DOTmed Home MRI Oncology Ultrasound Molecular Imaging X-Ray Cardiology Health IT Business Affairs
News Home Parts & Service Operating Room CT Women's Health Proton Therapy Endoscopy HTMs Mobile Imaging
Current Location:
> This Story

Log in or Register to rate this News Story
Forward Printable StoryPrint Comment




Health IT Homepage

Philips to take on 19 AI enterprises in first global startup collaboration Focus on ideas for clinical and workflow solutions in AI

Enhanced automation provides lifeline to managing data deluge in oncology Harnessing data for more efficient radiation treatment

Apple, Zimmer Biomet partner in joint replacement watch app study Bringing the mymobility app to the Apple Watch

Deep Lens raises $3.2 million for AI-based cloud platform Aim to make it accessible worldwide and free of charge

Varian acquires Noona Healthcare Gains mobile service app that captures PROs

FDA and MITRE offer 'playbook' for combating cybersecurity threats Toward a holistic, systematic approach to safety

Cybersecurity threats top ECRI's list of health technology hazards for second year There were 77 healthcare data breaches in first three months of 2018

Former GE enterprise rebranded under Veritas with new name Will now be known as Virence Health Technologies

More than 20 partners join Cerner in VA EHR modernization project Will provide leadership, EHR training and more

CureMetrix to provide AI-CAD solution to DocPanel for second opinion mammograms CmAssist may help improve diagnostic accuracy

FWA in healthcare: What the battle against identity thieves can teach us

By Lalithya Yerramilli

When it comes to uncovering fraud, waste, and abuse (FWA) in healthcare, payers and providers can learn a lesson from the ongoing battle against hackers looking to commit identity theft: The culprits are unlikely to be immediately obvious – at least if they don’t want to get caught.

They often hide in plain sight. For example, they may disguise a bogus Wi-Fi connection as one supplied by restaurant or coffee shop, especially near a large corporation. Login to check your email or do a little shopping and zap! – your information is stolen. They also use phishing schemes to make you think you’re responding to a friend or a legitimate company when they ask for your credentials. The more they work to "fit in”, the more successful they’re likely to be.
Story Continues Below Advertisement


Special-Pricing Available on Medical Displays, Patient Monitors, Recorders, Printers, Media, Ultrasound Machines, and Cameras.This includes Top Brands such as SONY, BARCO, NDS, NEC, LG, EDAN, EIZO, ELO, FSN, PANASONIC, MITSUBISHI, OLYMPUS, & WIDE.

Similarly, this is what the more sophisticated participants in FWA in healthcare do. For example, those looking to obtain large quantities of opioids, whether for their own use or to sell to others, don’t go all-in with a single provider or pharmacy. They spread their requests across many providers and pharmacies, keeping the individual numbers at each "under the radar" to avoid calling attention to them. It’s only when you look at them in the aggregate that the numbers become suspicious.

The challenge is that most payers and providers don’t have the human or technology resources to look at the massive quantity of claims data in the aggregate to find the subtle patterns that indicate the possibility of FWA. Given that FWA has been estimated to cost anywhere from $80 billion to $272 billion each year, it’s critical that payers and providers find a new way to address it. This is where adding machine learning to human expertise can make a huge difference in the battle against FWA.

Understanding the relationships through machine learning
Where machine learning excels is in parsing massive amounts of data and hundreds of potential decision points to find hidden patterns and relationships between seemingly unrelated events. These relationships are so subtle, humans will often miss them – a fact those purposely committing FWA count on to hide their activities.

Using predictive analytics, machine learning can quickly build an initial set of models of what the “normal” patterns are, then use those models to detect anomalies or occurrences that fall outside those patterns. It can then alert human experts who can investigate further to determine if an action needs to be taken.

As more information about the outcomes becomes available, the models can be further refined, enabling the organization’s limited resources to focus on the areas where they’re most needed while paring down the number of false positives.
  Pages: 1 - 2 - 3 >>

Health IT Homepage

You Must Be Logged In To Post A Comment

Increase Your
Brand Awareness
Auctions + Private Sales
Get The
Best Price
Buy Equipment/Parts
Find The
Lowest Price
Daily News
Read The
Latest News
Browse All
DOTmed Users
Ethics on DOTmed
View Our
Ethics Program
Gold Parts Vendor Program
Receive PH
Gold Service Dealer Program
Receive RFP/PS
Healthcare Providers
See all
HCP Tools
A Job
Parts Hunter +EasyPay
Get Parts
Recently Certified
View Recently
Certified Users
Recently Rated
View Recently
Certified Users
Rental Central
Rent Equipment
For Less
Sell Equipment/Parts
Get The
Most Money
Service Technicians Forum
Find Help
And Advice
Simple RFP
Get Equipment
Virtual Trade Show
Find Service
For Equipment
Access and use of this site is subject to the terms and conditions of our LEGAL NOTICE & PRIVACY NOTICE
Property of and Proprietary to, Inc. Copyright ©2001-2018, Inc.