A Social Cyber Contract Theory Model for Understanding National Cyber Strategies

Conference Paper (2017)
Author(s)

R.H. Bierens (TU Delft - Information and Communication Technology)

A.J. Klievink (TU Delft - Organisation & Governance)

J. van den Berg (TU Delft - Cyber Security, TU Delft - Information and Communication Technology)

Research Group
Organisation & Governance
Copyright
© 2017 R.H. Bierens, A.J. Klievink, Jan van den Berg
DOI related publication
https://doi.org/10.1007/978-3-319-64677-0_14
More Info
expand_more
Publication Year
2017
Language
English
Copyright
© 2017 R.H. Bierens, A.J. Klievink, Jan van den Berg
Research Group
Organisation & Governance
Pages (from-to)
166-176
ISBN (print)
978-3-319-64676-3
ISBN (electronic)
978-3-319-64677-0
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Today’s increasing connectivity creates cyber risks at personal, organizational up to societal level. Societal cyber risks require mitigation by all kinds of actors where government should take the lead due to its responsibility to protect its citizens. Since no formal global governance exists, the governmental responsibility should start at the national level of every country. To achieve successful management of global cyber risks, appropriate alignment between these sovereignly developed strategies is required, which concerns a complex challenge. To create alignment, getting insight into differences between national cyber strategies, is the first step. This, in turn, requires an appropriate analysis approach that helps to identify the key differences. In this article, we introduce such an analysis approach based on social contract theory. The resulting analysis model consists of both a direct and an indirect type of social cyber contract between governments, citizens and corporations, within and between sovereign nations. To show its effectiveness, the proposed social cyber contract model is validated through an illustrated case examining various constitutional rights to privacy, their embedding in the national cyber strategies and how their differences could cause potential barriers for alignment across sovereignties.

Files

License info not available