Exemplary embodiments of the present invention include a method for
administering devices in a network. The method includes creating a user
metric vector comprising a plurality of disparate user metrics, creating
a user metric space comprising a plurality of metric ranges and
determining whether the user metric vector is outside the user metric
space. If the user metric vector is outside a user metric space,
identifying an action in dependence upon the user metric vector the
method includes determining whether the action is allowed. If the action
is allowed, the method includes executing the action. Many embodiments
include receiving an allowed action list, such as for example, receiving
an allowed action list from a moderator DML.