Predicting Healthcare Fraud in Medicaid: A Multidimensional Data Model and Analysis Techniques for Fraud Detection
|
|
|
- Joella Bennett
- 10 years ago
- Views:
Transcription
1 Available online at ScienceDirect Procedia Technology 9 ( 2013 ) CENTERIS Conference on ENTERprise Information Systems / ProjMAN International Conference on Project MANagement / HCIST International Conference on Health and Social Care Information Systems and Technologies Predicting Healthcare Fraud in Medicaid: A Multidimensional Data Model and Analysis Techniques for Fraud Detection Dallas Thornton a *, Roland M. Mueller b, Paulus Schoutsen a, Jos van Hillegersberg c a San Diego Supercomputer Center, University of California, San Diego, 9500 Gilman Drive, La Jolla, CA, , USA b Department of Business and Economics, Berlin School of Economics and Law, Badensche Straße 52, Berlin, Germany c Department of Information Systems and Change Management, University of Twente, Drienerlolaan 5, 7522 NB Enschede, Netherlands Abstract It is estimated that approximately $700 billion is lost due to fraud, waste, and abuse in the US healthcare system. Medicaid has been particularly susceptible target for fraud in recent years, with a distributed management model, limited crossprogram communications, and a difficult-to-track patient population of low-income adults, their children, and people with certain disabilities. For effective fraud detection, one has to look at the data beyond the transaction-level. This paper builds upon Sparrow s fraud type classifications and the Medicaid environment and to develop a Medicaid multidimensional schema and provide a set of multidimensional data models and analysis techniques that help to predict the likelihood of fraudulent activities. These data views address the most prevalent known fraud types and should prove useful in discovering the unknown unknowns. The model is evaluated by functionally testing against known fraud cases The Authors 2013 Publishedby by Elsevier Ltd. Ltd. Open Selection access under and/or CC peer-review BY-NC-ND license. under responsibility of Selection and/or peer-review under responsibility of SCIKA Association for Promotion and Dissemination of CENTERIS/ProjMAN/HCIST. Scientific Knowledge Keywords: Fraud Detection; Predictive Analytics; Healthcare; Medicaid; Data Modeling * Corresponding author. Tel.: ; fax: address: [email protected] The Authors Published by Elsevier Ltd. Open access under CC BY-NC-ND license. Selection and/or peer-review under responsibility of SCIKA Association for Promotion and Dissemination of Scientific Knowledge doi: /j.protcy
2 Dallas Thornton et al. / Procedia Technology 9 ( 2013 ) Introduction Roughly one-third of the $2.7T spent on healthcare in the US is attributable to fraud, waste, and abuse [1]. Payers for healthcare services must deal with fraudulent practitioners, organized criminal schemes, and honest providers who make unintended mistakes while billing for their legitimate services. The US Medicaid system is particularly susceptible fraud and abuse, since it is harder to exclude problematic providers and is managed separately and with limited coordination across the states. Each state has program sovereignty and maintains its own eligibility and benefits criterion, making nationwide initiatives challenging. While there is undoubtedly an abundance of fraud in the system, states and the federal government lack sophisticated fraud control systems. Current systems are static, lack real time detection, and focus on detection in specific claim transactions without looking for patterns of suspicious behavior over time and the relationships and interactions between relevant entities. Fraud control is a risk management activity akin to others but with its unique challenges. In June 2002, Donald Rumsfeld, then United States Secretary of Defense, succinctly addressed the challenge [2]: The message is that there are no knowns. There are thing we know that we know. There are known unknowns. That is to say there are things that we now know we don't know. But there are also unknown unknowns. There are things we don't know we don't know. So when we do the best we can and we pull all this information together, and we then say well that's basically what we see as the situation, that is really only the known knowns and the known unknowns. And each year, we discover a few more of those unknown unknowns. This challenge of unknown unknowns faces program administrators looking to root out fraud in healthcare. New and existing data must be integrated, mastered, and utilized in new ways to discover the unknown unknowns. While we can be assured that this cat and mouse game will continue as fraudsters adapt to our new knowns and their countermeasures, we can undoubtedly make significant strides in detecting potential patterns of fraud, waste, and abuse in the system, ending these vulnerabilities and removing known bad actors. In this paper, we applied Hevner et al. [3] to help us develop a framework for fraud detection in Medicaid that provides specific data models and techniques that identify the most prevalent fraud schemes and should help identify the unknown unknowns. The environment, discussed in the first section, includes the payers, providers, and patients. The knowledge base, covered in section two, is represented by fraud detection literature and the state of the industry. Based on this analysis, in the third section we develop a multidimensional schema based on Medicaid data and describe a set of multidimensional models and techniques to detect fraud in large sets of claim transactions. In the fourth section, these artifacts are evaluated through functionally testing against known fraud schemes. As in the domain of risk management as a whole, healthcare fraud control must address the unknown unknowns. This paper offers a set of multidimensional data models and analysis techniques that can be used to detect the most prevalent known fraud types and should prove useful in detecting the unknown unknowns. 2. Environment The following definition of fraud from the US Department of Health and Human Services [4] will be used for the purposes of this paper: Fraud is the intentional deception or misrepresentation that an individual knows to be false or does not believe to be true and makes, knowing that the deception could result in some unauthorized benefit to himself/herself or some other person. Within the healthcare system three main parties commit fraud [5]: healthcare providers, beneficiaries (patients), and insurance carriers. Providers are the initiating actor for billing insurers, and, as such, quickly become the nexus for fraud schemes. When a provider participates in Medicaid, the provider agrees to the reimbursement rates set by the state and submits claims for payment directly to the state or managed care entity. If the provider is not participating in Medicaid,
