Scott Shackelford

Indiana University - Kelley School of Business - Department of Business Law

Assistant Professor of Business Law and Ethics

Bloomington, IN 47405

United States

Harvard Kennedy School Belfer Center for Science & International Affairs

Research Fellow

79 JFK Street

Cambridge, MA 02138

United States

Center for Applied Cybersecurity Research

Senior Fellow

Wylie Hall 105

100 South Woodlawn

Bloomington, IN 47405

United States

Stanford Center for Internet and Society

Affiliate Scholar

Palo Alto, CA

United States

Stanford Law School

Visiting Scholar

Stanford, CA 94305

United States

SCHOLARLY PAPERS

54

DOWNLOADS
Rank 1,396

SSRN RANKINGS

Top 1,396

in Total Papers Downloads

19,174

CITATIONS

0

Scholarly Papers (54)

1.

From Nuclear War to Net War: Analogizing Cyber Attacks in International Law

Berkley Journal of International Law (BJIL), Vol. 25, No. 3, 2009
Number of pages: 60 Posted: 04 May 2009
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 2,652 (3,980)

Abstract:

Loading...

Cyber law, cyber attack, public international law, humanitarian law, human rights, nuclear war, law of the sea, outer space

2.

The Tragedy of the Common Heritage of Mankind

Stanford Environmental Law Journal, Vol. 27, 2008, Stanford Public Law Working Paper No. 1407332
Number of pages: 57 Posted: 25 May 2009 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 1,336 (12,529)

Abstract:

Loading...

public good, common resource, international law, common heritage, arctic, law of the sea, outer space

3.

Making Democracy Harder to Hack: Should Elections Be Classified as ‘Critical Infrastructure?’

University of Michigan Journal of Law Reform, 2017, Kelley School of Business Research Paper No. 16-75
Number of pages: 40 Posted: 19 Oct 2016 Last Revised: 17 Nov 2016
Indiana University - Kelley School of Business - Department of Business Law, Harvard University - Berkman Klein Center for Internet & Society, Harvard University - Belfer Center for Science and International Affairs, University of Arizona - School of Government and Public Policy, Harvard University - Belfer Center for Science and International Affairs, Indiana University Maurer School of Law, Harvard Kennedy School (HKS), Belfer Center for Science and International Affairs (BCSIA) and Kings College London, Department of War Studies, Students
Downloads 865 (24,402)

Abstract:

Loading...

cybersecurity, cyber attack, election, voting, critical infrastructure

4.

Beyond the New 'Digital Divide': Analyzing the Evolving Role of National Governments in Internet Governance and Enhancing Cybersecurity

Stanford Journal of International Law, Vol. 50, p. 119, Winter 2014, Indiana Legal Studies Research Paper No. 290
Number of pages: 66 Posted: 07 Jun 2014 Last Revised: 15 Jul 2014
Scott Shackelford and Amanda Craig
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Maurer School of Law
Downloads 805 (26,817)

Abstract:

Loading...

5.

Investment Treaty Arbitration and Public Law, by Gus Van Harten

Stanford Journal of International Law, Vol. 92, No. 1
Number of pages: 7 Posted: 19 May 2009
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 766 (28,705)

Abstract:

Loading...

investment treaty arbitration; international arbitration; public international law

6.

Unpacking the International Law on Cybersecurity Due Diligence: Lessons from the Public and Private Sectors

Chicago Journal of International Law, 2016, Kelley School of Business Research Paper No. 15-64
Number of pages: 49 Posted: 29 Aug 2015 Last Revised: 05 Oct 2015
Scott Shackelford, Scott Russell and Andreas Kuehn
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington - Center for Applied Cybersecurity Research and Syracuse University, School of Information Studies
Downloads 689 (33,221)

Abstract:

Loading...

cybersecurity, cyber attack, due diligence, international law

7.

Toward a Global Cybersecurity Standard of Care? Exploring the Implications of the 2014 NIST Cybersecurity Framework on Shaping Reasonable National and International Cybersecurity Practices

Texas International Law Journal, 2015, Indiana Legal Studies Research Paper No. 291
Number of pages: 59 Posted: 07 Jun 2014 Last Revised: 15 Jul 2014
Scott Shackelford, Andrew Proia, Brenton Martell and Amanda Craig
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington - Center for Applied Cybersecurity Research, Indiana University Bloomington and Indiana University Maurer School of Law
Downloads 683 (33,492)

Abstract:

Loading...

cybersecurity, NIST, critical infrastructure

8.

