Difference between revisions of "ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow Company Conclusion"

From Visual Analytics and Applications
Jump to navigation Jump to search
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
===Conclusion===
+
<div style=background:#edf2e9 border:#A3BFB1>
Through the use of network graphs and graph metrics, we are able to narrow down the suspects to the follow employees of Kasios. Depending on how stringent we would like, we could filter the list to include more employees by the '''Closeness''' Criterion.
+
[[File:Joel MagnifyingGlass.png||300px|left]]<br>
 +
<font size = 6; color="#000000"> "You See, But You Do Not Observe"</font>
 +
<font size = 3; color="#000000"> '' - Sherlock''<br></font>
 +
<font size = 4; color="#000000"> Looking Deeper Into The Network Of Connected Individuals<br><br></font>
 +
</div>
  
Monitoring the network graph across time have helped us understand the organisation's structure and communication which have led to leads. Below depicts the suspects and the reason for further investigation.
+
<!--NAV BAR -->
 +
{|style="background-color:#edf2e9;" width="100%" cellspacing="0" cellpadding="0" valign="top" border="0"  |
 +
| style="font-family:Arial; font-size:100%; solid #1B338F; background:##e4efef; text-align:center;" width="15%" |
 +
;
 +
[[ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow|<b><font size="3"><font color="#000000">Background</font></font></b>]]
  
{| class="wikitable"
+
| style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9; text-align:center;" width="20%" |  
|-
+
;
! Header text !! Header text
+
[[ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow Methodology|<b><font size="3"><font color="#000000">Methodology</font></font></b>]]
|-
 
|  
 
Richard Fox <br>
 
Meryl Pastuch<br>
 
Lizbeth Jindra<br>
 
Tobi Gatlin<br>
 
Julie Tierno<br>
 
Lindsy Henion<br>
 
Rosalia Larroque<br>
 
Kerstin Belveal<br>
 
Sherrell Biebel<br>
 
Ricky Miles<br>
 
Marian Ahmadi<br>
 
Loriann Gerard<br>
 
Craig Carr<br>
 
Chang Tulip<br>
 
Timothy Gibson<br>
 
Madeline Nindorf<br>
 
Alex Hall<br>
 
Lizbeth Jindra<br>
 
Patrick Lane<br>
 
Sara Ballard<br>
 
May Burton<br>
 
Glen Grant<br>
 
Dylan Ballard<br>
 
Melita Scarpaci<br>
 
Augusta Sharp<br>
 
Jose Ringwald<br>
 
Ramiro Gault<br>
 
Refugio Orrantia<br>
 
Jenice Savaria<br>
 
||  
 
Big 4 Suspect<br>
 
Big 4 Suspect<br>
 
Big 4 Suspect<br>
 
Big 4 Suspect<br>
 
Meeting involvement<br>
 
Meeting involvement<br>
 
Meeting involvement<br>
 
Meeting involvement<br>
 
Meeting involvement<br>
 
Meeting involvement<br>
 
Meeting involvement<br>
 
Meeting involvement<br>
 
Meeting involvement<br>
 
Meeting involvement<br>
 
First Contact<br>
 
Point of contact for Lizbeth to the rest of the group<br>
 
Initial Suspect & High Closeness Value<br>
 
Initial Suspect & High Closeness Value<br>
 
Initial Suspect & High Closeness Value<br>
 
Initial Suspect & High Closeness Value<br>
 
Initial Suspect & High Closeness Value<br>
 
Initial Suspect & High Closeness Value<br>
 
Initial Suspect & High Closeness Value<br>
 
Initial Suspect & High Closeness Value<br>
 
Initial Suspect & High Closeness Value<br>
 
Initial Suspect & High Closeness Value<br>
 
Initial Suspect & High Closeness Value<br>
 
Initial Suspect & High Closeness Value<br>
 
Initial Suspect & High Closeness Value<br>
 
|}
 
<br>
 
  
<hr/>
+
| style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9 text-align:center;" width="15%" |
 +
;
 +
[[ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow Company Growth|<b><font size="3"><font color="#000000">Company Growth</font></font></b>]]
  
