2021
DOI: 10.36685/phi.v7i4.465
|View full text |Cite
|
Sign up to set email alerts
|

Fraud in healthcare facilities: A Narrative Review

Abstract: Every country needs to develop Universal Health Coverage (UHC) to promote optimal levels of public health. But in realizing UHC, there must be some problems, one of which is fraud. Based on the Corruption Eradication Commission (KPK) data, potential fraud is detected from 175,774 claims of Advanced Referral Health Facilities (FKRTL) or worth Rp. 440 billion until June 2015. This review article describes the incidence of fraud in health care facilities. Out of a total of 12,736 cases of fraud, readmission occup… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 23 publications
0
1
0
Order By: Relevance
“…The insurance claim will be validated by 𝓗 𝓹 with the help of patient input data 𝚰 𝝆 , the obtained treatment 𝓣 𝓸 , and through the data stored on 𝓗 𝓬 , that will yield the result of legitimate HIN claims 𝓛 𝓲 by identifying and reporting 𝓕 𝓬 , as shown in Equation (8).…”
Section: Mathematical Modelingmentioning
confidence: 99%
See 4 more Smart Citations
“…The insurance claim will be validated by 𝓗 𝓹 with the help of patient input data 𝚰 𝝆 , the obtained treatment 𝓣 𝓸 , and through the data stored on 𝓗 𝓬 , that will yield the result of legitimate HIN claims 𝓛 𝓲 by identifying and reporting 𝓕 𝓬 , as shown in Equation (8).…”
Section: Mathematical Modelingmentioning
confidence: 99%
“…The insurance claim will be validated by 𝓗 𝓹 with the help of patient input data 𝚰 𝝆 , the obtained treatment 𝓣 𝓸 , and through the data stored on 𝓗 𝓬 , that will yield the result of legitimate HIN claims 𝓛 𝓲 by identifying and reporting 𝓕 𝓬 , as shown in Equation (8). For efficient ℘ , the transmission of 𝚰 at maximum speed 𝑺(𝒙) and minimum latency 𝓛(𝒙) is required, which is only possible if 𝓖 is implemented and working properly, as shown in Equation (5).…”
Section: Mathematical Modelingmentioning
confidence: 99%
See 3 more Smart Citations