| http://www.w3.org/ns/prov#value | - According to Ciocchetti (2011, p. 315) ???keystroke logging is generally done in secret to obtain more accurate results.??? In a healthcare setting, I could imagine this being used as an investigative tool if someone is suspected of committing fraud or other illegal activities.
|