Headspace faced with the problem where a mental health patient needs to retell a story every time they visit a different medical professional. Patients tend to get clammed up and get bored telling the same story very time. As such Headspace needs a system that keeps track of the patient’s medical record every time he/she visits a medical professional. This system will solve the problem of having the patient retell the story and can get better assistance because the medical practitioner can be able to see the previous medical records and history of the patient.
The NewAccess system will function like a typical Electronic Health Record system. According to Rey (2015) adopting such a system will have the following key capabilities:
Fein (2014), argues that an electronic medical record system will help provide better health care for the mental patients by:
Stakeholders map with 4 quadrants.
Internal Operation |
1. Patients 2. Doctors 3. Health care staff 4. Trustees 5. Health service providers |
External Operation |
1. Society 2. Local Authority 3. Equipment Suppliers 4. Funding contributors 5. Government bodies |
External-Executive |
1. Sponsors 2. Clinical Professionals 3. Shareholders 4. Health Insurance 5. Health care social workers |
Internal-Executive |
1. Board of management 2. Hospital Administrators 3. Directors 4. Application development manager |
Patients- their interest is to get services provided by the system.
Doctors- they will get an environment to serve patients better by getting real time, accurate, and up-to-date information about the patient.
Health care staff- get paid for the services and medication given to patients
Health service providers- get the platform to promote their products and services to a wider customer base.
Trustees- better serve the country with the NewAccess platform
Society- society can be engaged to promote their work using the platform.
Local Authority- can join the team to bring more help to further the benefits of the system
Equipment Suppliers-get paid digitally by supplying the various equipment needed by Headspace.
Funding Contributor- funds the project and thus success of the project lies on them.
Government bodies- plays a major role by funding the project and regulating the use of the system by passing laws and policies.
Board of management- they decides on the project status based on the benefits it brings to the institution.
Hospital Administrators- maintain and control clinical work using the system.
Directors- manage project funds.
Application development manager- this the person that will see the development of the system and get paid.
Sponsors- funds the project and aids in affairs related to money
Clinical Professionals- get paid for professional opinions, recommendations, and prescriptions given.
Shareholders- share profit generated by the system.
Health Insurance- provide insurance covers for the patients associated with NewAccess.
Health care social workers- send volunteers to attend various conferences that are held because of the system.
Stakeholder identification
This questionnaire will be developed for patients as they are the key beneficiaries of the system being developed.
Questionnaire has been used in this case so as to determine areas of improvement base on the patient feedback on the usability of the system. Their feedback I very important because they determine if the system will be accepted or rejected.
Headspace is carrying out a research to find about the new information system. We would like to get your opinions and suggestions on how to improve the system. This will help the development team to better imporve the system to meet your requiremnets. This questionnaire will take about 15 minutes of your time. We value your feedback
Admin- the admin is responsible for the security and overall management of the online portal from data loss and unauthorized access. Admin has the rights to update, modify, and control access to information system database.
Patient- can register and sign in to the information system. Once they are logged in, they have the rights to control access to information and can share it with medical professional to get better medical attention and prescriptions.
Professionals- they can access patient information once the patient shares information with them. They can also share information with other professionals for recommendations and guidance to provide the best prescriptions to the patient.
Hospital- the hospital can sign-up, sign-in, and add or update information regarding the hospital on the system. Additionally, they can add patient records and information so that the information can be accessed easily by authorized users.
NewAccess system is an online medical record system that provide patient information to the patients and professionals for better service delivery and medical prescriptions and recommendations. The system is made up of four main actors: Admin, patients, hospital, and professionals. The system allows medical professionals to sign up, sign in, and access patient records shared to them. Additionally, the system gives the professionals the ability to share the information they have about a patient with other professionals to seek professional opinion about a particular medical case and provide better medical services and prescriptions. The professional will then update the patient information on the system.
The cloud is still advancing, as such, the struggle for efficient management over protection of cloud data is also developing. There are inadequate cloud security solutions as compared to those for protecting physical machines in a traditional infrastructure (Debbarma, Debbarma, Chakma & Patra, 2011). Although the expense of instantiating virtual security cloud devices is lower, the technology is still developing. Many current operations in embracing the public cloud is in the early adopters’ area. It is challenging to confirm if any processing or information is being used in breach of legal compliance or agreements. An effort referred to as FedRAMP (Federal Risk and Authorization Management) has been initiated, which is aligned toward allowing the whole process of ascertaining cloud instances are suitable for applications by individual agency.
There are two institutions that are fiercely in pursuance of the enhancement of security controls and data improvement. They include cloud computing interoperability forum and cloud security alliance. Jericho Forum is another group that has addressed the issue from various perspective, notably that de-perimeterization has already occurred as a result of different services that penetrate infrastructure perimeter largely by penetrating through firewalls to offer access to vital services. One problem with many certifications is that they are concentrated more on process and facility than on emerging de-perimeterized service-oriented world. Another problem is that several systems that are currently being used have virtualized servers operating on them. If these servers have contradicting requirements of security, there exist an issue in practice. Most of the cloud computing security problems are neither challenging to solve nor unique to the cloud-computing model. The cloud model presents a unique chance to acquire better security.
The application should have the capability of scaling up to 500 simultaneous users by installing extra hardware elements.
Organizations can achieve many benefits from cloud computing. Nevertheless, there are also some drawbacks.
It is cheap because the organization do not need to buy or install infrastructure. All organizations exist to make money while maintaining operational and capital costs to a minimum. With cloud computing, a significant capital expenses are saved with zero application requirements and in-house server storage (Linthicum, 2018).
It is reliable and stable compared to in-house infrastructure. Many cloud computing providers provide 24/7 and 99.99 availability system availability.
It is easy to manage because it offers simplified and improved IT maintenance and management capabilities through central administration.
Downtime: since cloud service providers attend to many customers, they can become overwhelmed and even face technical failure. As a result, business process can be suspended temporary.
Security: storing essential files and data on external service providers present risks (Januzaj, Ajdari & Selimi, 2015).
SDLC is the step by step process of designing, developing and testing a software application (Srivyshnavi, 2013). It is aimed at coming up with a quality product within estimated budget and timeline. Two different SDLC methodologies exist, namely, predictive and adaptive methodologies.
Predictive SDLC follows pre-defined and continuous specific development plan of a software to provide outcome within a particular timeline.
Adaptive methodology, on the other hand, is effected mainly when the information system at hand consist of unspecified and unknown results.
It is simple to follow and easy to understand because of the specified phase and steps taken from initiation to adoption/deployment. Secondly, it is easier and faster for system developers to create a quality product within specified budget and time (Srivyshnavi, 2013). Thirdly, it is easier to project the timelines and budget of the project using predictive SDLC since the outcome is already know.
According to Holcombe (2010), using predictive SDLC approaches make it rare to have project overruns, therefore, facilitating development of high quality product. Additionally, it is easy to manage predictive SDLC approaches because every phase has a particular deliverable and timeline. Project manager can use these two aspects to measure and monitor project progress according to Mohammed (2015)
One major setback of this approach is that there is no working prototype until the last development stages. Secondly, review and testing of the software is done after the development process is finished which may render the whole development process useless if some functionalities were not captured. This leads to wastage of money, time, and human resource. Predictive SDLC only applies to small projects and cannot be used in object oriented projects that are complex states Beyer (2010).
The recommended approach is SDLC. This is because NewAccess is a project that will be used by several actors making it complex and cannot be done using predictive SDLC. Adaptive methodology allows the development team to develop the system in modules and testing them during and after every phase of development Ed (2013). This ensures that the correct system is developed. One of the important aspect of NewAccess project is the completeness of the user requirements and this can only be achieved by employing the use of adaptive SDLC because it allows for iterative collection of requirements during development. This makes sure that all the requirements have been satisfied by the system.
Conclusion
Information system development require in-depth research of the system requirements, user expectations, and infrastructure needed to run the system. It is important to clearly state the problem and break it down further to identify the specific problem facing the institution. This ensures that every detail of the problem is provided for in the final product solution. Also the approach used to develop the system matters greatly as the approach used will determine the overall quality of the system. NewAccess is a complex object-oriented system and requires adaptive SDLC approach in order to meet all the set requirements.
References
Arora, P., & Bhatia, R. (2018). Agent-Based Regression Test Case Generation using Class Diagram, Use cases and Activity Diagram. Procedia Computer Science, 125, 747-753. doi: 10.1016/j.procs.2017.12.096
Beyer, H. (2010). User-centered agile methods. [San Rafael, Calif.]: Morgan & Claypool Publishers.
Debbarma, S., Debbarma, N., Chakma, K., & Patra, B. (2011). Vision in IT from Cloud Computing. International Journal Of Computer And Electrical Engineering, 840-844. doi: 10.7763/ijcee.2011.v3.429
Ed, K. (2013). Agile methodology for developing & measuring learning. [Place of publication not identified]: Authorhouse.
Fein, R. (2014). Genomic data and the electronic health record (EHR). Applied & Translational Genomics, 3(4), 130-131. doi: 10.1016/j.atg.2014.09.007
Holcombe, W. (2010). Running an agile software development project. Hoboken, N.J.: Wiley.
Januzaj, Y., Ajdari, J., & Selimi, B. (2015). DBMS as a Cloud service: Advantages and Disadvantages. Procedia – Social And Behavioral Sciences, 195, 1851-1859. doi: 10.1016/j.sbspro.2015.06.412
Laskowski, J. (2011). Agile IT security implementation methodology. Birmingham: Packt Pub.
Linthicum, D. (2018). Approaching Cloud Computing Performance. IEEE Cloud Computing, 5(2), 33-36. doi: 10.1109/mcc.2018.022171665
Mohammed, N. (2015). Exploring software security approaches and their limitations in SDLC.
Rey, K. (2015). Electronic Health Record Adoption. SSRN Electronic Journal. doi: 10.2139/ssrn.2567073
Srivyshnavi, P. (2013). Modeling For Software Quality Assurance. Saarbrücken: LAP LAMBERT Academic Publishing.
Vohra, R. & Krishnamurthi, L. (2012). Principles of Pricing. Cambridge: Cambridge University Press.
Wear, N. (2013). Sunshine on Secure Software. Cork: BookBaby.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download