ISSS608 2017-18 T3 Assign Aakanksha Kumari Q4

From Visual Analytics and Applications
Jump to navigation Jump to search
Classified-stamp.png

MC Challenge 3

Overview

Data Preparation

Question 1

Question 2

Question 3

Question 4

Conclusion

Dropbox

 
The insider has provided a list of purchases that might indicate illicit activity elsewhere in the company. Using the structure of the first group noted by the insider as a model can you find any other instances of suspicious activities in the company? Are there other groups that have structure and activity similar to this one? Who are they? Each of the suspicious purchases could be a starting point for your search. Provide examples of up to two other groups you find that appear suspicious and compare their structure with the structure of the first group.