Business Intelligence: Data Analysis and Predictive Models for Loans

Verified

Added on  2023/06/05

|23
|2614
|97
Report
AI Summary
This report provides a comprehensive analysis of business intelligence techniques applied to loan delinquency prediction and rainfall analysis. It begins with an introduction to health and health privacy policies, highlighting the importance of data security in healthcare. The report then delves into exploratory data analysis on a loan delinquency dataset, identifying key variables influencing loan defaults using correlation analysis. Two predictive models are developed: a decision tree model and a logistic regression model, with their performance evaluated and compared, concluding that the logistic regression model offers greater precision and accuracy. Finally, the report shifts to an analysis of rainfall data in the Australian Capital Territory (ACT) and New South Wales (NSW), visualizing rainfall patterns across different locations and time periods. Desklib provides access to this and many other solved assignments for students.
Document Page
Running Head: BUSINESS INTELLIGENCE
Business Intelligence
Name of the Student
Name of the University
Student ID
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1BUSINESS INTELLIGENCE
Table of Contents
Task 1...............................................................................................................................................2
Introduction..................................................................................................................................2
Task 2...............................................................................................................................................5
Task 2.1........................................................................................................................................5
Task 2.2......................................................................................................................................12
Task 2.3......................................................................................................................................14
Task 2.4......................................................................................................................................15
Task 3.............................................................................................................................................17
Task 3.1......................................................................................................................................17
Task 3.2......................................................................................................................................18
Task 3.3......................................................................................................................................19
Task 3.4......................................................................................................................................19
Task 3.5......................................................................................................................................20
Reference List................................................................................................................................22
Document Page
2BUSINESS INTELLIGENCE
Task 1
Introduction
Health and health privacy policies are extremely important for each and every individual
in a society. Thus extensive researches has been performed by various researchers on this issue
with the aim of improving the service on health care. The information stored in each of the
organizations on the health of the individuals are highly confidential and are needed to be
protected properly. The hardware used by the health care organizations must be associated in
such a way that it ensures the privacy of the stored information (Digitalhealth.gov.au 2018). The
information security system includes protection of information on the data that has been
collected by the organization, protection to the work that has been assigned to the organization
and also the security of the technological assets.
The digital health agency of Australia is one of the organizations that are entitled to deal
with the health care information of the people of Australia. The government of Australia has
been trying to digitalize the health care information of each of their residents for the past few
decades. Thus, there has been a high increase in the demand for providing all the health
information of each individual in the country so that their digital profiles can be designed
(Myhealthrecord.gov.au 2018). The advancement in technology and innovation in the
machineries and equipment with the help of which diagnosis and therapies are conducted
nowadays are useful in storing information related to each individual and hence storing the
information on the recent events has become much easier. The past data on the health of people
that is available easily is the data on the prenatal treatments of an individual. There are a lot of
risks involved in the health care treatments for an individual. Thus, it is important that all the
information on the previous health conditions are available for better and proper treatment. The
Document Page
3BUSINESS INTELLIGENCE
conditions of malpractice can also be reduced if all the information are available to the server
(Jensen, Jensen and Brunak 2012). Other than the health care services, a lot other information are
also available in this system. The observations or instructions of the service providers are also
recorded in the system for easy access. Further, the payments related to the services
recommended are also provided so that the third party can be prepared for the expenses and
provide them in the proper time.
The confidentiality of the health care information of the people should be maintained by
the organizations where a person is going to avail the services required. Since nowadays large
