{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:24:37Z","timestamp":1773084277499,"version":"3.50.1"},"reference-count":12,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4,1]]},"abstract":"<p>Business Intelligence (BI) has often been described as the tools and systems that play an essential role in the strategic planning process of a corporation. The application of BI is most commonly associated with the analysis of sales and stock trends, pricing and customer behavior to inform business decision-making. There is a growing trend in utilizing the tools and processes used in the analysis of data and applying them to security event management. Security Information and Event Management (SIEM) has emerged within the last 10 years providing a centralized source to enable both real-time and deep level analysis of historical event data to drive security standards and align IT resources in a more efficient manner.<\/p>","DOI":"10.4018\/jbir.2011040105","type":"journal-article","created":{"date-parts":[[2011,10,19]],"date-time":"2011-10-19T16:06:34Z","timestamp":1319040394000},"page":"67-75","source":"Crossref","is-referenced-by-count":2,"title":["Mitigating Risk"],"prefix":"10.4018","volume":"2","author":[{"given":"Ken","family":"Lozito","sequence":"first","affiliation":[{"name":"GSK, USA"}]}],"member":"2432","reference":[{"key":"jbir.2011040105-0","unstructured":"Q1Labs. (2009a). A proactive approach to battling today's complex network threats. Retrieved from http:\/\/q1labs.com\/resource-center\/white-papers\/details.aspx?id=29"},{"key":"jbir.2011040105-1","unstructured":"Q1Labs. (2009b). The business case for a next-generation SIEM. Retrieved from http:\/\/q1labs.com\/resource-center\/white-papers\/details.aspx?id=27"},{"key":"jbir.2011040105-2","unstructured":"ArcSight. (2009). ArcSight enterprise view - monitoring enterprise-wide business risk. Retrieved from http:\/\/www.arcsight.com\/library\/download\/WPArcSightEnterpriseView\/"},{"key":"jbir.2011040105-3","author":"D.Borge","year":"2001","journal-title":"The book of risk"},{"key":"jbir.2011040105-4","unstructured":"Cheng, J. (2007). TJX consumer data theft largest in history.http:\/\/arstechnica.com\/business\/news\/2007\/03\/tjx-consumer-data-theft-largest-in-history.ars"},{"key":"jbir.2011040105-5","unstructured":"Gartner. (2010). Magic quadrant for security information and event management. Retrieved from http:\/\/www.gartner.com\/it\/products\/mq\/mq_ms.jsp-s"},{"key":"jbir.2011040105-6","unstructured":"Oltsik, J. (2009). Security management evolution.http:\/\/q1labs.com\/resource-center\/analyst-reports\/details.aspx?id=18"},{"key":"jbir.2011040105-7","unstructured":"SourceFire. (2009). Network awareness: Continuous network intelligence and network visibility. Retrieved from http:\/\/www.sourcefire.com\/products\/3D\/rna"},{"key":"jbir.2011040105-8","unstructured":"Symantec. (2007). W32. SillyFDC. Retrieved from http:\/\/www.symantec.com\/security_response\/writeup.jsp?docid=2006-071111-0646-99"},{"key":"jbir.2011040105-9","unstructured":"Symantec. (2010). Symantec Endpoint Protection 11.0.6 Advanced Workshop. Retrieved from http:\/\/www.symantec.com"},{"key":"jbir.2011040105-10","unstructured":"Wikipedia. (n. d.). Security event manager. Retrieved from http:\/\/en.wikipedia.org\/wiki\/Security_event_manager"},{"key":"jbir.2011040105-11","unstructured":"Wilson, T. (2009). Reports: Security pros shift attention from external hacks to internal threats. Retrieved from http:\/\/www.darkreading.com\/insiderthreat\/security\/vulnerabilities\/showArticle.jhtml?articleID=215801195"}],"container-title":["International Journal of Business Intelligence Research"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=53869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:01:44Z","timestamp":1654113704000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jbir.2011040105"}},"subtitle":["Analysis of Security Information and Event Management"],"short-title":[],"issued":{"date-parts":[[2011,4,1]]},"references-count":12,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jbir.2011040105","relation":{},"ISSN":["1947-3591","1947-3605"],"issn-type":[{"value":"1947-3591","type":"print"},{"value":"1947-3605","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4,1]]}}}