se ha leído el artículo
array:24 [ "pii" => "S0213911121002661" "issn" => "02139111" "doi" => "10.1016/j.gaceta.2021.07.022" "estado" => "S300" "fechaPublicacion" => "2021-01-01" "aid" => "2140" "copyright" => "SESPAS" "copyrightAnyo" => "2021" "documento" => "article" "crossmark" => 1 "licencia" => "http://creativecommons.org/licenses/by-nc-nd/4.0/" "subdocumento" => "fla" "cita" => "Gac Sanit. 2021;35S2:S441-S449" "abierto" => array:3 [ "ES" => true "ES2" => true "LATM" => true ] "gratuito" => true "lecturas" => array:1 [ "total" => 0 ] "itemSiguiente" => array:19 [ "pii" => "S0213911121002697" "issn" => "02139111" "doi" => "10.1016/j.gaceta.2021.07.023" "estado" => "S300" "fechaPublicacion" => "2021-01-01" "aid" => "2143" "copyright" => "SESPAS" "documento" => "article" "crossmark" => 1 "licencia" => "http://creativecommons.org/licenses/by-nc-nd/4.0/" "subdocumento" => "fla" "cita" => "Gac Sanit. 2021;35S2:S450-S454" "abierto" => array:3 [ "ES" => true "ES2" => true "LATM" => true ] "gratuito" => true "lecturas" => array:1 [ "total" => 0 ] "en" => array:10 [ "idiomaDefecto" => true "titulo" => "Exposure analysis of lead (Pb) and chromium (Cr) in workplace workshop PT. X" "tienePdf" => "en" "tieneTextoCompleto" => "en" "tieneResumen" => "en" "paginas" => array:1 [ 0 => array:2 [ "paginaInicial" => "S450" "paginaFinal" => "S454" ] ] "contieneResumen" => array:1 [ "en" => true ] "contieneTextoCompleto" => array:1 [ "en" => true ] "contienePdf" => array:1 [ "en" => true ] "autores" => array:1 [ 0 => array:2 [ "autoresLista" => "Ari Widyantoro, Fina Binazir Maziya, Azham Umar Abidin" "autores" => array:3 [ 0 => array:2 [ "nombre" => "Ari" "apellidos" => "Widyantoro" ] 1 => array:2 [ "nombre" => "Fina Binazir" "apellidos" => "Maziya" ] 2 => array:2 [ "nombre" => "Azham Umar" "apellidos" => "Abidin" ] ] ] ] ] "idiomaDefecto" => "en" "EPUB" => "https://multimedia.elsevier.es/PublicationsMultimediaV1/item/epub/S0213911121002697?idApp=WGSE" "url" => "/02139111/00000035000000S2/v1_202112201615/S0213911121002697/v1_202112201615/en/main.assets" ] "itemAnterior" => array:19 [ "pii" => "S021391112100265X" "issn" => "02139111" "doi" => "10.1016/j.gaceta.2021.10.071" "estado" => "S300" "fechaPublicacion" => "2021-01-01" "aid" => "2139" "copyright" => "SESPAS" "documento" => "article" "crossmark" => 1 "licencia" => "http://creativecommons.org/licenses/by-nc-nd/4.0/" "subdocumento" => "fla" "cita" => "Gac Sanit. 2021;35S2:S438-S440" "abierto" => array:3 [ "ES" => true "ES2" => true "LATM" => true ] "gratuito" => true "lecturas" => array:1 [ "total" => 0 ] "en" => array:10 [ "idiomaDefecto" => true "titulo" => "Behavioral risk factors and periodontal disease in Malang, Indonesia" "tienePdf" => "en" "tieneTextoCompleto" => "en" "tieneResumen" => "en" "paginas" => array:1 [ 0 => array:2 [ "paginaInicial" => "S438" "paginaFinal" => "S440" ] ] "contieneResumen" => array:1 [ "en" => true ] "contieneTextoCompleto" => array:1 [ "en" => true ] "contienePdf" => array:1 [ "en" => true ] "autores" => array:1 [ 0 => array:2 [ "autoresLista" => "Rara Warih Gayatri, Tika Dwi Tama, Lucky Radhita Alma, Low Wah Yun, Lita Savira, Asmi Kuroidah" "autores" => array:6 [ 0 => array:2 [ "nombre" => "Rara Warih" "apellidos" => "Gayatri" ] 1 => array:2 [ "nombre" => "Tika Dwi" "apellidos" => "Tama" ] 2 => array:2 [ "nombre" => "Lucky Radhita" "apellidos" => "Alma" ] 3 => array:2 [ "nombre" => "Low Wah" "apellidos" => "Yun" ] 4 => array:2 [ "nombre" => "Lita" "apellidos" => "Savira" ] 5 => array:2 [ "nombre" => "Asmi" "apellidos" => "Kuroidah" ] ] ] ] ] "idiomaDefecto" => "en" "EPUB" => "https://multimedia.elsevier.es/PublicationsMultimediaV1/item/epub/S021391112100265X?idApp=WGSE" "url" => "/02139111/00000035000000S2/v1_202112201615/S021391112100265X/v1_202112201615/en/main.assets" ] "en" => array:18 [ "idiomaDefecto" => true "titulo" => "How to detect healthcare fraud? “A systematic review”" "tieneTextoCompleto" => true "paginas" => array:1 [ 0 => array:2 [ "paginaInicial" => "S441" "paginaFinal" => "S449" ] ] "autores" => array:1 [ 0 => array:4 [ "autoresLista" => "Andi Yaumil Bay R. Thaifur, M. Alimin Maidin, Andi Indahwaty Sidin, Amran Razak" "autores" => array:4 [ 0 => array:4 [ "nombre" => "Andi Yaumil Bay R." "apellidos" => "Thaifur" "email" => array:2 [ 0 => "thaifuraybr19k@student.unhas.ac.id" 1 => "pmc@agri.unhas.ac.id" ] "referencia" => array:3 [ 0 => array:2 [ "etiqueta" => "<span class="elsevierStyleSup">a</span>" "identificador" => "aff0005" ] 1 => array:2 [ "etiqueta" => "<span class="elsevierStyleSup">b</span>" "identificador" => "aff0010" ] 2 => array:2 [ "etiqueta" => "<span class="elsevierStyleSup">*</span>" "identificador" => "cor0005" ] ] ] 1 => array:3 [ "nombre" => "M. Alimin" "apellidos" => "Maidin" "referencia" => array:1 [ 0 => array:2 [ "etiqueta" => "<span class="elsevierStyleSup">c</span>" "identificador" => "aff0015" ] ] ] 2 => array:3 [ "nombre" => "Andi Indahwaty" "apellidos" => "Sidin" "referencia" => array:1 [ 0 => array:2 [ "etiqueta" => "<span class="elsevierStyleSup">c</span>" "identificador" => "aff0015" ] ] ] 3 => array:3 [ "nombre" => "Amran" "apellidos" => "Razak" "referencia" => array:1 [ 0 => array:2 [ "etiqueta" => "<span class="elsevierStyleSup">d</span>" "identificador" => "aff0020" ] ] ] ] "afiliaciones" => array:4 [ 0 => array:3 [ "entidad" => "Department of Health Policy Administration, Faculty of Public Health, Universitas Dayanu Ikhsanuddin, Bau-bau 93711, Indonesia" "etiqueta" => "a" "identificador" => "aff0005" ] 1 => array:3 [ "entidad" => "Doctoral Program, Faculty of Public Health, University of Hasanuddin, Makassar 90245, Indonesia" "etiqueta" => "b" "identificador" => "aff0010" ] 2 => array:3 [ "entidad" => "Department of Hospital Management, Faculty of Public Health, University of Hasanuddin, Makassar 90245, Indonesia" "etiqueta" => "c" "identificador" => "aff0015" ] 3 => array:3 [ "entidad" => "Department of the Health Policy Administration, University of Hasanuddin, Makassar 90245, Indonesia" "etiqueta" => "d" "identificador" => "aff0020" ] ] "correspondencia" => array:1 [ 0 => array:3 [ "identificador" => "cor0005" "etiqueta" => "⁎" "correspondencia" => "Corresponding author." ] ] ] ] "resumenGrafico" => array:2 [ "original" => 0 "multimedia" => array:7 [ "identificador" => "fig0005" "etiqueta" => "Fig. 1" "tipo" => "MULTIMEDIAFIGURA" "mostrarFloat" => true "mostrarDisplay" => false "figura" => array:1 [ 0 => array:4 [ "imagen" => "gr1.jpeg" "Alto" => 2535 "Ancho" => 3175 "Tamanyo" => 486602 ] ] "descripcion" => array:1 [ "en" => "<p id="spar0025" class="elsevierStyleSimplePara elsevierViewall">Literature flowcharts.</p>" ] ] ] "textoCompleto" => "<span class="elsevierStyleSections"><span id="sec0005" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleSectionTitle" id="sect0035">Introduction</span><p id="par0005" class="elsevierStylePara elsevierViewall">Fraud on health care has been classified as an international challenge as well as illegal actions, where perpetrators create a zero-sum game for maintenance costs that contribute to the cumulative effect on the quality of service.<a class="elsevierStyleCrossRefs" href="#bib0145"><span class="elsevierStyleSup">1,2</span></a> Estimated Fraud costs up to 10% of total health care expenditure worldwide.<a class="elsevierStyleCrossRef" href="#bib0155"><span class="elsevierStyleSup">3</span></a> In the United States from 3.6 trillion dollars incurred for health care costs, billions of dollars are claims for fraud.<a class="elsevierStyleCrossRef" href="#bib0160"><span class="elsevierStyleSup">4</span></a> Viewing RGA data (2017) the state of Asia Pacific that responds to fraud event data including Australia, Singapore, Malaysia, Thailand, the Philippines, Vietnam, Japan, Hong Kong, Korea, Taiwan, and Indonesia.<a class="elsevierStyleCrossRef" href="#bib0165"><span class="elsevierStyleSup">5</span></a> The Data indicates there are opportunities of various stakeholders in the act of fraud, not limited to state conditions both developed and developed.</p><p id="par0010" class="elsevierStylePara elsevierViewall">Fraud is building a serious threat that disrupts the global economy with the extravagance of unnecessary or counterfeit maintenance costs and adverse health consequences, so it takes solving appropriate problems in their finishing.<a class="elsevierStyleCrossRefs" href="#bib0170"><span class="elsevierStyleSup">6,7</span></a> Fraud in the field of health occurs and continues to increase in South Africa.