we should consider other methods to evalaute
the internal and external landscape such as
SWOT and PESTEL approaches. Also, eight
of the
experts clearly confirmed that the
financial resources and how to obtain the
funding are missing in the NCCBF. Moreover,
nine experts confirmed that cooperation in case
of instability and during crises is missing and
we have to create coordinated mechanisms
with regional and international partners.
All experts mentioned that some activities
should be added to the framework such as,
Performance measurements,
auditing
mechanisms to be added to legal capacity
building.
Moreover, all of participants stated to use the
NCS as function not as a mechanism and swap
it with “Establish a National Council”. Another
interesting point is that all of the participants
stressed that the national council should
include the advisory committee and counter-
terrorism committee.
Ten experts from thirteen , agreed that this
farmework is “useful and acceptable”. Two of
them said that, they liked how the capacity
building in educations and private sectors has
been defined and developed.
All of the participants acknowledged that the
framework is inclusive, coherent,multi-
dimensional and risk based.Four of them
commented that in their opinion this
framework is inclusive, coherent, multi-
dimensional and risk-based because it is based
on a well know and internationally acceptable
model (CCMM).
6 CONCLUSION AND
FUTUREWORK
In this paper, a National Cybersecurity Capacity
Building Framework (NCCBF) is proposed to
enable countries in a state of transition to transform
their current cybersecurity posture by applying
activities that reflect desired outcomes. The NCCBF
provides the means to better understanding how
NCCB can be defined and developed.
The future
work will invovle refinement to the components of
the framework such as using performance
measurement techniques to monitor the performace.
In addition, the Enterprise Architecture components;
a framework, a method, and a language (modelling)
(Iacob et al., 2012) will be used used in the proposed
CCB framework. The framework will be validted
after the enhancement using international
cybersecurity indexes that measure the NCB. In
addition, logical operators will be used for parallel
execution of functions and output templates to
improve the IDEF0 models.
REFERENCES
Atoum, I., Otoom, A., & Ali, A. A. (2014). A holistic
cyber security implementation framework.
Information Management & Computer Security.
Azmi, R., Tibben, W., & Win, K. T. (2018). Review of
cybersecurity frameworks: context and shared
concepts. Journal of Cyber Policy, 3(2), 258-283.
Bellasio, J., Flint, R., Ryan, N., Sondergaard, S.,
Monsalve, C. G., Meranto, A. S., & Knack, A. (2018).
Developing Cybersecurity Capacity: A proof-of-
concept implementation guide.
Cheng-Leong, A., Li Pheng, K., & Keng Leng, G. R.
(1999). IDEF*: a comprehensive modelling
methodology for the development of manufacturing
enterprise systems. International Journal of
Production Research, 37(17), 3839-3858.
Ciglic, K. (2018). Cybersecurity Policy Framework A
practical guide to the development of national
cybersecurity policy. Retrieved from https://www.
microsoft.com/en-us/cybersecurity/content-hub/cyber
security-policy-framework
CTO. (2015). Commonwealth Approach for Developing
National Cybersecurity Strategies: A Guide to
Creating a Cohesive and Inclusive Approach to
Delivering a Safe, Secure and Resilient Cyberspace:
Commonwealth Telecommunications Organisation
(CTO) London, UK.
DeRouen, K., & Goldfinch, S. (2012). What Makes a State
Stable and Peaceful? Good Governance, Legitimacy
and Legal-Rationality Matter Even More for Low-
Income Countries. Civil Wars, 14(4), 499-520.
doi:10.1080/13698249.2012.740201
Donaldson, S. E., Siegel, S. G., Williams, C. K., & Aslam,
A. (2015). Cybersecurity frameworks Enterprise
Cybersecurity (pp. 297-309): Springer.
ENISA. (2016). NCSS Good Practice Guide,Designing
and Implementing National Cyber Security Strategies.
Retrieved from https://www.enisa.europa.eu/
publications/ncss-good-practice-guide.
Garlock, K. (2018). Maturity Based Cybersecurity
Investment Decision Making in Developing Nations.
The George Washington University.
GCSCC. (2017). Cybersecurity Capacity Maturity
Model for Nations (CMM) Retrieved from
https://www.sbs.ox.ac.uk/cybersecurity-
capacity/system/files/CMM%20Version%201_2_0.pdf
Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004).
Design science in information systems research. MIS
quarterly, 75-105.