Design And Implementation Of An Online Pharmacy System

Use Case Diagrams and Class Diagrams

In this paper we are going to focus on the online web application developed for the pharmacy company named as “ChemExec”. The inefficiency of the traditional working system is resolved with the deployment of web application in the working curriculum of the organization. The web application provides the customer to book their medicine online. The medicine will be delivered at the door step of the user. The user has to create his login ID by providing his profile details. The user can login their account for ordering of the medicine, checking availability of the medicine, checking delivery time of the medicine, checking status of the placed order, and many more.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Use case Diagram 2:

Use case diagram2:

Class Diagram 2

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Sequence Diagram 1:

Sequence Diagram 2:

The deployment of the web application in the working culture of the pharmacy system changes the complete scenario of the company. The new system is convenient for the following reason:

  • The patients can remain updated with the availability of the medicine.
  • The quality of the product can be measured.
  • Consolidation in revenue driving
  • Use of different payment models
  • Providing medicine at minimum cost
  • Innovation in information technology
  • Managing communication between stakeholders.

The web application of the pharmacy system is convenient for facilitating communication between different participating unit. It provides the facility of buying medicine without leaving the patient for a single moment. The medicine will be provided to the door step of the user. The availability of the medicine is the major attractive point for the company’s growth with the use of wen application. The deployment of the application provides significant benefit to the user such as unique shopping experience, availability of medicine, interactive design, easy to handle and use, explores communication, and others. It is beneficial for partners and sponsors because it is capable of attracting new customer towards the organization which results in optimizing the profit of the organization. It is convenient for developing good and healthy relationship with suppliers and customers. The global distribution of medicine can be possible with the use of online portal for providing pharmacy services. The analysis of the market evaluates that the use of ICT helps in changing the working curriculum of the organization. The new web application for the pharmacy organization was deployed with the aim that the system will be equipped with limited risks factors. The inefficiency of the traditional working system is resolved with the deployment of web application in the working curriculum of the organization. The complexity of the traditional system should be resolved with the designing of the new system. The new system should be capable enough to provide benefits to the customers, suppliers, sponsors, and the owner of the organization.

Database Schema in 3NF

The security is the major concern of owner of ChemExem. The security policies and guidelines should be used for developing the secured system to accustom the online ordering of medicine without any fear of leakage of confidential information related to credit card details. The purpose of the security scheme is to overcome the risks associated in the sector of finance, cultural social, environmental, and technical. The following steps should be followed for making the system secure of vulnerabilities which can occur with the implementation on the internet:

  • The authorization and authentication should be provided to the user of the system in the form of login credentials.
  • The access right of the system should be given on identifying permission taken by the user.
  • The login transaction helps in keeping track of the user
  • The system should be capable enough to tolerate the vulnerabilities and virus attack on the system.
  • The data protection should be given on the occurrence of the intruder
  • Pattern identification mechanism should be used for providing security to the newly designed system
  • Identification of the security packages.
  • The privacy and control mechanism should be used for providing better security standards
  • Training and development program should be arranged to overcome the problem of data leakage
  • Monitoring of the system should be done on the regular basis
  • Backup of the data should be managed periodically

The following table shows the details of threat associated with the deployment of online pharmacy website:

Threats

Description

SQL injection

The SQL metacharacter can be inserted into the backend database. The vulnerability can be determined with the error message shown on the portal.

Manipulation of the price

The price of the medicine should be updated according to the change in price in the market. The attacker can modify the price of the product

Overflows of the buffer

Denial of service attack result into the buffer overflow vulnerabilities.

Cross site scripting

It is majorly affected by limitation in the validation related to the input and output associated with the system

Weak Authorization and authentication

The password of the user are hacked by the hackers

Threats of malicious code

The malicious code can affect the working of user system

Man in the middle attack

The hacker hacked the confidential information of the user during payment

The new web application for the pharmacy organization was deployed with the aim that the system will be equipped with limited risks factors. The matrix should be developed for managing the risks associated with the development of the new system. The risk management plan focuses on identification of the risks associated with the newly designed web application, analysis of the identified risks, and development of the risks mitigation plan. The purpose of the risk management scheme is to overcome the risks associated in the sector of finance, cultural social, environmental, and technical.

