Search code, repositories, users, issues, pull requests...
Provide feedback.
We read every piece of feedback, and take your input very seriously.
Saved searches
Use saved searches to filter your results more quickly.
To see all available qualifiers, see our documentation .
- Notifications
Loan default predictions
sinhasangram/Credit-EDA-Case-Study
Folders and files, repository files navigation, credit-eda-case-study.
Problem Statement - I
Introduction: This case study aims to give you an idea of applying EDA in a real business scenario. In this case study, apart from applying the techniques that you have learnt in the EDA module, you will also develop a basic understanding of risk analytics in banking and financial services and understand how data is used to minimise the risk of losing money while lending to customers.
Business Understanding: The loan providing companies find it hard to give loans to the people due to their insufficient or non-existent credit history. Because of that, some consumers use it as their advantage by becoming a defaulter. Suppose you work for a consumer finance company which specialises in lending various types of loans to urban customers. You have to use EDA to analyse the patterns present in the data. This will ensure that the applicants are capable of repaying the loan are not rejected.
When the company receives a loan application, the company has to decide for loan approval based on the applicant’s profile. Two types of risks are associated with the bank’s decision:
If the applicant is likely to repay the loan, then not approving the loan results in a loss of business to the company
If the applicant is not likely to repay the loan, i.e. he/she is likely to default, then approving the loan may lead to a financial loss for the company.
The data given below contains the information about the loan application at the time of applying for the loan. It contains two types of scenarios:
The client with payment difficulties: he/she had late payment more than X days on at least one of the first Y instalments of the loan in our sample,
All other cases: All other cases when the payment is paid on time.
When a client applies for a loan, there are four types of decisions that could be taken by the client/company):
Approved: The Company has approved loan Application
Cancelled: The client cancelled the application sometime during approval. Either the client changed her/his mind about the loan or in some cases due to a higher risk of the client he received worse pricing which he did not want.
Refused: The company had rejected the loan (because the client does not meet their requirements etc.).
Unused offer: Loan has been cancelled by the client but on different stages of the process.
In this case study, you will use EDA to understand how consumer attributes and loan attributes influence the tendency of default.
Business Objectives: This case study aims to identify patterns which indicate if a client has difficulty paying their installments which may be used for taking actions such as denying the loan, reducing the amount of loan, lending (to risky applicants) at a higher interest rate, etc. This will ensure that the consumers capable of repaying the loan are not rejected. Identification of such applicants using EDA is the aim of this case study.
In other words, the company wants to understand the driving factors (or driver variables) behind loan default, i.e. the variables which are strong indicators of default. The company can utilise this knowledge for its portfolio and risk assessment.
To develop your understanding of the domain, you are advised to independently research a little about risk analytics - understanding the types of variables and their significance should be enough).
- Jupyter Notebook 100.0%
Emerging Technologies in Data Mining and Information Security pp 563–574 Cite as
Credit Risk Analysis Using EDA
- Prakriti Arora 14 ,
- Siddharth Gautam 15 ,
- Anushka Kalra 16 ,
- Ashish Negi 14 &
- Nitin Tyagi 14
- Conference paper
- First Online: 16 September 2022
488 Accesses
Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 490))
Organizations or banks are providing funds to support people monetarily, keeping assets in return till the amount is repaid to the company with interest encounter loss at many instances when the borrower or the client fails to repay the loan appearing to be a defaulter. Also, when the firm disapproves the loan of an applicant who is likely to repay the sum, the loss is again withstood by the firm. Therefore, to avoid this loss, this research is performed deeply analyzing the factors using exploratory data analysis, affecting the trend of defaulters as well as non-defaulters, helping the firm recognize the defaulters, and disapproving their request to borrow. The exploratory data analysis is performed by visually performing univariate, bivariate, and multivariate analysis on almost all the aspects of the two credit history datasets. The patterns and learnings were noted based on the visual as well as statistical analysis to determine creditworthiness of a client.
This is a preview of subscription content, log in via an institution .
Buying options
- Available as PDF
- Read on any device
- Instant download
- Own it forever
- Available as EPUB and PDF
- Compact, lightweight edition
- Dispatched in 3 to 5 business days
- Free shipping worldwide - see info
Tax calculation will be finalised at checkout
Purchases are for personal use only
Huang S-H, Tu W-P, Yeh H-H, Chi MC (2013) An EDA course module for the topic of reliability using automotive electronics as applications. In: 2013 3rd Interdisciplinary engineering design education conference. https://doi.org/10.1109/iedec.2013.6526768
Malik A, Gautam S, Khatoon N, Sharma N, Kaushik I, Kumar S (2020) Analysis of black-hole attack with its mitigation techniques in Ad-hoc network. In: Deep learning strategies for security enhancement in wireless sensor networks advances in information security, privacy, and ethics, pp 211–232. https://doi.org/10.4018/978-1-7998-5068-7.ch011
Schiantarelli F, Stacchini M, Strahan P (2016) Bank quality, judicial efficiency and borrower runs: Loan repayment delays in Italy. https://doi.org/10.3386/w22034
Pulakkazhy (2013) Data mining in banking and its Applications-A Review. J Comput Sci 9(10):1252–1259. https://doi.org/10.3844/jcssp.2013.1252.1259
Rustagi A, Manchanda C, Sharma N (2020) IoE: a boon & threat to the mankind. In: 2020 IEEE 9th international conference on communication systems and network technologies (CSNT). https://doi.org/10.1109/csnt48778.2020.9115748
Arif M, Khatak A, Hussain M (2015) A framework for Data Warehouse using data mining and knowledge discovery for a network of hospitals in Pakistan. Int J Bio-Sci Bio-Technol 7(3):217–222. https://doi.org/10.14257/ijbsbt.2015.7.3.23
Tiwari A, Sharma N, Kaushik I, Tiwari R (2019) Privacy issues & security techniques in big data. In: 2019 International conference on computing, communication, and intelligent systems (ICCCIS). https://doi.org/10.1109/icccis48478.2019.8974511
Predicting student’s academic performance using data mining techniques (2020) Int J Eng Adv Technol 9(3)”215–219. https://doi.org/10.35940/ijeat.b4521.029320
Zurada J, Zurada M (2002) How secure are good loans: validating loan-granting decisions and predicting default rates on consumer loans. Rev Bus Inf Syst (RBIS) 6(3):65–84. https://doi.org/10.19030/rbis.v6i3.4563
Zurada J (2002) Data mining techniques in predicting default rates on customer loans. Databases Inf Syst II:285–296. https://doi.org/10.1007/978-94-015-9978-8_22
Article MATH Google Scholar
Xin L, Guozi S, Huakang L (2017) Overdue prediction of bank loans based on Deep Neural Network. In: International symposium on computer science and artificial intelligence (ISCSAI). https://doi.org/10.26480/iscsai.01.2017.26.28
Comparative analysis and study of data mining techniques used for IOT based Smart Healthcare System (2020) Int J Emerg Trends Eng Res 8(9):6131–6138. https://doi.org/10.30534/ijeter/2020/198892020
Data mining techniques for analysing employment data (2019) Int J Eng Adv Technol 9(2):555–556. https://doi.org/10.35940/ijeat.b3311.129219
Purohit SU, Mahadevan V, Kulkarni AN (2012) Credit evaluation model of loan proposals for Indian Banks. Int J Model Optim 529–534. https://doi.org/10.7763/ijmo.2012.v2.176
Yuanyuan L (2008) Research on personal credit evaluation system of commercial banks. In: First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008). https://doi.org/10.1109/wkdd.2008.147
Jafar Hamid A, Ahmed TM (2016) Developing prediction model of loan risk in banks using data mining. Mach Learn Appl Int J 3(1):1–9. https://doi.org/10.5121/mlaij.2016.3101
Article Google Scholar
Li W, Liao J (2011) An empirical study on credit scoring model for credit card by using Data Mining Technology. In: 2011 Seventh international conference on computational intelligence and security. https://doi.org/10.1109/cis.2011.283
Jayasree (2013) A review on data mining in banking sector. Am J Appl Sci 10(10):1160–1165. https://doi.org/10.3844/ajassp.2013.1160.1165
Kamatchi K, Siva Balan A (2013) Multiphase text mining predictor for market analysis. In: 2013 International conference on current trends in engineering and technology (ICCTET). https://doi.org/10.1109/icctet.2013.6675990
Samanta D, Dutta S, Galety MG, Pramanik S (2022) A novel approach for web mining taxonomy for high-performance computing. In: Tavares JMRS, Dutta P, Dutta S, Samanta D (eds) Cyber intelligence and information retrieval. Lecture Notes in Networks and Systems, vol 291. Springer, Singapore. https://doi.org/10.1007/978-981-16-4284-5_37
