{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:05:01Z","timestamp":1772121901947,"version":"3.50.1"},"reference-count":80,"publisher":"Wiley","license":[{"start":{"date-parts":[[2019,3,13]],"date-time":"2019-03-13T00:00:00Z","timestamp":1552435200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Geran Putra-Inisiatif Putra Siswazah","award":["GP-IPS\/2018\/9646000"],"award-info":[{"award-number":["GP-IPS\/2018\/9646000"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Advances in Operations Research"],"published-print":{"date-parts":[[2019,3,13]]},"abstract":"<jats:p>Development of credit scoring models is important for financial institutions to identify defaulters and nondefaulters when making credit granting decisions. In recent years, artificial intelligence (AI) techniques have shown successful performance in credit scoring. Support Vector Machines and metaheuristic approaches have constantly received attention from researchers in establishing new credit models. In this paper, two AI techniques are reviewed with detailed discussions on credit scoring models built from both methods since 1997 to 2018. The main discussions are based on two main aspects which are model type with issues addressed and assessment procedures. Then, together with the compilation of past experiments results on common datasets, hybrid modelling is the state-of-the-art approach for both methods. Some possible research gaps for future research are identified.<\/jats:p>","DOI":"10.1155\/2019\/1974794","type":"journal-article","created":{"date-parts":[[2019,3,13]],"date-time":"2019-03-13T19:30:39Z","timestamp":1552505439000},"page":"1-30","source":"Crossref","is-referenced-by-count":41,"title":["Credit Scoring: A Review on Support Vector Machines and Metaheuristic Approaches"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2438-0189","authenticated-orcid":true,"given":"R. Y.","family":"Goh","sequence":"first","affiliation":[{"name":"Laboratory of Computational Statistics and Operations Research, Institute for Mathematical Research, Universiti Putra Malaysia (UPM), 43400 Serdang, Selangor, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6270-1414","authenticated-orcid":true,"given":"L. S.","family":"Lee","sequence":"additional","affiliation":[{"name":"Laboratory of Computational Statistics and Operations Research, Institute for Mathematical Research, Universiti Putra Malaysia (UPM), 43400 Serdang, Selangor, Malaysia"},{"name":"Department of Mathematics, Faculty of Science, Universiti Putra Malaysia (UPM), 43400 Serdang, Selangor, Malaysia"}]}],"member":"311","reference":[{"key":"27","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-985X.1997.00078.x"},{"key":"72","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-2070(00)00034-0"},{"key":"68","doi-asserted-by":"publisher","DOI":"10.1177\/2325967113513546"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.05.060"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.10.040"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.12.006"},{"key":"62","first-page":"161","volume-title":"An automated literature analysis on data mining applications to credit risk assessment","year":"2016"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jors.2601545"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.09.100"},{"issue":"2","key":"43","first-page":"115","volume":"7","year":"2010","journal-title":"International Arab Journal of Information Technolog"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2015.05.030"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1016\/j.sorms.2016.10.001"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1057\/jors.2013.7"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.2307\/1246534"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.2307\/2978933"},{"key":"65","doi-asserted-by":"publisher","DOI":"10.2307\/2490395"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.31.6.647"},{"key":"7","first-page":"1","year":"2018","journal-title":"Risk and Decision Analysis"},{"key":"74","first-page":"73","volume":"2","year":"2003","journal-title":"Bank- en Financiewezen"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(03)00086-1"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.07.041"},{"key":"44","first-page":"490","year":"2006","journal-title":"Rough Sets and Knowledge Technology"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.04.018"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.01.005"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2009.03.036"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2011.04.184"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.02.030"},{"key":"77","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2005.859320"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.08.029"},{"key":"85","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.10.066"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.01.011"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.08.021"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2017.02.037"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2017.10.007"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.07.007"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.04.051"},{"key":"84","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.01.024"},{"key":"93","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622009003582"},{"issue":"2","key":"94","first-page":"149","volume":"13","year":"2009","journal-title":"Soft Computing-A Fusion of Foundations, Methodologies and Applications"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.12.025"},{"key":"88","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.06.023"},{"key":"82","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0548(99)00149-5"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.12.057"},{"key":"15","doi-asserted-by":"crossref","first-page":"1324","DOI":"10.1016\/j.procs.2012.04.145","volume":"9","year":"2012","journal-title":"Procedia Computer Science"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.sepro.2011.11.012"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2012.10.005"},{"issue":"1","key":"23","doi-asserted-by":"crossref","first-page":"26","DOI":"10.15388\/NA.2014.1.2","volume":"19","year":"2014","journal-title":"Nonlinear Analysis: Modelling and Control"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.12.001"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.11.102"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.04.033"},{"key":"81","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2017.04.036"},{"key":"95","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.024"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.5120\/2220-2829"},{"key":"89","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.04.049"},{"key":"83","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.10.022"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1093\/imaman\/8.4.323"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.01.003"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/springerreference"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2005.05.027"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.01.076"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1057\/jors.2008.164"},{"key":"73","year":"2017","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1093\/imaman\/5.1.63"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1080\/02664760050081951"},{"issue":"4","key":"19","first-page":"215","volume":"5","year":"2002","journal-title":"Journal of Applied Mathematics and Decision Sciences"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-005-6617-0"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.02.055"},{"key":"70","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.06.016"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.09.010"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.5897\/ajbm10.1075"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.05.023"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.09.004"},{"key":"79","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.04.291"},{"key":"80","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.11.011"},{"key":"76","first-page":"347","volume-title":"A new feature selection technique applied to credit scoring data using a rank aggregation approach based on: optimization, genetic algorithm and similarity","year":"2014"},{"issue":"2","key":"41","first-page":"468","volume":"7","year":"2018","journal-title":"International Journal of Advance Research in Science and Engineering"},{"key":"75","year":"1998"},{"key":"25","first-page":"307","year":"2013","journal-title":"Artificial Intelligence and Statistics"},{"key":"59","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/978-3-540-75390-2_2","volume-title":"Rule extraction from support vector machines: an overview of issues and application in credit scoring","volume":"80","year":"2008"},{"key":"49"}],"container-title":["Advances in Operations Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/aor\/2019\/1974794.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/aor\/2019\/1974794.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/aor\/2019\/1974794.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T08:12:00Z","timestamp":1574323920000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/aor\/2019\/1974794\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,13]]},"references-count":80,"alternative-id":["1974794","1974794"],"URL":"https:\/\/doi.org\/10.1155\/2019\/1974794","relation":{},"ISSN":["1687-9147","1687-9155"],"issn-type":[{"value":"1687-9147","type":"print"},{"value":"1687-9155","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,13]]}}}