Structured Analytic Techniques (SATs): Difference between revisions
No edit summary |
m Sac moved page Structured Analytic Techniques to Structured Analytic Techniques (SATs) |
||
(11 intermediate revisions by 2 users not shown) | |||
Line 2: | Line 2: | ||
== Eight Rules for Successful Brainstorming == | == Eight Rules for Successful Brainstorming == | ||
[[File: | [[File:EIGHT-RULES-FOR-SUCCESSFUL-BRAINSTORMING.png|500px|]] | ||
== Technique Level 1 == | == Technique Level 1 == | ||
=== Technique 1: Chronologies and Timelines === | === Technique 1: Chronologies and Timelines === | ||
[[File: | [[File:Figure-7.2-Timeline_Estimate.png]] (Pherson and Heuer, 2021, p. 211) | ||
'''Step-by-Step Guide:''' | '''Step-by-Step Guide:''' | ||
Line 30: | Line 30: | ||
=== Technique 1: Starbursting === | === Technique 1: Starbursting === | ||
Find the template from [MindTools-Starbursting](https://www.mindtools.com/ab1w9zu/starbursting) or [download here] | Find the template from [MindTools-Starbursting](https://www.mindtools.com/ab1w9zu/starbursting) or [[File:Starbursting.pdf|download here]]. | ||
[[File: | [[File:Figure-6.5-Starbursting-Example.png|500px]] | ||
(Pherson and Heuer, 2021, p. 167) | |||
{| style="text-align:center; border-collapse: collapse; margin: 0 auto;" | |||
|- | |||
| colspan="3" | '''What?''' | |||
|- | |||
| '''Why?''' || '''Central Problem/Question''' || '''Who?''' | |||
|- | |||
| colspan="3" | '''How?''' | |||
|- | |||
| colspan="3" | '''When?''' | |||
|- | |||
| colspan="3" | '''Where?''' | |||
|} | |||
=== Technique 1: Force Field Analysis === | === Technique 1: Force Field Analysis === | ||
Line 42: | Line 56: | ||
* '''STEP 4''': Assign values to the arguments to determine their strength. Calculate the total score to determine the dominant side. (Beebe and Pherson, 2015, p. 133) | * '''STEP 4''': Assign values to the arguments to determine their strength. Calculate the total score to determine the dominant side. (Beebe and Pherson, 2015, p. 133) | ||
[[File: | [[File:table-4.2.png]] (Beebe and Pherson, 2015, p. 133) | ||
=== Technique 1: Key Assumptions Check === | === Technique 1: Key Assumptions Check === | ||
Line 52: | Line 66: | ||
* '''STEP 4''': Refine the list and update based on group feedback. (Beebe and Pherson, 2015, p. 186) | * '''STEP 4''': Refine the list and update based on group feedback. (Beebe and Pherson, 2015, p. 186) | ||
[[File: | [[File:table-6.4.png]] (Beebe and Pherson, 2015, p. 186) | ||
=== Technique 1: Red Hat Analysis and Structured Brainstorming === | === Technique 1: Red Hat Analysis and Structured Brainstorming === | ||
Line 92: | Line 106: | ||
* '''STEP 2''': List criteria and options. Consolidate items to remove overlap. (Beebe and Pherson, 2015, p. 454) | * '''STEP 2''': List criteria and options. Consolidate items to remove overlap. (Beebe and Pherson, 2015, p. 454) | ||
* '''STEP 3''': Assign weights and score options. Calculate the total score and choose the best option. (Beebe and Pherson, 2015, p. 456) | * '''STEP 3''': Assign weights and score options. Calculate the total score and choose the best option. (Beebe and Pherson, 2015, p. 456) | ||
{| class="wikitable" | |||
! colspan="5" | '''Decision Matrix: <Decision/Question>''' | |||
|- | |||
! Criteria | |||
! Weight | |||
! Option 1 | |||
! Option 2 | |||
! Option 3 | |||
|- | |||
| '''Criterion 1:''' | |||
| | |||
| | |||
| | |||
| | |||
|- | |||
| '''Criterion 2:''' | |||
| | |||
| | |||