 +
| style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9; text-align:center;" width="15%" |
 +
;
 +
[[ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow Are You Guilty|<b><font size="3"><font color="#000000">Are You Guilty?</font></font></b>]]
  
 
| style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9; text-align:center;" width="20%" |  
 
| style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9; text-align:center;" width="20%" |  
Line 84: Line 34:
 
|  &nbsp;
 
|  &nbsp;
 
|}
 
|}
<br>
+
===Conclusion===
 +
Through the use of network graphs and graph metrics, we are able to narrow down the suspects to the follow employees of Kasios. Depending on how stringent we would like, we could filter the list to include more employees by the '''Closeness''' Criterion.
  
===Conclusion===
+
Monitoring the network graph across time have helped us understand the organisation's structure and communication which have led to leads. Below depicts the suspects and the reason for further investigation.
Using the list of suspects provided by the insider, we would like to determine if anyone else appears to be closely related to the group and which employees are making suspicious purchase. The below depicts the original network of the list of suspicious individuals provided by the insider. The size of nodes and node labels indicates the in-degree each node appears within the dataset. Larger node represents that many edges go in the node and communications are directed at them.
 
  
 
{| class="wikitable"
 
{| class="wikitable"
Line 139: Line 89:
 
Meeting involvement<br>
 
Meeting involvement<br>
 
First Contact<br>
 
First Contact<br>
POC with Lizbeth<br>
+
Point of contact for Lizbeth to the rest of the group<br>
 
Initial Suspect & High Closeness Value<br>
 
Initial Suspect & High Closeness Value<br>
 
Initial Suspect & High Closeness Value<br>
 
Initial Suspect & High Closeness Value<br>

Latest revision as of 21:37, 8 July 2018

Joel MagnifyingGlass.png

"You See, But You Do Not Observe" - Sherlock
Looking Deeper Into The Network Of Connected Individuals

Background

Methodology

Company Growth

Are You Guilty?

Conclusion

[Back To Assignments]

 

Conclusion

Through the use of network graphs and graph metrics, we are able to narrow down the suspects to the follow employees of Kasios. Depending on how stringent we would like, we could filter the list to include more employees by the Closeness Criterion.

Monitoring the network graph across time have helped us understand the organisation's structure and communication which have led to leads. Below depicts the suspects and the reason for further investigation.

Header text Header text

Richard Fox
Meryl Pastuch
Lizbeth Jindra
Tobi Gatlin
Julie Tierno
Lindsy Henion
Rosalia Larroque
Kerstin Belveal
Sherrell Biebel
Ricky Miles
Marian Ahmadi
Loriann Gerard
Craig Carr
Chang Tulip
Timothy Gibson
Madeline Nindorf
Alex Hall
Lizbeth Jindra
Patrick Lane
Sara Ballard
May Burton
Glen Grant
Dylan Ballard
Melita Scarpaci
Augusta Sharp
Jose Ringwald
Ramiro Gault
Refugio Orrantia
Jenice Savaria

Big 4 Suspect
Big 4 Suspect
Big 4 Suspect
Big 4 Suspect
Meeting involvement
Meeting involvement
Meeting involvement
Meeting involvement
Meeting involvement
Meeting involvement
Meeting involvement
Meeting involvement
Meeting involvement
Meeting involvement
First Contact
Point of contact for Lizbeth to the rest of the group
Initial Suspect & High Closeness Value
Initial Suspect & High Closeness Value
Initial Suspect & High Closeness Value
Initial Suspect & High Closeness Value
Initial Suspect & High Closeness Value
Initial Suspect & High Closeness Value
Initial Suspect & High Closeness Value
Initial Suspect & High Closeness Value
Initial Suspect & High Closeness Value
Initial Suspect & High Closeness Value
Initial Suspect & High Closeness Value
Initial Suspect & High Closeness Value
Initial Suspect & High Closeness Value