Details

Healthcare Fraud


Healthcare Fraud

Auditing and Detection Guide
2. Aufl.

von: Rebecca S. Busch

50,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 23.03.2012
ISBN/EAN: 9781118240250
Sprache: englisch
Anzahl Seiten: 368

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>An invaluable tool equipping healthcare professionals, auditors, and investigators to detect every kind of healthcare fraud</b> <p>According to private and public estimates, billions of dollars are lost per hour to healthcare waste, fraud, and abuse. A must-have reference for auditors, fraud investigators, and healthcare managers, <i>Healthcare Fraud, Second Edition</i> provides tips and techniques to help you spot—and prevent—the "red flags" of fraudulent activity within your organization. Eminently readable, it is your "go-to" resource, equipping you with the necessary skills to look for and deal with potential fraudulent situations.</p> <ul> <li>Includes new chapters on primary healthcare, secondary healthcare, information/data management and privacy, damages/risk management, and transparency</li> <li>Offers comprehensive guidance on auditing and fraud detection for healthcare providers and company healthcare plans</li> <li>Examines the necessary background that internal auditors should have when auditing healthcare activities</li> </ul> <p>Managing the risks in healthcare fraud requires an understanding of how the healthcare system works and where the key risk areas are. With health records now all being converted to electronic form, the key risk areas and audit process are changing. Read <i>Healthcare Fraud, Second Edition</i> and get the valuable guidance you need to help combat this critical problem.</p>
<p>Preface xiii</p> <p>Acknowledgments xvii</p> <p><b>CHAPTER 1 Introduction to Healthcare Fraud 1</b></p> <p>What Is Healthcare Fraud? 2</p> <p>Healthcare Fraud in the United States 4</p> <p>Healthcare Fraud in International Markets 4</p> <p>What Does Healthcare Fraud Look Like? 5</p> <p>Who Commits Healthcare Fraud? 9</p> <p>What Is Healthcare Fraud Examination? 11</p> <p>The Primary Healthcare Continuum: An Overview 13</p> <p>Healthcare Fraud Overview: Implications for Prevention, Detection, and Investigation 14</p> <p>Notes 17</p> <p><b>CHAPTER 2 Defining Market Players within the Primary Healthcare Continuum 19</b></p> <p>The Patient 19</p> <p>The Provider 24</p> <p>The Payer 42</p> <p>The Employer/Plan Sponsor 48</p> <p>The Vendor and the Supplier 49</p> <p>The Government 50</p> <p>Organized Crime 51</p> <p>Market Players Overview: Implications for Prevention, Detection, and Investigation 53</p> <p><b>CHAPTER 3 Continuum Audit and Investigative Model 57</b></p> <p>Market Understanding 58</p> <p>The Primary Healthcare Continuum (P-HCC) 58</p> <p>The Secondary Healthcare Continuum (S-HCC) 58</p> <p>The Information Healthcare Continuum (I-HCC) 62</p> <p>The Consequence Healthcare Continuum (C-HCC) 63</p> <p>The Transparency Healthcare Continuum (T-HCC) 65</p> <p>The Rules Based Healthcare Continuum (R-HCC) 66</p> <p>Audit Continuum Models Overview: Implications for Prevention, Detection, and Investigation 68</p> <p>Notes 68</p> <p><b>CHAPTER 4 Secondary Healthcare Continuum 69</b></p> <p>The Secondary Healthcare Continuum (S-HCC) 71</p> <p>Audit Continuum Models Overview: Implications for Prevention, Detection, and Investigation 75</p> <p>Notes 75</p> <p><b>CHAPTER 5 Information Healthcare Continuum 77</b></p> <p>Case Study Dr. Traveler—Recap 77</p> <p>Continuum Audit Progression—Recap 78</p> <p>The Information Healthcare Continuum (I-HCC) 78</p> <p>Audit Continuum Models Overview: Implications</p> <p>for Prevention, Detection, and Investigation 83</p> <p>Notes 84</p> <p><b>CHAPTER 6 Consequence Healthcare Continuum 85</b></p> <p>Case Study Dr. Traveler—Recap 85</p> <p>Continuum Audit Progression—Recap 86</p> <p>The Consequence Healthcare Continuum (C-HCC) 86</p> <p>Economic Business Impact 88</p> <p>Serviceability and Service Integrity 89</p> <p>Service, Medical, and Financial Errors 90</p> <p>Audit Continuum Models Overview: Implications for Prevention, Detection, and Investigation 90</p> <p><b>CHAPTER 7 Transparency Healthcare Continuum 93</b></p> <p>Case Study Dr. Traveler—Recap 93</p> <p>Continuum Audit Progression—Recap 94</p> <p>The Transparency Healthcare Continuum (T-HCC) 