Nonfunctional requirements are generally defined as the quality attributes of a system. The System must be able to affirm as well as support important data as well as information of the patients. The patients must be provided proper education so that they can utilize the system appropriately without facing much problem. The System that is provided has high level of both quality as well as execution.
The implementation of “My Health Record” requires huge amount of information approval as well as revision of various challenges. The main aim of the system is to continue with the procedure of reformation in order to drive various types of efficiencies into the health care system for improving the quality of patient care while minimizing various types of challenges that mainly occurs due to lack of proper information, which is shared about the patients (Li et al., 2014). Other non-functional perquisites generally help in incorporating various types of performances that are generally measured with the help of the operations that are generally performed by the specialist organization or by the patients.
- Appropriate qualities of the system is generally accessible with the help of the system
- The System that is created generally include current System that is mainly related with the public insurance offices
- The Systems are very much adaptable as per the various requirements of public insurance offices
- The most imperative nature of the System is mainly created in the form of a report. The System is comparable with the report it produces. The capacity of creation of various types off data helps in the basic leadership that is generally prepared by the specialist as one of important quality for this System.
The various necessities of user interface are provided below:
- If any security related problem arises then a message will be forwarded o the patients and as a result they will be alert.
- The system must provide appropriate capacity to the patients so that they can make appropriate changes whenever required (Tetmeyer, Hein & Saiedian, 2014).
- The patients must have the capacity to secure their medical history from other individual. This helps in providing proper authentication as well as security to various information as well as data that are related with medical records.
The various types of non-functional requirements are understood properly by utilizing the acronym “FURPS”. This generally helps in referring various types of aspects that include Usability, Performance, security as well as Reliability. These types of aspects are discussed below:
Usability: Usability is defined as a feature that helps in determining the ease of the system in terms of various goals as well as objectives of the organization that is mentioned appropriately before designing the system (Sun & Park, 2014). The system must be able to provide proper as well as effective usability to the patients. They must be able to meet all the needs as well as requirements of the patients appropriately so that the patients does not face any problem.
Reliability: Reliability of a system is defined as the ability that helps in fulfilling various aims as well as objectives of the system that is stated over a particular time. This characteristic mainly deals with completing various operations that are associated with the system within a specified time (Lotvall et al., 2014). The reliability of the system can be measured by analyzing that whether certain features like patient registration, administrative activities and more are completing within the specified time or not. It is analyzed that reliability of the entire system is dependent on the response time.
Reliability
Performance: The performance of the system is generally dependent on the accuracy as well as response time of the system. It is identified that time constraints is one of the important aspect. One of the significant requirements off the users is to get proper as well as accurate information. Therefore, it is very much important for the system to meet all the requirements as well as needs of the patients without any error (Ladiges et al., 2013). If any error related to data handling or billing occurs then the company will face number of challenges.
Security: Security is also considered as one of the significant concern. It is identified that all the significant as well as confidential data as well as information of the organization is generally stored with the “My Health Record System”. The system must be able to provide proper security as well as authentication to the data as well as information that is stored within the system. The system is designed in such a way that the data is accessible by all types of users (Garg, Versteeg & Buyya, 2013). The network security must be appropriate so that the organization does not face any security related issues.
The cloud computing applications plays a great role in decreasing the cost that is needed for high programming, equipments as well as for system foundation. It is identified it additionally helps in minimizing high cost that is mainly required for enrolling various experts as well as workers for development of the system (Dinh et al., 2013). The cloud based applications helps in providing pen doors for different types of needs as well as requirements by providing time-sharing as well as appropriate virtualization.
The various benefits of cloud can be utilized for restoring different information as well as data of the patients for making the system much more productive so that it can be able to deal with storing the important information as well as data of the patients in the database of the system appropriately. The system helps in storing the information appropriately with the help of the servers that generally plays a great role in handling various information as well as data of the patients (Rittinghouse & Ransome, 2016). The utilization of cloud based server for My Health Record System helps in encouraging the various restorative staffs as well as patients for utilizing the system at anytime and at any place.
