How to detect healthcare fraud? "A systematic review"
Objective: To identify the method used in detecting fraud cases. Methods: Articles searching by using topic-appropriate keywords and incorporated into search engines (data-based) journals Pubmed/Medline, Cochrane, Wiley, ScienceDirect, and secondary data-based Google scholar. Then data extraction is...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Book |
Published: |
Elsevier,
2021-01-01T00:00:00Z.
|
Subjects: | |
Online Access: | Connect to this object online. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000 am a22000003u 4500 | ||
---|---|---|---|
001 | doaj_1cdebf0fceab4c90b7f36ab6ce7eb05a | ||
042 | |a dc | ||
100 | 1 | 0 | |a Andi Yaumil Bay R. Thaifur |e author |
700 | 1 | 0 | |a M. Alimin Maidin |e author |
700 | 1 | 0 | |a Andi Indahwaty Sidin |e author |
700 | 1 | 0 | |a Amran Razak |e author |
245 | 0 | 0 | |a How to detect healthcare fraud? "A systematic review" |
260 | |b Elsevier, |c 2021-01-01T00:00:00Z. | ||
500 | |a 0213-9111 | ||
500 | |a 10.1016/j.gaceta.2021.07.022 | ||
520 | |a Objective: To identify the method used in detecting fraud cases. Methods: Articles searching by using topic-appropriate keywords and incorporated into search engines (data-based) journals Pubmed/Medline, Cochrane, Wiley, ScienceDirect, and secondary data-based Google scholar. Then data extraction is done based on inclusion criteria. The selected articles have the aim of investigating/detecting cases of fraud that have occurred in the health sector or other related sectors that support the study. Results: The findings of the nine reviewed articles have suggested that most of the fraud perpetrators are performed by medical personnel (doctors) and providers. Many types of fraud occur such as insurance claims or medical actions that are completely unadministered nor following the procedure and duplicating claims. The methods that appropriate to be used in detecting fraud are secondary data tracking, information, and technology specialist provision. Conclusion: Secondary data tracking is the most widely used method in fraud detection. Fraud perpetrators are ones who dominated by medical circles with fictitious claim cases. Perpetrators tend not to act themselves but in organizations with network. | ||
546 | |a EN | ||
546 | |a ES | ||
690 | |a Fraud detection | ||
690 | |a Fraud method | ||
690 | |a Healthcare services | ||
690 | |a Public aspects of medicine | ||
690 | |a RA1-1270 | ||
655 | 7 | |a article |2 local | |
786 | 0 | |n Gaceta Sanitaria, Vol 35, Iss , Pp S441-S449 (2021) | |
787 | 0 | |n http://www.sciencedirect.com/science/article/pii/S0213911121002661 | |
787 | 0 | |n https://doaj.org/toc/0213-9111 | |
856 | 4 | 1 | |u https://doaj.org/article/1cdebf0fceab4c90b7f36ab6ce7eb05a |z Connect to this object online. |