Scott Shackelford

Indiana University - Kelley School of Business - Department of Business Law

Assistant Professor of Business Law and Ethics

Bloomington, IN 47405

United States

Harvard Kennedy School Belfer Center for Science & International Affairs

Research Fellow

79 JFK Street

Cambridge, MA 02138

United States

Center for Applied Cybersecurity Research

Senior Fellow

Wylie Hall 105

100 South Woodlawn

Bloomington, IN 47405

United States

Stanford Center for Internet and Society

Affiliate Scholar

Palo Alto, CA

United States

Stanford Law School

Visiting Scholar

Stanford, CA 94305

United States

SCHOLARLY PAPERS

71

DOWNLOADS
Rank 1,315

SSRN RANKINGS

Top 1,315

in Total Papers Downloads

31,536

SSRN CITATIONS
Rank 12,945

SSRN RANKINGS

Top 12,945

in Total Papers Citations

41

CROSSREF CITATIONS

50

Scholarly Papers (71)

1.

From Nuclear War to Net War: Analogizing Cyber Attacks in International Law

Berkley Journal of International Law (BJIL), Vol. 25, No. 3, 2009
Number of pages: 60 Posted: 04 May 2009
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 3,273 (5,388)
Citation 2

Abstract:

Loading...

Cyber law, cyber attack, public international law, humanitarian law, human rights, nuclear war, law of the sea, outer space

2.

The Tragedy of the Common Heritage of Mankind

Stanford Environmental Law Journal, Vol. 27, 2008, Stanford Public Law Working Paper No. 1407332
Number of pages: 57 Posted: 25 May 2009 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 1,789 (14,269)

Abstract:

Loading...

public good, common resource, international law, common heritage, arctic, law of the sea, outer space

3.

Toward a Global Cybersecurity Standard of Care? Exploring the Implications of the 2014 NIST Cybersecurity Framework on Shaping Reasonable National and International Cybersecurity Practices

Texas International Law Journal, 2015, Indiana Legal Studies Research Paper No. 291
Number of pages: 59 Posted: 07 Jun 2014 Last Revised: 15 Jul 2014
Indiana University - Kelley School of Business - Department of Business Law, Seton Hall Law SchoolIndiana University Bloomington - Center for Applied Cybersecurity Research, Indiana University Bloomington and Indiana University Maurer School of Law
Downloads 1,392 (20,880)

Abstract:

Loading...

cybersecurity, NIST, critical infrastructure

4.

Estonia Two-and-A-Half Years Later: A Progress Report on Combating Cyber Attacks

Journal of Internet Law, Forthcoming
Number of pages: 12 Posted: 10 Feb 2010
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 1,124 (28,655)

Abstract:

Loading...

cyber attack, hacker, internet, cyberspace, internet law, NATO, international law

5.

Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis

American Business Law Journal, 2015
Number of pages: 63 Posted: 06 Mar 2015 Last Revised: 10 Mar 2015
Amanda Craig, Scott Shackelford and Janine S. Hiller
Indiana University Maurer School of Law, Indiana University - Kelley School of Business - Department of Business Law and Virginia Tech
Downloads 1,119 (28,895)

Abstract:

Loading...

cybersecurity, active defense, hack back, international law, comparative law, polycentric governance

6.

Making Democracy Harder to Hack: Should Elections Be Classified as ‘Critical Infrastructure?’

University of Michigan Journal of Law Reform, 2017, Kelley School of Business Research Paper No. 16-75
Number of pages: 40 Posted: 19 Oct 2016 Last Revised: 17 Nov 2016
Indiana University - Kelley School of Business - Department of Business Law, Harvard University - Berkman Klein Center for Internet & Society, Harvard University, Harvard Kennedy School (HKS), Belfer Center for Science and International Affairs (BCSIA), University of Arizona - School of Government and Public Policy, Harvard University, Harvard Kennedy School (HKS), Belfer Center for Science and International Affairs (BCSIA), Indiana University Maurer School of Law, Hoover Institution at Stanford University and Government of the United States of America - US Air War College
Downloads 1,108 (29,293)
Citation 1

Abstract:

Loading...

cybersecurity, cyber attack, election, voting, critical infrastructure

7.

Beyond the New 'Digital Divide': Analyzing the Evolving Role of National Governments in Internet Governance and Enhancing Cybersecurity

Stanford Journal of International Law, Vol. 50, p. 119, Winter 2014, Indiana Legal Studies Research Paper No. 290
Number of pages: 66 Posted: 07 Jun 2014 Last Revised: 15 Jul 2014
Scott Shackelford and Amanda Craig
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Maurer School of Law
Downloads 1,034 (32,283)
Citation 2

Abstract:

Loading...

