{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:32:44Z","timestamp":1742963564398,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319937007"},{"type":"electronic","value":"9783319937014"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93701-4_36","type":"book-chapter","created":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T11:49:52Z","timestamp":1528717792000},"page":"462-475","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Effective Model Between Mobile Phone Usage and P2P Default Behavior"],"prefix":"10.1007","author":[{"given":"Huan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Lin","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Xi","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jianhua","family":"Zou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,12]]},"reference":[{"issue":"4","key":"36_CR1","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1111\/jcc4.12021","volume":"18","author":"J Boase","year":"2013","unstructured":"Boase, J., Ling, R.: Measuring mobile phone use: self-report versus log data. J. Comput.-Mediated Commun. 18(4), 508\u2013519 (2013)","journal-title":"J. Comput.-Mediated Commun."},{"issue":"1","key":"36_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"issue":"C","key":"36_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.elerap.2015.11.003","volume":"15","author":"X Chen","year":"2016","unstructured":"Chen, X., Zhou, L., Wan, D.: Group social capital and lending outcomes in the financial credit market : an empirical study of online peer-to-peer lending. Electron. Commer. Res. Appl. 15(C), 1\u201313 (2016)","journal-title":"Electron. Commer. Res. Appl."},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Davis, J., Goadrich, M.: The relationship between precision-recall and roc curves. In: Proceedings of the International Conference on Machine Learning, ICML 2006, New York, NY, USA, pp. 233\u2013240 (2006)","DOI":"10.1145\/1143844.1143874"},{"issue":"1","key":"36_CR5","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1080\/00036846.2014.962222","volume":"47","author":"R Emekter","year":"2015","unstructured":"Emekter, R., Tu, Y., Jirasakuldech, B., Lu, M.: Evaluating credit risk and loan performance in online Peer-to-Peer (P2P) lending. Appl. Econ. 47(1), 54\u201370 (2015)","journal-title":"Appl. Econ."},{"issue":"3","key":"36_CR6","first-page":"590","volume":"33","author":"J Gathergood","year":"2012","unstructured":"Gathergood, J.: Self-control, financial literacy and consumer over-indebtedness. Soc. Sci. Electron. Publishing 33(3), 590\u2013602 (2012)","journal-title":"Soc. Sci. Electron. Publishing"},{"key":"36_CR7","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.jbef.2014.04.002","volume":"2","author":"L Gonzalez","year":"2014","unstructured":"Gonzalez, L., Loureiro, Y.K.: When can a photo increase credit? The impact of lender and borrower profiles on online peer-to-peer loans. J. Behav. Exp. Financ. 2, 44\u201358 (2014)","journal-title":"J. Behav. Exp. Financ."},{"issue":"2","key":"36_CR8","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1016\/j.ejor.2015.05.050","volume":"249","author":"Y Guo","year":"2015","unstructured":"Guo, Y., Zhou, W., Luo, C., Liu, C., Xiong, H.: Instance-based credit risk assessment for investment decisions in P2P lending. Eur. J. Oper. Res. 249(2), 417\u2013426 (2015)","journal-title":"Eur. J. Oper. Res."},{"issue":"6","key":"36_CR9","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1177\/1745691616650285","volume":"11","author":"GM Harari","year":"2016","unstructured":"Harari, G.M., Lane, N.D., Wang, R., Crosier, B.S., Campbell, A.T., Gosling, S.D.: Using smartphones to collect behavioral data in psychological science: opportunities, practical considerations, and challenges. Perspect. Psychol. Sci. 11(6), 838\u2013854 (2016)","journal-title":"Perspect. Psychol. Sci."},{"key":"36_CR10","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cobeha.2017.07.018","volume":"18","author":"GM Harari","year":"2017","unstructured":"Harari, G.M., M\u00fcller, S.R., Aung, M.S., Rentfrow, P.J.: Smartphone sensing methods for studying behavior in everyday life. Curr. Opin. Behav. Sci. 18, 83\u201390 (2017)","journal-title":"Curr. Opin. Behav. Sci."