Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

The problem is that the young patients who are suffering from the problem of mental illness might find it difficult or boring to repeat their problem to the doctors every time they visit to the a new doctor. It is normal for such patients to visit a series of doctors before getting the required medical help. One patient might have to visit a caseworker of Headspace, staffs of hospital emergency a general practitioner or a psychiatrist. While they are seeing a series of
doctors in a short span of time, they always need to re tell their problems and the medication details to the doctors. It is observed that in the process of retelling the story, the patients often clam up and tend to say a very little about their problems.

This makes it difficult for the doctors to understand their problems and offer them correct medications. As a result of this, the patients may not always get the appropriate medication that they need. This is a huge problem in terms of
the increasing number of patients who need medical help but tend to say a very little about their problem.
To deal with this problem, a project is proposed which will store the story of the patients on the very first time it is being told (Hsiao et al., 2013). This will eliminate the problem of re telling the problems to the doctors every time the patients visit them (Pathak, Kho & Denny.

The story of the patients will be stored in the system and the doctors will have an access to the same. The benefits and the capabilities of the system are elaborated in the sections below.

Non Functional Requirements

Headspace is a popular health organization in New South Wales that treat people with mental illness. This is the type of information system, which can eventually store the various details about young individuals, between the age group of 18 and 25 (Botta et al., 2016). All of these patients are continuously asked regarding the mental issues they are facing. Thus, they are highly disturbed with this type of continuous interaction with the health experts, doctors and nurses.

The project of New Access would be providing a distinct information system, which can store the stories when they are narrated for the first time. The patients as well as the various doctors, health experts and nurses will be highly benefitted from this type of information system (Herbst, Kounev & Reussner, 2013). The treatment will be extremely easier for all the health experts and even the data is updated properly. This report will be describing the project of New Access and their non functional requirements of FURPS. Moreover, a proper cloud based solution will also be provided here and the most suitable SDLC approach will be recommended in the report.

Discussion 

1. Non Functional Requirements

            The various respective non functional requirements are responsible for helping to accurately and perfectly identify all types of important and noteworthy qualities in an information system (Hashizume et al., 2013). One of these non functional requirements is FURPS or functionality, usability, reliability, performance and security. System operation is judged by these requirements. The details for New Access project are provided below:

1.1 Functionality

            It is the major non functional requirement in New Access project of Headspace organization. This particular project would provide the most updated and up graded information regarding the mental health of the young patients. This system would stop them from discussing their issues repeatedly to the doctors. Furthermore, data accessibility and up gradation is much more easier with the proper implementation of New Access in Headspace. Adaptability is the significant feature in New Access system.

1.2 Usability

            It is another non functional requirement that depicts about the overall usability of the New Access project. This effectiveness and efficiency of the project is properly maintained with this (Botta et al., 2014). The proper uses of the project for the betterment of Headspace organization are the major features of this usability. The ability of learning is also enhanced by this. A completely user friendly infrastructure and interface is yet another significant usability feature.

1.3 Reliability

            This reliability is checked in New Access project in the organization of Headspace and it is a major non functional requirement. Only accurate and reliable data are updated within the system and also the health professionals solve the other issues of the patients with much security. Data management is also done from reliable sources in this system.

1.4 Performance

            The overall performance of the New Access project in the Headspace organization is being checked after confirming that the data is genuine here. This type of data accuracy hence provides good performance (Gupta, Seetharaman & Raj, 2013). Providing emergency services is another measure for performance in New Access. The total response time is much lesser here.

Cloud Solutions: Use of Several Types of Clouds

1.5 Security

            Data security is the final non functional requirement of the project of New Access in the Headspace organization. There are three major features of the New Access project, which are scalability, testability and configurability (O’Driscoll, Daugelaite & Sleator, 2013). These three distinct features ensure thee flexibility, scalability and testability of the project. Moreover, the applications could be easily configured and hence the non functional requirement is extremely efficient as well as effective for this particular project in Headspace.

