The Computer Software Compliance Problem
|
|
|
- Emily Barker
- 10 years ago
- Views:
Transcription
1 Paper ID #10829 The Computer Software Compliance Problem Prof. Peter j Knoke, University of Alaska, Fairbanks Associate Professor of Software Engineering in the University of Alaska Fairbanks Computer Science Department for the last 25 years. Prior to that various positions in the computer industry from 1958 to 1988, mostly in the role of software engineer. Prior to that fighter pilot in the USAF for several years. c American Society for Engineering Education, 2014 Page
2 THE COMPLIANCE SOFTWARE DEVELOPMENT PROBLEM: IMPORTANCE AND POSSIBLE SOLUTIONS Abstract Successful modern software development often requires compliance with both ethical and legal standards. This creates the computer compliance software problem. That is defined and discussed together with reasons for its importance. Some possible solution approaches are defined and discussed, with some related examples. There have been a few well documented past software disasters, and there exist recent but undocumented software disasters, but there are reasons for hope that progress is being made toward solving the compliance software development problem and some are briefly discussed. Hope resides in greater software knowledge among key non-technical software decision-makers and software engineering education improvements which include lessons learned and the use of software development processes that embed those lessons. Background and importance The computer compliance software development problem is most easily considered in the context of the old software engineering development model called the waterfall model. That model considers software development as a sequence of five phases, namely the requirements, architecture/design, construction, test, and maintenance phases. With the waterfall model it s best to address the compliance problem as early as possible in the requirements and architecture/design phases. However, there now exist many other models such as the popular agile models for which it isn t obvious how or where best to attempt solution of the compliance problem. The problem is important regardless of particular software development model context. It is important to software developers because lengthy software development times, large software development costs, poor software quality and high liability risks are very likely if it isn t well solved. It is important to the end users because this kind of software if properly implemented can greatly reduce compliance and compliance enforcement costs. Compliance software development problem definition Table 1 below is evidence of the considerable current interest in compliance generally. The Google data reveals little about the specific reasons for that interest. However, the Wikipedia data shows 62 separate compliance categories which provide some insight on that score. Those categories include compliance(medicine), compliance(regulation), compliance cost, compliance(physiology), compliance(psychology), compliance and ethics program, and compliance professional among others. That shows that the term compliance Page
3 is used in diverse fields, and further specific research shows that its meaning often differs considerably from one field to another. Table 1 Google and Wikipedia Search (3 Jan 14) Engine Search terms #Hits Google Compliance 119,000,000 Compliance software 124,000,000 Compliance software development 66,000,000 Compliance software development problems 16,300,000 Regulatory compliance software development 12,800,000 Regulatory compliance software development problems 9,000,000 Wikipedia Intitle:compliance Intitle:compliance software 62 separate items 1 (tax compliance software) This paper is specifically concerned with how best to solve the compliance software development problem. A recent special issue of the journal IEEE Software 1 has the theme Software Engineering for Compliance and is mostly dedicated to that subject. That journal issue includes the following definition: The term compliance addresses the external regulations, internal policies, standards, and governance to which an organization must adhere. In general, compliance in the context of information systems means ensuring that an organization s software and systems comply with multiple laws, regulations, and business policies. Compliance imposes certain IT controls that focus on information creation and retention, as well as on its protection, integrity, and availability. This is a major issue in many organizations because non-compliance might lead to severe financial penalties and reputational risks. That definition and its rationale are adopted for the purposes of this paper because the author judges it good and because it is quite broad. It is broad because it includes not only external regulations (legal constraints), but also standards and internal policies (which might not be legally enforced and which could be considered as ethical constraints in some cases). Why the compliance software development problem is difficult The general reason why regulatory compliance software is difficult to develop is that regulations are often complex, ambiguous, rapidly changing, and sometimes contradictory (e.g. IRS code and the Affordable Care Act code). While many intelligent people are able to cope reasonably well with this situation, it is difficult to teach computers (which could be Page
4 described as rapid idiots ) to do the same. In this context, programming is viewed as the education of computers. The broader definition of compliance includes policies and standards, and maybe also ethical issues. Here the problem gets worse because many intelligent people may have legitimate differences of opinion about compliance in these other areas. Examples of such areas are health care, privacy and security, gay marriage, and marijuana use. Examples of coming future computer systems which, with suitable software might have to cope with such problems include humanoid robots (cf. Isaac Asimov and his Three Laws of Robotics 2. The name wicked problems has appeared in recent years and generated considerable interest. It was originally applied to the field of social planning, where it was defined by a 10 point list 3 That was later generalized to a 6 point list by Conklin as follows: 1) The problem is not understood until after the formulation of a solution. 2) Wicked problems have no stopping rule. 3) Solutions to wicked problems are not right or wrong. 4) Every wicked problem is essentially novel and unique. 5) Every solution to a wicked problem is a one shot operation 6) Wicked problems have no given alternative solution. Reference 3 describes a number of other wicked problem definitions but their extensive discussion is beyond the scope of this paper. In all those various definitions the term wicked is used to denote resistance to resolution, rather than evil. Also contained in reference 3 is an item on wicked problems in software development (1990, DeGrace and Stahl). The problem of constraint software development arguably satisfies the various definitions specified in reference 3. While considering software development as a wicked problem, reference 3 includes the following statement which clarifies why that designation is appropriate: Software development shares many properties with other design practices (particularly it seems that people, process, and technology problems have to be considered equally) In other words, engineering design itself could be considered as a wicked problem in many cases. The development of software for the US healthcare.gov website 4 is a current high profile example of a wicked problem. In summary, constraint software development is difficult because it is a wicked problem. It probably is getting more difficult because of rapid and significant changes to computer software technology and the increasing demand for new, larger and ever more complex Page
5 software (the healthcare.gov website software is complex and large, requiring an estimated 500 million lines of code). Possible problem solution approaches This section includes some possibly helpful ideas which have proven successful in solving past software development problems. They cannot be fully evaluated except in the context of a specific compliance software development case 1. 1) Use more multidisciplinary teams in early phases of development Often software development solutions have been most cost-effective if applied at the requirements or architecture/design levels. Multidisciplinary teams could be effective at these levels. For example, lawyers who could be quite familiar with relevant legal issues that are complex, ambiguous and changeable could join software engineers on the development team during the early stages. The same goes for other domain specialists (e.g., from finance and medical domains). Specific team membership would depend on the sources of the specific constraint software goals (e.g., are the constraints primarily from the EPA, the IRS, the FAA, etc). 2) Develop better tools and processes and models for use throughout the development. Better programming languages have in the past significantly reduced coding time and coding errors. Better tools and processes (e.g. agile processes) have speeded needed changes and reduced associated change errors. Better tools have speeded and simplified software test. Some of the modularity and object definition ideas of David Parnas (arguably the father of Object Oriented Programming) might be applicable for compliance software. They could be effectively used if it were true that future regulatory and other requirements changes could be predicted with some degree of accuracy. The probable interpretation of some new laws might be estimated on the basis of past legal precedents. 3) Reduce the need for new software developments by more software reuse Reuse has been attempted in software development for many years. One practical lesson learned in this area has been that reuse is most successful if reuse has been planned in the first place (there are distinctions between software development FOR reuse vs. software development WITH reuse). Perhaps portions of successful older compliance software systems could be adapted for use in new compliance software systems. Page
