Wednesday, April 3, 2019
Automation in insurance underwriting processes
mechanisation in damages underwriting summonsesAbstractUnderwriting is one of the importeeant attendes in restitution operations. The appli fuckts study, including various kinds of medical in coiffeion, must(prenominal) be evaluated before the indemnity troupe base decide to accept the occupation. These activities be norm all in ally supported by impact automation facility. However, the support of exception use mechanism and the monitor of verso date in those summons automation solutions be usually inadequate. This results in a low efficiency of the underwriting operations or pull down loss of task opportunities. To amountress the problem, this nucleotide presents an Alert- resurrectd Underwriting establishment (AUS), which handles the exception vitrines and monitors the constituteback measure with the concept of appalls. We bring forward instance how weather vane go relieve cipher scarper integration and process conferences.1. IntroductionLife pol icy provides security mea certain against the economic loss ca utilize by the death of the person whose life is see to it 1. Because of its popularity, it is a condescension where numerous insurance companies allocate many resources in order to gain to a greater extent(prenominal) market sh atomic number 18. A life insurance indemnity defines the terms and conditions for the potential client, particularly the situations under which the insurance familiarity promises to comport a benefit upon death 2. Since life insurance products cornerstone provide a stable cash in catamenia for an insurance alliance, in that respect is a trend that insurance companies market various life products, such as investment-linked life products, savings life products and critical illness protection, in order to attract more customers with unlike of necessity.Although life insurance occupancy flowerpot devolve financial benefits to the insurance company, the company still take ups to bear financial responsibility to pay the insured under nearly agreed conditions, e.g., the insured dies during a specified period. The insurance depart brass section the consequence of financial loss if the company accepts likely clients, who present super high risks and when about(a) of these insured persons die soon after(prenominal) constitution issuance. High quality processes atomic number 18 necessary to assess the degree of risks associated with each(prenominal) practical operation of life insurance. Underwriting (which is alike known as sore line of credit) is a process of assessing and classifying the degree of risk represented by a prospective client and making a decision to accept or line of descent the insured.The world of electronic collaboration is developing rapidly, introducing new technology and new ways of collaboration. The success of collaboration often depends on the ability of a corporation non only to make sure that their diligences are dynamic, except also to primary(prenominal)tain a high degree of interoperability with collaboration partners.In this paper, we present an Alert- compound Underwriting brass (AUS) as a collaboration platform for streamlining the work flow of insurance underwriting processes. AUS makes use of an Event-Condition-Action (ECA) collaboration model 13 to manage event handling, process integration, and snappish/exception management for the process flow of the underwriting operations.The rest of the paper is organized as follows. plane section 2 discusses some link work and background requirements. Section 3 describes corpse design and performance for our AUS. Section 4 concludes our paper with our continue research work that look forwards to possible enhancements.2. Background and Related WorkElectronic selective information step in (EDI) essentially defined the technology of electronic collaboration in the past. However, EDI is an valuable solution, due to its high cost of network inf rastructure and formation integration. In addition, security issues of EDI also limited corporations from directly accessing the computing resources of its trading partners, which used firewall-unfriendly protocols. Therefore, developers start out to find some other technologies which have a low cost, negotiable software product solution that allows corporations to build new applications in response to changing business needs while adhering to a defined electronic business standard 10.Recently, numerous vendors have offered solutions to support both XML (eXtensible Markup Language) and EDI formats for collaboration. unmatchable of the solutions is the sack of information amidst companies XML-to-EDI. Transformation is critical to an edge integration strategy that brings together B2B collaboration and try application at the boundary of an enterprise in order to enable the back-end connectivity and workflow demand to support a complete business process 11.In the XML world, e-Business XML (ebXML) 12 is a modular suite of specifications which are initiatively designed for electronic interoperability. The strength of the ebXML architecture is that it provides a simulation for electronic business collaboration. The architecture enables businesses to work together to specify business process, discover one a nonher(prenominal), negotiate collaboration obligations, and execute business processes. However, although ebXML implementations are already being announced, the rate of deployment of ebXML is not quickly accelerated. Many companies are taking a wait-and-see approach until ebXML becomes a importantstream in the market.2.1. Key attend toes and integrating learn 1 illustrates a typical underwriting process, which usually consists of the following cardinal secernate activitiesPerforming field underwriting,Reviewing the application for insurance,Gathering additive information to make a sound decision, andMaking an underwriting decision on the gr apheme 3However, before a new eluding is sent to an insurance firm for bear upon, at that place are other activities subscribe todPacking application forms and other memorials from the componentInitial subvention payment through the cashier entry systemData entry of new application in a outgrowth or zona note see archives into ranges for workflow processing gauge Check (QC) and Indexing on the s pratned documentsRelease of the validated and s endurened documents frames into workflow locomotive engine for move on processingIn the traditional way of performing the activities 1 to 5 without any automation processes, it incurs high cost in compassionate resource, storage cost, and paper work, together with a high turnaround quantify. That direction it causes the insurance underwriter to spend a long time to handle a new application. This affects the insurance companys reputation and may further induces financial losings or even legal penalties.With the advent of infor mation technology, most of the higher up activities are linked together to streamline the workflow for processing a new business, starting from receiving documents from an constituentive role, ending at the underwriter getting the subject field from workflow system and issuing new policy if approved.Some benefits accrued to the business for automating the completed underwriting processesImprovement of the service quality (such as turnaround time)Reduce of the risk of losing submitted documents during deliveryTransfer of applications to the next step of the process immediatelyBetter control of risk management such that some cases (i.e., excess of coverage limit) rump only be approved by senior underwritersThe key integration of the processes between the agents and the underwriters are as follows.Images and Data Transfer Process This activity is an automated process and does not contain any manual operation unless the sub-system is down or errors / inconsistency communicatered during the take away. The intent of this process is to transfer the s foundationned images and superpowered entropy from a tell apart or zone spatial relation to the substitution seat for importing into the workflow system. If the network gene linkage between a branch or zone office and the commutation office is a private connection (i.e., leased line), the operation is barely a simple transfer of document images into the rouse innkeeper in the central office with an XML lodge including all the indexed entropy. If the network connection between both sides is public (i.e., the Internet) and it is not a Virtual Private mesh (VPN) connection, consequently the interactions require other security measures as described in later sections. mo Robot and Workflow railway locomotive They are placed at the central office of an insurance company. The engine waits for the image files and XML info to be uploaded from the branch or zone office and verify the XML information int egrity with the appropriate XML Schema. The imported document images and indexed data are installed into the actual workflow routing engine for case assignment to appropriate underwriters for further case approval.2.2. Requirements Overview of StakeholdersIn automated underwriting processes architecture, a workflow engine (e.g., eistream 9) is deployed at the central office. This engine can efficiently route reflect assignments to appropriate underwriters. The processing performed with the workflow engine is usually referred to as post-processing of the workflow. There are many pre-processing activities, which must be completed before those new insurance applications can be imported into the workflow engine for further underwriting. Figure 2 depicts a use case diagram of the underwriting process. The key stakeholders involved are discussed as follows. federal agent He/she is an authorized representative to sell insurance products on behalf of an insurance company. The agents have the responsibilities to perform a simple cope with first by gathering initial information about prospective clients and screening applications who have requested coverage 4. They have to gather indispensable documents (such as health certificate) from the prospective client in order to travel rapidly up the underwriting process. Email access or Internet portal are the prompt means for agents to communicate with an insurance company. sunder Entry For a new application of life insurance, the prospect client is required to pay the initial premium in the form of cash or check. The heart of premium is also dependent on the payment mode of the proposed policy. The agent has to submit the initial premium with the application. The cashier entry will stack up the initial premium and put a premium receipt discharge in a Premium Collection body. The Cashier Entry also files the application forms and documents for data entry.Data Entry A user in branch/zone office enters the informati on recorded on the application form, such as the policy owner information, proposed insured information or medical information, etc., into the underwriting front-end input system.Scanning officeholder When a scan policeman receives the documents, including application form, from an agent, he/she will try to sort and classify the documents into different document types (such as health certificates, identity proofs), and then scan them into images for auditable financial backing as nearly as indexing and quality check (QC). The application form is scanned just for auditable backup because the data has already been entered.Index and QC Officer After the submitted documents have been scanned into images, the index and QC ships ships officers (it may involve two individual(a)s) will try to index the field on several regions of a scanned image and save the indexed data into the database, so that the indexed data can be adhered with the be images and imported into the workflow sys tem. If the index officer discovers that the image quality of scanned document is not good, the document must be rescanned until the image quality of the document is acceptable for indexing. insurance agent An underwriter is assigned with a case (new or pending case) by the workflow engine. The underwriter carries out an assessment process by considering the submitted documentations, medical information, other personal factors like age, driving history, tobacco plant use, career nature, and financial factors of the potential client, etc. Then, the underwriter will hold back whether the application is approved, pended for additive proofs or documentation, counter-offered to the applicant, or rejected.2.3. Alert and Exception discourseAlthough most of the activities starting from submitting documents in branch or zone office to the back-end underwriting processes are automated, there are still many events, both business-oriented and technology-oriented, must be handled in order t o streamline and speed up the entire underwriting process.Exceptions are events that can drive not only reactions performed by business parties 6, but also information exchanged within an brass section, across physiologic boundaries (e.g., segments located in different geographical areas) or within (e.g., underwriting department and printing service department located in the same building) individual organizational boundary. In order to handle the exceptions and monitor the exception handling process, (especially those important and / or with urgency requirements), Chiu et al. 6 proposed the use of alerts to model and implement this. The key differences between alerts and exceptions are that alerts represents passs sent to a soft touch, usually with time and urgency constraints, and that alerts are monitored and tracked. That means, to handle an exception, an Alert Management System (AMS) sends an alert gist to a handler (human or system) and keeps track of the process until the handling job is finished.In this application, the main objective of applying alerts is the concern about the turnaround time in the insurance application process. Some key exceptions and alerts generated by the main stakeholders are listed as follows.Agent Cancellation of an insurance application can sparkle an alert to the central office so that the workflow system can change the application experimental condition (if it has been imported into workflow engine) into pending status and no more human resource will be extra on this application. The application will ultimately be cancelled after the cancellation form is scanned and imported into the workflow system. The AMS can therefore make sure that the case is closed within a reasonable time limit.Cashier Entry An alert can be generated when the agent submits an initial premium payment for the new applicant but only part of initial premium has been settled. The alert can notify the central office underwriter to solve the ap plication case if the case has been pended for the reason of insufficient premium.Scanning Officer Exceptions can be generated if the agent submits vague type of documents or forms. If the workflow automation system does not know how to handle the unknown type documents or forms, then unknown document alert can notify the corresponding agent about this issue and urge him/her to effect this within a certain period.Index and QC Officer A written document Rescan alert can be generated to the scanning officer if the index officer finds the document image quality is too poor to be indexed. A QC officer can also generate a Reindex alert if he/she found that an index officer did not correctly index the fields on document images. QC officer can also trigger enrolment Rescan alert if he/she found the quality of document image is unimaginable even the index officer has accepted the quality of document image.Underwriter An Insufficient Initial Premium alert can be generated so that the agent can be notified that the initial premium must be settled before the policy can be issued even all the underwriting checks are passed for the case. This situation may occur when the client paid the initial premium with check but the check could not be cleared.On the other hand, exceptions and alerts can be generated by automated processes, such as the followingImages and Data Transfer Process A Transfer exception can be triggered if the transfer process of images and XML data to the central office file server is not completed or failed/aborted at some points (because of the stability of network connection). An alert can then notify the MIS staff in the branch or zone office to investigate the root cause of transfer failure and resume the transfer process as soon as possible. An alert can be triggered after the transfer process of the branch or zone office is completed successfully, so that the import robot resided on the workflow engine can start the data verification process and import the images and data into workflow system. This helps to disregard the total time for processing of new applications and monitor pending cases. import Robot and Workflow Engine A Data Inconsistency alert is sent to the agent if the import robot checks that the XML data uploaded from the branch or zone office contains inconsistency after validating with XML schema. This alert urges the agent to repeat or fix the images and data upload process.Workflow Engine An Application Pending alert is triggered to the agent who submitted an application for his/her client when the underwriter changes the new application status to pending because additional documentation is required. This alert urges the agent to contact its customer for the germane(predicate) documents before he receives an appointed document request letter from the insurance company, as applicants may need time to present documents, like health certificates or financial statements issued by banks.2.4. Relationshi p management requirementsAlerts and exceptions are not only dedicated to handling abnormal or unhoped events. These can be used to enhance the relationship between insurance company and potential customers (B2C). For exampleApplicants can be notified by email with the progress of its life insurance application. On the other hand, the agent can contact his applicants promptly after he receives an acknowledgement email. Reminder alerts can be sent to the agent in the form of SMS to remind him/her to contact his/her applicant to collect required additional documents to process a pending application. This helps reduce the risk of insurance application being cancelled after an application has been pending for some time. This is because the customer may not know that insurance company requests more additional documents from him in case the agent does not contact him. This also reduces the ascertain of giving a negative image to the potential customers of poor operate.3. System Design a nd ImplementationIn this section, we present the system design and implementation for our AUS, which intromits the system architecture, various system components, meshing services security, and an example scenario.3.1. System ArchitectureFigure 3 shows the overall system architecture for our AUS. We add on top of the existing enterprise information systems four main components in the backend AUS Web goods Agent, pith emcee, Alert Management System (AMS), and Event-Condition-Action (ECA) rules database that defines the actions to be triggered under some predefined conditions. We discuss the functionalities of these components in the following subsections.One of the main problems in the current process automation is the effectiveness of converse among different stakeholders and systems involved in the entire process of underwriting. Based on the above discussions, we design an AUS establish on exceptions and alerts as the unifying communication platform within the entire underwr iting processes. On this platform, we choose to use Web serve with slime protocol for the communication and Message Server (such as Microsoft MSMQ 8) for the underlying message (exceptions and alerts) processing. The reasons why we choose Web services with SOAP protocol in our platform are as followsWeb services can be invoked over the Internet or intranet, within or outside the firewall. For example, some processes like document scanning or image indexing may be located in the central office or outsourced to other service providers.Less development time is required to deploy Web service features from existing application, especially with the tools and libraries provided.It supports synchronous (RPC) and asynchronous messaging.SOAP has been implemented on many different hardware and software platforms.SOAP can be protected under the Web Service security 7 standard.3.2. Web Services AgentIn our system, Web services technology is chosen to support the communication between the AUS b ackend systems and other front-end, sub-systems in branches and zone offices, as comfortably as external agents and clients. The Web Services Agent transforms the incoming messages, which are in the form of XML data enter in SOAP (Simple Object Access Protocol) 14, into native message formats that can be sent into the queues of the central message server. The Web Services Agent also transforms the alerts and exceptions from the form of native message format into the XML/SOAP format and uses HTTP protocol to send the XML message to the branch/zone offices systems through single Web services.A sample SOAP messages from a client system is shown in Figure 4. This message describes the indexed data and images to be uploaded to the file server in the insurance headquarter after scanning operations have been performed on the submitted documents in branch and zone offices. Figure 5 shows a response message from the AUS that describes an alert from the Transfer Module in a branch or zone office and notifies the MIS staff to handle the exception.3.3. Message ServerThe message server comprises of application queues and system queues and the server manages the received data (i.e., incoming XML/SOAP messages, internal MSMQ messages from other enterprise systems, and alert messages from the AMS and routes the messages to the target (subscribed) parties. For example, when the Transfer Module sends a Web service message to the AUS, the message is put into two waiting queues one for the Import Robot and another for the AMS (so that the AMS can monitor the progress of the Import Robot). When the Import Robot has corroborate the integrity of uploaded data and images, it sends a message to inform the AMS of job completion, or a Data Inconsistency alert in case of data inconsistency. These messages triggers events so that the AMS issues new alert/exception messages upon on the conditions in the event repository database to related parties for further actions (as discussed in S ection 2.3) found on the ECA rules defined by the administrators.The reasons why we choose the Message Server as a core component in managing data communication are as followsMost of the message servers support Web service functionality.Message servers support guaranteed message delivery.Asynchronous message communication as well as publish-and-subscribe can be supported.3.4. Alert Management System (AMS)The main role of the AMS is to manage the alerts. It also captures the events and exceptions (i.e., MSMQ native message format) submitted by other parties. Alerts are generated establish on the ECA rules specified in database to the appropriate parties. It further transforms the alerts into a MSMQ message and put it on the waiting queue for Web Services Agent for the delivery. Further details of the mechanism of the AMS, including descriptions of the ECA rules, can be found in our earlier paper 6. We apply the same AMS staff except that we include a message server component to fur ther increase the messaging reliability.3.5. Example ScenarioIn this subsection, we use a scenario to illustrate the system flow in our AUS. Figure 6 depicts the process flow for this scenario. First, a Scan Station prepares a XML data file which contains the policy number and other indexed data for the scanned documents. When the XML file is ready, the Transfer Module uploads the XML file and document image files into the central file server. Upon completion, the Transfer Module generates a SOAP message, which details the uploaded data to Web Services Agent in order to notify the Import Robot to verify the integrity of uploaded data and images.After the verification, the Import Robot generates the verification result event and the AMS captures the data uploaded event from the Transfer Module together with the event generated by the Import Robot, and returns the appropriate events back to the Scan Station and Scan Officer based on ECA rules processing.3.6. Web Service SecurityWeb se rvices conflate applications inside and outside the organization. However, distributed computing always has a challenging set of security issues. Identities and messages are two of the greatest security challenges brought on by Web services. Web services transport potential unknown entities into your organization and messages are transported from one place to another place through an unbarred channel, the Internet. Therefore, actions must be interpreted to safeguard the information exchanged among the evidence parties. XML Encryption and XML Signature are used to address the protection of naked data and the identification of identity of data sender respectively 15. Figure 7 shows an unprotected SOAP message that contains payment information for an insurance policy. Figure 8 shows how encrypted messages and soupcon are put in a SOAP envelop.The fraction block contains the encrypted form of payment information. The element contains the XML signature for payment data. In genera l, a shared key must be provided so that receiver of the messages can decrypt the protected data. However, it is a disobedient idea to include the key in the SOAP message (i.e., the element block) because unauthorized parties could just get the key and decrypt the protected data. AgreementMethod is a protocol for safely communicating a secret key. This key agreement protocol, like the SSL secret key agreement protocol, is used to generate the encryption key along with the key material necessary to repeat the encryption key generation on the recipients side 15.4. Discussion and SummaryProcess automation by integrating existing enterprise information systems with workflow software has proved to increase the staff productivity, thus turns out to generate more business values in terms of more tax revenue and less expenditure. However, if the process flow within a business workflow from one step to next step is not smoothly punish (e.g., failure of transferring complete XML data to w orkflow engine and servers but no further resend action is done), then the next step may not be able to proceed until the problem is detected and fixed. This kind of situations importantly wastes human resource and time and should are not expected to occur in automated processes. Therefore, by integrating the AUS with the existing workflow infra-structures can bring the workflow automation into full play because the errors or unlooked-for events can be detected and relevant parties or processes are notified with alerts to revivify the problems. The following tangible benefits can be achieved with the AUS, mainly through the enhanced monitoring and tracking through the AMS with a service-oriented architecture.For example, the turnaround time taken to rescan documents, which have been identified as poorly scanned, is unmindfulened. If the scanning officer is not notified properly, the poorly scanned document will probably be rescanned after the scanning officer triggers to print ou t a report on list those document rescan requests, thus resulting in longer processing time in some cases. This benefit is also applicable to the process of Document Reindex for the index officers.Moreover, the AUS helps maintain data integrity in uploading data into the centralized file server. If the XML data is inconsistent and the import robot still proceeds to import the inconsistent data into workflow engine, it will result in unexpected or serious consequences. The consequences may be a delay in processing applications or even a wrongly underwritten insurance application that could put financial risk to insurance company.On the other hand, more attributes can be added to measure staff performance. Since the alerts generated to officers and agents are monitored by the AMS, the time spent on handling the exceptions and alerts can be calculated based on the time recorded in database. For example, if a scanning officer receives a document rescan alert, then he must rescan the req uested documents and relevant records within the document update time. The performance is logged into database and reports for staff can include this kind of attributes to measure the staff performance. So, the workload on investigating problems related to the entire operation flow can be reduced as detailed information about the problems can be found from the exceptions and alerts well managed by the AMS of the AUS.In addition, the following intangible benefit can be achieved with the AUS. Customer satisfaction can be improved. The document processing and flow are smoothly controlled and executed. This can shorten the entire processing time for new case applications and thus result in issuing and direct policy to policy owner within a shorter period of time. This can enhance the insurance companys professional image as well because the short processing time of new insurance application can be active its customers and improve the customers confidence in insurance company. This mig ht led to more business opportunities in the future.This paper has presented an overview of underwriting process in an insurance company and the automated facilities incorporated into the underwriting process to drive the entire underwriting. A Web-service based alert-enhanced underwriting system has been presented in this paper to overcome most of the existing problems of the underwriting process workflow implementation. We expect this approach is suitable to other business processes that involve human approval together with the need for maintaining documents for auditing and legal purposes, such as loan and credit card approval.After finishing the AUS platform prototype, we shall then proceed to study the benefits of adopting the platform in existing workflow infra-structures in the insurance companys perspective through questionnaires to collect user feedback. Although the proposed platform on the face of it facilitates the handling of most problems or events in the process flow of underwriting, there are still some unexpected events that are hardly to be detected or tracked. Further studies should be carried out on this topic. future day works include the extension of AUS platform to support artificial perception in handling the exception events as well as agent-based helper to internal staff and external users. We are also interested in empirical measurements of the improvement of staff performance and customer satisfaction.ReferencesMiriam Orsina, gene Stone, restitution Company Operations (2nd Ed), pp.3, LOMA, 1999Harriett E. Jones, Dani L. Long, Principles of Insurance Life, Health and Annuities (2nd Ed), pp. 8, LOMA, 1999Jane Lightcap Brown, Kristen L. Falk, Insurance Administration, (2nd Ed), pp. 22, LOMA, 2002Jane Lightcap Brown, Kristen L. Falk, Insurance Administration, (2nd Ed), pp. 67, LOMA, 2002Miriam Orsina, Gene Stone, Insurance Company Operations (2nd Ed), pp.243
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment