Document Type : Original Research Paper

Authors

1 Department of Information Technology Management, Science and Research Branch, Islamic Azad University, Tehran, Iran

2 Department of Industrial Management, Karaj Branch, Islamic Azad University, Karaj, Iran

3 Department of Information Technology Engineering, Faculty of Electrical and Computer Engineering, University of Tabriz, Tabriz, Iran

4 Department of Industrial Management, Faculty of Management and Economics, Tarbiat Modares University, Tehran, Iran

Abstract

BACKGROUND AND OBJECTIVES: It is very difficult and maybe impossible to identify suspicious damage claims in agricultural insurance using traditional methods and using the opinions of experts among a multitude of claims. In the current research, a model for discovering suspicious damage claims in agricultural insurance using data mining techniques has been presented to help the agricultural insurance fund in identifying such claims.
METHODS: The research method in the present research is applied in terms of intention and descriptive-post-event in terms of quiddity. One of the applications of data mining is anomaly detection. In the present study, a technique for detecting anomalies in the data using ensemble machine learning models is carride out. To enforcement this method, real data on compensation paid for wheat insurance (irrigated and rainfed) for one year in Khuzestan province was used. Because of differences in the process of determining damages of irrigated and rainfed wheat insurance policies, their anomalies were analyzed separately and a number of suspicious claims were acquired for each.
FINDINGS: The analysis of the results showed 5 types of suspicious behavior in claiming damages. The ratio of suspicious claims to the total (percentage of anomalies) was estimated using the histogram of anomalous scores and the opinion of insurance fund experts about 1.5%.  Suspicious and unusual cases were examined by experts and the final accuracy of the model in correctly identifying suspicious cases was 72% for irrigated wheat insurance and 68% for dryland wheat insurance.
CONCLUSION: Based on the obtianed results, the presented model can be used to detecte suspicious claims in wet and dry wheat insurance policies. Since most of the unusual cases are caused by not providing sufficient documentation, it can be due to the presentation of forging insurance policies or the existence of collusion between the insured, the agent or the assessor. Therefore, more care should be taken in the payment process. The present study was conducted on the product and can be used for other crops as well.

Keywords

Main Subjects

Aggarwal, C.C., (2013). Outlier ensembles: Position paper. ACM SIGKDD explorations newsletter., 14(2): 49-58 (10 Pages).
Aggarwal, C.C.; Sahte, S., (2017). Outlier ensembles: An introduction. Springer.
The World Bank (2022). Agriculture & rural development.
Barbado, A.; Corcho, Ó.; Benjamins, R., (2022). Rule extraction in unsupervised anomaly detection for model explainability: Application to OneClass SVM. Expert Syst. Appl., 189(1): 1-20 (20 Pages).
Bauder, R.; Da Rosa, R.; Khoshgoftaar, T., (2018). Identifying medicare provider fraud with unsupervised machine learning. In 2018 IEEE international conference on information reuse and integration (IRI)., 285-292 (8 Pages).
Bose, I.; Mahapatra, R.K., (2001). Business data mining —A machine learning perspective. Inf. Manage., 39(3): 211-225 (15 Pages).
Bouazza, I.; Ameur, E.B.; Ameur, F., (2019). Datamining for fraud detecting, state of the art. Adv. Intell. Syst. Sustainable Dev., 205-219 (15 Pages).
Brownlee, J., (2020). Data preparation for machine learning.
Chandola, V.; Banerjee, A.; Kumar, V., (2009). Anomaly detection: A survey. ACM Comput. Surv., 41(3): 1-58 (58 Pages).
Clayton, C., (2022). FBI touts work on crop insurance fraud case involving kentucky tobacco farmers. Insur. Agents.
Cole, S.A.; Xiong, W., (2017). Agricultural insurance and economic development. Annu. Rev. Econ., 9(1): 235-262 (28 Pages).
Bertoni, D., (2006). Crop insurance more needs to be done to reduce program’s vulnerability to fraud, waste, and abuse. U.S. Gov. Account. Office., 1-18 (18 Pages).
Das, S.; Wong, W.K.; Dietterich, T.; Fern, A.; Emmott, A., (2016). Incorporating expert feedback into active anomaly discovery. In 2016 IEEE 16th international conference on data mining (ICDM)., 853-858 (6 Pages).
Ertekin, S.; Huang, J.; Bottou, L.; Giles, L., (2007). Learning on the border: Active learning in imbalanced data classification. In Proceedings of the 16th ACM conference on conference on information and knowledge management., 127-136 (10 Pages).
Gill, K.M.; Woolley, A.; Gill, M., (2005). Insurance fraud: The business as a victim?. Crime., 73-82 (10 Pages).
Gill, W., (2009). Fighting fraud with advanced analytics. Can. Underwriter. Bus. Inf. Group., 76(9): 28-32 (5 Pages).
Goodarzi, A.; Janatbabaei, S., (2017). Evaluation of Three Data Mining Algorithms (Decision Tree, Naive Bayes, Logistic Regression) in Auto Insurance Fraud Detection. Insur. Res., 1(2): 61-80 (19 Pages). [In Persian]
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Letters to Editor


IJIR Journal welcomes letters to the editor for the post-publication discussions and corrections which allows debate post publication on its site, through the Letters to Editor. Letters pertaining to manuscript published in IJIR should be sent to the editorial office of IJIR within three months of either online publication or before printed publication, except for critiques of original research. Following points are to be considering before sending the letters (comments) to the editor.

[1] Letters that include statements of statistics, facts, research, or theories should include appropriate references, although more than three are discouraged.

[2] Letters that are personal attacks on an author rather than thoughtful criticism of the author’s ideas will not be considered for publication.

[3] Letters can be no more than 300 words in length.

[4] Letter writers should include a statement at the beginning of the letter stating that it is being submitted either for publication or not.

[5] Anonymous letters will not be considered.

[6] Letter writers must include their city and state of residence or work.

[7] Letters will be edited for clarity and length.
CAPTCHA Image