Scott Shackelford

Indiana University - Kelley School of Business - Department of Business Law

Assistant Professor of Business Law and Ethics

Bloomington, IN 47405

United States

Harvard Kennedy School Belfer Center for Science & International Affairs

Research Fellow

79 JFK Street

Cambridge, MA 02138

United States

Center for Applied Cybersecurity Research

Senior Fellow

Wylie Hall 105

100 South Woodlawn

Bloomington, IN 47405

United States

Stanford Center for Internet and Society

Affiliate Scholar

Palo Alto, CA

United States

Stanford Law School

Visiting Scholar

Stanford, CA 94305

United States

SCHOLARLY PAPERS

51

DOWNLOADS
Rank 1,547

SSRN RANKINGS

Top 1,547

in Total Papers Downloads

16,732

CITATIONS

0

Scholarly Papers (51)

1.

From Nuclear War to Net War: Analogizing Cyber Attacks in International Law

Berkley Journal of International Law (BJIL), Vol. 25, No. 3, 2009
Number of pages: 60 Posted: 04 May 2009
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 1,165 (4,041)

Abstract:

Loading...

Cyber law, cyber attack, public international law, humanitarian law, human rights, nuclear war, law of the sea, outer space

2.

The Tragedy of the Common Heritage of Mankind

Stanford Environmental Law Journal, Vol. 27, 2008, Stanford Public Law Working Paper No. 1407332
Number of pages: 57 Posted: 25 May 2009 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 982 (12,401)

Abstract:

Loading...

public good, common resource, international law, common heritage, arctic, law of the sea, outer space

3.

Investment Treaty Arbitration and Public Law, by Gus Van Harten

Stanford Journal of International Law, Vol. 92, No. 1
Number of pages: 7 Posted: 19 May 2009
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 542 (29,705)

Abstract:

Loading...

investment treaty arbitration; international arbitration; public international law

4.

Estonia Two-and-A-Half Years Later: A Progress Report on Combating Cyber Attacks

Journal of Internet Law, Forthcoming
Number of pages: 12 Posted: 10 Feb 2010
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 451 (37,770)

Abstract:

Loading...

cyber attack, hacker, internet, cyberspace, internet law, NATO, international law

5.

Book Review of Habeas Corpus Writ of Liberty: English and American Origins and Development, by Robert Searles Walker, Ph.D

Cleveland State Law Review, Vol. 57, No. 3, 2009
Number of pages: 14 Posted: 30 Apr 2009 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 442 (50,293)

Abstract:

Loading...

habeas corpus, constitutional, comparative, england

6.

Toward a Global Cybersecurity Standard of Care? Exploring the Implications of the 2014 NIST Cybersecurity Framework on Shaping Reasonable National and International Cybersecurity Practices

Texas International Law Journal, 2015, Indiana Legal Studies Research Paper No. 291
Number of pages: 59 Posted: 07 Jun 2014 Last Revised: 15 Jul 2014
Scott Shackelford, Andrew A. Proia, Brenton Martell and Amanda Craig
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington - Center for Applied Cybersecurity Research, Indiana University Bloomington and Indiana University Maurer School of Law
Downloads 349 (38,210)

Abstract:

Loading...

cybersecurity, NIST, critical infrastructure

7.

Fragile Merchandise: A Comparative Analysis of the Privacy Rights for Public Figures

American Business Law Journal, 2012
Number of pages: 111 Posted: 05 May 2009 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 327 (66,442)

Abstract:

Loading...

Privacy, comparative law, public figure, media, first amendment

8.

Beyond the New 'Digital Divide': Analyzing the Evolving Role of National Governments in Internet Governance and Enhancing Cybersecurity

Stanford Journal of International Law, Vol. 50, p. 119, Winter 2014, Indiana Legal Studies Research Paper No. 290
Number of pages: 66 Posted: 07 Jun 2014 Last Revised: 15 Jul 2014
Scott Shackelford and Amanda Craig
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Maurer School of Law
Downloads 293 (28,663)

Abstract:

Loading...

9.

