Difference between revisions of "ISSS608 2017-18 T3 Assign Jyoti Bukkapatil Observations & Insights"

From Visual Analytics and Applications
Jump to navigation Jump to search
 
(14 intermediate revisions by the same user not shown)
Line 90: Line 90:
 
*List of 20 employees has been given by insider from Kasios International along with details of suspicious interactions including calls, emails, meeting, and purchases. Figure 1 shows how these 20 employees are associated with groups/departments within the company. Nodes are grouped & colored together based on Modularity class (Community detection algorithm).These suspicious 20 employees are associated with 6 different groups/departments in the company.
 
*List of 20 employees has been given by insider from Kasios International along with details of suspicious interactions including calls, emails, meeting, and purchases. Figure 1 shows how these 20 employees are associated with groups/departments within the company. Nodes are grouped & colored together based on Modularity class (Community detection algorithm).These suspicious 20 employees are associated with 6 different groups/departments in the company.
 
*Richard Fox, Tobi Gatlin, Maryl Pastuch and Lizbeth Jindra were associated with four different groups and were highest degree centrality (connectivity) member of respective groups. Which indicates that these four might be in lead /managerial positions.
 
*Richard Fox, Tobi Gatlin, Maryl Pastuch and Lizbeth Jindra were associated with four different groups and were highest degree centrality (connectivity) member of respective groups. Which indicates that these four might be in lead /managerial positions.
*Out of remaining 16 members, 4 are connected associated to one group (Modularity class 5) and 12 are associated with one group (Modularity Class 3)
+
*Out of remaining 16 members, 4 are associated to one group (Modularity class 5) and 12 are associated with one group (Modularity Class 3)
<<interactive link>>
+
 
[[Image:ISSS608 2018 Jyoti Bukkapatil Q2 1.jpg|600px|center|border]]<br/>
 
[[Image:ISSS608 2018 Jyoti Bukkapatil Q2 1.jpg|600px|center|border]]<br/>
 
<div style="float:left;;width:50%;">
 
<div style="float:left;;width:50%;">
Line 104: Line 104:
 
*Figure 2 shows 14 such members which will have an impact on communication between suspicious employees. The nodes of smaller size represent these 14 members. There is a high chance that information being shared among suspicious employees passes via these members and hence they might be associated with suspicious employees.  
 
*Figure 2 shows 14 such members which will have an impact on communication between suspicious employees. The nodes of smaller size represent these 14 members. There is a high chance that information being shared among suspicious employees passes via these members and hence they might be associated with suspicious employees.  
 
[[Image:ISSS608 2018 Jyoti Bukkapatil Q2 2.jpg|600px|center|border]]<br/>
 
[[Image:ISSS608 2018 Jyoti Bukkapatil Q2 2.jpg|600px|center|border]]<br/>
<div style="float:left;;width:50%;">
+
<div style="float:center;text-align:center;font-size:13px;"> <u>Figure 2</u>
[[Image:ISSS608 2018 Jyoti Bukkapatil Q2 3.jpg|200px|right|border]]<br/>
+
</div><br/><br/><br>  
</div>
 
<div style="float:left;">
 
[[Image:ISSS608 2018 Jyoti Bukkapatil Q2 4.jpg|200px|center|border]]<br/><br/>
 
<div style="float:center;text-align:center;font-size:13px;"> <u>Figure 2</u></div>
 
</div><br/><br/><br><br/><br/><br/><br/><br/><br/><br/>  
 
 
*Below table lists name of these 14 employees along with their Betweenness centrality and Closeness Centrality measures. However, these employee list is filtered based on betweenness centrality only.  
 
*Below table lists name of these 14 employees along with their Betweenness centrality and Closeness Centrality measures. However, these employee list is filtered based on betweenness centrality only.  
  