<a class="elsevierStyleCrossRef" href="#bib0180"><span class="elsevierStyleSup">8</span></a> The European continent has at least €56 billion losses annually over fraud practices. However, the data is only reported from some countries in Europe, some of which deny the problems related to fraud with privacy assumptions.<a class="elsevierStyleCrossRef" href="#bib0185"><span class="elsevierStyleSup">9</span></a> Fraud issues also occur in Korea and continue to increase, reportedly at least 798.2 billion won claimed in 2018 or up 9.3% from the previous year.<a class="elsevierStyleCrossRef" href="#bib0190"><span class="elsevierStyleSup">10</span></a></p><p id="par0015" class="elsevierStylePara elsevierViewall">These conditions and situations have an impact on policymakers, anti-fraud, and practitioner difficulties to find reliable evidence and keep abreast of the literature review that has been published in a variety of different formats and references. Therefore, comprehensive synthesis and evaluation are critical to providing useful information and reliable evidence to decision-makers who can be gained through systematic review reviews as an efficient solution to address these issues.</p></span><span id="sec0010" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleSectionTitle" id="sect0040">Literature review</span><p id="par0020" class="elsevierStylePara elsevierViewall">The fraud case impacts the increase in its main cost to everyone involved in the healthcare system and damages the long-term solvency of programs such as insurance services/health care plans in the underprivileged community (Medicare/Medicaid) on millions of people in the Americas (Baranek, Action, & Services, 2018).<a class="elsevierStyleCrossRef" href="#bib0195"><span class="elsevierStyleSup">11</span></a> Anti-fraud agencies have tried to detect those frauds and it is strongly suspected that they do not act on their own but have a network like an organization.<a class="elsevierStyleCrossRefs" href="#bib0145"><span class="elsevierStyleSup">1,2,4,5</span></a></p><p id="par0025" class="elsevierStylePara elsevierViewall">The review of the literature aims to review the results of published studies/reviews and gather the best evidence, then summarizes the evidence and current knowledge regarding the effects of intervention or policy from various sources.<a class="elsevierStyleCrossRef" href="#bib0200"><span class="elsevierStyleSup">12</span></a> Our review aims to collect, evaluate, and synthesize evidence from a variety of published literature reviews on fraud detection that occur in the areas of service and health insurance, to provide reliable evidence and enable researchers, policymakers, and practitioners to make informed decisions. The quality flaws in the literature review are also identified, which can be used in formulating recommendations for better quality future reviews.</p></span><span id="sec0015" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleSectionTitle" id="sect0045">Methods</span><span id="sec0020" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleSectionTitle" id="sect0050">Literature search strategy</span><p id="par0030" class="elsevierStylePara elsevierViewall">Preceded by entering the keyword “Fraud” AND “Fraud detection OR Method Fraud” AND “Health Care” on some search engines (data-based) such as Pubmed/Medline, Cochrane, Wiley, Sciencedirect and secondary data-based Google scholar.</p></span><span id="sec0025" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleSectionTitle" id="sect0055">Inclusion and exclusion criteria</span><p id="par0035" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleItalic">Inclusion criteria</span>: A study that has been studied and written in English and accessible, the article is a reference listed as the international reputable journal web of Science/Thomson Reuters Journal or Scopus, as well as the journal, has a purpose to identify the methods used in detecting fraud that occurs in the field of service/health care. The criterion for extraction exclusion is a journal related to the theme and sub-theme in which include understanding the concept of fraud but published over the last 10 years since the study of a literature review is conducted, only abstract (non-full-text), literature study results or systematic review/meta-analysis.</p><p id="par0040" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleItalic">Data extraction</span>. In this literature review, the data is conducted using a flowchart prism (<a class="elsevierStyleCrossRef" href="#fig0005">Fig. 1</a>), and the article that is the inclusion of the feasibility check is done by using the STROBE instrument.</p><elsevierMultimedia ident="fig0005"></elsevierMultimedia></span></span><span id="sec0030" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleSectionTitle" id="sect0060">Results</span><p id="par0045" class="elsevierStylePara elsevierViewall">Findings in the literature review of this library found nine articles that were later reviewed through the synthesis of grids, of which from the 10 articles the findings are largely focused on the detection method of fraud.</p><span id="sec0035" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleSectionTitle" id="sect0065">Identification of types and perpetrators of fraud</span><p id="par0050" class="elsevierStylePara elsevierViewall">Five out of nine articles reviewed discussing the types and perpetrators of fraud; Most of the perpetrators of fraud in the field of health care are medical personnel physicians.<a class="elsevierStyleCrossRefs" href="#bib0205"><span class="elsevierStyleSup">13–15</span></a> Other fraud perpetrators are also conducted by the provider/healthcare provider, medical member schemes including family practitioners and psychiatrists, employees, companies, and related syndicate.<a class="elsevierStyleCrossRefs" href="#bib0205"><span class="elsevierStyleSup">13,15</span></a> The average fraud perpetrator is about 21–43 years old.<a class="elsevierStyleCrossRef" href="#bib0220"><span class="elsevierStyleSup">16</span></a> The type of fraud done, for example; The Act of Abuse of authority/profession performed by a medical physician,<a class="elsevierStyleCrossRef" href="#bib0210"><span class="elsevierStyleSup">14</span></a> filing false claims, irregular claim codes, recurring claims, making fictionalized cards, and claiming services not done.<a class="elsevierStyleCrossRefs" href="#bib0205"><span class="elsevierStyleSup">13,16</span></a> Besides, it is also found the impact that fraud can cause, such as; Detrimental to the healthcare industry,<a class="elsevierStyleCrossRef" href="#bib0210"><span class="elsevierStyleSup">14</span></a> and the results of the study found that around 40% could harm patient care and safety.<a class="elsevierStyleCrossRef" href="#bib0215"><span class="elsevierStyleSup">15</span></a></p></span><span id="sec0040" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleSectionTitle" id="sect0070">Fraud case detection method in health service</span><p id="par0055" class="elsevierStylePara elsevierViewall">There were six of the nine articles reviewed, of which the six articles found that there were several methods in detecting potential fraud, for example; Provide professionals/experts/Technology Information experts (IT) who can detect data fraud.<a class="elsevierStyleCrossRef" href="#bib0225"><span class="elsevierStyleSup">17</span></a></p><p id="par0060" class="elsevierStylePara elsevierViewall">A claims detection system and the incorporation of a health insurance/Medicare service DataSet.<a class="elsevierStyleCrossRef" href="#bib0220"><span class="elsevierStyleSup">16</span></a> Perform comparative data tiers and a detailed algorithm-level benchmarking method at every data class level.<a class="elsevierStyleCrossRefs" href="#bib0230"><span class="elsevierStyleSup">18,19</span></a> Then, the method with comparison of recorded data/documented in the document book with electronic data, and proven electronic/digital data more significantly detected fraud case that occurred.<a class="elsevierStyleCrossRef" href="#bib0240"><span class="elsevierStyleSup">20</span></a> Also, unisex methods/Special grouping strategies, transfer and isolation of data classes are applied in various medical health care specialties.<a class="elsevierStyleCrossRef" href="#bib0245"><span class="elsevierStyleSup">21</span></a></p></span></span><span id="sec0045" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleSectionTitle" id="sect0075">Discussion</span><p id="par0065" class="elsevierStylePara elsevierViewall">Fraud is increasingly rampant in the care and health services industry.<a class="elsevierStyleCrossRef" href="#bib0250"><span class="elsevierStyleSup">22</span></a> In connection with the findings on one of the reviewed articles, the privacy laws can be a barrier to managing the organization's scale fraud practices.<a class="elsevierStyleCrossRef" href="#bib0220"><span class="elsevierStyleSup">16</span></a> On the other hand, The National Health Care Anti-Fraud Association (NHCAA) has suggested several key factors to guide health fraud (fraud) laws that include the use of predictive modeling and treatment transparency between private insurance companies and government programs (National Health Care Anti-Fraud Association.<a class="elsevierStyleCrossRef" href="#bib0255"><span class="elsevierStyleSup">23</span></a>. Reimbursement for Medicare (health insurance Services in underprivileged communities) can also reduce fraud and misuse and more potentially improve the quality of care for patients.<a class="elsevierStyleCrossRef" href="#bib0250"><span class="elsevierStyleSup">22</span></a></p><p id="par0070" class="elsevierStylePara elsevierViewall">The perpetrators of fraud in hospital health care are much done by medical personnel, staff/employees, or healthcare providers (providers).<a class="elsevierStyleCrossRefs" href="#bib0205"><span class="elsevierStyleSup">13–15</span></a> Make fictionalized documentation for example ordering improper procedures and performing the actual procedures they are not doing or duplicating a claim.<a class="elsevierStyleCrossRefs" href="#bib0220"><span class="elsevierStyleSup">16,17</span></a></p><p id="par0075" class="elsevierStylePara elsevierViewall">Holmberg and Rothstein (2011); Kirlidog and Asuk (2012); Bauder et al. (2016) state, that vulnerable fraud is found in various types of insurance including health insurance systems to obtain personal gains and or groups in the form of claims on insurance for health care.<a class="elsevierStyleCrossRefs" href="#bib0260"><span class="elsevierStyleSup">24–26</span></a> It is in line with a study that says that many Americans are not guilty of being deceived when visiting various medical facilities or when they get medication. Lack of education in understanding different medical information facilitates medical fraud.<a class="elsevierStyleCrossRef" href="#bib0275"><span class="elsevierStyleSup">27</span></a> Usually, those who are exploited do not know the fact that the wrong or improper action is taking place. However, this is not always controllable. Because people who perform these actions are professionals in the healthcare industry. They take advantage of innocent people because of the lack of knowledge about fraud.</p><p id="par0080" class="elsevierStylePara elsevierViewall">As for the fraud detection methods can be done by collecting all data on the claim is either data-based documentation on paper or electronic, then compare the data and divide it into a level of certain classes.<a class="elsevierStyleCrossRefs" href="#bib0230"><span class="elsevierStyleSup">18,21</span></a> In line with the previous study in decoding fraud that can be done by dividing the data into several levels/stages. The methods used in this study divide into five stages, the first three phases are aimed at detecting fraud among providers, services, and the number of claims. Then the fourth stage integrates the information obtained in the previous three stages into the overall risk size. Furthermore, the last stage is carried out decision making calculating the risk threshold value. The final decision to declare whether the claim proved to be an indication of fraud or not.<a class="elsevierStyleCrossRef" href="#bib0280"><span class="elsevierStyleSup">28</span></a></p><p id="par0085" class="elsevierStylePara elsevierViewall">Ultimately the purpose of the fraud detection method is to prevent the loss of both financially and inpatient care and health services. Methods can be adjusted according to the condition or problem (fraud) that is being felt. When looking at the results of a review from the synthesis table that has been done in the past most of the studies are taking the secondary data which is then used to determine/claim the fraud event. Therefore, further researchers may be able to identify the weaknesses of the fraud detection method through data collection, the types and rules that apply to the perpetrators of fraud in various countries then compare them, so that it can be used as consideration for legal sanctions affirmation for fraud regardless of the status of the job/profession (<a class="elsevierStyleCrossRef" href="#tbl0005">Table 1</a>).</p><elsevierMultimedia ident="tbl0005"></elsevierMultimedia></span><span id="sec0050" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleSectionTitle" id="sect0080">Conclusion</span><p id="par0090" class="elsevierStylePara elsevierViewall">The perpetrators who are most often involved with fraud are medical personnel (doctors) who are in a medical scheme and provider of health care providers. The most common fraud case is the insurance claim that is not actually done, duplicating the claim, and as such. Ultimately the purpose of the fraud detection method is to prevent the loss of both financially and inpatient care and health services. Methods can be adjusted according to the condition or problem (fraud) that is being felt. When looking at the results of a review from the synthesis table that has been done in the past most of the studies are taking the secondary data which is then used to determine/claim the fraud event. Therefore, further researchers may be able to identify the weaknesses of the fraud detection method through data collection, the types and rules that apply to the perpetrators of fraud in various countries then compare them, so that it can be used as consideration for legal sanctions affirmation for fraud regardless of the status of the job/profession.</p></span><span id="sec0055" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleSectionTitle" id="sect0085">Conflicts of interest</span><p id="par0095" class="elsevierStylePara elsevierViewall">The authors declare no conflict of interest.</p></span></span>" "textoCompletoSecciones" => array:1 [ "secciones" => array:10 [ 0 => array:3 [ "identificador" => "xres1632519" "titulo" => "Abstract" "secciones" => array:4 [ 0 => array:2 [ "identificador" => "abst0005" "titulo" => "Objective" ] 1 => array:2 [ "identificador" => "abst0010" "titulo" => "Methods" ] 2 => array:2 [ "identificador" => "abst0015" "titulo" => "Results" ] 3 => array:2 [ "identificador" => "abst0020" "titulo" => "Conclusion" ] ] ] 1 => array:2 [ "identificador" => "xpalclavsec1456671" "titulo" => "Keywords" ] 2 => array:2 [ "identificador" => "sec0005" "titulo" => "Introduction" ] 3 => array:2 [ "identificador" => "sec0010" "titulo" => "Literature review" ] 4 => array:3 [ "identificador" => "sec0015" "titulo" => "Methods" "secciones" => array:2 [ 0 => array:2 [ "identificador" => "sec0020" "titulo" => "Literature search strategy" ] 1 => array:2 [ "identificador" => "sec0025" "titulo" => "Inclusion and exclusion criteria" ] ] ] 5 => array:3 [ "identificador" => "sec0030" "titulo" => "Results" "secciones" => array:2 [ 0 => array:2 [ "identificador" => "sec0035" "titulo" => "Identification of types and perpetrators of fraud" ] 1 => array:2 [ "identificador" => "sec0040" "titulo" => "Fraud case detection method in health service" ] ] ] 6 => array:2 [ "identificador" => "sec0045" "titulo" => "Discussion" ] 7 => array:2 [ "identificador" => "sec0050" "titulo" => "Conclusion" ] 8 => array:2 [ "identificador" => "sec0055" "titulo" => "Conflicts of interest" ] 9 => array:1 [ "titulo" => "References" ] ] ] "pdfFichero" => "main.pdf" "tienePdf" => true "fechaRecibido" => "2021-06-28" "fechaAceptado" => "2021-07-30" "PalabrasClave" => array:1 [ "en" => array:1 [ 0 => array:4 [ "clase" => "keyword" "titulo" => "Keywords" "identificador" => "xpalclavsec1456671" "palabras" => array:3 [ 0 => "Fraud detection" 1 => "Fraud method" 2 => "Healthcare services" ] ] ] ] "tieneResumen" => true "resumen" => array:1 [ "en" => array:3 [ "titulo" => "Abstract" "resumen" => "<span id="abst0005" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleSectionTitle" id="sect0010">Objective</span><p id="spar0005" class="elsevierStyleSimplePara elsevierViewall">To identify the method used in detecting fraud cases.