Neither Magic Bullet Nor Lost Cause: Land Titling and the Wealth of Nations

21 New York University Environmental Law Journal 272 (2014)
Number of pages: 72 Posted: 28 Apr 2009 Last Revised: 06 Apr 2015
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 272 (87,592)

Abstract:

Loading...

Property, property rights, rule of law, development

10.

Should Your Firm Invest in Cyber Risk Insurance?

Business Horizons, 2012
Number of pages: 20 Posted: 15 Dec 2011
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 265 (58,348)

Abstract:

Loading...

Cybersecurity, Internet, Cyber Risk Insurance, Cyber Attack, Data Breach, Cyber Law

11.

In the Name of Efficiency: The Role of Permanent Lok Adalats in the Indian Justice System and Power Infrastructure

Manoj Kumar Sinha, GLOBAL GOVERNANCE, DEVELOPMENT AND HUMAN RIGHTS, 2008
Number of pages: 49 Posted: 02 May 2009 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 261 (86,944)

Abstract:

Loading...

Arbitration, Alternative Dispute Resolution, India, Energy Policy, Infrastructure

12.

Toward Cyber Peace: Managing Cyber Attacks Through Polycentric Governance

American University Law Review, 2013
Number of pages: 75 Posted: 22 Aug 2012 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 187 (111,203)

Abstract:

Loading...

cybersecurity, cyber law, Internet governance, ICANN, IETF, ITU, polycentric

13.

Holding States Accountable for the Ultimate Human Rights Abuse: A Review of the International Court of Justice Bosnian Genocide Case

Human Rights Brief, Vol. 11, No. 3, p. 30, 2007
Number of pages: 14 Posted: 08 May 2009
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 183 (122,084)

Abstract:

Loading...

Genocide, international tribunal, international court, international criminal law, incitement to genocide

14.

Was Selden Right? The Expansion of Closed Seas and its Consequences

Stanford Journal of International Law, Vol. 47
Number of pages: 45 Posted: 02 Sep 2010 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 147 (138,666)

Abstract:

Loading...

EEZ, Continental Shelf, Common Heritage of Mankind, Grotius, Selden, Closed Seas, Open Seas, Arctic, Antarctica, Deep Seabed

15.

Governing the Final Frontier: A Polycentric Approach to Managing Space Weaponization and Orbital Debris

American Business Law Journal, Forthcoming
Number of pages: 60 Posted: 15 Dec 2011 Last Revised: 03 Jul 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 141 (138,666)

Abstract:

Loading...

Space Law, Orbital Debris, Space Junk, Space Weaponization, Polycentric, Common Heritage of Mankind, Sustainable Development

16.

Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis

American Business Law Journal, 2015
Number of pages: 63 Posted: 06 Mar 2015 Last Revised: 10 Mar 2015
Amanda Craig, Scott Shackelford and Janine S. Hiller
Indiana University Maurer School of Law, Indiana University - Kelley School of Business - Department of Business Law and Virginia Polytechnic Institute & State University
Downloads 129 (46,784)

Abstract:

Loading...

cybersecurity, active defense, hack back, international law, comparative law, polycentric governance

17.

Toward a State-Centric Cyber Peace? Analyzing the Role of National Cybersecurity Strategies in Enhancing Global Cybersecurity

New York University Journal of Legislation and Public Policy, 2016, Kelley School of Business Research Paper No. 15-4
Number of pages: 85 Posted: 29 Nov 2014 Last Revised: 12 May 2015
Scott Shackelford and Andraz Kastelic
Indiana University - Kelley School of Business - Department of Business Law and University of Sheffield - Law School
Downloads 128 (126,003)

Abstract:

Loading...

18.

Securing North American Critical Infrastructure: A Comparative Case Study in Cybersecurity Regulation

Canada-US Law Journal, 2015, Forthcoming, Kelley School of Business Research Paper No. 15-24
Number of pages: 12 Posted: 11 Mar 2015
Scott Shackelford and Zachery Bohm
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Bloomington - Center for Applied Cybersecurity Research
Downloads 127 (87,592)

Abstract:

Loading...

cybersecurity, north america, cyber attack, NIST Framework, Canada, United States

19.