8.

Investment Treaty Arbitration and Public Law, by Gus Van Harten

Stanford Journal of International Law, Vol. 92, No. 1
Number of pages: 7 Posted: 19 May 2009
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 978 (35,009)

Abstract:

Loading...

investment treaty arbitration; international arbitration; public international law

9.

Unpacking the International Law on Cybersecurity Due Diligence: Lessons from the Public and Private Sectors

Chicago Journal of International Law, 2016, Kelley School of Business Research Paper No. 15-64
Number of pages: 49 Posted: 29 Aug 2015 Last Revised: 05 Oct 2015
Scott Shackelford, Scott Russell and Andreas Kuehn
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington - Center for Applied Cybersecurity Research and Syracuse University, School of Information Studies
Downloads 912 (38,519)
Citation 5

Abstract:

Loading...

cybersecurity, cyber attack, due diligence, international law

10.

Is it Time for a National Cybersecurity Safety Board?

Albany Law Journal of Science and Technology, 2018, Kelley School of Business Research Paper No. 18-34
Number of pages: 18 Posted: 31 Jan 2018 Last Revised: 29 Apr 2018
Scott Shackelford and Austin E. Brady
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Maurer School of Law
Downloads 783 (47,303)

Abstract:

Loading...

11.

Block-by-Block: Leveraging the Power of Blockchain Technology to Build Trust and Promote Cyber Peace

Yale Journal of Law and Technology (2017 Forthcoming), Kelley School of Business Research Paper No. 16-85
Number of pages: 55 Posted: 23 Nov 2016 Last Revised: 12 Mar 2017
Scott Shackelford and Steven Myers
Indiana University - Kelley School of Business - Department of Business Law and Indiana University
Downloads 723 (52,734)
Citation 8

Abstract:

Loading...

blockchain, Bitcoin, cybersecurity, cyber attack, polycentric governance, cyber peace

12.

Should Your Firm Invest in Cyber Risk Insurance?

Business Horizons, 2012
Number of pages: 20 Posted: 15 Dec 2011
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 680 (57,069)
Citation 4

Abstract:

Loading...

Cybersecurity, Internet, Cyber Risk Insurance, Cyber Attack, Data Breach, Cyber Law

13.

Should Cybersecurity Be a Human Right? Exploring the ‘Shared Responsibility’ of Cyber Peace

Stanford Journal of International Law No. 2019, Kelley School of Business Research Paper No. 17-55
Number of pages: 46 Posted: 21 Jul 2017 Last Revised: 07 Mar 2019
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 567 (72,044)

Abstract:

Loading...

cybersecurity, corporate social responsibility, business, human rights, international law

14.

Operationalizing Cybersecurity Due Diligence: A Transatlantic Comparative Case Study

South Carolina Law Review, 2016, Kelley School of Business Research Paper No. 16-16
Number of pages: 28 Posted: 14 Jan 2016
Scott Shackelford and Scott Russell
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Bloomington - Center for Applied Cybersecurity Research
Downloads 543 (75,949)

Abstract:

Loading...

cybersecurity, NIS Directive, General Data Privacy Regulation, EU data privacy, Cybersecurity Act of 2015, cyber attack

15.

Bottoms Up: A Comparison of Voluntary Cybersecurity Frameworks

UC Davis Business Law Journal, 2016, Forthcoming, Kelley School of Business Research Paper No. 16-2
Number of pages: 39 Posted: 12 Dec 2015
Scott Shackelford, Scott Russell and Jeffrey Haut
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington - Center for Applied Cybersecurity Research and Indiana University Maurer School of Law
Downloads 539 (76,659)

Abstract:

Loading...

cybersecurity, cyber attack, international law, comparative law

16.

Book Review of Habeas Corpus Writ of Liberty: English and American Origins and Development, by Robert Searles Walker, Ph.D

Cleveland State Law Review, Vol. 57, No. 3, 2009
Number of pages: 14 Posted: 30 Apr 2009 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 519 (80,325)
Citation 1

Abstract:

Loading...

habeas corpus, constitutional, comparative, england

17.

Fragile Merchandise: A Comparative Analysis of the Privacy Rights for Public Figures

American Business Law Journal, 2012
Number of pages: 111 Posted: 05 May 2009 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 508 (82,488)
Citation 1

Abstract:

Loading...

