Professional Documents
Culture Documents
My Docs
My Docs
Article
Towards a Secure Technology-Driven Architecture for Smart
Health Insurance Systems: An Empirical Study
Fatima Al-Quayed 1, * , Mamoona Humayun 2, * and Sidra Tahir 3
1 Department of Computer Science, College of Computer and Information Sciences, Jouf University,
Sakakah 72341, Saudi Arabia
2 Department of Information Systems, College of Computer and Information Sciences, Jouf University,
Sakakah 72311, Saudi Arabia
3 University Institute of Information Technology, PMAS Arid Agriculture University, Rawalpindi 43600, Pakistan;
stahir@uaar.edu.pk
* Correspondence: ffalquayed@ju.edu.sa (F.A.-Q.); mahumayun@ju.edu.sa (M.H.)
Abstract: Health insurance has become a crucial component of people’s lives as the occurrence of
health problems rises. Unaffordable healthcare problems for individuals with little income might
be a problem. In the case of a medical emergency, health insurance assists individuals in affording
the costs of healthcare services and protects them financially against the possibility of debt. Security,
privacy, and fraud risks may impact the numerous benefits of health insurance. In recent years, health
insurance fraud has been a contentious topic due to the substantial losses it causes for individuals,
commercial enterprises, and governments. Therefore, there is a need to develop mechanisms for
identifying health insurance fraud incidents. Furthermore, a large quantity of highly sensitive
electronic health insurance data are generated on a daily basis, which attracts fraudulent users.
Motivated by these facts, we propose a smart healthcare insurance framework for fraud detection
and prevention (SHINFDP) that leverages the capabilities of cutting-edge technologies including
blockchain, 5G, cloud, and machine learning (ML) to enhance the health insurance process. The
proposed framework is evaluated using mathematical modeling and an industrial focus group. In
addition, a case study was demonstrated to illustrate the SHINFDP’s applicability in enhancing the
security and effectiveness of health insurance. The findings indicate that the SHINFDP aids in the
detection of healthcare fraud at early stages. Furthermore, the results of the focus group show that
Citation: Al-Quayed, F.; Humayun,
M.; Tahir, S. Towards a Secure
SHINFDP is adaptable and simple to comprehend. The case study further strengthens the findings
Technology-Driven Architecture for and also describes the implications of the proposed solution in a real setting.
Smart Health Insurance Systems: An
Empirical Study. Healthcare 2023, 11, Keywords: smart health insurance system; technology-driven; 5G; cloud; blockchain; machine learning
2257. https://doi.org/10.3390/
healthcare11162257
2.76
2022
2027
4.46
Figure 1.
Figure 1. Global
GlobalHIN
HINmarket
marketprediction in USD
prediction trillions.
in USD trillions.
Despite
Despite several
severaladvantages,
advantages,the thedigitized
digitized HINHIN market
markethashas
to to
face
facenumerous
numerous chal-
lenges, and one of the critical challenges faced globally is HIN fraud. Vastsums
challenges, and one of the critical challenges faced globally is HIN fraud. Vast sumsofof money
money are lost worldwide due to HIN fraud [13], raising HIP firms’ administrative costs
are lost worldwide due to HIN fraud [13], raising HIP firms’ administrative costs and
and the premiums HINS must pay [14]. A total of around GBP 303.8 million was lost to
the premiums HINS must pay [14]. A total of around GBP 303.8 million was lost to
HIN fraud, according to a 2015 study on the financial impact of HIN fraud [13]. This sum
HIN
may befraud, according
divided into GBPto237 a 2015 study
million on the financial
for fraudulent impact charges,
pharmaceutical of HIN GBP fraud [13]. This
43.9
sum may be divided into GBP 237 million for fraudulent pharmaceutical
million for fraudulent dental expenses, and GBP 22.9 million for fraudulent optical charges, GBP
43.9 million
charges. for fraudulent
Similarly, Thaifur et dental
al. [15] expenses,
estimate thatandhealthcare
GBP 22.9fraudmillion
costsfor fraudulent
Korea and opti-
cal charges.
Europe, Similarly,
respectively, EURThaifur et al.and
798.2 billion [15]
EURestimate that
56 billion healthcare
annually. fraud costs
The monthly Korea and
medical
Europe, respectively,
assistance payments for EUR
each798.2
memberbillion andnational
of the EUR 56HIN billion annually.
in South AfricaThe monthly
increased by medical
ZAR 192 (USD
assistance 14) to ZAR
payments for 410
each(USD 30) due
member oftothe
fraud. These HIN
national minorinhealthcare overheads
South Africa increased by
are projected
ZAR 192 (USD to be
14)about USD410
to ZAR 882(USD
million.30) due to fraud. These minor healthcare overheads
Since the to
are projected lastbedecade,
aboutcutting-edge
USD 882 million.technologies, especially AI and blockchain, have
been Since
widelythe
used
lastindecade,
the healthcare sector fortechnologies,
cutting-edge fraud detectionespecially
and prevention
AI and[3,16,17]. By
blockchain, have
analyzing previous data, AI can fuel prediction models that evaluate the likelihood of an
been widely used in the healthcare sector for fraud detection and prevention [3,16,17]. By
occurrence happening. Not only that, but they may also estimate the worth of the HIC by
analyzing previous data, AI can fuel prediction models that evaluate the likelihood of an
occurrence happening. Not only that, but they may also estimate the worth of the HIC
by analyzing past claims made by the policyholder. A claim value above the predicted
value can be forwarded for further investigations [18–21]. In the same way, end-to-end
traceability and a smart contract in the BLC help to detect and prevent HIN fraud [5,22–25].
On the other hand, 5G facilitates the fast transmission of insurance data between
different entities. At the same time, the cloud overcomes the limited capacity of the
analyzing past claims made by the policyholder. A claim value above the predicted value
can be forwarded for further investigations [18–21]. In the same way, end-to-end
traceability and a smart contract in the BLC help to detect and prevent HIN fraud [5,22–
25].
