Difference between revisions of "ISSS608 2017-18 T3 Assign Joel Choo Peng Yeow Company Conclusion"
(Created page with "<div style=background:#edf2e9 border:#A3BFB1> |300px|left<br> <font size = 6; color="#000000"> "You See, But You Do Not Observe"</font> <font...") |
|||
Line 34: | Line 34: | ||
| | | | ||
|} | |} | ||
+ | <br> | ||
+ | |||
+ | ===Conclusion=== | ||
+ | Using the list of suspects provided by the insider, we would like to determine if anyone else appears to be closely related to the group and which employees are making suspicious purchase. The below depicts the original network of the list of suspicious individuals provided by the insider. The size of nodes and node labels indicates the in-degree each node appears within the dataset. Larger node represents that many edges go in the node and communications are directed at them. | ||
+ | |||
+ | {| class="wikitable" | ||
+ | |- | ||
+ | ! Header text !! Header text | ||
+ | |- | ||
+ | | | ||
+ | Richard Fox <br> | ||
+ | Meryl Pastuch<br> | ||
+ | Lizbeth Jindra<br> | ||
+ | Tobi Gatlin<br> | ||
+ | Julie Tierno<br> | ||
+ | Lindsy Henion<br> | ||
+ | Rosalia Larroque<br> | ||
+ | Kerstin Belveal<br> | ||
+ | Sherrell Biebel<br> | ||
+ | Ricky Miles<br> | ||
+ | Marian Ahmadi<br> | ||
+ | Loriann Gerard<br> | ||
+ | Craig Carr<br> | ||
+ | Chang Tulip<br> | ||
+ | Timothy Gibson<br> | ||
+ | Madeline Nindorf<br> | ||
+ | Alex Hall<br> | ||
+ | Lizbeth Jindra<br> | ||
+ | Patrick Lane<br> | ||
+ | Sara Ballard<br> | ||
+ | May Burton<br> | ||
+ | Glen Grant<br> | ||
+ | Dylan Ballard<br> | ||
+ | Melita Scarpaci<br> | ||
+ | Augusta Sharp<br> | ||
+ | Jose Ringwald<br> | ||
+ | Ramiro Gault<br> | ||
+ | Refugio Orrantia<br> | ||
+ | Jenice Savaria<br> | ||
+ | || | ||
+ | Big 4 Suspect<br> | ||
+ | Big 4 Suspect<br> | ||
+ | Big 4 Suspect<br> | ||
+ | Big 4 Suspect<br> | ||
+ | Meeting involvement<br> | ||
+ | Meeting involvement<br> | ||
+ | Meeting involvement<br> | ||
+ | Meeting involvement<br> | ||
+ | Meeting involvement<br> | ||
+ | Meeting involvement<br> | ||
+ | Meeting involvement<br> | ||
+ | Meeting involvement<br> | ||
+ | Meeting involvement<br> | ||
+ | Meeting involvement<br> | ||
+ | First Contact<br> | ||
+ | POC with Lizbeth<br> | ||
+ | Initial Suspect & High Closeness Value<br> | ||
+ | Initial Suspect & High Closeness Value<br> | ||
+ | Initial Suspect & High Closeness Value<br> | ||
+ | Initial Suspect & High Closeness Value<br> | ||
+ | Initial Suspect & High Closeness Value<br> | ||
+ | Initial Suspect & High Closeness Value<br> | ||
+ | Initial Suspect & High Closeness Value<br> | ||
+ | Initial Suspect & High Closeness Value<br> | ||
+ | Initial Suspect & High Closeness Value<br> | ||
+ | Initial Suspect & High Closeness Value<br> | ||
+ | Initial Suspect & High Closeness Value<br> | ||
+ | Initial Suspect & High Closeness Value<br> | ||
+ | Initial Suspect & High Closeness Value<br> | ||
+ | |} | ||
+ | <br> | ||
+ | |||
+ | <hr/> |
Revision as of 21:30, 8 July 2018
"You See, But You Do Not Observe"
- Sherlock
Looking Deeper Into The Network Of Connected Individuals
|
|
|
|
|
|
Conclusion
Using the list of suspects provided by the insider, we would like to determine if anyone else appears to be closely related to the group and which employees are making suspicious purchase. The below depicts the original network of the list of suspicious individuals provided by the insider. The size of nodes and node labels indicates the in-degree each node appears within the dataset. Larger node represents that many edges go in the node and communications are directed at them.
Header text | Header text |
---|---|
Richard Fox |
Big 4 Suspect |