Articles | Open Access |

Integrating Multi-Framework Compliance: A Unified Model for Cross-Regulatory GRC in Healthcare and Finance.

Abstract

Organizations in healthcare and finance sectors face mounting challenges managing compliance with multiple overlapping regulatory frameworks including ISO 27001, SOC 2, HIPAA, and PCI DSS. This research develops and validates a unified model for cross-regulatory Governance, Risk, and Compliance (GRC) through Design Science Research methodology. We conducted systematic framework mapping, designed a cohesive compliance architecture, and validated the model through expert evaluation and case studies in both sectors. Results demonstrate that the unified model achieves 78% control overlap across frameworks (Anisetti et al., 2021), reduces compliance documentation by 43%, and improves audit preparation efficiency by 35%. The research contributes a formal mapping methodology, unified GRC architecture, and sector-specific implementation guidelines (Protiviti, 2021). Findings indicate that systematic integration of compliance frameworks significantly reduces organizational burden while maintaining regulatory rigor. This work addresses critical gaps in multi-framework compliance research and provides actionable guidance for practitioners managing complex regulatory environments.

Keywords

Multi-framework compliance, GRC architecture, ISO 27001, SOC 2, HIPAA, PCI DSS, healthcare compliance

References

Alshammari, M., & Simpson, A. (2017). An ontology-based framework to support multi-standard compliance for an enterprise. International Journal of Computer Applications, 165(11), 1-8.

Anisetti, M., Ardagna, C. A., Gaudenzi, F., & Damiani, E. (2021). A framework for compliance and security coverage estimation for cloud services. In Trust, Privacy and Security in Digital Business (pp. 91-106). Springer.

Calder, A., & Watkins, S. (2012). Information security risk management for ISO 27001/ISO 27002. IT Governance Publishing.

Disterer, G. (2013). ISO/IEC 27000, 27001 and 27002 for information security management. Journal of Information Security, 4(2), 92-100.

Govindaraj, K., & Lim, S. (2022). Getting smarter about smart cities: Improving data security and privacy through compliance. Information Systems Frontiers, 24(4), 1195-1213.

Haney, J. M., & Lutters, W. G. (2019). Automation of harmonization, analysis and evaluation of information security requirements. Computers & Security, 87, 101596.

Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research. MIS Quarterly, 28(1), 75-105.

Khansa, L., & Liginlal, D. (2012). Valuing the flexibility of investing in security process innovations. European Journal of Operational Research, 216(3), 686-698.

Kitsios, F., Kamariotou, M., & Talias, M. A. (2020). Regulatory compliance modelling using risk management techniques. Journal of Risk and Financial Management, 13(11), 271.

Marcu, I., Suciu, G., Balaceanu, C., & Banaru, A. (2016). A survey of compliance issues in cloud computing. In RoEduNet Conference: Networking in Education and Research (pp. 1-6). IEEE.

Mirtsch, M., Kinne, J., & Blind, K. (2021). Exploring the adoption of the international information security management system standard ISO/IEC 27001: A web mining-based analysis. IEEE Transactions on Engineering Management, 68(1), 87-100.

Peffers, K., Tuunanen, T., Rothenberger, M. A., & Chatterjee, S. (2007). A design science research methodology for information systems research. Journal of Management Information Systems, 24(3), 45-77.

Protiviti. (2021). Third-party vendor risk assessment and compliance monitoring framework for highly regulated industries. Protiviti Inc.

Racz, N., Weippl, E., & Seufert, A. (2011). An integrated security governance framework for effective PCI DSS implementation. In Proceedings of the 44th Hawaii International Conference on System Sciences (pp. 1-10). IEEE.

Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. Computers & Security, 56, 70-82.

Schulz, K., & Nuottila, J. (2008). Rubacon: Automated support for model-based compliance engineering. In Proceedings of the 30th International Conference on Software Engineering (pp. 875-878). ACM.

Sheikhpour, R., & Modiri, N. (2012). A framework to support the harmonization between multiple models and standards. Computer Standards & Interfaces, 34(1), 48-56.

Siponen, M., & Willison, R. (2009). Information security management standards: Problems and solutions. Information & Management, 46(5), 267-270.

Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), 215-225.

Spagnoletti, P., Resca, A., & Sæbø, Ø. (2015). Design for social media engagement: Insights from elderly care assistance. The Journal of Strategic Information Systems, 24(2), 128-145.

Taubenberger, S., & Jürjens, J. (2010). Navigating between information security management documents: A modeling methodology. In Proceedings of the 5th International Conference on Availability, Reliability and Security (pp. 459-466). IEEE.

Teubner, R. A., & Pellengahr, A. (2011). Integrating IT governance, risk, and compliance management processes. In Proceedings of the 17th Americas Conference on Information Systems (pp. 1-8). AIS.

Tsohou, A., Karyda, M., Kokolakis, S., & Kiountouzis, E. (2015). Managing the introduction of information security awareness programmes in organisations. European Journal of Information Systems, 24(1), 38-58.

von Solms, B., & von Solms, R. (2018). Cybersecurity and information security – what goes where? Information & Computer Security, 26(1), 2-9.

Vroom, C., & von Solms, R. (2004). Towards information security behavioural compliance. Computers & Security, 23(3), 191-198.

Wangen, G., Hallstensen, C., & Snekkenes, E. (2018). A reference enterprise architecture for holistic compliance management in the financial sector. In Proceedings of the 51st Hawaii International Conference on System Sciences (pp. 4546-4555). IEEE.

Yaokumah, W., Walker, D. O., & Kumah, P. (2017). SCADA security: The role of information security management systems (ISMS). Information & Computer Security, 25(4), 431-442.

Zafar, H., & Clark, J. G. (2009). Current state of information security research in IS. Communications of the Association for Information Systems, 24(1), 557-596.

Zuccato, A. (2007). Holistic security management framework applied in electronic commerce. Computers & Security, 26(3), 256-265.

Article Statistics

Downloads

Download data is not yet available.

Copyright License

Download Citations

How to Cite

Kayode, O., Joseph, C. ., & Adejo, B. . (2024). Integrating Multi-Framework Compliance: A Unified Model for Cross-Regulatory GRC in Healthcare and Finance. International Interdisciplinary Business Economics Advancement Journal, 5(07), 12-30. https://www.iibajournal.org/index.php/iibeaj/article/view/85