After an intensive investigation you found out that some users were abusing their privileges.  You decide to implement a solution in which users are audited when create any database object.  Using Oracle, outline the necessary steps to accomplish this task.