The possible risks associated with the pharmacy programs are schedule risks, budget risk, price risk, external risks, Technical risks, and communication risks

  • Mitigation plan for schedule risks: The development of the schedule for the project can take longer time. The flow of activities will not occur in the proper order as scheduled which results into delay of the project. The project is not completed in the estimated time scheduled in the Gantt chart of the company.
  • Price Risks: The fluctuation of the price of the product is the major concern area because this will result into the difference in the estimated budget of the project. The project performance can be measured in terms of quality and scope to estimate the original cost of the project. The inefficiency in determining project cost will affect the working of the complete project  The estimation of the cost associated with the project is measured by following hierarchical structure of the activities which are going to accomplished for the completion of the project.
  • Budget risk: The budget of the project is prepared on the basis of the cost estimation chart. The cost estimation chart helps us to analyse and allocate the expected budget required to complete the project. The inefficiency in determining project cost will affect the working of the complete project. The financial manager should deploy the cross section analysis of  the cost estimation chart.
  • Technical Risk: The deployment of process will take more time to complete as estimated in the Gantt chart. The unavailability of the resources and skilled labour are the two major risks which are associated with the completion of technical process within the estimated budget and time. The training and development program should be organized for increasing the efficiency of the labour.
  • External Risks: The outside consequences and activities can affect the working capabilities of the employees which in turn affect the completion of the project. The employees should be physically and mentally strong to carry over the processes.
  • Communication risks: The Informal and formal communication should be arranged for deploying the processes within the working curriculum of the organization.

Conclusion:

 The web application of the pharmacy system is convenient for facilitating communication between different participating units. The deployment of the application provides significant benefit to the user such as unique shopping experience, availability of medicine, interactive design, easy to handle and use, explores communication, and others. The security policies and guidelines should be used for developing the secured system to accustom the online ordering of medicine without any fear of leakage of confidential information related to credit card details.

References:

Alagarsamy, K, A secured requirement engineering approach in online shopping system. in , , 2012, <https://ijettjournal.org/volume-3/issue-4/IJETT-V3I4P202.pdf> [accessed 9 September 2017].

Landry, B, Online pharmacies: E-strategies and supply chain for pharmaceutical product. in , , 2012, < https://www.researchgate.net/publication/268351417_ON-LINE_PHARMACIES_E-STRATEGY_AND_SUPPLY_CHAIN_FOR_PHARMACEUTICAL_PRODUCTS> [accessed 9 September 2017].

Mackie, C, Developing pharmacy practice: A focus on patient care. in , , 2013, < https://www.who.int/medicines/publications/WHO_PSM_PAR_2006.5.pdf?ua=1> [accessed 9 September 2017].

Mookhey, K, Common security vulnerabilities in ecommerce system. in , , 2014, < https://www.symantec.com/connect/articles/common-security-vulnerabilities-e-commerce-systems> [accessed 9 September 2017].

Morrison, C, Partnering with pharmacist in the prevention and control of chronic disease. in , , 2011, < https://www.cdc.gov/dhdsp/programs/spha/docs/pharmacist_guide.pdf> [accessed 9 September 2017].

Noorie, S, A review of online pharmacy. in , , 2017, < https://www.iosrjournals.org/iosr-jpbs/papers/Vol12-issue3/Version-4/G1203043234.pdf> [accessed 9 September 2017].

Richet, J, Cyber securities policies and strategies for cyber warfare prevention . in , , 2012, < https://books.google.co.in/books?id=p7EyCgAAQBAJ&pg=PA79&lpg=PA79&dq=Security++for+deploying+the+online+shopping+system&source=bl&ots=jp3lmWKJWb&sig=GIV6tFvodp1EI27Yk3vnJLKMcwI&hl=en&sa=X&ved=0ahUKEwi5vP6cr5jWAhVM6Y8KHT79AYwQ6AEIPjAF#v=onepage&q=Security%20%20for%20deploying%20the%20online%20shopping%20system&f=false> [accessed 9 September 2017].

Santilli, J, Key strategic trends that impact healthcare decision making and stakeholder roles in the new market place. in , , 2015, < https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4415172/> [accessed 9 September 2017].

Zhao, G, Design and implementation of online shopping system. in , , 2012, < https://dl.acm.org/citation.cfm?id=2406603> [accessed 9 September 2017].