SlideShare a Scribd company logo
1 of 2
Download to read offline
IBM Sales and Distribution                                                                                        Healthcare payers
Solution Brief




                                                           Fraud and abuse
                                                           management for payers
                                                           Prevent and detect fraudulent claims


                                                           To uncover fraudulent and abusive behavior, investigators must sort
                Highlights                                 through millions of individual claims to find suspicious behavior, often
                                                           relying on a pay-and-chase strategy—pursuing cases after claims have
            ●   Support a diverse range of fraud           already been paid. IBM has worked closely with healthcare investiga-
                investigation before and after claims
                payment                                    tors to develop the fraud and abuse management solution for payers
                                                           with both proactive and retrospective detection capabilities.
            ●   Sort millions of claims in minutes and
                rank providers by degree of potentially
                abusive behavior                           A sophisticated, comprehensive solution
                                                           Detecting suspicious claims activity—such as billing for services not
            ●   Pinpoint claims most likely to be fraud-
                ulent or erroneous with advanced algo-     performed, billing more expensive claims than the actual service ren-
                rithms and analytical models               dered, overprescribing tests and medications, and requiring tests and
            ●   Achieve rapid return on investment by
                                                           procedures that are not medically necessary—is a difficult data-
                enabling investigators and auditors to     intensive task. The fraud and abuse management solution for payers
                become more productive                     from IBM supports a diverse range of fraud investigation both before
                                                           and after claims payment, including prevention, investigation, detec-
                                                           tion and settlement.

                                                           The solution can help you transform your fraud and abuse manage-
                                                           ment strategy by analyzing claims data using prebuilt fraud detection
                                                           models designed for the healthcare industry. These models have been
                                                           developed in conjunction with fraud investigators working in the field,
                                                           and include an updated library of 9,000 risk indicators that can be used
                                                           like building blocks to build new models or change existing ones.

                                                           Advanced algorithms developed by IBM Research can help pinpoint
                                                           claims most likely to be fraudulent or erroneous. Our analytical tech-
                                                           niques include evaluating nonstandard claims submissions and statisti-
                                                           cal outliers, identifying patterns of abusive claims submissions and
                                                           defining new provider segments to find previously unknown patterns of
behavior. Using a combination of data mining capabilities and graphi-
cal reporting tools, the solution can help identify potentially fraudulent
and abusive behavior before a claim is paid or retrospectively analyze
providers’ past behaviors to flag suspicious patterns more effectively
than the traditional manual process.
                                                                             © Copyright IBM Corporation 2010

Reduce wrongful payments and increase                                        IBM Corporation
                                                                             Route 100
productivity                                                                 Somers, NY 10589
Without the tools to systematically and scientifically uncover suspi-
                                                                             Produced in the United States of America
cious claims, investigators must rely on tips from fraud hotlines, or use    May 2010
spreadsheets and database queries to perform relatively simple analysis.     All Rights Reserved
The fraud and abuse management solution can allow them to sort mil-
                                                                             IBM, the IBM logo and ibm.com are trademarks or
lions of claims in minutes, and then rank providers by degree of poten-      registered trademarks of International Business Machines
tially abusive behavior. This can help speed and extend the ability to       Corporation in the United States, other countries, or both. If
                                                                             these and other IBM trademarked terms are marked on their
recover mistakenly paid claims and reduce wrongful medical payments.
                                                                             first occurrence in this information with a trademark symbol
                                                                             (® or ™), these symbols indicate U.S. registered or common
Our approach to fraud and abuse detection helps enable investigators         law trademarks owned by IBM at the time this information
                                                                             was published. Such trademarks may also be registered or
and auditors to become more productive, handling broader caseloads
                                                                             common law trademarks in other countries. A current list of
by automating processes previously conducted manually. Increased             IBM trademarks is available on the Web at “Copyright and
productivity can lead to enough accurately identified suspicious claims       trademark information” at ibm.com/legal/copytrade.shtml
to help your organization achieve a rapid return on investment. While        Other company, product or service names may be trademarks
some of the business requirements may differ, our solution can also          or service marks of others.
address the needs of public payer plans, such as Medicaid, to help
recoup dollars wrongly billed to the system.                                          Please Recycle


Transform fraud identification with IBM
Collaboration with healthcare payers and our deep involvement with
user groups allow us to offer you a fraud and abuse solution that can
evolve as your business needs change. Our fraud and abuse manage-
ment offering currently used by 30 public and private sector clients to
identify and pursue suspicious claims. IBM brings together industry
and process expertise, systems and business performance software, and
our deep computing and advanced analytics capabilities to tackle your
business challenges.

