Difference between revisions of "ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow Company Conclusion"
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
+ | <div style=background:#edf2e9 border:#A3BFB1> | ||
+ | [[File:Joel MagnifyingGlass.png||300px|left]]<br> | ||
+ | <font size = 6; color="#000000"> "You See, But You Do Not Observe"</font> | ||
+ | <font size = 3; color="#000000"> '' - Sherlock''<br></font> | ||
+ | <font size = 4; color="#000000"> Looking Deeper Into The Network Of Connected Individuals<br><br></font> | ||
+ | </div> | ||
+ | |||
+ | <!--NAV BAR --> | ||
+ | {|style="background-color:#edf2e9;" width="100%" cellspacing="0" cellpadding="0" valign="top" border="0" | | ||
+ | | style="font-family:Arial; font-size:100%; solid #1B338F; background:##e4efef; text-align:center;" width="15%" | | ||
+ | ; | ||
+ | [[ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow|<b><font size="3"><font color="#000000">Background</font></font></b>]] | ||
+ | |||
+ | | style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9; text-align:center;" width="20%" | | ||
+ | ; | ||
+ | [[ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow Methodology|<b><font size="3"><font color="#000000">Methodology</font></font></b>]] | ||
+ | |||
+ | | style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9 text-align:center;" width="15%" | | ||
+ | ; | ||
+ | [[ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow Company Growth|<b><font size="3"><font color="#000000">Company Growth</font></font></b>]] | ||
+ | |||
+ | | style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9; text-align:center;" width="15%" | | ||
+ | ; | ||
+ | [[ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow Are You Guilty|<b><font size="3"><font color="#000000">Are You Guilty?</font></font></b>]] | ||
+ | |||
+ | | style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9; text-align:center;" width="20%" | | ||
+ | ; | ||
+ | [[ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow Company Conclusion|<b><font size="3"><font color="#000000">Conclusion</font></font></b>]] | ||
+ | |||
+ | | style="font-family:Arial; font-size:100%; solid #1B338F; background:#edf2e9; text-align:center;" width="20%" | | ||
+ | ; | ||
+ | [[Assignment Dropbox G1|<b><font size="2"><font color="#000000">[Back To Assignments]</font></font></b>]] | ||
+ | |||
+ | | | ||
+ | |} | ||
===Conclusion=== | ===Conclusion=== | ||
Through the use of network graphs and graph metrics, we are able to narrow down the suspects to the follow employees of Kasios. Depending on how stringent we would like, we could filter the list to include more employees by the '''Closeness''' Criterion. | Through the use of network graphs and graph metrics, we are able to narrow down the suspects to the follow employees of Kasios. Depending on how stringent we would like, we could filter the list to include more employees by the '''Closeness''' Criterion. |
Latest revision as of 21:37, 8 July 2018
"You See, But You Do Not Observe"
- Sherlock
Looking Deeper Into The Network Of Connected Individuals
|
|
|
|
|
|
Conclusion
Through the use of network graphs and graph metrics, we are able to narrow down the suspects to the follow employees of Kasios. Depending on how stringent we would like, we could filter the list to include more employees by the Closeness Criterion.
Monitoring the network graph across time have helped us understand the organisation's structure and communication which have led to leads. Below depicts the suspects and the reason for further investigation.
Header text | Header text |
---|---|
Richard Fox |
Big 4 Suspect |