A patient information system called the Mental Health Care-Patient Management System (MHC-PMS) is required to provide medical information about patients with mental health problems and the treatments they are receiving. The MHC-PMS will be a database that all clinics can interact with to obtain medical information about patients. You will need a Software Requirements Specification (SRS) that will include four user requirements and four system requirements. A detailed description of four non-functional requirements and four functional requirements will be found in the SRS. The last part of the SRS will include a detailed specification of the requirements. According to Sommerville (2011), the SRS is an official statement that system developers use to know what needs to be implemented in a system (p 91). The SRS provides user requirements and system requirements on what needs to be included in the system. Users of the new system will be designed for clinical staff including doctors, nurses, health visitors, medical records staff, receptionists and administrative staff. One requirement will be that the database contains patient information such as the patient's name, identification number, contact information, emergency contact information if staff needs to call someone, and several types of medical information. Medical information will include doctors' notes, prescriptions, blood test results, and other medical devices. The system will have the ability to attach a photo ID of the patient to facilitate identification of the person. A requirement for medical staff would be to have an intuitive interface for tablets and small laptops. Today, mobile device usage has increased compared to five years ago. Hospitals and clinics...half of the card...user can unlock it with smart card. (This security measure would help prevent unauthorized access to medical data as additional security with access controls.)4.4 The system and network must meet other security requirements approved by state and federal laws such as Computer Fraud and Abuse Act Identity Thief. (NIST also has checklists and standards that can help make a system more secure or help secure your network.) Works Cited Dean, T. (2010). Network+ Guide to networks. (p. 595). Mason, OH: Cengage Learning.Kim, D. & Solomon, M. (2012). Fundamentals of information systems security. (p. 442). Sudbury, MA: Jones & Bartlett Learning.Sommerville, I. (2011). Software engineering. (p. 91). Boston, MA: Learning Solutions. Whitman, M. & Mattord, H. (2010). Information security management. (p. 339). Boston, MA: Cengage Learning.
tags