Healthcare 2023, 11, 2257 On the other hand, 5G facilitates the fast transmission of insurance data between 3 of 27
different entities. At the same time, the cloud overcomes the limited capacity of the
blockchain digital ledger (DTL) and provides a secure storage mechanism for healthcare
data. Considering
blockchain the importance
digital ledger (DTL) andofprovides
HIN globally, this
a secure research
storage leveragesfor
mechanism thehealthcare
potential of
the above-mentioned cutting-edge technologies to propose a smart solution for
data. Considering the importance of HIN globally, this research leverages the potential HIN fraud
of
detection and prevention. The problem statement and the explicit contribution
the above-mentioned cutting-edge technologies to propose a smart solution for HIN fraud of the
study are
detection andmentioned
prevention.in the
Thefollowing subsections
problem statement and the explicit contribution of the study
are mentioned in the following subsections
1.1. Problem Statement
1.1. Problem Statementfrequently give false or deceptive information to health insurance
Policyholders
companies in an effort
Policyholders to obtain
frequently givereimbursement
false or deceptiveforinformation
unapprovedtobenefits, which results
health insurance com-in
a significant
panies losstotoobtain
in an effort the HINP. A transparent
reimbursement end-to-end benefits,
for unapproved processing method
which forinHIN
results a
significant
claims is loss to theinHINP.
required orderAtotransparent end-to-end
help identify and stopprocessing
HIN scams.method for HIN claims is
required in order to help identify and stop HIN scams.
1.2. Paper Contribution
1.2. Paper Contribution
The explicit contributions of this study are listed below:
The explicit contributions of this study are listed below:
1. We explore the existing literature to identify possible HIN fraud and the entities
1. We exploreinthe
involved it; existing literature to identify possible HIN fraud and the entities
involved in it;
2. We provide a review of the various current usages of cutting-edge technologies for
2. We provide applications,
healthcare a review of the various in
especially current usages
the HIN of cutting-edge technologies for
process;
healthcare applications, especially in the HIN process;
3. We propose a layered framework based on cutting-edge technologies to detect and
3. We propose
mitigate a layered
HIN frauds;framework based on cutting-edge technologies to detect and
mitigate HIN frauds;
4. The proposed framework is evaluated using mathematical modeling, and an
4. The proposed framework is evaluated using mathematical modeling, and an industrial
industrial focus group;
focus group;
5. The practical implications of the proposed framework are elaborated with the help
5. The practical implications of the proposed framework are elaborated with the help of
of a case study.
a case study.
Before proceeding to the background and overview of existing studies, Acronyms
Before proceeding to the background and overview of existing studies, Acronyms part
part in Abbreviations lists the study’s acronyms and their complete forms.
in Abbreviations lists the study’s acronyms and their complete forms.
Figure 2 depicts the structure of the remaining paper.
Figure 2 depicts the structure of the remaining paper.
Figure
Figure 2. 2. Study
Study roadmap.
roadmap.
2.2.Preliminaries
Preliminariesand
andRelated
RelatedWork
Work
This section
This will
section provide
will anan
provide overview ofof
overview HIN, the
HIN, challenges
the faced
challenges byby
faced HIN, and
HIN, the
and the
role of cutting-edge technologies in HIN.
role of cutting-edge technologies in HIN.
2.1. Why There Is a Need for HIN
2.1. Why There Is a Need for HIN
Having HIN improves access to care, which leads to fewer deaths and improved health
Having HIN improves access to care, which leads to fewer deaths and improved
outcomes. HIN may represent the difference between disease and health, or life and death.
health outcomes. HIN may represent the difference between disease and health, or life
One of the primary causes of mortality, particularly in emerging and underdeveloped
and death. One of the primary causes of mortality, particularly in emerging and
nations, is a lack of HIN. Healthy individuals and young adults may believe they do not
need HIN since they are seldom ill. Accidents and diseases, on the other hand, may happen
to anybody at any moment. Without HIN, we are responsible for funding our own medical
expenditures, placing us in severe financial jeopardy [26–28]. Therefore, HIN is vital to
living a healthy and peaceful life. Below are some key benefits of HIN.
Healthcare 2023, 11, 2257 4 of 27
Financial benefits
The following financial benefits are associated with HIN:
• HIN aids in the payment of medical costs and prescription medication costs.
• It assists you in avoiding significant medical debt.
• It limits how much you may spend on healthcare each year.
Health benefits
People usually do not visit a healthcare center regularly without HIN. Individuals
with HIN have the following benefits:
• HIN helps you live a longer, healthier life.
• It connects you to a consistent source of care.
• It aids in the diagnosis and treatment of ailments and disorders.
Peace of mind
An essential thing in an individual’s life is peace of mind; however, the chances of
illness are always there. Most people are not only afraid of disease but also more fearful of
the cost they have to bear. HIN provides peace of mind in the following ways:
• Reducing financial worries regarding medical expenses.
• Reducing health worries regarding a lack of access to care.
• Removing the stigma associated with being uninsured.
Figure4.
Figure 4. Taxonomy
Taxonomy of
of HIN
HIN frauds.
frauds.
2.3.1. The
Healthcare Service Provider
above explanation (HSP) Fraud
demonstrates that HIN fraud may be conducted by HSPs,
HIPs, HINSs,
HSPs are and
the others who purposefully
professionals involved indefraud
providingthe HIN system to earn
and managing illegal benefits
healthcare services.
or payments.
These Hence,
professionals there is
include a needhospital
doctors, to investigate HIN fraud
administration, and provide
ambulances, and a solution by
laboratories.
using cutting-edge technologies. In the subsequent sections, we explore
HSP involvement is a prime factor that facilitates most HIN frauds, even those that HINSs the role of cutting-
edge technologies
commit. Some common in healthcare
HIN fraudsfraudcommitted
detection. by HSPs include: (1) Double-billing—In a
double-billing scam, an HSP submits numerous claims for the same set of services. It is
2.4. Role of
common forAIHSPs
in Healthcare
to double-bill the same entity (such as the government) for the same set
of services. They mayhave
AI approaches obfuscate
showntheir
to beactivities by changing
an effective the service’s
tool for detecting HIN date or description,
fraud. The HIN
or the patient’s or provider’s identity. (2) Phantom billing—Phantom
fraud detection system may be automated using AI. According to recent research, billing is invoicing
AI has
the
primarily been utilized to identify HIN fraud using various techniques and modelsis
HIN or the government for services that were never provided. (3) Unbundling—This
a[32,33].
kind ofAnomalies
fraudulentand activity
fraudinare
which doctors
detected usingcharge for each
behavioral stage of
profiling a multi-part
approaches process
based on
instead of lumping
ML algorithms. To them together
this end, under one code.
each individual’s By separately
behavior is modeled billing eachdeviations
to detect phase, the
HSP
frommaynormsearn more HIN
[34,35]. money while
fraud still providing
detection the sameare
ML approaches level of care.into
classified Unbundling,
supervisedor
“fragmentation,” is breaking up
learning (SL), semi-supervised a single(SSL),
learning medical
and operation
unsupervisedintolearning
many codes (USL). to increase
individual payments.
A dataset The medical
of previously known coding industryand
fraudulent often engages
valid in unbundling.
records is used in the Instead
SL
of utilizing the normal billing code, a surgeon who participates
approach in HIN fraud detection. These data are used to capture fraud patterns and in unbundling could input
different
constructcodes for incision
the model. and suturing
The primary during
advantage of athe
regular surgicalisoperation.
SL approach As a result, a
that the classification
doctor
results produced by this technique are simple to understand. Many classifications code
will receive more money. (4) Upcoding—Using a more expensive billing and SL for
the same medical
regression analysis service is called
methods “upcoding”
are applied in HINor up-charging.
fraud detection. ThisSLmeans that the
techniques HSPtois
used
charging
detect HINpatients
fraudfor a greater
include quality
neural of service
networks, than they
decision are statistical
trees, providing.analysis,
The HSPBayesian
falsely in-
creases their remuneration
approaches, SVM, graphbyanalysis,upcodingand the severity
rule-basedor complexity of the patient’s
systems [36,37]. Apart from condition
its
or treatment. For
advantages, financial
SL has gain,
several an HSP may sometimes
disadvantages. misdiagnose
Data collection and data theirproduction
patients’ condi-
are
complex in SL approaches. When the HIN dataset is relatively large, data labeling
becomes more complicated. It is difficult to distinguish between labels in fraud data when
they are imprecise and ambiguous. Because of these limitations, SL implementation might
be difficult in some instances. These SL limits may be overcome with the aid of USL.
USL algorithms detect fraudulent HIN activities in unlabeled HIN datasets. The
Healthcare 2023, 11, 2257 6 of 27
tions, such as diagnosing with chronic bronchitis when they have acute bronchitis or with a
minor skin lesion when they actually had a bigger, more complex excision. (5) Unnecessary
treatment/drug repetitions—In this fraud, the doctor continues the treatment/drugs for a
long time without needing them. (6) Unnecessary procedures/diagnostics—Sometimes,
doctors recommend costly procedures/diagnostics that are not required (e.g., recommend-
ing a biopsy treatment for the patient with a temporary disorder). (7) Creating forged
prescriptions—HSPs counterfeit or fraudulently modify or create a prescription or other
document in this scam. Two examples are adding a medicine or changing the date, amount,
or dispensing instructions. (8) Kickback—This is a term used to describe a misuse of
money that benefits a person of authority to use his position or influence to benefit another
individual, organization, or enterprise. It is a prevalent deception in the HIN area, where
HSPs such as pharmaceutical corporations incentivize other HSPs to suggest certain drugs.
(9) Billing for non-entitled services as entitled—This fraud usually happens when an HINS
is not entitled to a particular service by the HIP and the doctor provides him this service,
putting this treatment in another category entitled to him.
by the transaction logic included in it. Once the transaction saves the operation, smart
contracts are put into effect. In order to govern how their HIN data are shared or utilized
in the network, HINSs may specify rules for the HIN process using a smart contract.
The working and roles of cutting-edge technologies in HIC processing and fraud
detection are discussed in the above sub-sections; now, we explore the existing stud-
ies on using cutting-edge technologies for HIC fraud detection and prevention in the
following subsection.
number of HIN branches rises, the execution time of Block-HI decreases by just 0.69% on
average, although the number of claims increases by 33.51%. This is because the consensus
procedure was executed. Despite the fact that performance degrades as the number of
branches grows, the suggested framework, which automates fraud detection, can uncover
distinct fraud situations compared to a human procedure.
Amponsah et al. suggest a method for detecting and preventing fraud in HIC
processing utilizing ML methods and BLC technology [53]. The original HIC dataset
is classified using a decision tree in this work. The retrieved information is encoded
in an Ethereum BLC smart contract to identify and prevent healthcare fraud. Accord-
ing to the trial data, the top-performing tool has 97.96% classification accuracy and
98.09% sensitivity. The study’s results demonstrate that the suggested solution improves
the capacity of BLC smart contracts to identify fraud with an accuracy of 97.96%.
According to Gera et al., several concerns are linked to the HIN sector, such as
fake HICs and claims unlawfully influenced by competent authorities [54]. This article
addresses these concerns by building a BLC-based HIN application. The consensus
guarantees that the HIN company’s claim procedure is carried out securely. In particular,
every transaction in the proposed approach is cryptographically signed and kept on
the BLC as a collection of blocks. This method protects HIC transactions and prevents
any fraudulent efforts. The IBM BLC technology and its underlying components are
used to create a prototype application. The experimental findings demonstrated that the
suggested implementation reduces HIC fraud.
According to Goyal et al., having health insurance is vital for everyone, especially
with rising medical expenditures, since medical crises may have a significant financial
and emotional effect [55]. However, the existing insurance system is too costly, and
the claim settlement procedure is overly protracted and cumbersome. Consequently,
policyholders cannot file an HIC with their insurance carrier. The authors of this study
provide a rapid and cost-effective framework for an HIN business using BLC technology
and ML. By constructing a smart contract, BLC may eliminate intermediary organiza-
tions, making the whole process easier, safer, and more efficient. The smart contract
pays the HIC based on the HINS’s documentation. A ridge regression model is used to
best compute premiums based on the total amount claimed during the current policy
duration and various other criteria. A random forest classifier is used to anticipate risk,
which aids in the calculation of risk-rated premium rebates. The suggested model’s
findings demonstrate that it is dependable, cost effective, and rapid. The whole HIC
processing method with fewer intermediaries and smart contracts makes the procedure
faster, and risk-rated premium rebates assist in incentivizing those with lower claims to
keep their insurance. It also prevented the additional cash created in the present HIN
system by dispersing it in risk-based rebates. Results also reveal that the random forest
classifier delivered higher accurate results out of the numerous multi-class classification
ML approaches.
Amponsah et al. suggest a BLC-based method to improve the financial sustainability
of HIN systems [56]. Poor data management, lengthy lines of communication, lack of
transparency among stakeholders in HIC processing, fraud, and corruption are the issues
confronting the HIN and jeopardizing its viability. This paper suggests a cloud-based
BLC approach to overcome these issues. According to the findings of this work, there
is a clear demonstration of communication line reduction, efficient management and
storage of data using the cloud, efficient HIC processing lifecycle, restricted data access,
hypothetical reduction in HIC processing, security, and high transparency in the system.
After evaluating the system’s read and write operations, it can be concluded that it
accomplishes its goals since all activities were completed in the world state and BLC
systems, respectively. The study also emphasizes the significance of information, service
quality, and user happiness in effectively implementing the cloud BLC-based solution.
