Search code, repositories, users, issues, pull requests...

Provide feedback.

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly.

To see all available qualifiers, see our documentation .

  • Notifications

Loan default predictions

sinhasangram/Credit-EDA-Case-Study

Folders and files, repository files navigation, credit-eda-case-study.

Problem Statement - I

Introduction: This case study aims to give you an idea of applying EDA in a real business scenario. In this case study, apart from applying the techniques that you have learnt in the EDA module, you will also develop a basic understanding of risk analytics in banking and financial services and understand how data is used to minimise the risk of losing money while lending to customers.

Business Understanding: The loan providing companies find it hard to give loans to the people due to their insufficient or non-existent credit history. Because of that, some consumers use it as their advantage by becoming a defaulter. Suppose you work for a consumer finance company which specialises in lending various types of loans to urban customers. You have to use EDA to analyse the patterns present in the data. This will ensure that the applicants are capable of repaying the loan are not rejected.

When the company receives a loan application, the company has to decide for loan approval based on the applicant’s profile. Two types of risks are associated with the bank’s decision:

If the applicant is likely to repay the loan, then not approving the loan results in a loss of business to the company

If the applicant is not likely to repay the loan, i.e. he/she is likely to default, then approving the loan may lead to a financial loss for the company.

The data given below contains the information about the loan application at the time of applying for the loan. It contains two types of scenarios:

The client with payment difficulties: he/she had late payment more than X days on at least one of the first Y instalments of the loan in our sample,

All other cases: All other cases when the payment is paid on time.

When a client applies for a loan, there are four types of decisions that could be taken by the client/company):

Approved: The Company has approved loan Application

Cancelled: The client cancelled the application sometime during approval. Either the client changed her/his mind about the loan or in some cases due to a higher risk of the client he received worse pricing which he did not want.

Refused: The company had rejected the loan (because the client does not meet their requirements etc.).

Unused offer: Loan has been cancelled by the client but on different stages of the process.

In this case study, you will use EDA to understand how consumer attributes and loan attributes influence the tendency of default.

Business Objectives: This case study aims to identify patterns which indicate if a client has difficulty paying their installments which may be used for taking actions such as denying the loan, reducing the amount of loan, lending (to risky applicants) at a higher interest rate, etc. This will ensure that the consumers capable of repaying the loan are not rejected. Identification of such applicants using EDA is the aim of this case study.

In other words, the company wants to understand the driving factors (or driver variables) behind loan default, i.e. the variables which are strong indicators of default. The company can utilise this knowledge for its portfolio and risk assessment.

To develop your understanding of the domain, you are advised to independently research a little about risk analytics - understanding the types of variables and their significance should be enough).

  • Jupyter Notebook 100.0%

Book cover

Emerging Technologies in Data Mining and Information Security pp 563–574 Cite as

Credit Risk Analysis Using EDA

  • Prakriti Arora 14 ,
  • Siddharth Gautam 15 ,
  • Anushka Kalra 16 ,
  • Ashish Negi 14 &
  • Nitin Tyagi 14  
  • Conference paper
  • First Online: 16 September 2022

488 Accesses

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 490))

Organizations or banks are providing funds to support people monetarily, keeping assets in return till the amount is repaid to the company with interest encounter loss at many instances when the borrower or the client fails to repay the loan appearing to be a defaulter. Also, when the firm disapproves the loan of an applicant who is likely to repay the sum, the loss is again withstood by the firm. Therefore, to avoid this loss, this research is performed deeply analyzing the factors using exploratory data analysis, affecting the trend of defaulters as well as non-defaulters, helping the firm recognize the defaulters, and disapproving their request to borrow. The exploratory data analysis is performed by visually performing univariate, bivariate, and multivariate analysis on almost all the aspects of the two credit history datasets. The patterns and learnings were noted based on the visual as well as statistical analysis to determine creditworthiness of a client.

This is a preview of subscription content, log in via an institution .

