How to detect healthcare fraud? "A systematic review"

Objective: To identify the method used in detecting fraud cases. Methods: Articles searching by using topic-appropriate keywords and incorporated into search engines (data-based) journals Pubmed/Medline, Cochrane, Wiley, ScienceDirect, and secondary data-based Google scholar. Then data extraction is...

Full description

Saved in:
Bibliographic Details
Main Authors: Andi Yaumil Bay R. Thaifur (Author), M. Alimin Maidin (Author), Andi Indahwaty Sidin (Author), Amran Razak (Author)
Format: Book
Published: Elsevier, 2021-01-01T00:00:00Z.
Subjects:
Online Access:Connect to this object online.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 doaj_1cdebf0fceab4c90b7f36ab6ce7eb05a
042 |a dc 
100 1 0 |a Andi Yaumil Bay R. Thaifur  |e author 
700 1 0 |a M. Alimin Maidin  |e author 
700 1 0 |a Andi Indahwaty Sidin  |e author 
700 1 0 |a Amran Razak  |e author 
245 0 0 |a How to detect healthcare fraud? "A systematic review" 
260 |b Elsevier,   |c 2021-01-01T00:00:00Z. 
500 |a 0213-9111 
500 |a 10.1016/j.gaceta.2021.07.022 
520 |a Objective: To identify the method used in detecting fraud cases. Methods: Articles searching by using topic-appropriate keywords and incorporated into search engines (data-based) journals Pubmed/Medline, Cochrane, Wiley, ScienceDirect, and secondary data-based Google scholar. Then data extraction is done based on inclusion criteria. The selected articles have the aim of investigating/detecting cases of fraud that have occurred in the health sector or other related sectors that support the study. Results: The findings of the nine reviewed articles have suggested that most of the fraud perpetrators are performed by medical personnel (doctors) and providers. Many types of fraud occur such as insurance claims or medical actions that are completely unadministered nor following the procedure and duplicating claims. The methods that appropriate to be used in detecting fraud are secondary data tracking, information, and technology specialist provision. Conclusion: Secondary data tracking is the most widely used method in fraud detection. Fraud perpetrators are ones who dominated by medical circles with fictitious claim cases. Perpetrators tend not to act themselves but in organizations with network. 
546 |a EN 
546 |a ES 
690 |a Fraud detection 
690 |a Fraud method 
690 |a Healthcare services 
690 |a Public aspects of medicine 
690 |a RA1-1270 
655 7 |a article  |2 local 
786 0 |n Gaceta Sanitaria, Vol 35, Iss , Pp S441-S449 (2021) 
787 0 |n http://www.sciencedirect.com/science/article/pii/S0213911121002661 
787 0 |n https://doaj.org/toc/0213-9111 
856 4 1 |u https://doaj.org/article/1cdebf0fceab4c90b7f36ab6ce7eb05a  |z Connect to this object online.