Skip to main content

A Critical Analysis of the Application of Data Mining Methods to Detect Healthcare Claim Fraud in the Medical Billing Process

  • Conference paper
  • First Online:
Ubiquitous Networking (UNet 2018)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 11277))

Included in the following conference series:

Abstract

The healthcare industry has become a very important pillar in modern society but has witnessed an increase in fraudulent activities. Traditional fraud detection methods have been used to detect potential fraud, but in certain cases, they have been insufficient and time-consuming. Data mining which has emerged as a very important process in knowledge discovery has been successfully applied in the health insurance claims fraud detection. We performed an analysis of studies that used data mining techniques for detecting healthcare fraud and abuse using the supervised and unsupervised data mining methods. Each of these methods has their own strengths and weaknesses. This article attempts to highlight these areas, along with trends and propose recommendations relevant for deployment. We identified the need for the use of more computationally efficient models that can easily adapt and identify the novel fraud patterns generated by the perpetrators of healthcare claims fraud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. McLeod, S.: Maslow’s hierarchy of needs. Simply Psychol. 1, 1–2 (2007)

    Google Scholar 

  2. Jinhee Kim, B.B., Williams, A.D.: Understanding health insurance literacy:a literature review. Fam. Consum. Sci. Res. 42(1), 3–13 (2013)

    Article  Google Scholar 

  3. Centers for Medicare & Medicaid Services, et al.: Medicare fraud & abuse: prevention, detection, and reporting (2015)

    Google Scholar 

  4. Ferenc, D.P.: Understanding Hospital Billing and Coding, pp. 89–95. Elsevier Health Sciences, London (2014)

    Google Scholar 

  5. Coustasse, J.B.S.T.V.: Medicare fraud, waste and abuse. In: Business and Health Administration Association Annual Conference (2017)

    Google Scholar 

  6. Farzandipour, M., Sheikhtaheri, A., Sadoughi, F.: Effective factors on accuracy of principal diagnosis coding based on International Classification of Diseases, the 10th revision (ICD-10). Int. J. Inf. Manag. 30(1), 78–84 (2010)

    Article  Google Scholar 

  7. Kirlidog, M., Asuk, C.: A fraud detection approach with data mining in health insurance. Procedia - Soc. Behav. Sci. 62, 989–994 (2012)

    Article  Google Scholar 

  8. Fayyad, U., Piatetsky-Shapiro, G., Smyth, P.: From data mining to knowledge discovery in databases. AI Mag. 17(3), 37 (1996)

    Google Scholar 

  9. Bhowmik, R.: Data mining techniques in fraud detection. J. Digit. Forensics Secur. Law JDFSL 3(2), 35 (2008)

    MathSciNet  Google Scholar 

  10. Julio, P.: Data Mining and Knowledge Discovery in Real Life Applications, pp. 15–20. Sciyo.com, SL (2009)

    Google Scholar 

  11. Rawte, V., Anuradha, G.: Fraud detection in health insurance using data mining techniques. In: 2015 International Conference on Communication, Information & Computing Technology (ICCICT), pp. 1–5. IEEE (2015)

    Google Scholar 

  12. Yang, W.S., Hwang, S.Y.: A process-mining framework for the detection of healthcare fraud and abuse. Expert Syst. Appl. 31(1), 56–68 (2006)

    Article  MathSciNet  Google Scholar 

  13. Liou, F.M., Tang, Y.C., Chen, J.Y.: Detecting hospital fraud and claim abuse through diabetic outpatient services. Health Care Manag. Sci. 11(4), 353–358 (2008)

    Article  Google Scholar 

  14. Shin, H., Park, H., Lee, J., Jhee, W.C.: A scoring model to detect abusive billing patterns in health insurance claims. Expert Syst. Appl. 39(8), 7441–7450 (2012)

    Article  Google Scholar 

  15. Lu, F., Boritz, J.E., Covvey, D.: Adaptive fraud detection using Benford’s law. In: Lamontagne, L., Marchand, M. (eds.) AI 2006. LNCS (LNAI), vol. 4013, pp. 347–358. Springer, Heidelberg (2006). https://doi.org/10.1007/11766247_30

    Chapter  Google Scholar 

  16. Lin, C., Lin, C.M., Li, S.T., Kuo, S.C.: Intelligent physician segmentation and management based on KDD approach. Expert Syst. Appl. 34(3), 1963–1973 (2008)

    Article  Google Scholar 

  17. Sint, R., Stroka, S., Schaffert, S., Ferstl, R.: Combining unstructured, fully structured and semi-structured information in semantic wikis. In: SemWiki, vol. 464 (2009)

    Google Scholar 

  18. Han, J., Pei, J., Kamber, M.: Data Mining: Concepts and Techniques. Elsevier, Amsterdam (2011)

    MATH  Google Scholar 

  19. Shan, Y., Jeacocke, D., Murray, D.W., Sutinen, A.: Mining medical specialist billing patterns for health service management. In: Proceedings of the 7th Australasian Data Mining Conference, vol. 87, pp. 105–110. Australian Computer Society, Inc. (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dustin Terence van der Haar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Obodoekwe, N., van der Haar, D.T. (2018). A Critical Analysis of the Application of Data Mining Methods to Detect Healthcare Claim Fraud in the Medical Billing Process. In: Boudriga, N., Alouini, MS., Rekhis, S., Sabir, E., Pollin, S. (eds) Ubiquitous Networking. UNet 2018. Lecture Notes in Computer Science(), vol 11277. Springer, Cham. https://doi.org/10.1007/978-3-030-02849-7_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02849-7_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02848-0

  • Online ISBN: 978-3-030-02849-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics