Difference between revisions of "ISSS608 2017-18 T3 Assign Vigneshwar Ramachandran Vadivel Q4"

From Visual Analytics and Applications
Jump to navigation Jump to search
Line 37: Line 37:
 
</center>
 
</center>
 
<!------- End of Secondary Navigation Bar---->
 
<!------- End of Secondary Navigation Bar---->
 
+
<div> Are there other groups that have structure and activity similar to this one? Who are they?
 +
</div>
 
[[File:A1_MC3_Q4_Flow.gif|500px]]
 
[[File:A1_MC3_Q4_Flow.gif|500px]]
  
  Are there other groups that have structure and activity similar to this one? Who are they?
+
   
 +
The insider has provided a list of purchases that might indicate illicit activity elsewhere in the company. Also we have the suspicious network of employee involved in the purchase of chemicals.
  
  The insider has provided a list of purchases that might indicate illicit activity elsewhere in the company. Also we have the suspicious network of employee involved in the purchase of chemicals. To identify the other suspicious activities it is important for us to understand the existing temporal structure of the suspicious purchase.
+
  To identify the other suspicious activities it is important for us to understand the existing temporal structure of the suspicious purchase.
  
 
This visualization shows the flow of illicit purchase and its link with other employees. Now lets try to decode the other suspicious purchases to find the identical temporal patterns.
 
This visualization shows the flow of illicit purchase and its link with other employees. Now lets try to decode the other suspicious purchases to find the identical temporal patterns.

Revision as of 18:14, 4 July 2018

MC3 Banner.png

Intro

Approach

Findings

Conclusion

Question 1

Question 2

Question 3

Question 4

Are there other groups that have structure and activity similar to this one? Who are they?

A1 MC3 Q4 Flow.gif


The insider has provided a list of purchases that might indicate illicit activity elsewhere in the company. Also we have the suspicious network of employee involved in the purchase of chemicals.
To identify the other suspicious activities it is important for us to understand the existing temporal structure of the suspicious purchase.

This visualization shows the flow of illicit purchase and its link with other employees. Now lets try to decode the other suspicious purchases to find the identical temporal patterns.