</p></span> <span id="abst0010" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleSectionTitle" id="sect0015">Methods</span><p id="spar0010" class="elsevierStyleSimplePara elsevierViewall">Articles searching by using topic-appropriate keywords and incorporated into search engines (data-based) journals Pubmed/Medline, Cochrane, Wiley, ScienceDirect, and secondary data-based Google scholar. Then data extraction is done based on inclusion criteria. The selected articles have the aim of investigating/detecting cases of fraud that have occurred in the health sector or other related sectors that support the study.</p></span> <span id="abst0015" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleSectionTitle" id="sect0020">Results</span><p id="spar0015" class="elsevierStyleSimplePara elsevierViewall">The findings of the nine reviewed articles have suggested that most of the fraud perpetrators are performed by medical personnel (doctors) and providers. Many types of fraud occur such as insurance claims or medical actions that are completely unadministered nor following the procedure and duplicating claims. The methods that appropriate to be used in detecting fraud are secondary data tracking, information, and technology specialist provision.</p></span> <span id="abst0020" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleSectionTitle" id="sect0025">Conclusion</span><p id="spar0020" class="elsevierStyleSimplePara elsevierViewall">Secondary data tracking is the most widely used method in fraud detection. Fraud perpetrators are ones who dominated by medical circles with fictitious claim cases. Perpetrators tend not to act themselves but in organizations with network.</p></span>" "secciones" => array:4 [ 0 => array:2 [ "identificador" => "abst0005" "titulo" => "Objective" ] 1 => array:2 [ "identificador" => "abst0010" "titulo" => "Methods" ] 2 => array:2 [ "identificador" => "abst0015" "titulo" => "Results" ] 3 => array:2 [ "identificador" => "abst0020" "titulo" => "Conclusion" ] ] ] ] "NotaPie" => array:1 [ 0 => array:2 [ "etiqueta" => "☆" "nota" => "<p class="elsevierStyleNotepara" id="npar0005">Peer-review under responsibility of the scientific committee of the 3rd International Nursing, Health Science Students & Health Care Professionals Conference. Full-text and the content of it is under responsibility of authors of the article.</p>" ] ] "multimedia" => array:2 [ 0 => array:7 [ "identificador" => "fig0005" "etiqueta" => "Fig. 1" "tipo" => "MULTIMEDIAFIGURA" "mostrarFloat" => true "mostrarDisplay" => false "figura" => array:1 [ 0 => array:4 [ "imagen" => "gr1.jpeg" "Alto" => 2535 "Ancho" => 3175 "Tamanyo" => 486602 ] ] "descripcion" => array:1 [ "en" => "<p id="spar0025" class="elsevierStyleSimplePara elsevierViewall">Literature flowcharts.</p>" ] ] 1 => array:8 [ "identificador" => "tbl0005" "etiqueta" => "Table 1" "tipo" => "MULTIMEDIATABLA" "mostrarFloat" => true "mostrarDisplay" => false "detalles" => array:1 [ 0 => array:3 [ "identificador" => "at1" "detalle" => "Table " "rol" => "short" ] ] "tabla" => array:1 [ "tablatextoimagen" => array:1 [ 0 => array:2 [ "tabla" => array:1 [ 0 => """ <table border="0" frame="\n \t\t\t\t\tvoid\n \t\t\t\t" class=""><thead title="thead"><tr title="table-row"><th class="td-with-role" title="\n \t\t\t\t\ttable-head\n \t\t\t\t ; entry_with_role_rowhead " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t" scope="col">No \t\t\t\t\t\t\n \t\t\t\t\t\t</th><th class="td" title="\n \t\t\t\t\ttable-head\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t" scope="col">Title (researcher, year) \t\t\t\t\t\t\n \t\t\t\t\t\t</th><th class="td" title="\n \t\t\t\t\ttable-head\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t" scope="col">Main issues \t\t\t\t\t\t\n \t\t\t\t\t\t</th><th class="td" title="\n \t\t\t\t\ttable-head\n \t\t\t\t " colspan="3" align="center" valign="\n \t\t\t\t\ttop\n \t\t\t\t" scope="col" style="border-bottom: 2px solid black">Characteristics</th><th class="td" title="\n \t\t\t\t\ttable-head\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t" scope="col">Research variables \t\t\t\t\t\t\n \t\t\t\t\t\t</th><th class="td" title="\n \t\t\t\t\ttable-head\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t" scope="col">Findings \t\t\t\t\t\t\n \t\t\t\t\t\t</th><th class="td" title="\n \t\t\t\t\ttable-head\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t" scope="col">Advantages \t\t\t\t\t\t\n \t\t\t\t\t\t</th><th class="td" title="\n \t\t\t\t\ttable-head\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t" scope="col">Disadvantages \t\t\t\t\t\t\n \t\t\t\t\t\t</th></tr><tr title="table-row"><th class="td" title="\n \t\t\t\t\ttable-head\n \t\t\t\t " align="" valign="\n \t\t\t\t\ttop\n \t\t\t\t" scope="col" style="border-bottom: 2px solid black"> \t\t\t\t\t\t\n \t\t\t\t\t\t</th><th class="td" title="\n \t\t\t\t\ttable-head\n \t\t\t\t " align="" valign="\n \t\t\t\t\ttop\n \t\t\t\t" scope="col" style="border-bottom: 2px solid black"> \t\t\t\t\t\t\n \t\t\t\t\t\t</th><th class="td" title="\n \t\t\t\t\ttable-head\n \t\t\t\t " align="" valign="\n \t\t\t\t\ttop\n \t\t\t\t" scope="col" style="border-bottom: 2px solid black"> \t\t\t\t\t\t\n \t\t\t\t\t\t</th><th class="td" title="\n \t\t\t\t\ttable-head\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t" scope="col" style="border-bottom: 2px solid black">Subject \t\t\t\t\t\t\n \t\t\t\t\t\t</th><th class="td" title="\n \t\t\t\t\ttable-head\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t" scope="col" style="border-bottom: 2px solid black">Instrument \t\t\t\t\t\t\n \t\t\t\t\t\t</th><th class="td" title="\n \t\t\t\t\ttable-head\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t" scope="col" style="border-bottom: 2px solid black">Method \t\t\t\t\t\t\n \t\t\t\t\t\t</th><th class="td" title="\n \t\t\t\t\ttable-head\n \t\t\t\t " align="" valign="\n \t\t\t\t\ttop\n \t\t\t\t" scope="col" style="border-bottom: 2px solid black"> \t\t\t\t\t\t\n \t\t\t\t\t\t</th><th class="td" title="\n \t\t\t\t\ttable-head\n \t\t\t\t " align="" valign="\n \t\t\t\t\ttop\n \t\t\t\t" scope="col" style="border-bottom: 2px solid black"> \t\t\t\t\t\t\n \t\t\t\t\t\t</th><th class="td" title="\n \t\t\t\t\ttable-head\n \t\t\t\t " align="" valign="\n \t\t\t\t\ttop\n \t\t\t\t" scope="col" style="border-bottom: 2px solid black"> \t\t\t\t\t\t\n \t\t\t\t\t\t</th><th class="td" title="\n \t\t\t\t\ttable-head\n \t\t\t\t " align="" valign="\n \t\t\t\t\ttop\n \t\t\t\t" scope="col" style="border-bottom: 2px solid black"> \t\t\t\t\t\t\n \t\t\t\t\t\t</th></tr></thead><tbody title="tbody"><tr title="table-row"><td class="td-with-role" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t ; entry_with_role_rowhead " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">1 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Improving Fraud and Abuse Detection in General Physician Claims: A Data Mining Study<a class="elsevierStyleCrossRef" href="#bib0210"><span class="elsevierStyleSup">14</span></a> \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">There is no there is an increase in the expenditure of health industry in various countries, which is directly proportional to the total health expenditure resulting from the practice of fraud and abuse up to billions of dollars per year including the state of Iran. Potential conflict of interest reported by authors. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t"><span class="elsevierStyleItalic">General Physician</span> \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">This research instrument forms observations of data obtained from the Iranian Social Security Organization (SSO). Thirteen indicators were developed in total. 2 cost issue indicators, 4 frequency indicators, and visit patterns, and 7 indicators related to prescription patterns. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Use a statistical engineering data mining approach to identify each dataset of health insurance organizations with a prescription doctor claim, through five steps:1. clarify the nature of problems and objectives,2. data preparation,3. identification of indicators and selection,4. analysis of clusters to identify the perpetrators (doctors), and5. discriminant analysis to assess the validity of the clustering approach. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">a. Fraud detectionb. Abusedetection \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Most physicians are detected to act on Abuse and a small portion of more than 2% of doctors take part in fraud practices that harm the healthcare industry. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Researchers can explore the beneficial knowledge of thousands of claims through 5 steps of data mining. I.e.1. Understanding the nature of problems2. Understand data and data preparation3. Preparing indicators (features) and form of election4. Grouping5. Discriminant analysis \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Researchers are only reviewing the incidence of fraud and abuse on public services or that are handled by a general practitioner, whereas in situations of claim loss or related fraud determination of interventions in patients in the specialist section is also vulnerable. \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td-with-role" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t ; entry_with_role_rowhead " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">2 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Understanding the types of fraud in claims to South African medical schemes<a class="elsevierStyleCrossRef" href="#bib0205"><span class="elsevierStyleSup">13</span></a> \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Medical schemes play an important role in the funding of private healthcare services in South Africa. However, the sector is in the identification of conducting fraud activities that have a bad impact on the service. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Administrate or medical scheme \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">A simple instrument used is a recording tool and an interview guide to interview. Data is collected through individual semi-structured interviews. Researchers record audio interviews and copy them into textbooks. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Cross-sectional. Where individuals can provide the most insight and knowledge regarding the type of fraud claims experienced by the medical scheme is chosen as a research participant/sample. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">a. Perpetrators of fraudb. Types of fraud activities \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">The study found that medical schemes are manipulated in a variety of ways either done internally (within the company) or externally. The perpetrators of fraud are healthcare providers, members of medical schemes, employees, brokers and related syndicates.Fraud that is done mostly in submission of false claims, irregular billing of codes, duplicate claims, card making, and claiming services are not provided. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">This study carried out slightly different studies with a qualitative methodology approach, which is also claimed as a method that has not been studied in South African medical schemes.The first stage information excavation begins with 3 key informants as well as the stage of the trial in the interview indepth \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Researchers have only conducted an exploratory study of the types of fraud in medical scheme claims, without identifying which schemes/parts of the unit might be higher or more fraud actions that could be information materials to take appropriate preventive measures. \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td-with-role" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t ; entry_with_role_rowhead " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">3 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Physician Medicare fraud: characteristics and consequences<a class="elsevierStyleCrossRef" href="#bib0215"><span class="elsevierStyleSup">15</span></a> \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">High Fraud on Medicare insurance with a taxpayer fee of $60–250 billion per year, with the identification of the perpetrator, is a service provider (physician). So two important issues of the basic implementation of the study are:(1) Who is the Doctor of fraud Medicare?(2) What happens after they are caught? \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t"><span class="elsevierStyleItalic">General Physician</span> \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Not described in detail the research instruments used but the observation results using data obtained from the office of the Inspector General (“OIG”)-US Department of Health and Human Services (“HHS”). \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">This research is a secondary data analysis study obtained directly from the office of the Inspector General (“OIG”)-U.S. Department of Health and Human Services (“HHS”). The names of convicted physicians are gathered from public databases.The names are further verified with other public records. The details regarding the demographics and description of the fraud are obtained by searching for court documents, media reports, the Internet, and records made by the American Medical Association and medical licenses. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Doctor's specific actions for Medicare fraud The duration of imprisonment and/or probation is dropped; Amount of fines and/or restitution Sanctions are dropped. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">The doctor convicted of criminal Medicare and/or Medicaid fraud tends to be male (87%).Physician practitioners of families and psychiatrists are represented excessively as perpetrators.40% of fraud endangers patient care and safety.37% of doctors convicted of fraud have no imprisonment.38% of doctors with fraud continue to conduct medical practice.6. The average amount of fraud is $1.4 million per convicted physician. 21% are not suspended from medical. It only takes one day for them to be irrespective of fraud. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">This article evaluates fairly complete work units of doctors who perform the most fraud and how to apply the law to medical practitioners for fraud \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Not assessing the nature or causes of medical practitioners to fraud. \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td-with-role" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t ; entry_with_role_rowhead " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">4 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Financial fraud in the private health insurance sector in Australia: Perspectives from the industry<a class="elsevierStyleCrossRef" href="#bib0225"><span class="elsevierStyleSup">17</span></a> \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">The private health insurance sector in Australia faces challenges in managing fraud and overservicing; Major financial losses, fraud is hard to detect, and resources are insufficient in its completion. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">The largest private health insurance manager in Australia. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">A simple instrument used is a recording tool and an interview guide to interview. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Qualitative methodological approach. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">a. Financial fraudb. Legal force of private health insurance sector \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">It takes a lot more resources with better IT capabilities in detecting data fraud.2. Privacy laws can be prohibitive to manage organizational fraud practices. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">This study carried out slightly different studies with a qualitative methodology approach, which is also claimed as a method that has not been learned much in detecting fraud Abstracts have been clearly outlined in relation to study outcomes. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Researchers only conduct exploratory review of anyone who commits fraud in a medical scheme claim, whether the applicable law or SOP is supportive or not, and other related processes. Without identifying the cause factor in detail. \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td-with-role" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t ; entry_with_role_rowhead " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">5 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Examining the network components of a Medicare fraud scheme: the Mirzoyan-Terdjanian organization<a class="elsevierStyleCrossRef" href="#bib0220"><span class="elsevierStyleSup">16</span></a> \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Fraud of the United States Medicare system is detected at over $100million. To make losses in the healthcare sector. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Medicare organizations in the US. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Observation of Mirzoyan-Terdjanian organizational data related fraud financial system U.S. Medicare. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">An exploratory study using the archive data collection Mirzoyan-Terdjanian, USA. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Fraud schemesNetwork characteristicCentrality \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">The Medicare system detects the nature of claims over fraud submitted only after hundreds of thousands of dollars in the claim has been paid.In total, there were 70 people involved in this criminal activity, with an average age ranging from 43.21 years. Where from the seventy defendants six are given federal charges separate from the five states.The female group has a very small role in conducting fraud 4. Perpetrators need various networks to conduct fraud practices (not own action). \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="" valign="\n \t\t\t\t\ttop\n \t\t\t\t"> \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Do not examine the nature or cause of perpetrators fraud. \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td-with-role" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t ; entry_with_role_rowhead " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">6 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Big Data fraud detection using multiple medicare data sources<a class="elsevierStyleCrossRef" href="#bib0235"><span class="elsevierStyleSup">19</span></a> \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">In the United States, with the improvement of technology and medical sciences, the quality of public welfare services continues to be attentive and enhanced by the Medicare as an institution that helps manage high cost constraints related to quality healthcare. Therefore, the improvement of this service still has a spotlight on the act of fraud of some parties who seek personal benefit. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Health care centers incorporated in Medicare and Medicaid USA. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Data observation related to fraud data Set CMS (Centers for Medicare and Medicaid Services). \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Quantitative research by processing Big Data analyzed on Apache Spark computer system quickly. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Medicare provider Utilization and payment Data:DoctorsPrescriberC. Durable medical equipment, Prosthetics, Orthotics and Supplies (DMEPOS). \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">There is no way found to know the actions of the perpetrator will commit the fraud in this research especially in the original Medicare, so they recommend using various combined datasets to detect fraud behavior when a physician has submitted a payment through one or all of the evaluated Medicare sections. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">The study provides discussion on the processing of Medicare's big data and experiments and exploration analyses to show students and best datasets to detect fraud claimed by Medicare providers. In addition, the processed data sets are regarded as big Data and as such, for their fraud detection experiments use the Spark above the Hadoop YARN cluster that can effectively handle large dataset sizes. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Researchers only detect fraud from secondary data collected, without conducting a deeper study of the fundamental factors of fraud in a public service. \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td-with-role" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t ; entry_with_role_rowhead " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">7 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Medicare fraud detection using neural networks<a class="elsevierStyleCrossRef" href="#bib0230"><span class="elsevierStyleSup">18</span></a> \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Medicare becomes the best health care access trend today for the American population, especially for the elderly established by the local federal government, but the emergence of data abuse over the practice of fraud burdening tax payments up to billions of dollars and putting the health and welfare of beneficiaries at risk or indirectly hindering the balance of performance. So further detection of problems required. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Health care centers incorporated in U.S. Medicare. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Observation of fraud data Set specific CMS category B of Medicare year 2012–2016. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Research and Development where researchers want to evaluate the cause of service imbalance through 6 levels of data. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Medicare providerUtilization and paymentData of doctors and other equipment suppliers. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">The study results showed that using the method Comparing multiple levels of data and learning methods of deep algorithm levels across a variety of class distributions Can detect a more stable fraud than a commonly used basic method. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">This research provides evidence that the incidence of fraud can be selected using random over-sampling (ROS), random under-sampling (RUS), and hybrid ROS-RUS. For class imbalance handling on Neural Network based Software defect prediction. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Researchers only detect fraud from secondary data collected, without conducting a deeper study of the fundamental factors of fraud in a service. \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td-with-role" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t ; entry_with_role_rowhead " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">8 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Reducing medical claims cost to Ghana's National Health Insurance scheme: a crosssectional comparative assessment of the paper- and electronic-based claims reviews<a class="elsevierStyleCrossRef" href="#bib0240"><span class="elsevierStyleSup">20</span></a> \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Year 2003, Ghana introduces the National Health Insurance Scheme (NHIS) to replace the Payment systems directly on primary health services and continue to develop. However, as such advances have increased claims in some districts of the state, by which researchers observe the claim data as of January–December 2014. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">NHIS Health Care Center Ghana, Africa \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Observation of paper- and electronic-based claims of NHIS in Ghana \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Cross-sectional comparative assessment \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Document-based claims, and electronic-based claims \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">1. There are significant differences in cost adjustment rates between paper and electronic based reviews.2. The data listed in electronic reviews are significantly higher than those recorded from paper-based claims reviews. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">The researcher describes the Flow chart of NHIA claims review and reimbursement process as a representation of the reader in understanding the process. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Researchers only detect fraud from secondary data collected, without conducting a deeper study of the fundamental factors of fraud in a service. In addition, there are data on the adjustment of claims for outpatient costs and The cost of inpatient in the database cannot be accessed; Thus, this study was unable to assess the level of adjustment based on Health services for two reviews. Likewise, the number of claims marked by the review of claims and related reasons is also unavailable, So studies are unlikely to analyze the ratio of rejection of the two review systems. \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td-with-role" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t ; entry_with_role_rowhead " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">9 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Approaches for identifying U.S. medicare fraud in provider claims data<a class="elsevierStyleCrossRef" href="#bib0245"><span class="elsevierStyleSup">21</span></a> \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">It is reported that there is a harmony between an increase in the elderly population in the United States, with a chronic illness, implying the need for the continuity of healthcare services in the future that will be dating and the need for programs, such as the U.S. Medicare in particular to assist the medical expenses. However, due to health care fraud conspiracy, these programs are experiencing resource issues as well as the quality and accessibility needed Healthcare services. Therefore, evaluation is required for fraud detection related problems. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Track record specialist at Medicare \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Observation of Medicare claim dataset part B from 2012 to 2015. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">The best basic model, by comparing logistics regression and Multinomial Naive Bayes, is to test for increased fraud detection by U.S. Medicare part B providers. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Fraud rate \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Results showed that by using special grouping strategies, class deletions, and class isolation were applied to various medical service specializations, obtaining diverse but effective results in identifying potential fraud, compared to fraud detection via baseline logistic regression models. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">In this journal, researchers use approaches to predict which physician specialties are expected based on The type and number of procedures performed. From that approach, they produced a basic model that can be adopted, namely by comparing the logistical regression and Multinomial Naive Bayes, to test and assess some new approaches to improving the fraud detection of the Medicare section providers. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="\n \t\t\t\t\ttable-entry\n \t\t\t\t " align="left" valign="\n \t\t\t\t\ttop\n \t\t\t\t">Researchers only detect fraud from secondary data collected, without conducting a deeper study of the fundamental factors of fraud in a public service. \t\t\t\t\t\t\n \t\t\t\t</td></tr></tbody></table> """ ] "imagenFichero" => array:1 [ 0 => "xTab2781871.png" ] ] ] ] "descripcion" => array:1 [ "en" => "<p id="spar0030" class="elsevierStyleSimplePara elsevierViewall">Synthesis grid.</p>" ] ] ] "bibliografia" => array:2 [ "titulo" => "References" "seccion" => array:1 [ 0 => array:2 [ "identificador" => "bibs0015" "bibliografiaReferencia" => array:28 [ 0 => array:3 [ "identificador" => "bib0145" "etiqueta" => "1" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "The health care fraud challenge" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:1 [ 0 => "GHCAN" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Libro" => array:1 [ "fecha" => "2011" ] ] ] ] ] ] 1 => array:3 [ "identificador" => "bib0150" "etiqueta" => "2" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Crossing the global quality chasm: improving health care worldwide" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:1 [ 0 => "NASEM" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Libro" => array:3 [ "fecha" => "2018" "editorial" => "National Academies Press" "editorialLocalizacion" => "Washington, DC" ] ] ] ] ] ] 2 => array:3 [ "identificador" => "bib0155" "etiqueta" => "3" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "The financial cost of healthcare fraud" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:3 [ 0 => "B.J. Gee" 1 => "M. Button" 2 => "G. Brooks" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Libro" => array:3 [ "fecha" => "2010" "editorial" => "University of Portsmouth" "editorialLocalizacion" => "Hampshire, Inggris" ] ] ] ] ] ] 3 => array:3 [ "identificador" => "bib0160" "etiqueta" => "4" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "The challenge of health care fraud" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:1 [ 0 => "NHCAA" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Libro" => array:1 [ "fecha" => "2020" ] ] ] ] ] ] 4 => array:3 [ "identificador" => "bib0165" "etiqueta" => "5" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Global claims fraud survey" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:1 [ 0 => "RGA" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Libro" => array:2 [ "fecha" => "2017" "editorial" => "America, USA" ] ] ] ] ] ] 5 => array:3 [ "identificador" => "bib0170" "etiqueta" => "6" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Combating healthcare corruption and fraud with improved global health governance" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "T.K. MacKey" 1 => "B.A. Liang" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:3 [ "tituloSerie" => "BMC Int Health Hum Rights" "fecha" => "2012" "volumen" => "12" ] ] ] ] ] ] 6 => array:3 [ "identificador" => "bib0175" "etiqueta" => "7" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Fraud triangle theory and fraud diamond theory: Understanding the convergent and divergent for future" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "N. Mansor" 1 => "R. Abdullahi" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:5 [ "tituloSerie" => "IJARAFMS" "fecha" => "2015" "volumen" => "1" "paginaInicial" => "38" "paginaFinal" => "45" ] ] ] ] ] ] 7 => array:3 [ "identificador" => "bib0180" "etiqueta" => "8" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Ethics in health care: healthcare fraud" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:3 [ 0 => "O. Ga" 1 => "F. Sa" 2 => "F.F. Med" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:5 [ "tituloSerie" => "South African Fam Pract" "fecha" => "2014" "volumen" => "56" "paginaInicial" => "10" "paginaFinal" => "13" ] ] ] ] ] ] 8 => array:3 [ "identificador" => "bib0185" "etiqueta" => "9" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Exposing medical fraud: “one of the last taboos in society" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:3 [ 0 => "D. Evans" 1 => "H.S. Financing" 2 => "J. Gee" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:5 [ "tituloSerie" => "Can Med Assoc J" "fecha" => "2013" "volumen" => "185" "paginaInicial" => "16" "paginaFinal" => "17" ] ] ] ] ] ] 9 => array:3 [ "identificador" => "bib0190" "etiqueta" => "10" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Insurance fraud claims reaches fresh high in Korea in 2018" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "L. Seung-yoon" 1 => "L. Eun-joo" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Libro" => array:1 [ "fecha" => "2018" ] ] ] ] ] ] 10 => array:3 [ "identificador" => "bib0195" "etiqueta" => "11" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "American senior communities: healthcare fraud detection" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:3 [ 0 => "D. Baranek" 1 => "E. Action" 2 => "H. Services" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:5 [ "tituloSerie" => "J Mod Accout Audi" "fecha" => "2018" "volumen" => "14" "paginaInicial" => "671" "paginaFinal" => "679" ] ] ] ] ] ] 11 => array:3 [ "identificador" => "bib0200" "etiqueta" => "12" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Overview of reviews" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "A.L. Becker" 1 => "D.A. Oxman" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Libro" => array:2 [ "titulo" => "Cochrane handbook for systematic reviews of interventions: Cochrane book series. Cochrane handbook" "fecha" => "2008" ] ] ] ] ] ] 12 => array:3 [ "identificador" => "bib0205" "etiqueta" => "13" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Understanding the types of fraud in claims to South African medical schemes" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "T.G. Legotlo" 1 => "A. Mutezo" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:5 [ "tituloSerie" => "South African Med J" "fecha" => "2018" "volumen" => "108" "paginaInicial" => "299" "paginaFinal" => "303" ] ] ] ] ] ] 13 => array:3 [ "identificador" => "bib0210" "etiqueta" => "14" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Improving fraud and abuse detection in general physician claims: a data mining study" "autores" => array:1 [ 0 => array:2 [ "etal" => true "autores" => array:3 [ 0 => "H. Joudaki" 1 => "A. Rashidian" 2 => "B. Minaei-Bidgoli" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:5 [ "tituloSerie" => "Int J Heal Policy Manag" "fecha" => "2016" "volumen" => "5" "paginaInicial" => "165" "paginaFinal" => "172" ] ] ] ] ] ] 