Scott Shackelford

Indiana University - Kelley School of Business - Department of Business Law

Provost Professor of Business Law and Ethics

Bloomington, IN 47405

United States

Harvard Kennedy School Belfer Center for Science & International Affairs

Research Fellow

79 JFK Street

Cambridge, MA 02138

United States

Center for Applied Cybersecurity Research

Senior Fellow

Wylie Hall 105

100 South Woodlawn

Bloomington, IN 47405

United States

Stanford Center for Internet and Society

Affiliate Scholar

Palo Alto, CA

United States

Stanford Law School

Visiting Scholar

Stanford, CA 94305

United States

SCHOLARLY PAPERS

74

DOWNLOADS
Rank 1,372

SSRN RANKINGS

Top 1,372

in Total Papers Downloads

38,187

SSRN CITATIONS
Rank 12,376

SSRN RANKINGS

Top 12,376

in Total Papers Citations

77

CROSSREF CITATIONS

53

Scholarly Papers (74)

1.

From Nuclear War to Net War: Analogizing Cyber Attacks in International Law

Berkley Journal of International Law (BJIL), Vol. 25, No. 3, 2009
Number of pages: 60 Posted: 04 May 2009
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 3,495 (6,603)
Citation 2

Abstract:

Loading...

Cyber law, cyber attack, public international law, humanitarian law, human rights, nuclear war, law of the sea, outer space

2.

The Tragedy of the Common Heritage of Mankind

Stanford Environmental Law Journal, Vol. 27, 2008, Stanford Public Law Working Paper No. 1407332
Number of pages: 57 Posted: 25 May 2009 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 2,107 (14,720)

Abstract:

Loading...

public good, common resource, international law, common heritage, arctic, law of the sea, outer space

3.

Toward a Global Cybersecurity Standard of Care? Exploring the Implications of the 2014 NIST Cybersecurity Framework on Shaping Reasonable National and International Cybersecurity Practices

Texas International Law Journal, 2015, Indiana Legal Studies Research Paper No. 291
Number of pages: 59 Posted: 07 Jun 2014 Last Revised: 15 Jul 2014
Indiana University - Kelley School of Business - Department of Business Law, Seton Hall Law SchoolIndiana University Bloomington - Center for Applied Cybersecurity Research, Indiana University Bloomington and Indiana University Maurer School of Law
Downloads 1,637 (21,896)
Citation 3

Abstract:

Loading...

cybersecurity, NIST, critical infrastructure

4.

Estonia Two-and-A-Half Years Later: A Progress Report on Combating Cyber Attacks

Journal of Internet Law, Forthcoming
Number of pages: 12 Posted: 10 Feb 2010
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 1,297 (31,040)

Abstract:

Loading...

cyber attack, hacker, internet, cyberspace, internet law, NATO, international law

5.

Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis

American Business Law Journal, 2015
Number of pages: 63 Posted: 06 Mar 2015 Last Revised: 10 Mar 2015
Amanda Craig, Scott Shackelford and Janine S. Hiller
Indiana University Maurer School of Law, Indiana University - Kelley School of Business - Department of Business Law and Virginia Tech
Downloads 1,227 (33,560)
Citation 3

Abstract:

Loading...

cybersecurity, active defense, hack back, international law, comparative law, polycentric governance

6.

Making Democracy Harder to Hack: Should Elections Be Classified as ‘Critical Infrastructure?’

University of Michigan Journal of Law Reform, 2017, Kelley School of Business Research Paper No. 16-75
Number of pages: 40 Posted: 19 Oct 2016 Last Revised: 17 Nov 2016
Indiana University - Kelley School of Business - Department of Business Law, Harvard University - Berkman Klein Center for Internet & Society, Harvard University, Harvard Kennedy School (HKS), Belfer Center for Science and International Affairs (BCSIA), University of Arizona - School of Government and Public Policy, Harvard University, Harvard Kennedy School (HKS), Belfer Center for Science and International Affairs (BCSIA), Indiana University Maurer School of Law, American University - School of International Service and Government of the United States of America - US Air War College
Downloads 1,177 (35,606)
Citation 1

Abstract:

Loading...

cybersecurity, cyber attack, election, voting, critical infrastructure

7.

Beyond the New 'Digital Divide': Analyzing the Evolving Role of National Governments in Internet Governance and Enhancing Cybersecurity

Stanford Journal of International Law, Vol. 50, p. 119, Winter 2014, Indiana Legal Studies Research Paper No. 290
Number of pages: 66 Posted: 07 Jun 2014 Last Revised: 15 Jul 2014
Scott Shackelford and Amanda Craig
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Maurer School of Law
Downloads 1,177 (35,606)
Citation 2

Abstract:

Loading...

8.