6 4) Search for lessons learned from well- documented past software disasters, software related litigation reports, or other similar literature Software law litigation documents can be a good source of relevant legal lessons learned. For example the monthly Thompson West Journal Software Law 5 is quite readable and affordable. Peter G Neumann s periodic report on Risks to the Public in Computers and Related Systems 6 is a highly regarded item in the ACM Software Engineering Notes (Neumann (an ACM Fellow) has been moderating that for many years). The book Software Runaways: Monumental Software Disasters by Robert Glass 7 provides a good documentation of 16 software disasters of the past, together with lessons learned data. Those disasters were often found to be caused by a combination of problems including requirements (poorly defined, misunderstood and changing) and unrealistically short development times. The development times were sometimes too short because of political pressures. The new health.gov web software seems to have those same problems, plus some security and scalability problems which are now common for many current websites. It should be noted that although good documentation of past and present software disasters prepared by knowledgeable insiders can be of great value as a source of lessons learned, such documentation is quite scarce. Reasons for this could include desires for maintenance of a good corporate image or for keeping a job. Good lessons could also be learned from documentation of software successes, but in those cases corporations might be reluctant to share information about processes that work well, while intellectual property laws provide them with a means avoid sharing code details. 5) Improve the education of new Software Engineers and promote software engineering professionalism Incorporate more materials such as lessons learned mentioned above into the standard undergraduate or graduate software engineering curricula. Also, support emerging software engineering professionalism. A software engineering PE has recently been added to the NCEES Professional Engineer menu. The SWEBOK-based PE study guide now includes 15 study areas instead of the original 10 (SWEBOK 8 stands for Software Engineering Body of Knowledge, which was originally developed by the IEEE Computer Society). Page
7 Reasons for hope There are some reasons for hope that progress will continue to be made toward solutions for the compliance software development problem. Increasing numbers of welldocumented, relevant and timely compliance case studies would help. An increasing number of US law schools now have programs addressing technology law, and an increasing number of lawyers, judges and lawmakers have gained significant technical understanding and expertise. There might be an increasing number of software engineers with awareness of software-related compliance issues. And the state of the art of software engineering continues to improve constantly. References 1) IEEE Software May/June 2012 (Vol 29, No3) pp ) Wikipedia(Three Laws of Robotics) 1 Jan 14. 3) Wikipedia(Wicked Problem)3 Dec 13. 4) Wikipedia(Healthcare.gov)4 Jan 14. 5) Westlaw Journal Software Law Litigation news and Analysis, Legislation, Regulation, Expert Commentary (Monthly Journal). 6) Wikipedia(RISKS Digest)(Peter G. Neumann)12 Dec 13). 7) Robert Glass, Software Runaways, Prentice Hall, ) Wikipedia(SWEBOK)6 Jan 14. Page
Compliance Management Systems (CMS) Division of Depositor and Consumer Protection
Compliance Management Systems (CMS) What is a Compliance Management System (CMS)? A CMS is how an institution: Learns about its compliance responsibilities Ensures that employees understand these responsibilities
LEGAL MANAGER - JOB DESCRIPTION
Job details LEGAL MANAGER - JOB DESCRIPTION Reference number: ESD/LM2011 Job title: Legal Manager Division: Legal Reports to: Company Secretary Location: Nairobi Job summary The job holder is responsible
Entrepreneurial Organizational Appraisal II ENT 830 Entrepreneurship Capstone Experience Course
Entrepreneurial Organizational Appraisal II ENT 830 Entrepreneurship Capstone Experience Course INSTRUCTOR INFORMATION Name: Dr. Steven A. Gedeon David Earthy (Entrepreneur in Residence) Office Telephone
THE E-HEALTH JOURNEY. Ministry of Health Jamaica. Optimizing the use of ICT Applications in Health and Patient Care
THE E-HEALTH JOURNEY Ministry of Health Jamaica Optimizing the use of ICT Applications in Health and Patient Care 8 th Caribbean Conference on Health Financing Initiatives Presenter: Mr. Arnold Cooper
IDOL Outcomes and Competencies (ibstpi) 2
Instructional Design for Online Learning (IDOL) Specialization Outcomes and Specialization Competencies Updated January 2008 Table of Contents Outcomes-based curricula at Capella University...3 IDOL MS
INFORMATION MANAGEMENT STRATEGIC FRAMEWORK GENERAL NAT 11852-08.2004 OVERVIEW
GENERAL OVERVIEW NAT 11852-08.2004 SEGMENT FORMAT PRODUCT ID INFORMATION MANAGEMENT STRATEGIC FRAMEWORK In the context of the Information Management Strategic Framework, information is defined as: information
Information Management Compliance and Data protection.
Information Management Compliance and Data protection. Technology, Media & Telecommunications Information is the life blood of every business. Yet how you use that information is increasingly regulated.
