Abstract: In the case of remote work, once a user completes account authentication, they can continue to access confidential data without further verification of user identity. Thus, if a user’s ...