Assignment title: Computer Science


Mobile and cloud based solutions should be investigated. Furthermore, data security also needs to be further investigated, which includes data ownership (by headspace, the young person, the ED, etc), data security in the cloud and who has access permission, and to what level of access, etc. Outputs should include the following: Review of mobile and cloud based. A review of strengths and weaknesses of mobile and cloud based solutions. Taking into consideration the environment which the solution would be deployed. Non-Functional Requirements – a System Wide Requirement Specification. This sets out the critical system qualities, system interfaces, user interface requirements, and system constraints. Project risk management Provide brief description of risk and options or plan that can put in place in the event that the risk occurs.