Estonia Two-and-A-Half Years Later: A Progress Report on Combating Cyber Attacks

Journal of Internet Law, Forthcoming
Number of pages: 12 Posted: 10 Feb 2010
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 651 (35,795)

Abstract:

Loading...

cyber attack, hacker, internet, cyberspace, internet law, NATO, international law

9.

Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis

American Business Law Journal, 2015
Number of pages: 63 Posted: 06 Mar 2015 Last Revised: 10 Mar 2015
Amanda Craig, Scott Shackelford and Janine S. Hiller
Indiana University Maurer School of Law, Indiana University - Kelley School of Business - Department of Business Law and Virginia Polytechnic Institute & State University
Downloads 612 (38,781)

Abstract:

Loading...

cybersecurity, active defense, hack back, international law, comparative law, polycentric governance

10.

Block-by-Block: Leveraging the Power of Blockchain Technology to Build Trust and Promote Cyber Peace

Yale Journal of Law and Technology (2017 Forthcoming), Kelley School of Business Research Paper No. 16-85
Number of pages: 55 Posted: 23 Nov 2016 Last Revised: 12 Mar 2017
Scott Shackelford and Steven Myers
Indiana University - Kelley School of Business - Department of Business Law and Indiana University
Downloads 558 (43,913)

Abstract:

Loading...

blockchain, Bitcoin, cybersecurity, cyber attack, polycentric governance, cyber peace

11.

Book Review of Habeas Corpus Writ of Liberty: English and American Origins and Development, by Robert Searles Walker, Ph.D

Cleveland State Law Review, Vol. 57, No. 3, 2009
Number of pages: 14 Posted: 30 Apr 2009 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 474 (53,775)

Abstract:

Loading...

habeas corpus, constitutional, comparative, england

12.

Should Your Firm Invest in Cyber Risk Insurance?

Business Horizons, 2012
Number of pages: 20 Posted: 15 Dec 2011
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 473 (54,073)

Abstract:

Loading...

Cybersecurity, Internet, Cyber Risk Insurance, Cyber Attack, Data Breach, Cyber Law

13.

Bottoms Up: A Comparison of Voluntary Cybersecurity Frameworks

UC Davis Business Law Journal, 2016, Forthcoming, Kelley School of Business Research Paper No. 16-2
Number of pages: 39 Posted: 12 Dec 2015
Scott Shackelford, Scott Russell and Jeffrey Haut
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington - Center for Applied Cybersecurity Research and Indiana University Maurer School of Law
Downloads 386 (69,122)

Abstract:

Loading...

cybersecurity, cyber attack, international law, comparative law

14.

Fragile Merchandise: A Comparative Analysis of the Privacy Rights for Public Figures

American Business Law Journal, 2012
Number of pages: 111 Posted: 05 May 2009 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 385 (69,122)

Abstract:

Loading...

Privacy, comparative law, public figure, media, first amendment

15.

Operationalizing Cybersecurity Due Diligence: A Transatlantic Comparative Case Study

South Carolina Law Review, 2016, Kelley School of Business Research Paper No. 16-16
Number of pages: 28 Posted: 14 Jan 2016
Scott Shackelford and Scott Russell
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Bloomington - Center for Applied Cybersecurity Research
Downloads 378 (71,105)

Abstract:

Loading...

cybersecurity, NIS Directive, General Data Privacy Regulation, EU data privacy, Cybersecurity Act of 2015, cyber attack

16.

When Toasters Attack: A Polycentric Approach to Enhancing the ‘Security of Things’

University of Illinois Law Review, 2017, Forthcoming, Kelley School of Business Research Paper No. 16-6
Number of pages: 54 Posted: 16 Jan 2016 Last Revised: 03 Mar 2016
Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington and Indiana University Bloomington
Downloads 365 (73,837)

Abstract:

Loading...

cybersecurity, cyber attack, Internet of Things

17.

Protecting Intellectual Property and Privacy in the Digital Age: The Use of National Cybersecurity Strategies to Mitigate Cyber Risk

Chapman Law Review, 2016 Forthcoming, Kelley School of Business Research Paper No. 15-56
Number of pages: 33 Posted: 24 Jul 2015
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 350 (77,817)

Abstract:

Loading...

cybersecurity, cyber attack, privacy, espionage, NIST Framework

18.