Privacy, comparative law, public figure, media, first amendment

18.

When Toasters Attack: A Polycentric Approach to Enhancing the ‘Security of Things’

University of Illinois Law Review, 2017, Forthcoming, Kelley School of Business Research Paper No. 16-6
Number of pages: 54 Posted: 16 Jan 2016 Last Revised: 03 Mar 2016
Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington and Indiana University Bloomington
Downloads 494 (85,368)
Citation 4

Abstract:

Loading...

cybersecurity, cyber attack, Internet of Things

19.

Protecting Intellectual Property and Privacy in the Digital Age: The Use of National Cybersecurity Strategies to Mitigate Cyber Risk

Chapman Law Review, 2016 Forthcoming, Kelley School of Business Research Paper No. 15-56
Number of pages: 33 Posted: 24 Jul 2015
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 484 (87,473)
Citation 5

Abstract:

Loading...

cybersecurity, cyber attack, privacy, espionage, NIST Framework

20.

Building the Virtual Courthouse: Ethical Considerations for Design, Implementation, and Regulation in the World of ODR

Wisconsin Law Review, 2014, Kelley School of Business Research Paper No. 2014-10
Number of pages: 52 Posted: 31 Jan 2014 Last Revised: 26 Aug 2014
Scott Shackelford and Anjanette Raymond
Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 461 (92,737)
Citation 5

Abstract:

Loading...

online dispute resolution, alternative dispute resolution, polycentric governance

21.

In the Name of Efficiency: The Role of Permanent Lok Adalats in the Indian Justice System and Power Infrastructure

Manoj Kumar Sinha, GLOBAL GOVERNANCE, DEVELOPMENT AND HUMAN RIGHTS, 2008
Number of pages: 49 Posted: 02 May 2009 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 443 (97,080)

Abstract:

Loading...

Arbitration, Alternative Dispute Resolution, India, Energy Policy, Infrastructure

22.

Seeking a Safe Harbor in a Widening Sea: Unpacking the EJC's Schrems Decision and What it Means for Transatlantic Relations

Seton Hall Journal of Diplomacy and International Relations, 2016, Forthcoming, Kelley School of Business Research Paper No. 15-78
Number of pages: 8 Posted: 26 Oct 2015
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 428 (101,119)

Abstract:

Loading...

cybersecurity, privacy, Safe Harbor, Internet governance

23.

From Russia with Love: Understanding the Russian Cyber Threat to U.S. Critical Infrastructure and What to Do about It

Nebraska Law Review, Vol. 96, 2017, Kelley School of Business Research Paper No. 17-42
Number of pages: 19 Posted: 02 Jun 2017 Last Revised: 03 Dec 2017
Indiana University - Kelley School of Business - Department of Business Law, Harvard University, Harvard Kennedy School (HKS), Belfer Center for Science and International Affairs (BCSIA), Indiana University Maurer School of Law, Harvard University, Harvard Kennedy School (HKS), Belfer Center for Science and International Affairs (BCSIA) and Indiana University Bloomington, Mauer School of Law, Students
Downloads 421 (103,664)
Citation 1

Abstract:

Loading...

Cybersecurity, Critical Infrastructure, Cyber Attack, Russia, NIST Cybersecurity Framework

24.

Sustainable Cybersecurity: Applying Lessons from the Green Movement to Managing Cyber Attacks

University of Illinois Law Review, Vol. 2016, 2016
Number of pages: 42 Posted: 14 Sep 2013 Last Revised: 05 Mar 2015
Scott Shackelford and Timothy L. Fort
Indiana University - Kelley School of Business - Department of Business Law and George Washington University - Department of Strategic Management & Public Policy
Downloads 408 (107,120)
Citation 2

Abstract:

Loading...

corporate social responsibility, cybersecurity, cyber attack, sustainability, environmental law and policy

25.

Defining Cybersecurity Due Diligence Under International Law: Lessons from the Private Sector

Volume on Ethics and Policies for Cyber Warfare (Oxford University Press, 2015), Kelley School of Business Research Paper No. 15-41
Number of pages: 30 Posted: 16 Apr 2015
Scott Shackelford, Scott Russell and Andreas Kuehn
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington - Center for Applied Cybersecurity Research and Syracuse University, School of Information Studies
Downloads 403 (108,399)

Abstract:

Loading...

26.

