Healthcare Fraud: Auditing and Detection Guide / Edition 2

Hardcover (Print)
Buy New
Buy New from BN.com
$45.66
Buy Used
Buy Used from BN.com
$44.11
(Save 41%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $27.92
Usually ships in 1-2 business days
(Save 62%)
Other sellers (Hardcover)
  • All (15) from $27.92   
  • New (9) from $28.87   
  • Used (6) from $27.92   

Overview

Healthcare Fraud

Auditing And Detection Guide

According to private and public estimates, approximately $24 million is lost per hour to healthcare waste, fraud, and abuse. Still, the impact of healthcare fraud cannot be measured in terms of dollars alone. In addition to burdening the nation with enormous financial costs, it also threatens the quality of healthcare and steals the very essence of human life.

A must-have reference for auditors, fraud investigators, and healthcare managers, Healthcare Fraud: Auditing and Detection Guide provides tips and techniques to help readers spot the "red flags" of fraudulent activity and reveals the steps to take when fraud is suspected.

Clearly structured to identify what is normal at any point in the healthcare continuum on both individual and cumulative scales, this timely guidebook helps auditing professionals in the healthcare industry to sharpen their fraud detection skills to see beyond the eclipse created by healthcare fraud. Healthcare Fraud: Auditing and Detection Guide features:

  • Comprehensive guidance on auditing and fraud detection for healthcare providers and company healthcare plans
  • A look at how data mapping and mining can be used as a key tool to maximize both the effectiveness and efficiency of fraud investigations
  • Insightful discussion from a number of perspectives—clinical, research, internal audit, investigative, data intelligence, and forensic
  • Building blocks for understanding the entire healthcare market and its respective players
  • Cases and methodologies providing actual audit and investigative tools
  • Useful outlines of healthcare fraud prevention, detection, and investigation methods

Healthcare Fraud: Auditing and Detection Guide serves as an invaluable tool equipping healthcare professionals, auditors, and investigators to detect every kind of healthcare fraud, from false statements and claims to elaborate collusive schemes.

Read More Show Less

Product Details

  • ISBN-13: 9781118179802
  • Publisher: Wiley
  • Publication date: 5/1/2012
  • Edition number: 2
  • Pages: 340
  • Sales rank: 446,846
  • Product dimensions: 6.20 (w) x 9.10 (h) x 0.90 (d)