Investment Treaty Arbitration and Public Law, by Gus Van Harten

Stanford Journal of International Law, Vol. 92, No. 1
Number of pages: 7 Posted: 19 May 2009
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 1,118 (38,304)

Abstract:

Loading...

investment treaty arbitration; international arbitration; public international law

9.

Unpacking the International Law on Cybersecurity Due Diligence: Lessons from the Public and Private Sectors

Chicago Journal of International Law, 2016, Kelley School of Business Research Paper No. 15-64
Number of pages: 49 Posted: 29 Aug 2015 Last Revised: 05 Oct 2015
Scott Shackelford, Scott Russell and Andreas Kuehn
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington - Center for Applied Cybersecurity Research and Syracuse University, School of Information Studies
Downloads 972 (46,801)
Citation 10

Abstract:

Loading...

cybersecurity, cyber attack, due diligence, international law

10.

Is it Time for a National Cybersecurity Safety Board?

Albany Law Journal of Science and Technology, 2018, Kelley School of Business Research Paper No. 18-34
Number of pages: 18 Posted: 31 Jan 2018 Last Revised: 29 Apr 2018
Scott Shackelford and Austin E. Brady
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Maurer School of Law
Downloads 835 (57,696)

Abstract:

Loading...

11.

Should Cybersecurity Be a Human Right? Exploring the ‘Shared Responsibility’ of Cyber Peace

Stanford Journal of International Law No. 2019, Kelley School of Business Research Paper No. 17-55
Number of pages: 46 Posted: 21 Jul 2017 Last Revised: 07 Mar 2019
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 785 (62,686)

Abstract:

Loading...

cybersecurity, corporate social responsibility, business, human rights, international law

12.

Block-by-Block: Leveraging the Power of Blockchain Technology to Build Trust and Promote Cyber Peace

Yale Journal of Law and Technology (2017 Forthcoming), Kelley School of Business Research Paper No. 16-85
Number of pages: 55 Posted: 23 Nov 2016 Last Revised: 12 Mar 2017
Scott Shackelford and Steven Myers
Indiana University - Kelley School of Business - Department of Business Law and Indiana University
Downloads 778 (63,424)
Citation 8

Abstract:

Loading...

blockchain, Bitcoin, cybersecurity, cyber attack, polycentric governance, cyber peace

13.

How We Learned to Stop Worrying and Love AI: Analyzing the Rapid Evolution of Generative Pre-Trained Transformer (GPT) and its Impacts on Law, Business, and Society

Number of pages: 77 Posted: 22 Jul 2023 Last Revised: 11 Sep 2023
Lawrence J. Trautman, W. Gregory Voss and Scott Shackelford
Prairie View A&M University - College of Business, TBS Business School and Indiana University - Kelley School of Business - Department of Business Law
Downloads 754 (66,288)
Citation 10

Abstract:

Loading...

AGI, AI, Alphabet, Anthropic, artificial intelligence, Bard, Bing, C3.ai, chatbots, ChatGPT, China, CHIPS and Science Act, corporate governance, cybersecurity, deep fakes, deep learning, disruptive technologies, European Union, EUV, extreme-ultraviolet lithography, generation, generative, Google, Ge

14.

Understanding Cyber Risk: Unpacking and Responding to Cyber Threats Facing the Public and Private Sectors

University of Miami Law Review, Vol. 78, (2024)
Number of pages: 78 Posted: 03 Nov 2022 Last Revised: 13 May 2024
Prairie View A&M University - College of Business, Indiana University - Kelley School of Business - Department of Business Law, University of West Florida and Northern Illinois University College of Law
Downloads 739 (67,835)
Citation 1

Abstract:

Loading...

Audit Committee, Board Structure, Corporate Governance, Crime, Cyber, Data Breach, DHS, Directors, Enterprise Risk Management, Hackers, Incentives, Information Technology, Internal Controls, Market Failure, National Security, NCCIC, NIST, Ormerod-Trautman Cybersecurity Efficiency Model, OWASP

15.

Should Your Firm Invest in Cyber Risk Insurance?

Business Horizons, 2012
Number of pages: 20 Posted: 15 Dec 2011
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 717 (70,566)
Citation 3

Abstract:

Loading...

Cybersecurity, Internet, Cyber Risk Insurance, Cyber Attack, Data Breach, Cyber Law

16.

Bottoms Up: A Comparison of Voluntary Cybersecurity Frameworks

UC Davis Business Law Journal, 2016, Forthcoming, Kelley School of Business Research Paper No. 16-2
Number of pages: 39 Posted: 12 Dec 2015
Scott Shackelford, Scott Russell and Jeffrey Haut
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington - Center for Applied Cybersecurity Research and Indiana University Maurer School of Law
Downloads 619 (84,930)

Abstract:

Loading...

cybersecurity, cyber attack, international law, comparative law

17.

Operationalizing Cybersecurity Due Diligence: A Transatlantic Comparative Case Study

South Carolina Law Review, 2016, Kelley School of Business Research Paper No. 16-16
Number of pages: 28 Posted: 14 Jan 2016
Scott Shackelford and Scott Russell
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Bloomington - Center for Applied Cybersecurity Research
Downloads 603 (87,778)

Abstract:

Loading...

cybersecurity, NIS Directive, General Data Privacy Regulation, EU data privacy, Cybersecurity Act of 2015, cyber attack

18.

Book Review of Habeas Corpus Writ of Liberty: English and American Origins and Development, by Robert Searles Walker, Ph.D

Cleveland State Law Review, Vol. 57, No. 3, 2009
Number of pages: 14 Posted: 30 Apr 2009 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 574 (93,452)
Citation 2

Abstract:

Loading...

habeas corpus, constitutional, comparative, england

19.

Fragile Merchandise: A Comparative Analysis of the Privacy Rights for Public Figures

American Business Law Journal, 2012
Number of pages: 111 Posted: 05 May 2009 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 564 (95,548)
Citation 1

Abstract:

Loading...

Privacy, comparative law, public figure, media, first amendment

20.

Governing AI

Cornell Journal of Law and Policy, 2020
Number of pages: 64 Posted: 11 Nov 2019 Last Revised: 07 Apr 2020
Scott Shackelford and Rachel Dockery
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Maurer School of Law
Downloads 558 (96,848)

Abstract:

Loading...

artificial intelligence (AI), machine learning (ML), polycentric governance, China, EU, US

21.

Building the Virtual Courthouse: Ethical Considerations for Design, Implementation, and Regulation in the World of ODR

Wisconsin Law Review, 2014, Kelley School of Business Research Paper No. 2014-10
Number of pages: 52 Posted: 31 Jan 2014 Last Revised: 26 Aug 2014
Scott Shackelford and Anjanette Raymond
Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 554 (97,747)
Citation 5

Abstract:

Loading...

online dispute resolution, alternative dispute resolution, polycentric governance

22.

Protecting Intellectual Property and Privacy in the Digital Age: The Use of National Cybersecurity Strategies to Mitigate Cyber Risk

Chapman Law Review, 2016 Forthcoming, Kelley School of Business Research Paper No. 15-56
Number of pages: 33 Posted: 24 Jul 2015
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 546 (99,595)
Citation 7

Abstract:

Loading...

cybersecurity, cyber attack, privacy, espionage, NIST Framework

23.

Building Common Approaches for Cybersecurity and Privacy in a Globalized World

Number of pages: 152 Posted: 24 Jan 2020
NYU Center for Cybersecurity (CCS), Humboldt University of Berlin, RAND Corporation, University of Passau, Indiana University - Kelley School of Business - Department of Business Law, George Washington University School of Law, University Grenoble-Alpes, CESICE, France. Senior Fellow Cross Border Data Forum & Future of Privacy Forum, Georgia Institute of Technology - Scheller College of Business, Columbia University, School for International and Public Affairs, Stiftung Neue Verantwortung, Alexander von Humboldt Institute for Internet and Society, Boston University - Department of Computer Science and Cisco Systems, Inc.
Downloads 530 (103,260)
Citation 1

Abstract:

Loading...

Cyber Security, Privacy, Data Protection, Transatlantic Relations, Internet

24.

When Toasters Attack: A Polycentric Approach to Enhancing the ‘Security of Things’

University of Illinois Law Review, 2017, Forthcoming, Kelley School of Business Research Paper No. 16-6
Number of pages: 54 Posted: 16 Jan 2016 Last Revised: 03 Mar 2016
Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington and Indiana University Bloomington
Downloads 523 (104,940)
Citation 7

Abstract:

Loading...

cybersecurity, cyber attack, Internet of Things

25.

In the Name of Efficiency: The Role of Permanent Lok Adalats in the Indian Justice System and Power Infrastructure

Manoj Kumar Sinha, GLOBAL GOVERNANCE, DEVELOPMENT AND HUMAN RIGHTS, 2008
Number of pages: 49 Posted: 02 May 2009 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 518 (106,206)

Abstract:

Loading...

Arbitration, Alternative Dispute Resolution, India, Energy Policy, Infrastructure

26.

Sustainable Cybersecurity: Applying Lessons from the Green Movement to Managing Cyber Attacks

University of Illinois Law Review, Vol. 2016, 2016
Number of pages: 42 Posted: 14 Sep 2013 Last Revised: 05 Mar 2015
Scott Shackelford and Timothy L. Fort
Indiana University - Kelley School of Business - Department of Business Law and George Washington University - Department of Strategic Management & Public Policy
Downloads 484 (115,243)
Citation 2

Abstract:

Loading...

corporate social responsibility, cybersecurity, cyber attack, sustainability, environmental law and policy

27.

Technology, Ethics and Access to Justice: Should an Algorithm Be Deciding Your Case?

Michigan Journal of International Law, Vol. 35, No. XX, 2014, Kelley School of Business Research Paper No. 2014-42
Number of pages: 40 Posted: 12 Aug 2013 Last Revised: 13 Nov 2014
Anjanette Raymond and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 481 (116,106)
Citation 2

Abstract:

Loading...

28.

From Russia with Love: Understanding the Russian Cyber Threat to U.S. Critical Infrastructure and What to Do about It

Nebraska Law Review, Vol. 96, 2017, Kelley School of Business Research Paper No. 17-42
Number of pages: 19 Posted: 02 Jun 2017 Last Revised: 03 Dec 2017
Indiana University - Kelley School of Business - Department of Business Law, Harvard University, Harvard Kennedy School (HKS), Belfer Center for Science and International Affairs (BCSIA), Indiana University Maurer School of Law, Harvard University, Harvard Kennedy School (HKS), Belfer Center for Science and International Affairs (BCSIA) and Indiana University Bloomington, Mauer School of Law, Students
Downloads 472 (118,784)
Citation 1

Abstract:

Loading...

Cybersecurity, Critical Infrastructure, Cyber Attack, Russia, NIST Cybersecurity Framework

29.

Seeking a Safe Harbor in a Widening Sea: Unpacking the EJC's Schrems Decision and What it Means for Transatlantic Relations

Seton Hall Journal of Diplomacy and International Relations, 2016, Forthcoming, Kelley School of Business Research Paper No. 15-78
Number of pages: 8 Posted: 26 Oct 2015
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 454 (124,342)

Abstract:

Loading...

cybersecurity, privacy, Safe Harbor, Internet governance

30.

Cybersecurity as Social Responsibility: Business, Music, and the Symphony of Cyber Peace

Indiana Law Journal, 2018, Kelley School of Business Research Paper No. 17-69
Number of pages: 20 Posted: 18 Sep 2017
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 443 (128,022)

Abstract:

Loading...

cybersecurity, corporate social responsibility, business, human rights, international law, due diligence, music

31.

Defining Cybersecurity Due Diligence Under International Law: Lessons from the Private Sector

Volume on Ethics and Policies for Cyber Warfare (Oxford University Press, 2015), Kelley School of Business Research Paper No. 15-41
Number of pages: 30 Posted: 16 Apr 2015
Scott Shackelford, Scott Russell and Andreas Kuehn
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington - Center for Applied Cybersecurity Research and Syracuse University, School of Information Studies
Downloads 428 (133,223)

Abstract:

Loading...

32.

The Law of Cyber Peace

Chicago Journal of International Law, 2017, Kelley School of Business Research Paper No. 16-56
Number of pages: 57 Posted: 09 Jul 2016 Last Revised: 12 Mar 2017
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 427 (133,570)
Citation 2

Abstract:

Loading...

cybersecurity, cyber attack, international law, norms, polycentric governance

33.

Human Rights and Cybersecurity Due Diligence: A Comparative Study

University of Michigan Journal of Law Reform, Vol. 50, 2017, Kelley School of Business Research Paper No. 16-47
Number of pages: 28 Posted: 18 Jun 2016 Last Revised: 16 Sep 2017
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 422 (135,442)

Abstract:

Loading...

cybersecurity, cyber attack, human rights, Ruggie Framework, polycentric governance, Internet governance, due diligence

34.

Smart Factories, Dumb Policy?: Managing Cybersecurity and Data Privacy Risks in the Industrial Internet of Things

Minnesota Journal of Law, Science & Technology, 2020, Kelley School of Business Research Paper No. 18-80
Number of pages: 36 Posted: 14 Oct 2018 Last Revised: 16 Jun 2019
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 419 (136,594)
Citation 2

Abstract:

Loading...

Cybersecurity, Internet of Things, Smart Factories, GDPR

35.

Securing North American Critical Infrastructure: A Comparative Case Study in Cybersecurity Regulation

Canada-US Law Journal, 2015, Forthcoming, Kelley School of Business Research Paper No. 15-24
Number of pages: 12 Posted: 11 Mar 2015
Scott Shackelford and Zachery Bohm
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Bloomington - Center for Applied Cybersecurity Research
Downloads 417 (137,332)
Citation 1

Abstract:

Loading...

cybersecurity, north america, cyber attack, NIST Framework, Canada, United States

36.

Defining 'Reasonable' Cybersecurity: Lessons from the States

Number of pages: 51 Posted: 10 Sep 2021 Last Revised: 25 Feb 2022
Scott Shackelford, Anne Boustead and Christos Makridis
Indiana University - Kelley School of Business - Department of Business Law, University of Arizona - School of Government and Public Policy and Stanford University
Downloads 395 (146,159)
Citation 1

Abstract:

Loading...

cybersecurity, safe harbor

37.

Governing the Final Frontier: A Polycentric Approach to Managing Space Weaponization and Orbital Debris

American Business Law Journal, Forthcoming
Number of pages: 60 Posted: 15 Dec 2011 Last Revised: 03 Jul 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 393 (146,986)
Citation 2

Abstract:

Loading...

Space Law, Orbital Debris, Space Junk, Space Weaponization, Polycentric, Common Heritage of Mankind, Sustainable Development

38.

Toward Cyber Peace: Managing Cyber Attacks Through Polycentric Governance

American University Law Review, 2013
Number of pages: 75 Posted: 22 Aug 2012 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 387 (149,548)
Citation 5

Abstract:

Loading...

cybersecurity, cyber law, Internet governance, ICANN, IETF, ITU, polycentric

39.

Holding States Accountable for the Ultimate Human Rights Abuse: A Review of the International Court of Justice Bosnian Genocide Case

Human Rights Brief, Vol. 11, No. 3, p. 30, 2007
Number of pages: 14 Posted: 08 May 2009
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 373 (155,894)

Abstract:

Loading...

Genocide, international tribunal, international court, international criminal law, incitement to genocide

40.

Neither Magic Bullet Nor Lost Cause: Land Titling and the Wealth of Nations

21 New York University Environmental Law Journal 272 (2014)
Number of pages: 72 Posted: 28 Apr 2009 Last Revised: 06 Apr 2015
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 370 (157,689)

Abstract:

Loading...

Property, property rights, rule of law, development

41.

Toward a State-Centric Cyber Peace? Analyzing the Role of National Cybersecurity Strategies in Enhancing Global Cybersecurity

New York University Journal of Legislation and Public Policy, 2016, Kelley School of Business Research Paper No. 15-4
Number of pages: 85 Posted: 29 Nov 2014 Last Revised: 12 May 2015
Scott Shackelford and Andraz Kastelic
Indiana University - Kelley School of Business - Department of Business Law and University of Sheffield - Law School
Downloads 349 (167,587)
Citation 3

Abstract:

Loading...

42.

iGovernance: The Future of Multi-Stakeholder Internet Governance in the Wake of the Apple Encryption Saga

North Carolina Journal of International Law and Commercial Regulation, 2017 (Forthcoming), Kelley School of Business Research Paper No. 16-74
Number of pages: 42 Posted: 12 Oct 2016
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Maurer School of Law, Indiana University - Kelley School of Business - Department of Business Law, Harvard University - Harvard Kennedy School (HKS) and Syracuse University, School of Information Studies
Downloads 332 (177,421)
Citation 1

Abstract:

Loading...

cybersecurity, cyber attack, encryption, Apple

43.

Rethinking Active Defense: A Comparative Analysis of Proactive Cybersecurity Policymaking

University of Pennsylvania Journal of International Law, 2019
Number of pages: 44 Posted: 03 Jan 2019 Last Revised: 13 Mar 2019
Scott Shackelford, Danuvasin Charoen, Tristen Waite and Nancy Zhang
Indiana University - Kelley School of Business - Department of Business Law, National Institute of Development Administration (NIDA) - NIDA Business School, Maurer School of Law and Maurer School of Law
Downloads 329 (178,576)
Citation 1

Abstract:

Loading...

cybersecurity, active defense, proactive cybersecurity, China, Singapore, Australia, privacy, cyber risk insurance

44.

Risky Business: Lessons for Mitigating Cyber Attacks from the International Insurance Law on Piracy

Minnesota Journal of International Law Online (2015 Forthcoming)
Number of pages: 12 Posted: 14 Oct 2014
Scott Shackelford and Scott Russell
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Bloomington - Center for Applied Cybersecurity Research
Downloads 311 (189,453)

Abstract:

Loading...

cybersecurity, insurance, piracy, cyber attack, cyber threat, cyber risk insurance

45.

The Sport of Cybersecurity: How Professional Sports Leagues Can Better Protect the Competitive Integrity of Their Games

Boston College Law Review, 2020, Kelley School of Business Research Paper No. 19-14
Number of pages: 58 Posted: 13 Mar 2019 Last Revised: 28 Mar 2019
Nathaniel Grow and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 300 (197,573)

Abstract:

Loading...

sports, cybersecurity, NFL, NBA, NHL, MLB, trade secrets, critical infrastructure

46.