Line 257: Line 252:
 
# Almeta Evancho
 
# Almeta Evancho
 
# Fairy Boratko
 
# Fairy Boratko
 +
 +
                                                                                                                                                       
 +
                                                                                                                                                       
 +
</div><gr/>
 +
 +
                                                                                                                                                       
 +
                                                                                                                                                       
 +
                                                                                                                                                       
 +
== Compare Structure of Suspicious Group==
 +
We need to look into the sequence of transactions took place for suspicious purchase for which insider has provided details. Figure 5 provides the details of these activities.
 +
 +
[[File:ISSS608 2018 Jyoti Bukkapatil Q4 8.png|600px|center|border]]<br/>
 +
<div style="float:center;text-align:center;font-size:13px;"> <u>Figure 5</u> </div>
 +
 +
#Richard Fox sent the meeting request to Meryl Pastuch on 2017-08-29 12:12:13 Hrs
 +
#Meryl Pastuch sent the meeting request to Rosalia Larroque on 2017-09-03 03:18:53 Hrs
 +
#Rosalia Larroque sent the Purchase order to Jenice Savaria  on 2017-09-20 03:38:53 Hrs

Latest revision as of 14:42, 11 July 2018

MC3 2018.jpg VAST Challenge 2018 MC3

Background

Data Preparation

Methodology & Dashboard Design

Observations & Insights

Conclusion

Back to Dropbox

 


Question 01

Using the four large Kasios International data sets, combine the different sources to create a single picture of the company. Characterize changes in the company over time. According to the company’s communications and purchase habits, is the company growing? Limit your responses to 5 images and 500 words.

Organisations Communication and Purchase Habits

Please note that data for Q3 Year 2015 was excluded to for better visualization of the trend.

  • Time Series plot in figure 1 shows the monthly pattern for Calls, Emails, Purchases, and Meetings. The overall trend for Calls, Emails, and Purchases is stable throughout the past two years. This indicates that Kasios International is the stable company. There is neither a significant growth or decay.
  • From figure 1 Call, Emails and Purchases are highly correlated and follow the same trend. Monthly Ups and down in calls, emails, and purchases follow the number of days in months. Deeps can be observed for months with 30 days and ups can be observed for months with 31 days. Similarly, two major deeps are for Feb 2016 and Feb 2017 respectively.
  • The continuous increasing trend of Meetings might be due to a change in work culture or some new initiatives.
ISSS608 2018 Jyoti Bukkapatil Methodology 22.jpg
Figure 1
  • Calendar view of daily calls (figure 2) shows that calls are randomly distributed throughout the week. There is no fixed pattern for the number of calls. There are peaks on weekdays as well as weekends. This might be because this is an international company and employees were working with people around the world from different time zones.


ISSS608 2018 Jyoti Bukkapatil Q1 2.jpg
Figure 2
  • Figure 3 & 4 shows Calendar plot for Email and Purchases. The daily pattern for a number of emails and Purchases is randomly distributed throughout the week which is the same as calls pattern.


ISSS608 2018 Jyoti Bukkapatil Q1 3.jpg


Figure 3
ISSS608 2018 Jyoti Bukkapatil Q1 4.jpg


Figure 4
  • Calender plot for a daily pattern of the number of meetings is shown in Figure 5. The number of meetings has increased towards the end of 2017 Dec. Surprisingly the number of meetings also are randomly distributed throughout the week. In a month there is no fixed pattern of meetings like weekly or biweekly. Like other communications and purchases, the high number of meetings also can be observed on weekdays as well as the weekend.
ISSS608 2018 Jyoti Bukkapatil Q1 5.jpg


Figure 5
  • Figure 6 & 7 shows hourly time series pattern for calls, emails, purchases, and meetings for weekday and weekend both. For both weekday and weekend calls, emails and Purchases are initiated throughout 24 hours, which indicates that employees might be working in shifts to coordinate with all time zone areas. However, meetings timings are restricted between 3 am to 11 pm for weekends and 3 am to 12 am on weekdays.

ISSS608 2018 Jyoti Bukkapatil Q1 6.jpg

Figure 6
ISSS608 2018 Jyoti Bukkapatil Q1 7.jpg

Figure 7

Interactive Dashboard Link

For more insights please visit Interactive Tableau Dashboard

Question 02

Combine the four data sources for a group that the insider has identified as being suspicious and locate the group in the larger dataset. Determine if anyone else appears to be closely associated with this group. Highlight which employees are making suspicious purchases, according to the insider’s data. Limit your responses to 8 images and 500 words.

More About Suspects

  • List of 20 employees has been given by insider from Kasios International along with details of suspicious interactions including calls, emails, meeting, and purchases. Figure 1 shows how these 20 employees are associated with groups/departments within the company. Nodes are grouped & colored together based on Modularity class (Community detection algorithm).These suspicious 20 employees are associated with 6 different groups/departments in the company.
  • Richard Fox, Tobi Gatlin, Maryl Pastuch and Lizbeth Jindra were associated with four different groups and were highest degree centrality (connectivity) member of respective groups. Which indicates that these four might be in lead /managerial positions.
  • Out of remaining 16 members, 4 are associated to one group (Modularity class 5) and 12 are associated with one group (Modularity Class 3)
ISSS608 2018 Jyoti Bukkapatil Q2 1.jpg


ISSS608 2018 Jyoti Bukkapatil Methodology 17.jpg

ISSS608 2018 Jyoti Bukkapatil Methodology 18.jpg


Figure 1











  • By filtering nodes based on Betweenness centrality, other employees which are closely associated with suspicious employees were found. Betweenness centrality measures the extent to which a vertex lies on paths between other vertices. Vertices with high betweenness may have considerable influence within a network by their control over information passing between others. They are also the ones whose removal from the network will most disrupt communications between other vertices because they lie on the largest number of paths taken by messages.
  • Figure 2 shows 14 such members which will have an impact on communication between suspicious employees. The nodes of smaller size represent these 14 members. There is a high chance that information being shared among suspicious employees passes via these members and hence they might be associated with suspicious employees.
ISSS608 2018 Jyoti Bukkapatil Q2 2.jpg


Figure 2




  • Below table lists name of these 14 employees along with their Betweenness centrality and Closeness Centrality measures. However, these employee list is filtered based on betweenness centrality only.
ISSS608 2018 Jyoti Bukkapatil Q2 T1.jpg


Table 1
  • Sheilah Stachniw has the highest betweenness among 14 employees. Sheilah Stachniw has interacted with 7 of suspicious employees and is the only point of connection for Tobi Gatlin to connect with other 6 suspicious group of employees. All interactions between Tobi and other Six employees must be going through Sheilah so there are high chances that Sheilah is closely associated with suspicious employees. Figure 3 shows the network graph for Sheilah Stachniw.
ISSS608 2018 Jyoti Bukkapatil Q2 3.jpg


Figure 3
  • Madeline Nindorf with second highest betweenness centrality among 14 employees can highly impact communication between suspicious employees. Madeline also has the highest closeness centrality measure. Figure 4 shows the network graph for Madeline. Madeline is an intermittent point for Lezbeth Jindra to share information with three suspicious members.
ISSS608 2018 Jyoti Bukkapatil Q2 4.jpg


Figure 4
  • Terrilyn Overkamp the third person who can impact communication between suspicious employees. Figure 5 shows the network graph of Terrilyn, who is the connecting point for Lezbeth Jindra to communicate with Meryl Pastuch and Richard Fox.
ISSS608 2018 Jyoti Bukkapatil Q2 5.jpg


Figure 5
  • Juanita Westen is a mediator between Lezbeth Jindra and Richard Fox, who is one of the most important people with high degree centrality. Juanita has 4th highest betweenness centrality measure among those 14 associated employees.
ISSS608 2018 Jyoti Bukkapatil Q2 6.jpg


Figure 6
  • Rather, Lizabeth Jindra is only connected with Lindsy Henion from the group of suspicious employees. Rest of his connections are this 5 employees from the list of 14 employees which were found to be closely associated with suspicious employees. So we can say that these five employees may be most likely associated with Suspicious employees and their activities.
ISSS608 2018 Jyoti Bukkapatil Q2 7.jpg


Figure 7
  • Employees making suspicious purchases:

Figure 8 shows the network graph for Purchases made by suspicious employees. There were total 25 purchase transactions took place and all these purchase orders were addressed to Gail Feindt. We can clearly see only one purchase transaction looks offbeat and it’s from Rosalia Larroque to Jenice Savaria. An insider has mentioned this transaction between Rosalia and Jenice in his data.

