Healthcare Fraud: Auditing and Detection Guide / Edition 2

Healthcare Fraud: Auditing and Detection Guide / Edition 2

by Rebecca S. Busch
     
 

Healthcare Fraud Auditing and Detection Guide

The world of healthcare fraud is much more than just pocketing money or a corporate asset. Stealing the very essence of human life, healthcare fraud ranges from false claims by perpetrators who perform needless procedures that disable and kill, to rogue Internet pharmacies. Once limited to petty thefts and

See more details below

Overview

Healthcare Fraud Auditing and Detection Guide

The world of healthcare fraud is much more than just pocketing money or a corporate asset. Stealing the very essence of human life, healthcare fraud ranges from false claims by perpetrators who perform needless procedures that disable and kill, to rogue Internet pharmacies. Once limited to petty thefts and deliberately incorrect billing, the world of healthcare fraud has become one of high-tech, highly skilled, educated, and professional perpetrators.

Now completely updated, this Second Edition of Healthcare Fraud: Auditing and Detection Guide is the must-have reference for auditors, fraud investigators, and healthcare managers, revealing proven tips and techniques to help you spot the "red flags" of fraudulent activity, as well as the steps you need to take when fraud is suspected. Author Rebecca Busch—a pioneer in conducting technology and process-enabled audits of healthcare claims and processing—presents comprehensive guidance on auditing and fraud detection for healthcare providers and company healthcare plans.

Healthcare Fraud, Second Edition features:

  • Six new chapters detailing a comprehensive audit model encompassing primary, secondary, information, damages, transparency, and rules-based continuum. Detailed analytic pipelines within each continuum extrapolating components of PHI, dollars involved, operations, products, services, and type of consumer. This integration is the secret sauce to any successful investigation.
  • How data mapping and mining can be used as a key tool to maximize the effectiveness of fraud investigations
  • Insightful discussion from a number of perspectives; clinical, research, internal audit, investigative, data intelligence, and forensic
  • A behind-the-scenes look at internal controls and anomaly tracking systems for ongoing monitoring and surveillance
  • Building blocks for understanding the entire healthcare market and its respective players
  • Cases and methodologies providing actual audit and investigative tools
  • Useful outlines of healthcare fraud prevention, detection, and investigation methods

Sharpen your skills as an auditor or investigator to identify incontrovertible truth with the visionary guidance found in Healthcare Fraud, Second Edition.

Read More

Product Details

ISBN-13:
9781118179802
Publisher:
Wiley
Publication date:
05/01/2012
Pages:
340
Sales rank:
738,166
Product dimensions:
6.20(w) x 9.10(h) x 0.90(d)

