about the problem. We then analyse the information, determine the real problem to be solved, and confirm that with the problem owner.
Output: Root Case Analysis. Problem Statement. Vision Statement.
We develop a vision of the solution and acceptance criteria with the problem owner and determine stakeholders. Then, conduct risk analysis and justification for solving the problem. Finally, we identify solution constraints, functional goals, and business objectives.
Output: Decision Documents (product scope, business case, project charter).
We review organisational vision, mission statements, strategic and business plans, and policy to ensure the solution or product aligns and supports achieving goals and objectives. In addition, we provide financial justification for solving the problem.
This step if Checkpoint Alpha, a decision is made stop here or continue to Checkpoint Bravo.
Output: ROI Analysis. Cost/Benefit Analysis. Risk Analysis. Feasibility Study.
Obtain information to describe and diagram the problem domain. First, we understand completely why the problem exists and what conditions cause the problem. Then, we determine the functional areas impacted by the problem and its solution. Finally, we identify neighbouring constituencies, intersecting processes, and ancillary benefits.
Output: Current State Baseline of the Problem Domain. Problem Domain Diagram or Model.
Analyse the information to determine potential solutions for the problem. First, we analyse and model the solution. Then, we create the necessary models and diagrams. Finally, we confirm our analysis with the affected product stakeholders that the part of the solution that affects them will work and is acceptable.
Output: Entity Relationship Diagram. Data Flow Diagram. Activity Diagram. Use Cases.
Confirm with the stakeholders that the solution completely and accurately solves the problem. First, we get parts of the solution confirmed as they are defined. Then, we check the technical and project feasibility and validate requirements with the solution team and stakeholders. Finally, we get the solution document approved by the executive decision-maker.
This is Checkpoint Bravo, a decision is made here to stop here or continue to Checkpoint Charlie.
Output: Solution Diagram, Data, Process & Behaviour Models. Requirements Documents. Business Rules. Event Analysis. Gap Analysis. User Stories.
Turn the solution definition into an operational system or process. First, we work with the solution team throughout product implementation. Then, we make sure the solution document matches the solution, and document, evaluate and review any changes. Then, we prepare user test cases and ensure the solution successfully transitions into the business environment.
Output: Requirements Changes. Acceptance Testing.
Prove that the product has achieved an acceptable level of confidence that it will behave as expected under all circumstances of interest. First, we establish the basic criteria against which quality assurance judges the quality of the product. Then, we confirm that the final definition of correct behaviour (the solution document) matches the delivered product. Finally, we make sure the product solves the original problem and proves the solution is effective and stays effective by measuring the results.
Output: Unit, Integration, System, and Acceptance test results. Bug/Defect Report.
Prepare the business for a successful transition to the new process. First, we create a sense of urgency for change, create a guiding coalition, and develop a vision of the changed environment. Then, we communicate the change vision and empower action to affect change. Finally, we generate short-term wins, consolidate gains, produce more change, and anchor new cultural approaches.
This is Checkpoint Charlie, it marks the end of the project. At this stage Lessons Learned regarding the Business Investigation and Analysis Project should be conducted.
Output: Change Management Plan. Change Impact Diagram. Training Plan. User Manuals. Help-desk. Updated Baseline Requirements Document. Lessons Learned.
Read Case Studies about some of the Business Investigation and Analysis projects I have been part of during the past 20+ years.
Deliver a rostering and resource allocation solution to coordinate and deploy the field contractor workforce. Ensure the system could scale up.
Reduce fraud and theft. Improve accountability for financial transactions. Protect company property and inventory.
Hi, I'm Jared.
There is a lot wrong with business investigation and
analysis today. It is my mission to change that. I stand for good, common sense, sustainable business
investigation and analysis with no growth hacking, tactic-chasing, fancy
techniques, or gimmicks.
you always feel clear on the approach, in control of the investigation and
analysis, confident the problems will be solved and solutions adopted, enabling
your business to grow.
Strategy before tactics is the path to clarity, confidence,
and control while solving problems, delivering solutions, and achieving predictable
growth. Working together we:
I work with your team to investigate and analyse problems to determine the root cause, obtain information from stakeholders and extract requirements, design and deliver solutions to the problem, implement the solution, and then monitor delivered business value.
Please reach out if you have any questions. I look forward to talking to you soon. Regards -
I have 33 years of work experience, which includes 21 years
in business investigation and analysis and 12 years of experience in sales,
marketing, customer service, and business development.
The foundation of my work is Business Investigation and Analysis. Also insurance investigation and loss adjusting. I have worked on many projects as a business investigator and analyst. For some of those I have written Case Studies.
In 2002 I retrained as a Private Investigator and Microsoft Certified Systems Engineer (MCSE), and started working as a consultant conducting preemployment background checks, workplace investigations, and countless insurance investigations.
Mid-2019, I began subcontracting as a Field Agent for the Criminal Proceeds Management Unit (CPMU), which is part of the Insolvency Department of the Ministry of Business Innovation and Employment (MBIE).
In 2005 I led my first project, (which we would call today a business analysis project). Back then I saw it as simply fixing a problem. The client was suffering from employee theft (asset misappropriation) and issues with expense accounts and disbursements.
Since 2016 I have been a Webmaster & Business Analyst for an Australian Clients online business. We have
completed multiple projects, including two site builds, implementing a learning
management system and an online booking system.
The solution involved changing systems, processes, internal controls, and business rules. I also designed a program called SAFE - Strategic Anti-Fraud Environment. This was a self audit balanced scorecard and training system designed to identify and mitigate workplace fraud and asset misappropriation.
I recently designed a new
business model for that client. During 2023, we are rolling out a RevOps (revenue operations) solution to implement that new business
model. Currently we are working on ideal client identification and SEO analytics to form a baseline to measure business changes against.
Formal Education Includes
Master of Professional Business Analysis - MBusAn (Victoria
University - Feb 2021 – Nov 2022).
I am a lifelong learner. I continuously seek out new knowledge and skills and strive to improve. I have a growth mindset and am open to learning new things, even if they are outside my comfort zone.
I'm only human so I make mistakes. When I do I try to learn from them to work out what went wrong and how I can prevent the same mistake from happening again.
Microsoft Certified Systems Engineer (MCSE) Windows Server 2000/03 (Emerald IT).
Between 2002 and 2012, I completed the following
qualifications through the Australian Security Academy.
I am constantly adapting and learning new things to be personally successful and help my clients be successful.
Financial Services (Loss Adjusting). Security and Risk Management. Occupational Health & Safety. Government Fraud Control. Government Fraud Investigations.
I am a licensed Private Investigator. License No: 19-060530. I am bound by the Private Security Personnel and Private Investigators Act 2010. You can find me on the Ministry of Justice website.
Certificate IV in
Investigative Services. Workplace
Training & Assessment. Workplace
Compliance. Business Studies. Security
& Risk Management. Government
Fraud Control. Government Fraud Investigation.
- International Institute of Business Analysts (IIBA)
- Business Agility Institute
- Project Management Institute (PMI)
- Open Compliance and Ethics Group (OCEG)
- Information Systems Audit and Control Association (ISACA)
Give me a call on +64 20 4165 4856 or use the form to send me an email. I normally reply within 48 hours. I look forward to talking with you soon.