Difference between revisions of "ISSS608 2017-18 T3 Assign Jyoti Bukkapatil Observations & Insights"

From Visual Analytics and Applications
Jump to navigation Jump to search
Line 179: Line 179:
 
[[File:ISSS608 2018 Jyoti Bukkapatil Q3 10.png|600px|center|border]]
 
[[File:ISSS608 2018 Jyoti Bukkapatil Q3 10.png|600px|center|border]]
 
<center style="font-size:13px;"> <u>Figure 10</u> </center>
 
<center style="font-size:13px;"> <u>Figure 10</u> </center>
 +
 +
 +
=<big>Question 04</big> =

Revision as of 02:38, 9 July 2018

Question 01

Using the four large Kasios International data sets, combine the different sources to create a single picture of the company. Characterize changes in the company over time. According to the company’s communications and purchase habits, is the company growing? Limit your responses to 5 images and 500 words.

Analysis through visualization

Please note that data for Q3 Year 2015 was excluded to for better visualization of the trend.

  • Time Series plot in figure 1 shows the monthly pattern for Calls, Emails, Purchases, and Meetings. The overall trend for Calls, Emails, and Purchases is stable throughout the past two years. This indicates that Kasios International is the stable company. There is neither a significant growth or decay.
  • From figure 1 Call, Emails and Purchases are highly correlated and follow the same trend. Monthly Ups and down in calls, emails, and purchases follow the number of days in months. Deeps can be observed for months with 30 days and ups can be observed for months with 31 days. Similarly, two major deeps are for Feb 2016 and Feb 2017 respectively.
  • The continuous increasing trend of Meetings might be due to a change in work culture or some new initiatives.
ISSS608 2018 Jyoti Bukkapatil Methodology 22.jpg
Figure 1
  • Calendar view of daily calls (figure 2) shows that calls are randomly distributed throughout the week. There is no fixed pattern for the number of calls. There are peaks on weekdays as well as weekends. This might be because this is an international company and employees were working with people around the world from different time zones.


ISSS608 2018 Jyoti Bukkapatil Q1 2.jpg
Figure 2
  • Figure 3 & 4 shows Calendar plot for Email and Purchases. The daily pattern for a number of emails and Purchases is randomly distributed throughout the week which is the same as calls pattern.


ISSS608 2018 Jyoti Bukkapatil Q1 3.jpg


Figure 3
ISSS608 2018 Jyoti Bukkapatil Q1 4.jpg


Figure 4
  • Calender plot for a daily pattern of the number of meetings is shown in Figure 5. The number of meetings has increased towards the end of 2017 Dec. Surprisingly the number of meetings also are randomly distributed throughout the week. In a month there is no fixed pattern of meetings like weekly or biweekly. Like other communications and purchases, the high number of meetings also can be observed on weekdays as well as the weekend.
ISSS608 2018 Jyoti Bukkapatil Q1 5.jpg


Figure 5
  • Figure 6 & 7 shows hourly time series pattern for calls, emails, purchases, and meetings for weekday and weekend both. For both weekday and weekend calls, emails and Purchases are initiated throughout 24 hours, which indicates that employees might be working in shifts to coordinate with all time zone areas. However, meetings timings are restricted between 3 am to 11 pm for weekends and 3 am to 12 am on weekdays.

ISSS608 2018 Jyoti Bukkapatil Q1 6.jpg

Figure 6
ISSS608 2018 Jyoti Bukkapatil Q1 7.jpg

Figure 7


Question 02

Combine the four data sources for a group that the insider has identified as being suspicious and locate the group in the larger dataset. Determine if anyone else appears to be closely associated with this group. Highlight which employees are making suspicious purchases, according to the insider’s data. Limit your responses to 8 images and 500 words.

Analysis Through Visualisation

  • List of 20 employees has been given by insider from Kasios International along with details of suspicious interactions including calls, emails, meeting, and purchases. Figure 1 shows how these 20 employees are associated with groups/departments within the company. Nodes are grouped & colored together based on Modularity class (Community detection algorithm).These suspicious 20 employees are associated with 6 different groups/departments in the company.
  • Richard Fox, Tobi Gatlin, Maryl Pastuch and Lizbeth Jindra were associated with four different groups and were highest degree centrality (connectivity) member of respective groups. Which indicates that these four might be in lead /managerial positions.
  • Out of remaining 16 members, 4 are connected associated to one group (Modularity class 5) and 12 are associated with one group (Modularity Class 3)

<<interactive link>>

ISSS608 2018 Jyoti Bukkapatil Q2 1.jpg


ISSS608 2018 Jyoti Bukkapatil Methodology 17.jpg

ISSS608 2018 Jyoti Bukkapatil Methodology 18.jpg


Figure 1











  • By filtering nodes based on Betweenness centrality, other employees which are closely associated with suspicious employees were found. Betweenness centrality measures the extent to which a vertex lies on paths between other vertices. Vertices with high betweenness may have considerable influence within a network by their control over information passing between others. They are also the ones whose removal from the network will most disrupt communications between other vertices because they lie on the largest number of paths taken by messages.
  • Figure 2 shows 14 such members which will have an impact on communication between suspicious employees. The nodes of smaller size represent these 14 members. There is a high chance that information being shared among suspicious employees passes via these members and hence they might be associated with suspicious employees.
ISSS608 2018 Jyoti Bukkapatil Q2 2.jpg


ISSS608 2018 Jyoti Bukkapatil Q2 3.jpg

ISSS608 2018 Jyoti Bukkapatil Q2 4.jpg


Figure 2











  • Below table lists name of these 14 employees along with their Betweenness centrality and Closeness Centrality measures. However, these employee list is filtered based on betweenness centrality only.
ISSS608 2018 Jyoti Bukkapatil Q2 T1.jpg


Table 1
  • Sheilah Stachniw has the highest betweenness among 14 employees. Sheilah Stachniw has interacted with 7 of suspicious employees and is the only point of connection for Tobi Gatlin to connect with other 6 suspicious group of employees. All interactions between Tobi and other Six employees must be going through Sheilah so there are high chances that Sheilah is closely associated with suspicious employees. Figure 3 shows the network graph for Sheilah Stachniw.
ISSS608 2018 Jyoti Bukkapatil Q2 3.jpg


Figure 3
  • Madeline Nindorf with second highest betweenness centrality among 14 employees can highly impact communication between suspicious employees. Madeline also has the highest closeness centrality measure. Figure 4 shows the network graph for Madeline. Madeline is an intermittent point for Lezbeth Jindra to share information with three suspicious members.
ISSS608 2018 Jyoti Bukkapatil Q2 4.jpg


Figure 4
  • Terrilyn Overkamp the third person who can impact communication between suspicious employees. Figure 5 shows the network graph of Terrilyn, who is the connecting point for Lezbeth Jindra to communicate with Meryl Pastuch and Richard Fox.
ISSS608 2018 Jyoti Bukkapatil Q2 5.jpg


Figure 5
  • Juanita Westen is a mediator between Lezbeth Jindra and Richard Fox, who is one of the most important people with high degree centrality. Juanita has 4th highest betweenness centrality measure among those 14 associated employees.
ISSS608 2018 Jyoti Bukkapatil Q2 6.jpg


Figure 6
  • Rather, Lizabeth Jindra is only connected with Lindsy Henion from the group of suspicious employees. Rest of his connections are this 5 employees from the list of 14 employees which were found to be closely associated with suspicious employees. So we can say that these five employees may be most likely associated with Suspicious employees and their activities.
ISSS608 2018 Jyoti Bukkapatil Q2 7.jpg


Figure 7
  • Employees making suspicious purchases:

Figure 8 shows the network graph for Purchases made by suspicious employees. There were total 25 purchase transactions took place and all these purchase orders were addressed to Gail Feindt. We can clearly see only one purchase transaction looks offbeat and it’s from Rosalia Larroque to Jenice Savaria. An insider has mentioned this transaction between Rosalia and Jenice in his data.

ISSS608 2018 Jyoti Bukkapatil Q2 8.jpg


Figure 8

Question 03

Using the combined group of suspected bad actors you created in question 2, show the interactions within the group over time. Limit your responses to 10 images and 1000 words Characterize the group’s organizational structure and show a full picture of communications within the group. Does the group composition change during the course of their activities? How do the group’s interactions change over time?

Interaction Within The Suspicious Group:

  • Note that Node colors and Edge colors for this questions are fixed and are same as used in Question 2. Throughout this analysis, I have not changed the color aesthetic of the graph to keep nodes linked to their department/group in the company as per findings in Question2 Figure 1.

Figure 1 below shows the network graph for the combined group of suspicious employees and their suspicious interactions.size of the node represents the degree centrality of the node. The graph shows Degree centrality of each node along with its Lable.

ISSS608 2018 Jyoti Bukkapatil Q3 1.png
Figure 1
  • Max number of members belong to group number 3 in an organization which was found in Quetion2 Figure1. This is also a relatively small group in an organization.
  • Richard Fox with maximum suspicious interactions during last two and half year has the highest degree. Which makes him the Most prominent person in the course of suspicious activities and group.
  • Followed by Richard, Lindsy Henion, Tobi Gatlin & Meryl Postuch had a large number of interactions which makes them second most important members of this group.

Interactions over the time period

To study Interactions between these suspicious employee group over the last two and half year, I divided time quarterly and below are findings for every quarter of the year.

  • Figure 2 show network graph for interactions took place in the Year 2015 Q4.This might be a start of Suspicious activities as in 2015Q4, the maximum number of suspicious group members were involved in interactions. Same can be seen from Figure 2. Richard Fox being in the center of communications with many members has the highest degree centrality. He has initiated 8 (out-degree )conversations and received 3 (In Degree). Members of all 6 groups were involved in the conversation. There were two meetings happened and both were initiated by Richard Fox.
ISSS608 2018 Jyoti Bukkapatil Q3 2.png
Figure 2
  • Figure 3 shows interactions between the suspicious group for year 2016Q1. Richard Fox and Lindsy Henion had the highest degree followed by Meryl Pastuch and Rosalia Laraque. Group composition still remains the same as members from all department /group were involved in conversations.
ISSS608 2018 Jyoti Bukkapatil Q3 3.png
Figure 3
  • In 2016Q2 Richard Fox had initiated email and calls, however, In degree was zero. All conversations were through Email and Call. Figure 4 shows a network graph for interactions during 2016Q2.
ISSS608 2018 Jyoti Bukkapatil Q3 4.png
Figure 4
  • Figure 5 show network graph for interactions between suspicious employee group during 2016Q3.The number of interactions was very less compared with the previous quarter. Only 3 out of 6 groups were involved in conversations. Groups composition was changed during this period.
ISSS608 2018 Jyoti Bukkapatil Q3 5.png
Figure 5
  • During the last quarter of the Year 2016, members from all groups had the conversation via emails and calls. However, the number of members involved in these conversations were less compared to the initial two quarters i.e.2015Q4 and 2016Q1. All main player like Richard Fox, Lindsy Henion, Tobi Gatlin were in action again with the highest degree of 3. After 2015Q4, no meeting was initiated by any member. Figure 5 shows 2016Q4 interactions
ISSS608 2018 Jyoti Bukkapatil Q3 6.png
Figure 6
  • In 2017Q1 Kerstin Belveal had the highest degree followed by Jose and Tobi. Shailah Stachniw who was not mentioned in the suspicious list of insider

has been involved in many conversations. Even though members of five different groups had interacted only three groups members were involved in intergroup communications. Figure 7 shows the network graph for interactions for 2017Q1

ISSS608 2018 Jyoti Bukkapatil Q3 7.png
Figure 7
  • Figure 8 shows Network graph for 2017Q2. All conversations were via Email or call. There was no meeting held or purchase order initiated. Half of these conversations were within the same organizational group and half were between members from different groups. however, only 5 out of 6 groups were interacting.
ISSS608 2018 Jyoti Bukkapatil Q3 8.png
Figure 8
  • 2017 Q3 was most important time as one suspicious purchase order was initiated and there were a number of meetings requests sent by Richard Fox, Meryl Pastuch, Lindsy Henion and Sherrel Biebel. Rosalia Larroque initiated a suspicious purchase order to Jenice Samaria.Figure 8 shows all these interactions.
ISSS608 2018 Jyoti Bukkapatil Q3 9.png
Figure 9
  • Last quarter of the year 2017 Rosalia Larroque had the highest degree followed by Kerstin Belveal.conversations were vial mail, call, and Emails.

Figure 10 shows the network graph for same.

ISSS608 2018 Jyoti Bukkapatil Q3 10.png
Figure 10


Question 04