14 => array:3 [ "identificador" => "bib0215" "etiqueta" => "15" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Physician medicare fraud: characteristics and consequences" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "V. Pande" 1 => "W. Maas" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:5 [ "tituloSerie" => "Int J Pharm Healthc Mark" "fecha" => "2014" "volumen" => "7" "paginaInicial" => "8" "paginaFinal" => "33" ] ] ] ] ] ] 15 => array:3 [ "identificador" => "bib0220" "etiqueta" => "16" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Examining the network components of a medicare fraud scheme: the Mirzoyan-Terdjanian organization" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:1 [ 0 => "T.J. Meyers" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:5 [ "tituloSerie" => "Crime Law Soc Chang" "fecha" => "2017" "volumen" => "68" "paginaInicial" => "251" "paginaFinal" => "279" ] ] ] ] ] ] 16 => array:3 [ "identificador" => "bib0225" "etiqueta" => "17" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Financial fraud in the private health insurance sector in Australia perspectives from the industry" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:1 [ 0 => "K. Flynn" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:5 [ "tituloSerie" => "J Financ Crime" "fecha" => "2016" "volumen" => "23" "paginaInicial" => "143" "paginaFinal" => "158" ] ] ] ] ] ] 17 => array:3 [ "identificador" => "bib0230" "etiqueta" => "18" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Medicare fraud detection using neural networks). Medicare fraud detection using neural networks" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "J.M. Johnson" 1 => "T.M. Khoshgoftaar" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:5 [ "tituloSerie" => "J Big Data" "fecha" => "2019" "volumen" => "6" "paginaInicial" => "1" "paginaFinal" => "35" ] ] ] ] ] ] 18 => array:3 [ "identificador" => "bib0235" "etiqueta" => "19" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Big data fraud detection using multiple medicare data sources" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:3 [ 0 => "M. Herland" 1 => "T.M. Khoshgoftaar" 2 => "R.A. Bauder" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:5 [ "tituloSerie" => "J Big Data" "fecha" => "2018" "volumen" => "5" "paginaInicial" => "1" "paginaFinal" => "21" ] ] ] ] ] ] 19 => array:3 [ "identificador" => "bib0240" "etiqueta" => "20" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Reducing medical claims cost to Ghana's National Health Insurance scheme: a cross- sectional comparative assessment of the paper- and electronic-based claims reviews" "autores" => array:1 [ 0 => array:2 [ "etal" => true "autores" => array:3 [ 0 => "E. Nsiah-boateng" 1 => "F. Asenso-Boadi" 2 => "L. Dsane-Selby" ] ] ] ] ] "host" => array:1 [ 0 => array:2 [ "doi" => "10.1186/s12913-016-1943-z" "Revista" => array:6 [ "tituloSerie" => "BMC Health Serv Res" "fecha" => "2017" "volumen" => "17" "paginaInicial" => "1" "paginaFinal" => "7" "link" => array:1 [ 0 => array:2 [ "url" => "https://www.ncbi.nlm.nih.gov/pubmed/28049468" "web" => "Medline" ] ] ] ] ] ] ] ] 20 => array:3 [ "identificador" => "bib0245" "etiqueta" => "21" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Approaches for identifying U.S. medicare fraud in provider claims data" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:3 [ 0 => "M. Herland" 1 => "R.A. Bauder" 2 => "T.M. Khoshgoftaar" ] ] ] ] ] "host" => array:1 [ 0 => array:2 [ "doi" => "10.1007/s10729-011-9175-6" "Revista" => array:5 [ "tituloSerie" => "Health Care Management Science" "fecha" => "2018" "paginaInicial" => "1" "paginaFinal" => "18" "link" => array:1 [ 0 => array:2 [ "url" => "https://www.ncbi.nlm.nih.gov/pubmed/21901533" "web" => "Medline" ] ] ] ] ] ] ] ] 21 => array:3 [ "identificador" => "bib0250" "etiqueta" => "22" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Medicare and the affordable care act: fraud control efforts and results" "autores" => array:1 [ 0 => array:2 [ "etal" => true "autores" => array:3 [ 0 => "S. Clemente" 1 => "R. McGrady" 2 => "Repass R." ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:5 [ "tituloSerie" => "Int J Healthc Manag" "fecha" => "2018" "volumen" => "11" "paginaInicial" => "356" "paginaFinal" => "362" ] ] ] ] ] ] 22 => array:3 [ "identificador" => "bib0255" "etiqueta" => "23" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Combating health care fraud in a post-reform world: seven guiding principles for policymakers" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:1 [ 0 => "National Health Care Anti-Fraud Association [NHCAA]" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Libro" => array:2 [ "fecha" => "2010" "editorial" => "NHCAA" ] ] ] ] ] ] 23 => array:3 [ "identificador" => "bib0260" "etiqueta" => "24" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Health economics, policy and law" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "S. Holmberg" 1 => "B. Rothstein" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:5 [ "tituloSerie" => "Heal Econ Policy Law" "fecha" => "2011" "volumen" => "6" "paginaInicial" => "529" "paginaFinal" => "547" ] ] ] ] ] ] 24 => array:3 [ "identificador" => "bib0265" "etiqueta" => "25" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "A fraud detection approach with data mining in health insurance" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "M. Kirlidog" 1 => "C. Asuk" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:4 [ "tituloSerie" => "Proc Soc Behav Sci" "fecha" => "2012" "paginaInicial" => "989" "paginaFinal" => "994" ] ] ] ] ] ] 25 => array:3 [ "identificador" => "bib0270" "etiqueta" => "26" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Predicting medical provider specialties to detect anomalous insurance claims" "autores" => array:1 [ 0 => array:2 [ "etal" => true "autores" => array:3 [ 0 => "R.A. Bauder" 1 => "T.M. Khoshgoftaar" 2 => "A. Richter" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "IEEE 28th int conf tools with artif intell" "paginaInicial" => "784" "paginaFinal" => "790" "serieFecha" => "2016" ] ] ] ] ] ] 26 => array:3 [ "identificador" => "bib0275" "etiqueta" => "27" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Causes and challenges of healthcare fraud in the US" "autores" => array:1 [ 0 => array:2 [ "etal" => true "autores" => array:3 [ 0 => "P.C. Dean" 1 => "J. Vazquez-Gonzalez" 2 => "L. Fricker" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:5 [ "tituloSerie" => "Int J Business Soc Sci" "fecha" => "2013" "volumen" => "4" "paginaInicial" => "1" "paginaFinal" => "4" ] ] ] ] ] ] 27 => array:3 [ "identificador" => "bib0280" "etiqueta" => "28" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Multi-stage methodology to detect health insurance claim fraud" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "E.M. Johnson" 1 => "N. Nagarur" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:2 [ "tituloSerie" => "J Big Data" "fecha" => "2016" ] ] ] ] ] ] ] ] ] ] ] "idiomaDefecto" => "en" "url" => "/02139111/00000035000000S2/v1_202112201615/S0213911121002661/v1_202112201615/en/main.assets" "Apartado" => null "PDF" => "https://static.elsevier.es/multimedia/02139111/00000035000000S2/v1_202112201615/S0213911121002661/v1_202112201615/en/main.pdf?idApp=WGSE&text.app=https://gacetasanitaria.org/" "EPUB" => "https://multimedia.elsevier.es/PublicationsMultimediaV1/item/epub/S0213911121002661?idApp=WGSE" ]
año/Mes | Html | Total | |
---|---|---|---|
2024 Noviembre | 6 | 2 | 8 |
2024 Octubre | 142 | 58 | 200 |
2024 Septiembre | 92 | 42 | 134 |
2024 Agosto | 88 | 63 | 151 |
2024 Julio | 50 | 41 | 91 |
2024 Junio | 52 | 30 | 82 |
2024 Mayo | 69 | 49 | 118 |
2024 Abril | 62 | 32 | 94 |
2024 Marzo | 48 | 39 | 87 |
2024 Febrero | 59 | 38 | 97 |
2024 Enero | 91 | 34 | 125 |
2023 Diciembre | 47 | 36 | 83 |
2023 Noviembre | 64 | 38 | 102 |
2023 Octubre | 66 | 37 | 103 |
2023 Septiembre | 56 | 25 | 81 |
2023 Agosto | 94 | 27 | 121 |
2023 Julio | 77 | 42 | 119 |
2023 Junio | 64 | 49 | 113 |
2023 Mayo | 52 | 44 | 96 |
2023 Abril | 69 | 33 | 102 |
2023 Marzo | 44 | 44 | 88 |
2023 Febrero | 27 | 27 | 54 |
2023 Enero | 40 | 28 | 68 |
2022 Diciembre | 45 | 29 | 74 |
2022 Noviembre | 51 | 63 | 114 |
2022 Octubre | 41 | 54 | 95 |
2022 Septiembre | 34 | 54 | 88 |
2022 Agosto | 34 | 62 | 96 |
2022 Julio | 56 | 81 | 137 |
2022 Junio | 41 | 65 | 106 |
2022 Mayo | 34 | 47 | 81 |
2022 Abril | 49 | 51 | 100 |
2022 Marzo | 48 | 42 | 90 |
2022 Febrero | 38 | 33 | 71 |
2022 Enero | 45 | 67 | 112 |
2021 Diciembre | 10 | 16 | 26 |