Building Common Approaches for Cybersecurity and Privacy in a Globalized World

Number of pages: 152 Posted: 24 Jan 2020
NYU Center for Cybersecurity (CCS), Humboldt University of Berlin, RAND Corporation, University of Passau, Indiana University - Kelley School of Business - Department of Business Law, George Washington University School of Law, University Grenoble-Alpes, CESICE, France. Senior Fellow Cross Border Data Forum & Future of Privacy Forum, Georgia Institute of Technology - Scheller College of Business, Columbia University, School for International and Public Affairs, Stiftung Neue Verantwortung, Alexander von Humboldt Institute for Internet and Society, Boston University - Department of Computer Science and Cisco Systems, Inc.
Downloads 399 (109,683)

Abstract:

Loading...

Cyber Security, Privacy, Data Protection, Transatlantic Relations, Internet

27.

Governing AI

Cornell Journal of Law and Policy, 2020
Number of pages: 64 Posted: 11 Nov 2019 Last Revised: 07 Apr 2020
Scott Shackelford and Rachel Dockery
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Maurer School of Law
Downloads 398 (109,995)

Abstract:

Loading...

artificial intelligence (AI), machine learning (ML), polycentric governance, China, EU, US

28.

Human Rights and Cybersecurity Due Diligence: A Comparative Study

University of Michigan Journal of Law Reform, Vol. 50, 2017, Kelley School of Business Research Paper No. 16-47
Number of pages: 28 Posted: 18 Jun 2016 Last Revised: 16 Sep 2017
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 390 (112,498)

Abstract:

Loading...

cybersecurity, cyber attack, human rights, Ruggie Framework, polycentric governance, Internet governance, due diligence

29.

The Law of Cyber Peace

Chicago Journal of International Law, 2017, Kelley School of Business Research Paper No. 16-56
Number of pages: 57 Posted: 09 Jul 2016 Last Revised: 12 Mar 2017
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 384 (114,545)
Citation 2

Abstract:

Loading...

cybersecurity, cyber attack, international law, norms, polycentric governance

30.

Securing North American Critical Infrastructure: A Comparative Case Study in Cybersecurity Regulation

Canada-US Law Journal, 2015, Forthcoming, Kelley School of Business Research Paper No. 15-24
Number of pages: 12 Posted: 11 Mar 2015
Scott Shackelford and Zachery Bohm
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Bloomington - Center for Applied Cybersecurity Research
Downloads 373 (118,316)
Citation 1

Abstract:

Loading...

cybersecurity, north america, cyber attack, NIST Framework, Canada, United States

31.

Smart Factories, Dumb Policy?: Managing Cybersecurity and Data Privacy Risks in the Industrial Internet of Things

Minnesota Journal of Law, Science & Technology, 2020, Kelley School of Business Research Paper No. 18-80
Number of pages: 36 Posted: 14 Oct 2018 Last Revised: 16 Jun 2019
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 369 (119,750)
Citation 2

Abstract:

Loading...

Cybersecurity, Internet of Things, Smart Factories, GDPR

32.

Technology, Ethics and Access to Justice: Should an Algorithm Be Deciding Your Case?

Michigan Journal of International Law, Vol. 35, No. XX, 2014, Kelley School of Business Research Paper No. 2014-42
Number of pages: 40 Posted: 12 Aug 2013 Last Revised: 13 Nov 2014
Anjanette Raymond and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 364 (121,604)
Citation 2

Abstract:

Loading...

33.

Governing the Final Frontier: A Polycentric Approach to Managing Space Weaponization and Orbital Debris

American Business Law Journal, Forthcoming
Number of pages: 60 Posted: 15 Dec 2011 Last Revised: 03 Jul 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 355 (124,996)
Citation 2

Abstract:

Loading...

Space Law, Orbital Debris, Space Junk, Space Weaponization, Polycentric, Common Heritage of Mankind, Sustainable Development

34.

Cybersecurity as Social Responsibility: Business, Music, and the Symphony of Cyber Peace

Indiana Law Journal, 2018, Kelley School of Business Research Paper No. 17-69
Number of pages: 20 Posted: 18 Sep 2017
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 339 (131,467)

Abstract:

Loading...

cybersecurity, corporate social responsibility, business, human rights, international law, due diligence, music

35.

Neither Magic Bullet Nor Lost Cause: Land Titling and the Wealth of Nations

21 New York University Environmental Law Journal 272 (2014)
Number of pages: 72 Posted: 28 Apr 2009 Last Revised: 06 Apr 2015
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 335 (133,176)

Abstract:

Loading...