Seeking a Safe Harbor in a Widening Sea: Unpacking the EJC's Schrems Decision and What it Means for Transatlantic Relations

Seton Hall Journal of Diplomacy and International Relations, 2016, Forthcoming, Kelley School of Business Research Paper No. 15-78
Number of pages: 8 Posted: 26 Oct 2015
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 346 (78,307)

Abstract:

Loading...

cybersecurity, privacy, Safe Harbor, Internet governance

19.

Defining Cybersecurity Due Diligence Under International Law: Lessons from the Private Sector

Volume on Ethics and Policies for Cyber Warfare (Oxford University Press, 2015), Kelley School of Business Research Paper No. 15-41
Number of pages: 30 Posted: 16 Apr 2015
Scott Shackelford, Scott Russell and Andreas Kuehn
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington - Center for Applied Cybersecurity Research and Syracuse University, School of Information Studies
Downloads 337 (81,019)

Abstract:

Loading...

20.

Is it Time for a National Cybersecurity Safety Board?

Albany Law Journal of Science and Technology, 2018, Kelley School of Business Research Paper No. 18-34
Number of pages: 18 Posted: 31 Jan 2018 Last Revised: 29 Apr 2018
Scott Shackelford and Austin Brady
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Maurer School of Law
Downloads 333 (83,836)

Abstract:

Loading...

21.

Securing North American Critical Infrastructure: A Comparative Case Study in Cybersecurity Regulation

Canada-US Law Journal, 2015, Forthcoming, Kelley School of Business Research Paper No. 15-24
Number of pages: 12 Posted: 11 Mar 2015
Scott Shackelford and Zachery Bohm
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Bloomington - Center for Applied Cybersecurity Research
Downloads 316 (86,806)

Abstract:

Loading...

cybersecurity, north america, cyber attack, NIST Framework, Canada, United States

22.

Human Rights and Cybersecurity Due Diligence: A Comparative Study

University of Michigan Journal of Law Reform, Vol. 50, 2017, Kelley School of Business Research Paper No. 16-47
Number of pages: 28 Posted: 18 Jun 2016 Last Revised: 16 Sep 2017
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 309 (89,316)

Abstract:

Loading...

cybersecurity, cyber attack, human rights, Ruggie Framework, polycentric governance, Internet governance, due diligence

23.

In the Name of Efficiency: The Role of Permanent Lok Adalats in the Indian Justice System and Power Infrastructure

Manoj Kumar Sinha, GLOBAL GOVERNANCE, DEVELOPMENT AND HUMAN RIGHTS, 2008
Number of pages: 49 Posted: 02 May 2009 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 300 (91,969)

Abstract:

Loading...

Arbitration, Alternative Dispute Resolution, India, Energy Policy, Infrastructure

24.

From Russia with Love: Understanding the Russian Cyber Threat to U.S. Critical Infrastructure and What to Do about It

Nebraska Law Review, Vol. 96, 2017, Kelley School of Business Research Paper No. 17-42
Number of pages: 19 Posted: 02 Jun 2017 Last Revised: 03 Dec 2017
Indiana University - Kelley School of Business - Department of Business Law, Harvard University - Belfer Center for Science and International Affairs, Indiana University Maurer School of Law, Harvard University - Belfer Center for Science and International Affairs and Indiana University Bloomington, Mauer School of Law, Students
Downloads 297 (93,013)

Abstract:

Loading...

Cybersecurity, Critical Infrastructure, Cyber Attack, Russia, NIST Cybersecurity Framework

25.

Neither Magic Bullet Nor Lost Cause: Land Titling and the Wealth of Nations

21 New York University Environmental Law Journal 272 (2014)
Number of pages: 72 Posted: 28 Apr 2009 Last Revised: 06 Apr 2015
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 294 (94,048)

Abstract:

Loading...

Property, property rights, rule of law, development

26.

Sustainable Cybersecurity: Applying Lessons from the Green Movement to Managing Cyber Attacks

University of Illinois Law Review, Vol. 2016, 2016
Number of pages: 42 Posted: 14 Sep 2013 Last Revised: 05 Mar 2015
Scott Shackelford and Timothy L. Fort
Indiana University - Kelley School of Business - Department of Business Law and George Washington University - Department of Strategic Management & Public Policy
Downloads 263 (106,369)

Abstract:

Loading...

corporate social responsibility, cybersecurity, cyber attack, sustainability, environmental law and policy

27.

