Inferences that can be made are dependent on data
available
Log-in patterns
Computer commands
Document access
Integration with the system:
Mapping abstract user behavior to system usage
difficult
No one technique can predict all user behavior
Need not be 100% accurate
Minimise impact of incorrect inferences
Must adapt to developing user
Intrusion issue:
Users should be able to control UM functionality
Continuous questioning not desirable