ISSS608 2017-18 T3 Assign Aakanksha Kumari Q3

From Visual Analytics and Applications
Jump to navigation Jump to search
Classified-stamp.png

MC Challenge 3

Overview

Data Preparation

Question 1

Question 2

Question 3

Question 4

Conclusion

Dropbox

 

Using the combined group of suspected bad actors, you created in question 2, show the interactions within the group over time.

  • Characterize the group’s organizational structure and show a full picture of communications within the group.
  • Does the group composition change during the course of their activities?
  • How do the group’s interactions change over time?

The Story So Far

The Kasios International over the course of two and half years have maintained nearly same communicationa volumne and purchase pattern, which implies that the organization have not grown or shrunk significantly. But on closer analysis we found out with each year, the new employees were being hired, and there is constant shuffling of human resource. Kasios have grow significant change in personnels, with numnber of same employees each month decreasing.

Intially we began with certain suspicious transactions (purchaes and communication) as provided by our informer. Later as we continued our analysis, othe key players, closely associated to employees making suspicious communication were identified. Using network analysis and eigenvector centrality (filter value > 0.4), nodes connected to influential nodes (in this case, suspicious employees) more than other non-influential nodes(non suspicious employees), can be identified. So by following the above startegy following are list of old and new suspicious players.

Original Suspicious Employess

Augusta Sharp, Tobi Gatlin ,Patrick Lane, Melita Scarpaci, Rosalia Larroque, Glen Grant ,Meryl Pastuch, Dylan Ballard, May Burton, Kerstin Belveal, Alex Hall, Refugio Orrantia, Jose Ringwald, Julie Tierno, Richard Fox, Lizbeth Jindra, Ramiro Gault, Sara Ballard, Jenice Savaria, Lindsy Henion

New Suspicious Employees
Ferne Hards, Martha Harris, Sherrell Biebel, Gail Feindt, Sheilah Stachniw, Madeline Nindorf

So now our focus is on these 26 key players, as discussed in Q2

Main Tasks in this section
Using the combined group of suspected bad actors you created in question 2, show the interactions within the group over time.

  • Characterize the group’s organizational structure and show a full picture of communications within the group.
  • Does the group composition change during the course of their activities?
  • How do the group’s interactions change over time?

The Combined Communication Picture

Suspicious communication within group-alt.png

Using modularity algoithm, and assigning distinct class color, the graph is clustered into 5 classes. This helps in better visualization, and also identifying key players in each cluster. All the clusters are discusses individually later.

What can we learn

  • Purchases are few in between. Key players involved are Gail Feindt, Richard Fox and Meryl Pastuch.
  • Organization communication structure is hierarchial. Which means only few key players from each cluster communicates with key players from other cluster.
  • Less meetings, mainly happenig between inter cluster groups.