Toward Cyber Peace: Managing Cyber Attacks Through Polycentric Governance

American University Law Review, 2013
Number of pages: 75 Posted: 22 Aug 2012 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 247 (113,487)

Abstract:

Loading...

cybersecurity, cyber law, Internet governance, ICANN, IETF, ITU, polycentric

28.

The Law of Cyber Peace

Chicago Journal of International Law, 2017, Kelley School of Business Research Paper No. 16-56
Number of pages: 57 Posted: 09 Jul 2016 Last Revised: 12 Mar 2017
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 237 (119,425)

Abstract:

Loading...

cybersecurity, cyber attack, international law, norms, polycentric governance

29.

Holding States Accountable for the Ultimate Human Rights Abuse: A Review of the International Court of Justice Bosnian Genocide Case

Human Rights Brief, Vol. 11, No. 3, p. 30, 2007
Number of pages: 14 Posted: 08 May 2009
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 231 (121,481)

Abstract:

Loading...

Genocide, international tribunal, international court, international criminal law, incitement to genocide

30.

Toward a State-Centric Cyber Peace? Analyzing the Role of National Cybersecurity Strategies in Enhancing Global Cybersecurity

New York University Journal of Legislation and Public Policy, 2016, Kelley School of Business Research Paper No. 15-4
Number of pages: 85 Posted: 29 Nov 2014 Last Revised: 12 May 2015
Scott Shackelford and Andraz Kastelic
Indiana University - Kelley School of Business - Department of Business Law and University of Sheffield - Law School
Downloads 221 (126,980)

Abstract:

Loading...

31.

Building the Virtual Courthouse: Ethical Considerations for Design, Implementation, and Regulation in the World of ODR

Wisconsin Law Review, 2014, Kelley School of Business Research Paper No. 2014-10
Number of pages: 52 Posted: 31 Jan 2014 Last Revised: 26 Aug 2014
Scott Shackelford and Anjanette Raymond
Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 221 (126,420)

Abstract:

Loading...

online dispute resolution, alternative dispute resolution, polycentric governance

32.

Governing the Final Frontier: A Polycentric Approach to Managing Space Weaponization and Orbital Debris

American Business Law Journal, Forthcoming
Number of pages: 60 Posted: 15 Dec 2011 Last Revised: 03 Jul 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 194 (142,936)

Abstract:

Loading...

Space Law, Orbital Debris, Space Junk, Space Weaponization, Polycentric, Common Heritage of Mankind, Sustainable Development

33.

Was Selden Right? The Expansion of Closed Seas and its Consequences

Stanford Journal of International Law, Vol. 47
Number of pages: 45 Posted: 02 Sep 2010 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 194 (142,936)

Abstract:

Loading...

EEZ, Continental Shelf, Common Heritage of Mankind, Grotius, Selden, Closed Seas, Open Seas, Arctic, Antarctica, Deep Seabed

34.

Risky Business: Lessons for Mitigating Cyber Attacks from the International Insurance Law on Piracy

Minnesota Journal of International Law Online (2015 Forthcoming)
Number of pages: 12 Posted: 14 Oct 2014
Scott Shackelford and Scott Russell
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Bloomington - Center for Applied Cybersecurity Research
Downloads 183 (150,858)

Abstract:

Loading...

cybersecurity, insurance, piracy, cyber attack, cyber threat, cyber risk insurance

35.

Technology, Ethics and Access to Justice: Should an Algorithm Be Deciding Your Case?

Michigan Journal of International Law, Vol. 35, No. XX, 2014, Kelley School of Business Research Paper No. 2014-42
Number of pages: 40 Posted: 12 Aug 2013 Last Revised: 13 Nov 2014
Anjanette Raymond and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 183 (151,610)

Abstract:

Loading...

36.

Paris, Panels, and Protectionism: Matching U.S. Rhetoric with Reality to Save the Planet

Vanderbilt Journal of Entertainment & Technology Law, 2016, Kelley School of Business Research Paper No. 16-19
Number of pages: 57 Posted: 13 Feb 2016 Last Revised: 02 Jun 2017
Abbey Stemler, Scott Shackelford and Eric Richards
Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Kelley School of Business - Department of Business Law and Indiana University Maurer School of Law
Downloads 172 (159,475)

Abstract:

Loading...

Sustainability, Trade Policy, China, WTO

37.

Cybersecurity as Social Responsibility: Business, Music, and the Symphony of Cyber Peace

Indiana Law Journal, 2018, Kelley School of Business Research Paper No. 17-69
Number of pages: 20 Posted: 18 Sep 2017
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 158 (176,376)

Abstract:

Loading...

cybersecurity, corporate social responsibility, business, human rights, international law, due diligence, music

38.

Rhetoric versus Reality: U.S. Resistance to Global Trade Rules and the Implications for Cybersecurity and Internet Governance

Minnesota Journal of International Law, 2015 Forthcoming
Number of pages: 13 Posted: 14 Oct 2014
Eric Richards, Scott Shackelford and Abbey Stemler
Indiana University Maurer School of Law, Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 157 (172,566)

Abstract:

Loading...

international trade, cybersecurity, cyber attack, international law, Internet governance

39.

iGovernance: The Future of Multi-Stakeholder Internet Governance in the Wake of the Apple Encryption Saga

North Carolina Journal of International Law and Commercial Regulation, 2017 (Forthcoming), Kelley School of Business Research Paper No. 16-74
Number of pages: 42 Posted: 12 Oct 2016
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Maurer School of Law, Indiana University - Kelley School of Business - Department of Business Law, Harvard University - Harvard Kennedy School (HKS) and Syracuse University, School of Information Studies
Downloads 156 (174,403)

Abstract:

Loading...

cybersecurity, cyber attack, encryption, Apple

40.

Building a Better HAL 9000: Algorithms, the Market, and the Need to Prevent the Engraining of Bias

Northwestern Journal of Technology and Intellectual Property, 2017, Kelley School of Business Research Paper No. 17-23
Number of pages: 42 Posted: 29 Mar 2017
Anjanette Raymond, Emma Young and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington and Indiana University - Kelley School of Business - Department of Business Law
Downloads 140 (189,729)

Abstract:

Loading...

Big Data, Cybersecurity, Polycentric Governance

41.

How Businesses Can Promote Cyber Peace

University of Pennsylvania Journal of International Law, 2015, Kelley School of Business Research Paper No. 2014-27
Number of pages: 88 Posted: 10 Feb 2014 Last Revised: 26 Aug 2014
Scott Shackelford, Timothy L. Fort and Jamie Darin Prenkert
Indiana University - Kelley School of Business - Department of Business Law, George Washington University - Department of Strategic Management & Public Policy and Indiana University - Kelley School of Business - Department of Business Law
Downloads 133 (198,873)

Abstract:

Loading...

cybersecurity, polycentric governance, business and human rights, cyber peace, mediating institutions

42.

Global Health Governance: International Law and Public Health in a Divided World, by Aginam, Obijiofor

Stanford Journal of International Law, Vol. 43, No. 1
Number of pages: 6 Posted: 19 May 2009
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 130 (202,505)

Abstract:

Loading...

international public health, public health, world health organization, disease

43.

Exploring the ‘Shared Responsibility’ of Cyber Peace: Should Cybersecurity Be a Human Right?

Kelley School of Business Research Paper No. 17-55
Number of pages: 37 Posted: 21 Jul 2017
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 129 (206,294)

Abstract:

Loading...

cybersecurity, corporate social responsibility, business, human rights, international law

44.

Hacking the Planet, the Dalai Lama, and You: Managing Technical Vulnerabilities in the Internet Through Polycentric Governance

Fordham Intellectual Property, Media & Entertainment Law Journal, Vol. 24, p. 381, Winter 2014, Indiana Legal Studies Research Paper No. 292
Number of pages: 35 Posted: 07 Jun 2014 Last Revised: 15 Jul 2014
Amanda Craig and Scott Shackelford
Indiana University Maurer School of Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 122 (211,417)

Abstract:

Loading...

cybersecurity, Internet governance, polycentric governance

45.