The Role of Information Technology Studies in Software Product Quality Improvement
The Role of Information Technology Studies in Software Product Quality Improvement RUDITE CEVERE, Dr.sc.comp., Professor Faculty of Information Technologies SANDRA SPROGE, Dr.sc.ing., Head of Department
Information Governance Policy
Information Governance Policy Document Number 01 Version Number 2.0 Approved by / Date approved Effective Authority Customer Services & ICT Authorised by Assistant Director Customer Services & ICT Contact
Knowledge Representation & Reasoning for Business Analysis
Knowledge Representation & Reasoning for Business Analysis LECTURE 2 Types of data, information, assumption, and knowledge in Business Analysis Ivan Jureta Senior Researcher, Fonds de la Recherche Scientifique
DOJ Guidance on Use of the False Claims Act in Health Care Matters
DOJ Guidance on Use of the False Claims Act in Health Care Matters The following document is a public document published by the Department of Justice at www.usdoj.gov/dag/readingroom/chcm.htm. U.S. DEPARTMENT
DELIVERING OUR STRATEGY
www.lawsociety.org.uk DELIVERING OUR STRATEGY Our three year plan 2015 2018 >2 > Delivering our strategy Catherine Dixon Chief executive Foreword Welcome to our three year business plan which sets out
The Decision Management Manifesto
An Introduction Decision Management is a powerful approach, increasingly used to adopt business rules and advanced analytic technology. The Manifesto lays out key principles of the approach. James Taylor
Procurement Capability Standards
IPAA PROFESSIONAL CAPABILITIES PROJECT Procurement Capability Standards Definition Professional Role Procurement is the process of acquiring goods and/or services. It can include: identifying a procurement
Abstraction in Computer Science & Software Engineering: A Pedagogical Perspective
Orit Hazzan's Column Abstraction in Computer Science & Software Engineering: A Pedagogical Perspective This column is coauthored with Jeff Kramer, Department of Computing, Imperial College, London ABSTRACT
OCC 98-3 OCC BULLETIN
To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel
Chapter 12: Decision Making, Creativity, and Ethics
Chapter 12: Decision Making, Creativity, and Ethics Organizational Behaviour 5 th Canadian Edition Langton / Robbins / Judge Copyright 2010 Pearson Education Canada 12-1 Chapter Outline How Should Decisions
The 10 Most Important Ideas in Software Development
Construx Software Development Best Practices The 10 Most Important Ideas in Software Development 2006 Construx Software Builders, Inc. All Rights Reserved. www.construx.com Most Key Ideas Are Not New Q:
Chapter 1 Introduction
Chapter 1 Introduction Chapter 1 Introduction Slide 1 Topics covered Professional software development What is meant by software engineering. Addendum to Sommerville s FAQs Software engineering ethics
Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
WHS Risk Assessment and Control Form
WHS Risk Assessment and Control Form Step 1: Who has conducted the Risk Assessment Risk Assessment completed by (name): Staff / Student Number: Signature: Date: Step 4: Documentation and initial approval
INSTITUTE OF FINANCIAL ADVISERS INC. P2 - PRACTICE STANDARDS
INSTITUTE OF FINANCIAL ADVISERS INC. P2 - PRACTICE STANDARDS EFFECTIVE 1 JANUARY 2012 TABLE OF CONTENTS INTRODUCTION... 2 Professional Financial Advice... 2 The Six-Step Process... 2 The Core Components...
Five best practices for deploying a successful service-oriented architecture
IBM Global Services April 2008 Five best practices for deploying a successful service-oriented architecture Leveraging lessons learned from the IBM Academy of Technology Executive Summary Today s innovative
Managing the Product Value Chain for the Industrial Manufacturing Industry
An Oracle White Paper June 2011 Managing the Product Value Chain for the Industrial Manufacturing Industry Contributing Authors: John DaDamio, Oracle PLM/PIM Applications Pre-Sales Kerrie Foy, Oracle PLM/PIM
APES GN 30 Outsourced Services
APES GN 30 Outsourced Services Prepared and issued by Accounting Professional & Ethical Standards Board Limited ISSUED: [DATE] Copyright 2012 Accounting Professional & Ethical Standards Board Limited (
Legal and Ethical Aspects. IT 4823 Information Security Administration. Cybercrime / Computer Crime. Law Enforcement Challenges.
