Difference between revisions of "ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow"

From Visual Analytics and Applications
Jump to navigation Jump to search
 
(13 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
<div style=background:#edf2e9 border:#A3BFB1>
 
<div style=background:#edf2e9 border:#A3BFB1>
 
[[File:Joel MagnifyingGlass.png||300px|left]]<br>
 
[[File:Joel MagnifyingGlass.png||300px|left]]<br>
<font size = 6; color="#000000"> "You See, But You Do Not Observe" - Sherlock<br></font>
+
<font size = 6; color="#000000"> "You See, But You Do Not Observe"</font>
 +
<font size = 3; color="#000000"> '' - Sherlock''<br></font>
 
<font size = 4; color="#000000"> Looking Deeper Into The Network Of Connected Individuals<br><br></font>
 
<font size = 4; color="#000000"> Looking Deeper Into The Network Of Connected Individuals<br><br></font>
 
</div>
 
</div>
 +
 
<!--NAV BAR -->  
 
<!--NAV BAR -->  
 
{|style="background-color:#edf2e9;" width="100%" cellspacing="0" cellpadding="0" valign="top" border="0"  |
 
{|style="background-color:#edf2e9;" width="100%" cellspacing="0" cellpadding="0" valign="top" border="0"  |
 
| style="font-family:Arial; font-size:100%; solid #1B338F; background:##e4efef; text-align:center;" width="15%" |  
 
| style="font-family:Arial; font-size:100%; solid #1B338F; background:##e4efef; text-align:center;" width="15%" |  
 
;
 
;
<b><font size="3"><font color="#000000">Background</font></font></b>
+
[[ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow|<b><font size="3"><font color="#000000">Background</font></font></b>]]
  
| style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9; text-align:center;" width="25%" |  
+
| style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9; text-align:center;" width="20%" |  
 
;
 
;
 
[[ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow Methodology|<b><font size="3"><font color="#000000">Methodology</font></font></b>]]
 
[[ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow Methodology|<b><font size="3"><font color="#000000">Methodology</font></font></b>]]
Line 16: Line 18:
 
| style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9 text-align:center;" width="15%" |  
 
| style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9 text-align:center;" width="15%" |  
 
;
 
;
<b><font size="3"><font color="#000000">Placeholder</font></font></b>
+
[[ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow Company Growth|<b><font size="3"><font color="#000000">Company Growth</font></font></b>]]
  
| style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9; text-align:center;" width="10%" |  
+
| style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9; text-align:center;" width="15%" |  
 
;
 
;
<b><font size="3"><font color="#000000">Placeholder</font></font></b>
+
[[ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow Are You Guilty|<b><font size="3"><font color="#000000">Are You Guilty?</font></font></b>]]
  
| style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9; text-align:center;" width="25%" |  
+
| style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9; text-align:center;" width="20%" |  
 
;
 
;
<b><font size="3"><font color="#000000">Conclusion</font></font></b>
+
[[ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow Company Conclusion|<b><font size="3"><font color="#000000">Conclusion</font></font></b>]]
  
 
| style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9; text-align:center;" width="20%" |  
 
| style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9; text-align:center;" width="20%" |  
Line 43: Line 45:
  
 
To his disappointment Mitch is not granted a meeting. Then Mitch receives an anonymous letter from someone who’s willing to help. A fellow pipit lover who works at Kasios International has gathered up a variety of company data and identified a suspicious group within the company. Attached to the letter Mitch receives is a USB drive with phone, email, meeting, and procurement records for Kasios International over the past 2 1/2 years. Mitch wonders if the fate of the Eurasian Pipit lies somewhere in that data. Mitch intends to put this data together to see if the problems with Kasios are much larger than he initially suspected.
 
To his disappointment Mitch is not granted a meeting. Then Mitch receives an anonymous letter from someone who’s willing to help. A fellow pipit lover who works at Kasios International has gathered up a variety of company data and identified a suspicious group within the company. Attached to the letter Mitch receives is a USB drive with phone, email, meeting, and procurement records for Kasios International over the past 2 1/2 years. Mitch wonders if the fate of the Eurasian Pipit lies somewhere in that data. Mitch intends to put this data together to see if the problems with Kasios are much larger than he initially suspected.
 +
=== A list of suspected individuals include: ===
 +
* Lizbeth Jindra
 +
* Patrick Lane
 +
* Richard Fox
 +
* Sara Ballard
 +
* May Burton
 +
* Glen Grant
 +
* Dylan Ballard
 +
* Meryl Pastuch
 +
* Melita Scarpaci
 +
* Augusta Sharp
 +
* Kerstin Belveal
 +
* Rosalia Larroque
 +
* Lindsy Henion
 +
* Julie Tierno
 +
* Jose Ringwald
 +
* Ramiro Gault
 +
* Tobi Gatlin
 +
* Refugio Orrantia
 +
* Jenice Savaria
  
 
==<font size="5"><font color="#000000">'''Objective'''</font></font>==
 
==<font size="5"><font color="#000000">'''Objective'''</font></font>==
 
Our objective is to help Mitch determine the organizational structure of the group within Kasios that was referenced by the insider providing Mitch the data and find out how is it internally connected; and if anyone else involved.
 