3 1254 Dallas Thornton et al. / Procedia Technology 9 ( 2013 ) the provider sends the patient the bill, which he or she pays before requesting Medicaid reimbursement. The agency or insurer processes the claim and sends an explanation of benefits to the patient that describes the services paid for along with their codes and costs. States operate claims processing systems that perform various prepayment checks and edits to inspect the claim s legitimacy. Edits and audits verify information with honest providers in mind, but they are not designed to detect fraud schemes of any depth [6]. These systems simply cannot verify that the service was provided as claimed, that the diagnosis is correct, or whether the patient is even aware of the claimed services. Table 1 provides an analysis of the primary Medicaid actors that guides our antifraud framework design. Table 1. Medicaid Environment Overview Actor Patient Provider State Medicaid Agency / Insurer CMS (Federal) Roles Enroll in Enroll with Sets (comparatively low) Pay state matching funds on Medicaid. Medicaid. reimbursement rates. claims. Capabilities Characteristics Fraud / Anti- Fraud Strategies Structure and Culture Receive care. Receive EOB. Could: commit, conspire to commit, or report fraud. Wants to receive quality care at low out-ofpocket costs. Insurance identity theft has little direct impact on patient. Could: receive kickbacks, sell credentials, receive free services, or simply look the other way. Millions of independent actors. Provide care. Submit claims. Receive payment. Could: commit, conspire to commit, or report fraud. Desire quick reimbursement for services rendered. Unhappy with low reimbursement rates. Will opt-out of participation with significant burdens. Bad actors can sap millions quickly. Could: phantom bill, up code, unbundle, miscode, bribe patients, perform unnecessary services, or refer patients to collusive providers. Could also sell credentials for billing and/or be extorted by organized crime. Millions of independent actors. Enroll beneficiaries and providers. Pay legitimate claims. Prosecute fraudulent claims. Provide EOB to patient. Can analyze patients, providers, and claims within its jurisdiction. Want to reduce fraud / waste / abuse. Tight state budgets limit operational dollars available to combat fraud. Afraid of discovering fraud that is unrecoverable, as state is responsible for both loss and to reimburse federal matching funds. Afraid of impositions on providers pushing them out of the system, reducing access to care. Checks claims against known 'edits'. Performs some data analysis of state claims paid as a source of audits. Audits providers for reasonableness and accuracy. Prosecutes blatant fraud through the courts system. Excludes proven fraudulent providers. Struggle between pleasing providers and finding fraud. Program integrity usually in separate silo away from payment and Ensure state matching funds are well-spent. Could simplify data sharing across states. Could provide common tools for states to use for detecting fraud. Want to reduce fraud / waste / abuse. Afraid of impositions on providers that may push them out of the system, reducing access to care. Afraid of impositions on states that may reduce cooperation with federal initiatives such as ACA. Aggregates data at a national level for analysis. Supports focused state and interstate collaborations, auditing providers with the state and providing funding for specific anti-fraud collaboration efforts. Provides training to state staff. Prosecutes blatant fraud legally. Excludes fraudulent providers. Struggle between pleasing providers and finding fraud. Program integrity usually in separate silo away from payment
4 Dallas Thornton et al. / Procedia Technology 9 ( 2013 ) enrollment operations. and enrollment operations. Processes Receive services. EOBs sent to patient by insurer. Enroll in Medicaid. Provide care. Bill for care. Respond to audits. Maintain records. Provider and beneficiary enrollment. Claims payment process. Claims data extract process for CMS. Provider audit processes. Audit findings extrapolation process. Medicare provider and beneficiary enrollment. State data quality processes. State audit support and collaboration processes. 3. Knowledge Base 3.1. Classifying fraud According to Sparrow [6] there are two different types of fraud: hit-and-run and steal a little, all the time. Hit-and-run perpetrators simply submit many fraudulent claims, receive payment, and disappear. Steal a little, all the time perpetrators work to ensure fraud goes unnoticed and bill fraudulently over a long period of time. The provider may hide false claims within large batches of valid claims and, when caught, will claim it an error, repay the money, and continue the behavior. The FBI [7] highlights and categorizes some of the most prevalent known Medicaid fraud schemes: Phantom Billing Submitting claims for services not provided. Duplicate Billing Submitting similar claims more than once. Bill Padding Submitting claims for unneeded ancillary services to Medicaid. Upcoding Billing for a service with a higher reimbursement rate than the service provided. Unbundling Submitting several claims for various services that should only be billed as one service. Excessive or Unnecessary Services Provides medically excessive or unnecessary services to a patient. Kickbacks A kickback is a form of negotiated bribery in which a commission is paid to the bribe-taker (provider or patient) as a quid pro quo for services rendered [8]. Sparrow [6] proposes that for effective fraud detection one has to look at the data beyond the transaction level, defining seven levels of healthcare fraud control (see Table 2). Table 2. Levels of healthcare fraud control, adapted, from Sparrow [6] Level Focus Level 1 Single Claim, or Transaction The claim itself and the related provider and the patient. Level 2 Patient / Provider One patient, one provider, and all of their claims. Level 3 a. Patient One patient and all of its claims and related providers. b. Provider One provider and all of its claims and related patients. Level 4 a. Insurer Policy / Provider Patients that are covered by the same insurance policy and are targeted by one provider. b. Patient / Provider Group One patient being targeted by multiple providers within a practice. Level 5 Insurer Policy / Provider Patients with the same policy being targeted by multiple providers within a practice. Group Level 6 a. Defined Patient Group Groups of patients being targeted by providers. (e.g. patients living in the same location) b. Provider Group Groups of providers targeting their patients. Groups can be providers within the same practice, clinics, hospitals, or other arrangements. Level 7 Multiparty, Criminal Conspiracies Multiparty conspiracies that could involve many relationships.