2. Cloud Solutions: Use of Several Types of Clouds

            Cloud computing is termed as one of the major as well as the most efficient technique that is eventually utilized for the core purpose of data transfer through the connection of Internet (Chen et al., 2016). The speed of data transfer is extremely high. The three cloud solutions for New Access project are provided below:

  1. i) Public Cloud: This type of cloud is responsible for providing data access in a public network or without having any type of restriction. The security of public cloud is not at all effective since the architecture is not strong.
  2. ii) Private Cloud: Private cloud is considered as one of the most safe and secured cloud deployment model, which allows data access in private groups and securely (Sadiku, Musa & Momoh, 2014).

            iii) Hybrid Cloud: The proper amalgamation of private and public clouds is together termed as the hybrid cloud. It gets advantages of both the cloud services.

            The best cloud solution for New Access project is the hybrid cloud. Since, all the advantages of public and private clouds are present here, it is recommended for Headspace (Whaiduzzaman et al., 2014).

2.1 Strengths of Hybrid Cloud

            The advantages of hybrid cloud are as follows:

  1. i) Lesser Time Consumption: The total time consumption for data transfer is quite less and thus it is quite popular for the users (Avram, 2014).
  2. ii) Better Flexibility: Hybrid cloud is extremely scalable and flexible and thus is quite effective for all.
  3. 2.2 Weaknesses of Hybrid Cloud

            The disadvantages of hybrid cloud are as follows:

  1. i) Quite Expensive: This hybrid cloud is quite costly and hence it is not being afforded by all users (Suo et al., 2013).
  2. ii) Weaker Networks: Another disadvantage of the hybrid cloud is that it never provides strong networks for the users.

SDLC Approach

            SDLC approach or the software development life cycle approach is considered as one of the major and the most significant approaches in any project. This specific approach is being utilized within each and every information system, software and system engineering for the core purpose of describing the entire process of project planning, project creating, project testing and then project deployment of the information system or IS (Wei et al., 2014). This project deployment is done for Headspace organization. The overall effectiveness and efficiency are extremely high and better for each and every project.

            The two significant approaches of the software development life cycle that could be taken into consideration for the project of New Access in Headspace organization are termed as predictive approach and adaptive approach.

3.1 Predictive SDLC Approach

            This is the first and the foremost approach of the software development life cycle in this specific medical project of the New Access in Headspace organization. The entire life cycle of any particular project is properly monitored by undertaking the predictive approach (Xia et al., 2016). This predictive SDLC approach is only applied when the project schedule is properly definite as well as clear. The most significant advantages and disadvantages of the predictive SDLC approach are provided below:

Pros:

  1. i) Accurate Project Plan: The first as well as the most important and significant advantage of tis predictive approach is that it provides a proper and accurate project plan to the project team members.
  2. ii) Clear Scope and Schedule: The overall project scope and schedule are absolutely clear and proper and hence the users do not face any issue due to this.

            iii) Proper Tracking of Project: The entire progress of the project is eventually tracked periodically and thus popularity is maintained.

Cons:

  1. i) No Alteration in Project Plan: The first and the most significant disadvantage of this particular predictive approach is that it allows no alteration within the respective project plan (Suo et al., 2013). Thus, changes are not possible.
  2. ii) No Consideration of Clients’ Feedbacks: The clients’ feedbacks could not be considered at any circumstances by the project manager and hence the clients are often dissatisfied with the overall results.

3.2 Adaptive SDLC Approach

            The second popular and important approach of the software development life cycle in this typical medical project of New Access in Headspace is the adaptive approach. Within the adaptive approach, the plan of project is not made before the respective project initiation (O’Driscoll, Daugelaite & Sleator, 2013). The several project deliverables are subsequently provided in each and every phase and this makes the project execution quite easier. The most significant advantages and disadvantages of the adaptive SDLC approach are provided below:

SDLC Approach

Pros:

  1. i) Allows Modifications: Adaptive approach has the major advantage of allowing subsequent modifications in all phases of any specific project.
  2. ii) Considers Clients’ Feedbacks: The next important and significant advantage of this particular adaptive approach is that all the feedbacks of clients are considered here.

Cons:

  1. i) Extremely Expensive: The first and the foremost demerit of this adaptive approach is that the overall costs are quite high in respect to all other approaches and hence it becomes quite problematic to afford this approach (Arora, Parashar & Transforming, 2013).
  2. ii) Unclear Project Scope: The respective project scope as well as project schedule for this particular approach of adaptive is absolutely unclear and hence the project is not being understood by all.

3.3 Recommended SDLC Approach

            New Access project is introduced by Headspace Company to treat the youth individuals, those who have mental illness easily and promptly. These patients are continuously asked about their illness by the health professionals and they are uncomfortable in sharing these details. New Access project is will be mitigating all of these issues and for this deployment, predictive software development life cycle will be the best and would provide better efficiency and effectiveness to them. The main reason for this is that predictive approach provides better project planning and the implementation costs are quite less.

Conclusion

            Therefore, conclusion is drawn from the report that this New Access project was introduced by Headspace organization. The proper improvisation of the management of data would also be done with this particular project. All the young individuals, who have the age between 18 and 25 years and are suffering from mental illness will be having benefits from this specific information system. These young patients are asked several questions about their illness and problems again and again and hence they often feel uncomfortable due to this.

Moreover, the doctors also ask questions to their parents or family members and even they are unable to communicate with the patients. To solve these significant issues of the mental patients, New Access project is being launched for the organization of Headspace. The report has eventually explained the several non functional requirement of FURPS or the functionality, usability, reliability, performance and security to this New Access project for the organization of Headspace. The cloud based solutions are also important for this project and a proper cloud based solution is selected after considering the several strengths and weaknesses. This report has even provided a recommendation of the software development life cycle approach after analysing predictive and adaptive approaches.

References

Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), 1922-1926.

Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, 529-534.

Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2014, August). On the integration of cloud computing and internet of things. In Future internet of things and cloud (FiCloud), 2014 international conference on (pp. 23-30). IEEE.

Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.

Chen, X., Jiao, L., Li, W., & Fu, X. (2016). Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Transactions on Networking, (5), 2795-2808.

Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing by small and medium businesses. International Journal of Information Management, 33(5), 861-874.

Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of internet services and applications, 4(1), 5.

Herbst, N. R., Kounev, S., & Reussner, R. H. (2013, June). Elasticity in Cloud Computing: What It Is, and What It Is Not. In ICAC (Vol. 13, pp. 23-27).

O’Driscoll, A., Daugelaite, J., & Sleator, R. D. (2013). ‘Big data’, Hadoop and cloud computing in genomics. Journal of biomedical informatics, 46(5), 774-781.

Sadiku, M. N., Musa, S. M., & Momoh, O. D. (2014). Cloud computing: opportunities and challenges. IEEE tentials, 33(1), 34-36.

Suo, H., Liu, Z., Wan, J., & Zhou, K. (2013, July). Security and privacy in mobile cloud computing. In Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International (pp. 655-659). IEEE.

Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371-386.

Whaiduzzaman, M., Sookhak, M., Gani, A., & Buyya, R. (2014). A survey on vehicular cloud computing. Journal of Network and Computer Applications, 40, 325-344.

Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594-2608.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2020). New Access: An Information System For Mental Health Patients, Essay.. Retrieved from https://myassignmenthelp.com/free-samples/itc548-system-analysis/proper-implementation.html.

"New Access: An Information System For Mental Health Patients, Essay.." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/itc548-system-analysis/proper-implementation.html.

My Assignment Help (2020) New Access: An Information System For Mental Health Patients, Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/itc548-system-analysis/proper-implementation.html
[Accessed 25 April 2024].

My Assignment Help. 'New Access: An Information System For Mental Health Patients, Essay.' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/itc548-system-analysis/proper-implementation.html> accessed 25 April 2024.

My Assignment Help. New Access: An Information System For Mental Health Patients, Essay. [Internet]. My Assignment Help. 2020 [cited 25 April 2024]. Available from: https://myassignmenthelp.com/free-samples/itc548-system-analysis/proper-implementation.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close