%0 Conference Proceedings %T A Social Cyber Contract Theory Model for Understanding National Cyber Strategies %+ Delft University of Technology (TU Delft) %A Bierens, Raymond %A Klievink, Bram %A Berg, Jan, van Den %Z Part 3: Organizational Aspects %< avec comité de lecture %( Lecture Notes in Computer Science %B 16th International Conference on Electronic Government (EGOV) %C St. Petersburg, Russia %Y Marijn Janssen %Y Karin Axelsson %Y Olivier Glassey %Y Bram Klievink %Y Robert Krimmer %Y Ida Lindgren %Y Peter Parycek %Y Hans J. Scholl %Y Dmitrii Trutnev %I Springer International Publishing %3 Electronic Government %V LNCS-10428 %P 166-176 %8 2017-09-04 %D 2017 %R 10.1007/978-3-319-64677-0_14 %K National cyber strategy %K Social contract %K Privacy %K Cyber security %K National security %K Cyber risk %Z Computer Science [cs] %Z Humanities and Social Sciences/Library and information sciencesConference papers %X Today’s increasing connectivity creates cyber risks at personal, organizational up to societal level. Societal cyber risks require mitigation by all kinds of actors where government should take the lead due to its responsibility to protect its citizens. Since no formal global governance exists, the governmental responsibility should start at the national level of every country. To achieve successful management of global cyber risks, appropriate alignment between these sovereignly developed strategies is required, which concerns a complex challenge. To create alignment, getting insight into differences between national cyber strategies, is the first step. This, in turn, requires an appropriate analysis approach that helps to identify the key differences. In this article, we introduce such an analysis approach based on social contract theory. The resulting analysis model consists of both a direct and an indirect type of social cyber contract between governments, citizens and corporations, within and between sovereign nations. To show its effectiveness, the proposed social cyber contract model is validated through an illustrated case examining various constitutional rights to privacy, their embedding in the national cyber strategies and how their differences could cause potential barriers for alignment across sovereignties. %G English %Z TC 8 %Z WG 8.5 %2 https://inria.hal.science/hal-01702970/document %2 https://inria.hal.science/hal-01702970/file/453552_1_En_14_Chapter.pdf %L hal-01702970 %U https://inria.hal.science/hal-01702970 %~ SHS %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC8 %~ IFIP-EGOV %~ IFIP-WG8-5 %~ IFIP-LNCS-10428