Software Requirement Specification

1759 Words4 Pages

A patient information system called Mental Health Care-Patient Management System (MHC-PMS) is needed to provide medical information about patients with mental health issues and the treatments that are receiving. The MHC-PMS will be a database in which all clinics can interact with to get patient medical information. A Software Requirement Specification (SRS) will be needed which will include four user requirements and four system requirements. A detail description of four nonfunctional and four functional requirements will be found in the SRS. The last part of the SRS will include a detail requirement specification. According to Sommerville (2011), the SRS is an official statement which system developers use to know what needs to be implemented in a system, (p 91). The SRS provides user requirements and systems requirements on what needs to be included into the system. The users of the new system will be designed for clinical staff which include doctors, nurses, health visitors, medical records staff, receptionists, and administrative staff. One requirement will be for the database to house information on the patient such as patient name, identification number, contact information, emergency contact information if the staff needs to call someone, and different types of medical information. The medical information will be notes from the doctors, prescriptions, test results from blood work and other medical devices. The system will have the ability to attach a photo ID of the patient to make it easier to identify the person. A requirement for the medical staff would be able to have a friendly interface for tablets and small laptops. Today, the use of mobile devices have increased compared to five years ago. Hospitals and clinics... ... middle of paper ... ...ient can unlock it with the smart card. (This security measure would help with preventing unauthorized access to medical data as an extra security with the access controls). 4.4 The system and network shall meet other security requirements passed by laws in state and federal levels such as Computer Fraud and Abuse Act Identity Thief. (NIST also have checklists and standards which can help make a system more secure or for the network to be secure). Works Cited Dean, T. (2010). Network+ Guide to networks. (p. 595). Mason, OH: Cengage Learning. Kim, D. & Solomon, M. (2012). Funamentals of information systems security. (p. 442). Sudbury, MA: Jones & Bartlett Learning. Sommerville, I. (2011). Software Engineering. (p. 91). Boston, MA: Learning Solutions. Whitman, M. & Mattord, H. (2010). Mangement of information security. (p. 339). Boston, MA: Cengage Learning.

Open Document