IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

HIPAA Security and Privacy Rules Auditing in Extreme Programming Environments

HIPAA Security and Privacy Rules Auditing in Extreme Programming Environments
View Sample PDF
Author(s): Mahmood Alsaadi (Department of Computer Science, Princess Sumaya University for Technology, Amman, Jordan), Malik Qasaimeh (Department of Software Engineering, Princess Sumaya University for Technology, Amman, Jordan), Sara Tedmori (Department of Computer Science, Princess Sumaya University for Technology, Amman, Jordan)and Khaled Almakadmeh (Department of Software Engineering, Hashemite University, Zarqa, Jordan)
Copyright: 2017
Volume: 9
Issue: 1
Pages: 21
Source title: International Journal of Information Systems in the Service Sector (IJISSS)
Editor(s)-in-Chief: John Wang (Montclair State University, USA)
DOI: 10.4018/IJISSS.2017010101

Purchase

View HIPAA Security and Privacy Rules Auditing in Extreme Programming Environments on the publisher's website for pricing and purchasing information.

Abstract

Healthcare business is responsible of keeping patient data safe and secure by following the rules of the federal Health Insurance Portability and Accountability Act of 1996, (HIPAA). Agile software organizations that deal with healthcare software system face a number of challenges to demonstrate that their process activities conform to the rules of HIPAA. Such organizations must establish a software process life cycle and develop procedures, tools, and methodologies that can manage the HIPAA requirements during the different stages of system development, and also must provide evidences of HIPAA conformity. This paper proposes an auditing model for HIPAA security and privacy rules in XP environments. The design of the proposed model is based on an evaluation theory which takes as its input the work of Lopez ATAM, and the standards of common criteria (CC) concepts. The proposed auditing model has been assessed based on four case studies. The auditing result shows that the proposed model is capable of capturing the auditing evidences in most of the selected case studies.

Related Content

Muath AlShaikh, Waleed Alsemaih, Sultan Alamri, Qusai Ramadan. © 2024. 19 pages.
Anna M. Segooa, Billy M. Kalema. © 2024. 27 pages.
Utsav Upadhyay, Alok Kumar, Gajanand Sharma, Ashok Kumar Saini, Varsha Arya, Akshat Gaurav, Kwok Tai Chui. © 2024. 30 pages.
Yuan Ren. © 2024. 8 pages.
Jon A. Chilingerian, Mitchell P. V. Glavin. © 2024. 27 pages.
Hadeel Al-Obaidy, Aysha Ebrahim, Ali Aljufairi, Ahmed Mero, Omar Eid. © 2024. 19 pages.
Ahmad Althunibat, Bayan Alsawareah, Siti Sarah Maidin, Belal Hawashin, Iqbal Jebril, Belal Zaqaibeh, Haneen A. Al-khawaja. © 2024. 19 pages.
Body Bottom