4 research outputs found

    LINEAR REGRESSION FOR PREDICTION OF EXCESSIVE PERMISSIONS DATABASE ACCOUNT TRAFFIC

    Get PDF
    Today, the security of information and data is an important asset for everyone in protecting data. Data and information become critical when weaknesses and threats come. In this study, an estimation of the observed variables will be carried out. The application of data mining, especially with the estimation method by using linear regression techniques. The next stage is data preparation by referring to the dataset recorded in the user activity log. Data preparation takes a lot of time because you have to make sure the data fits the needs of data mining analysis. The analysis technique with linear regression involves three independent variables as Type Permissions, Type of User Account, Status, and the dependent variable, namely User Actions. The strongest effect was found in type_permissions and state when together on user_actions. The type_permissions variable keeps increasing when the state on the user is active. The status attribute also suffers from the same condition. Accrording to the results, our findings in root mean squared error is 37.614 and absolute error is 31.058, and mean absolute percentage about 23%. Furthermore, User_action as an estimated variable gives two data opportunities whether it is allowed or not. Therefore, in future research, it is necessary to map users of the database system still in the context of data mining when digging for information on excessive permissions

    Factors Determining the Perceived Security Dimensions in B2C Electronic Commerce Website Usage: An Indonesian Study

    Get PDF
    Research aims: This study aims to analyze the perceived security dimensions and build a research model using perceived ease of use and perceived usefulness as variables mediating the link between perceived security and the intention to use Indonesia's B2C e-commerce websites. Design/Methodology/Approach: Using a purposive sampling approach, this study conducted an online survey of respondents who had done online transactions, such as business-to-customer (B2C) transactions. Research Findings: The study's results showed that perceived security significantly correlated with buyers' intention to use B2C websites. Theoretical contribution/Originality: This study contributes to developing and validating key dimensions of perceived security and their constructs. Mediation effect test results from TAM, which were perceived ease and perceived use, indicated that only the perceived usefulness variable significantly mediated the relationship between perceived security and intention to use B2C e-commerce websites. Perceived use's mediation was not supported. Practitioner/Policy implication: This research empirically supports the perceived security construct as a second-order construct involving confidentiality, availability, non-repudiation, and privacy. Research limitation/Implication: This study used data from Indonesian individuals, which may differ from other countries' characteristics. It may limit the research' finding generalization. Research aims: This study aims to analyze the perceived security dimensions and build a research model using perceived ease of use and perceived usefulness as variables mediating the link between perceived security and the intention to use Indonesia's B2C e-commerce websites.Design/Methodology/Approach: Using a purposive sampling approach, this study conducted an online survey of respondents who had done online transactions, such as business-to-customer (B2C) transactions.Research Findings: The study's results showed that perceived security significantly correlated with buyers' intention to use B2C websites.Theoretical contribution/Originality: This study contributes to developing and validating key dimensions of perceived security and their constructs. Mediation effect test results from TAM, which were perceived ease and perceived use, indicated that only the perceived usefulness variable significantly mediated the relationship between perceived security and intention to use B2C e-commerce websites. Perceived use's mediation was not supported.Practitioner/Policy implication: This research empirically supports the perceived security construct as a second-order construct involving confidentiality, availability, non-repudiation, and privacy.Research limitation/Implication: This study used data from Indonesian individuals, which may differ from other countries' characteristics. It may limit the research' finding generalization

    A Unified Model for Security and Integrity in Relational Databases*

    No full text

    IOS Press A UNIFIED MODEL FOR SECURITY AND INTEGRITY IN RELATIONAL DATABASES*

    No full text
    The issues of database security and integrity are tightly related. Security mecha-nisms and integrity mechanisms are both concerned with protection of information, and both involve management of meta-information and procedures for screening transactions. Yet in database systems these tasks are entirely separate. In this paper we describe a unified model that accommodates both security and integrity, with all protective restrictions stated in terms of database views. These protective restrictions are treated as knowledge, from which transaction screening procedures infer the restrictions that apply to individual transactions. A transaction may be allowed or denied in its entirety, or specific non-violating subtransactions may be identified. This process is an application of the view inference problem, to which we offer two alternative solutions. We then show how users can exploit information made available by the integrity mechanism to bypass the security mechanism, and discuss how such security breaches can be avoided. Finally, we show how the model can accommodate a broader concept of integrity that was introduced recently. 1
    corecore