Global Health Governance: International Law and Public Health in a Divided World, by Aginam, Obijiofor

Stanford Journal of International Law, Vol. 43, No. 1
Number of pages: 6 Posted: 19 May 2009
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 109 (190,418)

Abstract:

Loading...

international public health, public health, world health organization, disease

20.

Risky Business: Lessons for Mitigating Cyber Attacks from the International Insurance Law on Piracy

Minnesota Journal of International Law Online (2015 Forthcoming)
Number of pages: 12 Posted: 14 Oct 2014
Scott Shackelford and Scott Russell
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Bloomington - Center for Applied Cybersecurity Research
Downloads 103 (155,097)

Abstract:

Loading...

cybersecurity, insurance, piracy, cyber attack, cyber threat, cyber risk insurance

21.

Building the Virtual Courthouse: Ethical Considerations for Design, Implementation, and Regulation in the World of ODR

Wisconsin Law Review, 2014, Kelley School of Business Research Paper No. 2014-10
Number of pages: 52 Posted: 31 Jan 2014 Last Revised: 26 Aug 2014
Scott Shackelford and Anjanette Raymond
Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 102 (130,217)

Abstract:

Loading...

online dispute resolution, alternative dispute resolution, polycentric governance

22.

Unpacking the International Law on Cybersecurity Due Diligence: Lessons from the Public and Private Sectors

Chicago Journal of International Law, 2016, Kelley School of Business Research Paper No. 15-64
Number of pages: 49 Posted: 29 Aug 2015 Last Revised: 05 Oct 2015
Scott Shackelford, Scott Russell and Andreas Kuehn
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington - Center for Applied Cybersecurity Research and Syracuse University, School of Information Studies, Students
Downloads 92 (35,366)

Abstract:

Loading...

cybersecurity, cyber attack, due diligence, international law

23.

Rhetoric versus Reality: U.S. Resistance to Global Trade Rules and the Implications for Cybersecurity and Internet Governance

Minnesota Journal of International Law, 2015 Forthcoming
Number of pages: 13 Posted: 14 Oct 2014
Eric Richards, Scott Shackelford and Abbey Stemler
Indiana University Maurer School of Law, Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 92 (165,595)

Abstract:

Loading...

international trade, cybersecurity, cyber attack, international law, Internet governance

24.

Defining Cybersecurity Due Diligence Under International Law: Lessons from the Private Sector

Volume on Ethics and Policies for Cyber Warfare (Oxford University Press, 2015), Kelley School of Business Research Paper No. 15-41
Number of pages: 30 Posted: 16 Apr 2015
Scott Shackelford, Scott Russell and Andreas Kuehn
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington - Center for Applied Cybersecurity Research and Syracuse University, School of Information Studies, Students
Downloads 89 (79,578)

Abstract:

Loading...

25.

How Businesses Can Promote Cyber Peace

University of Pennsylvania Journal of International Law, 2015, Kelley School of Business Research Paper No. 2014-27
Number of pages: 88 Posted: 10 Feb 2014 Last Revised: 26 Aug 2014
Scott Shackelford, Timothy L. Fort and Jamie Darin Prenkert
Indiana University - Kelley School of Business - Department of Business Law, George Washington University - Department of Strategic Management & Public Policy and Indiana University - Kelley School of Business - Department of Business Law
Downloads 86 (196,455)

Abstract:

Loading...

cybersecurity, polycentric governance, business and human rights, cyber peace, mediating institutions

26.

Sustainable Cybersecurity: Applying Lessons from the Green Movement to Managing Cyber Attacks

University of Illinois Law Review, Vol. 2016, 2016
Number of pages: 42 Posted: 14 Sep 2013 Last Revised: 05 Mar 2015
Scott Shackelford and Timothy L. Fort
Indiana University - Kelley School of Business - Department of Business Law and George Washington University - Department of Strategic Management & Public Policy
Downloads 63 (110,270)

Abstract:

Loading...

corporate social responsibility, cybersecurity, cyber attack, sustainability, environmental law and policy

27.

