{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T00:47:10Z","timestamp":1728175630480},"reference-count":26,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2015,8,21]],"date-time":"2015-08-21T00:00:00Z","timestamp":1440115200000},"content-version":"vor","delay-in-days":232,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2015]]},"DOI":"10.1016\/j.procs.2015.08.594","type":"journal-article","created":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T00:22:26Z","timestamp":1442276546000},"page":"713-720","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":24,"special_numbering":"C","title":["Categorizing and Describing the Types of Fraud in Healthcare"],"prefix":"10.1016","volume":"64","author":[{"given":"Dallas","family":"Thornton","sequence":"first","affiliation":[]},{"given":"Michel","family":"Brinkhuis","sequence":"additional","affiliation":[]},{"given":"Chintan","family":"Amrit","sequence":"additional","affiliation":[]},{"given":"Robin","family":"Aly","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2015.08.594_bib0005","unstructured":"Kelley RR. Where can $700 Billion in Waste be cut annually from the US Healthcare System? Thomson Reuters 2009; TR-7261 10\/09 LW."},{"key":"10.1016\/j.procs.2015.08.594_bib0010","unstructured":"Webster, J., and Watson, R. 2002. \u201cAnalyzing the Past to Prepare for the Future: Writing a Literature Review,\u201d MIS Quarterly (26:2), pp. xiii \u2013 xxiii."},{"key":"10.1016\/j.procs.2015.08.594_bib0015","unstructured":"Rabecs, R.N. 2006. \u201cHealth care fraud under the new Medicare Part D prescription drug program,\u201d The Journal of Criminal Law and Criminology, pp. 727-756."},{"key":"10.1016\/j.procs.2015.08.594_bib0020","unstructured":"Morris, L. 2009. \u201cCombating Fraud In Health Care: An Essential Component Of Any Cost Containment Strategy,\u201d Health Affairs (28:5), pp. 1351-1356 (doi: 10.1377\/hlthaff.28.5.1351)."},{"key":"10.1016\/j.procs.2015.08.594_bib0025","doi-asserted-by":"crossref","unstructured":"Rashidian, A., Joudaki, H., and Vian, T. 2012. \u201cNo Evidence of the Effect of the Interventions to Combat Health Care Fraud and Abuse: A Systematic Review of Literature,\u201d PLoS ONE (H. R. Baradaran, ed.) (7:8), p. e41988 (doi: 10.1371\/journal.pone.0041988).","DOI":"10.1371\/journal.pone.0041988"},{"key":"10.1016\/j.procs.2015.08.594_bib0030","unstructured":"Carlson, J. 2013. \u201cPanful side effects,\u201d Modern Healthcare."},{"key":"10.1016\/j.procs.2015.08.594_bib0035","unstructured":"Plomp, M.G. A., and Grijpink, J. 2011. \u201cCombating identity fraud in the public domain: information strategies for healthcare and criminal justice,\u201d in Proceedings of the 11th European Conference on e-Government, pp. 451-458 (available at http:\/\/books.google.com\/books?hl=en&lr=&id=cIkxJXGyhv8C&oi=fnd&pg=PA451&dq=%22interdependent.+ICT+can+support+the+development+of+interorganisational+relations+through%22+%22shares+which+information+and+why,+are+complex+and+important+as+well.+It+can+therefore%22+%22deployed,+there+are+many+potential+problems+in+their+use+that+need+to+be+tak&ots=RfYa1PlnvL&sig=P7z719JXdFh79V9tIP_XYKSwGNc)."},{"key":"10.1016\/j.procs.2015.08.594_bib0040","unstructured":"Dube, J.F. 2011. \u201cFraud in Health Care and Organized Crime,\u201d Medicine & Health (94:9), pp. 268-269."},{"key":"10.1016\/j.procs.2015.08.594_bib0045","unstructured":"Sparrow, M.K. 2008. \u201cFraud in the US Health-Care System: Exposing the Vulnerabilities of Automated Payments Systems,\u201d social research, pp. 1151-1180."},{"key":"10.1016\/j.procs.2015.08.594_bib0050","unstructured":"Agrawal, S., Tarzy, B., Hunt, L., Taitsman, J., and Budetti, P. 2013. \u201cExpanding Physician Education in Health Care Fraud and Program Integrity,\u201d Academic Medicine (88:8), pp. 1081-1087 (doi: 10.1097\/ACM.0b013e318299f5cf)."},{"key":"10.1016\/j.procs.2015.08.594_bib0055","unstructured":"Byrd, J.D., Powell, P., and Smith, D.L. 2013. \u201cHealth Care Fraud: An Introduction to a Major Cost Issue,\u201d Journal of Accounting, Ethics and Public Policy (14:3) (available at http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2285860)."},{"key":"10.1016\/j.procs.2015.08.594_bib0060","unstructured":"Stanton, T.H. 2001. \u201cFraud-And-Abuse Enforcement In Medicare: Finding Middle Ground,\u201d Health Affairs (20:4), pp. 28-42 (doi: 10.1377\/hlthaff.20.4.28)."