The above discussion shows that cutting-edge technologies play vital roles in
e-health and HIC processing. However, existing studies mainly focus on improving
Healthcare 2023, 11, 2257 10 of 27
HIN acceptability and the security of HIN systems. Furthermore, existing studies
mainly focus on a particular technology instead of leveraging the potentials of com-
bination of technologies. We did not find any study that explicitly addresses fraud
detection and mitigation in the end-to-end HIC processing cycle. To address this gap,
we propose an end-to-end security model for HIN fraud detection using cutting-edge
technologies in the next section.
this layer for classifying legitimate and fraudulent HICs. The HIP will fetch the data of le-
gitimate HICs from this layer for further processing. Working of storage layer is elaborated
in Algorithm 3.
Figure 5.
Figure 5. Proposed
Proposed methodology.
methodology.
3.4.
3.1. Prediction
User LayerLayer
This
Threelayer
mainof users
the proposed SHINFDP
are involved in thewill leverageSHINFDP,
proposed AI’s potential to classify
including HICsHSP,
the HIP, into
legitimate
and HINS.and Thefraudulent
HINS is theHICs. This
insured layer who
patient will fetch HICthe
initiated data fromby
system theapproaching
cloud and will
the
clean the data for redundancy, missing values, and incorrect information.
HC for treatment. The insured patient can visit the HC in person or may contact The process of
the HSP
using a smart healthcare system (SHS). The HSP concerned with handling patients
assesses the HINS, checks his insurance policy, and sends him to the relevant HSP for
receiving treatment. The HSP includes various healthcare professionals (e.g., doctors,
paramedic staff, diagnostics/lab staff, pharmacist, etc.). The HSP performs the treatment
Healthcare 2023, 11, 2257 13 of 27
preparing data for analysis by deleting or changing data that is erroneous, incomplete,
irrelevant, redundant, or badly formatted is known as data cleaning. In order to clean
the data, suitable data cleaning technique of ML will be used. Data cleaning is one of
the important steps in ML; this process will detect missing or null values, outliers, and
erroneous data. The claim amount range for each treatment will be determined and
saved in the healthcare cloud repository. To identify outliers, the data’s lower and upper
bounds will be computed. Outliers are values that are both below and above the lower and
upper bounds. This will be accomplished by employing the appropriate ML algorithms
to find outliers in the data. The cleaning process will reduce the data size; after that,
data from different sources will be integrated and transformed into a uniform format for
preprocessing. Once the data is transformed, ML algorithms will be applied to this data
to classify it into legitimate and fraudulent data. The techniques used at this layer can
be SL, USL, or SSL, depending on the nature of the data. AI data analytics is the key to
minimizing the frequency of HIN fraud detection and the expense of false claims filed
against HIN policies. The working of prediction layer is elaborated in Algorithm 4.
detection include transparency, task automation, time saving, protection of HIN policy
documents, and risk assessment. The detailed working of the security layer is outlined
in Algorithm 5.
4. Framework Evaluation
In this section, we will show the details of framework evaluation using various
methods. We first evaluated the proposed framework using mathematical modeling. The
feasibility of the framework was assessed with the help of a focus group by evaluating
various parameters using concept mapping and Likert scale evaluation, and finally, a
case study of wearable devices was used to further elaborate and evaluate the proposed
framework. Below, we discuss these evaluation results in detail.
Healthcare 2023, 11, 2257 15 of 27
Figure 6 depicts the respondents of the focus group’s opinions regarding the usability
features of SHINFDP. E1, E2, E3, and E4 were positive statements, in which a higher
agreement percentage refers to more usability, while E5 was negatively assessing the
usability of SHINFDP. Figure 6 shows that the agreement percentage of E1, E2, E3, E4 is
more than the threshold value, while the agreement percentage of E5 is 43%. This shows
that SHINFDP is easy to use and is adaptable by healthcare organizations.
80%
60%
40%
20%
0%
E1 E2 E3 E4 E5
Usability evaluation of SHINFDP
Figure 6.
Figure 6. SHINFDP
SHINFDPevaluation
evaluationregarding “ease
regarding of use”
“ease criteria.
of use” criteria.
4.2.2. 2.
Table Evaluating the Security
Security evaluation ofFeatures
SHINFDP.of SHINFDP
Using the same pattern mentioned in “ease of use” evaluation, respondents of the
Security focus group were asked SAfive close-ended
A questions
D for
SDthe security
N evaluation
Total of Mean
SHINFDP. The questions and responses are given in Table 4, along with the total and
Using SHINFDP makes the HIN process
S1 3
average percentage of agreement. 3 1 0 0 6 85.7%
end-to-end secure.
Multilevel security is provided in
Table 4. Security evaluation of SHINFDP.
SHINFDP by first handling it at the
S2 Security cloud level using encryption 5 2SA A 0 D 0
SD N 0 Total 7Mean 100%
healthcare
Using SHINFDP
and then using BLC. makes the HIN process end-to-end
S1 3 3 1 0 0 6 85.7%
secure.
It is difficult for any stakeholder to
S3 Multilevel security 2 3 0 0 2 4 71%
manipulate the HINisclaim.
provided in SHINFDP by first
S2 handling it at the healthcare cloud level using encryption 5 2 0 0 0 7 100%
ML algorithms further improve security by
S4 and then using BLC. 3 3 0 0 1 5 71%
filtering HIN claims.
It is difficult for any stakeholder to manipulate the HIN
S5 S3 5G makes the HIN process more secure
claim. 2 22 3 1 0 10 2 2 4 371% 57%
ML algorithms further improve security by filtering HIN
S4 3 3 0 0 1 5 71%
claims. The security evaluation results are depicted in Figure 7; the agreement percentage
S5 5G makes the HIN process more secure
regarding the five mentioned elements 2 2 higher
was 1 1 the threshold
than 2 3 value.
57%This shows
that SHINFDP helps to improve the security of the HIN process.
Healthcare 2023, 11, x FOR PEER REVIEW 19 of 27
The security evaluation results are depicted in Figure 7; the agreement percentage
regarding the five mentioned elements was higher than the threshold value. This shows
that SHINFDP helps to improve the
Security security of
evaluation of SHINFDP
the HIN process.
57%
85.70%
S1
S2
71% S3
S4
S5
100%
71%
Figure 7.
Figure 7. Security
Securityevaluation
evaluationof SHINFDP.
of SHINFDP.
71%
Healthcare 2023, 11, 2257 19 of 27
Figure
Figure 8. A partial 8. Amap
concept partial
ofconcept map of the SHINFDP.
the SHINFDP.