Buying options

  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Huang S-H, Tu W-P, Yeh H-H, Chi MC (2013) An EDA course module for the topic of reliability using automotive electronics as applications. In: 2013 3rd Interdisciplinary engineering design education conference. https://doi.org/10.1109/iedec.2013.6526768

Malik A, Gautam S, Khatoon N, Sharma N, Kaushik I, Kumar S (2020) Analysis of black-hole attack with its mitigation techniques in Ad-hoc network. In: Deep learning strategies for security enhancement in wireless sensor networks advances in information security, privacy, and ethics, pp 211–232. https://doi.org/10.4018/978-1-7998-5068-7.ch011

Schiantarelli F, Stacchini M, Strahan P (2016) Bank quality, judicial efficiency and borrower runs: Loan repayment delays in Italy. https://doi.org/10.3386/w22034

Pulakkazhy (2013) Data mining in banking and its Applications-A Review. J Comput Sci 9(10):1252–1259. https://doi.org/10.3844/jcssp.2013.1252.1259

Rustagi A, Manchanda C, Sharma N (2020) IoE: a boon & threat to the mankind. In: 2020 IEEE 9th international conference on communication systems and network technologies (CSNT). https://doi.org/10.1109/csnt48778.2020.9115748

Arif M, Khatak A, Hussain M (2015) A framework for Data Warehouse using data mining and knowledge discovery for a network of hospitals in Pakistan. Int J Bio-Sci Bio-Technol 7(3):217–222. https://doi.org/10.14257/ijbsbt.2015.7.3.23

Tiwari A, Sharma N, Kaushik I, Tiwari R (2019) Privacy issues & security techniques in big data. In: 2019 International conference on computing, communication, and intelligent systems (ICCCIS). https://doi.org/10.1109/icccis48478.2019.8974511

Predicting student’s academic performance using data mining techniques (2020) Int J Eng Adv Technol 9(3)”215–219. https://doi.org/10.35940/ijeat.b4521.029320

Zurada J, Zurada M (2002) How secure are good loans: validating loan-granting decisions and predicting default rates on consumer loans. Rev Bus Inf Syst (RBIS) 6(3):65–84. https://doi.org/10.19030/rbis.v6i3.4563

Zurada J (2002) Data mining techniques in predicting default rates on customer loans. Databases Inf Syst II:285–296. https://doi.org/10.1007/978-94-015-9978-8_22

Article   MATH   Google Scholar  

Xin L, Guozi S, Huakang L (2017) Overdue prediction of bank loans based on Deep Neural Network. In: International symposium on computer science and artificial intelligence (ISCSAI). https://doi.org/10.26480/iscsai.01.2017.26.28

Comparative analysis and study of data mining techniques used for IOT based Smart Healthcare System (2020) Int J Emerg Trends Eng Res 8(9):6131–6138. https://doi.org/10.30534/ijeter/2020/198892020

Data mining techniques for analysing employment data (2019) Int J Eng Adv Technol 9(2):555–556. https://doi.org/10.35940/ijeat.b3311.129219

Purohit SU, Mahadevan V, Kulkarni AN (2012) Credit evaluation model of loan proposals for Indian Banks. Int J Model Optim 529–534. https://doi.org/10.7763/ijmo.2012.v2.176

Yuanyuan L (2008) Research on personal credit evaluation system of commercial banks. In: First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008). https://doi.org/10.1109/wkdd.2008.147

Jafar Hamid A, Ahmed TM (2016) Developing prediction model of loan risk in banks using data mining. Mach Learn Appl Int J 3(1):1–9. https://doi.org/10.5121/mlaij.2016.3101

Article   Google Scholar  

Li W, Liao J (2011) An empirical study on credit scoring model for credit card by using Data Mining Technology. In: 2011 Seventh international conference on computational intelligence and security. https://doi.org/10.1109/cis.2011.283

Jayasree (2013) A review on data mining in banking sector. Am J Appl Sci 10(10):1160–1165. https://doi.org/10.3844/ajassp.2013.1160.1165

Kamatchi K, Siva Balan A (2013) Multiphase text mining predictor for market analysis. In: 2013 International conference on current trends in engineering and technology (ICCTET). https://doi.org/10.1109/icctet.2013.6675990

Samanta D, Dutta S, Galety MG, Pramanik S (2022) A novel approach for web mining taxonomy for high-performance computing. In: Tavares JMRS, Dutta P, Dutta S, Samanta D (eds) Cyber intelligence and information retrieval. Lecture Notes in Networks and Systems, vol 291. Springer, Singapore. https://doi.org/10.1007/978-981-16-4284-5_37

Grover M, Sharma N, Bhushan B, Kaushik I, Khamparia A (2020) Malware threat analysis of IoT devices using deep learning neural network methodologies. In: Security and Trust Issues in Internet of Things, pp 123–143. https://doi.org/10.1201/9781003121664-6

Goel A, Tyagi N, Gautam S (2019) Comparative analysis of 3-D password using various techniques (June 16, 2019). ' Comparative analysis of 3-D password using various techniques &#39. Int J Emerg Technol Innov Res, 6(6):711–718 ( www.jetir.org ), ISSN:2349-5162. http://www.jetir.org/papers/JETIR1907Q08.pdf

Goyal S, Sharma N, Kaushik I, Bhushan B (2021) Industrial revolution: blockchain as a wave for industry 4.0 and iiot. In: Advances in computing communications and informatics, pp 108–130. https://doi.org/10.2174/9781681088624121010008

Kaushik I, Sharma N (2020) Black hole attack and its security measure in wireless sensors networks. In: Advances in intelligent systems and computing handbook of wireless sensor networks: issues and challenges in current scenarios, pp 401–416. https://doi.org/10.1007/978-3-030-40305-8_20

An exploratory analysis of corporate governance using supervised data mining learning (2019) Int J Recent Technol Eng 8(3):3546–3557. https://doi.org/10.35940/ijrte.c5279.098319

Kaieski N, Oliveira LP, Villamil MB (2016) Vis-health: Exploratory analysis and visualization of dengue cases in Brazil. In: 2016 49th Hawaii international conference on system sciences (HICSS). https://doi.org/10.1109/hicss.2016.385

Tyagi N, Gautam S, Goel A, Mann P (2021) A framework for blockchain technology including features. In: Hassanien AE, Bhattacharyya S, Chakrabati S, Bhattacharya A, Dutta S (eds) Emerging technologies in data mining and information security. Advances in Intelligent Systems and Computing, vol 1286. Springer, Singapore. https://doi.org/10.1007/978-981-15-9927-9_62

Gautam S, Malik A, Singh N, Kumar S (2019) Recent advances and countermeasures against various attacks in IoT environment. In: 2019 2nd international conference on signal processing and communication (ICSPC), pp 315–319. https://doi.org/10.1109/ICSPC46172.2019.8976527

Singh G, Gautam S, Prachi VA, Kaushal T (2021) Analysis of blockchain induced cryptocurrency: regulations and challenges of cryptocurrencies. In: Hassanien AE, Bhattacharyya S, Chakrabati S, Bhattacharya A, Dutta S (eds) Emerging technologies in data mining and information security. Advances in intelligent systems and computing, vol 1286. Springer, Singapore. https://doi.org/10.1007/978-981-15-9927-9_54

Sharma N, Kaushik I, Bhushan B, Gautam S, Khamparia A (2020) Applicability of WSN and biometric models in the field of healthcare. In: Deep learning strategies for security enhancement in wireless sensor networks advances in information security, privacy, and ethics, pp 304–329. https://doi.org/10.4018/978-1-7998-5068-7.ch016

Sharma N, Kaushik I, Rathi R, Kumar S (2020) Evaluation of accidental death records using hybrid genetic algorithm. SSRN Electron J. https://doi.org/10.2139/ssrn.3563084

Gurung A, Gautam S, Garg T, Bhardwaj Y, Gupta H (2021) Virtual numeric authentication system using contour detection of color-banded fingertips. In: Tavares JMRS, Chakrabarti S, Bhattacharya A, Ghatak S (eds) Emerging technologies in data mining and information security. Lecture notes in networks and systems, vol 164. Springer, Singapore. https://doi.org/10.1007/978-981-15-9774-9_32

Rustagi A, Manchanda C, Sharma N, Kaushik I (2020) Depression anatomy using combinational deep neural network. In: Advances in intelligent systems and computing international conference on innovative computing and communications, pp 19–33. https://doi.org/10.1007/978-981-15-5148-2_3

Goel A, Gautam S, Tyagi N, Sharma N, Sagayam M (2021) Securing biometric framework with cryptanalysis. In: Intelligent data analytics for terror threat prediction, pp 181–208. https://doi.org/10.1002/9781119711629.ch9

Kathuria RS, Gautam S, Singh A, Khatri S, Yadav N (2019) Real time sentiment analysis on twitter data using deep learning (Keras). In: 2019 international conference on computing, communication, and intelligent systems (ICCCIS), pp 69–73. https://doi.org/10.1109/ICCCIS48478.2019.8974557

Download references

Author information

Authors and affiliations.

HMRITM, Delhi, India

Prakriti Arora, Ashish Negi & Nitin Tyagi

NSUT, Delhi, India

Siddharth Gautam

Mahavir Swami Institute of Technology, Sonipat, India

Anushka Kalra

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Nitin Tyagi .

Editor information

Editors and affiliations.

Department of Computer and System Sciences, Visva-Bharati University, Santiniketan, West Bengal, India

Paramartha Dutta

Department of Computer Science and Engineering, Institute of Engineering and Management, Kolkata, West Bengal, India

Satyajit Chakrabarti

Department of Computer Application and Science, Institute of Engineering and Management, Kolkata, West Bengal, India

Abhishek Bhattacharya

Soumi Dutta

Department of Electrical and Electronic Engineering, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh

Celia Shahnaz

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper.

Arora, P., Gautam, S., Kalra, A., Negi, A., Tyagi, N. (2023). Credit Risk Analysis Using EDA. In: Dutta, P., Chakrabarti, S., Bhattacharya, A., Dutta, S., Shahnaz, C. (eds) Emerging Technologies in Data Mining and Information Security. Lecture Notes in Networks and Systems, vol 490. Springer, Singapore. https://doi.org/10.1007/978-981-19-4052-1_56

Download citation

DOI : https://doi.org/10.1007/978-981-19-4052-1_56

Published : 16 September 2022

Publisher Name : Springer, Singapore

Print ISBN : 978-981-19-4051-4

Online ISBN : 978-981-19-4052-1

eBook Packages : Intelligent Technologies and Robotics Intelligent Technologies and Robotics (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

credit eda assignment ppt

Table of Contents

Credit eda case study, problem statement.

This case study aims to identify patterns which indicate if a client has difficulty paying their installments which may be used for taking actions such as denying the loan, reducing the amount of loan, lending (to risky applicants) at a higher interest rate, etc. This will ensure that the consumers capable of repaying the loan are not rejected. Identification of such applicants using EDA is the aim of this case study. In other words, the company wants to understand the driving factors (or driver variables) behind loan default, i.e. the variables which are strong indicators of default.

