Healthcare fraud : auditing and detection guide /
Saved in:
Author / Creator: | Busch, Rebecca S. |
---|---|
Imprint: | Hoboken, N.J. : John Wiley & Sons, c2008. |
Description: | xvii, 286 p. : ill. ; 24 cm. |
Language: | English |
Subject: | |
Format: | Print Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/6643892 |
Table of Contents:
- Preface
- Acknowledgments
- Chapter 1. Introduction to Healthcare Fraud
- What Is Healthcare Fraud?
- What Does Healthcare Fraud Look Like?
- Healthcare Fraud in the United States
- Healthcare Fraud in International Markets
- Who Commits Healthcare Fraud?
- What Is Healthcare Fraud Examination?
- The Healthcare Continuum: An Overview
- Healthcare Fraud Overview: Implications for Prevention, Detection, and Investigation
- Chapter 2. Defining Market Players within the Healthcare Continuum
- The Patient
- Who Is the Patient?
- What Are Some Examples of Patient Fraud?
- How Does the Patient Role Relate to Other Healthcare Continuum Players?
- The Provider
- Who Is the Provider?
- What Are Some Examples of Provider Fraud?
- How Does the Provider Role Relate to Other Healthcare Continuum Players?
- The Payer
- Who Is the Payer?
- What Are Some Examples of Payer Fraud?
- How Does the Payer Role Relate to Other Healthcare Continuum Players?
- The Employer/Plan Sponsor
- Who Is the Employer/Plan Sponsor?
- What Are Some Examples of Employer/Plan Sponsor Fraud?
- How Does the Employer/Plan Sponsor Role Relate to Other Healthcare Continuum Players?
- The Vendor and the Supplier
- Who Are the Vendor and the Supplier?
- What Are Some Examples of Vendor and Supplier Fraud?
- How Do the Vendor and Supplier Roles Relate to Other Healthcare Continuum Players?
- The Government
- Who Is the Government?
- What Are Some Examples of Government Fraud?
- How Does the Government Role Relate to Other Healthcare Continuum Players?
- Organized Crime
- Who Is Organized Crime?
- How Does the Organized Crime Role Relate to Other Healthcare Continuum Players?
- Market Players Overview: Implications for Prevention, Detection, and Investigation
- Chapter 3. Protected Health Information
- Health Insurance Portability and Accountability Act of 1996
- Audit Guidelines in Using PHI
- Protected Health Information Overview: Implications for Prevention, Detection, and Investigation
- Chapter 4. Health Information Pipelines
- The Auditor's Checklist
- What Are the Channels of Communication in a Health Information Pipeline?
- The Patient
- The Provider
- The Payer
- The Employer/Plan Sponsor
- The Vendor/Supplier
- The Government Plan Sponsor
- Unauthorized Parties
- HIP Overview: Implications for Prevention, Detection, and Investigation
- Chapter 5. Accounts Receivable Pipelines
- Overview of Healthcare Reimbursement
- Types of Reimbursement Models
- Fee-for-Service Model
- Prospective Model
- Capitation-Structured Model
- Data Contained in Accounts Receivable Pipelines
- Accounts Receivable Pipelines by HCC Player
- The Patient
- The Provider
- The Payer
- The Employer/Plan Sponsor
- Others
- ARP Overview: Implications for Prevention, Detection, and Investigation
- Chapter 6. Operational Flow Activity
- Operational Flow Activity Assessment
- The Patient
- The Provider
- The Payer
- The Employer
- The "Other"
- OFA Overview: Implications for Prevention, Detection, and Investigation
- Chapter 7. Product, Service, and Consumer Market Activity
- Product Market Activity
- Service Market Activity
- Consumer Market Activity
- PMA, SMA, and CMA Overview: Implications for Prevention, Detection, and Investigation
- Chapter 8. Data Management
- Data Management
- Market Example: Setting Up a Claims RDBMS
- Data Management Overview: Implications for Prevention, Detection, and Investigation
- References
- Chapter 9. Normal Infrastructure
- Normal Profile of a Fraudster
- What Types of People or Entities Commit Fraud?
- What Is the Key Element of a Fraudster?
- Anomalies and Abnormal Patterns
- Normal Infrastructure Overview: Implications for Prevention, Detection, and Investigation
- Chapter 10. Normal Infrastructure and Anomaly Tracking Systems
- The Patient
- Sample Patient Fraud Scenarios
- Data Management Considerations
- The Untold Story
- The Provider
- Sample Provider Fraud Scenarios
- Data Management Considerations
- The Untold Story
- The Payer
- Sample Payer Fraud Scenarios
- Data Management Considerations
- The Untold Story
- The Vendor/Other Parties
- Sample Vendor/Other Fraud Scenarios
- Data Management Considerations
- The Untold Story
- Organized Crime
- Sample Organized Crime Fraud Scenarios
- Data Management Considerations
- The Untold Story
- Normal Infrastructure and Anomaly Tracking Systems Overview: Implications for Prevention, Detection, and Investigation
- Chapter 11. Components of the Data Mapping Process
- What Is Data Mapping?
- Data Mapping Overview: Implications for Prevention, Detection, and Investigation
- Chapter 12. Components of the Data Mining Process
- What Is Data Mining?
- Data Mining in Healthcare
- Components of the Data Mining Process within the HCC
- Data Mining Overview: Implications for Prevention, Detection, and Investigation
- Chapter 13. Components of the Data Mapping and Data Mining Process
- Forensic Application of Data Mapping and Data Mining
- Data Mapping and Data Mining Overview: Implications for Prevention, Detection, and Investigation
- Chapter 14. Data Analysis Models
- Detection Model
- Pipeline Application
- Detection Model Application
- Investigation Model
- Mitigation Model
- Prevention Model
- Response Model
- Recovery Model
- Data Analysis Model Overview: Implications for Prevention, Detection, and Investigation
- Chapter 15. Clinical Content Data Analysis
- What Is SOAP?
- The SOAP Methodology
- Electronic Records
- Analysis Considerations with Electronic Records
- Narrative Discourse Analysis
- Clinical Content Analysis Overview: Implications for Prevention, Detection, and Investigation
- Chapter 16. Profilers
- Fraud and Profilers
- Medical Errors and Profilers
- Financial Errors and Profilers
- Internal Audit and Profilers
- Recovery and Profilers
- Anomaly and Profilers
- Fraud Awareness and Profilers
- Profiler Overview: Implications for Prevention, Detection, and Investigation
- Chapter 17. Market Implications
- The Myth
- "Persistent"
- "Persuasive"
- "Unrealistic"
- Market Overview: Implications for Prevention, Detection, and Investigation
- Chapter 18. Conclusions
- Micromanagement Perspective
- Macromanagement Perspective
- Overview of Prevention, Detection, and Investigation
- Index