Empirical Study of the Application of Business Intelligence (BI) in Cybersecurity Within Ecuador: A Trend Away from Reality

  • H. Andrea Vaca
  • Rolando P. Reyes Ch.
  • Hugo Pérez Vaca
  • Manolo Paredes
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 94)

Abstract

Business Intelligence (BI) over the years, has achieved a strong impact within the business world, especially when it comes to gaining knowledge for making strategic decisions. This impact has been successfully in other contexts. However, only exist some examples in Latinamerica (Costa Rica), have started to use BI for the Cybersecurity context, being a strange when several authors have considered this relationship as a global trend. Our objective is to investigate if this trend is happening in Ecuador. For which, we propose to carry out a survey to professionals in the industry and professors in the academy. The results obtained show that the majority of Ecuadorian companies, use BI only to improve their competitiveness, but without considering cybersecurity context, despite being aware of the high risk. The industry, academia and country must enter a stage of reflection of the application of BI in Cybersecurity.

Keywords

Business intelligence BI Cybersecurity Survey Trend 

References

  1. 1.
    Perspectiva, R.: Las nuevas tendencias de la inteligencia de negocios. [online] IDE Perspectiva (2018)Google Scholar
  2. 2.
    Barrento, M., Neto, M., Maria, M., Dias, S.: Sistemas de Business Intelligence Aplicados à Saúde (2010)Google Scholar
  3. 3.
    Mondrag, G., Guzm, C.A., Mart, L.: Revisión Sistemática de Literatura: Visualización de Seguridad (n.d.)Google Scholar
  4. 4.
    Calzada, L., Abreu, J.L.: El impacto de las herramientas de inteligencia de negocios en la toma de decisiones de los ejecutivos. Int. J. Good Consience 4(2), 16–52 (2009)Google Scholar
  5. 5.
    Cano, J.L.: Business Intelligence: Competir Con Información, p. 397. Banesto, Fundación Cultural (2007)Google Scholar
  6. 6.
    Riquelme, J.C., Ruiz, R., Gilbert, K.: Minería de datos: Conceptos y tendencias. Inteligencia Artificial 10(29), 11–18 (2006)Google Scholar
  7. 7.
    Pérez Jiménez, S.: Minería de procesos (2015)Google Scholar
  8. 8.
    ISACA: Cybersecurity Fundamentals Glossary (2014)Google Scholar
  9. 9.
    Jiménez, L., Hernandez, S., Mendez, J.: Enfoque Sociotécnico Aplicado a un Sistema de Gestión Business Intelligence (n.d.)Google Scholar
  10. 10.
    Arias, R., Leiva, C.: Representación visual de patrones de ataque en ciberseguridad (n.d.)Google Scholar
  11. 11.
    Laudon, S.: Sistemas Informacion (1999)Google Scholar
  12. 12.
    Ekos Revista, La inteligencia en el negocio (2016). http://www.ekosnegocios.com/negocios/. Accessed 18 Jan 2018
  13. 13.
    Vargas, R., Recalde, L., Reyes, R.: Ciberseguridad. Ciberdefensa Y Ciberseguridad, Más Allá Del Mundo Virtual: Modelo Ecuatoriano de Gobernanza En Ciberdefensa 20 (2017)Google Scholar
  14. 14.
    Universida Virtual del Tecnológico de Monterrey: Metodología para llevar a cabo una encuesta (2005)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • H. Andrea Vaca
    • 1
  • Rolando P. Reyes Ch.
    • 1
    • 2
  • Hugo Pérez Vaca
    • 1
    • 2
  • Manolo Paredes
    • 1
  1. 1.Universidad de las Fuerzas Armadas ESPESangolquíEcuador
  2. 2.Departamento de Seguridad y DefensaUniversidad de las Fuerzas Armadas ESPESangolquíEcuador

Personalised recommendations