SlideShare a Scribd company logo
Prioritization Technique
~Mohit Budhiraja
Prioritizing
Techniques
• Prioritizing user stories is a
fundamental aspect of agile
project management. It involves
determining the order in which
user stories should be addressed
based on their importance, value
to the customer, and other
relevant criteria. Prioritization
ensures that the team focuses on
delivering the most critical and
valuable features early in the
development process
Importance of Prioritization
• Customer Value Focus
• Early Delivery of Value
• Adaptability to Change
• Resource Optimization
• Time-to-Market Reduction
• Efficient Sprint Planning
• Continuous Learning and
Improvement
~Mohit Budhiraja
Types of User story Prioritizing techniques
MoSCoW Method
Kano Model
High, Medium, Low (HML)
Relative Prioritization
Bubble Sort
Story Mapping
Business Value and Complexity (BVAC)
Impact vs. Effort Matrix
Risk-Based Prioritization
Cost of Delay (CoD)
Weighted Shortest Job First (WSJF)
Buy a Feature
~Mohit Budhiraja
MoSCoW Method
• The MoSCoW method is a prioritization technique commonly used in Agile project management to categorize and prioritize
requirements or user stories. The name "MoSCoW" is an acronym derived from the initial letters of four prioritization categories: Must-
Have, Should-Have, Could-Have, and Won't-Have. Each category represents a different level of priority and importance for features or
requirements.
• User Story 1: (Must-Have)
As a customer, I must be able to log in to the system using my
username and password to access personalized content.
• User Story 2: (Must-Have)
As a customer, I must be able to browse the product catalog, view
product details, and add items to my shopping cart.
• User Story 3: (Should-Have)
As a customer, I should receive an email confirmation after
successfully placing an order, including order details and an estimated
delivery date.
• User Story 4: (Should-Have)
As an administrator, I should have access to a dashboard displaying
real-time analytics of customer activities and order trends.
• User Story 5: (Could-Have)
As a customer, I could have the option to customize my user profile by
adding a profile picture and updating personal information.
• User Story 6: (Could-Have)
As a customer, I could receive personalized product recommendations
based on my purchase history and browsing behavior.
• User Story 7: (Won't-Have)
As a customer, the system won't display social media integration features
on the product pages.
• User Story 8: (Won't-Have)
As an administrator, the system won't include a feature for sending push
notifications to customers.
~Mohit Budhiraja
Kano Method
The Kano Model is used to prioritize features based on customer satisfaction and their level of expectation.
• User Story 1: (Basic Needs)
As a customer, I want a search functionality that allows me to
quickly find products based on keywords and filters.
• User Story 2: (Basic Needs)
As a customer, I want a secure and seamless checkout process to
ensure my transactions are safe and straightforward.
• User Story 3: (Performance Needs)
As a customer, I want the website to load quickly, providing a
smooth and responsive browsing experience.
• User Story 4: (Performance Needs)
As a customer, I want an intuitive navigation system that helps me
easily explore different product categories.
• User Story 5: (Excitement Needs)
As a customer, I would love a personalized dashboard that
recommends products based on my preferences and purchase
history.
• User Story 6: (Excitement Needs)
As a customer, I would appreciate a loyalty program that rewards me
for frequent purchases and provides exclusive offers.
• User Story 7: (Indifferent Needs)
As a customer, I'm indifferent to having an animated welcome page
when I log in; it doesn't significantly impact my experience.
• User Story 8: (Reverse Needs)
As a customer, I don't want intrusive pop-up ads that disrupt my
browsing experience.
~Mohit Budhiraja
High, Medium & Low(HML)
The High, Medium, Low (HML) prioritization technique is a simple method where user stories are categorized
based on their priority.
• User Story 1: (High Priority)
As a customer, I want a responsive mobile interface to easily
browse and make purchases from my smartphone.
• User Story 2: (High Priority)
As a customer, I want a secure payment gateway integrated into
the checkout process for safe transactions.
• User Story 3: (Medium Priority)
As a customer, I want an option to save items to my wishlist for
future purchases.
• User Story 4: (Medium Priority)
As a customer, I want to receive email notifications for order
confirmations and shipping updates.
• User Story 5: (Low Priority)
As a customer, I want a virtual assistant for real-time product
recommendations while browsing the website.
• User Story 6: (Low Priority)
As a customer, I want the option to customize the color theme of the
website for a personalized experience.
~Mohit Budhiraja
Relative Prioritization Technique
Relative prioritization involves comparing user stories against each other to determine their relative importance. In this method,
the team assigns a priority order based on the perceived importance of one user story compared to another.
• User Story 1:
As a user, I want a search functionality to quickly find products on
the website.
• User Story 2:
As a user, I want a user-friendly checkout process for a seamless
purchasing experience.
• User Story 3:
As a user, I want a personalized recommendation system to
discover new products based on my preferences.
• User Story 4:
As a user, I want the option to track my order and receive real-time
updates on its status.
• User Story 5:
As a user, I want a comprehensive user profile to manage my account
information and preferences.
~Mohit Budhiraja
Bubble Sort Technique
Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements, and swaps them if
they are in the wrong order. In the context of user story prioritization using bubble sort, the team iteratively compares pairs of