5 1256 Dallas Thornton et al. / Procedia Technology 9 ( 2013 ) Each higher level involves larger fraud schemes with more people involved and an increased difficulty of being detected. According to Sparrow [6] the bulk of the industry s detection toolkit is focused at level 1 and 3. Before payment, the transaction (level 1) and patient level (level 3a) may be evaluated. For example, are there claims for multiple childbirths within 9 months? Post payment analysis may focus on the provider level (level 3b). For example, is a doctor billing more hours of office visits than possible? 3.2. Healthcare fraud detection literature The literature about fraud within the healthcare can be divided into three categories. The first category provides an overview of the field. It focuses on what kind of statistical methods can be used. For example, Travaille et al. [9] created an overview of statistical methods used by fraud detection within other industries and how they can be applied within the healthcare industry. Li et al. [5] surveyed healthcare industry methods and found combinations of unsupervised and supervised methods used together with profiling. The second category provides results on actual applications of the methods to find its usefulness in detecting fraud. For example Copeland et al. [10] discussed unsupervised methods to find Medicaid fraud within Nevada. Yang and Hwang [11] looked at using the order of which services are performed for fraud detection. This category helps in choosing a method for fraud detection by being able to compare the results of individual methods. The third category is focused on general methods and models to improve fraud detection. For example Morris [12] describes five key components how the current health system has to change to better battle fraud. Major and Riedinger [13] describe a workflow and system to setup fraud detection departments with results of its use in the real world. Similar work was done by Ortega et al. [14], who introduced a data mining based system that decreased the time it takes to detect fraud by 76% from an average of 8.6 months to 2 months. Because Major and Riedinger and Ortega et al., describe real systems that are used to find fraud they cannot go into details of the exact working of the systems. Doing this would give fraud perpetrators an advantage on penetrating the fraud defense. This paper belongs in this third category and focuses on building data views and applied techniques for predictive analytics based on Sparrow s seven levels of fraud control. 4. A Multidimensional Data Model and Analysis Techniques for Fraud Detection 4.1. A Medicaid multidimensional schema In this section, we present the design of a multidimensional schema that based on Medicaid data will underpin our analysis and allow for the creation of different views of that data that address Sparrow s classification of fraud types. Medicaid providers use four different claim forms to submit claims to the source system: CMS1500 for outpatient professional services, J400 for dental services, UB-04 for institutional claims, and the Drug Claim Form for pharmacy claims. These claims vary slightly in the information collected by purpose, but the general data structure is similar, defining who did what to whom when and why. To maintain the data granularity and specificity, four different claim types: inpatient, long term, pharmacy and professional will be introduced. It should be noted that, as the data is specific to the type of service provided, most commercial insurance claims follow a similar template. A general core that each claim exists of can be extracted among the different claim forms: patient, provider, diagnoses, procedures, and amounts charged. In our model, the fact table represents a single line from a claim to offer the most flexibility to the user. For each claim-line, a type field links to type-specific detailed information. Based on the desired views from the last section, the following dimensions are included: date (claim filed, service, paid), provider (executing, referring, billing), patient, insurer policy, treatment,
6 Dallas Thornton et al. / Procedia Technology 9 ( 2013 ) diagnosis, claim type, drug, outcome, location. The following numeric facts can be distinguished, some computed by the other facts: Covered charges ($), Non-covered charges ($), Total charges ($), Units of service, Number of days between claim filled and paid, Number of days between service and claim paid, Distance between provider and patient, Number of days between service and claim filled, Covered price per unit, Total price per unit, and Treatment duration. Figure 1 shows the resulting multidimensional schema. Fig. 1. Medicaid Multidimensional Schema 4.2. Data models addressing levels of fraud Based on the Medicaid environment and available knowledge base, we developed multidimensional data models representative of Sparrow s fraud classifications and accompanying analysis techniques for detecting the most prevalent fraud types at each level. Fig. 2. Level 1 Entities -- Single Claim, or Transaction Level 1 depicts what today s claims processing systems see: one claim, with its relevant patient and provider. Typically decisions possible at this level are programmed as edits in claims processing system to prevent fraud. Using this level, for example, one can reject duplicate services on a claim and check to see that services are consistent with diagnosis code(s). Fig. 3. Level 2 Entities -- Patient / Provider Level 2 focuses on the relationship between a patient and a provider, including all claims billed. Duplicate billing can be flagged by checking all claims for duplicate provider, patient, and service date. Unbundling could be discovered looking for multiple services from the same provider across claims that should have been grouped. Excessive or unnecessary services could surface when care patterns do not match diagnoses.
7 1258 Dallas Thornton et al. / Procedia Technology 9 ( 2013 ) Fig 4. Level 3a Entities -- Patient Level 3a shows all claims and providers treating a single patient. Phantom billing could be discovered looking at the patient claims vs. prior medical history. How does the patient's temporal claims pattern compare with other patients? One could search for claims that seem unreasonable, such as medically impossible services given known history or services on the same day at two locations far apart. This is the best place to see duplicate billing, checking for all claims for duplicate service performed on the same date across all providers. Upcoding could be discovered looking at claims across providers for consistency. For example, a cardiologist billing for a complicated open heart surgery with an anesthesiologist billing for a simple procedure on the same date of service is suspicious. Unbundling schemes could also surface analyzing multiple providers providing components of a bundled service to one patient. Excessive or unnecessary services across providers can be found by comparing the patient s service pattern with others with similar diagnosis codes. One can also identify groups of providers through utilization coincidence across patient profiles at this level. These groups are important in detecting more complex fraud schemes in 4b and 6b. Fig. 5. Level 3b Entities -- Provider Level 3b exposes the provider. A wealth of knowledge can be gained by simply analyzing the provider s service distribution and frequency against peers. Clustering analysis of these profiles shows clusters of specialists. Distribution outliers and frequency outliers should be evaluated by medical subject matter experts for legitimacy. Geospatial analysis of patient distance to provider in this model adds additional detail. This is one of the best views to spot phantom billing, upcoding, unbundling, and excessive or unnecessary services. Fig. 6. Level 4a Entities -- Insurer Policy / Provider Level 4a focuses on analyzing claim pattern differences across different insurance policies or insurers. This could expose providers targeting specific insurers. Patient distributions across insurers are a telling story, as most providers have a somewhat diverse patient base. Providers with high proportions of patients and claims billing specific programs, especially government ones, should be evaluated closely. Phantom billing,
8 Dallas Thornton et al. / Procedia Technology 9 ( 2013 ) upcoding, unbundling, excessive or unnecessary services, and kickbacks could surface with this analysis. Unfortunately, multiple insurer data is rarely available for this analysis. Fig. 7. Level 4b Entities -- Patient / Provider Group Level 4b looks at all claims for one patient across a known group of providers such as a common clinic. Here, fraud schemes directed within the group and spread amongst providers may stand out. Level 6b is a more effective model for analyzing more complex schemes, and 3a and 3b cover simpler methods. Fig. 8. Level 5 Entities -- Insurer Policy / Provider Group Level 5 is a combination of level 4a and 4b, showing policy-based variations in a provider group s services. This should be used to evaluate the provider group's insurance billing distribution compared with his/her peers distribution with a similar patient demographic sampling. Referral patterns may also show policyspecific variations that could be explainable or not. Similar or identical service patterns from the same providers in the group to many patients varying by insurance should be evaluated for reasonableness. Fig. 9. Level 6a Entities -- Defined Patient Group Level 6a focuses on patient groups, such as residents of a common nursing home. Here, one would compare claims profiles for patients within the group to similar individuals outside the group. Are the services claimed normal demographically? Are certain providers disproportionately servicing this group with services that would not be commonly needed in the environment? For example, does every patient receive orthotic
9 1260 Dallas Thornton et al. / Procedia Technology 9 ( 2013 ) shoe inserts from a provider? This may seem normal when looking at a DME provider alone in 3b, but overlaying the patient group in 6a connects these patients in a disproportionate way and highlights possible excessive or unnecessary services. Numerous common patient mailing addresses, projected here in a patient group, could point to identity theft where a billing provider has changed the patient s address to phantom bill. Fig. 10. Level 6b Entities -- Provider Group Level 6b looks at all claims across a known provider group. Since providers work together and can also bill individually or through clinics or hospitals, this is one of the most useful views of the data. Clustering analysis of the group s service distribution will highlight like groups and identify outlier groups for further analysis. Link analysis of referrals and/or prescriptions along with frequency comparisons with similar provider groups can help detect excessive or unnecessary services that cross provider lines but enrich the group as a whole. Fig. 11. Level 7 Entities -- Multiparty, Criminal Conspiracies According to Sparrow [6] the art of detection at this level involves watching for broad patterns of coincidence or connection between hundreds or thousands of otherwise innocuous transactions. Level 7 combines all previous data views and concerns all fraud that is part of criminal networks which involve many different beneficiaries and/or providers. This much larger data view, spanning billions of claims in the case of Medicaid, is the most rich, delivering the ability to perform complex network analysis that could detect intricate conspiracies. However, performance of analysis here will be much lower than in previous levels. So, it is best for targeted analysis that could not be performed in lower-level views Using the views to detect fraud As we discussed in each level, it is important for the analyst to know where to look to find specific kinds of fraud. Table 3 maps the six most common types of fraud to the levels that they will most likely be found.
