A Case Study on Developing an End-To-End Solution to Identify Loan Eligible Customers and Assigning Them Credit Lines Based on Their Predicted Income

2021 ◽  
pp. 133-143
Author(s):  
Gaurav Nagpal ◽  
Ankita Dhamija ◽  
Divyansh Gupta
Keyword(s):  
2019 ◽  
Vol 3 ◽  
pp. 1503
Author(s):  
Elisabeth Engl ◽  
Peter Smittenaar ◽  
Sema K. Sgaier

One-size-fits-all interventions that aim to change behavior are a missed opportunity to improve human health and well-being, as they do not target the different reasons that drive people’s choices and behaviors. Psycho-behavioral segmentation is an approach to uncover such differences and enable the design of targeted interventions, but is rarely implemented at scale in global development. In part, this may be due to the many choices program designers and data scientists face, and the lack of available guidance through the process. Effective segmentation encompasses conceptualization and selection of the dimensions to segment on, which often requires the design of suitable qualitative and quantitative primary research. The choice of algorithm and its parameters also profoundly shape the resulting output and how useful the results are in the field. Analytical outputs are not self-explanatory and need to be subjectively evaluated and described. Finally, segments can be prioritized and targeted with matching interventions via appropriate channels. Here, we provide an end-to-end overview of all the stages from planning, designing field-based research, analyzing, and implementing a psycho-behavioral segmentation solution. We illustrate the choices and critical steps along the way, and discuss a case study of segmentation for voluntary medical male circumcision that implemented the method described here. Though our examples mostly draw on health interventions in the developing world, the principles in this approach can be used in any context where understanding human heterogeneity in driving behavior change is valuable.


2021 ◽  
Author(s):  
Hongyi Zhang ◽  
Jan Bosch ◽  
Helena Holmstrom Olsson
Keyword(s):  

2013 ◽  
Vol 7 (4) ◽  
pp. 632-641 ◽  
Author(s):  
Miriam C. Bergue Alves ◽  
Doron Drusinsky ◽  
James Bret Michael ◽  
Man-Tak Shing

2019 ◽  
Vol 25 (5) ◽  
pp. 1145-1163 ◽  
Author(s):  
Per Engelseth ◽  
Judith Molka-Danielsen ◽  
Brian E. White

Purpose The purpose of this paper is to question the applicability of recent industry-derived terms such as “Big Data” (BD) and the “Internet of things” (IoT) in a supply chain managerial context. Is this labeling useful in managing the operations found in supply chains? Design/methodology/approach BD and IoT are critically discussed in the context of a complete supply chain organization. A case study of banana supply from Costa Rica to Norway is provided to empirically ground this research. Thompson’s contingency theory, Alderson’s functionalistic end-to-end “marketing channels” model, Penrose’s view of supply purpose associated with service provision, and particularities of banana supply reveal how end-to-end supply chains are complex systems, even though the product distributed is fairly simple. Findings Results indicate that the usefulness of BD in supply chain management discourse is limited. Instead its connectivity is facilitated by what is now becoming commonly labeled as IoT, people, devices and documents that are useful when taking an end-to-end supply chain perspective. Connectivity is critical to efficient contemporary supply chain management. Originality/value BD and IoT have emerged as a part of contemporary supply chain management discourse. This study directs attention to the importance of scrutinizing emergent and actual discourse in managing supply chains, that it is not irrelevant which words are applied, e.g., in research on information-enabled supply process development. Often the old words of professional terminology may be sufficient or even better to help manage supply.


2009 ◽  
Vol 33 (4) ◽  
pp. 293-301 ◽  
Author(s):  
Dorman Chimhamhiwa ◽  
Paul van der Molen ◽  
Onisimo Mutanga ◽  
Denis Rugege

2021 ◽  
Vol 11 (17) ◽  
pp. 7789
Author(s):  
Asmara Afzal ◽  
Mehdi Hussain ◽  
Shahzad Saleem ◽  
M. Khuram Shahzad ◽  
Anthony T. S. Ho ◽  
...  

Instant messaging applications (apps) have played a vital role in online interaction, especially under COVID-19 lockdown protocols. Apps with security provisions are able to provide confidentiality through end-to-end encryption. Ill-intentioned individuals and groups use these security services to their advantage by using the apps for criminal, illicit, or fraudulent activities. During an investigation, the provision of end-to-end encryption in apps increases the complexity for digital forensics investigators. This study aims to provide a network forensic strategy to identify the potential artifacts from the encrypted network traffic of the prominent social messenger app Signal (on Android version 9). The analysis of the installed app was conducted over fully encrypted network traffic. By adopting the proposed strategy, the forensic investigator can easily detect encrypted traffic activities such as chatting, media messages, audio, and video calls by looking at the payload patterns. Furthermore, a detailed analysis of the trace files can help to create a list of chat servers and IP addresses of involved parties in the events. As a result, the proposed strategy significantly facilitates extraction of the app’s behavior from encrypted network traffic which can then be used as supportive evidence for forensic investigation.


2021 ◽  
Author(s):  
Siddhant Arora ◽  
Alissa Ostapenko ◽  
Vijay Viswanathan ◽  
Siddharth Dalmia ◽  
Florian Metze ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document