Importing Libraries

IMAGES

  1. Credit eda case study presentation

    credit eda assignment ppt

  2. Credit EDA Assignment

    credit eda assignment ppt

  3. CREDIT EDA CASE STUDY.pptx

    credit eda assignment ppt

  4. EDA Assignment.pptx

    credit eda assignment ppt

  5. EDA Assignment For Banks On Credits

    credit eda assignment ppt

  6. Credit EDA case study

    credit eda assignment ppt

VIDEO

  1. BOOM! Collectors Emptying Their Wallets On TOP Change Finds!! POCKET CHANGE MARKET REPORT

  2. നിങ്ങളുടെ പേരിൽ മറ്റാരെങ്കിലും Loan എടുത്തിട്ടുണ്ടോ 😰 How to track and Improve CIBIL / Credit Score

  3. How To Earn Money Online Without Investment In Pakistan

  4. Kingpin

  5. (FREE) Playboi Carti X Pierre Bourne Type Beat

  6. instant personal loan kaise le loan app fast approval 2024

COMMENTS

  1. Credit eda case study presentation

    Download Now. Download to read offline. Credit eda case study presentation. 1. MS.S.JasminDebora MR.T.NandaKishore. 2. Credit risk analysis will help the company to make a decision for loan approval based on the applicant's profile. Which controls loss of business to the company and avoid financial loss for the company.

  2. Gaurav-Gilalkar/Credit_EDA_case_study_upgrad

    This case study aims to give you an idea of applying EDA in a real business scenario. In this case study, apart from applying the techniques that you have learnt in the EDA module, you will also develop a basic understanding of risk analytics in banking and financial services and understand how data is used to minimise the risk of losing money while lending to customers.

  3. Credit EDA Assignment (Tanvi Pradhan)

    Credit EDA Assignment (Tanvi Pradhan) This case study aims to identify patterns that indicate if a client has difficulty paying their installments which may be used for taking actions such as denying the loan, reducing the amount of the loan, lending (to risky applicants) at a higher interest rate, etc. This will ensure that the consumers ...

  4. GitHub

    Credit Exploratory Data Analysis Case Study - March - 2022 Submitted By: Sourabh S Hubballi Dated: 28/03/2022. Objective's are mentioned Below: 1.0 Problem Statement - I Introduction: This assignment aims to give you an idea of applying EDA in a real business scenario. In this assignment, apart from applying the techniques that you have learnt ...

  5. CREDIT EDA ASSIGNMENT ANALYSIS

    Credit EDA Assignment (PPT) - Free download as PDF File (.pdf), Text File (.txt) or read online for free. The document discusses analyzing a credit application dataset to identify patterns that indicate the likelihood of a client defaulting on a loan. Scatter plots and box plots are used to identify outliers. A pie chart shows the data is imbalanced with most clients not defaulting.

  6. Exploratory Data Analysis (EDA)

    This case study is focused to give you an idea of applying Exploratory Data Analysis (EDA) in a real business scenario. In this case study, apart from applying the various Exploratory Data Analysis (EDA) techniques, you will also develop a basic understanding of risk analytics and understand how data can be utilized in order to minimise the ...

  7. Credit Eda Case Study

    Credit Eda Case Study - Ppt - Free download as Powerpoint Presentation (.ppt / .pptx), PDF File (.pdf), Text File (.txt) or view presentation slides online. Credit EDA Assignment

  8. Credit EDA Case Study

    522558320 Credit EDA Case Study (1) - Free download as Powerpoint Presentation (.ppt / .pptx), PDF File (.pdf), Text File (.txt) or view presentation slides online. eda case study

  9. CREDIT EDA CASE STUDY Harsh and Rahul .pptx

    View CREDIT EDA CASE STUDY(Harsh and Rahul).pptx from PREDICTIVE 2772 at Southern Methodist University. CREDIT EDA CASE STUDY BY HARSHVARDHAN SINGH RAHUL ANAND Thoughts on imputation of values. AI Homework Help. Expert Help ... View EDA Case Study PPT Final.pdf from ECONOMICS ECONOMETRI at IIT Kanpur. CREDIT EDA C... CREDIT EDA CASE STUDY ...

