Author of the publication

Healthcare in Fraudster's Crosshairs: Designing, Implementing and Evaluating a Machine Learning Approach for Anomaly Detection on Medical Prescription Claim Data.

, , , and . PACIS, page 89. (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Digitization Pipeline for Mixed-Typed Documents Using Machine Learning and Optical Character Recognition., , , , and . DESRIST, volume 13229 of Lecture Notes in Computer Science, page 195-207. Springer, (2022)A Process-Based Approach to Information Security Investment Evaluation: Design, Implementation, and Evaluation., , , , and . AMCIS, Association for Information Systems, (2023)A Qualitative Study on Acceptance Factors of Economic Approaches on IT Security Investment Decisions., , , , , and . AMCIS, Association for Information Systems, (2023)Towards a Business Process-based Economic Evaluation and Selection of IT Security Measures., , , , , , and . CIISR@Wirtschaftsinformatik, volume 2966 of CEUR Workshop Proceedings, page 7-21. CEUR-WS.org, (2021)Show Me Your Claims and I'll Tell You Your Offenses: Machine Learning-Based Decision Support for Fraud Detection on Medical Claim Data., , , and . HICSS, page 1-9. ScholarSpace, (2022)Healthcare in Fraudster's Crosshairs: Designing, Implementing and Evaluating a Machine Learning Approach for Anomaly Detection on Medical Prescription Claim Data., , , and . PACIS, page 89. (2021)How to Foster Compliance in Non-Integrated IT-Landscapes? The Case of Manual Medical Data Transfers., and . CIISR@Wirtschaftsinformatik, volume 3512 of CEUR Workshop Proceedings, page 77-84. CEUR-WS.org, (2023)The Role of Situational Risk Propensity in Technology Threat Avoidance Behavior., and . Wirtschaftsinformatik, AISeL, (2022)A Taxonomy of Machine Learning-based Fraud Detection Systems., , and . ECIS, (2022)Applying Dispositional, Situational, and Organizational Risk Propensity to Technology Threat Avoidance Theory - A tripartite View., , and . ECIS, (2023)