Jury Glasses: Wearable Technology and its Role in Crowdsourcing Justice

Cardozo Journal of Conflict Resolution (2015 Forthcoming)
Number of pages: 37 Posted: 06 Mar 2015
Anjanette Raymond and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 56 (253,639)

Abstract:

Loading...

immersive technology, wearable technology, dispute resolution, juror bias, Google Glass

28.

Above the Cloud: Enhancing Cybersecurity in the Aerospace Sector

Florida International University Law Review, 2015, Forthcoming
Number of pages: 33 Posted: 23 Oct 2014
Scott Shackelford and Scott Russell
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Bloomington - Center for Applied Cybersecurity Research
Downloads 51 (265,280)

Abstract:

Loading...

cybersecurity, aerospace, space, aviation, NIST Framework, cyber attack, trade secrets

29.

Hacking the Planet, the Dalai Lama, and You: Managing Technical Vulnerabilities in the Internet Through Polycentric Governance

Fordham Intellectual Property, Media & Entertainment Law Journal, Vol. 24, p. 381, Winter 2014, Indiana Legal Studies Research Paper No. 292
Number of pages: 35 Posted: 07 Jun 2014 Last Revised: 15 Jul 2014
Amanda Craig and Scott Shackelford
Indiana University Maurer School of Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 50 (206,630)

Abstract:

Loading...

cybersecurity, Internet governance, polycentric governance

30.

Business, Human Rights, and the Promise of Polycentricity

Vanderbilt Journal of Transnational Law, Vol. 47, 2014
Number of pages: 41 Posted: 07 Jun 2014
Jamie Darin Prenkert and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 47 (303,216)

Abstract:

Loading...

human rights, business, polycentric governance

31.

Using BITs to Protect Bytes: Promoting Cyber Peace by Safeguarding Trade Secrets through Bilateral Investment Treaties

American Business Law Journal, 2015
Number of pages: 65 Posted: 14 Sep 2013 Last Revised: 27 Jun 2014
Scott Shackelford, Eric Richards, Anjanette Raymond and Amanda Craig
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Maurer School of Law, Indiana University - Kelley School of Business - Department of Business Law and Indiana University Maurer School of Law
Downloads 34 (267,214)

Abstract:

Loading...

bilateral investment treaty, international trade, cyber attacks, cybersecurity, China

32.

Protecting Intellectual Property and Privacy in the Digital Age: The Use of National Cybersecurity Strategies to Mitigate Cyber Risk

Chapman Law Review, 2016 Forthcoming, Kelley School of Business Research Paper No. 15-56
Number of pages: 33 Posted: 24 Jul 2015
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 29 (77,422)

Abstract:

Loading...

cybersecurity, cyber attack, privacy, espionage, NIST Framework

33.

Technology, Ethics and Access to Justice: Should an Algorithm Be Deciding Your Case?

Michigan Journal of International Law, Vol. 35, No. XX, 2014, Kelley School of Business Research Paper No. 2014-42
Number of pages: 40 Posted: 12 Aug 2013 Last Revised: 13 Nov 2014
Anjanette Raymond and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 28 (191,586)

Abstract:

Loading...

34.

On Climate Change and Cyber Attacks: Leveraging Polycentric Governance to Mitigate Global Collective Action Problems

Vanderbilt Journal of Entertainment & Technology Law, 2016, Kelley School of Business Research Paper No. 15-54
Number of pages: 51 Posted: 15 Jul 2015 Last Revised: 05 Oct 2015
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 17 (324,489)

Abstract:

Loading...

cybersecurity, climate change, cyber attack, Kyoto Protocol, UNFCCC, Montreal Protocol, sustainability

35.

The Angel on Your Shoulder: Prompting Employees to Do the Right Thing Through the Use of Wearables

Northwestern University Journal of Technology and Intellectual Property, Forthcoming, Kelley School of Business Research Paper No. 15-67
Number of pages: 40 Posted: 17 Sep 2015 Last Revised: 07 Oct 2015
Timothy L Fort, Anjanette Raymond and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 2 (231,328)

Abstract:

Loading...

36.

