Difference between revisions of "ISSS608 2017-18 T3 Assign Pooja Manohar Sawant Methodology Dashboard Design"

From Visual Analytics and Applications
Jump to navigation Jump to search
Line 97: Line 97:
 
**Sachiko Sanabria, Garrett Sanfilippo, Lottie Grant, Palmer Kilborne, Michelina Lindorf, Bernard Harper, Laurice Eichenberg, Alexander Stevenson, Wilhelmina Nybo, Herman Todd, Jaunita Westen, Terrilyn Overkamp, Madeline Nindorf.
 
**Sachiko Sanabria, Garrett Sanfilippo, Lottie Grant, Palmer Kilborne, Michelina Lindorf, Bernard Harper, Laurice Eichenberg, Alexander Stevenson, Wilhelmina Nybo, Herman Todd, Jaunita Westen, Terrilyn Overkamp, Madeline Nindorf.
  
Conclusion –
+
'''Conclusion –'''
As detected above, there are some suspicious employees which are very influential and have very dense connections throughout the organization. Jaunita Westen, Terrilyn Overkamp and Madeline Nindorf are connected with suspicious employees more closely and frequently. So they will also come in highly suspicious zone alone with the suspicious group given by insider.
+
As detected above, there are some suspicious employees which are very influential and have very dense connections throughout the organization. '''''Jaunita Westen, Terrilyn Overkamp and Madeline Nindorf''''' are connected with suspicious employees more closely and frequently. So they will also come in highly suspicious zone alone with the suspicious group given by insider.
  
 
*Suspicious Purchases - Employees involved in suspicious purchases are -
 
*Suspicious Purchases - Employees involved in suspicious purchases are -
Line 114: Line 114:
  
 
Other than suspicious employee provided by insider, only person involved is Gail Feindt who received most of the purchases. So we can conclude that this employee must be communicating with the venders to place the purchase orders.
 
Other than suspicious employee provided by insider, only person involved is Gail Feindt who received most of the purchases. So we can conclude that this employee must be communicating with the venders to place the purchase orders.
 +
 +
 +
== Question 3 - Interactions of "Bad Actors" over a time ==

Revision as of 16:24, 8 July 2018

MC3 2018.jpg Detecting Suspicious Activities at Kasios International

BACKGROUND

DATA PREPARATION

METHODOLOGY AND ANALYSIS

OBSERVATIONS AND INSIGHTS

Back to Dropbox

 


Methodology and Analysis

Question 1 - Analysis of Entire organization

Communication and Purchasing patterns from Yr 2015 to Yr 2017

As provided by the insider, we have entire organization’s email, calls, meetings and purchasing details from May 2015 to December 2017. I have tried to analyze how these 4 ways of interactions are changing over the period and how organization is growing/ changing over the 2 years of period. I analyzed each communication mode (i.e. calls, emails, meetings and purchase) individually as well as combined.

  • Calls pattern emerging over 2 years of period.

Pooja Calls.jpg


  • Emails pattern emerging over 2 years of period.

Pooja Email.jpg


  • Meetings pattern emerging over 2 years of period. Meeting pattern shows overall increasing trend over the period of two years after October 2015 onward. Highest number of meetings (10,821) happened in October 2017. We can say that the organization is having more formal meetings from Oct 2015 onward. Organization structure becoming more formal including more group meetings probably because of the change in higher management or CEO.

Pooja Meetings.jpg


  • Purchases pattern for 2 years of period are also similar to that of calls and emails. Pattern looks quite stable over the time after June 2015 with 2 dips in February 2016 and February 2017. Highest number of purchases (25,064) are made in Dec 2016.
  • Also, the combined data of all the communication and purchases shows similar pattern as that of calls, emails and purchases.

After observing past data, we can say that this company is quite stable from June 2015 onward based on its communication and purchasing behaviors. It is getting more organized in terms of formal meetings as number of meetings shows increasing trend over the period of 2 years specially after October 2015 which can be an indicator of changes in higher management for the organization.