ISSS608 2018 Jyoti Bukkapatil Q2 8.jpg


Figure 8

Question 03

Using the combined group of suspected bad actors you created in question 2, show the interactions within the group over time. Limit your responses to 10 images and 1000 words Characterize the group’s organizational structure and show a full picture of communications within the group. Does the group composition change during the course of their activities? How do the group’s interactions change over time?

Interaction Within The Suspicious Group

  • Note that Node colors and Edge colors for this questions are fixed and are same as used in Question 2. Throughout this analysis, I have not changed the color aesthetic of the graph to keep nodes linked to their department/group in the company as per findings in Question2 Figure 1.

Figure 1 below shows the network graph for the combined group of suspicious employees and their suspicious interactions.size of the node represents the degree centrality of the node. The graph shows Degree centrality of each node along with its Lable.

ISSS608 2018 Jyoti Bukkapatil Q3 1.png
Figure 1
  • Max number of members belong to group number 3 in an organization which was found in Quetion2 Figure1. This is also a relatively small group in an organization.
  • Richard Fox with maximum suspicious interactions during last two and half year has the highest degree. Which makes him the Most prominent person in the course of suspicious activities and group.
  • Followed by Richard, Lindsy Henion, Tobi Gatlin & Meryl Postuch had a large number of interactions which makes them second most important members of this group.

Interactions over the time period

To study Interactions between these suspicious employee group over the last two and half year, I divided time quarterly and below are findings for every quarter of the year.

  • Figure 2 show network graph for interactions took place in the Year 2015 Q4.This might be a start of Suspicious activities as in 2015Q4, the maximum number of suspicious group members were involved in interactions. Same can be seen from Figure 2. Richard Fox being in the center of communications with many members has the highest degree centrality. He has initiated 8 (out-degree )conversations and received 3 (In Degree). Members of all 6 groups were involved in the conversation. There were two meetings happened and both were initiated by Richard Fox.
ISSS608 2018 Jyoti Bukkapatil Q3 2.png
Figure 2
  • Figure 3 shows interactions between the suspicious group for year 2016Q1. Richard Fox and Lindsy Henion had the highest degree followed by Meryl Pastuch and Rosalia Laraque. Group composition still remains the same as members from all department /group were involved in conversations.
ISSS608 2018 Jyoti Bukkapatil Q3 3.png
Figure 3
  • In 2016Q2 Richard Fox had initiated email and calls, however, In degree was zero. All conversations were through Email and Call. Figure 4 shows a network graph for interactions during 2016Q2.
ISSS608 2018 Jyoti Bukkapatil Q3 4.png
Figure 4
  • Figure 5 show network graph for interactions between suspicious employee group during 2016Q3.The number of interactions was very less compared with the previous quarter. Only 3 out of 6 groups were involved in conversations. Groups composition was changed during this period.
ISSS608 2018 Jyoti Bukkapatil Q3 5.png
Figure 5
  • During the last quarter of the Year 2016, members from all groups had the conversation via emails and calls. However, the number of members involved in these conversations were less compared to the initial two quarters i.e.2015Q4 and 2016Q1. All main player like Richard Fox, Lindsy Henion, Tobi Gatlin were in action again with the highest degree of 3. After 2015Q4, no meeting was initiated by any member. Figure 5 shows 2016Q4 interactions
ISSS608 2018 Jyoti Bukkapatil Q3 6.png
Figure 6
  • In 2017Q1 Kerstin Belveal had the highest degree followed by Jose and Tobi. Shailah Stachniw who was not mentioned in the suspicious list of insider

has been involved in many conversations. Even though members of five different groups had interacted only three groups members were involved in intergroup communications. Figure 7 shows the network graph for interactions for 2017Q1