Related Subjects

Table of Contents


Preface     xiii
Acknowledgments     xvii
Introduction to Healthcare Fraud     1
What Is Healthcare Fraud?     2
What Does Healthcare Fraud Look Like?     4
Healthcare Fraud in the United States     8
Healthcare Fraud in International Markets     9
Who Commits Healthcare Fraud?     10
What Is Healthcare Fraud Examination?     11
The Healthcare Continuum: An Overview     13
Healthcare Fraud Overview: Implications for Prevention, Detection, and Investigation     14
Defining Market Players within the Healthcare Continuum     17
The Patient     18
Who Is the Patient?     18
What Are Some Examples of Patient Fraud?     22
How Does the Patient Role Relate to Other Healthcare Continuum Players?     23
The Provider     23
Who Is the Provider?     23
What Are Some Examples of Provider Fraud?     33
How Does the Provider Role Relate to Other Healthcare Continuum Players?     35
The Payer     35
Who Is the Payer?     35
What Are Some Examples of Payer Fraud?     38
How Does the Payer Role Relate to Other Healthcare Continuum Players?     41
The Employer/Plan Sponsor     42
Who Is the Employer/Plan Sponsor?     42
What Are Some Examples of Employer/Plan Sponsor Fraud?     43
How Does the Employer/Plan Sponsor Role Relate to Other Healthcare Continuum Players?     43
The Vendor and the Supplier     44
Who Are the Vendor and the Supplier?     44
What Are Some Examples of Vendor and Supplier Fraud?     44
How Do the Vendor and Supplier Roles Relate to Other Healthcare Continuum Players?     44
The Government     45
Who Is the Government?     45
What Are Some Examples of Government Fraud?     45
How Does the Government Role Relate to Other Healthcare Continuum Players?     46
Organized Crime     46
Who Is Organized Crime?     47
How Does the Organized Crime Role Relate to Other Healthcare Continuum Players?     48
Market Players Overview: Implications for Prevention, Detection, and Investigation     48
Protected Health Information     51
Health Insurance Portability and Accountability Act of 1996     51
Audit Guidelines in Using PHI     52
Protected Health Information Overview: Implications for Prevention, Detection, and Investigation     54
Health Information Pipelines      57
The Auditor's Checklist     57
What Are the Channels of Communication in a Health Information Pipeline?     58
The Patient     58
The Provider     60
The Payer     61
The Employer/Plan Sponsor     63
The Vendor/Supplier     65
The Government Plan Sponsor     66
Unauthorized Parties     67
HIP Overview: Implications for Prevention, Detection, and Investigation     69
Accounts Receivable Pipelines     71
Overview of Healthcare Reimbursement     72
Types of Reimbursement Models     74
Fee-for-Service Model     74
Prospective Model     74
Capitation-Structured Model     77
Data Contained in Accounts Receivable Pipelines     77
Accounts Receivable Pipelines by HCC Player     79
The Patient     80
The Provider     84
The Payer     87
The Employer/Plan Sponsor     92
Others     95
ARP Overview: Implications for Prevention, Detection, and Investigation     99
Operational Flow Activity     101
Operational Flow Activity Assessment     101
The Patient      102
The Provider     103
The Payer     103
The Employer     105
The "Other"     107
OFA Overview: Implications for Prevention, Detection, and Investigation     108
Product, Service, and Consumer Market Activity     109
Product Market Activity     110
Service Market Activity     111
Consumer Market Activity     112
PMA, SMA, and CMA Overview: Implications for Prevention, Detection, and Investigation     120
Data Management     123
Data Management     124
Market Example: Setting Up a Claims RDBMS     128
Data Management Overview: Implications for Prevention, Detection, and Investigation     129
References     129
Normal Infrastructure     131
Normal Profile of a Fraudster     132
What Types of People or Entities Commit Fraud?     132
What Is the Key Element of a Fraudster?     133
Anomalies and Abnormal Patterns     134
Normal Infrastructure Overview: Implications for Prevention, Detection, and Investigation     135
Normal Infrastructure and Anomaly Tracking Systems     137
The Patient     137
Sample Patient Fraud Scenarios      138
Data Management Considerations     139
The Untold Story     139
The Provider     139
Sample Provider Fraud Scenarios     140
Data Management Considerations     142
The Untold Story     142
The Payer     143
Sample Payer Fraud Scenarios     144
Data Management Considerations     145
The Untold Story     145
The Vendor/Other Parties     146
Sample Vendor/Other Fraud Scenarios     147
Data Management Considerations     148
The Untold Story     149
Organized Crime     150
Sample Organized Crime Fraud Scenarios     150
Data Management Considerations     151
The Untold Story     151
Normal Infrastructure and Anomaly Tracking Systems Overview: Implications for Prevention, Detection, and Investigation     152
Components of the Data Mapping Process     153
What Is Data Mapping?     153
Data Mapping Overview: Implications for Prevention, Detection, and Investigation     158
Components of the Data Mining Process     159
What Is Data Mining?     159
Data Mining in Healthcare     160
Components of the Data Mining Process within the HCC     161
Data Mining Overview: Implications for Prevention, Detection, and Investigation     162
Components of the Data Mapping and Data Mining Process     165
Forensic Application of Data Mapping and Data Mining     167
Data Mapping and Data Mining Overview: Implications for Prevention, Detection, and Investigation     170
Data Analysis Models     173
Detection Model     173
Pipeline Application     175
Detection Model Application     176
Investigation Model     176
Mitigation Model     181
Prevention Model     182
Response Model     189
Recovery Model     194
Data Analysis Model Overview: Implications for Prevention, Detection, and Investigation     204
Clinical Content Data Analysis     207
What Is SOAP?     208
The SOAP Methodology     209
Electronic Records     225
Analysis Considerations with Electronic Records     226
Narrative Discourse Analysis     229
Clinical Content Analysis Overview: Implications for Prevention, Detection, and Investigation     237
Profilers     239
Fraud and Profilers     239
Medical Errors and Profilers     244
Financial Errors and Profilers     249
Internal Audit and Profilers     253
Recovery and Profilers     256
Anomaly and Profilers     257
Fraud Awareness and Profilers     259
Profiler Overview: Implications for Prevention, Detection, and Investigation     260
Market Implications     261
The Myth     261
"Persistent"     264
"Persuasive"     265
"Unrealistic"     266
Market Overview: Implications for Prevention, Detection, and Investigation     268
Conclusions     271
Micromanagement Perspective     271
Macromanagement Perspective     278
Overview of Prevention, Detection, and Investigation     279
Index     283

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >