Difference between revisions of "ISSS608 2017-18 T3 Assign Yu Zhecheng"

From Visual Analytics and Applications
Jump to navigation Jump to search
Line 32: Line 32:
  
 
There are about 640000 employees work for Kasios. The list contains those who left the company from 2015 to 2017.  Although we don't know what they exactly communicated, the users and frequency of all call records, emails, purchases and meetings indicate the development and structure of Kasios. The most important thing is that the suspicious person and activities must left records in the data sets. <br>
 
There are about 640000 employees work for Kasios. The list contains those who left the company from 2015 to 2017.  Although we don't know what they exactly communicated, the users and frequency of all call records, emails, purchases and meetings indicate the development and structure of Kasios. The most important thing is that the suspicious person and activities must left records in the data sets. <br>
 +
 +
 +
==Data Preparation==
 +
1. Four Variables
 +
 
 +
  <br>'''Source''': contains the company ID for the person who called, sent an email, purchased something, or invited people to a meeting
 +
  <br>'''E-type''': contains a number designating what kind of connection is made.
 +
            a.0 is for calls 
 +
            b.1 is for emails
 +
            c.2 is for purchases
 +
            d.3 is for meetings
 +
  <br>'''Destination''':contains company ID for the person who is receiving a call, receiving an email, selling something to a buyer,
 +
                or being invited to a meeting.
 +
  <br>'''Time stamp''':in seconds starting on May 11, 2015 at 14:00.
 +
 +
2. Nine original  data sets
 +
<br>Four data sets that cover the whole company.
 +
<br>Another four data sets of the rest contains the information about individuals that the Insider has indicated as suspicious.
 +
<br>The last company index that shows the name of everyone in the company and their associated ID. 
 +
<p>[[File:DataSet.png|600px|center]]</p>
 +
 +
3.Clean all data sets.

Revision as of 23:35, 3 July 2018

Detective.png VAST Challenge 2018:Secrets of Kasios Bird.png

Background & Preparation

Visualization

Insight

Conclusion

 


Mini Challenge 3 Background

The Kasios Insider has provided data from across the company. There are call records, emails, purchases, and meetings. The data only includes the source of each transaction, the recipient (destination), and the time of the transaction. However, we don't know any details about the content.

There are about 640000 employees work for Kasios. The list contains those who left the company from 2015 to 2017. Although we don't know what they exactly communicated, the users and frequency of all call records, emails, purchases and meetings indicate the development and structure of Kasios. The most important thing is that the suspicious person and activities must left records in the data sets.


Data Preparation

1. Four Variables

 
Source: contains the company ID for the person who called, sent an email, purchased something, or invited people to a meeting
E-type: contains a number designating what kind of connection is made. a.0 is for calls b.1 is for emails c.2 is for purchases d.3 is for meetings
Destination:contains company ID for the person who is receiving a call, receiving an email, selling something to a buyer, or being invited to a meeting.
Time stamp:in seconds starting on May 11, 2015 at 14:00.

2. Nine original data sets
Four data sets that cover the whole company.
Another four data sets of the rest contains the information about individuals that the Insider has indicated as suspicious.
The last company index that shows the name of everyone in the company and their associated ID.

DataSet.png

3.Clean all data sets.