In order
In order to evaluate thetofocus
evaluate the focus
group group respondents’
respondents’ understanding
understanding of SHINFDP,
of SHINFDP, we we
extracted eight relationships between concepts and asked the respondents
extracted eight relationships between concepts and asked the respondents to evaluate to evaluate
whether this
whether this relationship relationship
should should
exist or not. exist
Tableor3not. Table
shows the5 shows therelationships
selected selected relationships
and and
respondents’ responses.
respondents’ responses.
Table 3 shows that the respondents’ evaluation of SHINFDP is more than 70% for all
relationships. This shows that SHINFDP is easy to understand for healthcare professionals.
8 PL ⎯⎯⎯⎯⎯⎯⎯⎯⎯⎯⎯⎯⎯⎯⎯⎯⎯⎯ HCC 6 1 85.7%
Table 5 shows that the respondents’ evaluation of SHINFDP is more than 70% for all
relationships. This shows that SHINFDP is easy to understand for healthcare
Healthcare 2023, 11, 2257 professionals. 20 of 27
Figure9 9depicts
Figure depictsthethe responses
responses of focus
of focus group
group respondents
respondents regarding
regarding the evaluation
the evaluation
of SHINFDP’s structure. The agreement percentage for all three questions
of SHINFDP’s structure. The agreement percentage for all three questions was more was more than
70 percent,
than showing
70 percent, showingthatthat
SHINFDP
SHINFDP has
hasa simple
a simpleand
andeasy-to-understand structure.
easy-to-understand structure.
71%
85.70%
S1
S2
S3
71%
and keeping a healthy heart rate using WRD [62]. In 2016, a US-based HIN startup
established a platform to inspire and reward HINSs to partake in healthy activities using
a WRD. According to data collected from WRDs, the company offers HINSs challenges
and competitions, and in return, HINSs receive workout equipment, gift vouchers, and
lower HIN insurance rates [54]. Another US-based partner company provides free MI-fit
fitness trackers to all HINSs. This business is one of the first HIP companies to analyze
insurance premium rates for HINSs using WRD data. They connected their HIN account
to the HINS’s biometric data [54]. An HIN corporation located in France encourages
HINSs to exchange health-related personal data from a WRD. By sharing their WRD data,
HINS may earn fit points. This information is used in the firm’s insurance underwriting
procedure [63]. An Australian-based HIP startup also collaborated to incorporate HINS
data from different WRD trackers into their accounts. This information evaluates HIN
risks and sets rates [64]. As previously stated, the HIN business utilizes WRD data to
evaluate premium pricing and insurance risk assessment; however, it has not yet been
used for HIN fraud detection.
HIN fraudsters become smarter daily and develop new methods to commit fraud.
As a result, every HIN company must discover a new and enhanced future strategy to
prevent fraud utilizing a WRD’s data. As a result, we provide a case study to meet the
criteria mentioned above for HIN companies. Figure 10 depicts the working of the case
study that addresses HIN security and privacy concerns. The HINS is wearing several
WRD/sensors in Figure 10. The HIN company may provide the WRD for marketing and
fraud detection in HIC. The HINS WRD communicates with HINS smartphones through
Wi-Fi or Bluetooth. The data produced by the WRD is encrypted and digitally signed
before being saved in IPFS. The data from the HIP and HSP is encrypted, digitally signed,
and transferred to the fraud detection system. Data preparation follows data production
and involves data cleansing, integration, transformation, and reduction methods. The
HINS distributes permission for sharing personal healthcare data using a preset smart
contract before data preparation. The HIP business provides the public key to the HINS
and HSP. If an HINS approves exchanging personal health data, the HIN corporation
will reward the HINS. An AI algorithm is used to preprocess the data to determine if
the HIC is fraudulent or authentic. If a claim is genuine, the BLC network consensus
permits automatic HIC coverage payment to the HINS or HSP. However, if the HIC is
false, the HINS will pay a penalty.
The use of WRDs in a HIC has various advantages. It enhances the HINS’s involve-
ment with the HIP regularly and in real time. The WRD will be used to track the HINS’s
whereabouts. HINS location data and real-time health status may be used to determine
what occurred before, during, and after a hospitalization emergency. HIN corporations
may use this data to identify pain levels, prevent medication-seeking behavior, and
uncover inconsistent conduct with a HIC. Furthermore, BLC technology provides new
avenues for improving inefficiencies in the HIN market. It may benefit HIPs by improv-
ing security, lowering costs, and increasing confidence. BLC in the HIN business also
offers real-time data that may be utilized for risk evaluation, claims settlement, and
other purposes.
Based on the case study and existing state-of-the-art review, it can be concluded that
a combination of cutting-edge technologies, including BLC, 5G, cloud, AI, and wearable
devices, can improve the HIC process and make it more transparent. When HIC fraud
reduces, HIP firms will benefit from it, and HINSs will also benefit in the form of lower
HIN premium amounts. Academia and practitioners should provide easy solutions for
implementing these solutions in reality so that more people around the globe could
benefit from healthcare facilities.
Healthcare 2023, 11, x FOR PEER REVIEW 22 of 27
Figure 10.
Figure 10. A
A case
case study
study of
of HIC
HIC fraud detection.
fraud detection.
4.4. Discussion
Based on the case study and existing state-of-the-art review, it can be concluded that
a combination
A reducedofmortality
cutting-edgerate,technologies,
better healthincluding
outcomes, BLC,
and5G, cloud, AI,
increased and wearable
productivity are
devices,
all relatedcan
to improve the HIC
having health process and
insurance. make
Health it more also
insurance transparent.
makes itWheneasierHIC fraud
to receive
reduces, HIP
treatment. firms
Even will benefit
though from it,advantages,
it has many and HINSsmany will also benefit
people stillindothe form
not haveof health
lower
insurance,
HIN premium which puts their
amounts. physical, and
Academia emotional, and financial
practitioners shouldhealth
providein danger. One of the
easy solutions for
challenges
implementing thatthese
the HIN procedure
solutions must contend
in reality so that with
moreispeople
fraud with
aroundthe HIN. In this
the globe sort
could
of fraud,
benefit a health
from insurance
healthcare company is given information that is either false or deceptive
facilities.
to trick them into paying unauthorized benefits to the policyholder, another party, or
the
4.4. organization
Discussion delivering services. It is possible for the insured person or the supplier
of health services
A reduced to commit
mortality rate,the offence.