Table of Contents


Preface     xiii
Acknowledgments     xvii
Introduction to Healthcare Fraud     1
What Is Healthcare Fraud?     2
What Does Healthcare Fraud Look Like?     4
Healthcare Fraud in the United States     8
Healthcare Fraud in International Markets     9
Who Commits Healthcare Fraud?     10
What Is Healthcare Fraud Examination?     11
The Healthcare Continuum: An Overview     13
Healthcare Fraud Overview: Implications for Prevention, Detection, and Investigation     14
Defining Market Players within the Healthcare Continuum     17
The Patient     18
Who Is the Patient?     18
What Are Some Examples of Patient Fraud?     22
How Does the Patient Role Relate to Other Healthcare Continuum Players?     23
The Provider     23
Who Is the Provider?     23
What Are Some Examples of Provider Fraud?     33
How Does the Provider Role Relate to Other Healthcare Continuum Players?     35
The Payer     35
Who Is the Payer?     35
What Are Some Examples of Payer Fraud?     38
How Does the Payer Role Relate to Other Healthcare Continuum Players?     41
The Employer/Plan Sponsor     42
Who Is the Employer/Plan Sponsor?     42
What Are Some Examples of Employer/Plan Sponsor Fraud?     43
How Does the Employer/Plan Sponsor Role Relate to Other Healthcare Continuum Players?     43
The Vendor and the Supplier     44
Who Are the Vendor and the Supplier?     44
What Are Some Examples of Vendor and Supplier Fraud?     44
How Do the Vendor and Supplier Roles Relate to Other Healthcare Continuum Players?     44
The Government     45
Who Is the Government?     45
What Are Some Examples of Government Fraud?     45
How Does the Government Role Relate to Other Healthcare Continuum Players?     46
Organized Crime     46
Who Is Organized Crime?     47
How Does the Organized Crime Role Relate to Other Healthcare Continuum Players?     48
Market Players Overview: Implications for Prevention, Detection, and Investigation     48
Protected Health Information     51
Health Insurance Portability and Accountability Act of 1996     51
Audit Guidelines in Using PHI     52
Protected Health Information Overview: Implications for Prevention, Detection, and Investigation     54
Health Information Pipelines      57
The Auditor's Checklist     57
What Are the Channels of Communication in a Health Information Pipeline?     58
The Patient     58
The Provider     60
The Payer     61
The Employer/Plan Sponsor     63
The Vendor/Supplier     65
The Government Plan Sponsor     66
Unauthorized Parties     67
HIP Overview: Implications for Prevention, Detection, and Investigation     69
Accounts Receivable Pipelines     71
Overview of Healthcare Reimbursement     72
Types of Reimbursement Models     74
Fee-for-Service Model     74
Prospective Model     74
Capitation-Structured Model     77
Data Contained in Accounts Receivable Pipelines     77
Accounts Receivable Pipelines by HCC Player     79
The Patient     80
The Provider     84
The Payer     87
The Employer/Plan Sponsor     92
Others     95
ARP Overview: Implications for Prevention, Detection, and Investigation     99
Operational Flow Activity     101
Operational Flow Activity Assessment     101
The Patient      102
The Provider     103
The Payer     103
The Employer     105
The "Other"     107
OFA Overview: Implications for Prevention, Detection, and Investigation     108
Product, Service, and Consumer Market Activity     109
Product Market Activity     110
Service Market Activity     111
Consumer Market Activity     112
PMA, SMA, and CMA Overview: Implications for Prevention, Detection, and Investigation     120
Data Management     123
Data Management     124
Market Example: Setting Up a Claims RDBMS     128
Data Management Overview: Implications for Prevention, Detection, and Investigation     129
References     129
Normal Infrastructure     131
Normal Profile of a Fraudster     132
What Types of People or Entities Commit Fraud?     132
What Is the Key Element of a Fraudster?     133
Anomalies and Abnormal Patterns     134
Normal Infrastructure Overview: Implications for Prevention, Detection, and Investigation     135
Normal Infrastructure and Anomaly Tracking Systems     137
The Patient     137
Sample Patient Fraud Scenarios      138
Data Management Considerations     139
The Untold Story     139
The Provider     139
Sample Provider Fraud Scenarios     140
Data Management Considerations     142
The Untold Story     142
The Payer     143
Sample Payer Fraud Scenarios     144
Data Management Considerations     145
The Untold Story     145
The Vendor/Other Parties     146
Sample Vendor/Other Fraud Scenarios     147
Data Management Considerations     148
The Untold Story     149
Organized Crime     150
Sample Organized Crime Fraud Scenarios     150
Data Management Considerations     151
The Untold Story     151
Normal Infrastructure and Anomaly Tracking Systems Overview: Implications for Prevention, Detection, and Investigation     152
Components of the Data Mapping Process     153
What Is Data Mapping?     153
Data Mapping Overview: Implications for Prevention, Detection, and Investigation     158
Components of the Data Mining Process     159
What Is Data Mining?     159
Data Mining in Healthcare     160
Components of the Data Mining Process within the HCC     161
Data Mining Overview: Implications for Prevention, Detection, and Investigation     162
Components of the Data Mapping and Data Mining Process     165
Forensic Application of Data Mapping and Data Mining     167
Data Mapping and Data Mining Overview: Implications for Prevention, Detection, and Investigation     170
Data Analysis Models     173
Detection Model     173
Pipeline Application     175
Detection Model Application     176
Investigation Model     176
Mitigation Model     181
Prevention Model     182
Response Model     189
Recovery Model     194
Data Analysis Model Overview: Implications for Prevention, Detection, and Investigation     204
Clinical Content Data Analysis     207
What Is SOAP?     208
The SOAP Methodology     209
Electronic Records     225
Analysis Considerations with Electronic Records     226
Narrative Discourse Analysis     229
Clinical Content Analysis Overview: Implications for Prevention, Detection, and Investigation     237
Profilers     239
Fraud and Profilers     239
Medical Errors and Profilers     244
Financial Errors and Profilers     249
Internal Audit and Profilers     253
Recovery and Profilers     256
Anomaly and Profilers     257
Fraud Awareness and Profilers     259
Profiler Overview: Implications for Prevention, Detection, and Investigation     260
Market Implications     261
The Myth     261
"Persistent"     264
"Persuasive"     265
"Unrealistic"     266
Market Overview: Implications for Prevention, Detection, and Investigation     268
Conclusions     271
Micromanagement Perspective     271
Macromanagement Perspective     278
Overview of Prevention, Detection, and Investigation     279
Index     283
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)