Difference between revisions of "ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow Company Conclusion"
(3 intermediate revisions by the same user not shown) | |||
Line 22: | Line 22: | ||
| style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9; text-align:center;" width="15%" | | | style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9; text-align:center;" width="15%" | | ||
; | ; | ||
− | [[ISSS608 2017-18 T3 Assign Joel Choo Peng | + | [[ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow Are You Guilty|<b><font size="3"><font color="#000000">Are You Guilty?</font></font></b>]] |
| style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9; text-align:center;" width="20%" | | | style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9; text-align:center;" width="20%" | | ||
Line 34: | Line 34: | ||
| | | | ||
|} | |} | ||
− | + | ===Conclusion=== | |
+ | Through the use of network graphs and graph metrics, we are able to narrow down the suspects to the follow employees of Kasios. Depending on how stringent we would like, we could filter the list to include more employees by the '''Closeness''' Criterion. | ||
− | + | Monitoring the network graph across time have helped us understand the organisation's structure and communication which have led to leads. Below depicts the suspects and the reason for further investigation. | |
− | |||
{| class="wikitable" | {| class="wikitable" | ||
Line 89: | Line 89: | ||
Meeting involvement<br> | Meeting involvement<br> | ||
First Contact<br> | First Contact<br> | ||
− | + | Point of contact for Lizbeth to the rest of the group<br> | |
Initial Suspect & High Closeness Value<br> | Initial Suspect & High Closeness Value<br> | ||
Initial Suspect & High Closeness Value<br> | Initial Suspect & High Closeness Value<br> |
Latest revision as of 21:37, 8 July 2018
"You See, But You Do Not Observe"
- Sherlock
Looking Deeper Into The Network Of Connected Individuals
|
|
|
|
|
|
Conclusion
Through the use of network graphs and graph metrics, we are able to narrow down the suspects to the follow employees of Kasios. Depending on how stringent we would like, we could filter the list to include more employees by the Closeness Criterion.
Monitoring the network graph across time have helped us understand the organisation's structure and communication which have led to leads. Below depicts the suspects and the reason for further investigation.
Header text | Header text |
---|---|
Richard Fox |
Big 4 Suspect |