Difference between revisions of "ISSS608 2017-18 T3 Assign Aakanksha Kumari Q4"

From Visual Analytics and Applications
Jump to navigation Jump to search
Line 2: Line 2:
  
 
<div style="background:#DC143C; border:#DC143C; padding-left:15px; text-align:center;">  
 
<div style="background:#DC143C; border:#DC143C; padding-left:15px; text-align:center;">  
<font size = 5; color="#FFFFFF"><span style="font-family:Century Gothic;">MC Challenge 3</span></font>  
+
<font size = 5; color="#FFFFFF"><span style="font-family:Century Gothic;">Unraveling the Secrets of Kasios : VAST Mini Challenge 3</span></font>  
 
</div>
 
</div>
 
<!--MAIN HEADER -->  
 
<!--MAIN HEADER -->  
Line 29: Line 29:
 
;  
 
;  
 
[[ISSS608 2017-18 T3 Assign Aakanksha Kumari_Q4| <font color="#FFFFFF">Question 4</font>]]  
 
[[ISSS608 2017-18 T3 Assign Aakanksha Kumari_Q4| <font color="#FFFFFF">Question 4</font>]]  
 
| style="font-family:Century Gothic; font-size:100%; solid #DC143C; background:#DC143C; text-align:center;" width="14.3%" | 
 
;
 
[[ISSS608 2017-18 T3 Assign Aakanksha Kumari_conclusion| <font color="#FFFFFF">Conclusion</font>]]
 
  
 
| style="font-family:Century Gothic; font-size:100%; solid #DC143C; background:#DC143C; text-align:center;" width="14.3%" |   
 
| style="font-family:Century Gothic; font-size:100%; solid #DC143C; background:#DC143C; text-align:center;" width="14.3%" |   

Revision as of 13:14, 8 July 2018

Classified-stamp.png

Unraveling the Secrets of Kasios : VAST Mini Challenge 3

Overview

Data Preparation

Question 1

Question 2

Question 3

Question 4

Dropbox

 
The insider has provided a list of purchases that might indicate illicit activity elsewhere in the company. Using the structure of the first group noted by the insider as a model can you find any other instances of suspicious activities in the company? Are there other groups that have structure and activity similar to this one? Who are they? Each of the suspicious purchases could be a starting point for your search. Provide examples of up to two other groups you find that appear suspicious and compare their structure with the structure of the first group.