Unpacking the Rise of Benefit Corporations: A Transatlantic Comparative Case Study

Virginia Journal of International Law, 2019, Kelley School of Business Research Paper No. 19-15
Number of pages: 46 Posted: 12 Feb 2019 Last Revised: 28 Mar 2019
Scott Shackelford, Janine S. Hiller and Xiao Ma
Indiana University - Kelley School of Business - Department of Business Law, Virginia Tech and King & Wood Mallesons
Downloads 287 (206,176)

Abstract:

Loading...

benefit corporations, BCorp, sustainability, human rights, CSR

47.

Have You Updated Your Toaster? Transatlantic Approaches to Governing the Internet of Everything

Hastings Law Journal, 2021, Kelley School of Business Research Paper No. 18-60
Number of pages: 51 Posted: 25 Jul 2018 Last Revised: 07 Apr 2020
Scott Shackelford and Scott O. Bradner
Indiana University - Kelley School of Business - Department of Business Law and Harvard University
Downloads 285 (207,733)

Abstract:

Loading...

Cybersecurity, Internet Of Things, GDPR, NIS Directive

48.

Defending Democracy: Taking Stock of the Global Fight Against Digital Repression, Disinformation, and Election Insecurity

77 WASH. & LEE L. REV. 1747 (2020) , Kelley School of Business Research Paper No. 2020-60
Number of pages: 64 Posted: 30 Mar 2020 Last Revised: 17 Mar 2021
Scott Shackelford, Anjanette Raymond, Abbey Stemler and Cyanne Loyle
Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Kelley School of Business - Department of Business Law and Pennsylvania State University - Department of Political Science
Downloads 280 (211,490)

Abstract:

Loading...

Democracy, Election Security, Hacking, Voting, China, Russia, Misinformation, Digital Repression

49.

Building a Better HAL 9000: Algorithms, the Market, and the Need to Prevent the Engraining of Bias

Northwestern Journal of Technology and Intellectual Property, 2017, Kelley School of Business Research Paper No. 17-23
Number of pages: 42 Posted: 29 Mar 2017
Anjanette Raymond, Emma Young and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington and Indiana University - Kelley School of Business - Department of Business Law
Downloads 276 (214,721)
Citation 1

Abstract:

Loading...

Big Data, Cybersecurity, Polycentric Governance

50.

Was Selden Right? The Expansion of Closed Seas and its Consequences

Stanford Journal of International Law, Vol. 47
Number of pages: 45 Posted: 02 Sep 2010 Last Revised: 13 May 2014
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 276 (214,721)

Abstract:

Loading...

EEZ, Continental Shelf, Common Heritage of Mankind, Grotius, Selden, Closed Seas, Open Seas, Arctic, Antarctica, Deep Seabed

51.

Cybersecurity Carrots and Sticks

61 American Business Law Journal 5 (2024)
Number of pages: 25 Posted: 19 Jan 2023 Last Revised: 24 May 2024
Janine S. Hiller, Kathryn Kisska-Schulze and Scott Shackelford
Virginia Tech, Clemson University College of Business and Indiana University - Kelley School of Business - Department of Business Law
Downloads 272 (217,910)

Abstract:

Loading...

cybersecurity, tax, policy, risk management

52.

Wargames: Analyzing the Act of War Exclusion in Cyber Risk Insurance Coverage and Its Implications for Cybersecurity Policy

Wargames: Analyzing the Act of War Exclusion in Insurance Coverage and its Implications for Cybersecurity Policy, __ YALE JOURNAL OF LAW AND TECHNOLOGY __ (Forthcoming 2021).
Number of pages: 66 Posted: 14 Dec 2020 Last Revised: 10 Mar 2021
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 231 (255,855)

Abstract:

Loading...

cybersecurity, cyber risk insurance, act of war exclusion, ransomware, attribution

53.

Securing the Internet of Healthcare

Minnesota Journal of Law, Science & Technology, 2018, Kelley School of Business Research Paper No. 18-16
Number of pages: 50 Posted: 24 Feb 2018 Last Revised: 04 Jun 2018
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Maurer School of Law (Bloomington), Indiana University, Indiana University Maurer School of Law, Indiana University Maurer School of Law and Indiana University Bloomington, Maruer School of Law, Students
Downloads 230 (256,919)
Citation 1

Abstract:

Loading...

medical device, cybersecurity, supply chain, blockchain, FDA

54.

Paris, Panels, and Protectionism: Matching U.S. Rhetoric with Reality to Save the Planet

Vanderbilt Journal of Entertainment & Technology Law, 2016, Kelley School of Business Research Paper No. 16-19
Number of pages: 57 Posted: 13 Feb 2016 Last Revised: 02 Jun 2017
Abbey Stemler, Scott Shackelford and Eric Richards
Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Kelley School of Business - Department of Business Law and Indiana University Maurer School of Law
Downloads 223 (264,556)

Abstract:

Loading...