Securing the Internet of Healthcare

Minnesota Journal of Law, Science & Technology, 2018, Kelley School of Business Research Paper No. 18-16
Number of pages: 50 Posted: 24 Feb 2018 Last Revised: 04 Jun 2018
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Maurer School of Law, Indiana University, Indiana University Maurer School of Law, Indiana University Maurer School of Law and Indiana University Bloomington, Maruer School of Law, Students
Downloads 107 (242,149)

Abstract:

Loading...

medical device, cybersecurity, supply chain, blockchain, FDA

46.

The Angel on Your Shoulder: Prompting Employees to Do the Right Thing Through the Use of Wearables

Northwestern University Journal of Technology and Intellectual Property, Forthcoming, Kelley School of Business Research Paper No. 15-67
Number of pages: 40 Posted: 17 Sep 2015 Last Revised: 07 Oct 2015
Timothy Fort, Anjanette Raymond and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 101 (242,149)

Abstract:

Loading...

47.

Jury Glasses: Wearable Technology and its Role in Crowdsourcing Justice

Cardozo Journal of Conflict Resolution (2015 Forthcoming)
Number of pages: 37 Posted: 06 Mar 2015
Anjanette Raymond and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 93 (257,585)

Abstract:

Loading...

immersive technology, wearable technology, dispute resolution, juror bias, Google Glass

48.

Businesses and Cyber Peace: We Need You!

Business Horizons, 2016, Kelley School of Business Research Paper No. 16-30
Number of pages: 26 Posted: 28 Mar 2016
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 89 (264,921)

Abstract:

Loading...

cybersecurity, cyber risk management, cyber attack, enterprise risk management

49.

Using BITs to Protect Bytes: Promoting Cyber Peace by Safeguarding Trade Secrets through Bilateral Investment Treaties

American Business Law Journal, 2015
Number of pages: 65 Posted: 14 Sep 2013 Last Revised: 27 Jun 2014
Scott Shackelford, Eric Richards, Anjanette Raymond and Amanda Craig
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Maurer School of Law, Indiana University - Kelley School of Business - Department of Business Law and Indiana University Maurer School of Law
Downloads 85 (270,679)

Abstract:

Loading...

bilateral investment treaty, international trade, cyber attacks, cybersecurity, China

50.

Above the Cloud: Enhancing Cybersecurity in the Aerospace Sector

Florida International University Law Review, 2015, Forthcoming
Number of pages: 33 Posted: 23 Oct 2014
Scott Shackelford and Scott Russell
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Bloomington - Center for Applied Cybersecurity Research
Downloads 83 (274,621)

Abstract:

Loading...

cybersecurity, aerospace, space, aviation, NIST Framework, cyber attack, trade secrets

51.

Business, Human Rights, and the Promise of Polycentricity

Vanderbilt Journal of Transnational Law, Vol. 47, 2014
Number of pages: 41 Posted: 07 Jun 2014
Jamie Darin Prenkert and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 66 (312,895)

Abstract:

Loading...

human rights, business, polycentric governance

52.

On Climate Change and Cyber Attacks: Leveraging Polycentric Governance to Mitigate Global Collective Action Problems

Vanderbilt Journal of Entertainment & Technology Law, 2016, Kelley School of Business Research Paper No. 15-54
Number of pages: 51 Posted: 15 Jul 2015 Last Revised: 05 Oct 2015
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 64 (318,012)

Abstract:

Loading...

cybersecurity, climate change, cyber attack, Kyoto Protocol, UNFCCC, Montreal Protocol, sustainability

53.

The Firm and Common Pool Resource Theory: Understanding the Rise of Benefit Corporations

Forthcoming, in Volume 55.1 of the American Business Law Journal , Kelley School of Business Research Paper No. 18-5
Number of pages: 34 Posted: 10 Jan 2018 Last Revised: 24 Jan 2018
Janine S. Hiller and Scott Shackelford
Virginia Polytechnic Institute & State University and Indiana University - Kelley School of Business - Department of Business Law
Downloads 31 (431,232)

Abstract:

Loading...

benefit corporation, corporate governance, common pool resource

54.

Have You Updated Your Toaster? Transatlantic Approaches to Governing the Internet of Everything

European Journal of International Law, Forthcoming, Kelley School of Business Research Paper No. 18-60
Number of pages: 31 Posted: 25 Jul 2018
Scott Shackelford and Scott O. Bradner
Indiana University - Kelley School of Business - Department of Business Law and Harvard University
Downloads 24 (503,632)

Abstract:

Loading...

Cybersecurity, Internet Of Things, GDPR, NIS Directive