2010
DOI: 10.1016/j.eswa.2010.06.095
|View full text |Cite
|
Sign up to set email alerts
|

Two models to investigate Medicare fraud within unsupervised databases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0
4

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 44 publications
(40 citation statements)
references
References 9 publications
0
31
0
4
Order By: Relevance
“…In most industry practices, data pre‐processing efforts, such as data cleaning and transformation, take most of the time of overall fraud detection procedure (see Lin & Haug, , and Sokol et al ., , for relevant discussions). For instance, being able to submit the same claim under the name of the hospital or provider may require the investigators to define new unique identifiers to analyse the medical data (Musal, ). Another crucial medical data issue is the abundance of missing values.…”
Section: Medical Claims Datamentioning
confidence: 99%
“…In most industry practices, data pre‐processing efforts, such as data cleaning and transformation, take most of the time of overall fraud detection procedure (see Lin & Haug, , and Sokol et al ., , for relevant discussions). For instance, being able to submit the same claim under the name of the hospital or provider may require the investigators to define new unique identifiers to analyse the medical data (Musal, ). Another crucial medical data issue is the abundance of missing values.…”
Section: Medical Claims Datamentioning
confidence: 99%
“…Second type of algorithms include clustering methods that are used to group providers or patients. For instance, Musal uses a hard‐clustering method of geographical regions as input to his regression model. While Ekin et al describe a Bayesian co‐clustering model that captures the dyadic dynamic that connects the providers and beneficiaries.…”
Section: Introductionmentioning
confidence: 99%
“…Although a case study may be an instrument that helps to create a set of metrics, evaluation of the metrics by means of experts and flagging results is an absolute necessity. The set of metrics chosen in this paper consists of metrics based on analyzed cases from the FBI (U.S. Federal Bureau of Investigation 2013), metrics developed through discussions with healthcare fraud experts, and metrics found in existing literature (Musal 2010;Ng et al 2010;Shin et al 2012;Tang et al 2011; U.S. Government Accountability Office 2012). To understand the process of fraud metric extraction we illustrate two examples of fraud cases that helped to design identifying metrics.…”
Section: Compose Metric Sets For Domainsmentioning
confidence: 99%
“…There is a large base of statistical methods that are also used in other industries and could potentially be applied within the health care industry (Travaille et al 2011). Some research reported specific fraud scheme detection using data mining approaches (Forgionne et al 2000;Major & Riedinger 2002;Musal 2010;Ng et al 2010;Shin et al 2012), however an outstanding challenge is to explore other healthcare fields for potential data mining possibilities and develop a more applied approach to this problem.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation