Professional Documents
Culture Documents
_______________
A Thesis
Presented to the
Faculty of
_______________
In Partial Fulfillment
Master
of
Business Administration
_______________
by
Spring 2011
iii
Copyright © 2011
by
DEDICATION
This thesis is dedicated to my wife, Dana, without whose support and patience the
completion of this work would have been exceedingly more difficult.
v
Fraud, waste and abuse are increasing dilemmas affecting the U.S. health care system.
According to estimates by the National Healthcare Anti-Fraud Association and other
concerned entities, fraud may account for as much as 10% of healthcare spending per annum.
This percentage translates to approximately $220 billion per year in wasted funds,
representing significant and negative economic implications for both the public and private
sectors. Beyond its economic impacts, health care fraud has a broad social dimension; as the
environment and nature of fraudulent activities continue to evolve, organized crime
syndicates have established a foothold and, in addition, schemes have recently emerged that
put patients at substantial risk of physical harm. While the problem of health care fraud has
received relatively little academic attention in comparison to other domains, its monetary
impacts are enormous and the dynamics of the issue are growing in their complexity; as such,
further study and proposed solutions are warranted.
A number of systems have been developed, and several significant collaborative
efforts initiated, in an attempt to combat the problem of health care fraud. Current software
tools are rules-based decision support systems, which cannot effectively identify many types
of fraud. Attempts at collaboration have mainly involved law enforcement and payers; these
undertakings have been somewhat successful, but limited in their effectiveness. This thesis
argues that a primary factor in the ineffectiveness of current and recent solutions is the lack
of involvement in collaborative exchange by patients. Using a knowledge management
approach, leveraging fundamentals of the discipline and lessons learned, the current
environment of health care fraud is analyzed. In particular, barriers to patient participation
are studied and recommendations made for facilitating their active involvement in attacking
the problem of fraud. Recommended solutions include a model for an effective distributed
knowledge management system that is usable by and to all parties to health care transactions,
including patients.
vi
TABLE OF CONTENTS
PAGE
ABSTRACT ...............................................................................................................................v
LIST OF TABLES ................................................................................................................... ix
LIST OF FIGURES ...................................................................................................................x
ACKNOWLEDGEMENTS ..................................................................................................... xi
CHAPTER
1 INTRODUCTION .........................................................................................................1
Background ..............................................................................................................1
Statement of the Problem .........................................................................................2
Purpose of the Study ................................................................................................6
Theoretical Bases and Organization ........................................................................6
2 REVIEW OF THE LITERATURE .............................................................................10
Economic Implications ..........................................................................................10
Social Considerations.............................................................................................11
Common Forms Of Fraud ......................................................................................13
Billing for Services Not Provided ....................................................................14
Misrepresentations ...........................................................................................15
Rendering of Medically-Unnecessary Services ...............................................16
Upcoding, Unbundling and Related Billing Practices .....................................16
Public Sector Attempts at Combating the Problem ...............................................16
Private Sector Attempts at Combating the Problem ..............................................19
Challenges in Public-Private Sector Collaboration..........................................20
Commercial Fraud Detection Tools and Methodologies .................................21
The Concept of Knowledge ...................................................................................22
Definitions and Objectives of Knowledge Management .......................................23
The Growing Role of Knowledge Management in Health Care Industry
Applications ...........................................................................................................25
Communities of Practice ........................................................................................27
vii
LIST OF TABLES
PAGE
Table 1. Qui Tam Cases in Health Care as a Percentage of Total Qui Tam Cases,
1993 to 1998 ................................................................................................................43
Table 2. Understanding of Common Documents ....................................................................56
Table 3. Understanding of Terminology, Provider Instructions, Common Documents ..........57
Table 4. Awareness of Problem Domain .................................................................................57
Table 5. Attitudes Toward the Problem of Health Care Fraud ................................................58
Table 6. Sharing of Personal Health Information ....................................................................58
Table 7. Technical Abilities (Respondent Self-Assessment) ...................................................59
Table 8. Model Summary for Regression of Willingness to Participate on Major
Independent Variables .................................................................................................60
Table 9. ANOVA Results for Overall Regression ...................................................................61
Table 10. Regression Coefficients for the Overall Model Regression ....................................61
Table 11. Overall Result of Regression of Medical Terminology Understanding on
Background and Technical Abilities. ...........................................................................62
Table 12. ANOVA Test for Regression of Medical Terminology Understanding on
Background and Technical Abilities. ...........................................................................62
Table 13. Listing of Coefficients for the Regression of Medical Terminology
Understanding on Background and Technical Abilities. .............................................62
Table 14. Overall Result of Regression of Problem Awareness on Background and
Technical Abilities. ......................................................................................................63
Table 15. ANOVA Test for the Regression of Problem Domain Awareness on
Background and Technical Abilities. ...........................................................................63
Table 16. Listing of Coefficients for Regression of Problem Domain Awareness on
Background and Technical Abilities. ...........................................................................63
Table 17. Representation of a Diagnosis Object by the Proposed System ..............................79
x
LIST OF FIGURES
PAGE
ACKNOWLEDGEMENTS
I would like to take this opportunity to express my sincere gratitude to Dr. Murray
Jennex, the chair of my thesis committee, for his guidance and direction throughout the
process. In addition, I would like to thank Drs. Addo and Frost for recognizing the potential
value of this thesis and agreeing to serve as members of the committee.
1
CHAPTER 1
INTRODUCTION
This thesis begins with a brief overview of the issue of health care fraud, followed by
a more formal and precise statement of the problem. Subsequently, rationale and justification
for the study is presented. Finally, the theoretical bases of the study are put forth.
BACKGROUND
Health care fraud adversely and significantly affects both public and private benefit
frameworks, ranging from federal and state programs such as Medicare and Medicaid to
commercial and employer-sponsored insurance plans. Losses resulting from fraud, waste and
abuse have contributed heavily to the rising costs of health care that characterize the current
industry environment. While fraud has not been the only catalyst in health care cost increases
(development and implementation of new medical equipment and technologies, treatments
and pharmaceuticals have also helped to fuel increases), it has played a substantial role.
These rising costs have made insurance coverage unaffordable, and thus unavailable, for
millions of Americans and their families. Monetary effects associated with health care fraud
are staggering from the business perspective, particularly for insurance payers who are forced
to absorb much of the costs as well as to pass them along to all parties with whom they do
business.
Beyond obvious impacts to health care accessibility, these forces directly act against
the nation’s GDP. According to estimates by the National Health Care Anti-Fraud
Association (2009) and other concerned entities, fraud may account for as much as 10% of
healthcare spending per annum. This percentage translates to approximately $220 billion per
year in wasted funds.
In addition to its economic impacts, health care fraud has a broad social dimension; as
the environment and nature of fraudulent activities continue to evolve, organized crime
syndicates have established a foothold and, in addition, schemes have recently emerged that
put patients at substantial risk of physical harm. While the problem of health care fraud has
2
received relatively little academic attention in comparison to other domains, its monetary
impacts are enormous and the dynamics of the issue are growing in their complexity; as such,
further study and proposed solutions are warranted. Within this thesis the current
environment surrounding healthcare fraud will be discussed at length, including a substantial
overview of several key government and private-sector actions that have been taken in an
attempt to combat the problem; the relative success of these efforts will be analyzed.
A number of systems have been developed, and several significant collaborative
efforts initiated, in an attempt to combat the problem of health care fraud. Current software
tools are rules-based decision support systems, which cannot effectively identify many types
of fraud. Attempts at collaboration have mainly involved law enforcement and payers; these
undertakings have been somewhat successful, but limited in their effectiveness. This thesis
argues that a primary factor in the ineffectiveness of current and recent solutions is the lack
of involvement in collaborative exchange by patients. Using a knowledge management
approach, leveraging fundamentals of the discipline and lessons learned, the current
environment of health care fraud is analyzed. In particular, barriers to patient participation
are studied and recommendations made for facilitating their active involvement in attacking
the problem of fraud. Recommended solutions include a model for an effective distributed
knowledge management system that is usable by all stakeholders to health care transactions,
including patients.
fraud collaborative efforts and, additionally, identifies opportunities that may exist to lower
or eliminate such barriers.
Health care fraud is essentially a game of asymmetric information. Of all the players
involved in a typical health care transaction arising from a clinical encounter, two entities
possess substantially more information than the rest; these are the provider (first and
foremost) and the patient. Both of these entities, and only these entities, know everything that
transpired during their encounter. While the provider has the advantage of medical education,
experience and familiarity with health and medical jargon, the patient still knows what
services were performed, although may understand it (and may explain it to others)
somewhat differently than the provider. The level of knowledge that these entities possess is
substantially greater than all other stakeholders involved in the claims adjudication
workflow. The stakeholder armed with the next-highest level of information is the payer, but
such information is second-hand in nature.
Returning to the problem discussed previously, current efforts towards the combat of
health care fraud have only sought to capture knowledge from one of the two entities who
possess first-hand knowledge of the encounter upon which the payment transaction is based:
the provider. Unfortunately for the payer, and as is discussed in the literature review (Chapter
2) providers are the primary perpetrators of fraud within the health care industry; due to the
power of the information asymmetry dynamic, lax enforcement and insufficient fraud
detection methodologies, the provider as stakeholder has incentives to report incorrect
information to the payer that can be difficult to validate (or refute).
This paper views the understanding of medical terminology (to include jargon, terms
and industry-accepted coding systems) as a significant prerequisite for a patient’s ability to
effectively participate in efforts aimed at a reduction in economic and social externalities
caused by health care fraud. Terminological matters are a core concept within the knowledge
management domain, as they play a major role in knowledge transfer and application,
primarily due to considerations of common context of understanding. Taxonomies,
ontologies and controlled vocabularies are frequently encountered in the KM literature and
can each directly or indirectly address terminological challenges. This paper argues that
patients (in general) currently lack sufficient understanding of health and medical
terminology to play an effective role in health care anti-fraud efforts. Provider billing
4
statements, explanation of benefit (EOB) statements from payers and much of the other
documentation currently used within the health care industry makes heavy use of complex
medical terms and complicated code sets. Without the ability to interpret what procedure(s)
have been billed to a patient’s insurance carrier (payer), how effectively could a patient
identify discrepancies between the services actually performed and what was actually billed?
If, indeed, diversity in terminological understanding between patients and providers is
preventing patients’ effective participation, how might concepts of knowledge management
be applied and leveraged to improve the situation? Issues surrounding understanding of
terminology will be discussed in greater detail throughout the thesis.
In addition to the aforementioned examination of terminology concerns, this thesis
presents and tests additional hypotheses surrounding consumer awareness (of the problem of
health care fraud and its magnitude), current attitudes toward the problem, willingness to
share information (with the goal of expanding the anti-fraud knowledge base), and others.
Figure 1 shows each of the expected relationships examined by the present study. Each
relationship indicated in the diagram is a study hypothesis and these will be revisited in the
Methodology chapter (Chapter 3), where rationale for the relationships are explained and a
functional model is derived for purposes of analysis.
Knowledge captured from and shared between payers, law enforcement and
regulatory bodies is currently used, along with resources such as law enforcement time and
government funds, in conducting investigations related to suspected fraudulent activities
within the health care industry. Depending on the success of an investigation, further action
may result in the form of civil cases, criminal prosecutions or both. Such actions can result in
monetary penalties (fines), recoveries of funds (belonging to the public trust or to private
payers) and industry sanctions (such as revocation of privileges or prohibition against
administering services to Medicare or Medicaid patients) against offenders.
Currently, knowledge is not captured directly from patients. This is indicated in
Figure 2 by the dashed line around the representation of patient knowledge. With an
6
estimated high value of patient knowledge, it is reasonable to expect both more, and more
fruitful, investigations and subsequent actions working against the problem.
This paper argues that the failure to include, and thus capture, knowledge from
patients in previous and current collaborative forums within the fraud domain has limited the
success of anti-fraud efforts; further argued is that this failure has been detrimental to payers,
taxpayers, societal interests and the national economy. For purposes of understanding the
current environment, justifying the study’s hypotheses and in order to develop and present
potential solutions, this paper applies knowledge management principles to each.
For instance and in reference to the above, several recent knowledge management
undertakings have revolved around distributed KM systems that span organizational borders
for knowledge capture and internalization. This thesis argues that it is both logical and
straightforward to build upon and extend the dynamics of a DKMS to the specific domain of
health care fraud. In addition, the conceptual bases surrounding communities of practice,
while not historically used for such purposes, fit well with a theoretical collaborative
framework that involves all key stakeholders involved in health care transactions, including
the patient. In terms of patient understanding of medical terminology and the manner in
which this creates challenges in comprehending payer documents and in articulating
information, it is reasonable to consider and apply the concepts of tacit and implicit
knowledge, particularly with respect to developing solutions to increase effective patient
knowledge capture.
With respect to anti-fraud efforts and value of information from diverse sources, the
expected impact of knowledge from the various stakeholders of the health care industry and
the health care anti-fraud domain is shown in Figure 3.
Beginning from the lower end of the knowledge impact spectrum, this paper
considers provider knowledge capture to be of the lowest impact, for several reasons; some
of these reasons have already been discussed in this chapter, but are restated here. Providers
are the most common perpetrator of fraudulent activities within the health care industry,
primarily using inappropriate billing practices when such fraud has been committed. As a
result, treating this stakeholder as a source of truth involves an element of danger. In the
middle of the spectrum sits law enforcement and regulatory agencies, who can offer valuable
insights based on experiences in prior anti-fraud investigations and court cases. At the high
end of the spectrum are patients, whose knowledge capture is considered most critical by this
paper. Patients are a first-hand source of knowledge about their own clinical encounters with
providers, and as both a member of the payer’s health plan and as a taxpayer, this stakeholder
has significant incentives to participate as a whistleblower against fraudulent activities.
Figure 4 illustrates the important components, or ingredients, to combating health
care fraud. The diagram shows both the expected level and degree of impact from each
component.
As shown in Figure 4, this paper argues that knowledge is the most critical
component of effective anti-fraud activities. Knowledge exposes common fraudulent
schemes, suspicious billing practices, various discrepancies and so forth, which can be used
9
by all stakeholders together to better understand the dynamics of the problem domain, and
consequently, to take effective actions. Diverse knowledge is available for capture from all
stakeholders. Collaboration is also extremely important, but is placed lower on the impact
spectrum than knowledge because contextually-relevant, timely and useful knowledge is
necessary as the basis for active, effective collaboration. Similarly, effective enforcement
depends upon collaboration in terms of shared purpose and exchange of information. Moving
further down, it is fair to state that regulations (in the form of laws and statutes) are only
effective if enforced. Finally, sense of moral obligation (and resultant self-regulation) is a
component which presumably plays some role in limiting fraudulent behaviors before they
begin.
This paper begins with a comprehensive review of the relevant literature surrounding
health care fraud and subsequently continues with a discussion of the knowledge
management discipline and its growing role in health care-specific applications. Next, the
thesis discusses the study methodology and presents findings and recommendations related to
the results of the investigation; the presented recommendations include a proposed model for
a distributed KM system that supports effective participation by all health care stakeholders.
10
CHAPTER 2
This chapter begins with an examination of the history and dynamics surrounding
health care fraud, in order to provide the reader with the necessary context with which to
appreciate the significance of the problem and need for this study. The chapter begins with an
analysis of socio-economic implications and subsequently proceeds to a discussion of the
most common forms of fraud currently affecting the industry. The review of literature
concerning the problem domain ends with an examination, in reasonable detail, of public and
private sector attempts at combating the problem of fraud.
Next, a review of relevant literature is presented to the reader which covers the
knowledge management, or KM, discipline, with moderate to heavy emphasis placed on
elements of participation and KM system design. This subject matter is considered in the
framework of understanding the role of patients as a group (for instance, as users within a
distributed KM system, or simply as a member of a community of practice) and the
importance of capturing information and knowledge from members of this role by current
participants in anti-fraud research, investigation and enforcement activities.
ECONOMIC IMPLICATIONS
A review of the literature surrounding the actual monetary effects of health care fraud
reveals a wide range of estimates with respect to the magnitude of losses. One reason,
suggested by Sparrow (1996), is that losses are not “systematically measured” (p. 86).
Sparrow (1996) discusses several challenges that make this type of measurement difficult;
firstly, any methodology for measurement would need to rely upon well-defined “outcome
classifications”, which would need to be based upon “objective, verifiable realities, none of
which precisely fit legal definitions of fraud” (Sparrow, 1996, p. 91). In addition, matters of
suspected fraudulent billing are often handled within the bounds of the industry and between
transactional parties; for example, monetary penalties or sanctions by payers and
credentialing entities may be imposed. However, in such cases, the fraudulent behavior is
11
never reported to law enforcement agencies and no criminal investigation is undertaken and
as a consequence, these activities will never be included in the statistics. One suggested
reason for this internal handling of matters is the desire of the industry to protect its image
and reputation. Finally, there can be difficulties in separating fraud from other behaviors in
terms of measurement (Sparrow, 1996).
Most estimates of losses arising from fraudulent behavior center around the 10%
mark, in terms of losses as a percentage of total health care expenditures (Sparrow, 1996).
Liberman and Rolle (1998) estimated losses at a figure between $100 and $250 billion
annually, which would correspond to a range of 10 to 25 percent of total health care
expenditures. Liberman and Rolle (1998) further estimate that a typical American family
pays up to $1,400 yearly in additional costs due to fraud. Iglehart (2009) cites estimates by
the National Health Care Anti-Fraud Association (2009) which put fraud losses at
approximately $60 billion annually, but notes that these figures are considered conservative.
Specifically, in terms of the Medicaid program alone, losses are estimated at 10.5 percent, or
$18.6 billion yearly. While the exact monetary figure of losses arising from fraud is not and
cannot realistically be known, there is little doubt that the economic impacts are enormous
and, as such, warrant new approaches to achieving a solution.
SOCIAL CONSIDERATIONS
Implications of health care fraud extend beyond those of economics. Monetary losses
do not fully characterize its consequences, and further, its victims do not merely include
government programs, taxpayers and private insurance payers. In certain forms of fraud,
patients are put at significant risk of harm wherein they may become the subject unnecessary
medical treatments or procedures without their knowledge or understanding. The National
Health Care Anti-Fraud Association (2009) discusses the FBI’s work on cases involving
providers performing unnecessary procedures and distributing prescription medications in the
absence of any clinical basis. As an example, the FBI’s 2006 Jorge Martinez case is cited,
wherein Martinez was convicted on 56 charges arising from the death of patients due to his
inappropriate prescription of unnecessary drugs.
The majority of anti-fraud efforts over the last decade have focused on or
significantly involved providers. However, as of late, a growing concern for federal
12
and more socially-favorable attitude on the part of the consumer toward insurance
companies.
While Tennyson’s (1997) work was based primarily in the context of automobile
insurance claim fraud, much of her findings and assessments are likely to be generally
applicable and representative of consumer attitudes towards fraudulent activity in other
insurance markets as well, including public and private-sector health care. Indeed, many
common elements are present between automobile and health insurance policies, such as
deductibles, co-pays, and coverage exclusions. Despite the fact that Tennyson’s (1997) study
focused on consumer-initiated fraud, and that in reality the majority of fraudulent activity
within the health care industry is perpetrated by providers (physicians and facilities), the
research findings are still useful to the objectives of this thesis. In terms of health care, it is
certainly arguable that patient attitudes would play a role both in the patient’s interest in the
problem domain as well as the patient’s willingness to report known fraud perpetrated by his
or her provider. The literature further suggests that increased education of consumers with
regard to the industry, as well as peer and network influences could be helpful.
pharmacy fraud includes patient fraudulent behaviors (e.g. drug-seeking) and provider
fraudulent behaviors (e.g. prescribing unnecessary or otherwise inappropriate medications).
by the patient should, theoretically, help to identify any such issues. In a study conducted by
Sparrow (1996) and funded by the National Institute of Justice, eight entities were
interviewed about the problem of health care fraud. The entities consisted of regulatory units,
private payers of differing sizes, and several Medicare contractors. A number of persons
whom were interviewed felt confident that EOBs help to protect against fraud perpetrated by
providers. However, according to Sparrow (1996), there are several factors that prevent
EOBs from being a useful tool in combating the problem. First, EOBs are not mailed out to
beneficiaries on a consistent basis for a variety of reasons, both with respect to the Medicare
and Medicaid programs. Secondly, they are not used for home health services, despite the
fact that this type of service has been one of the most significant sources of fraud over the
last 30 years. In addition, some consumers do not take the time to read them, since these are
not bills requiring payment; they are only a listing of services provided. Another key concern
cited by Sparrow is that patients "cannot decipher the strange, computer-generated forms"
(Sparrow, 1996, p. 90).
This thesis argues that issues surrounding patients’ ability to read and understand
correspondence such as EOB documents, due to terminological barriers, are a fundamental
limiter of effective patient involvement in combating health care fraud. In light of this, the
subject will be explored directly within the study undertaken in, and conclusions set forth by,
this thesis; in addition, the topics of terminology and vocabulary will be discussed in later
portions of this chapter.
Misrepresentations
In cases of misrepresentations, such conduct may involve exaggerating the type of
services and/or treatments performed (generally referred to as “upcoding”), manipulating
service dates, exaggerating the patient’s condition to justify submitting charges for more
complex procedures, and/or misrepresenting the provider’s or patient’s identity. One
landmark case involved such misrepresentation of identity, wherein an individual operated 21
durable medical equipment (DME) companies in the Miami, Florida area. Using these DME
companies, the individual defrauded the Medicare program of approximately $179 million by
submitting fraudulent bills to CMS using stolen Medicare provider identification numbers. In
16
this case, the perpetrator was sentenced to 14 years in prison and a fine of $35 million (The
top five national health care fraud settlements, indictments and convictions, 2010, p. 8).
insurance coverage, waste and abuse with respect to health insurance and health care
delivery, medical savings accounts, long-term care accessibility, and simplification of health
insurance administration. One of the primary reasons that legislation dealing with issues such
that are covered by HIPAA was needed was the increasingly electronic nature of the
healthcare environment; such a technological evolution brings with it a number of benefits,
as well as, concerns. In electronic environments, protecting privacy can be considerably
difficult; further, patients had become increasingly concerned about privacy matters related
to their health information, particularly in terms of distribution control.
In order to partially facilitate the accomplishment of several key components of its
legislation, HIPAA imposes a number of technical and data-related standards governing the
exchange of information between parties to health care transactions. These standards include
ANSI (American National Standards Institute) electronic document standards developed by
the X12 subcommittee to be used for a myriad of scenarios such as payment of health care
claims, exchange of claim status, eligibility requests and remittance advice. In addition, new
provider identification standards have been put in place, including NPI (National Provider
Identification) numbers which facilitate easier tracking of provider activities. Prior to NPI
assignments, provider identification (with the exception of DEA prescriber identification
numbers) was managed at the state, rather than federal, level.
