<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>03261nam a22001697a 4500</leader>
  <controlfield tag="003">NUST</controlfield>
  <datafield tag="082" ind1=" " ind2=" ">
    <subfield code="a">005.8,ALI</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="a">Ali, Sardar Muhammad</subfield>
    <subfield code="9">132538</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Assessment of the Impact of the Global Cybersecurity Index (GCI) of the International Telecommunication Union (ITU) on Improving the Cybersecurity Posture of Developing Countries (A Pakistani Perspective) /</subfield>
    <subfield code="c">Sardar Muhammad Ali</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Rawalpindi,</subfield>
    <subfield code="b">MCS (NUST),</subfield>
    <subfield code="c">2025</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xviii, 203 p</subfield>
  </datafield>
  <datafield tag="505" ind1=" " ind2=" ">
    <subfield code="a">Cybersecurity has become a critical priority as organizations increasingly depend on digital infrastructure. Traditional compliance approaches often fall short in addressing evolving threats, highlighting the need for intelligent and adaptive mechanisms to strengthen governance and resilience. Organizations encounter persistent challenges in aligning with multiple international and national cybersecurity standards. Current com pliance efforts are fragmented, costly, and lack adaptability, limiting their effectiveness in improving overall posture. In addition, existing methods fail to provide systematic and explainable guidance, creating governance and resilience gaps in developing countries. The proposed study presents an automated, machine learning&#x2013;based recom mender framework that systematically suggests cybersecurity standards, audits, and compliance steps according to organizational maturity levels. The framework integrates six global standards (ISO/IEC 27001:2022, CIS, NIST, SCAP, NERC CIP, ISA/IEC 62443-4-2) and Three national cybersecurity standards were adopted for comparative analysis: Saudi Arabia follows the National Cybersecurity Authority (NCA) under the Essential Cybersecurity Controls (ECC) framework; Pakistan implements the National Cyber Security Policy (NCSP 2021) and Critical Telecom Data and Infrastructure Security Regulations (CTDISR) frameworks; while the United Arab Emirates (UAE) applies the Information Assurance (IA) framework under the National Cybersecurity Strategy (NCS). The proposed framework applies data preprocessing, TF-IDF, Recursive Feature Elimination (RFE), and a Content-Based Filtering (CBF) model with a feedback xvii loop to generate tailored compliance recommendations. The proposed framework was validated across three organizational maturity scenariosAd-hoc, Managed, and Adaptive. Findings indicated that the UAE standard recommended 158 controls at the Ad-hoc level, while the KSA standard dominated at the Managed level. Among the classifiers tested (Random Forest, K-Nearest Neighbor, and Support Vector Machine), Random Forest achieved the best performance with 81% accuracy and an ROC-AUC score of 0.98. The proposed framework provides a scalable and adaptive mechanism for compliance, enabling continuous monitoring of organizational maturity and alignment with international standards. By enhancing governance and resilience, it supports national cybersecurity capacity and contributes to improving Global Cybersecurity Index (GCI) rankings, offering both theoretical advancement and practical value for developing countries.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
    <subfield code="a">PhD Information Security Thesis</subfield>
    <subfield code="9">132793</subfield>
  </datafield>
  <datafield tag="651" ind1=" " ind2=" ">
    <subfield code="a">PhD IS Thesis</subfield>
    <subfield code="9">132794</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="a">Supervised by Dr. Abdul Razzaq</subfield>
    <subfield code="9">132799</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="2">ddc</subfield>
    <subfield code="c">THE</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">615841</subfield>
    <subfield code="d">615841</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="a">MCS</subfield>
    <subfield code="b">MCS</subfield>
    <subfield code="c">THE</subfield>
    <subfield code="d">2026-01-17</subfield>
    <subfield code="l">0</subfield>
    <subfield code="o">005.8,ALI</subfield>
    <subfield code="p">MCSPhD IS-16</subfield>
    <subfield code="r">2026-01-17</subfield>
    <subfield code="w">2026-01-17</subfield>
    <subfield code="y">THE</subfield>
    <subfield code="z">Almirah No.68, Shelf No.5</subfield>
  </datafield>
</record>
