28 years business experience, primarily as a fixer
1988: POS and new hire training manual for Dayton
Degree in MIS and Masters in MIS
Teach because I love it as long as students meet
Refining the Initial
Model The Five Key
October 17, 2015
Example Saint Thomas Onboarding Process
Review each step one by one
The questions first consider how work arrives at a step through a handoff and then
what the step actually doe
1. Business Processes
2. Brief History
3. Business Processes What are they?
4. Approach in a Nutshell
Part II: Establish Process
The sender/receiver model helps people be
Are you a good communicator?
How many of you are good communicators?
Raise your hands
What color do I think the dress is?
We consider the following as the top five risks with a HIGH impact on
1. Lack of executive support.
2. User adoption risk. New system might not be user friendly and not
get fully utilized.
3. Requirements may be incomplete.
4. Lack of
The purpose of this plan is to provide a description of how the
password expiry notification module will be deployed.
Overview of the Deployment plan and the steps:
Standardize the business process
Focus on the functional requirement
Takeaway Burger Shop (Current State)
order in the
Fry the patty