This HTML5 document contains 49 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
dbohttp://dbpedia.org/ontology/
foafhttp://xmlns.com/foaf/0.1/
n8https://global.dbpedia.org/id/
dbthttp://dbpedia.org/resource/Template:
rdfshttp://www.w3.org/2000/01/rdf-schema#
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
wikipedia-enhttp://en.wikipedia.org/wiki/
dbchttp://dbpedia.org/resource/Category:
provhttp://www.w3.org/ns/prov#
dbphttp://dbpedia.org/property/
xsdhhttp://www.w3.org/2001/XMLSchema#
wikidatahttp://www.wikidata.org/entity/
dbrhttp://dbpedia.org/resource/

Statements

Subject Item
dbr:Monitoring
dbo:wikiPageWikiLink
dbr:User_activity_monitoring
dbo:wikiPageDisambiguates
dbr:User_activity_monitoring
Subject Item
dbr:User_activity_monitoring
rdfs:label
User activity monitoring
rdfs:comment
In the field of information security, user activity monitoring (UAM) is the monitoring and recording of user actions. UAM captures user actions, including the use of applications, windows opened, system commands executed, checkboxes clicked, text entered/edited, URLs visited and nearly every other on-screen event to protect data by ensuring that employees and contractors are staying within their assigned tasks, and posing no risk to the organization.
dcterms:subject
dbc:National_security dbc:Data_security dbc:Regulatory_compliance dbc:Secure_communication dbc:Crime_prevention
dbo:wikiPageID
45116490
dbo:wikiPageRevisionID
1114928041
dbo:wikiPageWikiLink
dbr:Insider_threat dbr:Health_Insurance_Portability_and_Accountability_Act dbr:Law_enforcement dbr:Data_breach dbc:Data_security dbr:Information_security dbr:Citrix dbr:Regulatory_compliance dbr:User_behavior_analytics dbc:Regulatory_compliance dbr:Session_replay dbr:Screen_scraping dbc:Secure_communication dbr:IT_infrastructure dbc:Crime_prevention dbr:Database dbc:National_security dbr:Information_technology
owl:sameAs
n8:2AUwc wikidata:Q22909580
dbp:wikiPageUsesTemplate
dbt:Short_description dbt:Reflist
dbo:abstract
In the field of information security, user activity monitoring (UAM) is the monitoring and recording of user actions. UAM captures user actions, including the use of applications, windows opened, system commands executed, checkboxes clicked, text entered/edited, URLs visited and nearly every other on-screen event to protect data by ensuring that employees and contractors are staying within their assigned tasks, and posing no risk to the organization. User activity monitoring software can deliver video-like playback of user activity and process the videos into user activity logs that keep step-by-step records of user actions that can be searched and analyzed to investigate any out-of-scope activities.
prov:wasDerivedFrom
wikipedia-en:User_activity_monitoring?oldid=1114928041&ns=0
dbo:wikiPageLength
10635
foaf:isPrimaryTopicOf
wikipedia-en:User_activity_monitoring
Subject Item
dbr:User_behavior_analytics
dbo:wikiPageWikiLink
dbr:User_activity_monitoring
Subject Item
dbr:Employee_monitoring_software
dbo:wikiPageWikiLink
dbr:User_activity_monitoring
Subject Item
dbr:Business_activity_monitoring
dbo:wikiPageWikiLink
dbr:User_activity_monitoring
Subject Item
dbr:Time-tracking_software
dbo:wikiPageWikiLink
dbr:User_activity_monitoring
Subject Item
dbr:Data_loss_prevention_software
dbo:wikiPageWikiLink
dbr:User_activity_monitoring
Subject Item
dbr:Session_recording
dbo:wikiPageWikiLink
dbr:User_activity_monitoring
dbo:wikiPageRedirects
dbr:User_activity_monitoring
Subject Item
dbr:UAM
dbo:wikiPageWikiLink
dbr:User_activity_monitoring
dbo:wikiPageDisambiguates
dbr:User_activity_monitoring
Subject Item
dbr:User_Activity_Monitoring
dbo:wikiPageWikiLink
dbr:User_activity_monitoring
dbo:wikiPageRedirects
dbr:User_activity_monitoring
Subject Item
wikipedia-en:User_activity_monitoring
foaf:primaryTopic
dbr:User_activity_monitoring