{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:26:05Z","timestamp":1765758365945,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642400162"},{"type":"electronic","value":"9783642400179"}],"license":[{"start":{"date-parts":[[2013,12,10]],"date-time":"2013-12-10T00:00:00Z","timestamp":1386633600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,12,10]],"date-time":"2013-12-10T00:00:00Z","timestamp":1386633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-40017-9_12","type":"book-chapter","created":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T04:16:18Z","timestamp":1386562578000},"page":"261-285","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Supervised Learning Methods for Fraud Detection in Healthcare Insurance"],"prefix":"10.1007","author":[{"given":"Prerna","family":"Dua","sequence":"first","affiliation":[]},{"given":"Sonali","family":"Bais","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,10]]},"reference":[{"key":"12_CR1","unstructured":"CMS (2011) Research, statistics, data and systems: national health expenditure data. NHE fact sheet"},{"key":"12_CR2","unstructured":"CMS (2011) Medicare: HCPCS\u2013general information"},{"key":"12_CR3","unstructured":"FBI (2009) Reports and publications: 2009 financial crimes report"},{"key":"12_CR4","unstructured":"NHCAA (2007) The NHCAA fraud fighter\u2019s handbook: a guide to health care fraud investigations and SIU operations"},{"key":"12_CR5","unstructured":"IMF (2008) World economic and financial surveys: world economic outlook"},{"key":"12_CR6","unstructured":"Database NHCAA (2010) Combating health care fraud in a post-reform world: seven guiding principles for policymakers"},{"key":"12_CR7","unstructured":"NHCAA The problem of health care fraud, consumer alert: the impact of health care fraud on you, report of national health care anti-fraud association (NHCAA)"},{"issue":"2","key":"12_CR8","first-page":"64","volume":"19","author":"H Koh","year":"2005","unstructured":"Koh H, Tan G (2005) Data mining applications in healthcare. j healthc inf mgmt 19(2):64\u201372","journal-title":"j healthc inf mgmt"},{"key":"12_CR9","unstructured":"OIG (2011) Medical fraud cases: OIG most wanted fugitive"},{"issue":"2","key":"12_CR10","doi-asserted-by":"crossref","first-page":"130","DOI":"10.20965\/jaciii.2000.p0130","volume":"4","author":"H He","year":"2000","unstructured":"He H, Hawkins S, Graco W, Yao X (2000) Application of genetic algorithms and k-nearest neighbor method in real world medical fraud detection problem. J Adv Comput Intell Intell Inf 4(2):130\u2013137","journal-title":"J Adv Comput Intell Intell Inf"},{"key":"12_CR11","unstructured":"Chan CL, Lan CH (2001) A data mining technique combining fuzzy sets theory and bayesian classifier\u2014an application of auditing the health insurance fee. In: Proceedings of the International conference on artificial intelligence, pp 402\u2013408"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Ormerod T, Morley N, Ball L, Langley C, Spenser C (2003) Using ethnography to design a mass detection tool (MDT) for the early discovery of insurance fraud. In: Proceedings of the ACM CHI conference, 650\u2013651","DOI":"10.1145\/765891.765910"},{"key":"12_CR13","unstructured":"Ortega PA, Figueroa CJ, Ruz GA (2006) A medical claim fraud\/abuse detection system based on data mining: a case study in chile. In: Proceedings of international conference on data mining, 224\u2013231"},{"key":"12_CR14","unstructured":"Viveros MS, Nearhos JP, Rothman MJ (1996) Applying data mining techniques to a health insurance information system. In: Proceedings of the 22nd VLDB conference, Mumbai, India, pp 286\u2013294"},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.eswa.2005.09.003","volume":"31","author":"WS Yang","year":"2006","unstructured":"Yang WS, Hwang SY (2006) A process-mining framework for the detection of healthcare fraud and abuse. Expert Syst Appl 31:56\u201368","journal-title":"Expert Syst Appl"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Liou F, Tang Y, Chen J (2008) Detecting hospital fraud and claim abuse through diabetic outpatient services. Health Care Manage Sci, 353\u2013358","DOI":"10.1007\/s10729-008-9054-y"},{"key":"12_CR17","unstructured":"Shan Y, Jeacocke D, Murray D, Sutinen (2008) A mining medical specialist billing patterns for health service management. In: Roddick J, Li J, Christen P, Kennedy P, (eds) Proceeding 7th Australasian data mining conference (AusDM 2008), Glenelg, South Australia. CRPIT, 87. ACS 105\u2013110"},{"key":"12_CR18","unstructured":"Sokol L, Garcia B, West M, Rodriguez J, Johnson K (2001) Precursory steps to mining HCFA health care claims. In: Proceedings of the 34th Hawaii International conference on system sciences"},{"key":"12_CR19","unstructured":"Yang WS (2002) Process analyzer and its application on medical care. In: Proceedings of 23rd International conference on information systems (ICIS02), Spain"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Li J, Huang K, Jin J, Shi J (2008) A survey on statistical methods for health care fraud detection. Health Care Manage Sci, 275\u2013287","DOI":"10.1007\/s10729-007-9045-4"},{"key":"12_CR21","unstructured":"Table F, Raineri A, Maturana S, Kaempffer A (2008) Fraud in the health systems of chile: a detection model. Am J Public Health, pp 56\u201361"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Ghahramani Z (2004) Unsupervised learning","DOI":"10.1007\/978-3-540-28650-9_5"},{"key":"12_CR23","unstructured":"Rosella (2011) Predictive knowledge and data mining: healthcare fraud detection"},{"issue":"5","key":"12_CR24","first-page":"1","volume":"7","author":"C