In terms of protected health information (PHI), HIPAA legislation has significant
implications for data security, authorized uses and privacy in terms of accessibility of patient
health data. Several modifications have been made to the HIPAA Privacy Rule since its first
version. The most recent version of the Privacy Rule (last modified on August 14, 2002)
seeks to clarify certain components, wherein language and ambiguity has created unintended
consequences that have hindered legitimate usage and exchange of data. Feedback received
from insurance payers, hospitals, physicians and other entities involved in healthcare
transactions made clear that earlier iterations of HIPAA privacy legislation presented a
number of challenges in effective coordination and communications among healthcare
industry parties. Rule makers recognized these concerns and made revisions dealing
specifically with exchange of information for coordination of benefits, payment and referral
purposes. Consequently, adjustments were made to language related to disclosure safeguards,
as well as data collection and maintenance.
18
by both individual whistleblowers as well as groups, under the qui tam provisions of the
False Claims Act. One of the largest cases involved Tenet Healthcare Corporation, a hospital
operator. In this case, Tenet settled and agreed to pay approximately $900 million to the
federal government for submittal of fraudulent claims to Medicare as well as other federally-
sponsored or subsidized health care programs. As a result of another qui tam action, $73
million was recovered from Beth Israel Medical Center, based on alleged misrepresentation
of operating costs and improper claiming of a number of non-reimbursable costs.
Qui tam actions are discussed further in the following section, since while the
provision to bring such actions was created by government legislation, the bringing of such
an action in practice falls within the purview of private-sector and consumer efforts.
current, paid memberships in the NHCAA. This system allows sharing of information
between law enforcement, regulatory agencies and payer compliance officers, including case
details, trends in the ever-changing fraud environment and alerts. The most obvious
limitation of this system is the exclusion of a number of relevant parties; most significantly,
patients (consumers).
would assist the entity in monitoring and investigating activities on its own while relying less
upon government and regulatory resources.
This paper examines and studies patient barriers to participation in health care anti-
fraud activities, particularly in terms of collaborative knowledge exchange efforts. The
knowledge management concepts discussed in this chapter, as well as concepts described in
the chapters beyond the analysis of study results, are applied to understanding of the problem
and to the development of a proposed model for a KM system that attempts to overcome the
aforementioned barriers. Such conceptual applications will include, but not be limited to, the
following:
challenges associated with vocabulary of diverse parties, as well as shared context
patients as a valuable, and viable, source of tacit and implicit knowledge
ways in which knowledge is created by, and transferred from, patients to other
patients as well as other health care stakeholders, applying Nonaka’s SECI model of
knowledge conversion
identification and leverage of human knowledge sources, including patients, as a
critical success factor
parallels between communities of practice and distributed collaborative networks
limitations and impracticalities of rules-based DSS systems as a complete solution to
anti-fraud strategic planning
(accurate and comprehensive), but that also carries a high degree of usability within the
framework of the user’s own context. For purposes of this thesis, this means that a user,
based upon his or her individual experiences, background and aptitudes, must be able to
effectively understand, internalize and apply information and knowledge. According to
Jennex (2005), effective KM requires successful capture and reuse. In order to accomplish
this, several key goals must be met with respect to the processing and leverage of knowledge:
(a) identification, (b) acquiring, (c) sharing, (d) application to relevant scenarios and
situations, (e) determining effectiveness of use, and (f) adjusting usage in order to increase
the knowledge’s effectiveness.
Despite what are numerous, but often subtle, differences and interpretations
surrounding a formal definition of knowledge management, its purpose is essentially to
encourage the view of information and knowledge as assets. Above all else, the knowledge
management discipline recognizes the importance and value of knowledge as intellectual and
human capital. As such, the purpose of traditional KM has always been one of helping
organizations to capture and leverage knowledge in its various forms, in order to increase
effectiveness of the organization and to gain new, or build upon existing, competitive
advantages.
In the framework of patient participation in anti-fraud initiatives, common context of
understanding is a critical component which must be considered in the study. When speaking
of barriers to involvement, it is hypothesized that lack of understanding creates an unleveled
playing field in which an average patient is either uncomfortable in, or simply lacks the
capability in, serving as an effective participant and collaborator. Certainly, culture and
context can be vividly different among different demographical and occupational
classifications within the population; a physician with a number of years of training and
education who is intimately familiar with medical terminology and comfortable with
computers exists at an extreme distance along the continuum from an elderly patient who has
had no exposure to industry terminology and is uncomfortable with technology in general.
Between a lack of relevant experience, and biases and particular heuristics developed over a
lifetime, our example patient would likely speak an entirely different language in terms of
describing a healthcare encounter, illness or other related event than her care provider.
25
opportunities for clinical benefit, but suggest that bandwidth increases will play the key role
in further developments. Different types of information and knowledge will be exchanged in
combination via innovative methods of communication and transfer (Jadad et al., 2000).
Additional bandwidth, in combination with current and coming wireless and computing
portability advances, should provide the capabilities for better sharing and utilization of
knowledge by diverse groups whom represented various parties within the health care
industry, without consideration to geographic and other boundaries (Jadad et al., 2000).
Bose (2002) proposes a compelling and architecturally-sound model for a health care
knowledge management system. The components of this model could well support effective
KM applications surrounding the study of fraud; however, any significant discussion of these
possibilities is visibly absent. In addition, no detailed consideration is undertaken (or at least
presented) with respect to terminological and vocabulary differences among the parties; this
would likely fall into the ‘Categorization’ component, but in any case, deserves further
attention.
The majority of KM-related research and scholarly undertakings have thus far
concerned themselves with electronic patient records, generalized hospital systems, and
clinical point-of-care decision support systems. Very little work has been done in academia
towards solutions to the problem of health care fraud due to its complexities. The literature
review did not uncover any existing literature describing a true knowledge management-
based approach to, and analysis of, the specific problem of health care fraud.
COMMUNITIES OF PRACTICE
In simple terms, a community of practice (CoP) can be defined as a group of
individuals sharing a mutual interest, profession or skill. While such collectives may be
formed intentionally and purposefully (usually with the specific objective of knowledge
creation and sharing), these communities often come into existence as a natural consequence
of social interactions surrounding members’ common interest in their particular domain.
Such interactions may take the form of sharing among, and learning from, members of a
department or division within an organization; they may also occur in online niche social
networking environments or among individuals involved with a particular professional or
trade organization.
28
Considerable research in this area has been done by Etienne Wenger; in terms of
structure, Wenger (1998) proposes three key components that define a community of
practice. These consist of joint enterprise, mutual engagement and shared repertoire,
respectively. Joint enterprise refers to the negotiated purpose of the group. Mutual
engagement serves to retain strong connections and relationships between community
members. Shared repertoire is the embodiment of knowledge and related resources created
and collectively owned by the group, including documents and vocabulary (Wenger, 1998).
Wenger (1998) draws important distinctions between communities of practice and
other collectives, based on key differences surrounding concepts of self-definition,
establishment of boundaries and the nature of their existence. In terms of boundaries, a
community of practice can be characterized by its considerable flexibility; group membership
is not restricted in the same way as an organization’s functional unit and is defined instead by
interest and participation. Different members with varying levels of experience and level of
participation introduce new insights to the group. Further, these communities define
themselves by knowledge instead of by task. Compared to a simple network, these groups
have a clear purpose which extends beyond mere relationships (Wenger, 1998).
There are numerous examples of successful communities of practice, across diverse
disciplines and both inside and outside of business organizations. One of the most successful
CoP stories takes place at Xerox Palo Alto Research Center. In this case, Julian Orr (a
researcher at this center) studied the activities of Xerox technical service representatives and
found that representatives often deviated from the organization’s formalized processes and
procedures when troubleshooting machines at client locations. Troubleshooting and repair of
technological equipment involves many variables and successful resolution of such problems
requires the ability to leverage and intelligently apply past experience to the process (Brown
& Duguid, 2000). Ultimately, among Xerox representatives, a culture was developed and
encouraged wherein knowledge was shared among the members of the unit, resulting in more
effective on-site repair services and, as a consequence, increased customer satisfaction.
Another intriguing example of a successful CoP is a group established by Green For All,
created to connect practitioners in the field of environmentally-sensitive workforce
development. The group operates online discussion forums, hosts a myriad of resources and
documents, as well as organizing conference calls. In the educational arena, Columbia
29
University maintains a repository which facilitates sharing of, and collaboration surrounding,
academic research papers and other shared resources. This is an interesting example due to
the fact that it highlights the potential for a CoP to develop by way of a natural evolution
created by individual’s activities. In this case, the nature of and dynamics surrounding how
this system was utilized by various members of the university population actually, in essence,
created a community of practice (Cocciolo, Chae, & Natriello, 2007).
Placing the concepts surrounding communities of practice into the framework of the
knowledge management discipline, these groups constitute a valuable source of information
for knowledge workers. CoPs facilitate efficient and effective exchange of knowledge
between members, in terms of sharing of experiences and, more importantly, conveying (thus
encouraging) the application of best practices to whatever domain is involved. Communities
of practice can be, and often are, an integral component to the success of an organization’s
broader knowledge management strategy. Since the discipline of KM primarily concerns
itself with capturing, organizing and distributing knowledge (Kellogg & Erickson, 2001) to
the right individuals at the right time, these groups serve as an effective and vital conduit for
information exchange. A community of practice supports KM activities by serving as a key
source of content and context which can be codified and utilized in meaningful and
productive ways by the community’s members.
Successful initiation, cultivation and ongoing support of a CoP are necessities for the
group to thrive; active monitoring and promotion of the group help to achieve increased
effectiveness in knowledge management (Collison, 2010). Kimble (2010) notes that these
communities illustrate a compelling example of the relationship between KM and distributed
collaborative work; prior research has shown that a CoP can operate successfully both for
tacit knowledge exchange as well as document sharing. In addition, Wenger (1998) puts forth
a view of a CoP not necessarily as a single organization itself, but rather as a connection of
communities of practice that are related to one another for the purpose of knowledge transfer.
The key dimensions of the Jennex and Olfman (2006) model include System Quality,
Knowledge Quality, Service Quality, Intent to Use/Perceived Benefits and User Satisfaction.
The system quality component includes several considerations; these are essentially technical
infrastructure (including competencies), how knowledge is computerized and integrated with
the organization’s processes, and finally, effectiveness of system implementation in terms of
knowledge accessibility (for example, ease of search). Knowledge quality is defined as a
combination of KM strategy (identification of knowledge users/sources of knowledge),
relevancy (through accuracy and appropriate context) and timeliness of knowledge. Service
quality within a KM system is essentially the result of comprehensive user support from both
management and IT (technical support staff). User satisfaction, intent to use and perceived
benefits are closely related, and ultimately reflect the sentiment of users in terms of how well
the system assists in locating and exchanging useful knowledge.
Concerning measures related to system use, Jennex and Olfman (2006) discuss a key
change in DeLone and McLean’s 1992 model and the 2003 model, wherein actual use was
replaced with intent to use, as a KMS success factor. Jennex and Olfman (2006) support the
decision by DeLone and McLean to make this change, pointing out that in certain cases, a
KM system may be used much less frequently than other KM systems, yet this less-frequent
use may be considerably more important (depending upon the type of knowledge, how such
knowledge is being used and its impact on other organizational processes).
such areas as networked desktop search and document collaboration tools with modification
subscription support.
One of the biggest concerns that affect any applications surrounding data sharing in
the health care industry are patient privacy and control of data. Tacit’s (purchased by Oracle
in 2008) Illumio software product, while no longer available as of the time of this thesis,
pioneered new ways of sharing and searching for distributed information across users and
departments within organizations. Using this product, corporate users could perform searches
on their local machines, with the application software performing searches on other users’
machines. If relevant results were found, the results could be returned to the originating-
query user upon permission for release of the data by the target machine. This architecture
and methodology could well be applied to a distributed knowledge management system to
allow consumers to share patient health information with other users and components of the
larger system, giving users granular security control over released data.
even occur at all. According to Fahey and Prusak (1998), a lack of shared vocabulary is one
of the key inhibitors to the creation, sharing and use of knowledge. When such knowledge
exchange is done through a repository, knowledge base or any other KM system,
terminological inconsistencies may further hinder certain users’ ability to perform effective
database queries (Chen, 2002).
