Unveiling Deceptive Patterns: AI-Driven Fraud Detection in Healthcare Finance
Keywords:
Healthcare, Financial Analytics, Machine Learning, Deep Learning, Surveys, ModelingAbstract
Background: The healthcare sector gathers a significant amount of health and financial data, and with the increasing prevalence of electronic payments, credit card fraud monitoring has become a financial burden for service providers. Continuous improvement of fraud detection systems is necessary to mitigate the financial losses caused by ongoing fraudulent activities. Phishing and virus-like Trojans are commonly employed to steal credit card data, highlighting the need for effective fraud detection systems.
Aim: This paper aims to enhance credit card fraud detection systems using machine learning and deep learning algorithms, including Naive Bayes, Logistic Regression, K-Nearest Neighbour (KNN), Random Forest, and Sequential Convolutional Neural Networks. These algorithms are applied to train on both standard and abnormal transaction features, enabling credit card fraud detection. The effectiveness of these methods is evaluated using public data.
Methodology: The study employs machine learning and deep learning algorithms to train on various transaction features, including standard and abnormal patterns. The algorithms utilized are Naive Bayes, Logistic Regression, K-Nearest Neighbour (KNN), Random Forest, and Sequential Convolutional Neural Networks. These algorithms are trained using the collected data and tuned to identify fraudulent credit card transactions.
Results: The accuracy of the different algorithms in detecting credit card fraud was evaluated. The results indicate that Naive Bayes achieved an accuracy of 96%, Logistic Regression achieved 94.9%, K-Nearest Neighbour (KNN) achieved 95.89%, Random Forest achieved 98.58%, and Sequential Convolutional Neural Networks achieved 95.8%.
Conclusion: Comparative analysis of the various algorithms revealed that the K-Nearest Neighbour (KNN) method outperformed the others in terms of accuracy in detecting credit card fraud. This finding highlights the effectiveness of KNN in identifying fraudulent transactions within the healthcare sector. By implementing these improved fraud detection systems, healthcare service providers can better safeguard against credit card fraud, minimizing financial losses and protecting the financial security of the organizations and their patients.
Downloads
References
G. Saldamli, V. Reddy, K. S. Bojja, M. K. Gururaja, Y. Doddaveerappa, and L. Tawalbeh, "Health care insurance fraud detection using blockchain," in 2020 Seventh international conference on software-defined systems (SDS), 2020, pp. 145–152.
R. Bauder, T. M. Khoshgoftaar, and N. Seliya, "A survey on the state of healthcare upcoding fraud analysis and detection," Heal. Serv. Outcomes Res. Methodol., vol. 17, pp. 31–55, 2017.
W. Hilal, S. A. Gadsden, and J. Yawney, "Financial Fraud:: A Review of Anomaly Detection Techniques and Recent Advances," 2022.
A. K. S. Kumar et al., "Financing health care for all: challenges and opportunities," Lancet, vol. 377, no. 9766, pp. 668–679, 2011.
L. C. Gapenski and A. of University Programs in Health Administration, Fundamentals of healthcare finance. Health Administration Press, 2009.
E. Werntoft and A.-K. Edberg, "Decision makers' experiences of prioritization and views about how to finance healthcare costs," Health Policy (New. York)., vol. 92, no. 2–3, pp. 259–267, 2009.
R. Duggal, "Healthcare in India: changing the financing strategy," Soc. Policy & Adm., vol. 41, no. 4, pp. 386–394, 2007.
A. Alkhamis, A. Hassan, and P. Cosgrove, "Financing healthcare in Gulf Cooperation Council countries: a focus on Saudi Arabia," Int. J. Health Plann. Manage., vol. 29, no. 1, pp. e64--e82, 2014.
J. White, "The 2010 US health care reform: approaching and avoiding how other countries finance health care," Heal. Econ. Policy Law, vol. 8, no. 3, pp. 289–315, 2013.
A. Abdallah, M. A. Maarof, and A. Zainal, "Fraud detection system: A survey," J. Netw. Comput. Appl., vol. 68, pp. 90–113, 2016.
J. Li, K.-Y. Huang, J. Jin, and J. Shi, "A survey on statistical methods for health care fraud detection," Health Care Manag. Sci., vol. 11, pp. 275–287, 2008.
T. Ekina, F. Leva, F. Ruggeri, and R. Soyer, "Application of Bayesian methods in detecting healthcare fraud," Chem. Eng. Trans., vol. 33, 2013.
H. Joudaki et al., "Using data mining to detect health care fraud and abuse: a review of literature," Glob. J. Health Sci., vol. 7, no. 1, p. 194, 2015.
J. A. Golden, "Deep learning algorithms for detection of lymph node metastases from breast cancer: helping artificial intelligence be seen," Jama, vol. 318, no. 22, pp. 2184–2186, 2017.
Y. Mohamadou, A. Halidou, and P. T. Kapen, "A review of mathematical modeling, artificial intelligence and datasets used in the study, prediction, and management of COVID-19," Appl. Intell., vol. 50, no. 11, pp. 3913–3925, 2020.
E. M. K. Reddy, A. Gurrala, V. B. Hasitha, and K. V. R. Kumar, "Introduction to Naive Bayes and a Review on Its Subtypes with Applications," Bayesian Reason. Gaussian Process. Mach. Learn. Appl., pp. 1–14, 2022.
M. K. Satheesh and K. V. R. Kumar, "Addressing the Utilization of Popular Regression Models in Business Applications," in Machine Learning for Business Analytics, Productivity Press, 2022, pp. 29–43.
Allauddin Mulla, R. ., Eknath Pawar, M. ., S. Banait, S. ., N. Ajani, S. ., Pravin Borawake, M. ., & Hundekari, S. . (2023). Design and Implementation of Deep Learning Method for Disease Identification in Plant Leaf. International Journal on Recent and Innovation Trends in Computing and Communication, 11(2s), 278–285. https://doi.org/10.17762/ijritcc.v11i2s.6147
S. Vutharkar and R. K. KV, "Fin-Cology or Tech-Nance?: Emergence of FinTech," in AI-Driven Intelligent Models for Business Excellence, IGI Global, 2023, pp. 124–136.
P. Sravya and R. K. KV, "Indian Economic Growth Concerning the Impact on FDI (Foreign Direct Investment): Impact of FDI on Indian Economic Growth in the Pharmaceutical Sector," in AI-Driven Intelligent Models for Business Excellence, IGI Global, 2023, pp. 182–198.
K. V. R. Kumar, K. D. Kumar, R. K. Poluru, S. M. Basha, and M. P. K. Reddy, "Internet of things and fog computing applications in intelligent transportation systems," in Architecture and Security Issues in Fog Computing Applications, IGI Global, 2020, pp. 131–150.
A. Patil and R. K. KV, "Forecasting the Space Utilization Trend in Corporate Offices," in AI-Driven Intelligent Models for Business Excellence, IGI Global, 2023, pp. 137–166.
Madapudi, Rudra Kumar, A. Ananda Rao, and Gopichand Merugu. "Change requests artifacts to assess the impact on the structural design of SDLC phases." Int’l J. Computer Applications 54.18 (2012): 21-26
Chalapathi, M. M., et al. "Ensemble Learning by High-Dimensional Acoustic Features for Emotion Recognition from Speech Audio Signal." Security and Communication Networks 2022 (2022).
Ramana, Kadiyala, et al. "Leaf disease classification in smart agriculture using deep neural network architecture and IoT." Journal of Circuits, Systems and Computers 31.15 (2022): 2240004.
Kumar, V., M. Rudra Kumar, N. Shribala, Ninni Singh, Vinit Kumar Gunjan, and Muhammad Arif. "Dynamic Wavelength Scheduling by Multiobjectives in OBS Networks." Journal of Mathematics 2022 (2022).
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.