95</p> <p>Audit Continuum Models Overview: Implications for Prevention, Detection, and Investigation 96</p> <p>CHAPTER 8 Rules Based Healthcare Continuum 97</p> <p>Case Study Dr. Traveler—Recap 98</p> <p>The Rules Based Healthcare Continuum (R-HCC) 99</p> <p>Continuum Audit Progression—Summary 104</p> <p>Audit Continuum Models Overview: Implications for Prevention, Detection, and Investigation 106</p> <p>Notes 107</p> <p><b>CHAPTER 9 Protected Health Information 109</b></p> <p>Health Insurance Portability and Accountability Act of 1996 109</p> <p>Audit Guidelines in Using Protected Health Information 110</p> <p>Protected Health Information Overview: Implications for Prevention, Detection, and Investigation 113</p> <p><b>CHAPTER 10 Health Information Pipelines 115</b></p> <p>The Auditor’s Checklist 115</p> <p>What Are the Channels of Communication in a Health Information Pipeline? 116</p> <p>Unauthorized Parties 125</p> <p>Health Information Pipelines Overview: Implications for Prevention, Detection, and Investigation 126</p> <p><b>CHAPTER 11 Accounts Receivable Pipelines 129</b></p> <p>Overview of Healthcare Reimbursement 130</p> <p>Types of Reimbursement Models 131</p> <p>Data Contained in Accounts Receivable Pipelines 135</p> <p>Accounts Receivable Pipelines by Healthcare Continuum Player 135</p> <p>Accounts Receivable Pipelines Overview: Implications for Prevention, Detection, and Investigation 154</p> <p><b>CHAPTER 12 Operational Flow Activity 157</b></p> <p>Operational Flow Activity Assessment 157</p> <p>Operational Flow Activity Overview: Implications for Prevention, Detection, and Investigation 163</p> <p><b>CHAPTER 13 Product, Service, and Consumer Market Activity 165</b></p> <p>Product Market Activity 165</p> <p>Service Market Activity 167</p> <p>Consumer Market Activity 167</p> <p>Product, Service, and Consumer Market Activity Overview: Implications for  Prevention, Detection, and Investigation 175</p> <p><b>CHAPTER 14 Data Management 177</b></p> <p>Data Management 177</p> <p>Market Example: Setting Up a Claims Relational Database Management System 181</p> <p>Data Management Overview: Implications for Prevention, Detection, and Investigation 182</p> <p>References 182</p> <p><b>CHAPTER 15 Normal Infrastructure 185</b></p> <p>Normal Profile of a Fraudster 185</p> <p>Anomalies and Abnormal Patterns 188</p> <p>Continuum Audit and Investigative Model 188</p> <p>Normal Infrastructure Overview: Implications for Prevention, Detection, and Investigation 189</p> <p><b>CHAPTER 16 Normal Infrastructure and Anomaly Tracking Systems 191</b></p> <p>The Patient 191</p> <p>The Provider 194</p> <p>The Payer 198</p> <p>The Vendor/Other Parties 201</p> <p>Organized Crime 205</p> <p>Normal Infrastructure and Anomaly Tracking Systems Overview: Implications for Prevention, Detection, and Investigation 207</p> <p>Notes 207</p> <p><b>CHAPTER 17 Components of the Data Mapping Process 209</b></p> <p>What Is Data Mapping? 209</p> <p>Data Mapping Overview: Implications for Prevention, Detection, and Investigation 213</p> <p><b>CHAPTER 18 Components of the Data Mining Process 215</b></p> <p>What Is Data Mining? 215</p> <p>Data Mining Overview: Implications for Prevention, Detection, and Investigation 219</p> <p><b>CHAPTER 19 Components of the Data Mapping and Data Mining Process 221</b></p> <p>Forensic Application of Data Mapping and Data Mining 224</p> <p>Data Mapping and Data Mining Overview: Implications for Prevention, Detection,</p> <p>and Investigation 226</p> <p><b>CHAPTER 20 Data Analysis Models 227</b></p> <p>Detection Model 227</p> <p>Investigation Model 230</p> <p>Mitigation Model 233</p> <p>Prevention Model 235</p> <p>Response Model 240</p> <p>Recovery Model 244</p> <p>Data Analysis Model Overview: Implications for Prevention, Detection, and Investigation 253</p> <p><b>CHAPTER 21 Clinical Content Data Analysis 255</b></p> <p>What Is SOAP? 256</p> <p>The SOAP Methodology 257</p> <p>Electronic Records 270</p> <p>Analysis Considerations with Electronic Records 273</p> <p>Narrative Discourse Analysis 277</p> <p>Clinical Content Analysis Overview: Implications for Prevention, Detection, and Investigation 284</p> <p><b>CHAPTER 22 Profilers 287</b></p> <p>Fraud and Profilers 287</p> <p>Medical Errors and Profilers 291</p> <p>Financial Errors and Profilers 296</p> <p>Internal Audit and Profilers 300</p> <p>Recovery and Profilers 302</p> <p>Anomaly and Profilers 303</p> <p>Fraud Awareness and Profilers 304</p> <p>Profiler Overview: Implications for Prevention, Detection, and Investigation 305</p> <p><b>CHAPTER 23 Market Implications 307</b></p> <p>The Myth 307</p> <p>“Persistent” 310</p> <p>“Persuasive” 310</p> <p>“Unrealistic” 312</p> <p>Market Overview: Implications for Prevention, Detection, and Investigation 313</p> <p><b>CHAPTER 24 Conclusions 315</b></p> <p>Micromanagement Perspective 315</p> <p>Macromanagement Perspective 326</p> <p>Overview of Prevention, Detection, and Investigation 327</p> <p>About the Author 333</p> <p>Index 335</p>