Sustainability, Trade Policy, China, WTO

55.

Global Health Governance: International Law and Public Health in a Divided World, by Aginam, Obijiofor

Stanford Journal of International Law, Vol. 43, No. 1
Number of pages: 6 Posted: 19 May 2009
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 223 (264,556)

Abstract:

Loading...

international public health, public health, world health organization, disease

56.

Inside the Global Drive for Cyber Peace

Number of pages: 47 Posted: 11 May 2020
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 222 (265,625)
Citation 2

Abstract:

Loading...

cyber peace, cybersecurity, cyber attack, Internet governance, polycentric, sustainable development

57.

The Future of Frontiers

Lewis & Clark Law Review, 2019, Kelley School of Business Research Paper No. 19-12
Number of pages: 72 Posted: 30 Jan 2019 Last Revised: 28 Mar 2019
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 217 (271,357)

Abstract:

Loading...

Cybersecurity, Internet Governance, Global Commons, Frontiers, Common Heritage of Mankind, Polycentric

58.

Should We Trust a Black Box to Safeguard Human Rights? a Comparative Analysis of Ai Governance

UCLA Journal of International Law and Foreign Affairs, 2021
Number of pages: 53 Posted: 12 Feb 2021
Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Hamilton Lugar School of Global and International Studies, Indiana University Maurer School of Law, Indiana University - Kelley School of Business - Department of Business Law and Indiana University Bloomington
Downloads 215 (273,731)
Citation 2

Abstract:

Loading...

artificial intelligence (AI), governance, cybersecurity, data governance

59.

Cyber Silent Spring: Leveraging ESG+T Frameworks and Trustmarks to Better Inform Investors and Consumers about the Sustainability, Cybersecurity, and Privacy of Internet-Connected Devices

Kelley School of Business Research Paper No. 2022-01
Number of pages: 50 Posted: 11 Jan 2022
Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Kelley School of Business and GEC Risk Advisory
Downloads 208 (282,324)
Citation 2

Abstract:

Loading...

cybersecurity, ESG, sustainability, SEC, NIST

60.

Rhetoric versus Reality: U.S. Resistance to Global Trade Rules and the Implications for Cybersecurity and Internet Governance

Eric L. Richards, Scott J. Shackelford, & Abbey Stemler, Rhetoric Versus Reality: U.S. Resistance to Global Trade Rules and the Implications for Cybersecurity and Internet Governance, 24 MINN. J. INT’L L. 159 (2015).
Number of pages: 15 Posted: 14 Oct 2014 Last Revised: 02 Nov 2018
Eric Richards, Scott Shackelford and Abbey Stemler
Indiana University Maurer School of Law, Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 199 (294,000)

Abstract:

Loading...

international trade, cybersecurity, cyber attack, international law, Internet governance

61.

Using BITs to Protect Bytes: Promoting Cyber Peace by Safeguarding Trade Secrets through Bilateral Investment Treaties

American Business Law Journal, 2015
Number of pages: 65 Posted: 14 Sep 2013 Last Revised: 27 Jun 2014
Scott Shackelford, Eric Richards, Anjanette Raymond and Amanda Craig
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Maurer School of Law, Indiana University - Kelley School of Business - Department of Business Law and Indiana University Maurer School of Law
Downloads 197 (296,636)
Citation 2

Abstract:

Loading...

bilateral investment treaty, international trade, cyber attacks, cybersecurity, China

62.

How Businesses Can Promote Cyber Peace

University of Pennsylvania Journal of International Law, 2015, Kelley School of Business Research Paper No. 2014-27
Number of pages: 88 Posted: 10 Feb 2014 Last Revised: 26 Aug 2014
Scott Shackelford, Timothy L. Fort and Jamie Darin Prenkert
Indiana University - Kelley School of Business - Department of Business Law, George Washington University - Department of Strategic Management & Public Policy and Indiana University - Kelley School of Business - Department of Business Law
Downloads 191 (305,158)
Citation 2

Abstract:

Loading...

cybersecurity, polycentric governance, business and human rights, cyber peace, mediating institutions

63.

Governing the Internet of Everything

Cardozo Arts & Entertainment Law Journal, 2019, Kelley School of Business Research Paper No. 18-86
Number of pages: 37 Posted: 05 Nov 2018 Last Revised: 16 Jun 2019
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 180 (321,819)

Abstract:

Loading...

Internet of Things, Blockchain, Cybersecurity

64.