For more information
To learn more about the fraud and abuse management solution for
payers, please contact your IBM representative or IBM Business
Partner, or visit: ibm.com/healthcare




                                                                                                                    HHS03005-USEN-00

More Related Content

Recently uploaded

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Recently uploaded (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Fraud Detection Solutions from IBM

  • 1. IBM Sales and Distribution Healthcare payers Solution Brief Fraud and abuse management for payers Prevent and detect fraudulent claims To uncover fraudulent and abusive behavior, investigators must sort Highlights through millions of individual claims to find suspicious behavior, often relying on a pay-and-chase strategy—pursuing cases after claims have ● Support a diverse range of fraud already been paid. IBM has worked closely with healthcare investiga- investigation before and after claims payment tors to develop the fraud and abuse management solution for payers with both proactive and retrospective detection capabilities. ● Sort millions of claims in minutes and rank providers by degree of potentially abusive behavior A sophisticated, comprehensive solution Detecting suspicious claims activity—such as billing for services not ● Pinpoint claims most likely to be fraud- ulent or erroneous with advanced algo- performed, billing more expensive claims than the actual service ren- rithms and analytical models dered, overprescribing tests and medications, and requiring tests and ● Achieve rapid return on investment by procedures that are not medically necessary—is a difficult data- enabling investigators and auditors to intensive task. The fraud and abuse management solution for payers become more productive from IBM supports a diverse range of fraud investigation both before and after claims payment, including prevention, investigation, detec- tion and settlement. The solution can help you transform your fraud and abuse manage- ment strategy by analyzing claims data using prebuilt fraud detection models designed for the healthcare industry. These models have been developed in conjunction with fraud investigators working in the field, and include an updated library of 9,000 risk indicators that can be used like building blocks to build new models or change existing ones. Advanced algorithms developed by IBM Research can help pinpoint claims most likely to be fraudulent or erroneous. Our analytical tech- niques include evaluating nonstandard claims submissions and statisti- cal outliers, identifying patterns of abusive claims submissions and defining new provider segments to find previously unknown patterns of
  • 2. behavior. Using a combination of data mining capabilities and graphi- cal reporting tools, the solution can help identify potentially fraudulent and abusive behavior before a claim is paid or retrospectively analyze providers’ past behaviors to flag suspicious patterns more effectively than the traditional manual process. © Copyright IBM Corporation 2010 Reduce wrongful payments and increase IBM Corporation Route 100 productivity Somers, NY 10589 Without the tools to systematically and scientifically uncover suspi- Produced in the United States of America cious claims, investigators must rely on tips from fraud hotlines, or use May 2010 spreadsheets and database queries to perform relatively simple analysis. All Rights Reserved The fraud and abuse management solution can allow them to sort mil- IBM, the IBM logo and ibm.com are trademarks or lions of claims in minutes, and then rank providers by degree of poten- registered trademarks of International Business Machines tially abusive behavior. This can help speed and extend the ability to Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their recover mistakenly paid claims and reduce wrongful medical payments. first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common Our approach to fraud and abuse detection helps enable investigators law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or and auditors to become more productive, handling broader caseloads common law trademarks in other countries. A current list of by automating processes previously conducted manually. Increased IBM trademarks is available on the Web at “Copyright and productivity can lead to enough accurately identified suspicious claims trademark information” at ibm.com/legal/copytrade.shtml to help your organization achieve a rapid return on investment. While Other company, product or service names may be trademarks some of the business requirements may differ, our solution can also or service marks of others. address the needs of public payer plans, such as Medicaid, to help recoup dollars wrongly billed to the system. Please Recycle Transform fraud identification with IBM Collaboration with healthcare payers and our deep involvement with user groups allow us to offer you a fraud and abuse solution that can evolve as your business needs change. Our fraud and abuse manage- ment offering currently used by 30 public and private sector clients to identify and pursue suspicious claims. IBM brings together industry and process expertise, systems and business performance software, and our deep computing and advanced analytics capabilities to tackle your business challenges. For more information To learn more about the fraud and abuse management solution for payers, please contact your IBM representative or IBM Business Partner, or visit: ibm.com/healthcare HHS03005-USEN-00