Visible to the public Human Factors in Webserver Log File Analysis: A Controlled Experiment on Investigating Malicious Activity