Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 2 de 2
Filtrar
Mais filtros

Base de dados
País/Região como assunto
Ano de publicação
Tipo de documento
Assunto da revista
Intervalo de ano de publicação
1.
J Biomed Inform ; 117: 103752, 2021 05.
Artigo em Inglês | MEDLINE | ID: mdl-33781920

RESUMO

The detection of medical abuse is essential because medical abuse imposes extra payments on individual insurance fees and increases unnecessary social costs. To reduce the costs due to medical abuse, insurance companies hire medical experts who examine claims, suspected to arise as a result of overtreatment from institutions, and review the suitability of claimed treatments. Owing to the limited number of reviewers and mounting volume of claims, there is need for a comprehensive method to detect medical abuse that uses a scoring model that selects a few institutions to be investigated. Numerous studies for detecting medical abuse have focused on institution-level variables such as the average values of hospitalization period and medical expenses to find the abuse score and selected institutions based on it. However, these studies use simple variables to construct a model that has poor performance with regard to detecting complex abuse billing patterns. Institution-level variables could easily represent the characteristics of institutions but loss of information is inevitable. Hence, it is possible to reduce information loss by using the finest granularity of data with treatment-level variables. In this study, we develop a scoring model by using treatment-level information and it is first of its kind to use a patient classification system (PCS) to improve the detection performance of medical abuse. PCS is a system that classifies patients in terms of clinical significance and consumption of medical resources. Because PCS is based on diagnosis, the patients grouped according to PCS tend to suffer from similar diseases. Claim data segmented by PCS is composed of patients with fewer types of diseases; hence, the data distribution by PCS is more homogeneous than data classified with respect to medical departments. We define an abusive institution as an institution having numerous number of abused treatments and containing their large sum of the abuse amounts, and the main idea of our model is that the abuse score of an institution is approximated as the sum of abuse scores for all treatments claimed from the institution. The proposed method consists of two steps: training a binary classification model to predict the abusiveness of each treatment and yielding an abuse score for each institution by aggregating the predicted abusiveness. The resulting abuse score is used to prioritize institutions to investigate. We tested the performance of our model against the scoring model employed by the insurance review agency in South Korea, making use of the real world claim data submitted to the agency. We compared these models with efficiency which represents the extent to which the model may detect the abused amounts per treatment. Experimental results show that the proposed model has efficiency up to 3.57 times higher than the model employed by the agency. In addition, we put forward an efficient and realistic reviewing process when the proposed scoring model is applied to the existing process. The proposed process has efficiency up to 2.17 times higher than the existing process.


Assuntos
Grupos Diagnósticos Relacionados , Hospitalização , Humanos , República da Coreia
2.
J Med Internet Res ; 23(7): e26371, 2021 07 12.
Artigo em Inglês | MEDLINE | ID: mdl-33999829

RESUMO

BACKGROUND: Various techniques are used to support contact tracing, which has been shown to be highly effective against the COVID-19 pandemic. To apply the technology, either quarantine authorities should provide the location history of patients with COVID-19, or all users should provide their own location history. This inevitably exposes either the patient's location history or the personal location history of other users. Thus, a privacy issue arises where the public good (via information release) comes in conflict with privacy exposure risks. OBJECTIVE: The objective of this study is to develop an effective contact tracing system that does not expose the location information of the patient with COVID-19 to other users of the system, or the location information of the users to the quarantine authorities. METHODS: We propose a new protocol called PRivacy Oriented Technique for Epidemic Contact Tracing (PROTECT) that securely shares location information of patients with users by using the Brakerski/Fan-Vercauteren homomorphic encryption scheme, along with a new, secure proximity computation method. RESULTS: We developed a mobile app for the end-user and a web service for the quarantine authorities by applying the proposed method, and we verified their effectiveness. The proposed app and web service compute the existence of intersections between the encrypted location history of patients with COVID-19 released by the quarantine authorities and that of the user saved on the user's local device. We also found that this contact tracing smartphone app can identify whether the user has been in contact with such patients within a reasonable time. CONCLUSIONS: This newly developed method for contact tracing shares location information by using homomorphic encryption, without exposing the location information of patients with COVID-19 and other users. Homomorphic encryption is challenging to apply to practical issues despite its high security value. In this study, however, we have designed a system using the Brakerski/Fan-Vercauteren scheme that is applicable to a reasonable size and developed it to an operable format. The developed app and web service can help contact tracing for not only the COVID-19 pandemic but also other epidemics.


Assuntos
COVID-19/diagnóstico , Segurança Computacional , Busca de Comunicante/ética , Busca de Comunicante/métodos , Direitos do Paciente , Privacidade , Tecnologia Biomédica/ética , Tecnologia Biomédica/métodos , COVID-19/epidemiologia , Segurança Computacional/ética , Segurança Computacional/normas , Confidencialidade , Humanos , Aplicativos Móveis , Pandemias , Quarentena , SARS-CoV-2
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA