Anne Boustead

University of Arizona - School of Government and Public Policy

Assistant Professor

315 Social Science Building

Tucson, AZ 85721

United States

SCHOLARLY PAPERS

3

DOWNLOADS

1,719

TOTAL CITATIONS

2

Scholarly Papers (3)

1.

Making Democracy Harder to Hack: Should Elections Be Classified as ‘Critical Infrastructure?’

University of Michigan Journal of Law Reform, 2017, Kelley School of Business Research Paper No. 16-75
Number of pages: 40 Posted: 19 Oct 2016 Last Revised: 17 Nov 2016
Indiana University - Kelley School of Business - Department of Business Law, Harvard University - Berkman Klein Center for Internet & Society, Harvard University, Harvard Kennedy School (HKS), Belfer Center for Science and International Affairs (BCSIA), University of Arizona - School of Government and Public Policy, Harvard University, Harvard Kennedy School (HKS), Belfer Center for Science and International Affairs (BCSIA), Indiana University Maurer School of Law, American University - School of International Service and Government of the United States of America - US Air War College
Downloads 1,201 (38,309)
Citation 1

Abstract:

Loading...

cybersecurity, cyber attack, election, voting, critical infrastructure

2.

Defining 'Reasonable' Cybersecurity: Lessons from the States

Number of pages: 51 Posted: 10 Sep 2021 Last Revised: 25 Feb 2022
Indiana University - Kelley School of Business - Department of Business Law, University of Arizona - School of Government and Public Policy and Stanford University
Downloads 427 (148,550)
Citation 1

Abstract:

Loading...

cybersecurity, safe harbor

3.

Juror Interpretations of Metadata and Content Information: Implications for the Going Dark Debate

Northwestern Law & Econ Research Paper No. 21-07
Number of pages: 29 Posted: 08 Jul 2021 Last Revised: 16 Sep 2021
Anne Boustead and Matthew B. Kugler
University of Arizona - School of Government and Public Policy and Northwestern University - Pritzker School of Law
Downloads 91 (614,538)

Abstract:

Loading...

juror decision-making, encryption policy, going dark, surveillance