better health The majorityand
outcomes, of fraud is conducted
increased by HINSs
productivity are all
and HSPs; however, HIPs are also guilty of conducting fraud on
related to having health insurance. Health insurance also makes it easier to receiveoccasion, although their
involvement
treatment. Even in fraud
thoughis often
it haslimited
many to intentionally
advantages, delaying
many people thestill
processing of claims
do not have or
health
artificially understating their value. We presented a six-layered framework
insurance, which puts their physical, emotional, and financial health in danger. One of the that utilizes the
potentials
challengesofthatcutting-edge technologymust
the HIN procedure for safeguarding
contend withhealthcare datathe
is fraud with andHIN.
combating
In thisHIN
sort
fraud in order to make the HIN process smart and secure. An assessment of the suggested
of fraud, a health insurance company is given information that is either false or deceptive
framework was carried out with the assistance of mathematical modelling, an evaluation
to trick them into paying unauthorized benefits to the policyholder, another party, or the
of the industry that made use of the focus group approach, and a case study. The outcomes
organization delivering services. It is possible for the insured person or the supplier of
indicate that the suggested framework is straightforward, useful, secure, and adaptable to
health services to commit the offence. The majority of fraud is conducted by HINSs and
various circumstances.
HSPs; however, HIPs are also guilty of conducting fraud on occasion, although their
The proposed approach is different from the existing solutions [5,15,24,53–56] in the
involvement in fraud is often limited to intentionally delaying the processing of claims or
following ways:
artificially understating their value. We presented a six-layered framework that utilizes
• potentials
the Existing solutions mainlytechnology
of cutting-edge focus on afor particular technology
safeguarding and data
healthcare try toand
determine
combating its
potential in improving the HIN process;
Healthcare 2023, 11, 2257 23 of 27
• Existing solutions discuss the benefits of using BLC in the HIN process, but they do not
evaluate the solution due to the limitation of there being less use of BLC in healthcare;
• The existing studies used a single method of evaluation, while the proposed solution
is evaluated using hybrid approach (mathematical modeling, focus group study, and
industrial case study), which shows the generalizability of research findings;
• Existing studies mainly emphasize the adaptability of the HIN process and provide
various techniques for it. Furthermore, there exist no solutions that specifically address
the end-to-end HIN process cycle security.
Author Contributions: Conceptualization, F.A.-Q.; data curation, S.T.; formal analysis, M.H.; funding
acquisition, F.A.-Q.; investigation, M.H.; methodology, F.A.-Q. and M.H.; project administration,
F.A.-Q. and S.T.; visualization, S.T.; writing—original draft, M.H. All authors have read and agreed to
the published version of the manuscript.
Funding: This work was funded by the Deanship of Scientific Research at Jouf University under
grant No. DSR2023-NF-09.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: Not applicable.
Healthcare 2023, 11, 2257 24 of 27
Acknowledgments: This work was funded by the Deanship of Scientific Research at Jouf University
under grant No. DSR2023-NF-09.
Conflicts of Interest: The authors declare no conflict of interest.
Abbreviations
References
1. Rajawat, A.S.; Bedi, P.; Goyal, S.B.; Shaw, R.N.; Ghosh, A.; Aggarwal, S. Ai and blockchain for healthcare data security in smart
cities. In AI and IoT for Smart City Applications; Springer: Singapore, 2022; pp. 185–198.
2. Li, J.; Lan, Q.; Zhu, E.; Xu, Y.; Zhu, D. A Study of Health Insurance Fraud in China and Recommendations for Fraud Detection
and Prevention. J. Organ. End User Comput. 2022, 34, 1–19. [CrossRef]
Healthcare 2023, 11, 2257 25 of 27
3. Lavanya, S.; Kumar, S.M.; Kumar, P.M. Machine Learning Based Approaches for Healthcare Fraud Detection: A Comparative
Analysis. Ann. Rom. Soc. Cell Biol. 2021, 25, 8644–8654.
4. Huang, X.; Wu, B. Impact of urban-rural health insurance integration on health care: Evidence from rural China. China Econ. Rev.
2020, 64, 101543. [CrossRef]
5. Saldamli, G.; Reddy, V.; Bojja, K.S.; Gururaja, M.K.; Doddaveerappa, Y.; Tawalbeh, L. Health care insurance fraud detection using
blockchain. In Proceedings of the 2020 Seventh International Conference on Software Defined Systems (SDS), Paris, France, 20–23
April 2020; pp. 145–152.
6. van der Wielen, N.; Channon, A.A.; Falkingham, J. Does insurance enrolment increase healthcare utilisation among rural-dwelling
older adults? Evidence from the National Health Insurance Scheme in Ghana. BMJ Glob. Health 2018, 3, e000590. [CrossRef]
[PubMed]
7. Sheshasaayee, A.; Thomas, S.S. A purview of the impact of supervised learning methodologies on health insurance fraud
detection. In Information Systems Design and Intelligent Applications, Proceedings of Fourth International Conference INDIA 2017;
Springer: Singapore, 2018; pp. 978–984.
8. Michaela, S.M.; Nurmalasari, M.; Hosizah, H. Fraud in healthcare facilities: A Narrative Review. Public Health Indones. 2021, 7, 166–171.
[CrossRef]
9. Okuzu, O.; Malaga, R.; Okereafor, K.; Amos, U.; Dosunmu, A.; Oyeneyin, A.; Adeoye, V.; Sambo, M.N.; Ebenso, B. Role of digital
health insurance management systems in scaling health insurance coverage in low- and Middle-Income Countries: A case study
from Nigeria. Front. Digit. Health 2022, 4, 1008458. [CrossRef]
10. Chakravarthi, D.S.; Barot, H.; Kalkar, P.; Aute, K.; Gangurde, P. Health Insurance-It’s Potential and Distribution Avenues in India.
J. Posit. Sch. Psychol. 2022, 6, 7148–7158.
11. Tien, C. Elements Influencing The Acceptance Of Digital Transformation in Health Insurance Management Of Students. Ir. J.
Educ. Pract. 2022, 5, 1.
12. R. a. markets, Global Health Insurance Market (2022–2027) by Plan Type, Duration, Application, Coverage, Type, Age Group,
Geography, Competitive Analysis and the Impact of COVID-19 with Ansoff Analysis. 2022. Available online: https://www.
researchandmarkets.com/reports/5669313/global-health-insurance-exchange-market-2022 (accessed on 12 July 2023).
13. Gee, J.; Button, M. The Financial Cost of Healthcare Fraud 2014: What Data from Around the World Shows. 2014. Available
online: https://pure.port.ac.uk/ws/portalfiles/portal/17778625/The_Financial_Cost_of_Healthcare_Fraud_Report_2014_11.
3.14a.pdf (accessed on 12 July 2023).