Above the Cloud: Enhancing Cybersecurity in the Aerospace Sector

Florida International University Law Review, 2015, Forthcoming
Number of pages: 33 Posted: 23 Oct 2014
Scott Shackelford and Scott Russell
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Bloomington - Center for Applied Cybersecurity Research
Downloads 180 (321,819)

Abstract:

Loading...

cybersecurity, aerospace, space, aviation, NIST Framework, cyber attack, trade secrets

65.

Hacking the Planet, the Dalai Lama, and You: Managing Technical Vulnerabilities in the Internet Through Polycentric Governance

Fordham Intellectual Property, Media & Entertainment Law Journal, Vol. 24, p. 381, Winter 2014, Indiana Legal Studies Research Paper No. 292
Number of pages: 35 Posted: 07 Jun 2014 Last Revised: 15 Jul 2014
Amanda Craig and Scott Shackelford
Indiana University Maurer School of Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 179 (323,440)
Citation 1

Abstract:

Loading...

cybersecurity, Internet governance, polycentric governance

66.

On Climate Change and Cyber Attacks: Leveraging Polycentric Governance to Mitigate Global Collective Action Problems

Vanderbilt Journal of Entertainment & Technology Law, 2016, Kelley School of Business Research Paper No. 15-54
Number of pages: 51 Posted: 15 Jul 2015 Last Revised: 05 Oct 2015
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 174 (331,762)
Citation 10

Abstract:

Loading...

cybersecurity, climate change, cyber attack, Kyoto Protocol, UNFCCC, Montreal Protocol, sustainability

67.

Review of Cyber Operations Strategies of the United States and Canadian Governments: A Comparative Analysis

UNIDIR Paper Series (International Cyber Operations - National Capabilities and Doctrines), 2020
Number of pages: 19 Posted: 15 Jan 2021
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 168 (342,014)

Abstract:

Loading...

cybersecurity, defend forward, critical infrastructure, cyber norms

68.

The Angel on Your Shoulder: Prompting Employees to Do the Right Thing Through the Use of Wearables

Northwestern University Journal of Technology and Intellectual Property, Forthcoming, Kelley School of Business Research Paper No. 15-67
Number of pages: 40 Posted: 17 Sep 2015 Last Revised: 07 Oct 2015
Timothy Fort, Anjanette Raymond and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law, Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 155 (366,074)
Citation 1

Abstract:

Loading...

69.

Jury Glasses: Wearable Technology and its Role in Crowdsourcing Justice

Cardozo Journal of Conflict Resolution (2015 Forthcoming)
Number of pages: 37 Posted: 06 Mar 2015
Anjanette Raymond and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 140 (397,406)

Abstract:

Loading...

immersive technology, wearable technology, dispute resolution, juror bias, Google Glass

70.

Businesses and Cyber Peace: We Need You!

Business Horizons, 2016, Kelley School of Business Research Paper No. 16-30
Number of pages: 26 Posted: 28 Mar 2016
Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law
Downloads 132 (416,099)

Abstract:

Loading...

cybersecurity, cyber risk management, cyber attack, enterprise risk management

71.

Strategies for Boosting Cybersecurity

Number of pages: 58 Posted: 21 Jun 2022
Janine S. Hiller, Kathryn Kisska-Schulze and Scott Shackelford
Virginia Tech, Clemson University College of Business and Indiana University - Kelley School of Business - Department of Business Law
Downloads 127 (428,545)
Citation 1

Abstract:

Loading...

Cybersecurity, tax, risk management, cyberattack

72.

Business, Human Rights, and the Promise of Polycentricity

Vanderbilt Journal of Transnational Law, Vol. 47, 2014
Number of pages: 41 Posted: 07 Jun 2014
Jamie Darin Prenkert and Scott Shackelford
Indiana University - Kelley School of Business - Department of Business Law and Indiana University - Kelley School of Business - Department of Business Law
Downloads 126 (431,201)
Citation 1

Abstract:

Loading...

human rights, business, polycentric governance

73.

The Sixth Warfighting Domain? Governing The Space-Cyber Nexus

Georgia Law Review, Vol. 59, 2023
Number of pages: 62 Posted: 04 May 2024
Indiana University Bloomington, Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington and Indiana University Bloomington
Downloads 105 (497,193)

Abstract:

Loading...

space-cyber governance, non-binding international agreements, polycentric governance, space law, global space governance, space cybersecurity

74.

The Firm and Common Pool Resource Theory: Understanding the Rise of Benefit Corporations

Forthcoming, in Volume 55.1 of the American Business Law Journal , Kelley School of Business Research Paper No. 18-5
Number of pages: 34 Posted: 10 Jan 2018 Last Revised: 24 Jan 2018
Janine S. Hiller and Scott Shackelford
Virginia Tech and Indiana University - Kelley School of Business - Department of Business Law
Downloads 99 (514,326)

Abstract:

Loading...

benefit corporation, corporate governance, common pool resource