Difference between revisions of "ISSS608 2017-18 T3 Assign Aakanksha Kumari Q3"

From Visual Analytics and Applications
Jump to navigation Jump to search
Line 44: Line 44:
 
|-
 
|-
 
| <div style="font-family:Palatino Linotype; border-radius: 1px ">
 
| <div style="font-family:Palatino Linotype; border-radius: 1px ">
<big>'''''Combine the four data sources for group that the insider has identified as being suspicious and locate the group in the larger dataset. Determine if anyone else appears to be closely associated with this group. Highlight which employees are making suspicious purchases, according to the insider’s data.'''''</big> </div>
+
<big>'''''Using the combined group of suspected bad actors, you created in question 2, show the interactions within the group over time.'''''
 +
* Characterize the group’s organizational structure and show a full picture of communications within the group.
 +
* Does the group composition change during the course of their activities?
 +
* How do the group’s interactions change over time?
 +
</big> </div>
 
|}
 
|}

Revision as of 01:08, 8 July 2018

Classified-stamp.png

MC Challenge 3

Overview

Data Preparation

Question 1

Question 2

Question 3

Question 4

Conclusion

Dropbox

 

Using the combined group of suspected bad actors, you created in question 2, show the interactions within the group over time.

  • Characterize the group’s organizational structure and show a full picture of communications within the group.
  • Does the group composition change during the course of their activities?
  • How do the group’s interactions change over time?