Property, property rights, rule of law, development

36.

Holding States Accountable for the Ultimate Human Rights Abuse: A Review of the International Court of Justice Bosnian Genocide Case

Human Rights Brief, Vol. 11, No. 3, p. 30, 2007
Number of pages: 14 Posted: 08 May 2009
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 322 (138,869)

Abstract:

Loading...

Genocide, international tribunal, international court, international criminal law, incitement to genocide

37.

Toward Cyber Peace: Managing Cyber Attacks Through Polycentric Governance

American University Law Review, 2013
Number of pages: 75 Posted: 22 Aug 2012 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 318 (140,700)
Citation 4

Abstract:

Loading...

cybersecurity, cyber law, Internet governance, ICANN, IETF, ITU, polycentric

38.

Toward a State-Centric Cyber Peace? Analyzing the Role of National Cybersecurity Strategies in Enhancing Global Cybersecurity

New York University Journal of Legislation and Public Policy, 2016, Kelley School of Business Research Paper No. 15-4
Number of pages: 85 Posted: 29 Nov 2014 Last Revised: 12 May 2015
Scott Shackelford and Andraz Kastelic
Indiana University - Kelley School of Business - Department of Business Law and University of Sheffield - Law School
Downloads 307 (145,952)
Citation 3

Abstract:

Loading...

39.

Rethinking Active Defense: A Comparative Analysis of Proactive Cybersecurity Policymaking

University of Pennsylvania Journal of International Law, 2019
Number of pages: 44 Posted: 03 Jan 2019 Last Revised: 13 Mar 2019
Scott Shackelford, Danuvasin Charoen, Tristen Waite and Nancy Zhang
Indiana University - Kelley School of Business - Department of Business Law, National Institute of Development Administration (NIDA) - NIDA Business School, Maurer School of Law and Maurer School of Law
Downloads 274 (164,765)
Citation 1

Abstract:

Loading...

cybersecurity, active defense, proactive cybersecurity, China, Singapore, Australia, privacy, cyber risk insurance

40.

Risky Business: Lessons for Mitigating Cyber Attacks from the International Insurance Law on Piracy

Minnesota Journal of International Law Online (2015 Forthcoming)
Number of pages: 12 Posted: 14 Oct 2014
Scott Shackelford and Scott Russell
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Bloomington - Center for Applied Cybersecurity Research
Downloads 267 (168,485)

Abstract:

Loading...

cybersecurity, insurance, piracy, cyber attack, cyber threat, cyber risk insurance

41.

Cyber Threats to Business: Identifying and Responding to Digital Attacks

Number of pages: 80 Posted: 03 Nov 2022
Prairie View A&M University - College of Business, Indiana University - Kelley School of Business - Department of Business Law, University of West Florida and Northern Illinois University College of Law
Downloads 265 (169,697)

Abstract:

Loading...

Audit Committee, Board Structure, Corporate Governance, Crime, Cyber, Data Breach, DHS, Directors, Enterprise Risk Management, Hackers, Incentives, Information Technology, Internal Controls, Market Failure, National Security, NCCIC, NIST, Ormerod-Trautman Cybersecurity Efficiency Model, OWASP

42.

iGovernance: The Future of Multi-Stakeholder Internet Governance in the Wake of the Apple Encryption Saga

North Carolina Journal of International Law and Commercial Regulation, 2017 (Forthcoming), Kelley School of Business Research Paper No. 16-74
Number of pages: 42 Posted: 12 Oct 2016
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Maurer School of Law, Indiana University - Kelley School of Business - Department of Business Law, Harvard University - Harvard Kennedy School (HKS) and Syracuse University, School of Information Studies
Downloads 265 (169,697)
Citation 1

Abstract:

Loading...

cybersecurity, cyber attack, encryption, Apple

43.

Was Selden Right? The Expansion of Closed Seas and its Consequences

Stanford Journal of International Law, Vol. 47
Number of pages: 45 Posted: 02 Sep 2010 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 257 (175,038)

Abstract:

Loading...

EEZ, Continental Shelf, Common Heritage of Mankind, Grotius, Selden, Closed Seas, Open Seas, Arctic, Antarctica, Deep Seabed

44.

Have You Updated Your Toaster? Transatlantic Approaches to Governing the Internet of Everything

Hastings Law Journal, 2021, Kelley School of Business Research Paper No. 18-60
Number of pages: 51 Posted: 25 Jul 2018 Last Revised: 07 Apr 2020
Scott Shackelford and Scott O. Bradner
Indiana University - Kelley School of Business - Department of Business Law and Harvard University
Downloads 256 (175,691)

Abstract:

Loading...

