we  should  consider  other  methods  to  evalaute 
the  internal  and  external  landscape  such  as 
SWOT  and  PESTEL  approaches.  Also,  eight
 
of  the 
experts  clearly  confirmed  that  the 
financial  resources    and  how  to  obtain  the 
funding are missing in the NCCBF. Moreover, 
nine experts confirmed that cooperation in case 
of  instability  and  during  crises  is  missing  and 
we  have  to  create  coordinated  mechanisms 
with regional and international partners.  
  All  experts  mentioned  that  some  activities 
should  be  added  to  the  framework  such  as, 
Performance  measurements,
  auditing 
mechanisms  to  be  added  to  legal  capacity 
building. 
  Moreover,  all  of  participants  stated  to  use  the 
NCS  as function not as a mechanism and swap 
it with “Establish a National Council”. Another 
interesting  point  is  that  all  of  the  participants 
stressed  that  the  national  council  should 
include  the  advisory  committee  and  counter-
terrorism committee.  
  Ten  experts  from  thirteen  ,  agreed  that  this 
farmework is “useful and  acceptable”. Two of 
them  said  that,  they  liked    how  the  capacity 
building  in  educations  and  private  sectors  has 
been defined and developed. 
  All  of  the  participants  acknowledged  that  the 
framework  is  inclusive,  coherent,multi-
dimensional  and  risk  based.Four  of  them 
commented  that  in  their  opinion  this 
framework  is  inclusive,  coherent,  multi-
dimensional and risk-based because it is based 
on  a  well  know  and  internationally  acceptable 
model (CCMM). 
6  CONCLUSION AND 
FUTUREWORK 
In  this  paper,  a  National  Cybersecurity  Capacity 
Building  Framework  (NCCBF)  is  proposed  to 
enable countries in a state of transition to transform 
their  current  cybersecurity  posture  by  applying 
activities that reflect desired outcomes. The NCCBF 
provides  the  means  to  better  understanding  how 
NCCB  can  be  defined  and  developed.
 The  future 
work  will  invovle  refinement  to  the  components of 
the  framework  such  as  using  performance 
measurement techniques to monitor the performace. 
In addition, the Enterprise Architecture components; 
a framework, a method, and a language (modelling) 
(Iacob et al., 2012) will be used used in the proposed 
CCB  framework.  The  framework  will  be  validted 
after  the  enhancement  using  international 
cybersecurity  indexes  that  measure  the  NCB.  In 
addition,  logical  operators  will  be  used  for  parallel 
execution  of  functions  and  output  templates  to 
improve the IDEF0 models. 
REFERENCES 
Atoum,  I.,  Otoom,  A.,  &  Ali,  A.  A.  (2014).  A  holistic 
cyber  security  implementation  framework. 
Information Management & Computer Security.  
Azmi,  R.,  Tibben,  W.,  &  Win,  K.  T.  (2018).  Review  of 
cybersecurity  frameworks:  context  and  shared 
concepts. Journal of Cyber Policy, 3(2), 258-283.  
Bellasio,  J.,  Flint,  R.,  Ryan,  N.,  Sondergaard,  S., 
Monsalve, C. G., Meranto, A. S., & Knack, A. (2018). 
Developing  Cybersecurity  Capacity:  A  proof-of-
concept implementation guide.  
Cheng-Leong,  A.,  Li  Pheng,  K.,  &  Keng  Leng,  G.  R. 
(1999).  IDEF*:  a  comprehensive  modelling 
methodology  for  the  development  of  manufacturing 
enterprise  systems.  International Journal of 
Production Research, 37(17), 3839-3858.  
Ciglic,  K.  (2018).  Cybersecurity Policy Framework A 
practical guide to the development of national 
cybersecurity policy.  Retrieved  from  https://www. 
microsoft.com/en-us/cybersecurity/content-hub/cyber 
security-policy-framework 
CTO.  (2015).  Commonwealth  Approach  for  Developing 
National  Cybersecurity  Strategies:  A  Guide  to 
Creating  a  Cohesive  and  Inclusive  Approach  to 
Delivering  a  Safe,  Secure  and  Resilient  Cyberspace: 
Commonwealth  Telecommunications  Organisation 
(CTO) London, UK. 
DeRouen, K., & Goldfinch, S. (2012). What Makes a State 
Stable  and  Peaceful?  Good  Governance,  Legitimacy 
and  Legal-Rationality  Matter  Even  More  for  Low-
Income  Countries.  Civil Wars, 14(4),  499-520. 
doi:10.1080/13698249.2012.740201 
Donaldson, S. E., Siegel, S. G., Williams, C. K., & Aslam, 
A.  (2015).  Cybersecurity  frameworks  Enterprise 
Cybersecurity (pp. 297-309): Springer. 
ENISA.  (2016).  NCSS Good Practice Guide,Designing 
and Implementing National Cyber Security Strategies.  
Retrieved  from  https://www.enisa.europa.eu/ 
publications/ncss-good-practice-guide. 
Garlock,  K.  (2018).  Maturity Based Cybersecurity 
Investment Decision Making in Developing Nations. 
The George Washington University.    
GCSCC.  (2017).  Cybersecurity  Capacity  Maturity  
Model  for  Nations  (CMM)  Retrieved  from 
https://www.sbs.ox.ac.uk/cybersecurity-
capacity/system/files/CMM%20Version%201_2_0.pdf  
Hevner, A. R.,  March,  S. T., Park,  J., & Ram,  S.  (2004). 
Design  science  in  information  systems  research.  MIS 
quarterly, 75-105.