Differences in terminology may reflect lack of understanding of the domain, or
simply differences in terminological preferences by the parties. In either case, and despite
such variations in terminology, it is often found that the same concepts are meant (Liebowitz
& Wilcox, 1997). In general, the parties truly believe that they are articulating and expressing
the synonymous content and meaning. In the context of health care KM systems, which
encompass distributed collaboration networks, social networks for connecting patients
struggling with the same diseases, clinical evidence-based systems and a number of other
types, such confusion could have consequences ranging from system ineffectiveness, up to
and including physical dangers, depending on the type and objective of the system.
Hahn and Subramani (2000) explore implications of different KM system implementations
and find that different implementations impose different and corresponding burdens on
system users. Specifically, Hahn and Subramani (2000) find that systems employing an a
priori approach to structure are most useful for the members of a narrow target community;
however, this same structure poses challenges for other users in locating relevant content due
to lack of access to local vocabulary. With loosely-structured knowledge sources, issues and
considerations surrounding domain and content diversity become exacerbated by this lack of
shared vocabulary. Further, it is suggested that “the strength of weak ties need to be balanced
against the downside of information overload and incongruent vocabularies.” (Hahn &
Subramani, 2000, p. 306)
Having now established the challenges presented to communications and knowledge
exchange in the face of differing vocabularies among diverse participants, this chapter moves
into an examination of the literature with respect to studies conducted in order to assess such
differences in use and understanding of terminology within the health care context.
In order to assess and evaluate the degree to which patient understanding of medical
terminology had changed since the time of earlier and similar studies, Thompson and Pledger
(1993) conducted research wherein 224 participants were asked to define a list of 50 medical
34
terms. These terms were selected by doctors and other care workers. Thompson and Pledger
(1993) began their work with the assumption that understanding of terminology by patients
would have increased since the time of the previous study, due to heightened interest in and
awareness of health and wellness. As rationalization for their study, Thompson and Pledger
(1993) assert that a common understanding is crucial for both doctor and patient and further,
that a more current evaluation of terminological understanding is necessary due to the
increasing exposure of consumers to medical terms through media channels.
In conducting the study, a list of 173 medical terms was generated, from several
sources including words used in earlier investigations. From this set, a group of doctors
collaboratively determined which words to keep, based on whether each word was one that
they would commonly use with their respective patients. Finally, 50 words were selected at
random for use in the interviews; in these interviews, patients were presented with each term
along with a contextual sentence and subsequently asked to define the word. Special efforts
were made by the researchers to select participants of diverse backgrounds, particularly in
terms of demographic and education attributes. In terms of results, the top five correctly-
identified medical terms consisted of ‘orally’, ’obese’, ’amputate’, ’hereditary’ and ‘vision’.
Most wrong or inadequately vague responses involved the terms ‘triglyceride’, ‘edema’ and
‘cyst’. As to education as a dependent variable, findings indicated that differences in
educational level (high school diploma versus any level of college diploma) played a
significant role in understanding among the participants. In addition, participants aged 45-64
were much more knowledgeable than participants 65 and over (Thompson & Pledger, 1993).
Both of these findings are in line with the findings of earlier studies.
In their conclusion, Thompson and Pledger (1993) remark that over the last 40 years,
a number of studies have been conducted with respect to patients’ understanding of medical
terms, and throughout these studies, that the knowledge level seems not to be increasing.
Study limitations identified by Thompson and Pledger (1993) include inability for
participants to use questions to gain knowledge with respect to terms that they were unaware,
which they would have the opportunity to (at least) attempt in a typical doctor visit. Another
noted limitation is the study’s inability to account for body language and other unspoken
exchanges; the study notes that typically, such body language can increase comprehension.
35
this set of terms was used as the study instrument. Analysis of the findings suggested that
understanding increased with experience (i.e. with increased utilization), although in
statistical terms, the difference was not substantial enough to be deemed reliable; McKinlay
(1975) suggests that further study would be required, using a larger population, to make a
reasonable evaluation. In addition, McKinlay (1975) noted that the misunderstanding of
terms significantly exceeded physicians’ expectations. In his discussion of the findings,
earlier work by Skipper, Tagliacozzo and Mauksch (1964) is cited in considering barriers to
effective patient-doctor communication. He notes that such barriers suggested by Skipper et
al. (1964) include a desire to protect patients from too much information in the presence of
bad news, health care professionals protecting themselves from potentially unmanageable
reactions by patients and from potential discovery of errors on the part of the physician
(McKinlay, 1975).
A study of 117 patients having hypertension was undertaken, collecting responses
from participants through an interview process in order to develop a model representation of
patients’ views and understandings of their hypertension as a ‘cognitive domain’. Findings
were presented indicating that the majority of these patients were under the mistaken
impression that they had Hyper-Tension (essentially, a stress-induced condition) when in
actuality, all of the patients had been previously diagnosed with clinical hypertension (high
blood pressure). In his analysis surrounding the subject of how differences in understanding
can affect the nature of the doctor-patient relationship, and ultimately outcomes, Blumhagen
(1980, p. 224) remarks:
Plain folk say 'Hyper-Tension'; the experts say hypertension, and each thinks the
other is taking about the same thing. Perhaps it is this muddying of the waters
which allows both to function without cognitive dissonance becoming so great as
to cut off interaction. The physician doesn't have to deal with the social stresses
that don't fit his model, and the layman can reshape the physiological explanation
of biomedicine to a more amenable form. Because of the distance that is effected
by two disparate definitions, the therapeutic alliance is not threatened. But there
are occasions when dissonance caused by different models of illness does impede
healing. At those times, a full understanding of the illness belief systems which
are available to the layman and to the physician, if coupled with a willingness to
negotiate a more functional set of explanatory models, may pave the way to a
richer, deeper, and above all more satisfying experience to healing.
Boyle (1970) found, through a questionnaire-based study of 234 participants, which
was intended to examine interpretations of common medical terms and knowledge of key
37
concepts in anatomy, that patient participants failed to agree (in terms of interpretation), on
all terms except one. His research motivation was essentially to assess readiness for clinical
computer systems in the framework of medical vocabulary, as he noted that for computer-
based diagnostic systems to be successful, “it is mandatory to have either a vocabulary of
totally unambiguous medical terms or a knowledge of the syntactic, semantic, or pragmatic
limitations of our existing medical terminology.” (Boyle, 1970, p. 289) In addition, he
remarks on the need to consider educational level differences as they relate to understanding
of terminology.
Coope and Metcalf (1979) found that social class played a significant part in
determining the patient’s level of knowledge of medical concepts. Self-identified weaknesses
in this study included the fact that the sample may not have been representative of the general
population, due to the fact that surveys were distributed exclusively in a waiting room.
Secondly, the researchers did not make note or counts of patients who refused to participate.
Thirdly, the sample was likely biased towards younger and more wiling-to-participate
patients.
Applying the findings within the literature to the problem at hand, it should be clear
to the intuitive reader that the complex terminology pervasive in health and medicine
presents an enormous obstacle to the average patient’s ability to effectively participate in any
collaboration surrounding fraudulent activities. Regardless of any level of desire that a
consumer might have to become an active participant, whether stemming from a feeling of
social responsibility or even arising from a scenario in which the consumer herself has been a
direct victim, the inability to effectively communicate with other parties prevents any transfer
of knowledge (or attempt at knowledge transfer, for that matter) from occurring in the first
place. A later chapter in the thesis will propose one potential approach to deconstructing this
barrier, leveraging findings from, and building upon through this paper’s own extension, the
literature on controlled vocabularies and ontology.
patient knowledge in a collaborative environment of fruitful exchange will often lie within
the knowledge surrounding the details of his or her visit with the provider. Privacy concerns
on the part of patients are a significant issue in the industry and a known barrier to
information exchange for many consumers. The paper now examines these concerns.
Considerable literature exists on the subject of patient data privacy interests, from the
perspective of both patients as well as other parties to healthcare transactions. Implications
for patients of records disclosure are potentially significant; such consumers may find
themselves exposed to general discrimination or that of potential insurers, loss of
employment and ostracization within their respective communities. Patient records typically
include, but are not necessarily limited to, demographics, financial information,
dependencies, sexual orientation and genetic data indicating predispositions to potentially-
serious diseases. Despite the justifiable concerns of patients with respect to the potential risks
associated with undesired distribution of patient health information, there are also substantial
public and commercial interests involved; the current health care environment is one of
competing interests surrounding patient data and there are convincing points on all sides of
the debate.
Ethical justifications surrounding the protection of patient health information are
based upon these considerations with respect to individual rights (Gostin, 1997). However, as
Gostin (1997) states, there are, in fact, compelling reasons for collecting and utilizing patient
data from the perspective of societal benefit; such data is considered necessary for the
success of consumer-oriented health care, improved outcomes and, additionally, to increase
understanding surrounding the dynamics of fraud and abuse issues as they affect the industry.
Rybowski (1998) discusses at length the competing interests among players within the health
care industry, including patients; Rybowski (1998) notes that with respect to privacy
expectations and data sharing, attitudes are beginning to evolve as a result of the increasing
acceptance of the view that societal benefits must be weighed against personal privacy.
Gostin (1997) envisions a future infrastructure where electronic records will allow fraud to
be more easily detected through increased ability to analyze patterns, as well as reductions in
health care by reducing paper-based processes.
As collection, storage and maintenance of patient records have moved closer to a
fully-electronic medium, new concerns have surfaced surrounding computerization and its
39
impacts on the privacy and security of health data. The General Accounting Office (1990)
calls attention to the fact that additional data being stored, in combination with the distributed
nature of computer networks, reduces the ability of patients to control distribution and
access. Within a distributed EMR (electronic medical record) system, potential for privacy
loss is increased, relative to standalone EMR systems or paper record systems. However,
when reasonably sufficient safeguards are employed, computerized records might be more
secure than paper-based systems. Carter (2000) points to the dangers of large databases and
citing a significant incident wherein the University of Michigan Medical Center exposed
thousands of patient records on a public web site for approximately two months. Carter
(2000) argues that views of technology as a simple solution to problems surrounding
inappropriate use of information are naïve; results from a survey conducted in the United
Kingdom indicated that over 45% of health organizations had experienced security incidents
within the last three years.
On the contrary, the National Research Council (1990) actually views
computerization as an opportunity to improve personal privacy, highlighting the ability to
implement what are, essentially, more thorough security measures than what would be
available for use in the protection of paper-based files. Such measures include role or level-
based security, data access controls and audits of electronic records access. In regards to the
significant challenges that arise with respect to patient data control in a distributed KM
environment such as a distributed electronic health records (EHR) system, Bose (2002)
recommends that patient data treatment be considered within future research; in particular, he
cites the need for additional work in the areas of system access security and data disclosure
mechanics.
It is important to note that while patients are not able to control dissemination under
all scenarios (certain exchanges are expressly permitted under the HIPAA Privacy Rule),
patients are provided complete freedom to expressly agree to provide, or to implicitly
provide, information about their health care transactions, experiences, concerns and overall
health. Several large and very active online communities currently exist
(PatientsLikeMe.com and DailyStrength.com are two such examples) where consumers are
sharing information about treatments, prescription drugs, management of chronic conditions
and more. Examining sharing in the more specific context of exchanging personal health
40
information with other internet users, Pew Internet and American Life Project suggests that
20% of patients go to social networks where they can communicate and exchange
information with other patients, as well as experts (Shapiro, 2009). Frost and Massagli (2008)
analyzed information sharing within a specific disease group on the social networking site
PatientsLikeMe. Findings indicated that over the period of December 2006 to February 2008,
63% of patients within the group contributed at least one original comment. Further, typical
exchanges between members generally involved (a) targeted questions to other members
having relevant experience, (b) advice, and (c) creating and building upon relationships with
others based on similarities. Frost and Massagli (2008) found, in addition, that many
exchanges led to further discussion among the user base.
