The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
HIPAA Security and Privacy Rules Auditing in Extreme Programming Environments
Abstract
Healthcare business is responsible of keeping patient data safe and secure by following the rules of the federal Health Insurance Portability and Accountability Act of 1996, (HIPAA). Agile software organizations that deal with healthcare software system face a number of challenges to demonstrate that their process activities conform to the rules of HIPAA. Such organizations must establish a software process life cycle and develop procedures, tools, and methodologies that can manage the HIPAA requirements during the different stages of system development, and also must provide evidences of HIPAA conformity. This paper proposes an auditing model for HIPAA security and privacy rules in XP environments. The design of the proposed model is based on an evaluation theory which takes as its input the work of Lopez ATAM, and the standards of common criteria (CC) concepts. The proposed auditing model has been assessed based on four case studies. The auditing result shows that the proposed model is capable of capturing the auditing evidences in most of the selected case studies.
Related Content
N. Geethanjali, K. M. Ashifa, Avantika Raina, Jayashree Patil, Rameshwaran Byloppilly, S. Suman Rajest.
© 2024.
19 pages.
|
Praveen Kakada, Muhammed Shafi M. K..
© 2024.
14 pages.
|
P. S. Venkateswaran, Divya Marupaka, Sachin Parate, Amit Bhanushali, Latha Thammareddi, P. Paramasivan.
© 2024.
15 pages.
|
M. Lishmah Dominic, P. S. Venkateswaran, Latha Thamma Reddi, Sandeep Rangineni, R. Regin, S. Suman Rajest.
© 2024.
15 pages.
|
S. Sivabala, P. Vidyasri.
© 2024.
23 pages.
|
H. Hajra, G. Jayalakshmi.
© 2024.
22 pages.
|
Anusha Thakur.
© 2024.
15 pages.
|
|
|