{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:38:06Z","timestamp":1775068686482,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T00:00:00Z","timestamp":1552608000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T00:00:00Z","timestamp":1552608000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann Oper Res"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s10479-019-03188-0","type":"journal-article","created":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T20:37:34Z","timestamp":1552682254000},"page":"715-739","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Default avoidance on credit card portfolios using accounting, demographical and exploratory factors: decision making based on machine learning (ML) techniques"],"prefix":"10.1007","volume":"294","author":[{"given":"Nikolaos","family":"Sariannidis","sequence":"first","affiliation":[]},{"given":"Stelios","family":"Papadakis","sequence":"additional","affiliation":[]},{"given":"Alexandros","family":"Garefalakis","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Lemonakis","sequence":"additional","affiliation":[]},{"given":"Tsioptsia","family":"Kyriaki-Argyro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,15]]},"reference":[{"issue":"2","key":"3188_CR1","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/0020-7373(92)90018-G","volume":"36","author":"D Aha","year":"1992","unstructured":"Aha, D. (1992). Tolerating noisy, irrelevant, and novel attributes in instance-based learning algorithms. International Journal of Man\u2013Machine Studies, 36(2), 267\u2013287.","journal-title":"International Journal of Man\u2013Machine Studies"},{"issue":"7","key":"3188_CR2","doi-asserted-by":"publisher","first-page":"36","DOI":"10.5120\/ijca2016910702","volume":"145","author":"V Ajay","year":"2016","unstructured":"Ajay, V., & Shomona, G. J. (2016). Prediction of credit-card defaulters: a comparative study on performance of classifiers. International Journal of Computer Applications (0975\u20138887), 145(7), 36\u201341.","journal-title":"International Journal of Computer Applications (0975\u20138887)"},{"key":"3188_CR3","first-page":"125","volume":"2","author":"A Ben-Hur","year":"2001","unstructured":"Ben-Hur, A., Horn, D., Siegelmann, H. T., & Vapnik, V. (2001). Support vector clustering. Journal of Machine Learning Research, 2, 125\u2013137.","journal-title":"Journal of Machine Learning Research"},{"key":"3188_CR4","doi-asserted-by":"crossref","unstructured":"Bhaduri, A. (2009). Credit scoring using artificial immune system algorithms: a comparative study. In Proceedings of the world congress on nature and biologically inspired computing NaBIC2009, Coimbatore (pp. 1540\u20131543).","DOI":"10.1109\/NABIC.2009.5393671"},{"issue":"1","key":"3188_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L. (2001). Random forests. Machine Learning, 45(1), 5\u201332.","journal-title":"Machine Learning"},{"key":"3188_CR7","unstructured":"Cheng D., Zhang S., Deng Z., Zhu Y., & Zong M. (2014). kNN algorithm with data-driven k value. In: Luo X., Yu J. X., & Li Z. (Eds.), Advanced data mining and applications. ADMA 2014. Lecture Notes in Computer Science (Vol. 8933). Berlin: Springer."},{"issue":"1","key":"3188_CR8","first-page":"43","volume":"4","author":"RH Davis","year":"1992","unstructured":"Davis, R. H., Edelman, D. B., & Gammerman, A. J. (1992). Machine-learning algorithms for credit-card applications. Journal of Management Mathematics, 4(1), 43\u201351.","journal-title":"Journal of Management Mathematics"},{"issue":"1","key":"3188_CR9","doi-asserted-by":"publisher","first-page":"9","DOI":"10.21511\/imfi.14(1).2017.01","volume":"14","author":"A Dimitras","year":"2017","unstructured":"Dimitras, A., Papadakis, S., & Garefalakis, A. (2017). Evaluation of empirical attributes for credit risk forecasting from numerical data. Investment Management and Financial Innovations, 14(1), 9\u201318. https:\/\/doi.org\/10.21511\/imfi.14(1).2017.01.","journal-title":"Investment Management and Financial Innovations"},{"key":"3188_CR10","unstructured":"Frank, E., & Witten, I. H. (1998). Generating accurate rule sets without global optimization. In J. Shavlik (Ed.), Proceedings of the fifteenth international conference on machine learning, Madison, WI. San Francisco: Morgan Kaufmann (pp. 144\u2013151)."},{"key":"3188_CR11","unstructured":"Frank, E., & Hall, M. (2001). A simple approach to ordinal classification. In L. de Raedt, & P. A. Flach (Eds.), Proceedings of the twelfth European conference on machine learning, Freiburg, Germany. Berlin: Springer (pp. 145\u2013156)."