Difference between revisions of "ISSS608 2017-18 T3 Assign Vigneshwar Ramachandran Vadivel Conclusion"

From Visual Analytics and Applications
Jump to navigation Jump to search
 
(One intermediate revision by the same user not shown)
Line 24: Line 24:
 
<li>Tobi Gatlin</li>
 
<li>Tobi Gatlin</li>
 
<li>Rosalia Larroque</li>
 
<li>Rosalia Larroque</li>
<li>Lizbeth Jindra
+
<li>Lizbeth Jindra</li></ul><br>
</li>
+
 
 
These employees act as bridge for the entire communication network of insider’s data and they play an critical role in the purchase. Based on the closeness and modularity metrics we can narrow down our suspect list for final investigation to prove the illicit purchase of chemical.
 
These employees act as bridge for the entire communication network of insider’s data and they play an critical role in the purchase. Based on the closeness and modularity metrics we can narrow down our suspect list for final investigation to prove the illicit purchase of chemical.

Latest revision as of 13:07, 9 July 2018

MC3 Banner.png

Intro

Approach

Findings

Conclusion

Based on our network graphs and temporal analysis, we can short down the suspected employees from insider’s data. The main suspected employee who should be investigated further to confirm the accusation are as follows,

  • Richard Fox
  • Meryl Pastuch
  • Tobi Gatlin
  • Rosalia Larroque
  • Lizbeth Jindra


These employees act as bridge for the entire communication network of insider’s data and they play an critical role in the purchase. Based on the closeness and modularity metrics we can narrow down our suspect list for final investigation to prove the illicit purchase of chemical.