| | |||
| | |||
|- | |||
| '''Criterion 3:''' | |||
| | |||
| | |||
| | |||
| | |||
|- | |||
| '''Criterion 4:''' | |||
| | |||
| | |||
| | |||
| | |||
|- | |||
| '''Criterion 5:''' | |||
| | |||
| | |||
| | |||
| | |||
|- | |||
! '''Total Weighted Score:''' | |||
| | |||
| | |||
| | |||
| | |||
|- | |||
! colspan="5" | '''Best Option:''' | |||
|- | |||
| colspan="5" | | |||
* Selected Option: (e.g., Option 1 based on the highest score) | |||
|} | |||
=== Technique 2: Devil’s Advocacy === | === Technique 2: Devil’s Advocacy === | ||
Line 120: | Line 185: | ||
* '''STEP 2''': Clarify each hypothesis using Who, What, When, Where, and Why. (Beebe and Pherson, 2015, p. 207) | * '''STEP 2''': Clarify each hypothesis using Who, What, When, Where, and Why. (Beebe and Pherson, 2015, p. 207) | ||
* '''STEP 3''': Select the most promising hypotheses for further analysis. (Beebe and Pherson, 2015, p. 207) | * '''STEP 3''': Select the most promising hypotheses for further analysis. (Beebe and Pherson, 2015, p. 207) | ||
{| class="wikitable" | |||
! colspan="6" | '''Multiple Hypothesis Generation Table: <Objective/Problem>''' | |||
|- | |||
! Hypothesis | |||
! Who | |||
! What | |||
! When | |||
! Where | |||
! Why | |||
|- | |||
| '''Hypothesis 1:''' | |||
| | |||
| | |||
| | |||
| | |||
| | |||
|- | |||
| '''Hypothesis 2:''' | |||
| | |||
| | |||
| | |||
| | |||
| | |||
|- | |||
| '''Hypothesis 3:''' | |||
| | |||
| | |||
| | |||
| | |||
| | |||
|- | |||
| '''Hypothesis 4:''' | |||
| | |||
| | |||
| | |||
| | |||
| | |||
|- | |||
| '''Hypothesis 5:''' | |||
| | |||
| | |||
| | |||
| | |||
| | |||
|- | |||
! colspan="6" | '''Selected Promising Hypotheses for Further Analysis''' | |||
|- | |||
| colspan="6" | | |||
* Selected Hypothesis 1: (e.g., Hypothesis 1 based on evidence and plausibility) | |||
* Selected Hypothesis 2: (e.g., Hypothesis 3 with strong indicators) | |||
|} | |||
=== Technique 2: Pros-Cons-Faults-and-Fixes === | === Technique 2: Pros-Cons-Faults-and-Fixes === | ||
Line 211: | Line 328: | ||
[[File:media/figure-10.4-swot-analysis.png]] (Beebe and Pherson, 2015, p. 188) | [[File:media/figure-10.4-swot-analysis.png]] (Beebe and Pherson, 2015, p. 188) | ||
{| class="wikitable" | |||
! colspan="2" | SWOT Analysis: '''<Objective>''' | |||
|- | |||
! Strengths | |||
! Weaknesses | |||
|- | |||
| | |||
* Strength 1 | |||
* Strength 2 | |||
* Strength 3 | |||
| | |||
* Weakness 1 | |||
* Weakness 2 | |||
* Weakness 3 | |||
|- | |||
! Opportunities | |||
! Threats | |||
|- | |||
| | |||
* Opportunity 1 | |||
* Opportunity 2 | |||
* Opportunity 3 | |||
| | |||
* Threat 1 | |||
* Threat 2 | |||
* Threat 3 | |||
|- | |||
! colspan="2" | '''Strategies for Action''' | |||
|- | |||
| colspan="2" | | |||
'''Exploiting Strengths & Opportunities:''' | |||
* Strategy 1: (e.g., Use Strength 1 to maximize Opportunity 1) | |||
* Strategy 2: (e.g., Leverage Strength 2 to counter Threat 2) | |||
* Strategy 3: (e.g., Use Opportunity 3 to reduce Weakness 3) | |||
'''Mitigating Weaknesses & Threats:''' | |||
* Strategy 4: (e.g., Address Weakness 2 to avoid Threat 1) | |||
* Strategy 5: (e.g., Minimize Weakness 1 through Opportunity 2) | |||
|} | |||
=== Technique 3: Foresight Quadrant Crunching === | === Technique 3: Foresight Quadrant Crunching === | ||
Line 242: | Line 399: | ||
[[Category:Analysis Methods]] | [[Category:Analysis Methods]] | ||
[[Category:Guides]] | [[Category:Guides]] | ||
[[Category:Frameworks]] |