Techniques for effective systems and methods for monitoring data access activity are generally described. In some examples, the method may include receiving, by the processor, the object concept. A processor may identify, in an ontology, a set of concepts that may include at least one related concept associated with a concept of interest and a concept of interest. The processor can use the set of concepts to create a planned path that can define a first data access order associated with access to at least one of a destination concept and a related concept. The processor may create a browsing path that may define a second data access order associated with the data access activity. The processor can compare the planned path to the browsing path. The processor may determine the deviation based on a comparison of the planned path and the browsing path. The processor can use the deviation to monitor data access activity.
展开▼