IDEAS home Printed from https://ideas.repec.org/a/bit/bsrysr/v8y2017i1p51-59n5.html
   My bibliography  Save this article

Data Mining Usage in Corporate Information Security: Intrusion Detection Applications

Author

Listed:
  • Al Quhtani Masoud

    (Embassy of the Kingdom of Saudi Arabia in Bosnia and Herzegovina, Sarajevo, Bosnia and Herzegovina)

Abstract

Background: The globalization era has brought with it the development of high technology, and therefore new methods of preserving and storing data. New data storing techniques ensure data are stored for longer periods of time, more efficiently and with a higher quality, but also with a higher data abuse risk. Objective: The goal of the paper is to provide a review of the data mining applications for the purpose of corporate information security, and intrusion detection in particular. Methods/approach: The review was conducted using the systematic analysis of the previously published papers on the usage of data mining in the field of corporate information security. Results: This paper demonstrates that the use of data mining applications is extremely useful and has a great importance for establishing corporate information security. Data mining applications are directly related to issues of intrusion detection and privacy protection. Conclusions: The most important fact that can be specified based on this study is that corporations can establish a sustainable and efficient data mining system that will ensure privacy and successful protection against unwanted intrusions.

Suggested Citation

  • Al Quhtani Masoud, 2017. "Data Mining Usage in Corporate Information Security: Intrusion Detection Applications," Business Systems Research, Sciendo, vol. 8(1), pages 51-59, March.
  • Handle: RePEc:bit:bsrysr:v:8:y:2017:i:1:p:51-59:n:5
    DOI: 10.1515/bsrj-2017-0005
    as

    Download full text from publisher

    File URL: https://doi.org/10.1515/bsrj-2017-0005
    Download Restriction: no

    File URL: https://libkey.io/10.1515/bsrj-2017-0005?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Willison , Robert, 2006. "Understanding the Perpetration of Employee Computer Crime in the Organisational Context," Working Papers 2006-4, Copenhagen Business School, Department of Informatics.
    2. B Baesens & C Mues & D Martens & J Vanthienen, 2009. "50 years of data mining and OR: upcoming trends and challenges," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 60(1), pages 16-23, May.
    3. Stoel, M. Dale & Muhanna, Waleed A., 2011. "IT internal control weaknesses and firm performance: An organizational liability lens," International Journal of Accounting Information Systems, Elsevier, vol. 12(4), pages 280-304.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Kenda Klemen & Mladenić Dunja, 2018. "Autonomous Sensor Data Cleaning in Stream Mining Setting," Business Systems Research, Sciendo, vol. 9(2), pages 69-79, July.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Wei Yu & Huiqin Huang & Xinyan Kong & Keying Zhu, 2023. "Can Digital Inclusive Finance Improve the Financial Performance of SMEs?," Sustainability, MDPI, vol. 15(3), pages 1-16, January.
    2. Hyunjung Nam & Won Gyun No & Youngsu Lee, 2017. "Are Commercial Financial Databases Reliable? New Evidence from Korea," Sustainability, MDPI, vol. 9(8), pages 1-23, August.
    3. Amitava Dutta & Rahul Roy, 2008. "Dynamics of organizational information security," System Dynamics Review, System Dynamics Society, vol. 24(3), pages 349-375, September.
    4. Mengmeng Song & Joseph Ugrin & Man Li & Jinnan Wu & Shanshan Guo & Wenpei Zhang, 2021. "Do Deterrence Mechanisms Reduce Cyberloafing When It Is an Observed Workplace Norm? A Moderated Mediation Model," IJERPH, MDPI, vol. 18(13), pages 1-16, June.
    5. Dejaeger, Karel & Goethals, Frank & Giangreco, Antonio & Mola, Lapo & Baesens, Bart, 2012. "Gaining insight into student satisfaction using comprehensible data mining techniques," European Journal of Operational Research, Elsevier, vol. 218(2), pages 548-562.
    6. Daniel Gartner & Yiye Zhang & Rema Padman, 2018. "Cognitive workload reduction in hospital information systems," Health Care Management Science, Springer, vol. 21(2), pages 224-243, June.
    7. Sungchang Kang & Jeongseok Bang & Doojin Ryu, 2024. "Female CEOs’ risk management and earnings performance during the financial crisis," Asian Business & Management, Palgrave Macmillan, vol. 23(1), pages 110-138, February.
    8. J. D’Haen & D. Van Den Poel & D. Thorleuchter, 2012. "Predicting Customer Profitability During Acquisition: Finding the Optimal Combination of Data Source and Data Mining Technique," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/818, Ghent University, Faculty of Economics and Business Administration.
    9. Saridakis, Charalampos & Katsikeas, Constantine S. & Angelidou, Sofia & Oikonomidou, Maria & Pratikakis, Polyvios, 2023. "Mining Twitter lists to extract brand-related associative information for celebrity endorsement," European Journal of Operational Research, Elsevier, vol. 311(1), pages 316-332.
    10. Park, Sangchul, 2019. "Why information security law has been ineffective in addressing security vulnerabilities: Evidence from California data breach notifications and relevant court and government records," International Review of Law and Economics, Elsevier, vol. 58(C), pages 132-145.
    11. Mounia Boulhaga & Abdelfettah Bouri & Ahmed A. Elamer & Bassam A. Ibrahim, 2023. "Environmental, social and governance ratings and firm performance: The moderating role of internal control quality," Corporate Social Responsibility and Environmental Management, John Wiley & Sons, vol. 30(1), pages 134-145, January.
    12. Li, Zhe & Wang, Bo & Wu, Tianlong & Zhou, Dan, 2021. "The influence of qualified foreign institutional investors on internal control quality: Evidence from China," International Review of Financial Analysis, Elsevier, vol. 78(C).
    13. Choi, Dongjoon & Lee, Hansol & Lee, Ho-Young & Park, Hyun-Young, 2021. "The association between human resource investment in IT controls over financial reporting and investment efficiency," International Journal of Accounting Information Systems, Elsevier, vol. 43(C).
    14. Wang, Soyoung, 2021. "How will users respond to the adversarial noise that prevents the generation of deepfakes?," 23rd ITS Biennial Conference, Online Conference / Gothenburg 2021. Digital societies and industrial transformations: Policies, markets, and technologies in a post-Covid world 238060, International Telecommunications Society (ITS).
    15. Qian Tang & Andrew B. Whinston, 2020. "Do Reputational Sanctions Deter Negligence in Information Security Management? A Field Quasi‐Experiment," Production and Operations Management, Production and Operations Management Society, vol. 29(2), pages 410-427, February.
    16. Ali, Irfan, 2016. "The impact of ERP implementation on the financial performance of the firm : An empirical study," Other publications TiSEM 876506f5-1aed-4421-aa2c-0, Tilburg University, School of Economics and Management.
    17. Benaroch, Michel & Chernobai, Anna & Goldstein, James, 2012. "An internal control perspective on the market value consequences of IT operational risk events," International Journal of Accounting Information Systems, Elsevier, vol. 13(4), pages 357-381.
    18. Vlačić, Božidar & Corbo, Leonardo & Costa e Silva, Susana & Dabić, Marina, 2021. "The evolving role of artificial intelligence in marketing: A review and research agenda," Journal of Business Research, Elsevier, vol. 128(C), pages 187-203.
    19. Wei Yu & Huiqin Huang & Keying Zhu, 2023. "Enhancing Construction Enterprise Financial Performance through Digital Inclusive Finance: An Insight into Supply Chain Finance," Sustainability, MDPI, vol. 15(13), pages 1-16, June.
    20. J. D’Haen & D. Van Den Poel, 2013. "Model-supported business-to-business prospect prediction based on an iterative customer acquisition framework," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 13/863, Ghent University, Faculty of Economics and Business Administration.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bit:bsrysr:v:8:y:2017:i:1:p:51-59:n:5. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Peter Golla (email available below). General contact details of provider: https://www.sciendo.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.