Our objective is to help Mitch determine the organizational structure of the group within Kasios that was referenced by the insider providing Mitch the data and find out how is it internally connected; and if anyone else involved.
  
Using Gephi and Tableau, we will leverage on visual & network graphical techniques to answer these questions.
+
Using Gephi and Tableau, we will leverage on visual & network graphical techniques to answer these questions.<br>
 +
 
 +
<div style="margin:0px; padding: 2px; background: #edf2e9; font-family: Arial; border-radius: 1px; text-align:left">
 +
{| class="wikitable" style="background-color:#FFFFFF;" width="100%"
 +
|-
 +
|
 +
1.
 +
||
 +
According to the company’s communications and purchase habits, is the company growing and have they changed over time?
 +
 
 +
|-
 +
|
 +
2.
 +
||
 +
For the suspicious group that the insider have identified, determine if anyone else appears to be closely related to the group and find out which employees are making suspicious purchase.
 +
 
 +
|-
 +
|
 +
3.
 +
||
 +
Using the combined group of suspected bad actors we created in question 2, show the interactions within the group over time.<br>
 +
a. Characterizing the organizational structure and communications within the group.<br>
 +
b. Find out if the group composition change during the course of their activities?
 +
 
 +
|-
 +
|}
 +
</div>

Latest revision as of 08:54, 8 July 2018

Joel MagnifyingGlass.png

"You See, But You Do Not Observe" - Sherlock
Looking Deeper Into The Network Of Connected Individuals

Background

Methodology

Company Growth

Are You Guilty?

Conclusion

[Back To Assignments]

 

Overview (Mini-Challenge 3)

Mitch Vogel left his work at Mistford College but has not forgotten the Rose-Crested Blue Pipit. Soon after arriving in the small town of Sulev in Northern Europe, Mitch started to see the telltale signs of Methylosmolene damage at the nearby Panteleimon Aviary Sanctuary. Mitch hears from local bird watchers that populations of the Greater Eurasian Red-Throated Pipit have been affected.

Since arriving in Sulev, Mitch also noticed that the local university’s office furniture was built in a nearby EuroKasios factory. Sure enough, EuroKasios is a subsidiary of Kasios International, Inc. – a huge multinational conglomerate that is also the parent company of Kasios Office Furniture back in Mitch’s hometown of Mistford. Mitch is immediately suspicious that EuroKasios is contaminating the aviary Sanctuary and endangering the Greater Eurasian Red-Throated Pipit. Worse yet, Mitch wonders if Kasios International may be contaminating pipit habitats around the world.

Mitch spends weeks reviewing press coverage of Kasios International and public statements made by the company’s CEO. Many of the articles tout the company’s environmentally friendly practices and even talk about recent scientific research that proves the safety of AGOC-3A, an environmentally friendly replacement for Methylosmolene. Mitch is skeptical that the company has halted production and use of Methylosmolene so he contacts the company and asks to meet with representatives from their environmental compliance division.

To his disappointment Mitch is not granted a meeting. Then Mitch receives an anonymous letter from someone who’s willing to help. A fellow pipit lover who works at Kasios International has gathered up a variety of company data and identified a suspicious group within the company. Attached to the letter Mitch receives is a USB drive with phone, email, meeting, and procurement records for Kasios International over the past 2 1/2 years. Mitch wonders if the fate of the Eurasian Pipit lies somewhere in that data. Mitch intends to put this data together to see if the problems with Kasios are much larger than he initially suspected.

A list of suspected individuals include:

  • Lizbeth Jindra
  • Patrick Lane
  • Richard Fox
  • Sara Ballard
  • May Burton
  • Glen Grant
  • Dylan Ballard
  • Meryl Pastuch
  • Melita Scarpaci
  • Augusta Sharp
  • Kerstin Belveal
  • Rosalia Larroque
  • Lindsy Henion
  • Julie Tierno
  • Jose Ringwald
  • Ramiro Gault
  • Tobi Gatlin
  • Refugio Orrantia
  • Jenice Savaria

Objective

Our objective is to help Mitch determine the organizational structure of the group within Kasios that was referenced by the insider providing Mitch the data and find out how is it internally connected; and if anyone else involved.

Using Gephi and Tableau, we will leverage on visual & network graphical techniques to answer these questions.

1.

According to the company’s communications and purchase habits, is the company growing and have they changed over time?

2.

For the suspicious group that the insider have identified, determine if anyone else appears to be closely related to the group and find out which employees are making suspicious purchase.

3.

Using the combined group of suspected bad actors we created in question 2, show the interactions within the group over time.
a. Characterizing the organizational structure and communications within the group.
b. Find out if the group composition change during the course of their activities?