Grover M, Sharma N, Bhushan B, Kaushik I, Khamparia A (2020) Malware threat analysis of IoT devices using deep learning neural network methodologies. In: Security and Trust Issues in Internet of Things, pp 123–143. https://doi.org/10.1201/9781003121664-6
Goel A, Tyagi N, Gautam S (2019) Comparative analysis of 3-D password using various techniques (June 16, 2019). ' Comparative analysis of 3-D password using various techniques '. Int J Emerg Technol Innov Res, 6(6):711–718 ( www.jetir.org ), ISSN:2349-5162. http://www.jetir.org/papers/JETIR1907Q08.pdf
Goyal S, Sharma N, Kaushik I, Bhushan B (2021) Industrial revolution: blockchain as a wave for industry 4.0 and iiot. In: Advances in computing communications and informatics, pp 108–130. https://doi.org/10.2174/9781681088624121010008
Kaushik I, Sharma N (2020) Black hole attack and its security measure in wireless sensors networks. In: Advances in intelligent systems and computing handbook of wireless sensor networks: issues and challenges in current scenarios, pp 401–416. https://doi.org/10.1007/978-3-030-40305-8_20
An exploratory analysis of corporate governance using supervised data mining learning (2019) Int J Recent Technol Eng 8(3):3546–3557. https://doi.org/10.35940/ijrte.c5279.098319
Kaieski N, Oliveira LP, Villamil MB (2016) Vis-health: Exploratory analysis and visualization of dengue cases in Brazil. In: 2016 49th Hawaii international conference on system sciences (HICSS). https://doi.org/10.1109/hicss.2016.385
Tyagi N, Gautam S, Goel A, Mann P (2021) A framework for blockchain technology including features. In: Hassanien AE, Bhattacharyya S, Chakrabati S, Bhattacharya A, Dutta S (eds) Emerging technologies in data mining and information security. Advances in Intelligent Systems and Computing, vol 1286. Springer, Singapore. https://doi.org/10.1007/978-981-15-9927-9_62
Gautam S, Malik A, Singh N, Kumar S (2019) Recent advances and countermeasures against various attacks in IoT environment. In: 2019 2nd international conference on signal processing and communication (ICSPC), pp 315–319. https://doi.org/10.1109/ICSPC46172.2019.8976527
Singh G, Gautam S, Prachi VA, Kaushal T (2021) Analysis of blockchain induced cryptocurrency: regulations and challenges of cryptocurrencies. In: Hassanien AE, Bhattacharyya S, Chakrabati S, Bhattacharya A, Dutta S (eds) Emerging technologies in data mining and information security. Advances in intelligent systems and computing, vol 1286. Springer, Singapore. https://doi.org/10.1007/978-981-15-9927-9_54
Sharma N, Kaushik I, Bhushan B, Gautam S, Khamparia A (2020) Applicability of WSN and biometric models in the field of healthcare. In: Deep learning strategies for security enhancement in wireless sensor networks advances in information security, privacy, and ethics, pp 304–329. https://doi.org/10.4018/978-1-7998-5068-7.ch016
Sharma N, Kaushik I, Rathi R, Kumar S (2020) Evaluation of accidental death records using hybrid genetic algorithm. SSRN Electron J. https://doi.org/10.2139/ssrn.3563084
Gurung A, Gautam S, Garg T, Bhardwaj Y, Gupta H (2021) Virtual numeric authentication system using contour detection of color-banded fingertips. In: Tavares JMRS, Chakrabarti S, Bhattacharya A, Ghatak S (eds) Emerging technologies in data mining and information security. Lecture notes in networks and systems, vol 164. Springer, Singapore. https://doi.org/10.1007/978-981-15-9774-9_32
Rustagi A, Manchanda C, Sharma N, Kaushik I (2020) Depression anatomy using combinational deep neural network. In: Advances in intelligent systems and computing international conference on innovative computing and communications, pp 19–33. https://doi.org/10.1007/978-981-15-5148-2_3
Goel A, Gautam S, Tyagi N, Sharma N, Sagayam M (2021) Securing biometric framework with cryptanalysis. In: Intelligent data analytics for terror threat prediction, pp 181–208. https://doi.org/10.1002/9781119711629.ch9
Kathuria RS, Gautam S, Singh A, Khatri S, Yadav N (2019) Real time sentiment analysis on twitter data using deep learning (Keras). In: 2019 international conference on computing, communication, and intelligent systems (ICCCIS), pp 69–73. https://doi.org/10.1109/ICCCIS48478.2019.8974557
Download references
Author information
Authors and affiliations.