},{"key":"36_CR11","volume-title":"China\u2019s Online Lending Industry in 2015","author":"W JiaZhuo","year":"2015","unstructured":"JiaZhuo, W., Hongwei, X.: China\u2019s Online Lending Industry in 2015. Tsinghua University Press, Beijing (2015)"},{"key":"36_CR12","unstructured":"Lin, M., Prabhala, N.R., Viswanathan, S.: Judging borrowers by the company they keep: social networks and adverse selection in online peer-to-peer lending. SSRN eLibrary (2009)"},{"issue":"1","key":"36_CR13","first-page":"10","volume":"10","author":"S Liu","year":"2015","unstructured":"Liu, S., Qu, Q., Wang, S.: Rationality analytics from trajectories. ACM Trans. Knowl. Discov. Data (TKDD) 10(1), 10 (2015)","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"issue":"10","key":"36_CR14","doi-asserted-by":"publisher","first-page":"4621","DOI":"10.1016\/j.eswa.2015.02.001","volume":"42","author":"M Malekipirbazari","year":"2015","unstructured":"Malekipirbazari, M., Aksakalli, V.: Risk assessment in social lending via random forests. Expert Syst. Appl. 42(10), 4621\u20134631 (2015)","journal-title":"Expert Syst. Appl."},{"key":"36_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-37210-0_6","volume-title":"Social Computing, Behavioral-Cultural Modeling and Prediction","author":"Y-A de Montjoye","year":"2013","unstructured":"de Montjoye, Y.-A., Quoidbach, J., Robic, F., Pentland, A.S.: Predicting personality using novel mobile phone-based metrics. In: Greenberg, A.M., Kennedy, W.G., Bos, N.D. (eds.) SBP 2013. LNCS, vol. 7812, pp. 48\u201355. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37210-0_6"},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Oliveira, R.D., Karatzoglou, A., Cerezo, P.C., Oliver, N.: Towards a psychographic user model from mobile phone usage. In: CHI 11 Extended Abstracts on Human Factors in Computing Systems, pp. 2191\u20132196 (2011)","DOI":"10.1145\/1979742.1979920"},{"issue":"4","key":"36_CR17","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/2501654.2501656","volume":"45","author":"C Parent","year":"2013","unstructured":"Parent, C., Spaccapietra, S., Renso, C., Andrienko, G., Andrienko, N., Bogorny, V., Damiani, M.L., Gkoulalas-Divanis, A., Macedo, J., Pelekis, N., et al.: Semantic trajectories modeling and analysis. ACM Comput. Surv. (CSUR) 45(4), 42 (2013)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"36_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-319-20267-9_16","volume-title":"User Modeling, Adaptation and Personalization","author":"JS Pedro","year":"2015","unstructured":"Pedro, J.S., Proserpio, D., Oliver, N.: MobiScore: towards universal credit scoring from mobile phone data. In: Ricci, F., Bontcheva, K., Conlan, O., Lawless, S. (eds.) UMAP 2015. LNCS, vol. 9146, pp. 195\u2013207. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-20267-9_16"},{"key":"36_CR19","first-page":"023","volume":"2016","author":"M Polena","year":"2016","unstructured":"Polena, M., Regner, T., et al.: Determinants of borrowers default in P2P lending under consideration of the loan risk class. Jena Econ. Res. Pap. 2016, 023 (2016)","journal-title":"Jena Econ. Res. Pap."},{"key":"36_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10115-012-0511-z","volume":"37","author":"C Renso","year":"2013","unstructured":"Renso, C., Baglioni, M., de Macedo, J.A.F., Trasarti, R., Wachowicz, M.: How you move reveals who you are: understanding human behavior by analyzing trajectory data. Knowl. Inf. Syst. 37, 1\u201332 (2013)","journal-title":"Knowl. Inf. Syst."},{"issue":"10","key":"36_CR21","doi-asserted-by":"publisher","first-page":"e0139427","DOI":"10.1371\/journal.pone.0139427","volume":"10","author":"C Serrano-Cinca","year":"2015","unstructured":"Serrano-Cinca, C., Gutierrez-Nieto, B., L\u00f3pez-Palacios, L.: Determinants of default in P2P lending. PLoS ONE 10(10), e0139427 (2015)","journal-title":"PLoS ONE"},{"issue":"C","key":"36_CR22","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.dss.2016.06.014","volume":"89","author":"C Serrano-Cinca","year":"2016","unstructured":"Serrano-Cinca, C., Gutierrez-Nieto, B.: The use of profit scoring as an alternative to credit scoring systems in peer-to-peer (P2P) lending. Decis. Support Syst. 89(C), 113\u2013122 (2016)","journal-title":"Decis. Support Syst."},{"key":"36_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-642-22362-4_35","volume-title":"User Modeling, Adaption and Personalization","author":"V Soto","year":"2011","unstructured":"Soto, V., Frias-Martinez, V., Virseda, J., Frias-Martinez, E.: Prediction of socioeconomic levels using cell phone records. In: Konstan, J.A., Conejo, R., Marzo, J.L., Oliver, N. (eds.) UMAP 2011. LNCS, vol. 6787, pp. 377\u2013388. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22362-4_35"},{"key":"36_CR24","doi-asserted-by":"crossref","unstructured":"Wang, D., Zhang, Y., Zhao, Y.: LightGBM: an effective miRNA classification method in breast cancer patients. In: International Conference, pp. 7\u201311 (2017)","DOI":"10.1145\/3155077.3155079"},{"key":"36_CR25","doi-asserted-by":"crossref","unstructured":"Wang, M., Zheng, X., Zhu, M., Hu, Z.: P2P lending platforms bankruptcy prediction using fuzzy SVM with region information. In: 2016 IEEE 13th International Conference on e-Business Engineering (ICEBE), pp. 115\u2013122. IEEE (2016)","DOI":"10.1109\/ICEBE.2016.028"},{"issue":"1","key":"36_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJCINI.2016010101","volume":"10","author":"S Wang","year":"2016","unstructured":"Wang, S., Qi, Y., Fu, B., Liu, H.: Credit risk evaluation based on text analysis. Int. J. Cogn. Inform. Nat. Intell. 10(1), 1\u201311 (2016)","journal-title":"Int. J. Cogn. Inform. Nat. Intell."},{"key":"36_CR27","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-53959-6_3","volume-title":"Frontiers in Internet Technologies","author":"X Wang","year":"2013","unstructured":"Wang, X., Zhang, D., Zeng, X., Wu, X.: A Bayesian investment model for online P2P lending. In: Su, J., Zhao, B., Sun, Z., Wang, X., Wang, F., Xu, K. (eds.) Frontiers in Internet Technologies. CCIS, vol. 401, pp. 21\u201330. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-53959-6_3"},{"issue":"4","key":"36_CR28","first-page":"1","volume":"7","author":"S Wu","year":"2014","unstructured":"Wu, S., Kang, N., Yang, L.: Fraudulent behavior forecast in telecom industry based on data mining technology. Commun. IIMA 7(4), 1 (2014)","journal-title":"Commun. IIMA"},{"key":"36_CR29","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.procs.2016.07.055","volume":"91","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Jia, H., Diao, Y., Hai, M., Li, H.: Research on credit scoring by fusing social media information in online peer-to-peer lending. Procedia Comput. Sci. 91, 168\u2013174 (2016)","journal-title":"Procedia Comput. Sci."},{"issue":"6","key":"36_CR30","first-page":"72","volume":"8","author":"H Zhao","year":"2017","unstructured":"Zhao, H., Ge, Y., Liu, Q., Wang, G., Chen, E., Zhang, H.: P2P lending survey: platforms, recent advances and prospects. ACM Trans. Intell. Syst. Technol. (TIST) 8(6), 72 (2017)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2018"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93701-4_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T00:14:34Z","timestamp":1654906474000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-93701-4_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319937007","9783319937014"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93701-4_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"12 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuxi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccs-computsci2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iccs-meeting.org\/iccs2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"406","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"148","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}