user stories and swaps their positions based on priority.
• User Story 1:
As a user, I want a search functionality to quickly find products on
the website.
• User Story 2:
As a user, I want a user-friendly checkout process for a seamless
purchasing experience.
• User Story 3:
As a user, I want a personalized recommendation system to
discover new products based on my preferences.
• User Story 4:
As a user, I want the option to track my order and receive real-time
updates on its status.
• User Story 5:
As a user, I want a comprehensive user profile to manage my account
information and preferences.
~Mohit Budhiraja
Story MappingTechnique
Story mapping is a technique used to visualize and prioritize user stories based on their importance and
dependencies. It helps create a holistic view of the product backlog.
• Goal: Create a user-friendly e-commerce platform for online shopping.
• Backlog Items:
1. Header Section: As a user, I want a navigation menu for easy
access to product categories., As a user, I want a search
bar to quickly find products.
2. Product Browsing: As a user, I want to see featured products on the
homepage., As a user, I want to filter products by category., As a user,
I want to sort products based on price.
3. Product Details: As a user, I want to view detailed product
descriptions., As a user, I want to see product reviews and ratings.
4. Shopping Cart: As a user, I want to add products to my shopping cart.,
As a user, I want to view and edit my shopping cart.
5. Checkout: As a user, I want a secure and easy-to-use checkout
process., As a user, I want to choose different payment options.
6. User Account: As a user, I want to create an account for personalized
recommendations. As a user, I want to track my order history.
• Story Mapping:
1. Top Horizontal Axis (Activities): Header Section, Product Browsing,
Product Details, Shopping Cart, Checkout, User Account
2. Left Vertical Axis (User Journey):
• Step 1: Homepage Navigation, Navigation menu, Search bar
• Step 2: Exploring Products , Featured products, Category filters, Price
sorting,
• Step 3: Product Details , Detailed descriptions, Reviews and ratings
• Step 4: Shopping , Add to cart, View/edit cart
• Step 5: Checkout ,Secure checkout, Payment options
• Step 6: User Account: Account creation, Order history tracking
~Mohit Budhiraja
Business Value and Complexity (BVAC)
technique
The Business Value and Complexity (BVAC) technique is a prioritization method that considers both the
business value of a user story and its complexity to implement.
• Feature: Search Bar :
• User Story 1: Basic Search : Business Value: 8 , Complexity: 5
• User Story 2: Advanced Filters: Business Value: 5, Complexity: 8
• Feature: Product Recommendations
• User Story 3: Personalized Recommendations: Business Value: 9,
Complexity: 7
• User Story 4: Trending Products: Business Value: 6, Complexity: 4
• Feature: Secure Checkout
• User Story 5: Multi-step Checkout Process: Business Value: 8,Complexity: 6
• User Story 6: Two-Factor Authentication: Business Value: 7, Complexity: 9
• Feature: User Account Management
• User Story 7: Order History Tracking: Business Value: 8, Complexity: 5
• User Story 8: Social Media Login Integration” Business Value: 6, Complexity:
7
~Mohit Budhiraja
Impact vs effort matrix technique
The Business Value and Complexity (BVAC) technique is a prioritization method that considers both the
business value of a user story and its complexity to implement.
• Feature: Search Bar
• User Story 1: Basic Search: Impact: Medium, Effort: Low
• User Story 2: Advanced Filters: Impact: High, Effort: Medium
• Feature: Product Recommendations
• User Story 3: Personalized Recommendations: Impact: High, Effort: Medium
• User Story 4: Trending Products: Impact: Medium, Effort: Low
• Feature: Secure Checkout
• User Story 5: Multi-step Checkout Process: Impact: High, Effort: High
• User Story 6: Two-Factor Authentication: Impact: Medium, Effort: Medium
• Feature: User Account Management
• User Story 7: Order History Tracking: Impact: Medium, Effort: Low
• User Story 8: Social Media Login Integration: Impact: Low, Effort: Low
~Mohit Budhiraja
Risk Based Prioritization Tenique
Risk-based prioritization involves assessing user stories based on potential risks and prioritizing them
accordingly. Here's an example for a software development project:
1. Feature: Payment Gateway Integration
1. User Story 1: Integration with New Payment Provider
1. Risk: High (due to lack of experience with the new provider)
2. User Story 2: Upgrade Existing Payment Integration
1. Risk: Medium (existing integration may have dependencies)
2. Feature: User Authentication
1. User Story 3: Implement Two-Factor Authentication (2FA)
1. Risk: High (security implications)
2. User Story 4: Password Recovery Mechanism
1. Risk: Low (commonly implemented, less complexity)
3. Feature: Data Migration
1. User Story 5: Migrate User Data to a New Database
1. Risk: High (potential data loss or corruption)
2. User Story 6: Data Validation and Integrity Checks
1. Risk: Medium (ensuring data accuracy during migration)
4. Feature: Reporting Module
1. User Story 7: Generate Custom Reports
1. Risk: Medium (complexity in report generation logic)
2. User Story 8: Export Reports to Various Formats
1. Risk: Low (standard functionality)
• Risk-Based Prioritization:
• High Risk User Stories (Priority 1):
• User Story 1: Integration with New Payment Provider
• User Story 3: Implement Two-Factor Authentication (2FA)
• User Story 5: Migrate User Data to a New Database
• Medium Risk User Stories (Priority 2):
• User Story 2: Upgrade Existing Payment Integration
• User Story 4: Password Recovery Mechanism
• User Story 6: Data Validation and Integrity Checks
• User Story 7: Generate Custom Reports
• Low Risk User Stories (Priority 3):
• User Story 8: Export Reports to Various Formats
~Mohit Budhiraja
Thank You!
~Mohit Budhiraja

More Related Content

Similar to Priortization Technique.pptx

BookStore
BookStoreBookStore
BookStore
RakshitAgarwal16
 
Backlog Management & Discovery
Backlog Management & DiscoveryBacklog Management & Discovery
Backlog Management & Discovery
Tarun Singh
 
ONLINE SHOPPINGKART FOR WOMENEMPOWERMENT
ONLINE SHOPPINGKART FOR WOMENEMPOWERMENTONLINE SHOPPINGKART FOR WOMENEMPOWERMENT
ONLINE SHOPPINGKART FOR WOMENEMPOWERMENT
Guna Santhu
 
Scope of e retailing in india
Scope of e   retailing in indiaScope of e   retailing in india
Scope of e retailing in india
aman gupta
 
E-commerce Checkout Design: Principles, Guidelines & Case Studies
E-commerce Checkout Design: Principles, Guidelines & Case StudiesE-commerce Checkout Design: Principles, Guidelines & Case Studies
E-commerce Checkout Design: Principles, Guidelines & Case Studies
uxviet
 
Enhancing the User Experience
Enhancing the User ExperienceEnhancing the User Experience
Enhancing the User Experience
Muhammad Sajid
 
BrightonSEO - Understanding Your Customers with Google Analytics
BrightonSEO - Understanding Your Customers with Google AnalyticsBrightonSEO - Understanding Your Customers with Google Analytics
BrightonSEO - Understanding Your Customers with Google Analytics
Dan Peden
 
User Stories Training
User Stories TrainingUser Stories Training
User Stories Training
Clarion Marketing
 
Online shopping e commerce website for cloth retail.pptx
Online shopping e commerce website for cloth retail.pptxOnline shopping e commerce website for cloth retail.pptx
Online shopping e commerce website for cloth retail.pptx
shubhanshusahu71
 
Project Presentation.pptx
Project Presentation.pptxProject Presentation.pptx
Project Presentation.pptx
YogendraVerma48
 
Emerging trends in consumer behavior
Emerging trends in consumer behaviorEmerging trends in consumer behavior
Emerging trends in consumer behavior
viveksangwan007
 
Effective User Stories.pdf
Effective User Stories.pdfEffective User Stories.pdf
Effective User Stories.pdf
SiddharthGarhwal1
 
E-Commerce Site Presentation
E-Commerce Site PresentationE-Commerce Site Presentation
E-Commerce Site Presentation
RohanRajMudvari
 
Strategy Building - For Disrupting Online Movie Ticketing Space in India
Strategy Building - For Disrupting Online Movie Ticketing Space in  IndiaStrategy Building - For Disrupting Online Movie Ticketing Space in  India
Strategy Building - For Disrupting Online Movie Ticketing Space in India
Anurag Rajandekar
 
props management system presentation.pptx
props management system  presentation.pptxprops management system  presentation.pptx
props management system presentation.pptx
AmruthaKP13
 
Understanding, optimizing and transforming Customer journey with ‘Data’
Understanding, optimizing and transforming Customer journey with ‘Data’Understanding, optimizing and transforming Customer journey with ‘Data’
Understanding, optimizing and transforming Customer journey with ‘Data’
Subrata Mukherjee @sumutech
 
IIBA SA Agile Business analysis workshop 18032014
IIBA SA Agile Business analysis workshop 18032014IIBA SA Agile Business analysis workshop 18032014
IIBA SA Agile Business analysis workshop 18032014
IQ Business - agility@IQ
 
User Stories Writing - Codemotion 2013
User Stories Writing - Codemotion 2013User Stories Writing - Codemotion 2013
User Stories Writing - Codemotion 2013
Fabio Armani
 
User stories writing - Codemotion 2013
User stories writing   - Codemotion 2013User stories writing   - Codemotion 2013
User stories writing - Codemotion 2013
Stefano Leli
 

Similar to Priortization Technique.pptx (20)

BookStore
BookStoreBookStore
BookStore
 
Backlog Management & Discovery
Backlog Management & DiscoveryBacklog Management & Discovery
Backlog Management & Discovery
 
ONLINE SHOPPINGKART FOR WOMENEMPOWERMENT
ONLINE SHOPPINGKART FOR WOMENEMPOWERMENTONLINE SHOPPINGKART FOR WOMENEMPOWERMENT
ONLINE SHOPPINGKART FOR WOMENEMPOWERMENT
 
Scope of e retailing in india
Scope of e   retailing in indiaScope of e   retailing in india
Scope of e retailing in india
 
E-commerce Checkout Design: Principles, Guidelines & Case Studies
E-commerce Checkout Design: Principles, Guidelines & Case StudiesE-commerce Checkout Design: Principles, Guidelines & Case Studies
E-commerce Checkout Design: Principles, Guidelines & Case Studies
 
Enhancing the User Experience
Enhancing the User ExperienceEnhancing the User Experience
Enhancing the User Experience
 
BrightonSEO - Understanding Your Customers with Google Analytics
BrightonSEO - Understanding Your Customers with Google AnalyticsBrightonSEO - Understanding Your Customers with Google Analytics
BrightonSEO - Understanding Your Customers with Google Analytics
 
User Stories Training
User Stories TrainingUser Stories Training
User Stories Training
 
Online shopping e commerce website for cloth retail.pptx
Online shopping e commerce website for cloth retail.pptxOnline shopping e commerce website for cloth retail.pptx
Online shopping e commerce website for cloth retail.pptx
 
Project Presentation.pptx
Project Presentation.pptxProject Presentation.pptx
Project Presentation.pptx
 
Emerging trends in consumer behavior
Emerging trends in consumer behaviorEmerging trends in consumer behavior
Emerging trends in consumer behavior
 
Effective User Stories.pdf
Effective User Stories.pdfEffective User Stories.pdf
Effective User Stories.pdf
 
E-Commerce Site Presentation
E-Commerce Site PresentationE-Commerce Site Presentation
E-Commerce Site Presentation
 
Strategy Building - For Disrupting Online Movie Ticketing Space in India
Strategy Building - For Disrupting Online Movie Ticketing Space in  IndiaStrategy Building - For Disrupting Online Movie Ticketing Space in  India
Strategy Building - For Disrupting Online Movie Ticketing Space in India
 
props management system presentation.pptx
props management system  presentation.pptxprops management system  presentation.pptx
props management system presentation.pptx
 