While most exchange of data between non-patient parties falls under the purview of
regulatory controls, patient-to-patient and patient-to-other exchanges do not. Patient
willingness to participate in any sharing and collaboration can be represented by the sum of
comfort with such sharing and a desire to contribute. Reservations surrounding data sharing
may change over the next several years; due to the inclusion within recent health care reform
legislation of prohibitions on exclusions of coverage for pre-existing conditions, it is quite
possible that a reduction in patient fear of sharing may be observed. One objective of the
questionnaire instrument used by the present study is to gauge whether changes in attitudes
surrounding sharing of personal health information should be expected.
as ‘fusion’, they introduce the ideology of, and make the argument for, bringing together
parties of diverse backgrounds, perspectives and philosophies for effective collaboration in
problem-solving activities. Cited is Nonaka (1991), whom earlier developed and presented
the concept of ‘creative chaos’, of which one component is the value inherent in having the
ability to leverage ideas from a larger and more complex collection. According to Leonard-
Barton (1995), making a conscious, deliberate effort to include a variety of players helps to
prevent reliance upon problem solutions that are familiar and convenient. Nonaka’s (1991)
concept of creative chaos is applied to workplace diversity in an organizational context by
Davenport and Prusak (1998), who argue that heterogeneity of skills and experience leads to
greater success.
For organizations, the first step in KM system planning should be to assess what
knowledge is desired or needed. This identification is crucial to structure and design of the
system (Morrissey, 2005). In terms of access, the system should be as open and inclusive as
possible, spanning boundaries. Depending on the sponsor and nature of the system, such
boundaries might include departments within an organization, geographical diversity or a
diverse group of individuals of varying backgrounds, experience levels and sub-interests in
the domain. In strong support of an open system, Wasko and Faraj (2000) suggest that the
exchange of knowledge through an open community lessens the likelihood of an entity
possessing knowledge but being excluded from participation in the knowledge exchange, and
further, that doing so distributes the obligation for community maintenance to all interested
entities.
Davenport and Prusak (1998) caution the reader, however, that in order to achieve the
potential benefits of fusion, a mental connection between participants must be established; in
order to accomplish this, “members must develop enough of a common language to
understand one another” (p. 61). This relates to this paper’s earlier discussion surrounding
common understanding and shared vocabulary and serves to further make the case that
terminological differences inherent to collaborations between diverse parties must be
reconciled in a careful, thoughtful manner.
Considering knowledge sources in a health care-specific context, Zhu (1997)
proposes the idea of knowledge as social constructs consisting of four stakeholder groups;
these include consumers, providers, agencies and sponsors. Patients are consumers, and
42
providers include both doctors and other health care workers; agencies represent government
entities and administrative organizations possessing authority to include regulatory activities;
sponsors are essentially the taxpaying, general public (to whom government and regulatory
entities are ultimately accountable). Zhu (1997) argues that stakeholders need to exchange
knowledge in various ways and through a variety of means; further, healthcare knowledge
that is “detached from moments of truth…ceases to be effective, useful, or even meaningful”
(Zhu, 1997, p. 116). In terms of a patient encounter with his or her provider, a visit itself and
the circumstances surrounding the interaction constitute a moment of truth; such opportunity
to capture this knowledge in its actual context cannot be capitalized upon without tapping
patient knowledge as an input source. This thesis argues that major mistakes have been made
by failing to identify and leverage this valuable source of knowledge.
the government’s ability to effectively combat it. According to data collected and analyzed
by Hyman (2001), shown in Table 1, one will observe a significant trend in qui tam actions;
over a five-year period beginning in 1993 and ending in 1998, the number of health care-
related qui tam cases rose from 39 to 287, representing a nearly 636% increase. In addition,
the percentage of health care qui tam cases, as a percentage of total qui tam cases, rose from
30 percent to 61 percent over the same period. From this data, it is abundantly clear that, at
least in terms of the 1993 to 1998 period, interest in and willingness on the part of the
consumer population to take action against the problem of health care fraud grew
considerably.
Table 1. Qui Tam Cases in Health Care as a Percentage of Total Qui Tam Cases, 1993
to 1998
1993 1994 1995 1996 1997 1998
Health care qui tam cases 39 80 95 203 288 287
Health care qui tam cases / total qui tam cases (%) 30 36 34 56 54 61
Source: Hyman, D. (2001). Health care fraud and abuse: Market change, social norms,
and the trust reposed in the workmen. The Journal of Legal Studies, 30(2), 531-567.
A thorough examination of the available literature suggests that the December 1998
AARP study discussed by Sparrow (2000) represents the most recent survey of consumers
with respect to awareness of, and interest in, health care fraud. In consideration of the fact
that this study was conducted nearly12 years prior to the time of the current investigation,
this paper argues that reassessment is warranted at this time. Several questions in the
questionnaire instrument used by the present study are included for the expressed purpose of
examining the extent to which the aforementioned level of awareness and interest has
changed, if at all.
Issues surrounding adoption and technical abilities of the over-65 age group are of
particular concern to this thesis. Because it is believed that most of health care fraud occurs
within the Medicare system, which serves the older population, challenges specific to the
elderly population may hamper participation, and thus capture of knowledge, from this
demographic. This necessitates further study, and as such, the present study’s questionnaire
assesses the level of ability and comfort with technology by responders, and additionally,
includes a question of the responder’s age.
In more general terms and outside of organizational frameworks, Wasko and Faraj
(2000) suggest that much of individuals’ participation can be attributed to a sense of moral
obligation which results in pro-social and altruistic behaviors. Further, many people feel that
the world as a whole is improved through the sharing of knowledge. In addition, Wasko’s
and Faraj’s (2000) study findings suggest that individuals who feel comfortable with their
level of expertise are more likely to feel comfortable in contributing. Riege (2005) suggests a
number of factors, including trust in other members of the community.
In the explicit to explicit stage (combination), new knowledge is created by the synthesis of
discrete components of existing explicit knowledge. The example of a financial report is used
in this discussion. Despite the fact that new knowledge has been created, it is once again the
case that the organization essentially realizes no significant benefits. Tacit to explicit
conversion (externalization) is realized when one can effectively “articulate” his or her tacit
knowledge and communicate it to other members of the organization; colleagues can utilize
the newly-gained knowledge in their own work. Finally, internalization occurs when other
individuals are able to take new knowledge and alter their own frame of reference in order to
become more capable and innovative in their activities. At this stage, organizations can reap
considerable benefits. An illustration of the components of Nonaka’s knowledge conversion
model is shown in Figure 6.
Moving into a health care context, Winkelman and Choo (2003) discuss the role of,
and argue the value of, patient tacit knowledge in the context of patient-provider partnerships
for disease management applications. Winkelman and Choo (2003) highlight unique tacit
knowledge possessed by patients which is acquired over an extended period of time with
respect to knowledge of their symptoms, side effects to medications and general problems
surrounding health care delivery. In addition, the research cites the relationships and
47
networks developed by patients among themselves as well as with their providers. While here
the discussion deals with chronic disease patients, this paper argues that such tacit knowledge
is possessed by all patients, based on their experiences in encounters with their physician,
learned knowledge surrounding medications, and in exchanging information with others. In
terms of service delivery, patients do have tacit knowledge that could lead to identification of
fraudulent behavior by providers.
Winkelman and Choo (2003) state, in general terms, that patients “provide a
heretofore untapped resource of knowledge that can be employed by healthcare organizations
to inform advancements in service delivery” (Winkelman & Choo, 2003, p. 356), and further
that “individuals possessing this tacit knowledge must be given a forum, tool or medium
through which it can be shared or socialized” (Winkelman & Choo, 2003, p. 353).
As discussed previously in this paper, Beckman (1999) proposes a third form of
knowledge; he refers to this as implicit knowledge. According to Beckman (1999), implicit
knowledge is fundamentally similar to tacit knowledge except that it can be accessed through
discussion and asking questions upon its being located; tacit knowledge is more effectively
transferred through observation. While the differences between tacit and implicit knowledge
as proposed by Beckman (1999) are subtle, this paper recognizes that patient knowledge
more closely resembles that of implicit knowledge. In any case, this thesis argues that the
patient’s perspective and his or her potential as a viable and valuable knowledge source are
well-represented by a combination of tacit and implicit knowledge.
requiring considerable insight and intelligence. Because of the nature of health care fraud,
characterized by an environment wherein perpetrators continually develop and set in motion
new and more complex schemes in order to avoid detection, the problem is essentially one of
ever-changing, infinite solutions; in essence, the rules do not remain the same for very long.
As for rules-based systems comprising a complete solution to any problem or
problem domain, this is only possible where two conditions have been satisfied: (a) the
problem is small and well-defined such that heuristics can be applied to 100% of cases, and
(b) existence of heuristics that provide a satisfactory solution for all scenarios (Huntington,
1999). Other shortcomings include difficulties in scope of representation power and in the
necessity for frequent updating (Venkatasubramanian, Raghunathan, Kavuri, & Yin, 2002),
as well as the system not understanding its own limitations (McCarthy, 1984). While many
rules-based DSS products do perform well in validating claims data against government and
industry billing guidelines and best practices (for instance, identifying inappropriate bundling
or procedure codes inconsistent with the patient’s gender and age), these same systems also
fail to recognize many other forms or potential indicators of fraud. Because of this, payer
and other stakeholder efforts should place greater importance on capturing knowledge from
additional and external sources, such as patients.
49
CHAPTER 3
METHODOLOGY
The paper now moves into a discussion surrounding the approach taken to the study
and the details surrounding the manner in which the study was conducted. The design of the
investigation is discussed first, followed by a brief description of the study population and
safeguards used in order to ensure compliance with applicable Institutional Review Board
and U.S. government research guidelines. Next, the paper presents a preliminary study model
and both primary and secondary hypotheses. Finally, the statistical methods, including an
overview of the underlying theory behind the statistical analysis for the benefit of those
readers who may be unfamiliar yet sufficiently interested.
POPULATION
With one exception, no special or extraordinary efforts were made to specifically
include or exclude any individual or demographic group from participation in the survey. On
the contrary, the ideal data set for a study of this nature should consist of as wide and varied a
cross-section of the consumer base as is practical. The previously-noted exception was that of
excluding persons under the age of eighteen (18). The taking of this measure was, and is still,
believed to be immaterial to the study findings; however, this exception is noted here for the
sake of completeness. The sole reason for this decision was to simplify matters of
compliance with Institutional Review Board research conduct requirements.
51
The survey was distributed in two ways: electronically (via the internet), and in-
person (at varied locations upon both public and private property where permission to engage
in distribution activities was granted). Exactly 100 questionnaires were returned or
submitted.
TREATMENT OF DATA
The web site used for collection of responses to the electronic version of the survey
automatically tabulates and makes ready all data for download as a Microsoft Excel
worksheet. Physically-collected responses were manually entered into the downloaded Excel
worksheet as additional responses. Averages and standard deviation calculations were done
within Excel, using the available built-in formulas for such purposes. The majority of survey
questions used a 7-point Likert scale (ranging from Strongly Disagree to Strongly Agree); for
52
health insurance plan or some other health care occupation) to be more familiar with medical
terminology. In addition, since much of medical terminology involves complex code sets
(e.g. CPT, ICD-9, ICD-10, HCPCS, to list only a few) it is believed that a more technically-
oriented person would find it somewhat easier to understand how these coding systems work
in practice.