<p><b>REBECCA SALTIEL BUSCH, RN, MBA, CCM, CFE, CHS-III, CPC, FHFMA, FIALCP,</b> has a passion to create educated, conscientious healthcare consumers. Recent leadership and professional recognitions include the 2011 Chicago United's Business Leaders of Color Award, 2010 Finalist for the Enterprising Women of the Year Award, and 2009 Recipient of the Influential Women in Business Award by the <i>Business Ledger</i> in partnership with NAWBO. Her entrepreneurial, professional, driven career has resulted in various proprietary audit platforms in multi-market verticals in healthcare, and authorship of over 200 articles, books, and presentations to consumers, government, corporate, and professional entities. Recognized as an expert in her field, she has provided public and forensic expert testimony and participated in public policy discussions and the development of best practice standards. Rebecca currently has seven U.S. design patents and one U.S patent focused on efficacy, risk, FWB, and revenue management within healthcare.
<p><b>HEALTHCARE FRAUD Auditing and Detection Guide, Second Edition</b> <p>The world of healthcare fraud is much more than just pocketing money or a corporate asset. Stealing the very essence of human life, healthcare fraud ranges from false claims by perpetrators who perform needless procedures that disable and kill, to rogue Internet pharmacies. Once limited to petty thefts and deliberately incorrect billing, the world of healthcare fraud has become one of high-tech, highly skilled, educated, and professional perpetrators. <p>Now completely updated, this <i>Second Edition</i> of <i>Healthcare Fraud: Auditing and Detection Guide</i> is the must-have reference for auditors, fraud investigators, and healthcare managers, revealing proven tips and techniques to help you spot the "red flags" of fraudulent activity, as well as the steps you need to take when fraud is suspected. Author Rebecca Busch—a pioneer in conducting technology and process-enabled audits of healthcare claims and processing—presents comprehensive guidance on auditing and fraud detection for healthcare providers and company healthcare plans. <p><i>Healthcare Fraud, Second Edition</i> features: <ul> <li>Six new chapters detailing a comprehensive audit model encompassing primary, secondary, information, damages, transparency, and rules-based continuum. Detailed analytic pipelines within each continuum extrapolating components of PHI, dollars involved, operations, products, services, and type of consumer. This integration is the secret sauce to any successful investigation.</li> <li>How data mapping and mining can be used as a key tool to maximize the effectiveness of fraud investigations</li> <li>Insightful discussion from a number of perspectives; clinical, research, internal audit, investigative, data intelligence, and forensic</li> <li>A behind-the-scenes look at internal controls and anomaly tracking systems for ongoing monitoring and surveillance</li> <li>Building blocks for understanding the entire healthcare market and its respective players</li> <li>Cases and methodologies providing actual audit and investigative tools</li> <li>Useful outlines of healthcare fraud prevention, detection, and investigation methods</li> </ul> <p>Sharpen your skills as an auditor or investigator to identify incontrovertible truth with the visionary guidance found in <i>Healthcare Fraud, Second Edition</i>.

Diese Produkte könnten Sie auch interessieren:

Mindfulness
Mindfulness
von: Gill Hasson
PDF ebook
12,99 €
Counterparty Credit Risk, Collateral and Funding
Counterparty Credit Risk, Collateral and Funding
von: Damiano Brigo, Massimo Morini, Andrea Pallavicini
EPUB ebook
69,99 €