Communication and Purchasing patterns over a week

I have created a calendar view with the given organization's data in Tableau to analyse how communication and purchases are distributed over a week for 2 and a half year - <image>

I observed that highest number of purchases of 887 are made in week 18 of year 2016 (i.e. in April) and surprisingly on Sunday. This can be because its an international organization and operates all 7 days. Visualization shows the equal distribution of communication and purchasing pattern over all 7 days.

Question 2 - Demystifying the suspicious network

As per the question 2, we need to analyze communication and purchases that are identified as suspicious by the insider and identify if anyone else from the organization appear to be closely associated with this group. Graph visualization tool, Gephi is used to analyze the connections among the suspicious group and to locate this group in the large organization data set to find out if there are any else is involved in suspicious activity. As detailed in the data preparation, I have already created workspace1 (with suspicious employee names as nodes and communication details as edge) and workspace2 (with suspicious employees and other employees connected with them by any mode of communication as nodes and communication details as edges).

To create network graph for suspicious group, I have selected layout– Force Atlas 2 with “LinLog mode” and “Prevent Overlap” options on and let it run for some time. Based on the modularity class, I found out 4 segments within suspicious group.

Suspicious Emp.jpg
Table 1 - Suspicious group of employees


Below is the network graph for suspicious employees showing how they are connected with each other. In the graph, node size is determined by the "degree centrality", nodes color is determined by "modularity class" and edge color is determined by "type of communication among the employees".

Suspicious nw gph.jpg
Network Graph for Suspicious group of employees

Based on the degree of interactions we can interpret 2 of these employees are very prominent - Richard Fox and Lindsy Henion

Richard Fox nw.jpg
Richard Fox close network within suspicious group


Henion nw.jpg
Lindsy Henion close network within suspicious group

To create a extended network graph for suspicious group, I have selected layout– Yifan Hu.

Sus nw.jpg
Extended network graph for suspicious group

As we can see suspicious group of people have a very well-established connections and big network, not all of these transactions will be suspicious. We will try to filter out some of the nodes and edges to get more accurate suspicious transactions.

  • Filter based on Node Betweenness Centrality - it measures how often a node appears on shortest paths between nodes in the network. I chose Betweenness Centrality > 6000.00, I determined, below employees are more often interact with suspicious employees -
  1. Sheilah Stachniw
  2. Terrilyn Overkamp
  3. Corinne Veatch
  4. Madeline Nindorf
  5. Jaunita Westen
Filter bet.png
Extended suspicious group- based on Betweenness Centrality
  • Filter based on Node Closeness Centrality - it indicates how close the node to all other node in the network. I chose Closeness Centrality > 0.41, I determined, below employees are more close with suspicious employees -
    • Sachiko Sanabria, Garrett Sanfilippo, Lottie Grant, Palmer Kilborne, Michelina Lindorf, Bernard Harper, Laurice Eichenberg, Alexander Stevenson, Wilhelmina Nybo, Herman Todd, Jaunita Westen, Terrilyn Overkamp, Madeline Nindorf.

Conclusion – As detected above, there are some suspicious employees which are very influential and have very dense connections throughout the organization. Jaunita Westen, Terrilyn Overkamp and Madeline Nindorf are connected with suspicious employees more closely and frequently. So they will also come in highly suspicious zone alone with the suspicious group given by insider.

  • Suspicious Purchases - Employees involved in suspicious purchases are -
  1. Tobi Gatlin
  2. Rosalia Larroque
  3. Richard Fox
  4. Meryl Pastuch
  5. Jenice Savaria
  6. Lizbeth Jindra
  7. Gail Feindt
Sus purch.JPG
Employees Involved in Suspicious Purchases

Other than suspicious employee provided by insider, only person involved is Gail Feindt who received most of the purchases. So we can conclude that this employee must be communicating with the venders to place the purchase orders.


Question 3 - Interactions of "Bad Actors" over a time