<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Using Rule Technology for Fraud Prevention in Government Insurance</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ching-Long Yeh</string-name>
          <email>chingyeh@cse.ttu.edu.tw</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kuo-Chung Lin</string-name>
          <email>robert_lin@tatung.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Meng-Jong Kuan</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science and Engineering, Tatung University</institution>
          ,
          <addr-line>Taipei, 104</addr-line>
          ,
          <country country="TW">Taiwan</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Graduate Institute of Project Management, Kainan University</institution>
          ,
          <addr-line>Taoyuan 33857</addr-line>
          ,
          <country country="TW">Taiwan</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Information Systems Business Division</institution>
          ,
          <addr-line>Tatung Co., Taipei, 104</addr-line>
          ,
          <country country="TW">Taiwan</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In respect of the frequent fraud cases of social insurance by government organizations, the inspection procedure usually relies on experts' experience for verification and experienced personnel in charge for checking. However, due to the heavy work load and the insufficiency of manpower and lack of experience, the ratio of miscarriages of justice is very high, leading to improper settlement of claims and the waste of social resources. In this paper, we employ rule technology to improve the above inefficiency. We employ a knowledge engineering methodology to analyze the problem and construct the knowledge model, including the domain schema and rules. We then implement the knowledge model along with the existing database applications. The benefits generated by the research are: (1) establishing a knowledge system with expertise reasoning to solve the review problems of massive cases, (2) significantly reducing the large labor cost and consumed time of the existing reviewing system, and (3) improving the application level of traditional database in the expert reasoning system.</p>
      </abstract>
      <kwd-group>
        <kwd>Knowledge engineering</kwd>
        <kwd>Domain Schema</kwd>
        <kwd>Rule</kwd>
        <kwd>Government insurance</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The scope of public insurance comprises five categories: physical injury, handicap,
maternity, death and aging [
        <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
        ]. The application of insurance claims comprise two
categories: one is common injury insurance and the other is occupational hazard
insurance. In this paper we focus on conducting against common injury insurance
claim. The existing problems are as follows:
 The time required for review is 45 days; if the case is judged to be dubious case,
then the corresponding court administration department will be notified for
assistant investigation, which will last for almost 30 days for confirming
whether the case belongs to fraud case; the overall process requires about 75
days, the consumed labor and time are enormous.
 The endless emerging of false claim cases related to insurance fraud requires
the reinforcement of check and screening of fraud cases. Due to the massive
operation volume and restricted by limited human resources and inadequate
experience, it is not practical to carefully screen the cases one by one.
 Due to the enormity of cases require for recheck, only 20% cases sampled for
mining and the accuracy rate is only 15%. In addition, during the judgment at
each operation phase (acceptance, check and payment checking), the experience
is not easy to be shared and even through educational training, there is still no
evident effects. Obviously, the exiting operation can not adequately solve the
above-mentioned problems.
      </p>
      <p>Directing towards the solution of the forementioned problems, the following
requirements must be satisfied for various roles in the context.
 Business staff: Be capable of obtaining each piece of information for case
review, including the representative and expert domain knowledge implicit in
the existing database system. A case review reasoning system is expected to
assist large amount of monthly work.
 Case applicants: Hope to shorten the application period and rapidly obtain the
review results and receive reasonable indemnity.
 Mid-level managers: the system can transmit and communicate the knowledge
and technology related to the review, dig out the implicit expertise knowledge
and design an information system which possesses case review and reasoning
expertise.
 Top managers: The system can assist to reduce the monthly labor and time
cost invested in the review, improve the accuracy, help to generalize expertise
rules so as to feedback the review results to the premium rate adjustment factors.</p>
      <p>
        In order to meet the above requirements, in the research, we materialize the review
expertise of previous business staff using the knowledge engineering methodology
CommonKADS [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. We implement the design model using the visual rule technology,
VisiRule [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The rule system integrates with the existing database application by
using the Prolog-to-database interface, Prodata [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. User accesses the rule system
through the browser.
      </p>
      <p>In the next section, we give an overview of the knowledge engineering
methodology, CommonKADS. Then we describe the analysis and design of the
knowledge system in Section 3. In Section 4 we describe the implementation and
show the result. Finally conclusions are made.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Knowledge Engineering Methodology</title>
      <p>When building a knowledge-intensive system, it is appropriate to adopt a
comprehensive methodology, because the ‘knowledge’ can not be obtained just by
someone’s intuition or conjecture. The adopted methodology should facilitate the
detailed analysis and complete treatment of knowledge-intensive tasks and processes.
CommonKADS methodology is excellent for the above purpose. The CommonKADS
methodology offers a structured approach based on a few basic thoughts or principles
which have grown out of experience over the years. The total process of
CommonKADS actually is developing the six predefined models with each of them
focuses on one limited aspect and the combination is a comprehensive view of the
whole system. The six models are organized into three levels, from the beginning of
contextual consideration (organization, task and agent models), to the conceptual
formation (knowledge and communication models), and then to the generation of
design artifacts (design model). Each individual aspect of the models is explained as
follows.
 Organization model: helps analyze the rough feature of the system and find out
the problems and opportunities.
 Task model: The business process can be divided into several sub-processes,
which are the tasks. The task model analyzes the global task layout, the inputs
and outputs, the preconditions, and the performance criteria.
 Agent model: Descript the capabilities, authority and constraints of the agents,
which are the executors of a task.
 Knowledge model: The knowledge model specifies the essential knowledge when
executing a task.
 Communication model: When it comes to multi-agent environment, the
communication model conceptually expresses the transactions of agents which
involved in a task.
 Design model: proposes a technical system specification including architecture,
implementation platform, software modules, representational constructs, and
computational mechanisms based on the integration of the requirements.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Analysis and Design</title>
      <p>We first describe the business flow of public insurance claim. Then we show the
result of problem analysis and design model using CommonKADS.</p>
      <sec id="sec-3-1">
        <title>3.1 Analysis of Public Insurance Claims</title>
        <p>The business flow of governmental insurance claim is shown in Fig. 1. After accident
occurs to the insurer and the insurer is sent to hospital for treatment, the unit where
the insurer belongs to fills in an application sheet and ensures that the related
documentary evidence is sent to the insurance unit; after the documentary evidence is
received, the information is entered via the dedicated insurance application system
and then it is decided whether the payment will be checked after the audit mechanism
conducts review for the content and the related case history and then the claims
settlement can be conducted.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2 Contextual Analysis</title>
        <p>As mentioned in Section 2, the CommonKADS starts from the contextual analysis
which results in three models, that is, Organization, Task and Agent Models. Firstly,
in the analysis of Organization Model, the analysis to the problems and opportunities
is required and at the same time, the task and mission of the organization shall be
clarified.</p>
        <p>At present, many cases which apply for claim settlement require to be reviewed
and great challenge is made to manual review, which is the biggest problem. In
addition, at present, there is no integrated information system to provide cross query.
Expert judgment is required when the cases are reviewed, the related knowledge is
not easy to be transmitted and communicated. Therefore, it is usually the case only
after the payment is made, the case is found to be a fraud. Both difficult recovery of
the payment and the lengthy procedure constitutes existing major problems. The
mission of the case is to find out the problem case in the most effective and
timesaving way and to establish a more convenient reasoning knowledge system. At the
same time, the strategy for reaching the goal and expectation is to extract the core
knowledge of profession reviewers via expert interview.</p>
        <p>The study analyzes the related organization according to the work flow surface as
the following figure and define the department which can provide various human
resources; in the public insurance organization, the insurance claim team is
responsible for the review of claim application cases, which is subordinate to the
insurance department; subordinately provided with professional reviewers for case
review as well as payment checking staff for calculation of claim amount; meanwhile,
there is also dedicated service counter that is responsible for receiving the
applications and providing information system to assist the reviewers for assessment.
The organizational chart is as shown in Fig. 2.</p>
        <p>The primary process, as shown in Fig. 3, comprises a number of tasks, among
which List item check, Query for IS (information system), Assessment, and
ReAssessment (table 1) are knowledge intensive tasks. The tasks are further decomposed
with dataflow and control flow diagrams shown in Figs. 4 and 5, respectively.</p>
        <p>Through the interview with auditing experts and the classification of existing rules
and regulations, we summarize the following knowledge items used to in the
assessment task.</p>
        <p>Rule 1：Inspection already adjustment in hospital number of days
(If in the application case above insured's historical accumulation in
hospital's number over 180 days, already surpassed the legal adjustment in
hospital days number upper limit, then must reject application, and need to
manual inspection).</p>
        <p>Rule 2：Inspects the insured to be effective
(If record of date and the insured the application case reject insurance from
the insurance date to surpass for 30 days, then must reject application, and
need to manual inspection).</p>
        <p>Rule 3: Check insured’s data by changed
(If in 30 days insured's basic data or the beneficiaries have the change
record, then draws back to carry on the manual inspection).</p>
        <p>Rule 4：Inspects insured's organization
(If insured's organization is an association, then regards as the high risk
application case, after must reject application, and need to manual
inspection).</p>
        <p>Rule 5：Insurance salary unreasonable change
(If the insured wish obtains a higher indemnity, is bigger than 30% in 1 year
individual salary (column in database) promotion, then regard it as the high
risk case and need manual assessment).</p>
        <p>Rule 6：Inspection accumulation insurance period of service
( If the insured joins the government social security record accumulation to
be short in 12 months, than must reject application, and need to manual
inspection).</p>
        <p>Rule 7：Inspects hospital reliability
(If hospital of the application case once the proof not truly condition or is
had the bad row tube record, than must reject application, and need to
manual inspection).</p>
        <p>Rule 8: Inspects doctor reliability
(If of doctor in charge application case once the proof not truly condition or
is had the bad medical record, than must reject application, and need to
manual inspection).</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3 Conceptual Analysis</title>
        <p>This level of analysis is to derive the knowledge model and communication model
based on the analysis result of the contextual analysis. The former is used to design
the knowledge based and the latter describes the communication paths among agents
and sub-systems.</p>
        <p>
          The assessment and re-assessment tasks in the contextual analysis are
categorized as assessment type in the task hierarchy [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. In this paper, we therefore
adopt the inference structure, control structure and domain schema of the assessment
task as the basis to carry out the analysis and then build the knowledge model. In this
section we focus on the development of the main rule model of the “review
knowledge system for insurance claim cases with reasoning capability” and it is
designed based on the knowledge items from the previous contextual analysis.
