Consider the following Australian MHR (My Health Record System)
scenario:
The MHR system is a new initiative in Australia to put all
the patients’ records (e.g., demographic data, daily medical
records, previous medical information, diagnosis data, insurance
information, and so on) into one place.
The MHR is a software system that will allow different
parties to communicate securely and provide reliable services to
patients.
For exploratory purpose, a core MHR system is built which
keeps and maintains data and information about the patients,
doctors, nurses, specialists, medical receptionists, and so on.
The MHR system controls our health information securely in one
place. It is really our choice – we can keep our MHR with basic
information, or we can allow more information to MHR users or
permanently delete the record. A MHR user is an individual who has
right to use patients’ health information. For example, A Doctor
can do the following actions through MHR system: Login to the
system, Access patients’ health information, Write prescription,
Recommend patient to the specialists. The MHR system also gives our
pharmacists a clearer picture of our health
information.
A receptionist is responsible to enter the information of a
patient. The information
about a patient includes their name, address, date-of-birth,
contact number, and food
preference.
•A doctor can issue a prescription if the patient asks for
one. A doctor also can recommend the patient to medical
specialists. A doctor can access a patient’s medical records that
are stored into the MHR database.
• In your answer, you can make other assumptions, according
to the relevant
interactions between the MHR system and different actors.
However, you should
clearly state them.
The following use cases may be identified, which analyse the MHR
system’srequirements.
Login to the system
Add a patient
Ask a patient to provide postal address
Access patients’ health information
Write prescription
Recommend patient to the specialists
Display patient demographic records
Display patient medical records
etc.
Based on the above-presented MHR scenario, you can
demonstrate different processes by showing the actions and the
flows among the actions (use activity diagrams to demonstrate the
processes). Firstly, consider the description of the processes from
the MHR scenario (e.g., ‘to issue a business order’ can be a
process for a business application scenario) and identify different
actions for that process (e.g., ‘receive order’ and ‘close order’
are two actions for the process named ‘to issue a business order’).
Finally, draw one or more activity diagrams for those two processes
using the following symbols (action, flow, decision point, merge
point, fork point, join point and so on). You can use different
symbols based on your need.
You also can draw malicious activity diagrams (MADs or mal-activity diagrams) covering security flaws of the processes. Firstly, you have to identify the relevant malicious actions by thinking a hacker’s activities (e.g., ‘send an email with malware’ is a malicious action), then draw your MADs. For example, you can draw an activity diagram for a process named ‘login to the MHR system’; you can draw a MAD diagram – ‘how a hacker can receive login credentials’? You can attach your MAD parts along with your activity diagrams.
Please attempt the following three activities. Activity (1): –
30 marks
Identify two processes from the above-mentioned MHR scenario
– 4 marks
Write simple descriptions for those processes – 4 marks
Identify relevant actions for those processes – 4 marks
Identify malicious actions against those actions – 4 marks
Draw activity diagrams along with malicious activities – 10
marks
Different users can interact using MHR system and do
different actions – you can use
activity diagrams to demonstrate such actions. Identify how a
hacker could potentially
Sample Solution












Other samples, services and questions:
When you use PaperHelp, you save one valuable — TIME
You can spend it for more important things than paper writing.