14. Amponsah, A.A.; Adebayo, F.A.; Weyori, B.A. Blockchain in Insurance: Exploratory Analysis of Prospects and Threats. Int. J. Adv.
Comput. Sci. Appl. 2021, 12, 1. [CrossRef]
15. Thaifur, A.Y.B.R.; Maidin, M.A.; Sidin, A.I.; Razak, A. How to detect healthcare fraud? A systematic review. Gac. Sanit.
2021, 35, S441–S449. [CrossRef]
16. Shi, Y.; Sun, C.; Li, Q.; Cui, L.; Yu, H.; Miao, C. A fraud resilient medical insurance claim system. In Proceedings of the Thirtieth
AAAI Conference on Artificial Intelligence, Phoenix, AZ, USA, 12–17 February 2016.
17. Kapadiya, K.; Patel, U.; Gupta, R.; Alshehri, M.D.; Tanwar, S.; Sharma, G.; Bokoro, P.N. Blockchain and AI-Empowered Healthcare
Insurance Fraud Detection: An Analysis, Architecture, and Future Prospects. IEEE Access 2022, 10, 79606–79627. [CrossRef]
18. Ai, J.; Russomanno, J.; Guigou, S.; Allan, R. A Systematic Review and Qualitative Assessment of Fraud Detection Methodologies
in Health Care. North Am. Actuar. J. 2021, 26, 1–26. [CrossRef]
19. Thesmar, D.; Sraer, D.; Pinheiro, L.; Dadson, N.; Veliche, R.; Greenberg, P. Combining the Power of Artificial Intelligence with the
Richness of Healthcare Claims Data: Opportunities and Challenges. Pharmacoeconomics 2019, 37, 745–752. [CrossRef]
20. Cao, H.; Zhang, R. Using PCA to improve the detection of medical insurance fraud in SOFM neural networks. In Proceedings of
the 2019 3rd International Conference on Management Engineering, Software Engineering and Service Sciences, Wuhan, China,
12–14 January 2019; pp. 117–122.
21. Shamitha, S.; Ilango, V. A time-efficient model for detecting fraudulent health insurance claims using Artificial neural net-
works. In Proceedings of the 2020 International Conference on System, Computation, Automation and Networking (ICSCAN),
Pondicherry, India, 3–4 July 2020; pp. 1–6.
22. Liu, W.; Yu, Q.; Li, Z.; Li, Z.; Su, Y.; Zhou, J. A blockchain-based system for anti-fraud of healthcare insurance. In Proceedings of
the 2019 IEEE 5th International Conference on Computer and Communications (ICCC), Chengdu, China, 6–9 December 2019;
pp. 1264–1268.
23. Mendoza-Tello, J.C.; Mendoza-Tello, T.; Mora, H. Blockchain as a Healthcare Insurance Fraud Detection Tool. In Springer
Proceedings in Complexity; Springer: Cham, Switzerland, 2021; pp. 545–552.
24. Ismail, L.; Zeadally, S. Healthcare Insurance Frauds: Taxonomy and Blockchain-Based Detection Framework (Block-HI). IT Prof.
2021, 23, 36–43. [CrossRef]
25. Humayun, M.; Jhanjhi, N.Z.; Niazi, M.; Amsaad, F.; Masood, I. Securing Drug Distribution Systems from Tampering Using
Blockchain. Electronics 2022, 11, 1195. [CrossRef]
26. Yeow, C.-N.; Tay, L.-Y.; Lye, C.-T.; Fauzi, E.P. Why do Malaysian Young Adults Buy Health Insurance? J. Int. Business Econ. Entrep.
2021, 6, 46. [CrossRef]
27. Brahmana, R.K.; Brahmana, R.K.M.; Memarista, G. Planned behaviour in purchasing health Insurance. South East Asian J.
Manag. SEAM 2018, 12, 53–64.
Healthcare 2023, 11, 2257 26 of 27
28. Bovbjerg, R.; Hadley, J. Why health insurance is important. In Health Policy Briefs; The Urban Institute: Washington, DC, USA, 2007.
29. Nayak, B.; Bhattacharyya, S.S.; Krishnamoorthy, B. Application of digital technologies in health insurance for social good of
bottom of pyramid customers in India. Int. J. Sociol. Soc. Policy 2019, 39, 752–772. [CrossRef]
30. Agustina, R.; Dartanto, T.; Sitompul, R.; Susiloretni, K.A.; Suparmi, M.K.M.; Achadi, E.L.; Taher, A.; Wirawan, F.; Sungkar, S.;
Sudarmono, P.; et al. Universal health coverage in Indonesia: Concept, progress, and challenges. Lancet 2019, 393, 75–102.
[CrossRef]
31. He, X.; Alqahtani, S.; Gamble, R. Toward privacy-assured health insurance claims. In Proceedings of the 2018 IEEE International
Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber,
Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018;
pp. 1634–1641.
32. Khezr, S.; Moniruzzaman, M.; Yassine, A.; Benlamri, R. Blockchain Technology in Healthcare: A Comprehensive Review and
Directions for Future Research. Appl. Sci. 2019, 9, 1736. [CrossRef]
33. Greco, L.; Percannella, G.; Ritrovato, P.; Tortorella, F.; Vento, M. Trends in IoT based solutions for health care: Moving AI to the
edge. Pattern Recognit. Lett. 2020, 135, 346–353. [CrossRef]
34. Peng, Y.; Kou, G.; Sabatka, A.; Chen, Z.; Khazanchi, D.; Shi, Y. Application of clustering methods to health insurance fraud
detection. In Proceedings of the 2006 International Conference on Service Systems and Service Management, Troyes, France,
25–27 October 2006; pp. 116–120.
35. Rawte, V.; Anuradha, G. Fraud detection in health insurance using data mining techniques. In Proceedings of the
2015 International Conference on Communication, Information & Computing Technology (ICCICT), Mumbai, India,
15–17 January 2015; pp. 1–5.
36. Verma, C.; Stoffova, V.; Illes, Z.; Tanwar, S.; Kumar, N. Machine Learning-Based Student’s Native Place Identification for Real-Time.
IEEE Access 2020, 8, 130840–130854. [CrossRef]
37. Settipalli, L.; Gangadharan, G.R. Healthcare fraud detection using primitive sub peer group analysis. Concurr. Comput. Pr. Exp.
2021, 33, e6275. [CrossRef]
38. Dua, P.; Bais, S. Supervised learning methods for fraud detection in healthcare insurance. In Machine Learning in Healthcare
Informatics; Springer: Berlin/Heidelberg, Germany, 2014; pp. 261–285.
