Healthcare Fraud: Auditing and Detection Guide / Edition 2

Hardcover (Print)
Buy New
Buy New from BN.com
$44.01
Buy Used
Buy Used from BN.com
$44.11
(Save 41%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $34.30
Usually ships in 1-2 business days
(Save 54%)
Other sellers (Hardcover)
  • All (15) from $34.30   
  • New (8) from $34.85   
  • Used (7) from $34.30   

Overview

Praise for Healthcare Fraud

"Rebecca Busch has taken the cumbersome and complex subject of healthcare fraud and dissected it into well-defined parts. Her thoughtful discussion of how and where these parts provide opportunities for fraud—and how to detect and prevent it—is the essence of this work. This book is a must read for anyone involved in the prevention, detection, and investigation of healthcare fraud."

Robert M. Bryant President and Chief Executive Officer, National Insurance Crime Bureau

"Fraud continues to be a major subject area for internal auditors. Recent studies by the IIA show that healthcare audits are in the top ten subject areas audited. This book speaks to the necessary background that internal auditors should have when auditing healthcare activities so that they can have the necessary skills to look for and deal with potential fraudulent situations. I recommend this book be part of every internal audit department's library."

Dave Richards, CIA, CPAPresident, The Institute of Internal Auditors

"The cost of healthcare fraud continues to escalate each year. It is a terrible burden on our already fragile healthcare system. This book will provide anti-fraud professionals with a valuable resource to help combat this critical problem."

James D. Ratley, CFEPresident, Association of Certified Fraud Examiners

"Rebecca Busch's Healthcare Fraud: Auditing and Detection Guide fills a critical gap in anti-fraud literature. Written professionally and precisely, yet eminently readable, this book will be the 'go to' source for managers, academics, attorneys, auditors, and fraud examiners involved in healthcare. Healthcare Fraud: Auditing and Detection Guide demonstrates Ms. Busch's expertise and depth of knowledge in the area of healthcare fraud, and is testimony as to why she is such a sought-after speaker and educator."

William J. Kresse, MS, JD, CPA, CFEAssistant Professor, Saint Xavier UniversityGraham School of Management2007 ACFE Educator of the Year

Read More Show Less

Product Details

  • ISBN-13: 9781118179802
  • Publisher: Wiley, John & Sons, Incorporated
  • Publication date: 5/1/2012
  • Edition number: 2
  • Pages: 340
  • Sales rank: 672,089
  • Product dimensions: 6.20 (w) x 9.10 (h) x 0.90 (d)

Meet the Author

Rebecca S. Busch, RN, MBA, CCM, CBM, CHS-III, CFE, FHFMA, is President and CEO of Medical Business Associates, Inc., a consulting firm specializing in healthcare audits for employers, hospitals, and insurance companies. She has over twenty years of achievement in the healthcare management industry. She is a faculty member of the Association of Certified Fraud Examiners (ACFE), has published numerous articles, and is a frequent public speaker.