This thesis hypothesizes that patient participation in anti-fraud activities (whether
measuring willingness, ability or propensity) is most likely with a reasonable understanding
of medical terminology, at least (some) awareness of the problem domain, a willingness and
interest in sharing personal health information (for the purpose of facilitating research), and
finally, a sense of active interest and involvement in one’s own personal health. Medical
terminological understanding is considered necessary because effective exchange of
knowledge in this problem domain is greatly facilitated by having some degree of common
ground, shared understanding and context. Additionally, findings in this paper’s literature
review strongly suggest that a person’s willingness to collaborate, share and exchange
information is greatly increased when he or she feels a sense of confidence in his or her own
knowledge and experience. The expectation of finding awareness to be a significant factor is
based on the belief that, if a person is unaware of the existence or magnitude of the problem,
the person is unlikely to be aware of anti-fraud efforts and/or to be sufficiently moved to take
the initiative to become involved in any such efforts.
Since meaningful exchange of knowledge in an anti-fraud collaborative environment
would certainly require sharing of clinical experiences with a patient’s doctors, willingness
and comfort in sharing is considered. In addition, recent legislation included in 2010 health
care reform law may affect people’s perceptions and degree of comfort in sharing personal
health information; this is explored in the study.
Based upon the above, a functional model is now introduced for analysis purposes.
This functional model is a direct representation of Figure 1.
The thesis presents the following model of factors influencing feasibility (represented
as “willingness”, as a purely practical matter) of patient participation in collaborative anti-
fraud systems and activities:
Where:
Pw ≡ Willingness to Participate
Pa ≡ Actual Prior Participation
Ut ≡ Understanding of Health and Medical Terminology
Ud ≡ Understanding of Documents and Provider Instructions
A ≡ Awareness of Problem Domain
S ≡ Willingness to Share
I ≡ Involvement and Interest in Personal Health
H1: Pw ≡ f(Ut)
H2: Pw ≡ f(A)
H3: Pw ≡ f(S)
H4: Pw ≡ f(I)
H5: Ut ≡ f(D,T)
H6: A ≡ f(D,T)
model, with willingness to participate as the dependent variable, and all variables from the
overall model included as explanatory variables. With no a priori hypotheses having been
made with respect to determining the order of entry of the predictor variables, a direct
method was used for the multiple linear regression analyses. Subsequently, regressions were
run for secondary hypotheses in a similar manner to that described above.
56
CHAPTER 4
This chapter presents the findings arising from analysis of data collected via the
aforementioned survey instrument.
In the survey’s matching section, wherein respondents were asked to match twelve
(12) health and medical terms to their respective definitions and/or industry-standard codes,
or vice versa. The two-highest incidences of correct responses were to the terms
“inflammation” and “treatment”, with correct response rates of 72 and 57%, respectively.
57
The two least-correctly identified terms or codes were “99213” and “460”, with only 2 and
5% answering correctly, respectively. Respondents’ overall scores for the matching section,
in terms of percentage correct, ranged from 0 to 66.67, with an average score of 30.42% and
standard deviation of 17.5. In terms of understanding of instructions and/or explanations
received from participants’ providers, 82% felt that they did. The average response was 5.24
with a standard deviation of 1.34. See Table 3.
Technical Abilities
94% indicated they were comfortable using a computer. The average response was
6.73, with standard deviation of 0.83. 95% indicated that they felt comfortable with internet,
with average response of 6.71 and standard deviation of 0.79. See Table 7.
Pw = f(Pa,Ut,Ud,A,S,I)
Where:
Pw = Willingness to Participate
Pa = Actual Prior Participation
Ut = Understanding of Health and Medical Terminology
Ud = Understanding of Documents and Provider Instructions
60
H1: Pw = f(Ut)
H2: Pw = f(A)
H3: Pw = f(S)
H4: Pw = f(I)
H5: Ut = f(D,T)
H6: A = f(D,T)
First, a regression was run using the OLS (ordinary least squares) linear method for
the overall model, with willingness to participate as the dependent variable, and all variables
from the overall model included as explanatory variables. With no a priori hypotheses having
been made with respect to determining the order of entry of the predictor variables, a direct
method was used for the multiple linear regression analyses. In terms of specific results, the
independent variables produced an R2 of 0.334 (F = 7.772, df=6, p =0.000), with the
standard error of the estimate calculated to be 1.178, as shown in Table 8. The results of the
regression indicate a moderate level of intercorrelation between the variables (R=0.578).
Next, an ANOVA (analysis of variance) test was run; ANOVA results were
favorable, as shown in Table 9, and indicate that all variance is explained by the aggregate
model. Based on these results, continuation of the analysis is warranted.
Continuing with the analysis, two additional OLS regressions were run, in order to
test hypotheses H5 and H6. Once again operating in the absence of any a priori hypotheses
for order of variable entry, the regression of understanding of medical terminology on
demographics/background and technical abilities, we have an R=0.339, R2 of 0.115
(indicating somewhat low intercorrelation), p=0.020. The only significant coefficient is
technical ability (p=0.003). Therefore, this study must reject the null hypothesis. The results
of the analysis are shown in Tables 11, 12 and 13.
Table 15. ANOVA Test for the Regression of Problem Domain Awareness on
Background and Technical Abilities.
Sum of
df Mean Square F Sig.
Squares
Regression 17.575 3 5.858 3.7 .014
Residual 151.985 96 1.583
Total 169.56 99
participants), as those in the 18-24 and 25-34 age groups consume more media than older
individuals. After much consideration and reflection on the results, it is proposed that the
design of the matching section and instructions given to participants could have been
somewhat improved. Such modifications might well produce results more closely aligned
with the original expectations.
While designing the survey instrument, another objective of particular interest was
the assessment of how patient concerns and attitudes towards sharing of personal health
information might be affected by recent health care reform legislation that would prohibit
insurers from denying coverage to individuals based upon pre-existing conditions. It has been
the researcher’s feeling, for some time now, that people’s obsession with health information
privacy and reluctance to share information were primarily tied to fears of the information
being used against them by their insurance carriers. However, data collected from the survey
shows no significant correlation. This may be due to recent happenings wherein lawsuits
have been filed, and plans discussed among members of Congress, to attempt to repeal
components of health care reform law. It is possible that respondents are aware of these
activities and consequently have less than full confidence that the legislation (and the
included, aforementioned protections) will withstand its opposition.
The study data suggests that patients feel somewhat confident in their understanding
of their doctors’ instructions. However, the data also suggests a certain level of difficulty in
understanding provider and payer documents, particularly with respect to EOB (Explanation
of Benefits) forms. Furthermore, when participants who expressed that they did have
difficulties interpreting these documents were asked to identify the reason(s) why, a
significant number of respondents pointed to lack of understanding of medical terminology
and codes. This has major implications for effective patient participation in anti-fraud
activities (such as reporting suspected fraudulent activity to insurers or to law enforcement
agencies) since the ability to interpret and understand EOB documents in the context of
patients’ encounters with health care providers is necessary in order to identify many forms
of fraudulent behavior. When considering a health care encounter, or visit, the patient and
provider are typically the only parties with full knowledge of the details of that encounter,
such as procedures performed and diagnoses given. The carries obvious implications, in that
if a provider wishes to engage in fraudulent billing practices with the patient’s insurer, the
65
patient may well be the only party to the transaction that has sufficient information to
identify discrepancies between the events of the encounter and any bills or documentation
submitted by the rendering provider to his or her insurer.
Getting the patient involved in combating the problem will require education and a
means for translating complex information into language that the patient can easily
understand. In the following chapter, a proposed knowledge management system is described
that could conceivably play a role in the fight against health care fraud, by facilitating
increased patient comprehension of medical terminology and codes, resulting in increased
patient ability to participate and increased knowledge capture; such a system could lead to
better understanding of the problem domain and, thus, increased identification and more
successful enforcement of health care fraud, waste and abuse.
66
CHAPTER 5
Based upon the findings of the study (leveraging both the results of the distributed
questionnaire as well as the literature review), the paper now introduces and proposes a
model knowledge management system designed to contribute towards combating the
problem of health care fraud, waste and abuse.
The development and presentation of this model is warranted due to the relative lack
of success realized by past and current anti-fraud efforts, as well as the aforementioned
findings. As a reminder to the reader, one of this study’s key conclusions is that several
significant challenges hindering the increased effectiveness of learning, knowledge transfer
and ultimately, enforcement, within the anti-fraud domain can be met by increasing patient
participation and that such participation can be encouraged through improving accessibility
of knowledge to patients while, at the same time, providing privacy controls that satisfy
consumers’ growing concerns. Further, the results of the present study’s questionnaire
strongly suggest that there is significant interest on the part of consumers in becoming more
actively involved in efforts towards reducing the staggering socio-economic costs associated
with health care fraud.
First, a brief review of current approaches used, as well as challenges faced, within
the problem domain is offered. Subsequently, the paper introduces and describes the
elements of the proposed model and distributed KMS prototype.
While law enforcement efforts have had notable victories with respect to large sum
recoveries of fraudulently-obtained funds (several landmark cases and enforcement actions
are discussed in the literature review), such actions have, economically speaking, only
scratched the surface of recovering the extent of monies unlawfully fleeced from the public
trust. Additionally, providers who have engaged in fraudulent activities will, in many cases,
elect to close their operations and declare bankruptcy as soon as they become aware of
impeding actions, instead of defending themselves at trial and facing the possibility of
staggering civil judgments. In such cases, the fraudulently-obtained funds may never be
recovered and returned to the taxpaying public. Limitations as to the effectiveness of law
enforcement’s activities also exist; in particular, organized crime syndicates both foreign and
domestic have become increasingly involved in health care fraud due to its relatively low risk
and potentially enormous rewards. Due to the highly lucrative nature of these crimes,
organized crime groups are mostly undeterred from continuing to engage in these schemes,
despite the threat of substantial monetary actions and long terms of incarceration.
Claims analysis software and law enforcement cannot possibly represent the entirety
of an effective attack against the problem. Due to the problem magnitude and complex
characteristics, additional and more proactive solutions have become critical. In
consideration, the paper proceeds to introduce and describe, in detail, a proposed model for
the development of a distributed KM system that effectively facilitates collaboration among
all relevant stakeholders by overcoming current challenges that would have restricted the
involvement of all parties to date, and that, additionally, increases public awareness and
knowledge of the problem domain.
A NEW APPROACH
Based on an exhaustive review of the relevant literature and current anti-fraud
activities related to the health care industry, no system currently exists which has a
significant number of the components, critical success factors and objectives discussed in this
chapter. However, development of such a system is warranted; as has already been
established in this thesis, appropriate knowledge is a highly important input to anti-fraud
investigations, and, in general, to increasing understanding within the problem domain. A
69
Legal Considerations
HIPAA statutes protect patients against unauthorized disclosure of personal health
information to third parties, in addition to other privacy mechanisms and safeguards. It is
important to consider that these statutes allow patients themselves to retain control over such
dissemination of data; as it stands, a patient may voluntarily consent to the sharing of his or
her medical information with any third parties, at any time and for any reason. In the context
of the system framework described within this chapter, current laws would not create any
significant barrier to free and effective information exchange.
