In many instances, more than one person has access to a computer. If a computer is used by more than one user to commit a crime, it's important to be able to establish who entered information.
If we can develop profiles, then we can determine whether Internet activity that appears threatening was undertaken by a terrorist or a teen-ager.
Copyright © 2024 Electric Goat Media. All Rights Reserved.