10 Dallas Thornton et al. / Procedia Technology 9 ( 2013 ) Table 3. Level Usefulness in Detecting Prevalent Fraud Types Phantom Billing Duplicate Billing Upcoding Unbundling Excessive or Unnecessary Services Level 1 Single Claim, or Transaction * * Level 2 Patient / Provider * * * Level 3 a. Patient * *** * *** * b. Provider ** *** * *** Level 4 a. Insurer Policy / Provider ** * ** ** * b. Patient / Provider Group * * * * * Level 5 Insurer Policy / Provider Group ** ** ** ** * Level 6 a. Defined Patient Group ** * * ** ** b. Provider Group ** *** ** *** * Level 7 Multiparty, Criminal Conspiracies ** ** * ** *** 5. Evaluation Usefulness: * Low Kickbacks ** Medium *** High We will evaluate this model and process by subjecting it to a variety of recent healthcare fraud cases. These real-world cases will be mapped against the data models and methods suggested in this paper to test whether the fraud could be detected. Fig. 12. Case 1: HIV injection and infusion Medicare fraud scheme In a case published by the United States Department of Justice [15], a physician, Rene De Los Rios, was convicted of five felony fraud counts for her part in a Medicare fraud scheme, defrauding the government of $23M in collusion with an HIV infusion clinic, Metro Med. In 2003, Metro Med began operating as an HIV infusion clinic that purportedly provided injection and infusion therapies to HIV positive Medicare beneficiaries. In fact, these services were medically unnecessary and not provided. Metro Med paid cash kickback payments to patients for their collusion. De Los Rios was paid to be the licensed physician that would to order tests, sign medical forms and charts (often never seeing a patient), and make it appear that legitimate medical services were being provided. He diagnosed almost all of the patients with the same rare blood disorders to maximize Medicare reimbursements and prescribed expensive medications such as Winrho, Procrit, and Neupogen, to further bill Medicare. Metro Med paid the defendant $3,000 per week for his involvement in the scheme. The Figure 12 visualizes that was happening.
11 1262 Dallas Thornton et al. / Procedia Technology 9 ( 2013 ) This scheme includes multiple types of fraud, including phantom billing, medically unnecessary services, and kickbacks. To detect this and similar schemes, one could compare physician service profiles with their peers using the level 3b data model. Dr. De Los Rios s excessive diagnosis of a rare blood disorder and/or abnormal, expensive prescriptions would have been an outlier that could have pointed to this problem. Identifying these patients as a suspect patient group, level 6a would show the other providers (the clinic and possibly more) that could be involved in this scheme. Fig. 13. Case 2: False claims to Medicare for durable medical equipment In another case [16], California doctors and colluding durable medical equipment (DME) suppliers allegedly submitted over $5M in false claims to Medicare. The defendants prescribed and billed for enteral nutrition, a liquid nutritional supplement provided via feeding tube directly into the stomach, duodenum or jejunum. The doctors, Dr. Augustus Ohemeng and Dr. George Tarryk, wrote fraudulent prescriptions for patients who did not have feeding tubes. George Laing, who managed the clinic where Tarryk and Ohemeng practiced, allegedly received kickbacks in exchange for referring the prescriptions to Ivy Medical Supply. Ivy then fraudulently billed Medicare for the enteral nutrition, even though it was not medically necessary and was not delivered to patients in the quantities billed to Medicare. This scheme also includes multiple types of fraud, including phantom billing, medically unnecessary services, and kickbacks. Using level 3a, comparing the service pattern of these patients with their peers would highlight the fact that their patients were not previously billed for surgically inserting a feeding tube. This could be explained if the feeding tube was inserted while enrolled in a different health insurance, but the cluster of these patients would stand out nonetheless. Linking these patients together to look at their servicing providers would highlight the actors involved in this scheme. Alternately, abnormally high prescribing patterns for enteral nutrition could be seen in level 3b when comparing the prescribing pattern of the two doctors to their peers. Identifying these patients as a suspect patient group, level 6a would show the other providers (the clinic and possibly more) that could be involved in this scheme.
12 Dallas Thornton et al. / Procedia Technology 9 ( 2013 ) Fig. 14. Case 3: Billing Medicare for unnecessary expensive, high-end power wheelchairs and orthotics A 2012 case involving $14.2M in Medicare fraud [17] showed a DME company purchased both fraudulent prescriptions and patient information to fraudulently bill Medicare for expensive, high-end power wheelchairs and orthotics that were medically unnecessary or never provided. Company owners hid the money they used to pay for these fraudulent prescriptions by writing checks to a third shell company called Direct Supply. The checks would then be cashed and the money used to pay kickbacks to street-level marketers offering free power wheelchairs and other DME in exchange for Medicare IDs and personal information. This information would then be used to create fraudulent prescriptions. Depicted in Figure 14, this scheme includes multiple types of fraud, including phantom billing, upcoding, medically unnecessary services, and kickbacks. This fraud scheme is difficult to detect due to the number of actors and likely multiple (faked) prescribing physicians. However, the model may uncover this fraud over time through various analyses: Level 3b: Is the DME provider s service distribution abnormal compared to peers? Only billing for highend wheelchairs may stick out, though it could be explained if the company only sold high-end models. Level 3b: Is the company showing unnatural growth patterns? Business are built to grow and can do so quickly, but does this agree with the multitude of prescribing physicians? Put another way, a business usually grows quickly by taking on a large customer/referrer, such as becoming the preferred supplier for a hospital vs. tens or hundreds of independent prescribing physicians. This aberrance may show up. Level 3a: A third, and likely more telling, indicator could come from analysis of the patient temporal claims patterns compared with other patients. That these patients did not have prior mobility-related claims before should both set them apart from peers. Then analyzing the suspect patient group using level 6a would show the other providers (the clinic and possibly more) that could be involved (the common DME supplier) or compromised (the supposed referring physicians) in this scheme. 6. Conclusion We structure our design science contribution according to the guidelines of Hevner et al. [3]. The research addresses a relevant and important problem in Medicaid healthcare fraud detection. This paper offers artifacts including a set of multidimensional data models and analysis techniques for healthcare fraud detection along with a projection of these models to a Medicaid-specific schema that would accommodate this analysis. The artifacts are evaluated by discussing their potential in detecting three cases of healthcare fraud. The paper contributes to the literature by mapping the different levels of Sparrow [6] to a set of multidimensional data models and analysis techniques useful at each level for fraud detection. The representation of the artifact used data modeling as a construction method and was evaluated to a list of the most prominent healthcare fraud
13 1264 Dallas Thornton et al. / Procedia Technology 9 ( 2013 ) types. We used the domain context of Medicaid and discussed different design alternatives. We communicated the model to stakeholders in Medicaid, including applying the multidimensional schema in practice. Through this research, we learned many lessons about antifraud efforts. Significant healthcare subject matter expertise is required to design analysis techniques and interpret their results. Potential entity relationships, medical necessity, and legitimacy in the context of finding the unknown unknowns are extremely difficult to comprehensively model. Our artifacts provide a roadmap that can guide an analyst that evaluates the detected patterns. Lack of training data (marked fraudulent claims) today complicates the application of supervised techniques in the space. It is envisioned that, as models such as these are applied and used by fraud analysts in a structured environment, we can develop training data based on analyst decisions, both around likely fraudulent and likely appropriate claims, further enriching the data and opening doors to supervised techniques. The quest to identify the unknown unknowns in healthcare fraud will never end, but with structured data models, analysis techniques, and continual feedback, we can advance the state of the art in fraud detection and make inroads into an important societal challenge. References [1] Kelley RR. Where can $700 Billion in Waste be cut annually from the US Healthcare System? Thomson Reuters 2009; TR /09 LW. [2] Rumsfeld D. Defense.gov News Transcript: Secretary Rumsfeld Press Conference at NATO Headquarters; Retrieved , from [3] Hevner AR, March ST, Park J, Ram S. Design science in information systems research. MIS Quarterly 2004; 28, 1: [4] Department of Health and Human Services. Medicare A/B Reference Manual - Chapter 21 - Benefit Integrity and Program Safeguard Contractors; Retrieved , from [5] Li J, Huang K-Y, Jin J, Shi J. A survey on statistical methods for health care fraud detection. Health Care Management Science 2008; 11, 3: [6] Sparrow MK. License To Steal: How Fraud bleeds America's health care system. Boulder: Westview Press; [7] FBI Financial Crimes Report; Retrieved , from [8] Albrecht WS, Albrecht CC, Albrecht CO, Zimbelman MF. Fraud Examination. Mason, Ohio: Cengage Learning; [9] Travaille P, Müller RM, Thornton D, Hillegersberg J van. Electronic Fraud Detection in the U.S. Medicaid Healthcare Program: Lessons Learned from other Industries. In: Proceedings of the 17th Americas Conference on Information Systems (AMCIS), Detroit, USA, AIS; [10] Copeland L, Edberg D, Panorska AK, Wendel J. Applying Business Intelligence Concepts to Medicaid Claim Fraud Detection. Journal of Information Systems Applied Research 2012; 5, 1: [11] Yang W-S, Hwang S-Y. A process-mining framework for the detection of healthcare fraud and abuse. Expert Systems with Applications 2006; 31, 1, [12] Morris L. Combating Fraud In Health Care: An Essential Component Of Any Cost Containment Strategy. Health Affairs 2009; 28, 5, [13] Major JA, Riedinger DR. EFD: A Hybrid Knowledge/Statistical-Based System for the Detection of Fraud. The Journal of Risk and Insurance 2002; 69, 3, [14] Ortega PA, Figueroa CJ, Ruz GA. A medical claim fraud/abuse detection system based on data mining: a case study in Chile. DMIN 2006; 6, [15] United States Department of Justice. Miami Doctor Convicted in $23 Million Medicare Fraud Scheme; Retrieved , from [16] United States Department of Justice. 8 Los Angeles-Area Residents Charged In Nationwide Medicare Fraud Strike Force Takedown; Retrieved , from [17] United States Department of Justice. Los Angeles Church Pastor Sentenced to Serve 36 Months in Prison for $14.2 Million Medicare Fraud Scheme; Retrieved , from
Stopping the Flow of Health Care Fraud with Technology, Data and Analytics
White Paper and New Ways to Fight It Stopping the Flow of Health Care Fraud with Technology, Data and Analytics January 2014 Health care costs are rising and everyone is being affected, including patients,
National Medicare fraud takedown results in charges against 243 individuals for approximately $712 million in false billing
National Medicare fraud takedown results in charges against 243 individuals for approximately $712 million in false billing Most defendants charged and largest alleged loss amount in Strike Force history
Medicare Fraud. Programs supported by HCFAC have returned more money to the Medicare Trust Funds than the dollars spent to combat the fraud.
