Using Data Mining to Ensure Payment Integrity

By Fadairo, S. A.; Williams, Rosemary et al. | The Journal of Government Financial Management, Summer 2008 | Go to article overview

Using Data Mining to Ensure Payment Integrity

Fadairo, S. A., Williams, Rosemary, Trotman, Ronald, Onyekelu-Eze, Anthony, The Journal of Government Financial Management

Data mining is the process of analyzing a specific data set with the objective of identifying patterns and establish relationships. Some of the required tools for data mining are importing, analyzing, parsing, matching, summarizing, aging, stratifying, verifying, reporting and documenting data.

Data mining, sometimes referred to as data or knowledge discovery, derives its name from searching for valuable information in a large database, data warehouse or data mart. Such information can be used to establish relationships between variables, and then to validate the findings by applying the detected patterns to new subsets of data. The ultimate goal of data mining is prediction.

Governments spend billions of dollars annually on programs, services and other items. To ensure accountability, governments need to know that these payments are valid and meet compliance requirements. In support of that mandate, payment integrity is essential to enable the governments to manage effectively. For example, federal and state governments spend billions of dollars on health care annually. Improving the accuracy and integrity of government's payments is essential.

Departments of health are committed to ensuring that physicians who provide services to insured persons in their area of jurisdiction receive full payment, within the requirements of the health insurance laws. By using data mining applications, governments can correlate the demographics of patients with critical illnesses to develop better insight on how to identify and treat symptoms and their causes.

Payment integrity is ascertained by using computer query tools and other computer software to conduct routine analysis of the payment requests submitted by the different service providers. It can also be used to conduct investigations into denial of service based either on false rejection or false acceptance. Service providers can also use it to detect duplicate submission of claims.

Software is used to review post-payment claims. Generally, most claims are paid as submitted. However, some claims are checked for validity before payments are made. These checks are general in nature (for example, valid health-ID number, maximum billing of a claim on one day) and cannot validate that the claim submitted is correct or appropriate with the service provided. As a result, post-payment review through the use of software is required.

What can data mining accomplish?

Data mining can perform two basic operations: predicting trends and behaviors and identifying previously unknown patterns. It allows users to analyze data from many different perspectives, categorize the data and summarize the relationships identified. Predictive data mining is most common, and has the most direct business applications. Data mining automates the process of finding predictive information in large databases.

Data mining software is one of a number of analytical tools for analyzing data. Although data mining is a relatively new term, the technology is not. For example, for years, companies have routinely used powerful computers to sift through volumes of point-of-sale scanner data and conduct market research. Another example of a predictive problem is forecasting bankruptcy and other forms of default.

Data mining can also identify previously hidden patterns in a single step. For example, it can analyze retail sales data to discover apparently unrelated products that are often purchased together. One pattern-discovery issue is detecting fraudulent credit card transactions. For example, after using your credit card for some time, a pattern emerges of the typical ways you use your card, such as the places you use it and the amount you spend. If your card is stolen and used fraudulently, the pattern often differs from your own. Data mining tools can distinguish the difference in the two patterns and bring this issue to the attention of the card owner.

Data Mining in Accounting

Mining for accounting demonstrates how companies, financial institutions, insurance companies, tax authorities and other governmental agencies can employ data in accounting, taxation and auditing-related tasks. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Cite this article

Cited article

Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25,

Note: primary sources have slightly different requirements for citation. Please see these guidelines for more information.

Cited article

Using Data Mining to Ensure Payment Integrity


Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25,

    New feature

    It is estimated that 1 in 10 people have dyslexia, and in an effort to make Questia easier to use for those people, we have added a new choice of font to the Reader. That font is called OpenDyslexic, and has been designed to help with some of the symptoms of dyslexia. For more information on this font, please visit

    To use OpenDyslexic, choose it from the Typeface list in Font settings.

    OK, got it!

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Author Advanced search


    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.