Cybersecurity, Internet Of Things, GDPR, NIS Directive

45.

Defining 'Reasonable' Cybersecurity: Lessons from the States

Number of pages: 51 Posted: 10 Sep 2021 Last Revised: 25 Feb 2022
Scott Shackelford, Anne Boustead and Christos Makridis
Indiana University - Kelley School of Business - Department of Business Law, University of Arizona - School of Government and Public Policy and Stanford University
Downloads 254 (177,038)

Abstract:

Loading...

cybersecurity, safe harbor

46.

Building a Better HAL 9000: Algorithms, the Market, and the Need to Prevent the Engraining of Bias

Northwestern Journal of Technology and Intellectual Property, 2017, Kelley School of Business Research Paper No. 17-23
Number of pages: 42 Posted: 29 Mar 2017
Anjanette Raymond, Emma Young and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington and Indiana University - Kelley School of Business - Department of Business Law
Downloads 244 (184,072)

Abstract:

Loading...

Big Data, Cybersecurity, Polycentric Governance

47.

Defending Democracy: Taking Stock of the Global Fight Against Digital Repression, Disinformation, and Election Insecurity

77 WASH. & LEE L. REV. 1747 (2020) , Kelley School of Business Research Paper No. 2020-60
Number of pages: 64 Posted: 30 Mar 2020 Last Revised: 17 Mar 2021
Scott Shackelford, Anjanette Raymond, Abbey Stemler and Cyanne Loyle
Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Kelley School of Business - Department of Business Law and Pennsylvania State University - Department of Political Science
Downloads 236 (190,122)

Abstract:

Loading...

Democracy, Election Security, Hacking, Voting, China, Russia, Misinformation, Digital Repression

48.

Unpacking the Rise of Benefit Corporations: A Transatlantic Comparative Case Study

Virginia Journal of International Law, 2019, Kelley School of Business Research Paper No. 19-15
Number of pages: 46 Posted: 12 Feb 2019 Last Revised: 28 Mar 2019
Scott Shackelford, Janine S. Hiller and Xiao Ma
Indiana University - Kelley School of Business - Department of Business Law, Virginia Tech and King & Wood Mallesons
Downloads 210 (212,124)

Abstract:

Loading...

benefit corporations, BCorp, sustainability, human rights, CSR

49.

The Sport of Cybersecurity: How Professional Sports Leagues Can Better Protect the Competitive Integrity of Their Games

Boston College Law Review, 2020, Kelley School of Business Research Paper No. 19-14
Number of pages: 58 Posted: 13 Mar 2019 Last Revised: 28 Mar 2019
Nathaniel Grow and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 203 (218,893)

Abstract:

Loading...

sports, cybersecurity, NFL, NBA, NHL, MLB, trade secrets, critical infrastructure

50.

Paris, Panels, and Protectionism: Matching U.S. Rhetoric with Reality to Save the Planet

Vanderbilt Journal of Entertainment & Technology Law, 2016, Kelley School of Business Research Paper No. 16-19
Number of pages: 57 Posted: 13 Feb 2016 Last Revised: 02 Jun 2017
Abbey Stemler, Scott Shackelford and Eric Richards
Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Kelley School of Business - Department of Business Law and Indiana University Maurer School of Law
Downloads 194 (227,902)

Abstract:

Loading...

Sustainability, Trade Policy, China, WTO

51.

Global Health Governance: International Law and Public Health in a Divided World, by Aginam, Obijiofor

Stanford Journal of International Law, Vol. 43, No. 1
Number of pages: 6 Posted: 19 May 2009
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 193 (228,975)

Abstract:

Loading...

international public health, public health, world health organization, disease

52.

Securing the Internet of Healthcare

Minnesota Journal of Law, Science & Technology, 2018, Kelley School of Business Research Paper No. 18-16
Number of pages: 50 Posted: 24 Feb 2018 Last Revised: 04 Jun 2018
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Maurer School of Law, Indiana University, Indiana University Maurer School of Law, Indiana University Maurer School of Law and Indiana University Bloomington, Maruer School of Law, Students
Downloads 192 (230,047)
Citation 1

Abstract:

Loading...

medical device, cybersecurity, supply chain, blockchain, FDA

53.

Wargames: Analyzing the Act of War Exclusion in Cyber Risk Insurance Coverage and Its Implications for Cybersecurity Policy

Wargames: Analyzing the Act of War Exclusion in Insurance Coverage and its Implications for Cybersecurity Policy, __ YALE JOURNAL OF LAW AND TECHNOLOGY __ (Forthcoming 2021).
Number of pages: 66 Posted: 14 Dec 2020 Last Revised: 10 Mar 2021
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 185 (237,600)

Abstract:

Loading...

cybersecurity, cyber risk insurance, act of war exclusion, ransomware, attribution

54.

Rhetoric versus Reality: U.S. Resistance to Global Trade Rules and the Implications for Cybersecurity and Internet Governance

Eric L. Richards, Scott J. Shackelford, & Abbey Stemler, Rhetoric Versus Reality: U.S. Resistance to Global Trade Rules and the Implications for Cybersecurity and Internet Governance, 24 MINN. J. INT’L L. 159 (2015).
Number of pages: 15 Posted: 14 Oct 2014 Last Revised: 02 Nov 2018
Eric Richards, Scott Shackelford and Abbey Stemler
Indiana University Maurer School of Law, Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 182 (241,002)

Abstract:

Loading...

international trade, cybersecurity, cyber attack, international law, Internet governance

55.

Inside the Global Drive for Cyber Peace

Number of pages: 47 Posted: 11 May 2020
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 174 (250,427)

Abstract:

Loading...

cyber peace, cybersecurity, cyber attack, Internet governance, polycentric, sustainable development

56.

The Future of Frontiers

Lewis & Clark Law Review, 2019, Kelley School of Business Research Paper No. 19-12
Number of pages: 72 Posted: 30 Jan 2019 Last Revised: 28 Mar 2019
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 168 (258,012)

Abstract:

Loading...

Cybersecurity, Internet Governance, Global Commons, Frontiers, Common Heritage of Mankind, Polycentric

57.

How Businesses Can Promote Cyber Peace

University of Pennsylvania Journal of International Law, 2015, Kelley School of Business Research Paper No. 2014-27
Number of pages: 88 Posted: 10 Feb 2014 Last Revised: 26 Aug 2014
Scott Shackelford, Timothy L. Fort and Jamie Darin Prenkert
Indiana University - Kelley School of Business - Department of Business Law, George Washington University - Department of Strategic Management & Public Policy and Indiana University - Kelley School of Business - Department of Business Law
Downloads 161 (267,382)
Citation 2

Abstract:

Loading...

cybersecurity, polycentric governance, business and human rights, cyber peace, mediating institutions

58.

Using BITs to Protect Bytes: Promoting Cyber Peace by Safeguarding Trade Secrets through Bilateral Investment Treaties

American Business Law Journal, 2015
Number of pages: 65 Posted: 14 Sep 2013 Last Revised: 27 Jun 2014
Scott Shackelford, Eric Richards, Anjanette Raymond and Amanda Craig
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Maurer School of Law, Indiana University - Kelley School of Business - Department of Business Law and Indiana University Maurer School of Law
Downloads 153 (278,685)
Citation 2

Abstract:

Loading...

bilateral investment treaty, international trade, cyber attacks, cybersecurity, China

59.

Governing the Internet of Everything

Cardozo Arts & Entertainment Law Journal, 2019, Kelley School of Business Research Paper No. 18-86
Number of pages: 37 Posted: 05 Nov 2018 Last Revised: 16 Jun 2019
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 144 (292,717)

Abstract:

Loading...

Internet of Things, Blockchain, Cybersecurity

60.

Hacking the Planet, the Dalai Lama, and You: Managing Technical Vulnerabilities in the Internet Through Polycentric Governance

Fordham Intellectual Property, Media & Entertainment Law Journal, Vol. 24, p. 381, Winter 2014, Indiana Legal Studies Research Paper No. 292
Number of pages: 35 Posted: 07 Jun 2014 Last Revised: 15 Jul 2014
Amanda Craig and Scott Shackelford
Indiana University Maurer School of Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 141 (297,686)
Citation 1

Abstract:

Loading...

cybersecurity, Internet governance, polycentric governance

61.

On Climate Change and Cyber Attacks: Leveraging Polycentric Governance to Mitigate Global Collective Action Problems

Vanderbilt Journal of Entertainment & Technology Law, 2016, Kelley School of Business Research Paper No. 15-54
Number of pages: 51 Posted: 15 Jul 2015 Last Revised: 05 Oct 2015
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 132 (314,978)
Citation 7

Abstract:

Loading...

cybersecurity, climate change, cyber attack, Kyoto Protocol, UNFCCC, Montreal Protocol, sustainability

62.

Above the Cloud: Enhancing Cybersecurity in the Aerospace Sector

Florida International University Law Review, 2015, Forthcoming
Number of pages: 33 Posted: 23 Oct 2014
Scott Shackelford and Scott Russell
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Bloomington - Center for Applied Cybersecurity Research
Downloads 123 (329,921)

Abstract:

Loading...

cybersecurity, aerospace, space, aviation, NIST Framework, cyber attack, trade secrets

63.

The Angel on Your Shoulder: Prompting Employees to Do the Right Thing Through the Use of Wearables

Northwestern University Journal of Technology and Intellectual Property, Forthcoming, Kelley School of Business Research Paper No. 15-67
Number of pages: 40 Posted: 17 Sep 2015 Last Revised: 07 Oct 2015
Timothy Fort, Anjanette Raymond and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 121 (333,806)
Citation 1

Abstract:

Loading...

64.

Review of Cyber Operations Strategies of the United States and Canadian Governments: A Comparative Analysis

UNIDIR Paper Series (International Cyber Operations - National Capabilities and Doctrines), 2020
Number of pages: 19 Posted: 15 Jan 2021
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 120 (335,771)

Abstract:

Loading...

cybersecurity, defend forward, critical infrastructure, cyber norms

65.

Businesses and Cyber Peace: We Need You!

Business Horizons, 2016, Kelley School of Business Research Paper No. 16-30
Number of pages: 26 Posted: 28 Mar 2016
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 119 (337,827)

Abstract:

Loading...

cybersecurity, cyber risk management, cyber attack, enterprise risk management

66.

Should We Trust a Black Box to Safeguard Human Rights? a Comparative Analysis of Ai Governance

UCLA Journal of International Law and Foreign Affairs, 2021
Number of pages: 53 Posted: 12 Feb 2021
Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Hamilton Lugar School of Global and International Studies, Indiana University Maurer School of Law, Indiana University - Kelley School of Business - Department of Business Law and Indiana University Bloomington
Downloads 114 (348,143)

Abstract:

Loading...

artificial intelligence (AI), governance, cybersecurity, data governance

67.

Jury Glasses: Wearable Technology and its Role in Crowdsourcing Justice

Cardozo Journal of Conflict Resolution (2015 Forthcoming)
Number of pages: 37 Posted: 06 Mar 2015
Anjanette Raymond and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 113 (350,321)

Abstract:

Loading...

immersive technology, wearable technology, dispute resolution, juror bias, Google Glass

68.

Business, Human Rights, and the Promise of Polycentricity

Vanderbilt Journal of Transnational Law, Vol. 47, 2014
Number of pages: 41 Posted: 07 Jun 2014
Jamie Darin Prenkert and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 103 (373,146)
Citation 1

Abstract:

Loading...

human rights, business, polycentric governance

69.

Cyber Silent Spring: Leveraging ESG+T Frameworks and Trustmarks to Better Inform Investors and Consumers about the Sustainability, Cybersecurity, and Privacy of Internet-Connected Devices

Kelley School of Business Research Paper No. 2022-01
Number of pages: 50 Posted: 11 Jan 2022
Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Kelley School of Business and GEC Risk Advisory
Downloads 70 (469,881)

Abstract:

Loading...

cybersecurity, ESG, sustainability, SEC, NIST

70.

The Firm and Common Pool Resource Theory: Understanding the Rise of Benefit Corporations

Forthcoming, in Volume 55.1 of the American Business Law Journal , Kelley School of Business Research Paper No. 18-5
Number of pages: 34 Posted: 10 Jan 2018 Last Revised: 24 Jan 2018
Janine S. Hiller and Scott Shackelford
Virginia Tech and Indiana University - Kelley School of Business - Department of Business Law
Downloads 67 (480,721)

Abstract:

Loading...

benefit corporation, corporate governance, common pool resource

71.

Strategies for Boosting Cybersecurity

Number of pages: 58 Posted: 21 Jun 2022
Janine S. Hiller, Kathryn Kisska-Schulze and Scott Shackelford
Virginia Tech, Clemson University College of Business and Indiana University - Kelley School of Business - Department of Business Law
Downloads 50 (551,609)

Abstract:

Loading...

Cybersecurity, tax, risk management, cyberattack