A method of detecting fraud and/or unauthorized database access and
enhancing the efficiency of a data warehouse system by utilizing a usage
profile of a user. The user profiles are generated from usage patterns,
and the user profile is preferably utilized to both enforce security
policies through detection of breaches and to improve user friendliness
via customized portals that are constructed from the profiles.