Difference between revisions of "ISSS608 2017-18 T3 Assign Aakanksha Kumari Q3"

From Visual Analytics and Applications
Jump to navigation Jump to search
Line 70: Line 70:
 
'''So now our focus is on these 26 key players, as discussed in Q2'''
 
'''So now our focus is on these 26 key players, as discussed in Q2'''
  
<big>'''Main Tasks in this section'''</big>
+
<big>'''Main Tasks in this section'''</big> <br>
 
Using the combined group of suspected bad actors you created in question 2, show the interactions within the group over time.
 
Using the combined group of suspected bad actors you created in question 2, show the interactions within the group over time.
  

Revision as of 12:02, 8 July 2018

Classified-stamp.png

MC Challenge 3

Overview

Data Preparation

Question 1

Question 2

Question 3

Question 4

Conclusion

Dropbox

 

Using the combined group of suspected bad actors, you created in question 2, show the interactions within the group over time.

  • Characterize the group’s organizational structure and show a full picture of communications within the group.
  • Does the group composition change during the course of their activities?
  • How do the group’s interactions change over time?

The Story So Far

The Kasios International over the course of two and half years have maintained nearly same communicationa volumne and purchase pattern, which implies that the organization have not grown or shrunk significantly. But on closer analysis we found out with each year, the new employees were being hired, and there is constant shuffling of human resource. Kasios have grow significant change in personnels, with numnber of same employees each month decreasing.

Intially we began with certain suspicious transactions (purchaes and communication) as provided by our informer. Later as we continued our analysis, othe key players, closely associated to employees making suspicious communication were identified. Using network analysis and eigenvector centrality (filter value > 0.4), nodes connected to influential nodes (in this case, suspicious employees) more than other non-influential nodes(non suspicious employees), can be identified. So by following the above startegy following are list of old and new suspicious players.

Original Suspicious Employess

Augusta Sharp, Tobi Gatlin ,Patrick Lane, Melita Scarpaci, Rosalia Larroque, Glen Grant ,Meryl Pastuch, Dylan Ballard, May Burton, Kerstin Belveal, Alex Hall, Refugio Orrantia, Jose Ringwald, Julie Tierno, Richard Fox, Lizbeth Jindra, Ramiro Gault, Sara Ballard, Jenice Savaria, Lindsy Henion

New Suspicious Employees
Ferne Hards, Martha Harris, Sherrell Biebel, Gail Feindt, Sheilah Stachniw, Madeline Nindorf

So now our focus is on these 26 key players, as discussed in Q2

Main Tasks in this section
Using the combined group of suspected bad actors you created in question 2, show the interactions within the group over time.

  • Characterize the group’s organizational structure and show a full picture of communications within the group.
  • Does the group composition change during the course of their activities?
  • How do the group’s interactions change over time?