  10. Credit EDA Assignment PPT.pptx

    View Credit EDA Assignment PPT.pptx from CMPN SEM3 at University of Mumbai. Credit EDA Assignment ~ Prathamesh Palekar Univariate Analysis for Target 0 Distribution of Income range: • Female numbers

  11. Nandini Pandey

    View Nandini Pandey - CREDIT EDA ASSIGNMENT.pptx from B TECH 2011-2015 at RKDF Institute of Science & Technology. CREDIT EDA ASSIGNMENT N A N D I N I PA N D E Y Introduction This case study aims to

  12. Credit EDA case study

    Mar 10, 2021 •. 0 likes • 379 views. M. Mithul Murugaadev. Exploratory Data Analysis to get insights on loan default with bank data. Data & Analytics. 1 of 34. Credit EDA case study - Download as a PDF or view online for free.

  13. Credit Eda Assignment

    Collaborate with graciousga on credit-eda-assignment notebook. This case study aims to identify patterns which indicate if a client has difficulty paying their installments which may be used for taking actions such as denying the loan, reducing the amount of loan, lending (to risky applicants) at a higher interest rate, etc.

  14. sinhasangram/Credit-EDA-Case-Study: Loan default predictions

    Problem Statement - I. Introduction: This case study aims to give you an idea of applying EDA in a real business scenario. In this case study, apart from applying the techniques that you have learnt in the EDA module, you will also develop a basic understanding of risk analytics in banking and financial services and understand how data is used to minimise the risk of losing money while lending ...

  15. Credit Risk Analysis Using EDA

    3 Exploratory Data Analysis. EDA is preferred by data scientists to inspect and scrutinize data and note the major traits with visualization techniques. The purpose of using EDA is to shed light on a concept of preparing a rough outline of the data and infer the basic crux of the analysis and get maximum out of analysis.

  16. Credit Eda Case Study Assignment

    Introduction. This case study aims to give you an idea of applying EDA in a real business scenario. In this case study, apart from applying the techniques that you have learnt in the EDA module, you will also develop a basic understanding of risk analytics in banking and financial services and understand how data is used to minimise the risk of ...

  17. Credit EDA Case Study

    Credit EDA Case Study - Free download as Powerpoint Presentation (.ppt / .pptx), PDF File (.pdf), Text File (.txt) or view presentation slides online. bank dataset loan approval

  18. EDA Case Study PPT.pptx

    View EDA Case Study PPT.pptx from COMPUTER S 123 at Liverpool John Moores University. Credit EDA Case Study: Submitted By: Akshay Kumar Akshat Chaturvedi Below are the column we are going to analyze AI Homework Help

  19. Credit EDA Case Study Analysis

    Explore and run machine learning code with Kaggle Notebooks | Using data from Credit EDA Case Study. code. New Notebook. table_chart. New Dataset. tenancy. New Model. emoji_events. New Competition. corporate_fare. New Organization. No Active Events. Create notebooks and keep track of their status here. add New Notebook. auto_awesome_motion.

  20. Exploratory Data Analysis For Credit Risk Assesment

    Exploratory Data Analysis For Credit Risk Assesment. 1. THE CREDIT RISK ANALYTICS EDA Case Study By, • Mr. Prathmesh Pise • Mr. Vishal Patil. 2. CONTENTS Problem statement Flow Chart Importing and Cleaning1 Importing and Cleaning2 Approach Data Visualization Significant Insights.

  21. Eda Credit Upgrad

    warnings.filterwarnings('ignore') # Importing the required libraries import numpy as np. import pandas as pd. import seaborn as sns. import matplotlib.pyplot as plt. import scipy.stats as ss. import jovian as jvn. %matplotlib inline. Collaborate with 02-swetha on eda-credit-upgrad notebook.

  22. Credit_EDA_Case_Study

    If the issue persists, it's likely a problem on our side. Unexpected token < in JSON at position 4. keyboard_arrow_up. content_copy. SyntaxError: Unexpected token < in JSON at position 4. Refresh. Explore and run machine learning code with Kaggle Notebooks | Using data from Credit Card Fraud Detection.