Content deleted Content added
Replaced 'then' with 'than'. |
|||
Line 6:
== Methodology ==
The analysis of large volumes of data is typically performed in a separate database system run by the analysis team. Live systems are usually not dimensioned to run extensive individual analysis without affecting the regular users. On the other hand, it is methodically preferable to analyze data copies on
After an initial analysis phase using methods of [[explorative data analysis]] the following phase is usually highly iterative. Starting with a hypothesis on how the perpetrator might have created a personal advantage the data is analyzed for supporting evidence. Following that the hypothesis is refined or discarded.
The combination of different databases, in particular data from different systems or sources is highly effective. These data sources are either unknown to the perpetrator or he/she
[[Data visualization|Data Visualization]] is often used to display the results.
|