Coursera | Introduction to Data Analytics(IBM) | Final Assignment_coursera data visualization final assignment-程序员宅基地

技术标签: coursera  数据科学 DSci  data analytics  big data  

其他链接:
假装有笔记(有时间写出来)
Coursera | Introduction to Data Analytics(IBM) | Quiz答案

Coursera | Introduction to Data Analytics | Final Assignment

这个assignment也不难,仔细点没有问题

Final Assignment: Data Analysis in Action

又是一个peer review的assignment,加油~
在这里插入图片描述

Task

Using Data Analysis for Detecting Credit Card Fraud

Companies today are employing analytical techniques for the early detection of credit card frauds, a key factor in mitigating fraud damage. The most common type of credit card fraud does not involve the physical stealing of the card, but that of credit card credentials, which are then used for online purchases.
Imagine that you have been hired as a Data Analyst to work in the Credit Card Division of a bank. And your first assignment is to join your team in using data analysis for the early detection and mitigation of credit card fraud.
In order to prescribe a way forward, that is, suggest what should be done in order for fraud to get detected early on, you need to understand what a fraudulent transaction looks like. And for that you need to start by looking at historical data.

Here is a sample data set that captures the credit card transaction details for a few users.
在这里插入图片描述

Descriptive techniques of analysis, that is, techniques that help you gain an understanding of what happened, include the identification of patterns and anomalies in data. Anomalies signify a variation in a pattern that seems uncharacteristic, or, out of the ordinary. Anomalies may occur for perfectly valid and genuine reasons, but they do warrant an evaluation because they can be a sign of fraudulent activity.

Past studies have suggested that some of the common events that you may need to watch out for include:

  • A change in frequency of orders placed, for example, a customer who typically places a couple of orders a month, suddenly makes numerous transactions within a short span of time, sometimes within minutes of the previous order.
    Orders that are significantly higher than a user’s average transaction.
  • Bulk orders of the same item with slight variations such as color or size—especially if this is atypical of the user’s transaction history.
  • A sudden change in delivery preference, for example, a change from home or office delivery address to in-store, warehouse, or PO Box delivery.
  • A mismatched IP Address, or an IP Address that is not from the general location or area of the billing address.

Before you can analyze the data for patterns and anomalies, you need to:

  • Identify and gather all data points that can be of relevance to your use case. For example, the card holder’s details, transaction details, delivery details, location, and network are some of the data points that could be explored.
  • Clean the data. You need to identify and fix issues in the data that can lead to false or incomplete findings, such as missing data values and incorrect data. You may also need to standardize data formats in some cases, for example, the date fields.

Finally, when you arrive at the findings, you will create appropriate visualizations that communicate your findings to your audience. The graph below samples one such visualization that you would use to capture a trend hidden in the sample data set shared earlier on in the case study.
在这里插入图片描述

In the next section you will be asked to answer the following 5 (five) questions based on this case study:

  1. List at least 5 (five) data points that are required for the analysis and detection of a credit card fraud. (3 marks)
  2. Identify 3 (three) errors/issues that could impact the accuracy of your findings, based on a data table provided. (3 marks)
  3. Identify 2 (two) anomalies, or unexpected behaviors, that would lead you to believe the transaction may be suspect, based on a data table provided. (2 marks)
  4. Briefly explain your key take-away from the provided data visualization chart. (1 mark)
  5. Identify the type of analysis that you are performing when you are analyzing historical credit card data to understand what a fraudulent transaction looks like. [Hint: The four types of Analytics include: Descriptive, Diagnostic, Predictive, Prescriptive] (1 mark)

My submission

我自己的答案,仅供参考~ 欢迎指出问题与讨论
在这里插入图片描述

Rubric(评分标准/参考答案)

进行peer review的时候可以看到评分标准,也包括参考答案~
在这里插入图片描述

版权声明:本文为博主原创文章,遵循 CC 4.0 BY-SA 版权协议,转载请附上原文出处链接和本声明。
本文链接:https://blog.csdn.net/weixin_43360896/article/details/112406359

智能推荐

PyTorch专栏开篇-程序员宅基地

文章浏览阅读231次。目前研究人员正在使用的深度学习框架不尽相同,有 TensorFlow 、PyTorch、Keras等。这些深度学习框架被应用于计算机视觉、语音识别、自然语言处理与生物信息学等领域,并获取了极好的效果。其中,PyTorch是当前难得的简洁优雅且高效快速的框架,当前开源的框架中,没有哪一个框架能够在灵活性、易用性、速度这三个方面有两个能同时超过PyTorch。基于此,磐小仙邀请到了作者 News(..._pytorch专栏开篇

error LNK2026: 模块对于 SAFESEH 映像是不安全的_error lnk2026: 模块对于 safeseh 映像是不安全的。-程序员宅基地

文章浏览阅读1.2k次。其他版本 更新:2007 年 11 月/SAFESEH[:NO]在指定 /SAFESEH 后,只有在链接器还可以生成映像的安全异常处理程序表的情况下,该链接器才会生成一个映像。该表指定其异常处理程序适合于该映像的操作系统。只有在对 x86 目标进行链接时,/SAFESEH 才有效。已说明异常处理程序的平台不支持 _error lnk2026: 模块对于 safeseh 映像是不安全的。

python修改列表元素_python中修改列表元素-程序员宅基地

文章浏览阅读732次。广告关闭腾讯云11.11云上盛惠 ,精选热门产品助力上云,云服务器首年88元起,买的越多返的越多,最高返5000元!在整个游戏运行期间,敌人列表的长度将不断变化。 我们将用这个游戏的设想贯穿始终,修改列表中元素、添加列表中元素、删除列表中元素的讲解中,首先,我们先看如何修改列表中的元素。 python中,修改列表元素的语法与访问列表元素的语法类似。 要修改列表元素,可指定列表名和要修改的元素的索引..._python修改列表元素

HTML最全语法概述、文件的基本结构、Web标准(W3C)、基本标记_简述html的语法规范是什么-程序员宅基地

文章浏览阅读1k次。一、简介1.网页是组成一个网站的最基本的元素,一个网站做的好不好,就要看网页是如何编写的2.互联网上的信息,都是以网页的形式来给大家进行呈现的,所以网页实际上就是我们一个网站,或者网络信息传递的载体。网页文件使用一种特殊的标记语言所写的,这个标记语言的名称:HTML(超文本标记语言 Hyper Text Markup language)3.概念:Html是一种标记语言,不是编程语言,主要作用..._简述html的语法规范是什么

uni的numberbox怎么用_NumberBox( 数值输入框) 组件-程序员宅基地

文章浏览阅读400次。本节课重点了解 EasyUI 中 NumberBox(数值输入框)组件的使用方法,这个组件依赖于 ValidateBox(验证框)组件。一. 加载方式//class 加载方式data-options="min:0,precision:2">//JS 加载调用$('#box').numberbox({min : 0,precision : 2,});二. 属性列表//属性设置$('#box')..._numberbox中data-options

SO_RCVTIMEO超时errno_recv -1 errno 4 so_rcvtimeo-程序员宅基地

文章浏览阅读660次。首先打印一次recv调用失败的errno值和各个宏的值.由上可知,EAGIN和EWOULDBLOCK的值都是11,其实EAGIN是在setsockopt设置SO_RCVTIMEO或SO_SNDTIMEO后,recv或者send系列函数超时等待返回-1,此时的errno值。EWOULDBLOCK则是大家熟悉的异步调用产生的errno。recv return -1,errn..._recv -1 errno 4 so_rcvtimeo

随便推点

python数据格式化之pprint-程序员宅基地

文章浏览阅读46次。2019独角兽企业重金招聘Python工程师标准>>> ..._data=l'a','b','c','d','e','f','g','h']for i in data[1:6:2]:print(i)

关于listview,gridview里面数据显示不全的问题_gridview 数据少了-程序员宅基地

文章浏览阅读1k次。listview,girdview这些控件在我们android开发经常用的到,但是,数据显示不全的问题也是我们经常碰到的,下面只要在代码中加入几行代码即可以下方法仅供参考,转自网络listview控件显示数据private void listFitHeight(ListView listView){ RepairDetailInfosAdpter listAdapter=(RepairDet_gridview 数据少了

使用开源软件Prometheus监控企业内部应用_8919 hostname关联-程序员宅基地

文章浏览阅读6.6k次。使用开源软件Prometheus监控企业内部资源1. 写在前面​ 在电厂行政管理大区内,因为业务体量小,业务变化相对少,之前公司采用的监控技术栈较为落后,只有简单的北塔网络监控,基本没有任何的监控平台。​ 接触Docker和kubernetes时间久了,开源的监控方案所接触。网上也有不少Zabbix、Nagios、Open-Falcon、Prometheus、Influxdb的对比这里就不一一列举了。最终平海电厂选择Prometheus+Grafana+explorer技术栈作为企_8919 hostname关联

启动hbase时,hregionserver没有启动的原因-程序员宅基地

文章浏览阅读477次。今天配置hbase的时候发现有几台机器的regionserver启不来。报错例如以下: at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method) at sun.reflect.NativeConstructorAccessorImpl.newInstance(N..._启动hbase没有hquorumpeer和hregionserver

UI-父视图和子视图之间的关系_ug删除父视图子视图也没了,怎么取消关联-程序员宅基地

文章浏览阅读1.5k次。//// ViewController.m// 父控件与子控件#import "ViewController.h"@interface ViewController ()@end@implementation ViewController- (void)viewDidLoad { [super viewDidLoad]; /** *_ug删除父视图子视图也没了,怎么取消关联

NDK .so Android调用JNI出错 java.lang.UnsatisfiedLinkError: No implementation found for的解决方案_ndk java.lang.unsatisfiedlinkerror: no implementat-程序员宅基地

文章浏览阅读1.4w次,点赞2次,收藏6次。抛异常:09-15 02:55:15.835 10255-10255/com.example.fanenqian.jndk E/AndroidRuntime: FATAL EXCEPTION: main Process: com.examp_ndk java.lang.unsatisfiedlinkerror: no implementation found for

推荐文章

热门文章

相关标签