Therefore, the important core domain projects sorted out according to the
abovementioned rules comprise the following important project rules: (1) Auditing the
cases of payment days (2) Auditing the validity period of insurance (3) The review
data stability (4) Audit of the insured’s organization (5) Reliability insured’s salary
review (6) Check to years of cumulative insurance (7) Check to high-risk hospital (8)
Check to high-risk doctor. The knowledge model is drawn as shown in Fig. 6.
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Implementation</title>
      <p>
        In this section we describe the implementation of the knowledge model using the
visual rule technology, VisiRule [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The system architecture is outlined as shown in
Fig. 7.
      </p>
      <p>The right-hand side in the figure is the current system architecture. In the left-hand
side is the enhanced part using rule technology. The auditing personnel access the
knowledge based system through the service interface; the knowledge base
administrator uses the management interface, here, the VisiRule as shown in Fig. 8.
For example, to maintain the knowledge base:</p>
      <p>
        The resulting code after using the visual interface can be Flex [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] or Prolog [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ],
which is automatically generated, compiled and ready to run. In the resulting Prolog
program, we use the Prolog-to-Database interface, Prodata [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], to integrate with the
existing database applications.
      </p>
      <p>We have implemented a prototype of the knowledge-based system in Fig.8 using
VisiRule. At present, we implement the knowledge model described in Section 3 in
the prototype. Input single id for Rule System to check in Fig. 9, used the batch job to
demo rule system shown in Fig. 10.</p>
      <p>To see how the prototype performs, we carried out an experiment based on the
history data with the result summarized in Table 2.
In this paper, the core knowledge for public insurance review can be effectively
established via knowledge engineering methodology, CommonKADS. The visual rule
technology, VisiRule, is used to implement the knowledge model derived from the
analysis and design using CommonKADS methodology. We carried out experiments
using the prototype system. The result shows that originally using the manual
assessment only 6% of the fraud cases are discovered. With the use of rule technology,
79% of the fraud cases can be discovered which results in save of lots of money. The
experiment result shows that the use of rule technology is promising in improving the
performance of heterogeneous databases.</p>
      <p>
        In this paper we obtain preliminary success of using the rule technology to build up
the knowledge-based system. In the future, we will combine the knowledge model
developed in this paper with the result using data mining technology to extend the
coverage of the knowledge base [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. At present, various database systems are used in
the application of managing governmental insurance. In this paper we rely on manual
access of various databases to collect the items to be checked by the rule-based
system. The Semantic Web technology is suitable for integrating databases of various
formats [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. We will employ this technology to automate the task of collecting data
from various databases.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. Council of Labor Affairs.
          <article-title>Table of Business Category and Premium Applicable for the Occupational Accident of Labor Insurance</article-title>
          , Taipei, Taiwan (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2. Council of Labor Affairs.
          <article-title>Table of Actual Premium Changes Applicable for Occupational Accident Insurance of Labor Insurance Act Over the Years</article-title>
          , Taipei, Taiwan (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Schreiber</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Akkermans</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Anjewierden</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>de</surname>
            <given-names>Hoog</given-names>
          </string-name>
          , R.,
          <string-name>
            <surname>Shadbolt</surname>
          </string-name>
          , N.,
          <string-name>
            <surname>Van de Velde</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wielinga</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Knowledge Engineering and Management: The CommonKADS Methodology</article-title>
          . MIT Press (
          <year>2002</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Shalfield</surname>
          </string-name>
          , R.:
          <article-title>VisiRule User Guide</article-title>
          , Logic Programming Associates, London, England (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Lucas</surname>
          </string-name>
          , R.: Prodata Interface, Logic Programming Associates, London, England (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Westwood</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          : Flex Tutorial, Logic Programming Associates, London, England (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7. Bratko, I.:
          <article-title>Prolog Programming for Artificial Intelligence</article-title>
          . 3rd ed.
          <source>Addison-Wesley</source>
          .
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8. Han,
          <string-name>
            <given-names>J</given-names>
            .,
            <surname>Kamber</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.</surname>
          </string-name>
          :
          <article-title>Data Mining: Concepts and Techniques</article-title>
          , Morgan Kaufmann,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9 Hendler,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Berners-Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Miller</surname>
          </string-name>
          ,
          <string-name>
            <surname>E.</surname>
          </string-name>
          :
          <article-title>Integrating Applications on the Semantic Web</article-title>
          ,
          <source>Journal of the Institute of Electrical Engineers of Japan</source>
          , Vol
          <volume>122</volume>
          (
          <issue>10</issue>
          ), p.
          <fpage>676</fpage>
          -
          <lpage>680</lpage>
          (
          <year>2002</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>