Review on Data Mining Techniques for Fraud Detection in Health Insurance

Ms. Pranali Pawar


Review describes an effective method of data mining for health insurance fraud detection that identifies suspicious behavior of health care providers. Fraud and abuse on medical claims became a major concern for health insurance companies last decades. Estimates made for the studied U.S. Medicaid health insurance program is that up to 10% of the claims are fraudulent. Fraud involves intentional deception or misrepresentation intended to result in an unauthorized benefit. It is shocking because the incidence of health insurance fraud keeps increasing every year.
Nowadays there is huge amount of data stored in real world databases and this amount continues to grow fast. So, there is a need for semi-automatic methods that discover the hidden knowledge in such database. Data mining automatically filtering through immense amounts of data to find known/unknown patterns bring out valuable new perceptions and make predictions. Data mining which is divided into two learning techniques viz., supervised and unsupervised is employed to detect fraudulent claims. Basically these techniques are used for fraud detection in health /insurance.

Full Text:



Vipula Rawte, G Anuradha, "Fraud Detection in Health Insurance using Data Mining Techniques", International conference of ICCTCT 2015, Mumbai.

Dr.Biswendu Bardhan. “Frauds in Health Insurance”,

Melih Kirlidoga, Cuneyt Asuk(2012) A fraud detection approach with data mining in health insurance. Procedia - Social and BehavioralSciences 62 ( 2012 ) 989 – 994.

Dan Ventura. Class Lecture, Topic: “SVM Example.” BYU University of Physics and Mathematical Sciences, Mar. 12, 2009.

Shunzhi Zhu, Yan Wang, Yun Wu, "Health Care Fraud Detection Using Nonnegative Matrix Factorization", The 6th International Conference on Computer Science & Education (ICCSE 2011) August 3-5, 2011. SuperStar Virgo, Singapore.

Zhongyuan Zhang, Tao Li, Chris Ding, Xiangsun Zhang, “Binary Matrix Factorization with Applications”, Proceeding ICDM '07 Proceedings of the 2007 Seventh IEEE International Conference on Data Mining Pages 391-400.

Mohammad Sajjad Ghaemi. Class Lecture, Topic: “Clustering and Nonnegative Matrix Factorization”. DAMAS LAB, Computer Science and Software Engineering Department, Laval University. Apr.12, 2013.

Haesun Park. Class Lecture, Topic: “Nonnegative Matrix Factorization for Clustering”. School of Computational Science and Engineering Georgia Institute of Technology Atlanta, GA, USA, July 2012.

Fashoto Stephen G., Owolabi Olumide, Sadiku J., Gbadeyan Jacob A, "Application of Data Mining Technique for Fraud Detection in Health Insurance Scheme Using Knee-Point K-Means Algorithm", Australian Journal of Basic and Applied Sciences, 7(8): 140-144, 2013 ISSN 1991-8178.

Williams, G. & Huang, Z. (1997). Mining the Knowledge Mine: The Hot Spots Methodology for Mining Large Real World Databases. Proc. of the 10th Australian Joint Conference on Artificial Intelligence.

Wong, W., Moore, A., Cooper, G. & Wagner, M. (2003). Bayesian Network Anomaly Pattern Detection for Detecting Disease Outbreaks. Proc. of ICML03, 217-223.

Yamanishi, K., Takeuchi, J., Williams, G. & Milne, P. (2004). On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms. Data Mining and Knowledge Discovery 8: 275-300.

Musal R.M. (2010) Two models to investigate Medicare fraud within unsupervised databases. Expert Systems with Applications 37: 8628-8633

Tan PN, Steinbach Michael, Kumar Vipin (2006) Introduction to Data Mining, Pearson Education

Bonchi F, Giannotti F, Mainetto G, Pedreschi D (1999) A classification-based methodology for planning auditing strategies in fraud detection. In Proceedings of SIGKDD99, 175–184

Ormerod T, Morley N, Ball L, Langley C, Spenser C (2003) Using ethnography to design a Mass Detection Tool (MDT) for the early discovery of insurance fraud. In Proceedings of the ACM CHI Conference

Thiprungsri, S (2012) Cluster analysis for anomaly detection in accounting, Rutgers Doctoral Thesis


  • There are currently no refbacks.

Copyright © IJETT, International Journal on Emerging Trends in Technology