HMRITM, Delhi, India
Prakriti Arora, Ashish Negi & Nitin Tyagi
NSUT, Delhi, India
Siddharth Gautam
Mahavir Swami Institute of Technology, Sonipat, India
Anushka Kalra
You can also search for this author in PubMed Google Scholar
Corresponding author
Correspondence to Nitin Tyagi .
Editor information
Editors and affiliations.
Department of Computer and System Sciences, Visva-Bharati University, Santiniketan, West Bengal, India
Paramartha Dutta
Department of Computer Science and Engineering, Institute of Engineering and Management, Kolkata, West Bengal, India
Satyajit Chakrabarti
Department of Computer Application and Science, Institute of Engineering and Management, Kolkata, West Bengal, India
Abhishek Bhattacharya
Soumi Dutta
Department of Electrical and Electronic Engineering, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
Celia Shahnaz
Rights and permissions
Reprints and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper.
Arora, P., Gautam, S., Kalra, A., Negi, A., Tyagi, N. (2023). Credit Risk Analysis Using EDA. In: Dutta, P., Chakrabarti, S., Bhattacharya, A., Dutta, S., Shahnaz, C. (eds) Emerging Technologies in Data Mining and Information Security. Lecture Notes in Networks and Systems, vol 490. Springer, Singapore. https://doi.org/10.1007/978-981-19-4052-1_56
Download citation
DOI : https://doi.org/10.1007/978-981-19-4052-1_56
Published : 16 September 2022
Publisher Name : Springer, Singapore
Print ISBN : 978-981-19-4051-4
Online ISBN : 978-981-19-4052-1
eBook Packages : Intelligent Technologies and Robotics Intelligent Technologies and Robotics (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
- Publish with us
Policies and ethics
- Find a journal
- Track your research
Table of Contents
Credit eda case study, problem statement.
This case study aims to identify patterns which indicate if a client has difficulty paying their installments which may be used for taking actions such as denying the loan, reducing the amount of loan, lending (to risky applicants) at a higher interest rate, etc. This will ensure that the consumers capable of repaying the loan are not rejected. Identification of such applicants using EDA is the aim of this case study. In other words, the company wants to understand the driving factors (or driver variables) behind loan default, i.e. the variables which are strong indicators of default.
IMAGES
VIDEO
COMMENTS
Download Now. Download to read offline. Credit eda case study presentation. 1. MS.S.JasminDebora MR.T.NandaKishore. 2. Credit risk analysis will help the company to make a decision for loan approval based on the applicant's profile. Which controls loss of business to the company and avoid financial loss for the company.
This case study aims to give you an idea of applying EDA in a real business scenario. In this case study, apart from applying the techniques that you have learnt in the EDA module, you will also develop a basic understanding of risk analytics in banking and financial services and understand how data is used to minimise the risk of losing money while lending to customers.
Credit EDA Assignment (Tanvi Pradhan) This case study aims to identify patterns that indicate if a client has difficulty paying their installments which may be used for taking actions such as denying the loan, reducing the amount of the loan, lending (to risky applicants) at a higher interest rate, etc. This will ensure that the consumers ...
Credit Exploratory Data Analysis Case Study - March - 2022 Submitted By: Sourabh S Hubballi Dated: 28/03/2022. Objective's are mentioned Below: 1.0 Problem Statement - I Introduction: This assignment aims to give you an idea of applying EDA in a real business scenario. In this assignment, apart from applying the techniques that you have learnt ...
Credit EDA Assignment (PPT) - Free download as PDF File (.pdf), Text File (.txt) or read online for free. The document discusses analyzing a credit application dataset to identify patterns that indicate the likelihood of a client defaulting on a loan. Scatter plots and box plots are used to identify outliers. A pie chart shows the data is imbalanced with most clients not defaulting.
This case study is focused to give you an idea of applying Exploratory Data Analysis (EDA) in a real business scenario. In this case study, apart from applying the various Exploratory Data Analysis (EDA) techniques, you will also develop a basic understanding of risk analytics and understand how data can be utilized in order to minimise the ...