Understanding, optimizing and transforming Customer journey with ‘Data’
Understanding, optimizing and transforming Customer journey with ‘Data’Understanding, optimizing and transforming Customer journey with ‘Data’
Understanding, optimizing and transforming Customer journey with ‘Data’
 
IIBA SA Agile Business analysis workshop 18032014
IIBA SA Agile Business analysis workshop 18032014IIBA SA Agile Business analysis workshop 18032014
IIBA SA Agile Business analysis workshop 18032014
 
User Stories Writing - Codemotion 2013
User Stories Writing - Codemotion 2013User Stories Writing - Codemotion 2013
User Stories Writing - Codemotion 2013
 
User stories writing - Codemotion 2013
User stories writing   - Codemotion 2013User stories writing   - Codemotion 2013
User stories writing - Codemotion 2013
 
WMT A1 Group Presentation
WMT A1 Group PresentationWMT A1 Group Presentation
WMT A1 Group Presentation
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Priortization Technique.pptx

  • 2. Prioritizing Techniques • Prioritizing user stories is a fundamental aspect of agile project management. It involves determining the order in which user stories should be addressed based on their importance, value to the customer, and other relevant criteria. Prioritization ensures that the team focuses on delivering the most critical and valuable features early in the development process Importance of Prioritization • Customer Value Focus • Early Delivery of Value • Adaptability to Change • Resource Optimization • Time-to-Market Reduction • Efficient Sprint Planning • Continuous Learning and Improvement ~Mohit Budhiraja
  • 3. Types of User story Prioritizing techniques MoSCoW Method Kano Model High, Medium, Low (HML) Relative Prioritization Bubble Sort Story Mapping Business Value and Complexity (BVAC) Impact vs. Effort Matrix Risk-Based Prioritization Cost of Delay (CoD) Weighted Shortest Job First (WSJF) Buy a Feature ~Mohit Budhiraja
  • 4. MoSCoW Method • The MoSCoW method is a prioritization technique commonly used in Agile project management to categorize and prioritize requirements or user stories. The name "MoSCoW" is an acronym derived from the initial letters of four prioritization categories: Must- Have, Should-Have, Could-Have, and Won't-Have. Each category represents a different level of priority and importance for features or requirements. • User Story 1: (Must-Have) As a customer, I must be able to log in to the system using my username and password to access personalized content. • User Story 2: (Must-Have) As a customer, I must be able to browse the product catalog, view product details, and add items to my shopping cart. • User Story 3: (Should-Have) As a customer, I should receive an email confirmation after successfully placing an order, including order details and an estimated delivery date. • User Story 4: (Should-Have) As an administrator, I should have access to a dashboard displaying real-time analytics of customer activities and order trends. • User Story 5: (Could-Have) As a customer, I could have the option to customize my user profile by adding a profile picture and updating personal information. • User Story 6: (Could-Have) As a customer, I could receive personalized product recommendations based on my purchase history and browsing behavior. • User Story 7: (Won't-Have) As a customer, the system won't display social media integration features on the product pages. • User Story 8: (Won't-Have) As an administrator, the system won't include a feature for sending push notifications to customers. ~Mohit Budhiraja
  • 5. Kano Method The Kano Model is used to prioritize features based on customer satisfaction and their level of expectation. • User Story 1: (Basic Needs) As a customer, I want a search functionality that allows me to quickly find products based on keywords and filters. • User Story 2: (Basic Needs) As a customer, I want a secure and seamless checkout process to ensure my transactions are safe and straightforward. • User Story 3: (Performance Needs) As a customer, I want the website to load quickly, providing a smooth and responsive browsing experience. • User Story 4: (Performance Needs) As a customer, I want an intuitive navigation system that helps me easily explore different product categories. • User Story 5: (Excitement Needs) As a customer, I would love a personalized dashboard that recommends products based on my preferences and purchase history. • User Story 6: (Excitement Needs) As a customer, I would appreciate a loyalty program that rewards me for frequent purchases and provides exclusive offers. • User Story 7: (Indifferent Needs) As a customer, I'm indifferent to having an animated welcome page when I log in; it doesn't significantly impact my experience. • User Story 8: (Reverse Needs) As a customer, I don't want intrusive pop-up ads that disrupt my browsing experience. ~Mohit Budhiraja
  • 6. High, Medium & Low(HML) The High, Medium, Low (HML) prioritization technique is a simple method where user stories are categorized based on their priority. • User Story 1: (High Priority) As a customer, I want a responsive mobile interface to easily browse and make purchases from my smartphone. • User Story 2: (High Priority) As a customer, I want a secure payment gateway integrated into the checkout process for safe transactions. • User Story 3: (Medium Priority) As a customer, I want an option to save items to my wishlist for future purchases. • User Story 4: (Medium Priority) As a customer, I want to receive email notifications for order confirmations and shipping updates. • User Story 5: (Low Priority) As a customer, I want a virtual assistant for real-time product recommendations while browsing the website. • User Story 6: (Low Priority) As a customer, I want the option to customize the color theme of the website for a personalized experience. ~Mohit Budhiraja
  • 7. Relative Prioritization Technique Relative prioritization involves comparing user stories against each other to determine their relative importance. In this method, the team assigns a priority order based on the perceived importance of one user story compared to another. • User Story 1: As a user, I want a search functionality to quickly find products on the website. • User Story 2: As a user, I want a user-friendly checkout process for a seamless purchasing experience. • User Story 3: As a user, I want a personalized recommendation system to discover new products based on my preferences. • User Story 4: As a user, I want the option to track my order and receive real-time updates on its status. • User Story 5: As a user, I want a comprehensive user profile to manage my account information and preferences. ~Mohit Budhiraja
  • 8. Bubble Sort Technique Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements, and swaps them if they are in the wrong order. In the context of user story prioritization using bubble sort, the team iteratively compares pairs of user stories and swaps their positions based on priority. • User Story 1: As a user, I want a search functionality to quickly find products on the website. • User Story 2: As a user, I want a user-friendly checkout process for a seamless purchasing experience. • User Story 3: As a user, I want a personalized recommendation system to discover new products based on my preferences. • User Story 4: As a user, I want the option to track my order and receive real-time updates on its status. • User Story 5: As a user, I want a comprehensive user profile to manage my account information and preferences. ~Mohit Budhiraja
  • 9. Story MappingTechnique Story mapping is a technique used to visualize and prioritize user stories based on their importance and dependencies. It helps create a holistic view of the product backlog. • Goal: Create a user-friendly e-commerce platform for online shopping. • Backlog Items: 1. Header Section: As a user, I want a navigation menu for easy access to product categories., As a user, I want a search bar to quickly find products. 2. Product Browsing: As a user, I want to see featured products on the homepage., As a user, I want to filter products by category., As a user, I want to sort products based on price. 3. Product Details: As a user, I want to view detailed product descriptions., As a user, I want to see product reviews and ratings. 4. Shopping Cart: As a user, I want to add products to my shopping cart., As a user, I want to view and edit my shopping cart. 5. Checkout: As a user, I want a secure and easy-to-use checkout process., As a user, I want to choose different payment options. 