Proper support techniques that are utilized for the clients helps in providing proper as well as appropriate secure conditions for storing various data as well as information related with the information of the clients. In order to move various significant medical information as well as data, some of the security measure that must be followed by the organization (Li et al., 2013). One of the most important steps is incorporation of proper information encryption system so that it helps in securing various information as well as data of the patients appropriately. However, it is identified that all system does work well with the encryption technique because various patients access the record system and therefore the level of access that is required is of high level.
Performance
It is identified that there are number of predefined steps that are helpful for developing the system software within the Predictive SDLC. This strategy needs some steps as well as requirements that are helpful in developing “My Health Record System”. It is analyzed that the various predefined steps are not updated or changed between the time-period of development (Ata & Perks, 2014). In this approach, next step can be started only if the previous step is completed successfully. The various advantages as well as disadvantages of this approach are provided below:
- It assists the project group to complete the entire project within the estimated time-period successfully.
- Proper documentation is done in each step, which helps in providing proper comprehensive of various perquisites (Sakul-Ung & Chutimaskul, 2017).
- By utilizing this approach, the final product of the project is mainly known to the project group
- After proper arrangement, the various requirements are declared for starting the project
- It is generally considered as one of the unbending methodologies which is not able to suit any changes that is mentioned after the initiation phase of the project (Moparthi & Geethanjali, 2016).
- Proper communication between the customers as well as project group just occurs at the closure phase of the project and at the initiation phase of the project
The steps that are needed for the development of the system software is not clearly mentioned in the SDLC approach before. The various steps that are required for developing the software system can be modified during the entire course of the project (Bellaaj et al., 2017). It is also known as agile strategy for software development. The various type’s advantages as well as disadvantages of this approach is provided below:
- In this approach, the various activities of the project can be balanced with the advance of the project
- Ant type of changes can be done during the entire course of the project (Wirawan & Santo, 2015).
- This approach helps in incorporating customers at each phase of the project so that various needs as well as requirements of the customers can be met appropriately.
- Needs appropriate members for determining various types of challenges or vulnerabilities that can occur within the project
- In each phase of the project, proper challenges related with the project are identified, if the problems are not identified then it will create problem in the progress of the project
- The approach only considers those tasks that are extensive in size and have number of advantages (Nurfatin, 2013).
The paper illustrates the various advantages as well as disadvantages of both the predictive as well as adaptive SDLC approach. It is analyzed that number of variables as well as segments can have an impact on the approach for the improvement of the “My Health record System”. In order to deal with various challenges that affect the development procedure of the system software, proper mitigation procedures must be utilized.
It is analyzed that in the predictive approach, the various arrangement for the project is done before they are executed appropriately. It helps in providing immediate, specific change that is sorted within a specific time-period (Premchander, 2014). On the other hand, in the adaptive approach the projects are generally proposed into little parts for providing appropriate flexibility as well as planning during the entire course of the project. This approach plays a great role in satisfying the various customers by meeting their various requirements as well as needs.
It is analyzed that the project of My Health Record is unpredictable and it includes number of different stakeholders. Therefore, for this project adaptive approach is selected. It is analyzed that the adaptive approach is sorted properly as well as orderly for determining various types of decisions, methodologies of the organization as well as practices for the outcome of the results (Bellaaj et al., 2017). This model generally assists in joining various key models that is mainly consists of various types of project organization, iterative strategies as well as various incentive business related conditions. This approach helps in incorporating various types of possibilities from the past stages due to the various task cycles.
Security
Therefore, it is concluded that adaptive approach is the most proper approach for the My Health Record System. It is analyzed that by utilizing this approach, the developers can be able to complete the development of entire software system within the specified time. In each of the stage, the various needs as well as requirements of the stakeholders requires to be fulfilled by utilizing the adaptive approach.
