New Access Project: Cloud-Based Mental Healthcare Platform for Youth

Verified

Added on  2025/05/03

|11
|3066
|369
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
NEW ACCESS PROJECT
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction:
In this brief we are dealing with New Access which is mental health organization which provides
health care and mental support to the people aged between 17-25 and its aim is to target the
young people of 12 and to the Indigenous youth. It deals with the problems which are related to
depression and anxiety. So in this brief we are going to discuss how the New Access is providing
the services to the users by using the cloud based solutions and what are the nonfunctional
requirements for the development of the project, strength and weakness of cloud based solutions
and what are the approaches of SDLC to develop this project and which approach is best for
development of this project.
Non Functional Requirements- Nonfunctional requirements are those requirements that
describe constraints and conditions in which a system can perform. Nonfunctional requirements
have a great impact on the performance of the system as compared to the functional
requirements. Any system will provide the functional requirements but if there is unavailability
of the system anytime a day then the system is useless although it is functionally perfect.
Nonfunctional requirements should be noted down by the New Access before adopting the
services of the cloud because it plays a major role as compared to the functional requirements. If
functional requirements are missed then they can be integrated into the system later on but
missing the nonfunctional requirements can ultimately lead to much more costly networks and
sometimes projects are discarded if these requirements are not met. (Cripps, 2015)
There are many nonfunctional requirements which are required by the New Access to adopt
cloud solutions
Reliability- Reliability is the most important requirement that should be considered by the NEW
ACCESS organization to adopt cloud solutions. Reliability provides us the expectation that how
the cloud service will perform and what will be the functionality of that service under given
conditions. New Access is using the cloud services then they should keep in their mind whether
the use of cloud services will provide services if the network or system fails and whether these
services are reliable or not which means it should tolerate more fault easily and it should react
properly when the situation changes in the network. We know that there is no existence of such a
2
Document Page
cloud which has no failures. There are various failures which are associated with the cloud which
affects the reliability of the cloud service. (Erikkson, 2012)
Overflow: It means when there are more requests which arise frequently and the buffer size of
the queue becomes overloaded then in such situations requests are discarded and the new
requests which are in the waiting queue have to wait for a longer time.
Software failures: Sometimes software fails due to technical problems in the programs which
are running on computing resources.
Database failures- Sometimes database of the systems crashes because of some design issues in
the database so due to this, we cannot access the data which is required for the computing of
resources.
Network failures- These failures arise because the design of the channels of the communication
is not properly designed and when communication channels break down.
Usability- Usability depends on the user who is using the services of the cloud. Users may be
business users, any developers, etc. Usability means the extent to which the services can be used.
It has many outcomes associated with it. It should provide the proper interface for the users to
access the services. It should provide a good interface in satisfying the needs of the user. If New
Access is searching for any information in the cloud that it should be easily available for them
and proper sequences of actions should be there. It should help the user in achieving their goals.
If the user has any goal in accessing the services then the good design must be there in order to
achieve that goal. The interface of the design must be easy so that users can recall them while
they using the same service on the second time. (Cripps, 2015)
Performance- Performance in cloud computing describes how cloud architecture is efficiently
built so that it can support all the workloads and what will be the performance of the services
when more workload occurs. So analyzing the performance of the cloud services is very
important requirements of cloud computing before adopting them. There are some parameters
which are related to the performance of the cloud systems.
Scalability and Elasticity- Scalability and elasticity help in achieving the reduced costs and
getting high performance. Scalability provides the facilities to add and remove more resources in
3
Document Page
the cloud system whenever they want. Elastic balancing of load helps in balancing of the load.
Suppose when New Access is using the cloud services and unfortunately load increases in their
cloud services then cloud system will use more resources in order to balance the load in the
system and if there is less load then fewer resources are used in balancing the load.
Optimization of cost- By using the cloud services new Access will not have to pay more money
for the services because the cloud system is based on the model pay per use. They have to only
pay the number of services which they are using. The cost can be easily optimized as we can add
or remove resources that we want and pay for only those resources which are in use.
Security-Use of cloud services by New Access helps them to protect their data from malicious
attacks. Security requirements are those requirements that make sure that our data is fully
protected from third-party access. Various stages of authentication and authorization are
associated with security. It provides the characteristic of data privacy which tells which people
can see, change and copy the data. It also protects the data from unauthorized attacks and
viruses. System administrator plays an important role in granting the access permissions over the
particular information.
New Access can protect their data present on cloud in the following ways:
Encrypt the data-When you are putting your data into the cloud then you should encrypt your
data. If data is not encrypted then it might be lost or hacked. There are various options available
for encrypting the data on the cloud.
Always perform phase migration-Phase migration means migrating the data into the segments.
Instead of migrating, your whole data you should migrate less important data first and analyze
the results and then put your sensitive data on the cloud. This helps you from the security
problems that may arise in the starting stage.
By using multifactor authentication-Data can be more secure and protected if the providers
provide multifactor authentication to the users such as one time password. By doing it so no
other person can access the information present on the cloud and if someone tries to open your
account then one time password will be sent to your mobile no.
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
By setting secure boundaries- Users are unaware of the boundaries set by the providers. In case
when a user misuses the services then conflicts arise. Access to the advanced functions should be
blocked for the unprofessional users. (Maayan, 2018)
STRENGTH AND WEAKNESS OF CLOUD BASED SOLUTIONS
When New Access organization is adopting the cloud based solution in order to provide services
to the people and give them a platform for care then there can be various advantages and
disadvantages associated while adapting these services. As everything has pros and cons
associated with it. Now let's discuss some strength of the cloud based solutions. (Hein, 2019)
STORAGE CAPACITY OF DATA- One of the most important advantages associated
with the organizations related to health care is data storage. As most of the organizations
like New Access which are related to the health needs a large amount of data to be stored
in their organization and most of the hardware fails to handle it. They had to store their
data on the other side of the organization and beard more cost for the storage and they
also face difficulties in maintaining the servers. By using the cloud services all the
problems are solved these organizations can put all their data at one place in a cloud
because cloud system provides unlimited storage facilities for storing the data on the
cloud. Hence the cost related to the storage is reduced and there is no need for
maintaining the physical servers.
SCALABILITY OF SERVICES- It provides scalability to the organizations where they
can add or remove the resources according to the situations. If New Access feels that
there is more demand in providing the care to the patients and giving them mental
support and if the number of clients increases rapidly then New Access can increase their
storage and they can increase traffic which depends on the needs of the client. Similarly,
they can decrease their storage and traffic when the demand is less. So scalability helps in
providing the scalability to the health care organizations in which they can adjust their
requirement in order to match the need of the client.
COLLABORATION- If the clients are using the same network for the services of the
cloud then an exchange of information between the clients can be done very easily and
quickly. As healthcare organizations such as New Access have to share their information
related to the medical between their clients so it occurs as a big advantage for these
5
Document Page
companies. If anyone wants the data related to their health then data can be shared to
them very easily. Hence by the use of collaboration health care solutions can be
transferred to the many people within no time period. (Burgard, 2017)
MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE- The providers of the
organizations related to the Health care consists of a large amount of data and more time is spent
in dealing the patients to provide the care and mental support. In dealing with a single patient and
guiding them much time is utilized. So nowadays cloud systems are indulged in integrating the
technologies of artificial intelligence and machine learning so that some strain can be reduced in
dealing with the patients. So organizations such as New Access can use these technologies in
dealing with the patients. (Hein, 2019)
There are some weaknesses which are associated with the cloud based solutions which New
Access should be kept in mind before using the cloud based solutions such as:
IMPLEMENTATION: When any organization is switching to the cloud or want cloud
based solutions then there are difficulties like New Access have to move their data on the
cloud from their own premises where the installation is done which results in difficulties
in managing the tasks. If they have adopted these services then it should be kept in mind
that all the users should have the knowledge to use the cloud and how to work on it. If it
is not so then it can harm the business to a great extent and information can be leaked
outside the premises if the data is not managed properly.
SECURITY ISSUES- There can be many security issues which can occur on the cloud
such as:
Multi tenancy-As cloud computing provides sharing of the resources, services,
etc. With the other users which are present on the same platform. So by doing this
multi tenancy is violated. There is a need to protect the multi tenancy and there
should be the location transparency so that there is no information where the data
is present. (Abdollahzadegan, et. al., 2013)
Data Breaches-Data breaches are the most widely occurring security concern in the
cloud in which hackers attack the account of the user's cloud and the information is lost.
Whenever data breaches occur then these organizations are files with some charges and
6
Document Page
actions are taken. There can be serious damage if the information is related to personal
information.
Malicious insiders- There are some insiders that compromise the data of the individuals
and they access the private accounts.
Dos attacks- Denial of service attacks cannot be stopped and only their effect can be
minimized. When these attacks are encountered client is unable to access the data and use
the application.
By Avoiding Lock in- Consumers also have the ownership of their data along with the
rights of the consumers. Sometimes their rights are blocked by the providers and they are
unable to switch to another provider because of the terms and conditions.
CONTROL AND AVAILABILITY- Mostly the cloud based systems face the problem
of unavailability of servers and many times servers don't respond and New Access has to
provide the services of health care at any time so when the server is unavailable then
there will be a negative effect on the organization. These organizations have to wait until
the availability of the server which is a huge drawback in cloud systems. (Subiksha,
2018)
The concept of using cloud based solutions is very exciting but there are many problems
associated with them. They help the patients in getting more and efficient solutions to the
problems. So it is the responsibility of New Access providers and the platforms of cloud to look
into these issues and resolve them whenever they arise.