In terms of implementation of a KM system consistent with the described model and
architecture, one should be particularly careful, however, to obtain written and/or electronic
documentation noting the consent of all patient-participants to share personal health
information. Such measures are suggested here merely for the sake of prudence and
performing due diligence.
gaining active participation, the system must create a level playing field among its users, in
terms of accommodating varying backgrounds, degrees of knowledge and characteristics of
users’ experiences with respect to health and medicine. Finally, a system of trust must be
established among users both within and across groups. This is made more challenging due
to the distributed and purely virtual nature of the proposed KM system, wherein no face-to-
face interaction is possible.
to, and supports sophisticated integration with, private and public payers’ claims
management systems. Payers subscribe to this service, so that at time of claim adjudication,
alerts and other flags can be raised which suggest to claims department staff members and
risk management professionals that additional review of claim(s) is warranted. Such alerts
might be the result of a particular member/patient or provider being flagged in the system as
potentially involved in questionable activities.
terminology. The solution employed in this author’s model comes in the form of a controlled
vocabulary. Further, common terms and definitions used by different groups are linked, or
mapped, to each common object, or term. The use of a controlled vocabulary is discussed
further in a subsequent section of this chapter, in greater detail and including useful
examples.
(2006) in their work on KM success models, users who are new to a KM system often feel
inclined to use human knowledge sources from those who they perceive to be experts in the
domain; this is referred to as personification. After a time, users will normally gravitate
toward the use of codified knowledge, once a better and more complete contextual
understanding is gained. In light of this, a KM system must be flexible enough to meet user
search needs through both of these phases. This is addressed by the system model proposed
in this thesis, through the combination of high quality in taxonomy and ontology (for
codified knowledge), and support for identifying experts (for personification) within the
problem domain of health care fraud.
Expert identification is handled in two ways: firstly, through self-identification, and
secondly, through community ranking algorithms. Self-identification is supported through
user profile creation within the system, where the profile contains educational, occupational
and other background information that helps to establish trust among other users. Community
ranking allows users and other experts to rate knowledge contributions; as ratings increase, a
user’s reputation within the KM system’s community increases and the system calls attention
to this user’s ongoing contributions, highlighting them as “more valuable”.
There is little doubt that the proposed system would experience heavy use under both
the codified and personified cases. Jennex and Olfman (2006) discuss increased user reliance
upon person-to-person knowledge transfer increasing as complexity of knowledge increases
within a system. Health care-related knowledge is extremely complex and understood
differently by different user types; additionally, the proposed system seeks to include a broad
and diverse set of stakeholder roles. Despite the fact that users generally move from the
personification to the codification phases, this does not always need to be true, and is
dependent upon the characteristics and nature of the system and the domain in which the
system is operating. According to Jennex and Olfman (2006), the required contextual
information that must accompany knowledge in order for it to be relevant and applicable
becomes more difficult to capture as complexity increases, and in such cases, users may
revert back to the use of personification.
75
claims processing functional unit is often cited in the literature) and the associated
managerial challenges surrounding nurturing and integration of these groups, this thesis
envisions a large, distributed network of individuals and organizational representatives
essentially functioning as a community of practice. Due to the availability of increasingly
powerful, and less expensive, computer and communications technology, it is argued that
such a group can grow and thrive in a purely virtual environment, where the group’s efforts
and the dynamics of members’ knowledge exchange are guided by a sophisticated,
distributed knowledge management system architecture.
The set of major objects supported by the system is depicted visually in Figure 7.
Diagnoses and procedures represent the information and knowledge that is most often
misunderstood, or which is understood differently among individuals and groups of different
backgrounds; further, these concepts are likely those of the greatest importance as they have
direct or indirect relationships with nearly every other object in the KM system. For example,
the ability to locate knowledge represented by, and attached to, these two object types is
critical to the understanding of provider billing statements and payer EOB documents. Table
17 shows an example of how a particular diagnosis is represented by the system.
As indicated by Table 17, a diagnosis may be known, or referred to, using different
terminology among different user types. Furthermore, different means of expression of the
same concept may be used among different types of documents within the health care
industry.
even a patient’s complete personal health record. Hubs are classified using the taxonomy
previously explained and will always possess one or more connections to other hubs.
Connections are formed both automatically and based on user tagging; network effects result
in increasingly rapid growth as the number of participating users and quantity of data within
the system grows.
An example of the hub-based architecture is shown in Figure 8. In the figure, the
reader will notice a bold, dashed line connecting a particular Procedure object, or hub, to a
number of Provider objects. This indicates a relationship between the objects; in this case, it
is a visualization of developed knowledge within the system wherein the same Procedure
(procedure code) has been used by several providers on billing statements or other
documents.
For many types of procedures, such as office visits (CPT 99213 and 99214, chiefly),
this is to be expected. All physicians will use these codes for all of their patients; which of
the two codes is used will only depend upon whether the patient is new or previously-
established with the physician’s practice. Depending on which particular procedure
represents this Procedure hub, further attention may be warranted.
However, extending this example to the KM system wherein the primary objective is
to identify potentially-fraudulent behaviors, it is necessary to consider the relationships
further. The bold, dashed line also depicts a relationship between all three of the providers
independent of the procedure object. Again, in the presence of other indicators and/or with
81
additional data, the connections between these providers could be indicative of suspicious
referral activities and even suggest kickbacks (exchanges of monies or other things of value
for referrals). Dozens of high-profile health care fraud cases have dealt with such scenarios,
and in such cases, even the rendering of medically-unnecessary services (e.g. unnecessary
surgical procedures) is not uncommon.
As for how hubs and the connections between them are actually created, this occurs
as a result of user participation through sharing of personal health information, industry
knowledge, news stories, investigation data, and past experience in the domain. For example,
a user may elect to create a hub based on a recent visit to a specialist. Details provided might
include the date of service, name and location of the specialist, procedure and diagnosis
codes referenced in the patient statement, and the name of the user’s primary care physician
who referred the user, or patient, to this specialist. Another user may later add information
related to the same doctor(s) or procedures; at such point, a connection is automatically
formed by the system between all common elements of the information, thereby creating new
knowledge related to one or more relationships. If yet another user adds tags, or metadata, to
one of these two hubs, additional relationships may be identified.
One interesting characteristic of hubs is the ability of user-creators to define personal
and public pieces of the hub. Public pieces of the hub are visible to all other system users,
whereas personal pieces are only visible to the user-creator. However, relationship analysis is
still conducted by the system and connections formed in a manner that respects anonymity
through the obfuscation of all personally-identifiable information. This architecture takes
user privacy preferences into consideration, creating a safe environment whereby information
can be made public in a granular fashion, with the user-creator retaining the full extent of
personal control consistent with that user’s level of comfort in sharing. Relationships
identified between a hub’s personal piece and any other hub only indicate that a general
relationship exists between the two object types.
User Types
The KM system recognizes a number of user roles, or types. All of these types inherit
from a generic type, User, which represents all common attributes such as real name,
username, the collection of user preferences, location, demographics, background and
82
on the client side, and settings are available to indicate which pieces of information will, or
will not be, shared with the rest of the network.
While the shortcomings of DSS-based attempts at fraud detection have been previously
discussed, the approach discussed here would likely produce considerably better outcomes,
due to the fact that the data within this DSS is dynamic, continuously evolving.
CHAPTER 6
At this time, the paper takes the opportunity to reacquaint the reader with the
fundamental research question and purpose of the work, as well as to summarize the study
process, key findings and implications for future research related to the problem domain.
The central research question to be addressed by this thesis revolved around the
identification of barriers to participation by patients in health care antifraud activities; such
activities might range from simple reporting of suspected fraudulent conduct, all the way up
to participation in an online social network whose purpose is to collaborate on antifraud
study and enforcement. In order to determine as many of these barriers as possible, and at the
same time, to assess what variables may directly influence willingness to participate, an
extensive literature review was conducted, followed by the design and subsequent
distribution of a comprehensive survey instrument. With specific respect to the literature
review, special emphasis was placed upon knowledge management (KM), through the
inclusion and evaluation of KM research and prior studies.
A thorough review of the literature revealed that key attributes to be considered, with
respect to general participation, should include individuals’ perceptions, common vocabulary
or some other ability to communicate in the language of the domain, awareness and interest.
In terms of individuals’ perceptions, such characteristics include whether or not the
individual considers his or her knowledge to be a “public good”, a sense of moral obligation,
desire for establishing oneself as an expert within a particular domain, level of trust between
participants in a community setting, and additionally, self-assessment of his or her degree of
domain expertise.
The survey instrument was developed with the above findings in mind. The
instrument sought to capture insightful data based on an assessment of patients’ current
understanding of health and medical terminology, problem awareness and interest, attitudes
towards patient health information privacy, and experiences in terms of sharing. Responses
86
obtained from this survey were generally as expected; however, analysis of the data using the
hypothesized model and linear regression methodology did not produce the anticipated
results and conclusions, in terms of demonstrating a significant positive correlation between
willingness to participate (in health care anti-fraud activities, for this study) and the major
variables selected. In considering and assessing the possible reasons for the outcome of the
study, this paper concludes that variable modeling, question format and weighting were the
most likely factors affecting the results. In terms of variable modeling, it is extremely
difficult to use survey questions where the concepts of willingness and ability are derived
from the manner in which certain questions were answered, instead of asking participants
outright how prepared they might feel to actually become involved.
The most ideal approach and one that may well have produced results consistent with
the study hypotheses would be one in which actual, previous participation in health care anti-
fraud activities are assessed and modeled as the dependent variable, with the factors
measured in this study once again used as the independent variables. However, based upon
previous research, opportunities for patient participation in this domain (due to the
combination of intentional exclusion and inability to effectively participate) have been
disappointingly limited. Thus, it would have been, at this time, infeasible to collect such data,
both in terms of identifying a population of willing respondents of suitable size, as well as
taking appropriate steps to mitigate the effects of population self-selection.
Despite unfavorable results of the analysis, it is argued that the proposed KM system
model described in the previous chapter has merit and may, in fact, constitute a compelling
framework for the development of a KM system that can positively impact the efforts of
private insurers, government and regulatory entities towards combating health care fraud.
While the analysis of this study’s survey results did not produce the expected results, the
existing literature is highly suggestive that such a system could be an effective ingredient in
the anti-fraud battle.
It is the intention of this author, building upon lessons learned from this study as well
as review of the relevant literature, to continue research within the problem domain. As
previously described, primarily within the first and second chapters of this thesis, the
problem of health care fraud presents enormous economic and social problems. It is a
87
problem that has been largely ignored by academic research, yet a problem that demands
greater attention from public and private research efforts.
88
REFERENCES
Ahmed, P., Lim, K., & Loh, A. (2002). Learning through knowledge management. Woburn,
MA: Butterworth-Heinnemann.
Ardichvili, A., Page, V., & Wentling, T. (2003). Motivation and barriers to participation in
virtual knowledge-sharing communities of practice. Journal of Knowledge
Management, 7(1), 64-77.
Barrese, J., Gardner, L., & Thrower, E. (1998). Changing attitudes about insurance through
education. CPCU Journal, 51(3), 144-159.
Beckman, T. (1999). The current state of knowledge management. In J. Liebowitz (Ed.),
Knowledge management handbook (pp. 1.1-1.22). Boca Raton, FL: CRC Press.
Blumhagen, D. W. (1980). Hyper-tension: A folk illness with a medical name. Culture,
Medicine and Psychiatry, 4(3), 197-227.
Boese, J. T. (1999). Civil false claims and qui tam actions. New York, NY: Aspen
Publishers.
Bose, R. (2002). Knowledge management metrics. Industrial Management & Data Systems,
104(6), 457–468.
Boyle, C. M. (1970). Difference between patients’ and doctors’ interpretation of some
common medical terms. British Medical Journal, 2, 286-289.
Broadbent, M., & Weill, P. (1997). Management by maxim: How business and IT managers
can create IT infrastructures. Sloan Management Review, 38(3), 77-92.
Brown, J. S., & Duguid, P. (2000). Balancing act: How to capture knowledge without killing
it. Harvard Business Review, 78(3), 73-80.
Bukowitz, W. R., & Williams, R. L. (1999). The knowledge management fieldbook. London,
United Kingdom: Pearson Education Limited.
Buono, A., & Poulfelt, F. (2005). Challenges and issues in knowledge management.
Greenwich, CT: Information Age Publishing.
Carter, M. (2000). Integrated electronic health records and patient privacy: Possible benefits
but real dangers. The Medical Journal of Australia, 172(1), 28-30.
CBS. (2000, July 21). Russian Mafia’s Worldwide Grip. CBS News. Retrieved September 8,
2010, from http://www.cbsnews.com/stories/2000/07/21/world/main217683.shtml.
Chatti, M.A., Jarke, M., & Frosch-Wilke, D. (2007), The future of e-learning: A shift to
knowledge networking and social software. Int. J. Knowledge and Learning, 3(4/5),
404–420.
Chen, H. (2002). Collaborative systems: Solving the vocabulary problem. Computer, 27(5),
58-66.
89
Cocciolo, A., Chae, H., & Natriello, G. (2007). Using social network analysis to highlight an
emerging online community of practice. Paper presented at the Conference on
Computed Supported Collaborative Learning, New Brunswick, NJ.
Collison, C. (2010). Knowledge management: More than just know-how. Retrieved
September 8, 2010, from http://www.chriscollison.com/l2f/documents/.
Cofino, T., Doganoata, Y., Drissi, Y., Fin, T., Kozakov, L., & Laker, M. (2003). Towards
knowledge management in autonomic systems. Proceedings of the Eighth IEEE
International Symposium on Computers and Communications (pp. 789-794). Kemer,
Turkey.
Coope, J., & Metcalfe, D. (1979). How much do patients know? A multiple choice question
paper for patients in the waiting room. Journal of the Royal College of General
Practitioners, 29(205), 482-487.
Criminal Prosecution as a Deterrent to Health Care Fraud: Hearing before the
Subcommittee on Crime and Drugs of the Senate Judiciary Committee, US Senate,
111th Cong. (2009) (testimony of Sheri Farrar).
Datawatch. (2000). Health insurance fraud busters. Business and Health, 18, 64.
Davenport, T. H., & Prusak, L. (1998). Working knowledge: How organizations manage
what they know. Boston, MA: Harvard Business School Press.
Fahey, L., & Prusak, L. (1998). The eleven deadliest sins of knowledge management.
California Management Review, 40(3), 265-276.
Frost, J. H., & Massagli, M. P. (2008). Social uses of personal health information within
PatientsLikeMe, an online patient community: What can happen when patients have
access to one another’s data. J. Med. Internet Res., 10(3), e15. doi:10.2196/jmir.1053
General Accounting Office. (1990). Computers and privacy: How government obtains,
verifies, uses, and protects personal data. (GAO Publication No. GAO-IMTEC-90-
70BR). Washington, DC: U.S. Government Printing Office.
Gostin, L. (1997). Health care information and the protection of personal privacy: Ethical and
legal considerations. Annals of Internal Medicine, 127, 683-690.
Guptill, J. (2005). Knowledge management in health care. Journal of Health Care Finance,
31(3), 10-14.
Hadlow, J., & Pitts, M. (1991). The understanding of common health terms by doctors,
nurses and patients. Social Science & Medicine, 32(2), 193-196.
Haggie, K., & Kingston, J. (2003). Choosing your knowledge management strategy.
Knowledge Management Practice, 4, 1-24.
Hahn, J. & Subramani, M. (2000). A framework of knowledge management systems: Issues
and challenges for theory and practice. Proceedings of the twenty first international
conference on Information systems (pp. 302-312). Brisbane, Australia.
Health Information Privacy and Portability Act of 1996, Pub. L. No. 104-191. 110 Stat. 1936
(1996). Retrieved from Lexis/Nexis Congressional Database.
90
Tennyson, S. (2008). Moral, social and economic dimensions of insurance claims fraud.
Social Research, 75(4), 1181-1204.
The top five national health care fraud settlements, indictments and convictions. (2010, June
1). Profiler, 4, 8-9.
Thompson, C. L. & Pledger, L. M. (1993). Doctor-patient communication: Is patient
knowledge of medical terminology improving? Health Communication, 5(2), 89-97.
Venkatasubramanian, V., Raghunathan, R., Kavuri, S., & Yin, K. (2002). A review of
process fault detection and diagnosis part III: Process history based methods.
Computers and Chemical Engineering, 27, 327-346.
Wasko, M., & Faraj, S. (2000) It is what one does: Why people participate and help others in
electronic communities of practice. Journal of Strategic Information Systems, 9, 155-
173.
Wenger, E. (1998). Communities of practice: Learning as a social system. Retrieved from
http://www.co-i-l.com/coil/knowledge-garden/cop/lss.shtml.
Wenger, E. (1998). Communities of practice: Learning, meaning, and identity. Cambridge,
NY: Cambridge University Press.
Winkelman, W. J., & Choo, C. W. (2003). Provider-sponsored virtual communities for
chronic patients: Improving health outcomes through organizational patient-centered
knowledge management. Health expectations, 6(4), 352-358.
Zhu, Z. (1997). Knowledge management as social constructs. In R. K. Bali & A. N. Dwivedi
(Eds.), Healthcare knowledge management: Issues, advances and successes (pp. 112-
129). New York, NY: Springer.
93
APPENDIX
STUDY QUESTIONNAIRE
94
This survey and study are being conducted by Matt Strandberg, a candidate for the degree of
Master of Business Administration at San Diego State University.
All interested persons over the age of 18 are eligible and encouraged to participate. However,
please understand that your participations is VOLUNTARY. You will be asked to complete a
short survey consisting of questions of a non-sensitive nature; estimated time for completion
is between five (5) and ten (10) minutes. All participants will be anonymous and
confidential; no personally-identifiable information is requested or desired. No compensation
is offered for participation.
If you have any questions or concerns about this research or the survey, please contact the
SDSU Graduate Business College, at (619) 594-8073. For questions pertaining to your rights
as a research participant, please contact the Institutional Review Board (IRB) via its email
address: irb@mail.sdsu.edu. Thank you for your interest in participating in this study.
Question 1
The last bill that I received from my doctor was easy to understand. (circle one)
1 - Strongly disagree
2 - Disagree
3 - Somewhat disagree
4 - Neither agree or disagree
5 - Somewhat agree
6 - Agree
7 - Strongly agree
Question 2
The last Explanation of Benefits form that I received from my insurance company was easy to
understand. (circle one)
1 - Strongly disagree
2 - Disagree
3 - Somewhat disagree
4 - Neither agree or disagree
5 - Somewhat agree
6 - Agree
95
7 - Strongly agree
Question 3
Are you currently a Medicare beneficiary? (yes/no)
Yes
No
Question 5
Match the following terms to their respective definition, synonym, medical billing code or
related term. Please do not use any references or otherwise “look things up” – a reliable
measure of understanding is important to the study.
A = Common cold
B = Health Care Procedural Code Set
C = Procedure Code
D = Swelling
E = Office Visit
F = Course of Action to achieve a result
G = 784.0
H = Care provided to improve a situation
I = Code set used for diagnosis codes
J = Label for medical condition/disease
K = Acute Nasopharyngitis
L = 99214
A B C D E F G H I J K L
a. Procedure
b. Diagnosis
c. CPT Code
d. Treatment
e. 99213
f. ICD-9 Code
g. 460
h. Acute Nasopharyngitis
i. HCPCS
j. Headache
k. Doctor visit for established patient
l. Inflammation
Question 6
I usually understand my doctor’s instructions and explanations. (circle one)
1 - Strongly disagree
96
2 - Disagree
3 - Somewhat disagree
4 - Neither agree or disagree
5 - Somewhat agree
6 - Agree
7 - Strongly agree
Question 7
I consider myself involved and interested in my personal health and health-related matters.
(circle one)
1 - Strongly disagree
2 - Disagree
3 - Somewhat disagree
4 - Neither agree or disagree
5 - Somewhat agree
6 - Agree
7 - Strongly agree
Question 8
I wish that I was more involved in my own health. (circle one)
1 - Strongly disagree
2 - Disagree
3 - Somewhat disagree
4 - Neither agree or disagree
5 - Somewhat agree
6 - Agree
7 - Strongly agree
Question 9
What would make it easier for you to become more involved in your own health? (circle as
many options as apply)
Question 10
I believe that fraud, waste and abuse are huge problems in the U.S. health care industry.
(circle one)
97
1 - Strongly disagree
2 - Disagree
3 - Somewhat disagree
4 - Neither agree or disagree
5 - Somewhat agree
6 - Agree
7 - Strongly agree
Question 11
Who do you believe perpetrates the majority of fraud in the health care industry?
A – Insurance companies
B – Patients
C – Doctors
D – Regulators and government
E – Other (please specify)
Question 12
I wish I could do something [or do more] to reduce health care fraud. (circle one)
1 - Strongly disagree
2 - Disagree
3 - Somewhat disagree
4 - Neither agree or disagree
5 - Somewhat agree
6 - Agree
7 - Strongly agree
Question 13
Have you been involved in health care anti-fraud efforts in any capacity? [Including
participation in a workshop, membership in a group, reporting fraudulent behavior,
examining any documents for possible signs of fraud, subscribing to a fraud-related
newsletter, etc.] (yes/no)
Yes
No
Question 14
If I believed my doctor was engaged in fraudulent billing and/or other behaviors, it would
bother me. (circle one)
1 - Strongly disagree
2 - Disagree
3 - Somewhat disagree
4 - Neither agree or disagree
5 - Somewhat agree
98
6 - Agree
7 - Strongly agree
Question 15
If I had knowledge of fraudulent activities being committed, I would report it to the
authorities, my insurance company, and/or some other party. (circle one)
1 - Strongly disagree
2 - Disagree
3 - Somewhat disagree
4 - Neither agree or disagree
5 - Somewhat agree
6 - Agree
7 - Strongly agree
Question 16
What do you feel is the biggest challenge to combating health care fraud? (select as many as
apply)
Question 17
What is your age range?
A – 18-25
B – 26-35
C – 36-45
D – 46-55
E – 56-65
F – 66-75
G – 75 or older
Question 18
What is your level of education?
F – Doctoral degree
Question 19
Are you a healthcare professional or involved in healthcare in any manner? If so, what is
your capacity/profession?
A – Medical Doctor
B – Nurse
C – Hospital administration
D – Medical billing
E – Information technology related to healthcare
F – Insurance payer
G – Government/regulatory
H – Other (please specify)
Question 20
I am comfortable with using the internet. (circle one)
1 - Strongly disagree
2 - Disagree
3 - Somewhat disagree
4 - Neither agree or disagree
5 - Somewhat agree
6 - Agree
7 - Strongly agree
Question 21
I am comfortable using a computer for general tasks. (circle one)
1 - Strongly disagree
2 - Disagree
3 - Somewhat disagree
4 - Neither agree or disagree
5 - Somewhat agree
6 - Agree
7 - Strongly agree
Question 22
What city and state do you reside in?
Question 23
With legislation related to the healthcare reform bill of 2010, the ability for an insurer to
deny coverage of patients with pre-existing conditions will be eliminated. This protection
makes me feel more comfortable in sharing health data for research purposes.
1 - Strongly disagree
100
2 - Disagree
3 - Somewhat disagree
4 - Neither agree or disagree
5 - Somewhat agree
6 - Agree
7 - Strongly agree
Question 24
I have shared, or would feel comfortable in sharing, personal health information (even
anonymously) or seeking advice on a health-related matter via an online web site/social
network.
1 - Strongly disagree
2 - Disagree
3 - Somewhat disagree
4 - Neither agree or disagree
5 - Somewhat agree
6 - Agree
7 - Strongly agree