6. User Account: As a user, I want to create an account for personalized recommendations. As a user, I want to track my order history. • Story Mapping: 1. Top Horizontal Axis (Activities): Header Section, Product Browsing, Product Details, Shopping Cart, Checkout, User Account 2. Left Vertical Axis (User Journey): • Step 1: Homepage Navigation, Navigation menu, Search bar • Step 2: Exploring Products , Featured products, Category filters, Price sorting, • Step 3: Product Details , Detailed descriptions, Reviews and ratings • Step 4: Shopping , Add to cart, View/edit cart • Step 5: Checkout ,Secure checkout, Payment options • Step 6: User Account: Account creation, Order history tracking ~Mohit Budhiraja
  • 10. Business Value and Complexity (BVAC) technique The Business Value and Complexity (BVAC) technique is a prioritization method that considers both the business value of a user story and its complexity to implement. • Feature: Search Bar : • User Story 1: Basic Search : Business Value: 8 , Complexity: 5 • User Story 2: Advanced Filters: Business Value: 5, Complexity: 8 • Feature: Product Recommendations • User Story 3: Personalized Recommendations: Business Value: 9, Complexity: 7 • User Story 4: Trending Products: Business Value: 6, Complexity: 4 • Feature: Secure Checkout • User Story 5: Multi-step Checkout Process: Business Value: 8,Complexity: 6 • User Story 6: Two-Factor Authentication: Business Value: 7, Complexity: 9 • Feature: User Account Management • User Story 7: Order History Tracking: Business Value: 8, Complexity: 5 • User Story 8: Social Media Login Integration” Business Value: 6, Complexity: 7 ~Mohit Budhiraja
  • 11. Impact vs effort matrix technique The Business Value and Complexity (BVAC) technique is a prioritization method that considers both the business value of a user story and its complexity to implement. • Feature: Search Bar • User Story 1: Basic Search: Impact: Medium, Effort: Low • User Story 2: Advanced Filters: Impact: High, Effort: Medium • Feature: Product Recommendations • User Story 3: Personalized Recommendations: Impact: High, Effort: Medium • User Story 4: Trending Products: Impact: Medium, Effort: Low • Feature: Secure Checkout • User Story 5: Multi-step Checkout Process: Impact: High, Effort: High • User Story 6: Two-Factor Authentication: Impact: Medium, Effort: Medium • Feature: User Account Management • User Story 7: Order History Tracking: Impact: Medium, Effort: Low • User Story 8: Social Media Login Integration: Impact: Low, Effort: Low ~Mohit Budhiraja
  • 12. Risk Based Prioritization Tenique Risk-based prioritization involves assessing user stories based on potential risks and prioritizing them accordingly. Here's an example for a software development project: 1. Feature: Payment Gateway Integration 1. User Story 1: Integration with New Payment Provider 1. Risk: High (due to lack of experience with the new provider) 2. User Story 2: Upgrade Existing Payment Integration 1. Risk: Medium (existing integration may have dependencies) 2. Feature: User Authentication 1. User Story 3: Implement Two-Factor Authentication (2FA) 1. Risk: High (security implications) 2. User Story 4: Password Recovery Mechanism 1. Risk: Low (commonly implemented, less complexity) 3. Feature: Data Migration 1. User Story 5: Migrate User Data to a New Database 1. Risk: High (potential data loss or corruption) 2. User Story 6: Data Validation and Integrity Checks 1. Risk: Medium (ensuring data accuracy during migration) 4. Feature: Reporting Module 1. User Story 7: Generate Custom Reports 1. Risk: Medium (complexity in report generation logic) 2. User Story 8: Export Reports to Various Formats 1. Risk: Low (standard functionality) • Risk-Based Prioritization: • High Risk User Stories (Priority 1): • User Story 1: Integration with New Payment Provider • User Story 3: Implement Two-Factor Authentication (2FA) • User Story 5: Migrate User Data to a New Database • Medium Risk User Stories (Priority 2): • User Story 2: Upgrade Existing Payment Integration • User Story 4: Password Recovery Mechanism • User Story 6: Data Validation and Integrity Checks • User Story 7: Generate Custom Reports • Low Risk User Stories (Priority 3): • User Story 8: Export Reports to Various Formats ~Mohit Budhiraja