Medicare Fraud Medicare loses billions of dollars annually in fraud an estimated $60 billion in 2012 alone. In addition to outright criminal activity, the Dartmouth Atlas of Health Care (which studies
Medicare Fraud & ID Theft Prevention
Medicare Fraud & ID Theft Prevention 2013 SMP National Training Meeting Washington, D.C. August 5, 2013 Margaret Peggy Sparr, Director Program Integrity Enforcement Group (PIEG) Center for Program Integrity,
SAS Fraud Framework for Health Care Evolution and Learnings
SAS Fraud Framework for Health Care Evolution and Learnings Julie Malida, Principal for Health Care Fraud, SAS Jay King, Manager, Advanced Analytics Lab, SAS Copyright 2009, SAS Institute Inc. All rights
Medicare 101. Presented by Area Agency on Aging 1-A
Medicare 101 Presented by Area Agency on Aging 1-A What is Medicare? n Federal Health Insurance for: n People 65 years of age or older n Some persons with disabilities, after a 24 month waiting period
SECTION 18 1 FRAUD, WASTE AND ABUSE
SECTION 18 1 FRAUD, WASTE AND ABUSE Annual FW&A Training Required for Providers and Office Staff 1 Examples of Fraud, Waste and Abuse 2 Fraud, Waste and Abuse Program Policy 3 Suspected Non-Compliance
Medicare Advantage and Part D Fraud, Waste, and Abuse Training. October 2010
Medicare Advantage and Part D Fraud, Waste, and Abuse Training October 2010 Introduction 2008: United States spent $2.3 trillion on health care. Federal fiscal year 2010: Medicare expected to cover an
Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011
Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011 Y0067_H2816_H6169_WEB_UAMC IA 11/22/2010 Last Updated: 11/22/2010 Medicare Requirements The Centers for Medicare and Medicaid
MEDICARE RECOVERY AUDIT CONTRACTORS AND CMS S ACTIONS TO ADDRESS IMPROPER PAYMENTS, REFERRALS OF POTENTIAL FRAUD, AND PERFORMANCE
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL MEDICARE RECOVERY AUDIT CONTRACTORS AND CMS S ACTIONS TO ADDRESS IMPROPER PAYMENTS, REFERRALS OF POTENTIAL FRAUD, AND PERFORMANCE Daniel
Outlier-based Health Insurance Fraud Detection for U.S. Medicaid Data
Outlier-based Health Insurance Fraud Detection for U.S. Medicaid Data Dallas Thornton 1, Guido van Capelleveen 1, Mannes Poel 2, Jos van Hillegersberg 2 and Roland M. Mueller 3 1 University of California,
MODULE 11: NEW YORK STATE SENIOR MEDICARE PATROL (SMP) HEALTH CARE FRAUD, WASTE AND ABUSE
MODULE 11: NEW YORK STATE SENIOR MEDICARE PATROL (SMP) HEALTH CARE FRAUD, WASTE AND ABUSE Project Goals Empowering Seniors to Prevent Healthcare Fraud. To raise awareness of and prevent Medicare and Medicaid
Combating Fraud, Waste, and Abuse in Healthcare
Combating Fraud, Waste, and Abuse in Healthcare ABSTRACT This paper discusses how real time analytics and event intelligence technologies can be used to analyze, detect, and prevent fraud, waste, and abuse
Client Perspectives and Case Studies. Ted Doyle, VP, Fraud Analytics Client and Industry Innovation, OptumInsight
Client Perspectives and Case Studies Ted Doyle, VP, Fraud Analytics Client and Industry Innovation, OptumInsight The right way to play the fraud-control game is to rely on people and to equip them with
How To Get A Medical License In Michigan
FRAUD, WASTE, & ABUSE Kimberly Parks NEIGHBORHOOD LEGAL SERVICES MICHIGAN ELDER LAW & ADVOCACY CENTER 12121 Hemingway Redford, Michigan 48239 (313) 937-8291 Why It s Important Fraud, Waste and Abuse drain
Electronic Fraud Detection in the U.S. Medicaid Healthcare Program
Electronic Fraud Detection in the U.S. Medicaid Healthcare Program MSc Thesis Peter Travaille, 26 th of January, 2011 1 2 Fraud control is a miserable business. Failure to detect fraud is bad news; finding
From Chase to Prevention. Stopping Healthcare Fraud Before it Happens
From Chase to Prevention Stopping Healthcare Fraud Before it Happens Healthcare fraud, waste, and abuse cost taxpayers tens of billions of dollars per year, with Medicare and Medicaid fraud alone estimated
Outlier based Predictors for Health Insurance Fraud Detection within U.S. Medicaid. Guido Cornelis van Capelleveen
Outlier based Predictors for Health Insurance Fraud Detection within U.S. Medicaid by Guido Cornelis van Capelleveen B.Sc., Utrecht University (2012) Submitted to the School of Management and Governance
Addressing Government Investigations. Marcos Daniel Jimenez Partner
Addressing Government Investigations Marcos Daniel Jimenez Partner November 14, 2014 Agenda Statistics Key Players Fraud and Abuse Laws Potential Consequences Mitigation Strategies 2 Key Health Care Fraud
Fraud Waste and Abuse Training First Tier, Downstream and Related Entities. ONECare by Care1st Health Plan Arizona, Inc. (HMO) Revised: 10/2009
Fraud Waste and Abuse Training First Tier, Downstream and Related Entities ONECare by Care1st Health Plan Arizona, Inc. (HMO) Revised: 10/2009 Overview Purpose Care1st/ ONECare Compliance Program Definitions
Medical Fraud Detection Through Data Mining Megaputer Case Study www.megaputer.com Megaputer Intelligence, Inc. 120 West Seventh Street, Suite 310 Bloomington, IN 47404, USA +1 812-330-0110 Medical Fraud
Using Analytics to detect and prevent Healthcare fraud. Copyright 2010 SAS Institute Inc. All rights reserved.
Using Analytics to detect and prevent Healthcare fraud Copyright 2010 SAS Institute Inc. All rights reserved. Agenda Introductions International Fraud Trends Overview of the use of Analytics in Healthcare
How To Get A Medical Bill Of Health From A Member Of A Health Care Provider
Neighborhood requires compliance with all laws applicable to the organization s business, including insistence on compliance with all applicable federal and state laws dealing with false claims and false
Source of cases. Who investigates. Today s Goals. Why else am I here? So, why am I here? You Can Help! 10/9/2015
So, why am I here? You Can Help! By: Meghan K. Roche, Assistant United States Attorney DISCLAIMER: The opinions contained herein are not representative and/or binding on the United States and its agencies.