ISSS608 2018 Jyoti Bukkapatil Q3 7.png
Figure 7
  • Figure 8 shows Network graph for 2017Q2. All conversations were via Email or call. There was no meeting held or purchase order initiated. Half of these conversations were within the same organizational group and half were between members from different groups. however, only 5 out of 6 groups were interacting.
ISSS608 2018 Jyoti Bukkapatil Q3 8.png
Figure 8
  • 2017 Q3 was most important time as one suspicious purchase order was initiated and there were a number of meetings requests sent by Richard Fox, Meryl Pastuch, Lindsy Henion and Sherrel Biebel. Rosalia Larroque initiated a suspicious purchase order to Jenice Samaria.Figure 8 shows all these interactions.
ISSS608 2018 Jyoti Bukkapatil Q3 9.png
Figure 9
  • Last quarter of the year 2017 Rosalia Larroque had the highest degree followed by Kerstin Belveal.conversations were vial mail, call, and Emails.

Figure 10 shows the network graph for same.

ISSS608 2018 Jyoti Bukkapatil Q3 10.png
Figure 10

Question 04

The insider has provided a list of purchases that might indicate illicit activity elsewhere in the company. Using the structure of the first group noted by the insider as a model can you find any other instances of suspicious activities in the company? Are there other groups that have structure and activity similar to this one? Who are they? Each of the suspicious purchases could be a starting point for your search. Provide examples of up to two other groups you find that appear suspicious and compare their structure with the structure of the first group. The structures should be presented as temporal not just structural (i.e., the sequence of events—A is followed by B one or two days later—will be important). Limit your responses to 10 images and 1200 words

Search For Other Suspicious Groups

  • Insider from Kasios International has provided the list of suspicious purchases in other parts of an organization. Figure 1 shows how these 8 employees are associated with groups/departments within the company. Nodes are grouped & colored together based on Modularity class (Community detection algorithm). These suspicious 8 employees are associated with 4 different groups/departments in the company. This group structure is similar to the group structure of those 20 Suspicious employees (Q2 Figure 1). All of the suspicions are
ISSS608 2018 Jyoti Bukkapatil Q4 1.png


ISSS608 2018 Jyoti Bukkapatil Q4 2.png

ISSS608 2018 Jyoti Bukkapatil Q4 3.png


Figure 1














  • Figure2 shows purchase transactions for this combined group . Similar to last discovery for suspicious group in Question 2 , Gail Feindt is center of all purchases transactions . Gail has recived purchase orders from all groups how ever these are not listed in suspicious purchase list by insider.Gail might be person responsible for placing orders for all departments .
ISSS608 2018 Jyoti Bukkapatil Q4 4.png


Figure 2
  • By using the structure of the first group noted by the insider as a model, we can consider purchase orders shown in figure 3 were part regular or legal purchases. Other than these purchases might be suspicious purchases.
ISSS608 2018 Jyoti Bukkapatil Q4 5.jpg


Figure 3
  • So there were 8 other purchase connections out of which 4 Purchase connections were mentioned by an insider as suspicious. By comparing figure 2 and figure 3, and excluding purchase transactions which insider has mentioned as suspicious purchases, I came up with below list of purchases which looked off beat from regular practices and could be suspicious purchases.figure 4 shows other suspicious purchases.


ISSS608 2018 Jyoti Bukkapatil Q4 7.jpg

Figure 4
ISSS608 2018 Jyoti Bukkapatil Q4 6.jpg
Table 1
  • Below is the list of four employees who were also part of suspicious activities in the organization.
  1. Pearl Tran
  2. Jane Ramsey
  3. Almeta Evancho
  4. Fairy Boratko


<gr/>



Compare Structure of Suspicious Group

We need to look into the sequence of transactions took place for suspicious purchase for which insider has provided details. Figure 5 provides the details of these activities.

ISSS608 2018 Jyoti Bukkapatil Q4 8.png


Figure 5
  1. Richard Fox sent the meeting request to Meryl Pastuch on 2017-08-29 12:12:13 Hrs
  2. Meryl Pastuch sent the meeting request to Rosalia Larroque on 2017-09-03 03:18:53 Hrs
  3. Rosalia Larroque sent the Purchase order to Jenice Savaria on 2017-09-20 03:38:53 Hrs