IT 4823 Information Security Administration Legal and Ethical Considerations March 24 Legal and Ethical Aspects Topics include: cybercrime and computer crime intellectual property issues privacy ethical
IBA International Principles on Social Media Conduct for the Legal Profession
IBA International Principles on Social Media Conduct for the Legal Profession Adopted on 24 May 2014 by the International Bar Association International Bar Association 4th Floor 10 St Bride Street London
ADOPTED AMERICAN BAR ASSOCIATION JUDICIAL DIVISION CRIMINAL JUSTICE SECTION REPORT TO THE HOUSE OF DELEGATES RESOLUTION
ADOPTED AMERICAN BAR ASSOCIATION JUDICIAL DIVISION CRIMINAL JUSTICE SECTION REPORT TO THE HOUSE OF DELEGATES RESOLUTION 1 2 3 RESOLVED, That the American Bar Association urges the National Commission on
THOMSON REUTERS ACCELUS
THOMSON REUTERS ACCELUS ACCELUS Screening Resolution Service Executive Summary Thomson Reuters Accelus offers Screening Resolution Service (SRS): an outsourced screening service for Corporates and Financial
WFEO Model Code of Practice for Sustainable Development and Environmental Stewardship
WFEO Model Code of Practice for Sustainable Development and Environmental Stewardship World Federation of Engineering Organizations Committee on Engineering and the Environment Rev 1 June 2014 Agenda Introduction
Maximizing the ROI Of Visual Rules
Table of Contents Introduction... 3 Decision Management... 3 Decision Discovery... 4 Decision Services... 6 Decision Analysis... 11 Conclusion... 12 About Decision Management Solutions... 12 Acknowledgements
EGUIDE BRIDGING THE GAP BETWEEN HEALTHCARE & HIPAA COMPLIANT CLOUD TECHNOLOGY
Bridging The Gap Between Healthcare & Hipaa Compliant Cloud Technology and outsource computing resources to external entities, would provide substantial relief to healthcare service providers. Data stored
Legislative Brief: PAY OR PLAY PENALTIES LOOK BACK MEASUREMENT METHOD EXAMPLES. EmPowerHR
EmPowerHR Legislative Brief: PAY OR PLAY PENALTIES LOOK BACK MEASUREMENT METHOD EXAMPLES The Affordable Care Act (ACA) imposes a penalty on applicable large employers (ALEs) that do not offer health insurance
The Phases of an Object-Oriented Application
The Phases of an Object-Oriented Application Reprinted from the Feb 1992 issue of The Smalltalk Report Vol. 1, No. 5 By: Rebecca J. Wirfs-Brock There is never enough time to get it absolutely, perfectly
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Atif Ahmad & Anthonie Ruighaver University of Melbourne, Australia Abstract The design and implementation
Compliance Requirements for Healthcare Carriers
INFORMATION DRIVES SOUND ANALYSIS, INSIGHT REGULATORY COMPLIANCE ADVISORY Compliance Requirements for Healthcare Carriers Introduction With the introduction of the new healthcare exchanges in January 2014
BUILDING THE CASE FOR CLOUD: HOW BUSINESS FUNCTIONS IN UK MANUFACTURERS ARE DRIVING PUBLIC CLOUD ADOPTION
BUILDING THE CASE FOR CLOUD: HOW BUSINESS FUNCTIONS IN UK MANUFACTURERS ARE DRIVING PUBLIC CLOUD ADOPTION Industry Report Contents 2 4 6 Executive Summary Context for the Sector Key Findings 3 5 9 About
Marketing Tips Ideas Plans for Illinois State Bar Association Members
2 0 0 9 Marketing Tips Ideas Plans for Illinois State Bar Association Members Vol. 96, No. 10 www.isba.org october 2008 The Magazine of Illinois lawyers Marital Property Before Divorce? Judicial Review
Framing Requirements for Predictive Analytic Projects with Decision Modeling
Research Brief Framing Requirements for Predictive Analytic Projects with Decision Modeling August 2015 Written by: James Taylor Key Takeaways 1. Organizations are struggling to create a scalable, sustainable
Competency Requirements for Executive Director Candidates
Competency Requirements for Executive Director Candidates There are nine (9) domains of competency for association executives, based on research conducted by the American Society for Association Executives
Workflow based content management solutions in law firm
Workflow based content management solutions in law firm John Neuhaus, National Manager Information Services, Clayton Utz. [email protected] 1. Abstract The Clayton Utz knowledge and research intranet
Software Requirements Specification (SRS)
Software Requirements Specification (SRS) Meeting Scheduler MANISH BANSAL ABHISHEK GOYAL NIKITA PATEL ANURAG MAHAJAN SMARAK BHUYAN - 1 - VERSION RECORD Version record showing the amendments effected to
Kenya Revenue Authority (KRA)
Kenya Revenue Authority (KRA) Chief Manager - HR Development and Performance Management Job details Reference Number: KRA/HR02/14 Job Title: Chief Manager - HR Development and Performance Management Supervisor:
On Efficient Collaboration between Lawyers and Software Engineers when Transforming Legal Regulations to Law-related Requirements
Proceedings of the 2n d International Conference on Information Technology, ICIT 2010 28-30 June 2010, Gdansk, Poland. On Efficient Collaboration between Lawyers and Software Engineers when Transforming
THOMSON IP MANAGER KNOWING IS INGENIOUS
THOMSON IP MANAGER KNOWING IS INGENIOUS DID YOU KNOW? Thomson IP Manager is an all-inone IP management solution. So you don t have to worry about whether your IP data is secure, your processes are optimized,
Financial Planner of the Year 2015. Financial Plan Guide
Financial Planner of the Year 2015 Financial Plan Guide TABLE OF CONTENTS INTRODUCTION 3 PROFESSIONAL SKILLS 3 PROFESSIONAL RESPONSIBILITY 4 PRACTICE 4 COMMUNICATION 4 COGNITIVE 4 PROFESSIONAL AND LEGAL
Emphasizing Soft Skill Learning and Training as Part of an Engineering Curriculum Revision
Emphasizing Soft Skill Learning and Training as Part of an Engineering Curriculum Revision S. Pedrazzini Professor, Dean of CS Engineering Curriculum SUPSI, University of Applied Sciences of Southern Switzerland
STAGE 1 COMPETENCY STANDARD FOR PROFESSIONAL ENGINEER
STAGE 1 STANDARD FOR PROFESSIONAL ENGINEER ROLE DESCRIPTION - THE MATURE, PROFESSIONAL ENGINEER The following characterises the senior practice role that the mature, Professional Engineer may be expected
AC 2011-1304: INTEGRATION OF HUMANITIES AND SOCIAL SCIENCES INTO CIVIL ENGINEERING EDUCATION
AC 2011-1304: INTEGRATION OF HUMANITIES AND SOCIAL SCIENCES INTO CIVIL ENGINEERING EDUCATION Jeffrey C. Evans, Bucknell University Jeffrey Evans is Professor and Chair of the Department of Civil and Environmental
ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES
THOMSON REUTERS ACCELUS ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES PROACTIVE. CONNECTED. INFORMED. THOMSON REUTERS ACCELUS Compliance management Solutions Introduction The advent of new and pending
Value to the Mission. FEA Practice Guidance. Federal Enterprise Architecture Program Management Office, OMB
Value to the Mission FEA Practice Guidance Federal Enterprise Program Management Office, OMB November 2007 FEA Practice Guidance Table of Contents Section 1: Overview...1-1 About the FEA Practice Guidance...
Regulatory Compliance and its Impact on Software Development
Regulatory Compliance and its Impact on Software Development Abdelwahab Hamou-Lhadj Software Compliance Research Group Department of Electrical and Computer Engineering Concordia University 1455 de Maisonneuve
M.S. in Accounting Accounting Major Track
Master of Science Wiley CPAexcel CPA Review Course now included! (An $1,800 value) M.S. in Accounting Accounting Major Track Take your accounting practice to a higher level and prepare to sit for the CPA
The Data Protection Landscape. Before and after GDPR: General Data Protection Regulation
The Data Protection Landscape Before and after GDPR: General Data Protection Regulation Data Protection regulations across Europe Current regulations & guidance European Directives 95/46/EC (Data Protection)
CHAPTER 5 STAKEHOLDERS: THEIR INTERESTS, CONCERNS, AND RESPONSIBILITIES
CHAPTER 5 STAKEHOLDERS: THEIR INTERESTS, CONCERNS, AND RESPONSIBILITIES Key Points: Each worker study involves multiple stakeholders in addition to the researcher and worker. Stakeholders interests in
A New Proposed Software Engineering Methodologyfor Healthcare Applications Development
Vol. 3, Issue. 3, May.-June. 2013 pp-1566-1570 ISSN: 2249-6645 A New Proposed Software Engineering Methodologyfor Healthcare Applications Development Abdullah Al-Dahmash, Samir El-Masri Department of Information
Software Development Process
Software Development Process A software development process, also known as software development lifecycle, is a structure imposed on the development of a software product. Similar terms include software
The importance of nurse leadership in securing quality, safety and patient experience in CCGs
Briefing note: July 2012 The importance of nurse leadership in securing quality, safety and patient experience in CCGs Introduction For the NHS to meet the challenges ahead, decisions about health services
Anatomy of an Enterprise Software Delivery Project
Chapter 2 Anatomy of an Enterprise Software Delivery Project Chapter Summary I present an example of a typical enterprise software delivery project. I examine its key characteristics and analyze specific
A Social Network perspective of Conway s Law
A Social Network perspective of Conway s Law Chintan Amrit, Jos Hillegersberg, Kuldeep Kumar Dept of Decision Sciences Erasmus University Rotterdam {camrit, jhillegersberg, kkumar}@fbk.eur.nl 1. Introduction
Organizational Behavior and Organizational Change Decisions. Roger N. Nagel Senior Fellow & Wagner Professor. Lehigh University
Organizational Behavior and Organizational Change Decisions Roger N. Nagel Senior Fellow & Wagner Professor 1 Topics This Presentation Decision making in OB Steps in the Decision-Making Model Common Biases
ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES
ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES THIS POLICY SETS OUT THE REQUIREMENTS FOR SAFEGUARDING COMPANY ASSETS AND RESOURCES TO PROTECT PATIENTS, STAFF, PRODUCTS, PROPERTY AND
Morgan Stanley. Policy for the Management of Third Party Residential Mortgage Servicing Providers
Morgan Stanley Policy for the Management of Third Party Residential Mortgage Servicing Providers Title Policy for the Management of Third Party Residential Mortgage Servicing Providers Effective Date Owner
How To Understand The Benefits Of Cloud Computing
Issue in Focus: Assessing the Cloud PLM Opportunity Evaluating Benefits, Requirements, and Considerations Tech-Clarity, Inc. 2012 Table of Contents Introducing the Issue... 3 The Cloud Meets PLM... 3 Evaluating
Industry insight into FCRA-compliance and its benefits to healthcare organizations.
White Paper Industry insight into FCRA-compliance and its benefits to healthcare organizations. April 2012 LexisNexis Health Care Credentialing Excellent Certification in License to Practice, Malpractice
Comments of the World Privacy Forum To: Office of Science and Technology Policy Re: Big Data Request for Information. Via email to bigdata@ostp.
3108 Fifth Avenue Suite B San Diego, CA 92103 Comments of the World Privacy Forum To: Office of Science and Technology Policy Re: Big Data Request for Information Via email to [email protected] Big Data
AGILE SOFTWARE DEVELOPMENT A TECHNIQUE
AGILE SOFTWARE DEVELOPMENT A TECHNIQUE Saurav Tiwari 1,Aasheesh Goel 2,Rajeev Sharma 3 1,2 Research Scholar,MCADept.,SRM University,NCRCampus,Modinagar 3 Asst. Prof.,MCADept.,SRM University,NCR Campus
The Final Quality Gate: Software Release Readiness. Nancy Kastl, CSQA Kaslen Group, Inc. (630) 910-0589 [email protected]
The Final Quality Gate: Software Release Readiness Nancy Kastl, CSQA Kaslen Group, Inc. (630) 910-0589 [email protected] Aligning Capabilities with Business Priorities Kaslen Group is a Chicago-based consulting
IAM Level 4. Diploma in Business and Administrative Management. Qualification handbook. 2011 edition
IAM Level 4 Diploma in Business and Administrative Management Qualification handbook 2011 edition Published by the IAM IAM 2011 Registered charity number 254807 Published 2011 All rights reserved. This
Academic Program Assessment Plan Certificate: Homeland Security Studies
Academic Program Assessment Plan Certificate: Homeland Security Studies Department of History and Political Science College of Humanities and Social Sciences Colorado State University-Pueblo Plan appended