Fraud Waste and Abuse Training First Tier, Downstream and Related Entities
Fraud Waste and Abuse Training First Tier, Downstream and Related Entities Revised: 04/2010 OVERVIEW Centene Corporation Purpose Bridgeway Compliance Program Definitions of Fraud Waste & Abuse Laws and
The Predictive Fraud and Abuse Analytic and Risk Management System
The Predictive Fraud and Abuse Analytic and Risk Management System Empowering healthcare payers and stakeholders in preventing and recovering fraudulent healthcare payments IkaIntegrity : Your real-time
Fraud, Waste & Abuse. UPMC Health Plan Quality Audit, Fraud, Waste & Abuse Department
Fraud, Waste & Abuse UPMC Health Plan Quality Audit, Fraud, Waste & Abuse Department Definitions of Fraud, Waste & Abuse FRAUD: An intentional deception or misrepresentation made by a person or entity,
Special Investigations Unit (SIU) Coding and Auditing of Behavioral Health Services
Special Investigations Unit (SIU) Coding and Auditing of Behavioral Health Services Agenda Overview of changes ahead for Optum and Program Integrity o Introduction of new Executive Lead o Why we are in
Research Brief: Insurers Efforts to Prevent Health Care Fraud
Research Brief: Insurers Efforts to Prevent Health Care Fraud January 2011 The issue of fraud prevention has emerged with a new sense of urgency among administrators of public health insurance programs.
Fraud Waste and Abuse Training Requirement. To Whom It May Concern:
RE: Fraud Waste and Abuse Training Requirement To Whom It May Concern: This letter is to inform you about a new requirement being implemented by the CMS program (Centers for Medicare and Medicaid Services)
Fraud, Waste and Abuse Network Pharmacy Training 2011
Fraud, Waste and Abuse Network Pharmacy Training 2011 Table of Contents Centers for Medicare & Medicaid Services (CMS) Role Important Federal Statutes for Medicare Participants Fraud, Waste and Abuse Defined
Medicare Compliance and Fraud, Waste, and Abuse Training
Medicare Compliance and Fraud, Waste, and Abuse Training Objectives Recognize laws and concepts affecting compliance and fraud, waste, and abuse (FWA) Increase awareness of FWA Use identification techniques
Fraud Waste & A buse
5 Fraud Waste & Abuse Fraud, Waste and Abuse Detecting and preventing fraud, waste and abuse Harvard Pilgrim is committed to detecting, mitigating and preventing fraud, waste and abuse. Providers are also
Strengthening Medicare: Better Health, Better Care, Lower Costs Efforts Will Save Nearly $120 Billion for Medicare Over Five Years.
Strengthening Medicare: Better Health, Better Care, Lower Costs Efforts Will Save Nearly $120 Billion for Medicare Over Five Years Introduction The Centers for Medicare and Medicaid Services (CMS) and
Fraud, Waste and Abuse Training. Protecting the Health Care Investment. Section Three
Fraud, Waste and Abuse Training Protecting the Health Care Investment Section Three Section 1.2: Purpose According to the National Health Care Anti-Fraud Association, the United States spends more than
2015 National Training Program
2015 National Training Program Module 10 Medicare and Medicaid Fraud and Abuse Prevention Session Objectives This session should help you Define fraud and abuse Identify causes of improper payments Discuss
Touchstone Health Training Guide: Fraud, Waste and Abuse Prevention
Touchstone Health Training Guide: Fraud, Waste and Abuse Prevention About the Training Guide Touchstone is providing this Fraud, Waste and Abuse Prevention Training Guide as a resource for meeting Centers
Fraud and Abuse and How it Affects the Coder
Fraud and Abuse and How it Affects the Coder Presented by: Laura E Hill, CPC, CPC-I, MCS-P What is Fraud? In the simplest terms, fraud occurs when someone knowingly and with intent to defraud, presents
An Innocent Mistake or Intentional Deceit? How ICD-10 is blurring the line in Healthcare Fraud Detection
An Innocent Mistake or Intentional Deceit? How ICD-10 is blurring the line in Healthcare Fraud Detection October 2012 Whitepaper Series Issue No. 7 Copyright 2012 Jvion LLC All Rights Reserved 1 that are
Developed by the Centers for Medicare & Medicaid Services
Developed by the Centers for Medicare & Medicaid Services Every year millions of dollars are improperly spent because of fraud, waste, and abuse. It affects everyone. Including YOU. This training will
QUESTIONABLE BILLING FOR MEDICARE PART B CLINICAL LABORATORY SERVICES
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL QUESTIONABLE BILLING FOR MEDICARE PART B CLINICAL LABORATORY SERVICES Brian P. Ritchie Acting Deputy Inspector General for Evaluation
Avoiding Medicaid Fraud. Odyssey House of Utah Questions? Contact your Program Director or Emily Capito, Director of Operations
Avoiding Medicaid Fraud Odyssey House of Utah Questions? Contact your Program Director or Emily Capito, Director of Operations MEDICAID FRAUD OVERVIEW Medicaid Fraud The Medicaid Program provides medical
HEALTH CARE FRAUD. Information on Most Common Schemes and the Likely Effect of Smart Cards
United States Government Accountability Office Report to Congressional Requesters January 2016 HEALTH CARE FRAUD Information on Most Common Schemes and the Likely Effect of Smart Cards GAO-16-216 January
Prevention and Early Detection of Health Care Fraud, Waste, and Abuse
National Health Policy Forum Prevention and Early Detection of Health Care Fraud, Waste, and Abuse October 30, 2009 Edward Litchko Senior Director Corporate & Financial Investigations Department Independence
Charging, Coding and Billing Compliance 9510-04-10
GWINNETT HOSPITAL SYSTEM CORPORATE COMPLIANCE Charging, Coding and Billing Compliance 9510-04-10 Original Date Review Dates Revision Dates 01/2007 05/2009 POLICY Gwinnett Health System, Inc. (GHS), and
Presentation to the Senate Finance Medicaid Subcommittee: Prevention and Detection of Fraud, Waste and Abuse
Presentation to the Senate Finance Medicaid Subcommittee: Prevention and Detection of Fraud, Waste and Abuse Douglas Wilson, Interim Inspector General Billy Millwee, Associate Commissioner for Medicaid/CHIP
Compliance and Program Integrity Melanie Bicigo, CHC, CEBS [email protected] 906-225-7749