Cybersecurity as Social Responsibility: Business, Music, and the Symphony of Cyber Peace

Indiana Law Journal, 2018, Kelley School of Business Research Paper No. 17-69
Number of pages: 20 Posted: 18 Sep 2017
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 0 (286,630)

Abstract:

Loading...

cybersecurity, corporate social responsibility, business, human rights, international law, due diligence, music

37.

Exploring the ‘Shared Responsibility’ of Cyber Peace: Should Cybersecurity Be a Human Right?

Kelley School of Business Research Paper No. 17-55
Number of pages: 37 Posted: 21 Jul 2017
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 0 (269,327)

Abstract:

Loading...

cybersecurity, corporate social responsibility, business, human rights, international law

38.

From Russia with Love: Understanding the Russian Cyber Threat to U.S. Critical Infrastructure and What to Do about It

Nebraska Law Review, Forthcoming, Kelley School of Business Research Paper No. 17-42
Number of pages: 16 Posted: 02 Jun 2017
Indiana University - Kelley School of Business - Department of Business Law, Harvard University - Belfer Center for Science and International Affairs, Indiana University Maurer School of Law, Harvard University - Belfer Center for Science and International Affairs and Indiana University Bloomington, Mauer School of Law, Students
Downloads 0 (118,148)

Abstract:

Loading...

Cybersecurity, Critical Infrastructure, Cyber Attack, Russia, NIST Cybersecurity Framework

39.

Building a Better HAL 9000: Algorithms, the Market, and the Need to Prevent the Engraining of Bias

Northwestern Journal of Technology and Intellectual Property, 2017, Kelley School of Business Research Paper No. 17-23
Number of pages: 42 Posted: 29 Mar 2017
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington and Indiana University - Kelley School of Business - Department of Business Law
Downloads 0 (223,619)

Abstract:

Loading...

Big Data, Cybersecurity, Polycentric Governance

40.

Block-by-Block: Leveraging the Power of Blockchain Technology to Build Trust and Promote Cyber Peace

Yale Journal of Law and Technology (2017 Forthcoming), Kelley School of Business Research Paper No. 16-85
Number of pages: 55 Posted: 23 Nov 2016 Last Revised: 12 Mar 2017
Scott Shackelford and Steven Myers
Indiana University - Kelley School of Business - Department of Business Law and Indiana University
Downloads 0 (60,100)

Abstract:

Loading...

blockchain, Bitcoin, cybersecurity, cyber attack, polycentric governance, cyber peace

41.

The Firm as Common Pool Resource: Unpacking the Rise of Benefit Corporations

Kelley School of Business Research Paper No. 16-86
Number of pages: 52 Posted: 23 Nov 2016 Last Revised: 14 Dec 2016
Janine S. Hiller, Scott Shackelford and Xiao Ma
Virginia Polytechnic Institute & State University, Indiana University - Kelley School of Business - Department of Business Law and Indiana University Bloomington, Mauer School of Law, Students
Downloads 0 (246,453)

Abstract:

Loading...

benefit corporations, BCorps, BLab, polycentric governance, institutional analysis, Delaware, corporate law

42.

Making Democracy Harder to Hack: Should Elections Be Classified as ‘Critical Infrastructure?’

University of Michigan Journal of Law Reform, 2017, Kelley School of Business Research Paper No. 16-75
Number of pages: 40 Posted: 19 Oct 2016 Last Revised: 17 Nov 2016
Indiana University - Kelley School of Business - Department of Business Law, Harvard University - Berkman Klein Center for Internet & Society, Harvard University - Belfer Center for Science and International Affairs, University of Arizona - School of Government and Public Policy, Harvard University - Belfer Center for Science and International Affairs, Indiana University Maurer School of Law, Harvard Kennedy School (HKS), Belfer Center for Science and International Affairs (BCSIA) and Kings College London, Department of War Studies, Students
Downloads 0 (26,698)

Abstract:

Loading...

cybersecurity, cyber attack, election, voting, critical infrastructure

43.

iGovernance: The Future of Multi-Stakeholder Internet Governance in the Wake of the Apple Encryption Saga

North Carolina Journal of International Law and Commercial Regulation, 2017 (Forthcoming), Kelley School of Business Research Paper No. 16-74
Number of pages: 42 Posted: 12 Oct 2016
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Maurer School of Law, Indiana University - Kelley School of Business - Department of Business Law, Harvard University - Harvard Kennedy School (HKS) and Syracuse University, School of Information Studies, Students
Downloads 0 (183,526)

Abstract:

Loading...

cybersecurity, cyber attack, encryption, Apple

44.

