Picture map of Europe with pins indicating European capital cities

Open Access research with a European policy impact...

The Strathprints institutional repository is a digital archive of University of Strathclyde's Open Access research outputs. Strathprints provides access to thousands of Open Access research papers by Strathclyde researchers, including by researchers from the European Policies Research Centre (EPRC).

EPRC is a leading institute in Europe for comparative research on public policy, with a particular focus on regional development policies. Spanning 30 European countries, EPRC research programmes have a strong emphasis on applied research and knowledge exchange, including the provision of policy advice to EU institutions and national and sub-national government authorities throughout Europe.

Explore research outputs by the European Policies Research Centre...

Monitoring software

Petropoulakis, L. (2004) Monitoring software. 7G 06F 11/30 A.

Full text not available in this repository. Request a copy from the Strathclyde author

Abstract

A system for monitoring actions performed on a data processing device by a user, and preferably a plurality of different users. The system comprises a plurality of user data processing devices (22) including means for interacting with a user and a system monitor (12) that can communicate with each user device (22) and a database (18). In a preferred embodiment, the monitor (12) includes a plurality of software agents (14) for carrying out specific functionality. These agents may be distributed over one or many different machines. Each user device (22) includes at least one sensor (24) for detecting events occasioned by interaction of a user with the data processing device (22). These sensors are operable to create a data structure representing a detected event, and communicate that data structure to the monitor (12). Once these structures are received, the monitor (12) records them in the database. By analysing the event data for specific users, user profiles can be created. These can then be used to authenticate users.