Non Functional Requirements
Headspace is a popular health organization in New South Wales that treat people with mental illness. This is the type of information system, which can eventually store the various details about young individuals, between the age group of 18 and 25 (Botta et al., 2016). All of these patients are continuously asked regarding the mental issues they are facing. Thus, they are highly disturbed with this type of continuous interaction with the health experts, doctors and nurses.
The project of New Access would be providing a distinct information system, which can store the stories when they are narrated for the first time. The patients as well as the various doctors, health experts and nurses will be highly benefitted from this type of information system (Herbst, Kounev & Reussner, 2013). The treatment will be extremely easier for all the health experts and even the data is updated properly. This report will be describing the project of New Access and their non functional requirements of FURPS. Moreover, a proper cloud based solution will also be provided here and the most suitable SDLC approach will be recommended in the report.
Discussion
1. Non Functional Requirements
The various respective non functional requirements are responsible for helping to accurately and perfectly identify all types of important and noteworthy qualities in an information system (Hashizume et al., 2013). One of these non functional requirements is FURPS or functionality, usability, reliability, performance and security. System operation is judged by these requirements. The details for New Access project are provided below:
1.1 Functionality
It is the major non functional requirement in New Access project of Headspace organization. This particular project would provide the most updated and up graded information regarding the mental health of the young patients. This system would stop them from discussing their issues repeatedly to the doctors. Furthermore, data accessibility and up gradation is much more easier with the proper implementation of New Access in Headspace. Adaptability is the significant feature in New Access system.
1.2 Usability
It is another non functional requirement that depicts about the overall usability of the New Access project. This effectiveness and efficiency of the project is properly maintained with this (Botta et al., 2014). The proper uses of the project for the betterment of Headspace organization are the major features of this usability. The ability of learning is also enhanced by this. A completely user friendly infrastructure and interface is yet another significant usability feature.
1.3 Reliability
This reliability is checked in New Access project in the organization of Headspace and it is a major non functional requirement. Only accurate and reliable data are updated within the system and also the health professionals solve the other issues of the patients with much security. Data management is also done from reliable sources in this system.
1.4 Performance
The overall performance of the New Access project in the Headspace organization is being checked after confirming that the data is genuine here. This type of data accuracy hence provides good performance (Gupta, Seetharaman & Raj, 2013). Providing emergency services is another measure for performance in New Access. The total response time is much lesser here.
Cloud Solutions: Use of Several Types of Clouds
1.5 Security
Data security is the final non functional requirement of the project of New Access in the Headspace organization. There are three major features of the New Access project, which are scalability, testability and configurability (O’Driscoll, Daugelaite & Sleator, 2013). These three distinct features ensure thee flexibility, scalability and testability of the project. Moreover, the applications could be easily configured and hence the non functional requirement is extremely efficient as well as effective for this particular project in Headspace.
2. Cloud Solutions: Use of Several Types of Clouds
Cloud computing is termed as one of the major as well as the most efficient technique that is eventually utilized for the core purpose of data transfer through the connection of Internet (Chen et al., 2016). The speed of data transfer is extremely high. The three cloud solutions for New Access project are provided below:
- i) Public Cloud: This type of cloud is responsible for providing data access in a public network or without having any type of restriction. The security of public cloud is not at all effective since the architecture is not strong.
- ii) Private Cloud: Private cloud is considered as one of the most safe and secured cloud deployment model, which allows data access in private groups and securely (Sadiku, Musa & Momoh, 2014).
iii) Hybrid Cloud: The proper amalgamation of private and public clouds is together termed as the hybrid cloud. It gets advantages of both the cloud services.
The best cloud solution for New Access project is the hybrid cloud. Since, all the advantages of public and private clouds are present here, it is recommended for Headspace (Whaiduzzaman et al., 2014).
2.1 Strengths of Hybrid Cloud
The advantages of hybrid cloud are as follows:
- i) Lesser Time Consumption: The total time consumption for data transfer is quite less and thus it is quite popular for the users (Avram, 2014).
- ii) Better Flexibility: Hybrid cloud is extremely scalable and flexible and thus is quite effective for all.
- 2.2 Weaknesses of Hybrid Cloud
The disadvantages of hybrid cloud are as follows:
- i) Quite Expensive: This hybrid cloud is quite costly and hence it is not being afforded by all users (Suo et al., 2013).
- ii) Weaker Networks: Another disadvantage of the hybrid cloud is that it never provides strong networks for the users.
SDLC Approach
SDLC approach or the software development life cycle approach is considered as one of the major and the most significant approaches in any project. This specific approach is being utilized within each and every information system, software and system engineering for the core purpose of describing the entire process of project planning, project creating, project testing and then project deployment of the information system or IS (Wei et al., 2014). This project deployment is done for Headspace organization. The overall effectiveness and efficiency are extremely high and better for each and every project.
The two significant approaches of the software development life cycle that could be taken into consideration for the project of New Access in Headspace organization are termed as predictive approach and adaptive approach.
This is the first and the foremost approach of the software development life cycle in this specific medical project of the New Access in Headspace organization. The entire life cycle of any particular project is properly monitored by undertaking the predictive approach (Xia et al., 2016). This predictive SDLC approach is only applied when the project schedule is properly definite as well as clear. The most significant advantages and disadvantages of the predictive SDLC approach are provided below:
Pros:
- i) Accurate Project Plan: The first as well as the most important and significant advantage of tis predictive approach is that it provides a proper and accurate project plan to the project team members.
- ii) Clear Scope and Schedule: The overall project scope and schedule are absolutely clear and proper and hence the users do not face any issue due to this.
iii) Proper Tracking of Project: The entire progress of the project is eventually tracked periodically and thus popularity is maintained.
Cons:
- i) No Alteration in Project Plan: The first and the most significant disadvantage of this particular predictive approach is that it allows no alteration within the respective project plan (Suo et al., 2013). Thus, changes are not possible.
- ii) No Consideration of Clients’ Feedbacks: The clients’ feedbacks could not be considered at any circumstances by the project manager and hence the clients are often dissatisfied with the overall results.
3.2 Adaptive SDLC Approach
The second popular and important approach of the software development life cycle in this typical medical project of New Access in Headspace is the adaptive approach. Within the adaptive approach, the plan of project is not made before the respective project initiation (O’Driscoll, Daugelaite & Sleator, 2013). The several project deliverables are subsequently provided in each and every phase and this makes the project execution quite easier. The most significant advantages and disadvantages of the adaptive SDLC approach are provided below:
SDLC Approach
Pros:
- i) Allows Modifications: Adaptive approach has the major advantage of allowing subsequent modifications in all phases of any specific project.
- ii) Considers Clients’ Feedbacks: The next important and significant advantage of this particular adaptive approach is that all the feedbacks of clients are considered here.
Cons:
- i) Extremely Expensive: The first and the foremost demerit of this adaptive approach is that the overall costs are quite high in respect to all other approaches and hence it becomes quite problematic to afford this approach (Arora, Parashar & Transforming, 2013).
- ii) Unclear Project Scope: The respective project scope as well as project schedule for this particular approach of adaptive is absolutely unclear and hence the project is not being understood by all.
3.3 Recommended SDLC Approach
New Access project is introduced by Headspace Company to treat the youth individuals, those who have mental illness easily and promptly. These patients are continuously asked about their illness by the health professionals and they are uncomfortable in sharing these details. New Access project is will be mitigating all of these issues and for this deployment, predictive software development life cycle will be the best and would provide better efficiency and effectiveness to them. The main reason for this is that predictive approach provides better project planning and the implementation costs are quite less.
Conclusion
Therefore, conclusion is drawn from the report that this New Access project was introduced by Headspace organization. The proper improvisation of the management of data would also be done with this particular project. All the young individuals, who have the age between 18 and 25 years and are suffering from mental illness will be having benefits from this specific information system. These young patients are asked several questions about their illness and problems again and again and hence they often feel uncomfortable due to this.
Moreover, the doctors also ask questions to their parents or family members and even they are unable to communicate with the patients. To solve these significant issues of the mental patients, New Access project is being launched for the organization of Headspace. The report has eventually explained the several non functional requirement of FURPS or the functionality, usability, reliability, performance and security to this New Access project for the organization of Headspace. The cloud based solutions are also important for this project and a proper cloud based solution is selected after considering the several strengths and weaknesses. This report has even provided a recommendation of the software development life cycle approach after analysing predictive and adaptive approaches.
References
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), 1922-1926.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, 529-534.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2014, August). On the integration of cloud computing and internet of things. In Future internet of things and cloud (FiCloud), 2014 international conference on (pp. 23-30). IEEE.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Chen, X., Jiao, L., Li, W., & Fu, X. (2016). Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Transactions on Networking, (5), 2795-2808.
Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing by small and medium businesses. International Journal of Information Management, 33(5), 861-874.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of internet services and applications, 4(1), 5.
Herbst, N. R., Kounev, S., & Reussner, R. H. (2013, June). Elasticity in Cloud Computing: What It Is, and What It Is Not. In ICAC (Vol. 13, pp. 23-27).
O’Driscoll, A., Daugelaite, J., & Sleator, R. D. (2013). ‘Big data’, Hadoop and cloud computing in genomics. Journal of biomedical informatics, 46(5), 774-781.
Sadiku, M. N., Musa, S. M., & Momoh, O. D. (2014). Cloud computing: opportunities and challenges. IEEE tentials, 33(1), 34-36.
Suo, H., Liu, Z., Wan, J., & Zhou, K. (2013, July). Security and privacy in mobile cloud computing. In Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International (pp. 655-659). IEEE.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371-386.
Whaiduzzaman, M., Sookhak, M., Gani, A., & Buyya, R. (2014). A survey on vehicular cloud computing. Journal of Network and Computer Applications, 40, 325-344.
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594-2608.