significant properties, practical 2: stakeholder analysis (sps part 4), by stephen grace and gareth...
DESCRIPTION
This presentation, the fourth of six parts on the practical analysis of significant properties of digital objects, leads participants through a practical exercise to consider the needs of different stakeholders when assessing the properties of the type of digital object considered in the previous exercise, an email message. The presentation was given as part of module 3 of a 5-module course on digital preservation tools for repository managers, presented by the JISC KeepIt project. For more on this and other presentations in this course look for the tag 'KeepIt course' in the project blog http://blogs.ecs.soton.ac.uk/keepit/TRANSCRIPT
Practical exercise 2 Stakeholder analysis
2
Exercise overview•Emails•Consider needs of different stakeholders
– The creators of the resource– Repository manager as its curator– Users of the resource
•Apply FBS-based analysis from InSPECT method
– Identify actual behaviours– Turn behaviours into functions– Express results as technical properties– Cross-match properties to those from Object
Analysis
3
Select object type(s) for analysis
Determine actual behaviours
Classify behaviours into set of functions
Object type analysis
Stakeholder requirements analysis
Assign acceptablevalue boundaries
Review & finalise
Finalise & record
Identify stakeholder
Cross-match functions
4
Identify Stakeholders
•Creator – view, annotate• Researcher corresponds during research with colleagues, peers, administrators etc.
•Recipient – reuses content• Student wants to understand research lifecycles by studying real-world practice
•Custodian – evidential chain• Maintains permanent email record for externally-funded projects, alongside data and eprint outputs
Select object type(s) for analysis
Determine actual behaviours
Classify behaviours into set of functions
Assign acceptablevalue boundaries
Review & finaliseIdentify stakeholder Cross-match functions
5
Select object type for analysis
•Emails from Object Analysis phase
Select object type(s) for analysis
Determine actual behaviours
Classify behaviours into set of functions
Assign acceptablevalue boundaries
Review & finaliseIdentify stakeholder Cross-match functions
6
Determine actual behaviours
•What does the creator do?• Example: adds attachments in formats shared with recipient
•What is the re-user expecting to do?• Example: copy and paste text into report
•What requirements does the custodian have?• Example: provide authentic copy of email exchange for FOI request
Select object type(s) for analysis
Determine actual behaviours
Classify behaviours into set of functions
Assign acceptablevalue boundaries
Review & finaliseIdentify stakeholder Cross-match functions
7
Determine actual behaviours - practical
•Split into groups
•Identify 2-5 behaviours for each stakeholder• There may be repetition across stakeholders
•10mins
Select object type(s) for analysis
Determine actual behaviours
Classify behaviours into set of functions
Assign acceptablevalue boundaries
Review & finaliseIdentify stakeholder Cross-match functions
8
Taking your behaviours from the exercise, we turn them into functions e.g. “Know that emails were sent/received with attachments” >> “Identify association of attachments” (Category: structure)
Select object type(s) for analysis
Determine actual behaviours
Classify behaviours into set of functions
Assign acceptablevalue boundaries
Review & finaliseIdentify stakeholder Cross-match functions
Classify behaviours into set of functions
9
Select object type(s) for analysis
Determine actual behaviours
Classify behaviours into set of functions
Assign acceptablevalue boundaries
Review & finaliseIdentify stakeholder Cross-match functions
View Message text
Update subject line to add additional descriptive information
Annotate email message for future reference
Update of message content
Stakeholder able to understand organisational structure of
message
Stakeholder able to read text contained in message
Define Message relationships
Determine placement of message in ongoing discussion
Establish route that message took to reach recipient
Identify Sender
Establish email account from which message originates
Identify name of sender responsible for transmitting the
message
Interpret context in which message should be understood
Identify Recipients
Identify audience that the sender intends to read message
Identify audience that the sender intends to act upon message
Interpret context in which message should be understood
Functions Behaviours
10
Cross-match functions
•Which functions can you see match those from the Object Analysis stage?
Select object type(s) for analysis
Determine actual behaviours
Classify behaviours into set of functions
Assign acceptablevalue boundaries
Review & finaliseIdentify stakeholder Cross-match functions
11
Select object type(s) for analysis
Determine actual behaviours
Classify behaviours into set of functions
Assign acceptablevalue boundaries
Review & finaliseIdentify stakeholder Cross-match functions
View Message text
Update subject line to add additional descriptive information
Annotate email message for future reference
Update of message content
Stakeholder able to understand organisational structure of
message
Stakeholder able to read text contained in message
Define Message relationships
Determine placement of message in ongoing discussion
Establish route that message took to reach recipient
Identify Sender
Establish email account from which message originates
Identify name of sender responsible for transmitting the
message
Interpret context in which message should be understood
Identify Recipients
Identify audience that the sender intends to read message
Identify audience that the sender intends to act upon message
Interpret context in which message should be understood
Functions Behaviours
Recreate message content
Understand relational structure of text and images within the
message
Recreate visual appearance of message
Understand organisational structure of message
View author created text
Define Message relationships
Determine placement of message in ongoing discussion
Verify authenticity
Establish route that message took to reach recipient
Identify Sender
Establish email account from which message originates
Identify name of sender responsible for transmitting the
message
Identify Recipients
Identify audience that the sender intends to read message
Identify audience that the sender intends to act upon message
Functions Behaviours
Establish message context
12
Assign acceptable value boundaries•This stage might not be needed in all cases
•An example from audio files is loss of stereo channels – that might be acceptable to some users (e.g. oral historians) but not for others (e.g. musicians)
•What might your various stakeholders accept?
Select object type(s) for analysis
Determine actual behaviours
Classify behaviours into set of functions
Assign acceptablevalue boundaries
Review & finaliseIdentify stakeholder Cross-match functions
13
Review and finalise
•What behaviours did you determine for the different stakeholders?
•What functions did you identify?
•What correlation between object and stakeholder properties?
•This process may be iterative in the real world, and repeated for a new/changed Designated Community or Archive
Select object type(s) for analysis
Determine actual behaviours
Classify behaviours into set of functions
Assign acceptablevalue boundaries
Review & finaliseIdentify stakeholder Cross-match functions