},{"issue":"1","key":"3188_CR12","doi-asserted-by":"publisher","first-page":"12","DOI":"10.3390\/jrfm11010012","volume":"11","author":"S Hamori","year":"2018","unstructured":"Hamori, S., Kawai, M., Kume, T., Murakami, Y., & Watanabe, Y. (2018). Ensemble learning or deep learning? Application to default risk analysis. Journal of Risk and Financial Management, 11(1), 12. https:\/\/doi.org\/10.3390\/jrfm11010012.","journal-title":"Journal of Risk and Financial Management"},{"issue":"1","key":"3188_CR13","doi-asserted-by":"publisher","first-page":"77","DOI":"10.2307\/2348414","volume":"45","author":"DJ Hand","year":"1996","unstructured":"Hand, D. J., & Henley, W. E. (1996). A k-nearest-neighbour classifier for assessing consumer credit risk. The Statistician, 45(1), 77\u201395.","journal-title":"The Statistician"},{"issue":"4","key":"3188_CR14","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1142\/S021962200400129X","volume":"3","author":"J He","year":"2004","unstructured":"He, J., Liu, X., Shi, Y., Xu, W., & Yan, N. (2004). Classifications of credit cardholder behavior by using fuzzy linear programming. International Journal of Information Technology and Decision Making, 3(4), 633\u2013650.","journal-title":"International Journal of Information Technology and Decision Making"},{"issue":"3","key":"3188_CR15","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1016\/j.ijar.2007.12.002","volume":"48","author":"I Jenhani","year":"2008","unstructured":"Jenhani, I., Nahla, B. A., & Ziedm, E. (2008). Decision trees as possibilistic classifiers (Special Section on Choquet Integration in honor of Gustave Choquet (1915\u20132006) and Special Section on Nonmonotonic and Uncertain Reasoning). International Journal of Approximate Reasoning, 48(3), 784\u2013807.","journal-title":"International Journal of Approximate Reasoning"},{"key":"3188_CR31","doi-asserted-by":"publisher","unstructured":"Khandani, A. E., Kim, A. J., & Lo, A. W. (2010). Consumer credit risk models via machine-learning Algorithms. AFA 2011 Denver Meetings Paper. https:\/\/doi.org\/10.2139\/ssrn.1568864.","DOI":"10.2139\/ssrn.1568864"},{"issue":"42","key":"3188_CR16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1108\/JEFAS-02-2017-0039","volume":"22","author":"A Krichene","year":"2017","unstructured":"Krichene, A. (2017). Using a naive Bayesian classifier methodology for loan risk assessment evidence from a Tunisian commercial bank. Journal of Economics, Finance and Administrative Science, 22(42), 3\u201324.","journal-title":"Journal of Economics, Finance and Administrative Science"},{"key":"3188_CR17","unstructured":"Landwehr, N., Hall, M., & Frank, E. (2003). Logistic model trees. In N. Lavrac, D. Gamberger, L. Todorovski, & H. Blockeel (Eds.), Proceedings of the fourteenth European conference on machine learning, Cavtat-Dubrovnik, Croatia. Berlin: Springer (pp. 241\u2013252)."},{"key":"3188_CR18","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1016\/j.csda.2004.11.006","volume":"50","author":"TS Lee","year":"2006","unstructured":"Lee, T. S., Chiu, C. C., Chou, Y. C., & Lu, C. J. (2006). Mining the customer credit using classification and regression tree and multivariate adaptive regression splines. Computational Statistics and Data Analysis, 50, 1113\u20131130.","journal-title":"Computational Statistics and Data Analysis"},{"key":"3188_CR19","unstructured":"Lichman, M. (2013). UCI Machine Learning Repository [http:\/\/archive.ics.uci.edu\/ml]. Irvine: University of California, School of Information and Computer Science. The original dataset can be found at the UCI Machine Learning Repository, i.e. https:\/\/archive.ics.uci.edu\/ml\/datasets\/default+of+credit+card+clients"},{"key":"3188_CR20","unstructured":"Makalic, E., & Schmidt, D. F. (2010). Review of modern logistic regression methods with application to small and medium sample size problems. In Li, J. (Eds.), AI 2010: advances in artificial intelligence. AI 2010. Lecture Notes in Computer Science, (Vol. 6464). Berlin: Springer."},{"key":"3188_CR21","doi-asserted-by":"publisher","first-page":"10604","DOI":"10.1016\/j.eswa.2009.02.055","volume":"36","author":"Y Marinakis","year":"2009","unstructured":"Marinakis, Y., Marinaki, M., Doumpos, M., & Zopounidis, C. (2009). Ant colony and particle swarm optimization for financial classification problems. Expert Systems with Applications, 36, 10604\u201310611.","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"3188_CR22","first-page":"36","volume":"2","author":"S Neema","year":"2017","unstructured":"Neema, S., & Soibam, B. (2017). The comparison of machine learning methods to achieve most cost-effective prediction for credit card default. Journal of Management Science and Business Intelligence, 2(2), 36\u201341.","journal-title":"Journal of Management Science and Business Intelligence"},{"key":"3188_CR23","unstructured":"Peng, Y., Kou, G., Chen, Z., & Shi, Y. (2004). Cross-validation and ensemble analyses on multiple-criteria linear programming classification for credit cardholder behavior, Lecture Notes in Computer Science, ICCS 2004 (Vol. 3039, pp. 931\u2013939)."},{"key":"3188_CR34","unstructured":"Quinlan, J., Rajendra, G., & Castro, D. (1998). Bank collateralised loan obligations: From 0 to 60 in less than 2 years? Merrill Lynch, Global Securities Research & Economics Group, March."},{"issue":"1\u20132","key":"3188_CR24","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/S0004-3702(00)00085-0","volume":"125","author":"M Ramoni","year":"2001","unstructured":"Ramoni, M., & Sebastiani, P. (2001). Robust Bayes classifiers. Artificial Intelligence, 125(1\u20132), 209\u2013226.","journal-title":"Artificial Intelligence"},{"key":"3188_CR25","doi-asserted-by":"crossref","unstructured":"Shen, A., Tong, R., & Deng, Y. (2007). Application of classification models on credit card fraud detection. In Proceedings of the international conference on service systems and service management, Chengdu (pp. 1\u20134).","DOI":"10.1109\/ICSSSM.2007.4280163"},{"issue":"4","key":"3188_CR26","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1142\/S0219622005001775","volume":"4","author":"Y Shi","year":"2005","unstructured":"Shi, Y., Peng, Y., Kou, G., & Chen, Z. (2005). Classifying credit card accounts for business intelligence and decision making: A multiple-criteria quadratic programming approach. International Journal of Information Technology and Decision Making, 4(4), 581\u2013599.","journal-title":"International Journal of Information Technology and Decision Making"},{"issue":"7","key":"3188_CR27","first-page":"46","volume":"32","author":"JG Shomona","year":"2011","unstructured":"Shomona, J. G., & Ramani, R. G. (2011). Discovery of knowledge patterns in clinical data through data mining algorithms: Multi-class categorization of breast tissue data. International Journal of Computer Applications, 32(7), 46\u201353.","journal-title":"International Journal of Computer Applications"},{"issue":"3","key":"3188_CR28","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1111\/j.1540-6261.1987.tb04576.x","volume":"42","author":"V Srinivasan","year":"1987","unstructured":"Srinivasan, V., & Kim, Y. H. (1987). Credit granting: A comparative analysis of classification procedures. The Journal of Finance, 42(3), 665\u2013681.","journal-title":"The Journal of Finance"},{"key":"3188_CR29","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1111\/j.2517-6161.1974.tb00994.x","volume":"36","author":"M Stone","year":"1974","unstructured":"Stone, M. (1974). Cross-validation choice and assessment of statistical predictions. Journal of the Royal Statistical Society B, 36, 111\u2013147.","journal-title":"Journal of the Royal Statistical Society B"},{"key":"3188_CR30","unstructured":"Watanabe, C. Y. V., Ribeiro, M. X., Traina, C., & Traina, A. J. M. (2011). SACMiner: A new classification method based on statistical association rules to mine medical images. In: J. Filipe, & J. Cordeiro (Eds.), Enterprise information systems. ICEIS 2010. Lecture Notes in Business Information Processing (Vol. 73). Berlin: Springer."},{"key":"3188_CR32","doi-asserted-by":"crossref","unstructured":"Yeh, I.-C., & Lien, C. (2009). The comparisons of data mining techniques for the predictive accuracy of probability of default of credit card clients. Expert Systems with Applications, 36(2, Part 1), 2473\u20132480.","DOI":"10.1016\/j.eswa.2007.12.020"}],"container-title":["Annals of Operations Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-019-03188-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10479-019-03188-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-019-03188-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T21:03:22Z","timestamp":1721077402000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10479-019-03188-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,15]]},"references-count":32,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["3188"],"URL":"https:\/\/doi.org\/10.1007\/s10479-019-03188-0","relation":{},"ISSN":["0254-5330","1572-9338"],"issn-type":[{"value":"0254-5330","type":"print"},{"value":"1572-9338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,15]]},"assertion":[{"value":"15 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}