Compliance-Driven Architecture for Healthcare Industry
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 5
Abstract
The United States (US) healthcare organizations are continuously struggling to cope-up with evolving regulatory requirements e.g. Health Information Technology for Economic and Clinical Health Act (HITECH) and International Organization for Standardization (ISO) 9001: 2015. These requirements are not only affecting the US healthcare industry but also other industries as well e.g. software industry that provides software products and services to healthcare organizations. It is vital for software companies to ensure and comply with applicable regulatory requirements. These evolving regulatory requirements may affect all phases of software development lifecycle including software architecture. It is difficult for Software architects to transform and trace regulatory requirements at software architecture level due to the absence of software design and architectural mechanisms. We have composed architectural mechanisms from given set of information security regulations i.e. Health Insurance Portability and Accountability Act (HIPAA) non-functional requirements, and these composed mechanisms were used to initiate initial architecture for the Electronic Health Record (EHR) and/or Health Level Seven (HL7). At next, style was selected for compliant and non-compliant software architecture. A layer of compliance was introduced in existing layered style that intends to help software companies to track compliance at software architecture level. Further, we have evaluated compliance-driven EHR architecture vs. non-compliant EHR architecture using a large healthcare billing and IT company with offices on three continents as a case study.
Authors and Affiliations
Syeda Uzma Gardazi, Arshad Ali Shahid
Comparison of Hash Function Algorithms Against Attacks: A Review
Hash functions are considered key components of nearly all cryptographic protocols, as well as of many security applications such as message authentication codes, data integrity, password storage, and random number gener...
Construction of TVET M-Learning Model based on Student Learning Style
Mobile learning or m-learning is emerging as the innovation of virtual learning that used mobile devices for teaching and learning which can be accessed readily at hand anywhere either in classroom or group. Whereas prel...
Tracking Items Through Rfid and Solving Heterogeneity Problems During a Collaboration Between Port Companies
In this article, we are proposing an architecture that enables improvements in various steps of the collaboration process between different port companies, based on the use of ontologies, multi-agent systems and RFIDs. T...
Agent based Congestion Control Performance in Mobile ad-hoc Network:A Survey paper
A Congestion control is a key problem in mobile ad-hoc networks. The standard TCP congestion control mechanism is not able to handle the special properties of a shared wireless channel. Many approaches have been proposed...
Android based Receptive Language Tracking Tool for Toddlers
Today’s Android-based applications are gaining more popularity among users, especially among kids. Many Android-based applications are available related to speech therapy of a child but these have left some loopholes. Ta...