Editor's Notes

  1. User Stories 1 and 2 address basic needs that customers expect and are dissatisfied without. User Stories 3 and 4 focus on performance needs that, when met, increase satisfaction but may not cause dissatisfaction if not present. User Stories 5 and 6 aim at excitement needs that delight customers when fulfilled but don't necessarily cause dissatisfaction if absent. User Story 7 represents indifferent needs – features that don't significantly impact satisfaction whether included or excluded. User Story 8 represents reverse needs – features that, when included, might cause dissatisfaction. The Kano Model helps in understanding the different types of customer needs and guides the prioritization of features based on their impact on customer satisfaction.
  2. In this example: User Stories 1 and 2 are classified as high priority because they address crucial aspects such as usability and security. User Stories 3 and 4 are considered medium priority, providing additional features that enhance the overall experience but are not critical. User Stories 5 and 6 are marked as low priority, representing features that, while desirable, are not urgent for the initial release. The HML prioritization technique is a straightforward approach, allowing teams to quickly categorize user stories based on their perceived importance. It provides a simple way to focus on high-priority items first while considering medium and low-priority items for subsequent iterations or releases.
  3. Relative Prioritization: User Story 2 (High Priority): Justification: A smooth checkout process is crucial for a positive user experience and conversion. User Story 1 (Medium Priority): Justification: While search functionality is important, it may not be as critical as ensuring a seamless checkout process. User Story 4 (Medium Priority): Justification: Real-time order tracking is important, but it can be prioritized after addressing the checkout process. User Story 3 (Low Priority): Justification: The personalized recommendation system is valuable but can be implemented after addressing more critical features. User Story 5 (Low Priority): Justification: User profiles are important, but they can be considered lower priority compared to the other features. In this example, the team has performed relative prioritization by comparing the importance of each user story in relation to others. This approach helps the team make decisions about the order in which they will work on the user stories, considering their perceived value and impact.
  4. Bubble Sort Prioritization: Iteration 1: Compare User Story 1 and User Story 2. No swap needed. Compare User Story 2 and User Story 3. Swap positions. Compare User Story 3 and User Story 4. Swap positions. Compare User Story 4 and User Story 5. Swap positions. The list after the first iteration: User Story 1, User Story 3, User Story 2, User Story 4, User Story 5. Iteration 2: Compare User Story 1 and User Story 3. No swap needed. Compare User Story 3 and User Story 2. Swap positions. Compare User Story 2 and User Story 4. Swap positions. Compare User Story 4 and User Story 5. No swap needed. The list after the second iteration: User Story 1, User Story 2, User Story 3, User Story 4, User Story 5. Iterations 3, 4, ...: The algorithm continues until no more swaps are needed. The final sorted order represents the prioritization based on the bubble sort algorithm. Keep in mind that bubble sort is a basic algorithm used here for illustrative purposes. In practice, more advanced and efficient methods may be employed for user story prioritization.
  5. Bubble Sort Prioritization: Iteration 1: Compare User Story 1 and User Story 2. No swap needed. Compare User Story 2 and User Story 3. Swap positions. Compare User Story 3 and User Story 4. Swap positions. Compare User Story 4 and User Story 5. Swap positions. The list after the first iteration: User Story 1, User Story 3, User Story 2, User Story 4, User Story 5. Iteration 2: Compare User Story 1 and User Story 3. No swap needed. Compare User Story 3 and User Story 2. Swap positions. Compare User Story 2 and User Story 4. Swap positions. Compare User Story 4 and User Story 5. No swap needed. The list after the second iteration: User Story 1, User Story 2, User Story 3, User Story 4, User Story 5. Iterations 3, 4, ...: The algorithm continues until no more swaps are needed. The final sorted order represents the prioritization based on the bubble sort algorithm. Keep in mind that bubble sort is a basic algorithm used here for illustrative purposes. In practice, more advanced and efficient methods may be employed for user story prioritization.
  6. The team can prioritize user stories based on the BVAC matrix, starting with those with the highest business value and lower complexity. For example, User Story 3 (Personalized Recommendations) might be prioritized higher than User Story 6 (Two-Factor Authentication) due to its higher business value despite slightly higher complexity. This BVAC matrix allows the team to make informed decisions by balancing the potential impact on business value and the effort required to implement each user story. The goal is to maximize the value delivered to users while managing the complexity of development.
  7. rioritization: Quadrant 2 contains high-impact, low-effort user stories (e.g., User Story 2: Advanced Filters), making them top priority. Quadrant 1 contains high-impact, high-effort user stories (e.g., User Story 5: Multi-step Checkout Process), which may be considered next. Quadrant 3 contains low-impact, low-effort user stories (e.g., User Story 7: Order History Tracking), considered for later. Quadrant 4 contains low-impact, high-effort user stories (e.g., User Story 6: Two-Factor Authentication), which may be deprioritized or reconsidered. This matrix allows the team to visually assess and prioritize user stories based on their potential impact and the effort required, helping in effective decision-making during backlog grooming and sprint planning.
  8. Bubble Sort Prioritization: Iteration 1: Compare User Story 1 and User Story 2. No swap needed. Compare User Story 2 and User Story 3. Swap positions. Compare User Story 3 and User Story 4. Swap positions. Compare User Story 4 and User Story 5. Swap positions. The list after the first iteration: User Story 1, User Story 3, User Story 2, User Story 4, User Story 5. Iteration 2: Compare User Story 1 and User Story 3. No swap needed. Compare User Story 3 and User Story 2. Swap positions. Compare User Story 2 and User Story 4. Swap positions. Compare User Story 4 and User Story 5. No swap needed. The list after the second iteration: User Story 1, User Story 2, User Story 3, User Story 4, User Story 5. Iterations 3, 4, ...: The algorithm continues until no more swaps are needed. The final sorted order represents the prioritization based on the bubble sort algorithm. Keep in mind that bubble sort is a basic algorithm used here for illustrative purposes. In practice, more advanced and efficient methods may be employed for user story prioritization.