},{"key":"10.1016\/j.procs.2015.08.594_bib0065","unstructured":"Brooks, G., Button, M., and Gee, J. 2012. \u201cThe scale of health-care fraud: A global evaluation,\u201d Security Journal (25:1), pp. 76-87."},{"key":"10.1016\/j.procs.2015.08.594_bib0070","doi-asserted-by":"crossref","unstructured":"Thornton, D., Mueller, R.M., Schoutsen, P., van fegersberg, J. \u201cPredicting Healthcare Fraud in Medicaid: A Multidimensional Data Model and Analysis Techniques for Fraud Detection,\u201d Procedia Technology, Volume 9 (2013) Pages 1252-1264.","DOI":"10.1016\/j.protcy.2013.12.140"},{"key":"10.1016\/j.procs.2015.08.594_bib0075","unstructured":"D. Thornton, G. van Capelleveen, M. Poel, J. van Hillegersberg, R. Mueller, \u201cOutlier-based Health Insurance Fraud Detection for U.S. Medicaid Data,\u201d in Proceedings of the 16th International Conference on Enterprise Information Systems (ICEIS), Special Session on Information Systems Security - ISS pages 684-694, 2014."},{"key":"10.1016\/j.procs.2015.08.594_bib0080","unstructured":"Borca, G., \u201cTechnology Curtails Health Care Fraud,\u201d Managed Care, April 2001."},{"key":"10.1016\/j.procs.2015.08.594_bib0085","unstructured":"Doan, R. 2011. \u201cFalse Claims Act and the Eroding Scienter in Healthcare Fraud Litigation, The,\u201d Annals Health L. (20), p. 49."},{"key":"10.1016\/j.procs.2015.08.594_bib0090","unstructured":"Ogunbanjo, G.A., and Knapp van Bogaert, D. 2014. \u201cEthics in health care: healthcare fraud: ethics CPD supplement,\u201d South African Family Practice (56:1), pp. S10-S13."},{"key":"10.1016\/j.procs.2015.08.594_bib0095","doi-asserted-by":"crossref","unstructured":"Freeman, B.A., and Loavenbruck, A. 2001. \u201cComplying with healthcare fraud laws: an overview for the hearing professional,\u201d The Hearing Journal (54:5).","DOI":"10.1097\/01.HJ.0000294838.94260.69"},{"key":"10.1016\/j.procs.2015.08.594_bib0100","unstructured":"Tzu, S. The Art of War \u2013 Special Edition. El Paso Norte Press. ISBN 0-9760726-9-6."},{"key":"10.1016\/j.procs.2015.08.594_bib0105","unstructured":"Stelfox, H.T. and Redelmeier, D.A. \u201cAn analysis of one potential form of health care fraud in Canada,\u201d Can. Med. Assoc. J., vol. 169, no. 2, pp. 118-119, 2003."},{"key":"10.1016\/j.procs.2015.08.594_bib0110","doi-asserted-by":"crossref","unstructured":"Cady, R.F., \u201cHealthcare Fraud: A Primer for the Nurse Executive,\u201d JONAS Healthc. Law Ethics Regul., vol. 9, no. 2, pp. 54-61, 2007.","DOI":"10.1097\/01.NHL.0000277202.16864.aa"},{"key":"10.1016\/j.procs.2015.08.594_bib0115","unstructured":"Bennett, R.S. and Medearis, D.M., \u201cHealth Care Fraud; Recent Developments and Timeless Advice,\u201d Tex. Med., vol. 99, pp. 50-56, 2003."},{"key":"10.1016\/j.procs.2015.08.594_bib0120","unstructured":"Benzio, B., \u201cFee-for-Disservice: Medicare Fraud in the Home Healthcare Industry,\u201d Ann. Health L, vol. 19, p. 229, 2009."},{"key":"10.1016\/j.procs.2015.08.594_bib0125","doi-asserted-by":"crossref","unstructured":"Evans, R.D. and Porche, D.A., \u201cThe nature and frequency of medicare\/medicaid fraud and neutralization techniques among speech, occupational, and physical therapists,\u201d Deviant Behav., vol. 26, no. 3, pp. 253-270, May 2005.","DOI":"10.1080\/01639620590915167"},{"key":"10.1016\/j.procs.2015.08.594_bib0130","unstructured":"Lubao, Michael. \u201cClaiming Responsibility.\u201d Health Management Technology, June 2008."}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050915027295?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050915027295?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,19]],"date-time":"2018-09-19T07:27:29Z","timestamp":1537342049000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050915027295"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":26,"alternative-id":["S1877050915027295"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2015.08.594","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Categorizing and Describing the Types of Fraud in Healthcare","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2015.08.594","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2015 The Authors. Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}