Abstract
Even with the strongest technology safeguards in place, in many cases IT administrators still have only a limited amount of control over what their users do over the Internet. They'll go to unknown Web sites, open e-mail and attachments that might contain dangerous content, and sometimes even upload files or data into Webmail or blogs. They'll download unauthorized digital music. Mobile users might turn off their firewalls or antivirus software in order to connect from the field.