Difference between revisions of "ISSS608 2017-18 T3 Assign Yu Zhecheng"

From Visual Analytics and Applications
Jump to navigation Jump to search
(Created page with "<div style=background:#2C3E50 border:#D1F2EB> 210px <font size = 5; color="#FDFEFE ">VAST Challenge 2018:Secrets of Kasios</font> Image:Bird.png|...")
 
Line 27: Line 27:
 
|}
 
|}
 
<br/>
 
<br/>
 +
 +
==Mini Challenge 3 Background==
 +
The Kasios Insider has provided data from across the company. There are call records, emails, purchases, and meetings. The data only includes the source of each transaction, the recipient (destination), and the time of the transaction. However, we don't know any details about the content.
 +
 +
There are about 640000 employees work for Kasios. The list contains those who left the company from 2015 to 2017.  Although we don't know what they exactly communicated, the users and frequency of all call records, emails, purchases and meetings indicate the development and structure of Kasios. The most important thing is that the suspicious person and activities must left records in the data sets. <br>

Revision as of 19:42, 26 June 2018

Detective.png VAST Challenge 2018:Secrets of Kasios Bird.png

Background

Visualization

Insight

Conclusion

 


Mini Challenge 3 Background

The Kasios Insider has provided data from across the company. There are call records, emails, purchases, and meetings. The data only includes the source of each transaction, the recipient (destination), and the time of the transaction. However, we don't know any details about the content.

There are about 640000 employees work for Kasios. The list contains those who left the company from 2015 to 2017. Although we don't know what they exactly communicated, the users and frequency of all call records, emails, purchases and meetings indicate the development and structure of Kasios. The most important thing is that the suspicious person and activities must left records in the data sets.