Abstract
This paper outlines, utilises and reflects upon effective software design and development through effectively applying current practical solutions such as use case modelling, class and sequence diagrams and by developing a prototype program which reflects the designs from said diagrams. A discussion is presented regarding the best method of approaching the Software Development Life Cycle (SDLC), justifying the selection and also concluding with a reflection on the professional, ethical and security issues in relation to the proposed design and use of software within the healthcare sector. In regards to ethical considerations, the Code of Ethics was discussed in relation to the design and development of the system and the importance of it alongside ensuring a high level of ethics and professionalism is of utmost priority when handling personal identifiable information in the development of a system. As well as this, security issues during and post development is an area of significant importance when it comes to data management, this has been discussed in general and against the software development life cycle. Additionally, in the design and development of software it is crucial to abide by world software quality standards such as International Organisation for Standardisation (ISO), and this paper reflects upon current issues and how to address these in the process of design and development.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kendall, K., Kendall, J.: Systems Analysis and Design, 10th edn., pp. 1–576. Pearson Education Limited, Harlow (2019)
Bruegge, B., Dutoit, A.: Object-Oriented Software Engineering Using UML, Patterns, and Java, 1st edn., pp. 11–40. Pearson Education Limited, Harlow (2014)
Satzinger, J., Jackson, R., Burd, S.: Systems Analysis and Design in a Changing World, 1st edn., pp. 171–200. Cengage Learning EMEA, Andover (2008)
Sommerville, I.: Software Engineering, Global Edition, 10th edn., pp. 119–140. Pearson Education Limited, Noida (2016)
Cockburn, A.: Writing Effective Use Cases, 1st edn., pp. 1–259. Addison-Wesley, London (2006)
Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software, 1st edn. Addison-Wesley, Massachusetts (1994)
Sharma, P., Singh, D.: Comparative study of various SDLC models on different parameters. Int. J. Eng. Res. 4(4), 188–191 (2015)
Aljawarneh, S., Alawneh, A., Jaradat, R.: Cloud security engineering: early stages of SDLC. Future Gener. Comput. Syst. 74, 385–392 (2017)
Andry, J.: Purchase order information system using feature driven development methodology. Int. J. Adv. Trends Comput. Sci. Eng. 9(2), 1107–1112 (2020)
Rauf, A., AlGhafees, M.: Gap analysis between state of practice and state of art practices in agile software development. In: 2015 Agile Conference (AGILE), National Harbor, MD, USA, pp. 102–106. IEEE (2015)
Azman, N.: The development of IoT tele-insomnia framework to monitor sleep disorder. Int. J. Adv. Trends Comput. Sci. Eng. 8(6), 2831–2839 (2019)
Schuh, G., Rebentisch, E., Riesener, M., Diels, F., Dolle, C., Eich, S.: Agile-waterfall hybrid product development in the manufacturing industry–introducing guidelines for implementation of parallel use of the two models. In: 2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), pp. 725–729. IEEE, Singapore (2017)
Abdelghany, A., Darwish, N., Hefni, H.: An agile methodology for ontology development. Int. J. Intell. Eng. Syst. 12(2), 170–181 (2019)
Aydemir, F., Dalpiaz, F.: A roadmap for ethics–aware software engineering. In: Proceedings of the International Workshop on Software Fairness, pp. 15–21. Association for Computing Machinery, New York (2018)
Zarour, M., Alenezi, M., Alsarayrah, K.: Software security specifications and design. In: Proceedings of the Evaluation and Assessment in Software Engineering, pp. 451–456. Association for Computing Machinery, New York (2020)
Aljawarneh, S., Yassein, M.: A conceptual security framework for cloud computing issues. Cyber Secur. Threats 12(2), 12–24 (2018)
TCSEC - Glossary | CSRC. https://csrc.nist.gov/glossary/term/TCSEC. Accessed 02 Jan 2021
Sterne, D.: On the buzzword ‘security policy’. In: Proceedings of IIEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, pp. 219–230. IEEE (1991)
ISO/IEC 9126-1:2001. https://www.iso.org/standard/22749.html. Accessed 06 Jan 2021
Merritt, K., Zhao, S.: An investigation of what factors determine the way in which customer satisfaction is increased through omni-channel marketing in retail. Admin. Sci. 10(4), 01–24 (2020)
Merritt, K., Zhao, S.: An innovative reflection based on critically applying UX design principles. J. Open Innov. Technol. Mark. Complex. 7(2), 1–12 (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
Appendix A
Appendix B
Appendix C
Rights and permissions
Copyright information
© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Merritt, K., Zhao, S. (2022). Software Design and Development of an Appointment Booking System: A Design Study. In: Ur Rehman, M., Zoha, A. (eds) Body Area Networks. Smart IoT and Big Data for Intelligent Health Management. BODYNETS 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 420. Springer, Cham. https://doi.org/10.1007/978-3-030-95593-9_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-95593-9_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-95592-2
Online ISBN: 978-3-030-95593-9
eBook Packages: Computer ScienceComputer Science (R0)