Credit Eda Case Study - Ppt - Free download as Powerpoint Presentation (.ppt / .pptx), PDF File (.pdf), Text File (.txt) or view presentation slides online. Credit EDA Assignment
522558320 Credit EDA Case Study (1) - Free download as Powerpoint Presentation (.ppt / .pptx), PDF File (.pdf), Text File (.txt) or view presentation slides online. eda case study
View CREDIT EDA CASE STUDY(Harsh and Rahul).pptx from PREDICTIVE 2772 at Southern Methodist University. CREDIT EDA CASE STUDY BY HARSHVARDHAN SINGH RAHUL ANAND Thoughts on imputation of values. AI Homework Help. Expert Help ... View EDA Case Study PPT Final.pdf from ECONOMICS ECONOMETRI at IIT Kanpur. CREDIT EDA C... CREDIT EDA CASE STUDY ...
View Credit EDA Assignment PPT.pptx from CMPN SEM3 at University of Mumbai. Credit EDA Assignment ~ Prathamesh Palekar Univariate Analysis for Target 0 Distribution of Income range: • Female numbers
View Nandini Pandey - CREDIT EDA ASSIGNMENT.pptx from B TECH 2011-2015 at RKDF Institute of Science & Technology. CREDIT EDA ASSIGNMENT N A N D I N I PA N D E Y Introduction This case study aims to
Mar 10, 2021 •. 0 likes • 379 views. M. Mithul Murugaadev. Exploratory Data Analysis to get insights on loan default with bank data. Data & Analytics. 1 of 34. Credit EDA case study - Download as a PDF or view online for free.
Collaborate with graciousga on credit-eda-assignment notebook. This case study aims to identify patterns which indicate if a client has difficulty paying their installments which may be used for taking actions such as denying the loan, reducing the amount of loan, lending (to risky applicants) at a higher interest rate, etc.
Problem Statement - I. Introduction: This case study aims to give you an idea of applying EDA in a real business scenario. In this case study, apart from applying the techniques that you have learnt in the EDA module, you will also develop a basic understanding of risk analytics in banking and financial services and understand how data is used to minimise the risk of losing money while lending ...
3 Exploratory Data Analysis. EDA is preferred by data scientists to inspect and scrutinize data and note the major traits with visualization techniques. The purpose of using EDA is to shed light on a concept of preparing a rough outline of the data and infer the basic crux of the analysis and get maximum out of analysis.
Introduction. This case study aims to give you an idea of applying EDA in a real business scenario. In this case study, apart from applying the techniques that you have learnt in the EDA module, you will also develop a basic understanding of risk analytics in banking and financial services and understand how data is used to minimise the risk of ...
Credit EDA Case Study - Free download as Powerpoint Presentation (.ppt / .pptx), PDF File (.pdf), Text File (.txt) or view presentation slides online. bank dataset loan approval
View EDA Case Study PPT.pptx from COMPUTER S 123 at Liverpool John Moores University. Credit EDA Case Study: Submitted By: Akshay Kumar Akshat Chaturvedi Below are the column we are going to analyze AI Homework Help
Explore and run machine learning code with Kaggle Notebooks | Using data from Credit EDA Case Study. code. New Notebook. table_chart. New Dataset. tenancy. New Model. emoji_events. New Competition. corporate_fare. New Organization. No Active Events. Create notebooks and keep track of their status here. add New Notebook. auto_awesome_motion.
Exploratory Data Analysis For Credit Risk Assesment. 1. THE CREDIT RISK ANALYTICS EDA Case Study By, • Mr. Prathmesh Pise • Mr. Vishal Patil. 2. CONTENTS Problem statement Flow Chart Importing and Cleaning1 Importing and Cleaning2 Approach Data Visualization Significant Insights.
warnings.filterwarnings('ignore') # Importing the required libraries import numpy as np. import pandas as pd. import seaborn as sns. import matplotlib.pyplot as plt. import scipy.stats as ss. import jovian as jvn. %matplotlib inline. Collaborate with 02-swetha on eda-credit-upgrad notebook.
If the issue persists, it's likely a problem on our side. Unexpected token < in JSON at position 4. keyboard_arrow_up. content_copy. SyntaxError: Unexpected token < in JSON at position 4. Refresh. Explore and run machine learning code with Kaggle Notebooks | Using data from Credit Card Fraud Detection.