|Home||Switchboard||Unix Administration||Red Hat||TCP/IP Networks||Neoliberalism||Toxic Managers|
|May the source be with you, but remember the KISS principle ;-)|
A lot of insurance fraud is committed by doctors who want to increase their earning.From Wikipedia, the free encyclopedia
Insurance fraud is any act committed with the intent to obtain a fraudulent outcome from an insurance process. This may occur when a claimant attempts to obtain some benefit or advantage to which they are not otherwise entitled, or when an insurer knowingly denies some benefit that is due. According to the United States Federal Bureau of Investigation the most common schemes include: Premium Diversion, Fee Churning, Asset Diversion, and Workers Compensation Fraud. The perpetrators in these schemes can be both insurance company employees and claimants. False insurance claims are insurance claims filed with the intent to defraud an insurance provider.
Insurance fraud has existed since the beginning of insurance as a commercial enterprise. Fraudulent claims account for a significant portion of all claims received by insurers, and cost billions of dollars annually. Types of insurance fraud are diverse, and occur in all areas of insurance. Insurance crimes also range in severity, from slightly exaggerating claims to deliberately causing accidents or damage. Fraudulent activities affect the lives of innocent people, both directly through accidental or intentional injury or damage, and indirectly as these crimes cause insurance premiums to be higher. Insurance fraud poses a significant problem, and governments and other organizations make efforts to deter such activities.
The "chief motive in all insurance crimes is financial profit." Insurance contracts provide both the insured and the insurer with opportunities for exploitation.
According to the Coalition Against Insurance Fraud, the causes vary, but are usually centered on greed, and on holes in the protections against fraud. Often, those who commit insurance fraud view it as a low-risk, lucrative enterprise.
For example, drug dealers who have entered insurance fraud  think it's safer and more profitable than working street corners. Compared to those for other crimes, court sentences for insurance fraud can be lenient, reducing the risk of extended punishment. Though insurers try to fight fraud, some will pay suspicious claims anyway; settling such claims is often cheaper than legal action.
Another reason for fraud is over-insurance, when the amount insured is greater than the actual value of the property insured. This condition can be very difficult to avoid, especially since an insurance provider might sometimes encourage it in order to obtain greater profits. This allows fraudsters to make profits by destroying their property because the payment they receive from their insurers is of greater value than the property they destroy. The most common form of insurance fraud is inflating the value of the loss.
Insurance companies are also susceptible to fraud because it's possible for fraudsters to file claims for damages that never occurred.
Insurance fraud can be classified as either hard fraud or soft fraud.
Hard fraud occurs when someone deliberately plans or invents a loss, such as a collision, auto theft, or fire that is covered by their insurance policy in order to receive payment for damages. Criminal rings are sometimes involved in hard fraud schemes that can steal millions of dollars.
Soft fraud, which is far more common than hard fraud, is sometimes also referred to as opportunistic fraud. This type of fraud consists of policyholders exaggerating otherwise-legitimate claims. For example, when involved in an automotive collision an insured person might claim more damage than actually occurred. Soft fraud can also occur when, while obtaining a new health insurance policy, an individual misreports previous or existing conditions in order to obtain a lower premium on his or her insurance policy.
Health insurance fraud is described as an intentional act of deceiving, concealing, or misrepresenting information that results in health care benefits being paid to an individual or group.
Fraud can be committed either by an insured person or by a provider. Member fraud consists of claims on behalf of ineligible members and/or dependents, alterations on enrollment forms, concealing pre-existing conditions, failure to report other coverage, prescription drug fraud, and failure to disclose claims that were a result of a work-related injury.
Provider fraud consists of claims submitted by bogus physicians, billing for services not rendered, billing for higher level of services, diagnosis or treatments that are outside the scope of practice, alterations on claims submissions, and providing services while medical licenses are either suspended or revoked. I
ndependent medical examinations debunk false insurance claims and allow the insurance company or claimant to seek a non-partial medical view for injury-related cases.
According to the Coalition Against Insurance Fraud, health insurance fraud depletes taxpayer-funded programs like Medicare, and may victimize patients in the hands of certain doctors. Some scams involve double-billing by doctors who charge insurers for treatments that never occurred, and surgeons who perform unnecessary surgery.
According to Roger Feldman, Blue Cross Professor of Health Insurance at the University of Minnesota, one of the main reasons that medical fraud is such a prevalent practice is that nearly all of the parties involved find it favorable in some way. Many physicians see it as necessary to provide quality care for their patients. Many patients, although disapproving of the idea of fraud, are sometimes more willing to accept it when it affects their own medical care. Program administrators are often lenient on the issue of insurance fraud, as they want to maximize the services of their providers.
The most common perpetrators of healthcare insurance fraud are health care providers. One reason for this, according to David Hyman, a Professor at the University of Maryland School of Law, is that the historically-prevailing attitude in the medical profession is one of "fidelity to patients". This incentive can lead to fraudulent practices such as billing insurers for treatments that are not covered by the patient's insurance policy. To do this, physicians often bill for a different service, which is covered by the policy, rather than that which they rendered.
Another motivation for insurance fraud is a desire for financial gain. Public healthcare programs such as Medicare and Medicaid are especially conducive to fraudulent activities, as they are often run on a fee-for-service structure. Physicians use several fraudulent techniques to achieve this end. These can include "up-coding" or "upgrading," which involve billing for more expensive treatments than those actually provided; providing, and subsequently billing for, treatments that are not medically necessary; scheduling extra visits for patients; referring patients to other physicians when no further treatment is actually necessary; "phantom billing," or billing for services not rendered; and "ganging," or billing for services to family members or other individuals who are accompanying the patient but who did not personally receive any services.
Perhaps the greatest total dollar amount of fraud is committed by the health insurance companies themselves. There are numerous studies and articles detailing examples of insurance companies intentionally not paying claims and deleting them from their systems, denying and cancelling coverage, and the blatant underpayment to hospitals and physicians beneath what are normal fees for care they provide. Although difficult to obtain the information, this fraud by insurance companies can be estimated by comparing revenues from premium payments and expenditures on health claims.
In response to the increased amount of health care fraud in the United States, Congress, through the Health Insurance Portability and Accountability Act of 1996 (HIPAA), has specifically established health care fraud as a federal criminal offense with punishment of up to ten years of prison in addition to significant financial penalties.
The detection of insurance fraud generally occurs in two steps. The first step is to identify suspicious claims that have a higher possibility of being fraudulent. This can be done by computerized statistical analysis or by referrals from claims adjusters or insurance agents. Additionally, the public can provide tips to insurance companies, law enforcement and other organizations regarding suspected, observed, or admitted insurance fraud perpetrated by other individuals. Regardless of the source, the next step is to refer these claims to investigators for further analysis.
Due to the sheer number of claims submitted each day, it would be far too expensive for insurance companies to have employees check each claim for symptoms of fraud. Instead, many companies use computers and statistical analysis to identify suspicious claims for further investigation. There are two main types of statistical analysis tools used: supervised and unsupervised. In both cases, suspicious claims are identified by comparing data about the claim to expected values. The main difference between the two methods is how the expected values are derived.
In a supervised method, expected values are obtained by analyzing records of both fraudulent and non-fraudulent claims. According to Richard J. Bolton and David B. Hand, both of Imperial College in London, this method has some drawbacks as it requires absolute certainty that those claims analyzed are actually either fraudulent or non-fraudulent, and because it can only be used to detect types of fraud that have been committed and identified before.
Unsupervised methods of statistical detection, on the other hand, involve detecting claims that are abnormal. Both claims adjusters and computers can also be trained to identify "red flags," or symptoms that in the past have often been associated with fraudulent claims. Statistical detection does not prove that claims are fraudulent; it merely identifies suspicious claims that need to be investigated further.
Fraudulent claims can be one of two types. They can be otherwise legitimate claims that are exaggerated or "built up," or they can be false claims in which the damages claimed never actually occurred. Once a built up claim is identified, insurance companies usually try to negotiate the claim down to the appropriate amount. Suspicious claims can also be submitted to "special investigative units", or SIUs, for further investigation. These units generally consist of experienced claims adjusters with special training in investigating fraudulent claims. These investigators look for certain symptoms associated with fraudulent claims, or otherwise look for evidence of falsification of some kind. This evidence can then be used to deny payment of the claims or to prosecute fraudsters if the violation is serious enough.
Apr 20, 2017 | www.youtube.comChad 2 years agoAgent76 1 year ago (edited)
"People who believe in these rights very much are forced into compromising their integrity"
I suspect that it's hopelessly unlikely for honest people to complete the Police Academy; somewhere early on the good cops are weeded out and cannot complete training unless they compromise their integrity.January 9, 2014
500 Years of History Shows that Mass Spying Is Always Aimed at Crushing Dissent It's Never to Protect Us From Bad Guys No matter which government conducts mass surveillance, they also do it to crush dissent, and then give a false rationale for why they're doing it.
Homa Monfared 7 months ago
I am wondering how much damage your spying did to the Foreign Countries, I am wondering how you changed regimes around the world, how many refugees you helped to create around the world.
Don Kantner, 2 weeks ago
People are so worried about NSA don't be fooled that private companies are doing the same thing. Plus, the truth is if the NSA wasn't watching any fool with a computer could potentially cause an worldwide economic crisis.
Bettor in Vegas 1 year ago
In communism the people learned quick they were being watched. The reaction was not to go to protest.
Just not be productive and work the system and not listen to their crap. this is all that was required to bring them down. watching people, arresting does not do shit for their cause......
Google matched content
FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit exclusivly for research and educational purposes. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner.
ABUSE: IPs or network segments from which we detect a stream of probes might be blocked for no less then 90 days. Multiple types of probes increase this period.
Groupthink : Two Party System as Polyarchy : Corruption of Regulators : Bureaucracies : Understanding Micromanagers and Control Freaks : Toxic Managers : Harvard Mafia : Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience : Who Rules America : Neoliberalism : The Iron Law of Oligarchy : Libertarian Philosophy
War and Peace : Skeptical Finance : John Kenneth Galbraith :Talleyrand : Oscar Wilde : Otto Von Bismarck : Keynes : George Carlin : Skeptics : Propaganda : SE quotes : Language Design and Programming Quotes : Random IT-related quotes : Somerset Maugham : Marcus Aurelius : Kurt Vonnegut : Eric Hoffer : Winston Churchill : Napoleon Bonaparte : Ambrose Bierce : Bernard Shaw : Mark Twain Quotes
Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis : Political Skeptic Bulletin, 2013 : Unemployment Bulletin, 2010 : Vol 23, No.10 (October, 2011) An observation about corporate security departments : Slightly Skeptical Euromaydan Chronicles, June 2014 : Greenspan legacy bulletin, 2008 : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 : Inequality Bulletin, 2009 : Financial Humor Bulletin, 2008 : Copyleft Problems Bulletin, 2004 : Financial Humor Bulletin, 2011 : Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult : Political Skeptic Bulletin, 2011 : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law
Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds : Larry Wall : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor : History of pipes concept : Solaris : MS DOS : Programming Languages History : PL/1 : Simula 67 : C : History of GCC development : Scripting Languages : Perl history : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander : Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history
The Peter Principle : Parkinson Law : 1984 : The Mythical Man-Month : How to Solve It by George Polya : The Art of Computer Programming : The Elements of Programming Style : The Unix Haterís Handbook : The Jargon file : The True Believer : Programming Pearls : The Good Soldier Svejk : The Power Elite
Most popular humor pages:
Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor : Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor
The Last but not Least
Copyright © 1996-2016 by Dr. Nikolai Bezroukov. www.softpanorama.org was created as a service to the UN Sustainable Development Networking Programme (SDNP) in the author free time. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License.
Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.
FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.
This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree...
|You can use PayPal to make a contribution, supporting development of this site and speed up access. In case softpanorama.org is down you can use the at softpanorama.info|
The statements, views and opinions presented on this web page are those of the author (or referenced source) and are not endorsed by, nor do they necessarily reflect, the opinions of the author present and former employers, SDNP or any other organization the author may be associated with. We do not warrant the correctness of the information provided or its fitness for any purpose.
Last modified: December, 26, 2017