Read More Show Less

Table of Contents


Preface     xiii
Acknowledgments     xvii
Introduction to Healthcare Fraud     1
What Is Healthcare Fraud?     2
What Does Healthcare Fraud Look Like?     4
Healthcare Fraud in the United States     8
Healthcare Fraud in International Markets     9
Who Commits Healthcare Fraud?     10
What Is Healthcare Fraud Examination?     11
The Healthcare Continuum: An Overview     13
Healthcare Fraud Overview: Implications for Prevention, Detection, and Investigation     14
Defining Market Players within the Healthcare Continuum     17
The Patient     18
Who Is the Patient?     18
What Are Some Examples of Patient Fraud?     22
How Does the Patient Role Relate to Other Healthcare Continuum Players?     23
The Provider     23
Who Is the Provider?     23
What Are Some Examples of Provider Fraud?     33
How Does the Provider Role Relate to Other Healthcare Continuum Players?     35
The Payer     35
Who Is the Payer?     35
What Are Some Examples of Payer Fraud?     38
How Does the Payer Role Relate to Other Healthcare Continuum Players?     41
The Employer/Plan Sponsor     42
Who Is the Employer/Plan Sponsor?     42
What Are Some Examples of Employer/Plan Sponsor Fraud?     43
How Does the Employer/Plan Sponsor Role Relate to Other Healthcare Continuum Players?     43
The Vendor and the Supplier     44
Who Are the Vendor and the Supplier?     44
What Are Some Examples of Vendor and Supplier Fraud?     44
How Do the Vendor and Supplier Roles Relate to Other Healthcare Continuum Players?     44
The Government     45
Who Is the Government?     45
What Are Some Examples of Government Fraud?     45
How Does the Government Role Relate to Other Healthcare Continuum Players?     46
Organized Crime     46
Who Is Organized Crime?     47
How Does the Organized Crime Role Relate to Other Healthcare Continuum Players?     48
Market Players Overview: Implications for Prevention, Detection, and Investigation     48
Protected Health Information     51
Health Insurance Portability and Accountability Act of 1996     51
Audit Guidelines in Using PHI     52
Protected Health Information Overview: Implications for Prevention, Detection, and Investigation     54
Health Information Pipelines      57
The Auditor's Checklist     57
What Are the Channels of Communication in a Health Information Pipeline?     58
The Patient     58
The Provider     60
The Payer     61
The Employer/Plan Sponsor     63
The Vendor/Supplier     65
The Government Plan Sponsor     66
Unauthorized Parties     67
HIP Overview: Implications for Prevention, Detection, and Investigation     69
Accounts Receivable Pipelines     71
Overview of Healthcare Reimbursement     72
Types of Reimbursement Models     74
Fee-for-Service Model     74
Prospective Model     74
Capitation-Structured Model     77
Data Contained in Accounts Receivable Pipelines     77
Accounts Receivable Pipelines by HCC Player     79
The Patient     80
The Provider     84
The Payer     87
The Employer/Plan Sponsor     92
Others     95
ARP Overview: Implications for Prevention, Detection, and Investigation     99
Operational Flow Activity     101
Operational Flow Activity Assessment     101
The Patient      102
The Provider     103
The Payer     103
The Employer     105
The "Other"     107
OFA Overview: Implications for Prevention, Detection, and Investigation     108
Product, Service, and Consumer Market Activity     109
Product Market Activity     110
Service Market Activity     111
Consumer Market Activity     112
PMA, SMA, and CMA Overview: Implications for Prevention, Detection, and Investigation     120
Data Management     123
Data Management     124
Market Example: Setting Up a Claims RDBMS     128
Data Management Overview: Implications for Prevention, Detection, and Investigation     129
References     129
Normal Infrastructure     131
Normal Profile of a Fraudster     132
What Types of People or Entities Commit Fraud?     132
What Is the Key Element of a Fraudster?     133
Anomalies and Abnormal Patterns     134
Normal Infrastructure Overview: Implications for Prevention, Detection, and Investigation     135
Normal Infrastructure and Anomaly Tracking Systems     137
The Patient     137
Sample Patient Fraud Scenarios      138
Data Management Considerations     139
The Untold Story     139
The Provider     139
Sample Provider Fraud Scenarios     140
Data Management Considerations     142
The Untold Story     142
The Payer     143
Sample Payer Fraud Scenarios     144
Data Management Considerations     145
The Untold Story     145
The Vendor/Other Parties     146
Sample Vendor/Other Fraud Scenarios     147
Data Management Considerations     148
The Untold Story     149
Organized Crime     150
Sample Organized Crime Fraud Scenarios     150
Data Management Considerations     151
The Untold Story     151
Normal Infrastructure and Anomaly Tracking Systems Overview: Implications for Prevention, Detection, and Investigation     152
Components of the Data Mapping Process     153
What Is Data Mapping?     153
Data Mapping Overview: Implications for Prevention, Detection, and Investigation     158
Components of the Data Mining Process     159
What Is Data Mining?     159
Data Mining in Healthcare     160
Components of the Data Mining Process within the HCC     161
Data Mining Overview: Implications for Prevention, Detection, and Investigation     162
Components of the Data Mapping and Data Mining Process     165
Forensic Application of Data Mapping and Data Mining     167
Data Mapping and Data Mining Overview: Implications for Prevention, Detection, and Investigation     170
Data Analysis Models     173
Detection Model     173
Pipeline Application     175
Detection Model Application     176
Investigation Model     176
Mitigation Model     181
Prevention Model     182
Response Model     189
Recovery Model     194
Data Analysis Model Overview: Implications for Prevention, Detection, and Investigation     204
Clinical Content Data Analysis     207
What Is SOAP?     208
The SOAP Methodology     209
Electronic Records     225
Analysis Considerations with Electronic Records     226
Narrative Discourse Analysis     229
Clinical Content Analysis Overview: Implications for Prevention, Detection, and Investigation     237
Profilers     239
Fraud and Profilers     239
Medical Errors and Profilers     244
Financial Errors and Profilers     249
Internal Audit and Profilers     253
Recovery and Profilers     256
Anomaly and Profilers     257
Fraud Awareness and Profilers     259
Profiler Overview: Implications for Prevention, Detection, and Investigation     260
Market Implications     261
The Myth     261
"Persistent"     264
"Persuasive"     265
"Unrealistic"     266
Market Overview: Implications for Prevention, Detection, and Investigation     268
Conclusions     271
Micromanagement Perspective     271
Macromanagement Perspective     278
Overview of Prevention, Detection, and Investigation     279
Index     283
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)