amount of information is available, every person is concerned about the confidentiality so that
the information is not misused by others. Thus, information is stored in the electronic media as it
is impossible to maintain this huge amount of information on papers. The electronically stored
data is considered nowadays as an asset of greater importance (Cornelisse et al. 2016). Various
studies indicated the fact that the competing companies gather this information from the
physicians and pharmacies to disclose the information to their own companies so that they can
earn incentives. With the help of the gathered information, the profiles of the individuals can be
identified and then all the missing information can be collected. Thus, all the information on an
individual can be extracted in this manner (Gold et al. 2016). Thus, there is a high risk to the fact
that a third party can easily access the information. Thus, proper security is extremely important
to secure the information. In a secured environment, it becomes easier for the service providers
to understand the trend of their medical history and treating the individuals becomes convenient
to them. Preventive measures can also be undertaken easily with the availability of the
information digitally. The most recent technology that has been introduced to the system is the
mobile technology. With the help of this technology, information can be accessed by the both the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4BUSINESS INTELLIGENCE
service takers as well as the providers. An important role in this industry is played by HER. The
electronic system of recording information has resulted in speedy treatments than before
(McCarthy et al. 2017).
Thus, keeping in mind the security measures required to secure the information, several
technological changes has been applied to the system. A lot of authorities are concerned with the
system undergone by the electronic health record. Thus, they have put forward several
propositions on the basis of which the changes in the system has been adopted. The most
important role of the electronic health record system is played in the hospitals mostly. According
to the National Center of Health Statistics, the quality of the service provided to the patients have
benefitted 75 percent of the patients after the adoption and development of this system. The
system not only records the necessary data and information; it also provides information to the
patients that are useful to them for their own benefits. There are records of the medical
conditions and the necessary medications of the patients and also the time for the change in
medication is also recorded. Alerts are provided before the time to both the doctors as well as the
patients. The recent changes adopted by the Digital health technology has resulted in the
influence of the lives of a lot of people (Myhealthrecord.gov.au 2018).
The data on the personal information of the Australian citizens are recorded and
preserved by the Australian Digital Agency. The privacy principles that are adopted by this
organization follows the Privacy Act of 1988 (Legislation.gov.au 2018). The Health Record
System operators takes care of the organizational information. The medium of telephone, mail,
facsimile, general people and health care operators are used to collect information for the
organization. Information of the Job title, employee records, photograph, details of bank and
work history are collected for registration. Once registered, all the medical services used, even
Document Page
5BUSINESS INTELLIGENCE
the nominal first aid received will be recorded in the system and can be administered only in the
premises of the Agency. For the purpose of the security, the information is not accessible any
third party without any kind of authorization. In case if some data are recorded wrongly, the
individual has to provide the necessary IDs and then only they can request for the changes in the
information (Legislation.gov.au 2018).
Task 2
Task 2.1
Exploratory data analysis is performed on all the variables that are present in the dataset.
The main aim of this task is to develop a prediction model to predict whether a person is loan
delinquent or not. Not all the variables in the dataset are responsible in influencing the predictor
variable “loan delinquency”. Thus, in order to identify the variables that can impact the predictor
variable the exploratory data analysis has been performed. The results of the exploratory analysis
are presented in in the following table 2.1.
After the exploratory data analysis to identify the variables that are most related with the
predictor variable “SeriousDlqn2yrs” correlation analysis has been conducted. From the
correlation analysis, it can be seen that the most related variables are “age”, “NumberOfTime30-
59DaysPastDueNotWorse”, “NumberOfOpenCreditLinesAndLoans”,
“NumberOfTimes90DaysLate” and “NumberOfTime60-89DaysPastDueNotWorse” as these are
the variables that have the highest degree of correlation, both positive and negative, with the
variable “SeriousDlqn2yrs”. The results of the correlation analysis are provided in figure
Table 2.1: Results of Exploratory Data Analysis for loan.delinq.csv
Document Page
6BUSINESS INTELLIGENCE
Figure 1: Loan Delinquency
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7BUSINESS INTELLIGENCE
Figure 2: Revolving Utilization of Unsecured Lines
Figure 3: Age
Document Page
8BUSINESS INTELLIGENCE
Figure 4: Number of times 30 – 59 Days Due
Figure 5: Debt Ratio
Document Page
9BUSINESS INTELLIGENCE
Figure 6: Debt Ratio
Figure 7: Number of Open Credit Lines and Loans
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10BUSINESS INTELLIGENCE
Figure 8: Number of Times 90 Days Late
Figure 9: Number of Real Estate Loans Or Lines
Document Page
11BUSINESS INTELLIGENCE
Figure 10: Number of times 60 – 89 Days Due
Figure 11: Number of Dependents
chevron_up_icon
1 out of 23
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]