PROS OF PREDICTIVE SDLC- Predictive SDLC is very easy to approach to follow. The
outputs of the first stage are used as input for the next stages which helps in designing the good
quality of software. Estimates regarding the budget and timeline are predicted using this
approach. Results of the end are already known in advance so in the initial stage budget and
timeline can be planned accordingly. If an error occurs in any stage then it can be easily
identified and corrected. It consists of several stages which are executed one at a time. We can
easily determine the output of every stage as all the stages are connected.
CONS OF PREDICTIVE SDLC- The main drawback of this approach is that in any of the
stages we cannot get a working model of the project until the final stage is reached and until the
final stage is not reached testing can't be performed. If any requirement fails in any of the stages
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
then the process has to be repeated again and all the efforts are wasted. This approach cannot be
used for advance problems and is used only for smaller projects. It is suited for those projects
where the requirements are known in advance. (Satzinger, et. al., 2007)
PROS OF ADAPTIVE SDLC- The main advantage of this approach is that there is more
interaction between the client and the development team at each stage. With the help of
communication between them, changes and modifications can be done at every stage according
to the client needs. This helps in developing trust in the team. The level of transparency is
achieved in this approach as both are working together in the project. The output of every stage
is explained to the client. In this approach, software can be developed before the timeline. By
following this approach the high quality of the product is developed. As testing is done at each
stage so at the end good quality of the product is developed.
CONS OF ADAPTIVE SDLC- The main drawback of this approach is that as the client
interaction is more in this method so much time is wasted in only testing and getting reviews of
the client at every stage. The project usually becomes large as expected at the early stages.
Outputs of the stages cannot be predicted in advance so it is difficult to adjust the cost of the
project. Due to testing in every stage the costs of the projects are increased. So testing of the
project many times can lead to the failure of the project.
Adaptive SDLC is best to approach to be followed by the New Access to develop the cloud
based services because the New Access project is the project which will be used by many people.
In this project, more involvement of user is will be there before and after each stage during the
development of the product and all the relevant information is gathered from the starting till the
end of the project. It can be achieved only by using the Adaptive approach of SDLC. New
Access project is object oriented project and it cannot be achieved by using a predictive SDLC
approach. (Satzinger, et. al., 2007)
Conclusion:
In this brief, we have successfully learned all the aspects which are required by the New Access
to adapt the services of cloud based solutions and what are the nonfunctional requirements
needed for the development of this project. We have also computed the strength and weaknesses
of the cloud which helps New Access in adopting the cloud based solutions. We have also
8
Document Page
learned about the approaches of the SDLC and which approach is best in the development of this
project. Cloud computing is that technology that leaves a good impact on the world and it also
provides various benefits in the business and to the users. These services are very simple to use
and it is very scalable.
9
Document Page
References
Daniel Hein, 2019. 8 Benefits and Risks of Cloud Computing in Healthcare. [Online]
solutionsrevie, Available at: https://solutionsreview.com/cloud-platforms/8-benefits-and-
risks-of-cloud-computing-in-healthcare/ [Accessed on 20 May 2019]
Miriam Subiksha, 2018. Top 5 Security Concerns in Cloud Computing. [Online]
hashedin, Available at: https://hashedin.com/blog/5-security-concerns-in-cloud-
computing/. [Accessed on 20 May 2019] Peter Cripps, 2015. Non-Functional Requirements and the Cloud. [Online]
softwarearchitecturezen, Available at:
https://softwarearchitecturezen.wordpress.com/2015/04/24/non-functional-requirements-
and-the-cloud/ [Accessed on 20 May 2019] David Maayan, 2018. 5 Tips to Ensure a Secure Cloud Migration. [Online]
securityboulevard, Available at: https://securityboulevard.com/2018/10/5-tips-to-ensure-
a-secure-cloud-migration/ [Accessed on 14 May 2019] Satzinger, J.W., Batra, D., & Toppi, H., (2007). Analysis and Design in the IS
Curriculum: Taking it to the Next Level, vol. 20, no. 31, pp. 482-497. Abdollahzadegan, A., Hussin, A.C., Gohary, M.M., & Amini, M., 2013. The
Organizational Critical Success Factors for Adopting Cloud Computing in SMEs, vol. 4,
no. 1, pp.67-74. Eriksson, U., 2012. Functional vs non Functional Requirements. [Online] reqtest,
Available at: https://reqtest.com/requirements-blog/functional-vs-non-functional-
requirements/ [Accessed on 21 May 2019] Mike Burgard, 2017. WHAT ARE THE BENEFITS OF CLOUD COLLABORATION?
[Online] marconet, Available at: https://reqtest.com/requirements-blog/functional-vs-
non-functional-requirements/ [Accessed on 21 May 2019]
10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
11
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]