The Law of Cyber Peace

Chicago Journal of International Law, 2017, Kelley School of Business Research Paper No. 16-56
Number of pages: 57 Posted: 09 Jul 2016 Last Revised: 12 Mar 2017
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 0 (147,227)

Abstract:

Loading...

cybersecurity, cyber attack, international law, norms, polycentric governance

45.

Human Rights and Cybersecurity Due Diligence: A Comparative Study

University of Michigan Journal of Law Reform, Vol. 50, 2017, Kelley School of Business Research Paper No. 16-47
Number of pages: 28 Posted: 18 Jun 2016 Last Revised: 16 Sep 2017
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 0 (100,533)

Abstract:

Loading...

cybersecurity, cyber attack, human rights, Ruggie Framework, polycentric governance, Internet governance, due diligence

46.

Businesses and Cyber Peace: We Need You!

Business Horizons, 2016, Kelley School of Business Research Paper No. 16-30
Number of pages: 26 Posted: 28 Mar 2016
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 0 (267,214)

Abstract:

Loading...

cybersecurity, cyber risk management, cyber attack, enterprise risk management

47.

Paris, Panels, and Protectionism: Matching U.S. Rhetoric with Reality to Save the Planet

Vanderbilt Journal of Entertainment & Technology Law, 2016, Kelley School of Business Research Paper No. 16-19
Number of pages: 57 Posted: 13 Feb 2016 Last Revised: 02 Jun 2017
Abbey Stemler, Scott Shackelford and Eric Richards
Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Kelley School of Business - Department of Business Law and Indiana University Maurer School of Law
Downloads 0 (157,524)

Abstract:

Loading...

Sustainability, Trade Policy, China, WTO

48.

When Toasters Attack: A Polycentric Approach to Enhancing the ‘Security of Things’

University of Illinois Law Review, 2017, Forthcoming, Kelley School of Business Research Paper No. 16-6
Number of pages: 54 Posted: 16 Jan 2016 Last Revised: 03 Mar 2016
Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington and Indiana University Bloomington
Downloads 0 (88,296)

Abstract:

Loading...

cybersecurity, cyber attack, Internet of Things

49.

Operationalizing Cybersecurity Due Diligence: A Transatlantic Comparative Case Study

South Carolina Law Review, 2016, Kelley School of Business Research Paper No. 16-16
Number of pages: 28 Posted: 14 Jan 2016
Scott Shackelford and Scott Russell
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Bloomington - Center for Applied Cybersecurity Research
Downloads 0 (75,571)

Abstract:

Loading...

cybersecurity, NIS Directive, General Data Privacy Regulation, EU data privacy, Cybersecurity Act of 2015, cyber attack

50.

Bottoms Up: A Comparison of Voluntary Cybersecurity Frameworks

UC Davis Business Law Journal, 2016, Forthcoming, Kelley School of Business Research Paper No. 16-2
Number of pages: 39 Posted: 12 Dec 2015
Scott Shackelford, Scott Russell and Jeffrey Haut
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington - Center for Applied Cybersecurity Research and Indiana University Maurer School of Law
Downloads 0 (73,059)

Abstract:

Loading...

cybersecurity, cyber attack, international law, comparative law

51.

Seeking a Safe Harbor in a Widening Sea: Unpacking the EJC's Schrems Decision and What it Means for Transatlantic Relations

Seton Hall Journal of Diplomacy and International Relations, 2016, Forthcoming, Kelley School of Business Research Paper No. 15-78
Number of pages: 8 Posted: 26 Oct 2015
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 0 (86,270)

Abstract:

Loading...

cybersecurity, privacy, Safe Harbor, Internet governance