39. Waghade, S.S.; Karandikar, A.M. A comprehensive study of healthcare fraud detection based on machine learning. Int. J. Appl.
Eng. Res. 2018, 13, 4175–4178.
40. Palacio, S.M. Abnormal Pattern Prediction: Detecting Fraudulent Insurance Property Claims with Semi-Supervised Machine-
Learning. Data Sci. J. 2019, 18, 35. [CrossRef]
41. Gajendran, N. Blockchain-Based secure framework for elearning during COVID-19. Indian J. Sci. Technol. 2020, 13, 1328–1341.
42. Nasir, M.H.; Arshad, J.; Khan, M.M.; Fatima, M.; Salah, K.; Jayaraman, R. Scalable blockchains—A systematic review.
Future Gener. Comput. Syst. 2022, 126, 136–162. [CrossRef]
43. Saranya, R.; Murugan, A. A systematic review of enabling blockchain in healthcare system: Analysis, current status, challenges
and future direction. Mater. Today Proc. 2021, 80, 3010–3015. [CrossRef]
44. Al Asad, N.; Elahi, M.T.; Al Hasan, A.; Yousuf, M.A. Permission-based blockchain with proof of authority for secured healthcare
data sharing. In Proceedings of the 2020 2nd International Conference on Advanced Information and Communication Technology
(ICAICT), Dhaka, Bangladesh, 28–29 November 2020; pp. 35–40.
45. Hölbl, M.; Kompara, M.; Kamišalić, A.; Nemec Zlatolas, L. A systematic review of the use of blockchain in healthcare. Symmetry
2018, 10, 470. [CrossRef]
46. McGhin, T.; Choo, K.-K.R.; Liu, C.Z.; He, D. Blockchain in healthcare applications: Research challenges and opportunities. J. Netw.
Comput. Appl. 2019, 135, 62–75. [CrossRef]
47. Javaid, M.; Haleem, A.; Singh, R.P.; Suman, R. 5G technology for healthcare: Features, serviceable pillars, and applications.
Intell. Pharm. 2023, 1, 2–10. [CrossRef]
48. Li, D. 5G and intelligence medicine—How the next generation of wireless technology will reconstruct healthcare? Precis. Clin.
Med. 2019, 2, 205–208. [CrossRef]
49. Nirjhor, M.K.I.; Yousuf, M.A.; Mhaboob, M.S. Electronic medical record data sharing through authentication and integrity
management. In Proceedings of the 2021 2nd International Conference on Robotics, Electrical and Signal Processing Techniques
(ICREST), DHAKA, Bangladesh, 5–7 January 2021; pp. 308–313.
50. Ahad, A.; Tahir, M.; Sheikh, M.A.; Ahmed, K.I.; Mughees, A.; Numani, A. Technologies Trend towards 5G Network for Smart
Health-Care Using IoT: A Review. Sensors 2020, 20, 4047. [CrossRef]
51. Chen, M.; Yang, J.; Zhou, J.; Hao, Y.; Zhang, J.; Youn, C.-H. 5G-Smart Diabetes: Toward Personalized Diabetes Diagnosis with
Healthcare Big Data Clouds. IEEE Commun. Mag. 2018, 56, 16–23. [CrossRef]
52. Hartmann, M.; Hashmi, U.S.; Imran, A. Edge computing in smart health care systems: Review, challenges, and research directions.
Trans. Emerg. Telecommun. Technol. 2022, 33, e3710. [CrossRef]
53. Amponsah, A.A.; Adekoya, A.F.; Weyori, B.A. A novel fraud detection and prevention method for healthcare claim processing
using machine learning and blockchain technology. Decis. Anal. J. 2022, 4, 10012. [CrossRef]
Healthcare 2023, 11, 2257 27 of 27
54. Gera, J.; Palakayala, A.R.; Rejeti, V.K.K.; Anusha, T. Blockchain technology for fraudulent practices in insurance claim process. In
Proceedings of the 2020 5th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India,
10–12 June 2020; pp. 1068–1075.
55. Goyal, A.; Elhence, A.; Chamola, V.; Sikdar, B. A blockchain and machine learning based framework for efficient health insurance
management. In Proceedings of the 19th ACM conference on embedded networked sensor systems, New York, NY, USA,
15–17 November 2021; pp. 511–515.
56. Amponsah, A.A.; Adekoya, A.F.; Weyori, B.A. Improving the Financial Security of National Health Insurance using Cloud-Based
Blockchain Technology Application. Int. J. Inf. Manag. Data Insights 2022, 2, 100081. [CrossRef]
57. Humayun, M.; Jhanjhi, N.Z.; Almotilag, A.; Almufareh, M.F. Agent-Based Medical Health Monitoring System. Sensors 2022, 22, 2820.
[CrossRef]
58. Ates, H.C.; Nguyen, P.Q.; Gonzalez-Macia, L.; Morales-Narváez, E.; Güder, F.; Collins, J.J.; Dincer, C. End-to-end design of
wearable sensors. Nat. Rev. Mater. 2022, 7, 887–907. [CrossRef]
59. Humayun, M.; Jhanjhi, N.Z.; Almotilag, A. Real-Time Security Health and Privacy Monitoring for Saudi Highways Using
Cutting-Edge Technologies. Appl. Sci. 2022, 12, 2177. [CrossRef]
60. Nayak, B.; Bhattacharyya, S.S. The Changing Narrative in the Health Insurance Industry: Wearables Technology in Health
Insurance Products and Services for the COVID-19 World. J. Health Manag. 2020, 22, 550–558. [CrossRef]
61. Gupta, R.; Thakker, U.; Tanwar, S.; Obaidat, M.S.; Hsiao, K.-F. Bits: A blockchain-driven intelligent scheme for telesurgery
system. In Proceedings of the 2020 International Conference on Computer, Information and Telecommunication Systems (CITS),
Hangzhou, China, 5–7 October 2020; pp. 1–5.
62. McCrea, M.; Farrell, M. A Conceptual Model for Pricing Health and Life Insurance Using Wearable Technology. Risk Manag.
Insur. Rev. 2018, 21, 389–411. [CrossRef]
63. Humayun, M.; Jhanjhi, N.; Alamri, M. Smart secure and energy efficient scheme for e-health applications using IoT: A review. Int.
J. Comput. Sci. Netw. Secur. 2020, 20, 55–74.
64. Akande, A. Disruptive Power of Blockchain on the Insurance Industry. Master’s Thesis, Universiti of Tartu, Institute of Computer
Science, Tartu, Estonia, 2018.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.