Difference between revisions of "ISSS608 2017-18 T3 Assign Vigneshwar Ramachandran Vadivel Conclusion"

From Visual Analytics and Applications
Jump to navigation Jump to search
Line 9: Line 9:
 
[[ISSS608_2017-18_T3_Assign_Vigneshwar Ramachandran Vadivel_Approach|<font color="#3c3c3c"><strong>Approach</strong></font>]]
 
[[ISSS608_2017-18_T3_Assign_Vigneshwar Ramachandran Vadivel_Approach|<font color="#3c3c3c"><strong>Approach</strong></font>]]
  
| style="font-family:Open Sans, Arial, sans-serif; font-size:15px; text-align: center; border-top:solid #ffffff; border-bottom:solid #0091b3" width="210px" |  
+
| style="font-family:Open Sans, Arial, sans-serif; font-size:15px; text-align: center; border-top:solid #ffffff; border-bottom:solid #646464" width="210px" |  
 
[[ISSS608_2017-18_T3_Assign_Vigneshwar Ramachandran Vadivel_Findings|<font color="#3c3c3c"><strong>Findings</strong></font>]]
 
[[ISSS608_2017-18_T3_Assign_Vigneshwar Ramachandran Vadivel_Findings|<font color="#3c3c3c"><strong>Findings</strong></font>]]
  
| style="font-family:Open Sans, Arial, sans-serif; font-size:15px; text-align: center; border-top:solid #ffffff; border-bottom:solid #646464" width="210px" |   
+
| style="font-family:Open Sans, Arial, sans-serif; font-size:15px; text-align: center; border-top:solid #ffffff; border-bottom:solid #0091b3" width="210px" |   
 
[[ISSS608_2017-18_T3_Assign_Vigneshwar Ramachandran Vadivel_Conclusion|<font color="#3c3c3c"><strong>Conclusion</strong></font>]]
 
[[ISSS608_2017-18_T3_Assign_Vigneshwar Ramachandran Vadivel_Conclusion|<font color="#3c3c3c"><strong>Conclusion</strong></font>]]
  

Revision as of 13:06, 9 July 2018

MC3 Banner.png

Intro

Approach

Findings

Conclusion

Based on our network graphs and temporal analysis, we can short down the suspected employees from insider’s data. The main suspected employee who should be investigated further to confirm the accusation are as follows,

  • Richard Fox
  • Meryl Pastuch
  • Tobi Gatlin
  • Rosalia Larroque
  • Lizbeth Jindra
  • These employees act as bridge for the entire communication network of insider’s data and they play an critical role in the purchase. Based on the closeness and modularity metrics we can narrow down our suspect list for final investigation to prove the illicit purchase of chemical.