Hall","year":"1996","unstructured":"Hall C (1996) Intelligent data mining at IBM: new products and applications. Intell Softw Strateg 7(5):1\u201311","journal-title":"Intell Softw Strateg"},{"key":"12_CR25","unstructured":"Report on the use of health information technology to enhance and expand health care anti-fraud activities. Foundation of research and education of AHIMA"},{"key":"12_CR26","unstructured":"FBI (2011) Scams and Safety: common fraud schemes"},{"key":"12_CR27","unstructured":"London: The Guardian (2007) The mystery of John Darwin"},{"key":"12_CR28","unstructured":"Herb Denenberg (2005) The denenberg report: the insurance commissioners, other government agencies, and the insurance companies focus on insurance fraud committed by policyholders, but nothing is done about the multi-billion dollar racket of insurance fraud committed by insurance companies"},{"issue":"1","key":"12_CR29","first-page":"106","volume":"3","author":"R Bhuvaneswari","year":"2012","unstructured":"Bhuvaneswari R, Kalaiselvi K (2012) naive bayesian classification approach in healthcare applications. Int j comput sci telecommun, 3(1):106\u2013112","journal-title":"Int j comput sci telecommun"},{"issue":"2","key":"12_CR30","first-page":"155","volume":"15","author":"M Silver","year":"2001","unstructured":"Silver M, Sakata T, Su HC, Herman C, Dolins SB, O\u2019Shea MJ (2001) Case study: how to apply data mining techniques in a healthcare dataware house. J Healthcare Inf Manage 15(2):155\u2013164","journal-title":"J Healthcare Inf Manage"},{"issue":"3\u20134","key":"12_CR31","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1023\/A:1025862214778","volume":"3","author":"D Relles","year":"2002","unstructured":"Relles D, Ridgeway G, Carter G (2002) Data mining and the implementation of a prospective payment system for inpatient rehabilitation. Health Serv Outcomes Res Method 3(3\u20134):247\u2013266","journal-title":"Health Serv Outcomes Res Method"},{"issue":"10","key":"12_CR32","first-page":"8","volume":"20","author":"Anonymous","year":"1999","unstructured":"Anonymous (1999) Texas medicaid fraud and abuse detection system recovers $2.2 million, wins national award. Health Manag Technol 20(10):8","journal-title":"Health Manag Technol"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Tu J (1995) Advantages and disadvantages of using artificial neural networks versus logistic regression for predicting medical outcomes. J Clin Epidemiol pp 1225\u20131231","DOI":"10.1016\/S0895-4356(96)00002-9"},{"key":"12_CR34","unstructured":"Lewis R (2000) An introduction to classification and regression tree (CART) analysis. Presented at annual meeting of the society for academic emergency medicine"},{"key":"12_CR35","unstructured":"Nayak J, Cook D (2001) Approximate association rule mining. In: Proceedings of the 14th International florida artificial intelligence research society conference"},{"key":"12_CR36","unstructured":"Cunningham P, Delany S (2007) k-Nearest neighbour classifiers. Technical report, UCD-CSI-2007-4"},{"key":"12_CR37","unstructured":"Russel S, Norvig P (2003) Artificial intelligence: a modern approach. Prentice-Hall, 2nd edition"},{"key":"12_CR38","unstructured":"Vose D (1995) The simple genetic algorithm: foundations and theory"},{"issue":"3","key":"12_CR39","first-page":"385","volume":"1","author":"J Berger","year":"2006","unstructured":"Berger J (2006) The case for objective bayesian analysis. Bayesian Anal 1(3):385\u2013402","journal-title":"Bayesian Anal"},{"key":"12_CR40","unstructured":"Vick K (2009) As rescissions spawn outrage, health insurers cite fraud control. The Washington post, http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2009\/09\/07\/AR2009090702455.html, Information Accessed on May 2012"},{"key":"12_CR41","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1002\/cyto.a.20611","volume":"73A","author":"D Jeffries","year":"2008","unstructured":"Jeffries D, Zaidi I, Jong B, Holland M, Miles D (2008) Analysis of flow cytometry data using an automatic processing tool. Cytometry Part A 73A:857\u2013867","journal-title":"Cytometry Part A"},{"key":"12_CR42","doi-asserted-by":"crossref","unstructured":"Larose D (2005) Discovering knowledge in data, An introduction to data mining. Wiley InterScience","DOI":"10.1002\/0471687545"},{"key":"12_CR43","doi-asserted-by":"crossref","unstructured":"Niedermaye D (2008) An introduction to bayesian networks and their contemporary applications, innovations in bayesian networks. Springer, pp 117\u2013130","DOI":"10.1007\/978-3-540-85066-3_5"},{"key":"12_CR44","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1023\/A:1022617912649","volume":"13","author":"KS De Jong","year":"1993","unstructured":"De Jong KS, Spears WM, Gordon DF (1993) Using genetic algorithms for concept learning. Mach learn 13:161\u2013188","journal-title":"Mach learn"}],"container-title":["Intelligent Systems Reference Library","Machine Learning in Healthcare Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40017-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T20:46:28Z","timestamp":1675975588000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-40017-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,10]]},"ISBN":["9783642400162","9783642400179"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40017-9_12","relation":{},"ISSN":["1868-4394","1868-4408"],"issn-type":[{"type":"print","value":"1868-4394"},{"type":"electronic","value":"1868-4408"}],"subject":[],"published":{"date-parts":[[2013,12,10]]},"assertion":[{"value":"10 December 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}