Filed Under:Carrier Innovations, Technology Solutions

Adapting Faster Than the Fraudsters

Technology, Claims Segmentation Enhance Detection

(Editor's Note: This article has been contributed by Janine Johnson, an analytics manager at the ISO Innovative Analytics (IIA) unit of Verisk Analytics (

It's no secret: Fraudulent claims continue to be an insidious problem for the inindustry, costing P&C insurers and consumers an estimated $40 billion a year (according to the FBI). Of course, that figure stands to skyrocket as the National Insurance Crime Bureau (NICB) reports that questionable claims (QCs) increased an unprecedented 20 percent during the first half of 2012 when compared to the same period in 2011.

No single indicator suffices to deny coverage, but applications that raise suspicion should be taken off of the direct-channel conveyor belt and placed in front of an underwriter, who will ask additional questions to verify information prior to granting coverage. In many instances, a dishonest applicant will not continue with the submission process when required to be in direct contact with an underwriter.

Claims Segmentation
Another proven fraud-fighting technique is to start by segmenting the legitimate claims. Doing that serves two purposes: First, the sooner a legitimate claim gets paid, the greater a customer’s satisfaction with the company. Second, quickly identifying claims to fast track reduces the total number of claims that require adjuster or SIU scrutiny. This allows limited claim and investigative resources to focus on claims with some degree of suspicion—saving time and money by putting resources where they are needed most. 

Text mining has become more accessible because of increased computing. Among the most common applications of this technology is the mining of claims adjusters’ diaries. Ideally, an adjuster should recognize and escalate the same suspicious indicators that text mining uncovers. Unfortunately, lack of training or time constraints can prevent an adjuster from picking up on those red flags. Text mining applies a consistent level of scrutiny to every diary entry, ensuring that even subtle indicators will not go undetected. 

A second powerful technique that is rarely used is anomaly, or outlier, detection. The algorithms involved are computationally intensive yet extremely powerful for identifying behavior that does not fit the norm. Adopted from artificial intelligence, the algorithms learn new patterns to detect unusual characteristics even if the anomalous behavior does not include hallmark SIU red flags. This allows potentially problematic patterns to be identified earlier and put into the SIU pipeline for investigation.

Featured Video

Most Recent Videos

Video Library ››

Top Story

5 ways insurance agencies can improve their websites

The way people use the Internet has changed over the past few years. Has your website changed with it?

Top Story

15 tips for driving safely on ice and snow

More than 800 people die each year in the U.S. in vehicle crashes caused by snow, sleet and freezing rain.

More Resources


eNewsletter Sign Up

Carrier Innovations eNewsletter

Critical news on the latest tech solutions, information security, analytics and data tools and regulatory changes to help decision-makers at insurance carriers keep their business thriving – FREE. Sign Up Now!

Mobile Phone

Advertisement. Closing in 15 seconds.