References
Ata, N. A., & Perks, M. J. (2014). Using Predictive Analytics to Mature IT Production. In Solving the Dynamic Complexity Dilemma (pp. 221-235). Springer Berlin Heidelberg.
Bellaaj, H., Mdhaffar, A., Jmaiel, M., & Freisleben, B. (2017). An Adaptive Scrum Model for Developing Disease Registries. BIOSTEC 2017, 484.
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), 1587-1611.
Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), 1012-1023
Ladiges, J., Wior, I., Arroyo, E., Fay, A., Haubeck, C., & Lamersdorf, W. (2013, July). Evolution of production facilities and its impact on non-functional requirements. In Industrial Informatics (INDIN), 2013 11th IEEE International Conference on (pp. 224-229). IEEE.
Li, F. L., Horkoff, J., Mylopoulos, J., Guizzardi, R. S., Guizzardi, G., Borgida, A., & Liu, L. (2014, August). Non-functional requirements as qualities, with a spice of ontology. In Requirements Engineering Conference (RE), 2014 IEEE 22nd International (pp. 293-302). IEEE.
Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE transactions on parallel and distributed systems, 24(1), 131-143.
Lötvall, J., Hill, A. F., Hochberg, F., Buzás, E. I., Di Vizio, D., Gardiner, C., ... & Sahoo, S. (2014). Minimal experimental requirements for definition of extracellular vesicles and their functions: a position statement from the International Society for Extracellular Vesicles. Journal of extracellular vesicles, 3.
Moparthi, A. N. R., & Geethanjali, B. D. N. (2016, February). Design and implementation of hybrid phase based ensemble technique for defect discovery using SDLC software metrics. In Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), 2016 2nd International Conference on (pp. 268-274). IEEE.
Nurfatin, N. (2013). Rule based adaptive emotional solving web tutoring (AESWT) for kindergarden school on learning mathematics.
Premchander, R. R. M. (2014). Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cloud Database.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.
Sakul-Ung, P., & Chutimaskul, W. (2017, February). A predictive model for successful software development projects with information technology strategic alignment. In Proceedings of the 6th International Conference on Software and Computer Applications (pp. 39-45). ACM.
Sun, L., & Park, J. (2014). A process-oriented conceptual framework on non-functional requirements. In Requirements Engineering (pp. 1-15). Springer Berlin Heidelberg.
Tetmeyer, A., Hein, D., & Saiedian, H. (2014). A tagging approach to extract security requirements in non-traditional software development processes. International Journal of Secure Software Engineering (IJSSE), 5(4), 31-47.
Wirawan, I. M. A., & Santo Gitakarna, M. (2015). Development of Adaptive Mobile Learning (AML) on Information System Courses. Development, 6(12).
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2022). Non-Functional Requirements In My Health Record System Essay.. Retrieved from https://myassignmenthelp.com/free-samples/comp9110-system-analysis-and-modelling/the-cloud-based-arrangement-file-A83BB7.html.
"Non-Functional Requirements In My Health Record System Essay.." My Assignment Help, 2022, https://myassignmenthelp.com/free-samples/comp9110-system-analysis-and-modelling/the-cloud-based-arrangement-file-A83BB7.html.
My Assignment Help (2022) Non-Functional Requirements In My Health Record System Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/comp9110-system-analysis-and-modelling/the-cloud-based-arrangement-file-A83BB7.html
[Accessed 19 August 2024].
My Assignment Help. 'Non-Functional Requirements In My Health Record System Essay.' (My Assignment Help, 2022) <https://myassignmenthelp.com/free-samples/comp9110-system-analysis-and-modelling/the-cloud-based-arrangement-file-A83BB7.html> accessed 19 August 2024.
My Assignment Help. Non-Functional Requirements In My Health Record System Essay. [Internet]. My Assignment Help. 2022 [cited 19 August 2024]. Available from: https://myassignmenthelp.com/free-samples/comp9110-system-analysis-and-modelling/the-cloud-based-arrangement-file-A83BB7.html.