<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>03030nam a22001697a 4500</leader>
  <controlfield tag="003">NUST</controlfield>
  <datafield tag="082" ind1=" " ind2=" ">
    <subfield code="a">005.1,NAS</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="a">Naseer, Ayesha</subfield>
    <subfield code="9">124481</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">The Impact of Business Analytics in Information Security Risk Management /</subfield>
    <subfield code="c">Ayesha Naseer</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Rawalpindi,</subfield>
    <subfield code="b">MCS (NUST),</subfield>
    <subfield code="c">2023</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">ix, 83 p</subfield>
  </datafield>
  <datafield tag="505" ind1=" " ind2=" ">
    <subfield code="a">The organizations protect information resources and maintain competitive advantage by using risk driven and controlled centered security management systems. These systems are very useful in the prevention of threats that exploit common vulnerabilities. To react against attacks that are volatile, developing and complex for example Advanced Persistent Threats, they are not very effective. These dynamic and complex threats require a timely, agile, and sophisticated response capability to gather, integrate and analyze data to perform operational and strategic security operations. The modern organizations use Real Time Analytics as unique Business Analytics Capability that help them in gathering, combining, and analyzing business incidents efficiently. The capability of Real Time analytics to response important business information has achieved a lot of consideration in the existing literature. However, inadequate research has been done on how enterprises enhance agility in Incident Response process.
That research presents the research gap as mentioned above by exploring the research question: How does use of real-time analytics in the incident response process improve enterprise cybersecurity performance? To better understand how enterprises utilize real time analytics capabilities to infuse agile characteristics in their incident response process, this research gathered qualitative data from twenty experts&#x2019; interviews and used data comparison process that employs simultaneous exploration and analysis. The results informed a theoretical framework that enlightens how organizations enable agile features of swiftness, innovation, and flexibility in incident response process using salient characteristics of Real-time analytics such as complex event processing, decision automation, and continuous and on-demand data analysis.
The incident response dynamic strategies collectively real-time analytics capabilities with help enterprises to identify and respond to cyber security incidents as-they-occur, which in turn, improve the overall organization security performance and gives both economic and strategic advantages.
The descriptions related to the proposed theoretical framework make contribution in the existin literature of business analytics, agility in business operations and incident response strategies. The findings of this study give a valuable guidance for future research on how agile characteristics are enhanced and developed in the incident response process.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
    <subfield code="a">PhD Computer Software Engineering Thesis</subfield>
    <subfield code="9">132801</subfield>
  </datafield>
  <datafield tag="651" ind1=" " ind2=" ">
    <subfield code="a">PhD CSE Thesis</subfield>
    <subfield code="9">132802</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="a">Supervised by Dr. Adil Masood Siddiqui</subfield>
    <subfield code="9">132783</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="2">ddc</subfield>
    <subfield code="c">THE</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">615948</subfield>
    <subfield code="d">615948</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="a">MCS</subfield>
    <subfield code="b">MCS</subfield>
    <subfield code="c">THE</subfield>
    <subfield code="d">2026-01-27</subfield>
    <subfield code="l">0</subfield>
    <subfield code="o">005.1,NAS</subfield>
    <subfield code="p">MCSPhD CSE-17</subfield>
    <subfield code="r">2026-01-27</subfield>
    <subfield code="w">2026-01-27</subfield>
    <subfield code="y">THE</subfield>
    <subfield code="z">Almirah No.68, Shelf No.5</subfield>
  </datafield>
</record>
