摘要 |
<p><P>PROBLEM TO BE SOLVED: To provide an illicit operation management technique for monitoring computer operations by an unspecified number of users, particularly, file operations, and automatically evaluating whether each user's operation is inappropriate or not. <P>SOLUTION: The illicit operation management device comprises an operation log acquisition part 22 which acquires an operation log describing an operation event performed by each user during the time from log-in to log-out from a network terminal; an operation event classification part 23 which classifies the operation event described in the operation log; an operation evaluation value calculation part 24 which calculates an operation evaluation value for the classified operation event; an operation evaluation value accumulative computing part 25 for computing an accumulation value of the operation evaluation value; and an illicit operation determination part 26 which determines whether each user is an illicit operator or not based on the accumulation value. <P>COPYRIGHT: (C)2008,JPO&INPIT</p> |