Compliance and Program Integrity Melanie Bicigo, CHC, CEBS [email protected] 906-225-7749 Define compliance and compliance program requirements Communicate Upper Peninsula Health Plan (UPHP) compliance
Combating Fraud, Waste and Abuse
Combating Fraud, Waste and Abuse SPECIAL INVESTIGATIONS UNIT OUTSOURCING Fraud investigation is as complex as piecing together an intricate puzzle. Re-imagine Your Fraud, Waste and Abuse Management Strategy
Fraud, Waste, and Abuse
These training materials are divided into three topics to meet the responsibilities stated on the previous pages: Fraud, Waste, Compliance Program Standards of Conduct Although the information contained
Stark, False Claims and Anti- Kickback Laws: Easy Ways to Stay Compliant with the Big Three in Healthcare
Stark, False Claims and Anti- Kickback Laws: Easy Ways to Stay Compliant with the Big Three in Healthcare In health care, we are blessed with an abundance of rules, policies, standards and laws. In Health
Prime Staffing-Fraud, Waste and Abuse Prevention Training Guide Designed for First-tier, Downstream and Related Entities
Prime Staffing-Fraud, Waste and Abuse Prevention Training Guide Designed for First-tier, Downstream and Related Entities Prime Staffing is providing this Fraud, Waste and Abuse Prevention Training Guide
LMHS COMPLIANCE ORIENTATION Physicians and Midlevel Providers. Avoiding Medicare and Medicaid Fraud & Abuse
LMHS COMPLIANCE ORIENTATION Physicians and Midlevel Providers Avoiding Medicare and Medicaid Fraud & Abuse Revised 06/03/2014 LMHS COMPLIANCE PROGRAM 6/30/2014 2 Chief Compliance Officer Catherine A. Kahle,
Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance
Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance 3.1 Introduction This research has been conducted at back office of a medical billing company situated in a custom
Provider Training Series The Search for Compliance Annual Mandatory Training for all Providers
Provider Training Series The Search for Compliance Annual Mandatory Training for all Providers Melissa Hooks, Director of Program Integrity Annual Training for All Providers Compliance with Medicaid Detection
CMS Mandated Training for Providers, First Tier, Downstream and Related Entities
CMS Mandated Training for Providers, First Tier, Downstream and Related Entities I. INTRODUCTION It is the practice of Midwest Health Plan (MHP) to conduct its business with the highest degree of ethics
MODULE II: MEDICARE & MEDICAID FRAUD, WASTE, AND ABUSE TRAINING
MODULE II: MEDICARE & MEDICAID FRAUD, WASTE, AND ABUSE TRAINING 2 0 1 4 Introduction The Medicare and Medicaid programs are governed by statutes, regulations, and policies PacificSource must have an effective
EQR PROTOCOL 4 VALIDATION OF ENCOUNTER DATA REPORTED BY THE MCO
OMB Approval No. 0938-0786 EQR PROTOCOL 4 VALIDATION OF ENCOUNTER DATA REPORTED BY THE MCO A Voluntary Protocol for External Quality Review (EQR) Protocol 1: Assessment of Compliance with Medicaid Managed
MEDICARE DRUG INTEGRITY CONTRACTORS IDENTIFICATION
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL MEDICARE DRUG INTEGRITY CONTRACTORS IDENTIFICATION OF POTENTIAL PART D FRAUD AND ABUSE Daniel R. Levinson Inspector General October 2009
Combating Fraud, Waste and Abuse
Combating Fraud, Waste and Abuse SPECIAL INVESTIGATIONS UNIT OUTSOURCING Fraud investigation is as complex as piecing together an intricate puzzle. Re-imagine Your Fraud, Waste and Abuse Management Strategy
Eliminating the Fear of Private Payer Audits
Eliminating the Fear of Private Payer Audits Presented by: Jaime Leyden, CPC, CPC-H Jodi Smith, CPC Objectives Identify various payer departments that conduct audits Discuss why private payers conduct
For a Healthier America: Reducing Prescription Drug Misuse and Abuse
For a Healthier America: Reducing Prescription Drug Misuse and Abuse The misuse and abuse of prescription medicines is a growing public health problem. In addition to the tragic toll on families and communities,
ME DIC BENEFIT INTEGRITY ACTIVITIES IN MEDICARE PARTS C AND D
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL ME DIC BENEFIT INTEGRITY ACTIVITIES IN MEDICARE PARTS C AND D Daniel R. Levinson Inspector General January 2013 OEI-03-11-00310 EXECUTIVE
Fraud, Waste and Abuse Training
Fraud, Waste and Abuse Training 1 Why Do I Need Training? Every year millions of dollars are improperly spent because of fraud, waste and abuse. It affects everyone, Including YOU. This training will help
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA 14-20299 CR-LENARD
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA Case No. UNITED STATES OF AMERICA vs. ARMANDO BUCHILLON, a.k.a Armando Buchillon Carames, and LIZETTE GARCIA, Defendants../ The Grand Jury charges
A Roadmap for New Physicians. Avoiding Medicare and Medicaid Fraud and Abuse
A Roadmap for New Physicians Avoiding Medicare and Medicaid Fraud and Abuse Introduction This tutorial is intended to assist new physicians in understanding how to comply with Federal laws that combat
Coders Role in Anti-Fraud Investigations. Margaret Chambers, RN, CPC, CPC-P, AHFI Senior Investigator Premera Blue Cross
Coders Role in Anti-Fraud Investigations Margaret Chambers, RN, CPC, CPC-P, AHFI Senior Investigator Premera Blue Cross Objectives Understand a coder s role in fraud investigations Obtain an understanding
OFFICE OF INSPECTOR GENERAL SPECIAL FRAUD ALERT FRAUD AND ABUSE IN NURSING HOME ARRANGEMENTS WITH HOSPICES
OFFICE OF INSPECTOR GENERAL SPECIAL FRAUD ALERT FRAUD AND ABUSE IN NURSING HOME ARRANGEMENTS WITH HOSPICES March 1998 The Office of Inspector General was established at the Department of Health and Human
IBM Counter Fraud Signature Solutions
IBM Counter Fraud Signature Solutions November 5th, 2013 Athens Carmen Ene, VP IBM Global Business Services, Europe Leader Counter Fraud & Financial Crimes Provider ID Theft o Claim for routine services
How To Understand The Different Sides Of Cost Containment In Healthcare Insurance
The Different sides of Cost Containment in Healthcare Insurance : translating to Quality of Care, Policy Management, Medical Contracting and Fraud, Waste and Abuse Ross Kaplan Solutions Architect SAS Security
