Description
Task This is the final part of the Tele-Health project. You need to answer these questions within the context of that project. Mobile and cloud based solutions should be investigated. Furthermore, data security also needs to be further investigated, which includes data ownership, data security in the cloud and who has access permission, and to what level of access, etc. You are the business systems analyst assigned to the project, you will need to produce: Non-Functional Requirements This sets out the critical system qualities, system interfaces, user interface requirements, and system constraints. Use to ‘FURPS+’ acronym as reference, and ensure you at cover the non-functional aspects of the acronym, Usability, Reliability, Performance and Security. Review of cloud based solutions A review of strengths and weaknesses of cloud based solutions. Taking into consideration the environment in which the solution would be deployed. SDLC Approach Write brief description of the Pros and Cons to approaching the project using the ‘Predictive’ SDLC, then the Pros and Cons to approach the project as ‘Adaptive’ SDLC. Then recommend either Predictive or Adaptive to the SDLC for the project and briefly describe why. Submission Method: Turnitin Rationale This assignment is intended to develop and test your ability to research information systems relevant issues, as well as develop requirement information. Also to consider the appropriate approach depending on the criteria of the information system solution.
Explanation & Answer
Hello, here you go. In case of any edits or questions, please let me know.I appreciate working with you.All the best.
Running head: TELE-HEALTH PROJECT
1
Tele-Health Project
Name
Course
Tutor
Date
TELE-HEALTH PROJECT
2
Cloud computing
Introduction
The mobility in many enterprises is exploding very fast with the evolution and revolution
of the IT industry. Mobile systems are digesting given data at an alarming speed hence means
should be devised on how the security of the data that has been got can be safely be protected.
The implementation of cloud services will go a long way in ensuring that the data that has been
provided to its system is safe and free from attack from unauthorized personnel (FernándezCardeñosa et al. 2012). The implementation process will fast involve providing an excellent list
of the tasks that is required and the length of time that is required when taking the service to be
in use. Many health centers have started knowing the importance of using cloud computing
services because the data that is stored off the patients who have been admitted to the hospital
would be lost quickly or would be accessed by people who are not among the authorities of the
premise.
The non-functional requirements
Usability
When one wants to achieve a given goal, usability is applied in many parts of the system
are well fed to the computer to make sure that the demand that is required has been satisfied and
is efficient (Chung et al. 2012). The context should always have charismatics such as
effectiveness, efficiency and the ability to calm down the requirements which they are supposed
to perform. The data that is displayed and then finally fed to the computer should have a logic
procedure enabling it not to lose the required information about the customers.
TELE-HEALTH PROJECT
3
Reliability
The services that are offered by the cloud technology should always have the capacity of
giving the intended consumers an opportunity to change the general look of the system. Also, it
should also coordinate well with the one who is using it to customize the functionality that is
given by the services intended to suit the needs of the whole system (Fernández-Cardeñosa et al.
2012). The use of the acronym is very much reliable because it does not allow anyone to
personalize th...