Content deleted Content added
unstructered - typo |
improved flow |
||
Line 14:
After an initial analysis phase using methods of [[explorative data analysis]] the following phase is usually highly iterative. Starting with a hypothesis on how the perpetrator might have created a personal advantage the data is analyzed for supporting evidence. Following that the hypothesis is refined or discarded.
The combination of different databases, in particular data from different systems or sources is highly effective. These data sources are either unknown to the perpetrator or
[[Data visualization|Data Visualization]] is often used to display the results.
|