85 Publications (Page 1 of 4)
2020
The Sport of Cybersecurity: How Professional Sport Leagues Can Better Protect the Competitive Integrity of Their GamesGrow, Nathaniel⋅Grow, Nathaniel⋅Shackelford, Scott J and Shackelford, Scott JBoston College. Law School. Boston College Law Review, vol. 61, (no. 2), pp. 473-521,473A, 2020.
| Journal Article
THE SPORT OF CYBERSECURITY: HOW PROFESSIONAL SPORTS LEAGUES CAN BETTER PROTECT THE COMPETITIVE INTEGRITY OF THEIR GAMESGrow, Nathaniel⋅Grow, Nathaniel⋅Shackelford, Scott and Shackelford, ScottBoston College Law Review, vol. 61, (no. 2), pp. 474, 20200201.
| Journal Article
2019
GOVERNING THE INTERNET OF EVERYTHINGShackelford, ScottCardozo Arts & Entertainment Law Journal, vol. 37, (no. 3), pp. 701, 20191222.
| Journal Article
SHOULD CYBERSECURITY BE A HUMAN RIGHT? EXPLORING THE 'SHARED RESPONSIBILITY' OF CYBER PEACEShackelford, ScottStanford Journal of International Law, vol. 55, (no. 2), pp. 155, 20190622.
| Journal Article
2018
BUILDING A BETTER HAL 9000: ALGORITHMS, THE MARKET, AND THE NEED TO PREVENT THE ENGRAINING OF BIASRaymond, Anjanette⋅Raymond, Anjanette⋅Young, Emma⋅Young, Emma⋅Shackelford, Scott and Shackelford, ScottNorthwestern Journal of Technology and Intellectual Property, vol. 15, (no. 3), pp. 254, 20180101.
| Journal Article
IS IT TIME FOR A NATIONAL CYBERSECURITY SAFETY BOARD? EXAMINING THE POLICY IMPLICATIONS AND POLITICAL PUSHBACKShackelford, Scott and Brady, AustinAlbany Law Journal of Science & Technology, vol. 28, (no. 2), pp. 56, 20180622.
| Journal Article
The Firm and Common Pool Resource Theory: Understanding the Rise of Benefit CorporationsHiller, Janine S and Shackelford, Scott JAmerican Business Law Journal, vol. 55, (no. 1), pp. 51, Spring 2018.
| Journal Article
2017
Block-by-Block: Leveraging the Power of Blockchain Technology to Build Trust and Promote Cyber PeaceShackelford, Scott and Myers, SteveYale Journal of Law & Technology, vol. 19, (no. 1), pp. 334, 20170101.
| Journal Article
From Russia with Love: Understanding the Russian Cyber Threat to U.S. Critical Infrastructure and What to Do About ItShackelford, Scott⋅Sulmeyer, Michael⋅Deckard, Amanda⋅Buchanan, Ben and Micic, BrianNebraska Law Review, vol. 96, (no. 2), pp. 320, 20170922.
| Journal Article
Generating Student-based Inquiry Using Compelling Questions from the World of SportsZardin, Rachael⋅Endacott, Jason⋅Woodworth, Allison⋅Barr, Reeves⋅Jamell, Felicia⋅Ripplemeyer, Josiah⋅Sneed, Natalie⋅Akers, Jillian⋅Balmer, Jordan⋅Cole, Ethan⋅Chavis, Katy⋅Shackelford, Scott⋅Sloan, Sarah⋅Freeman, Laura and Harris, EricSocial Education, vol. 81, (no. 4), pp. 218, 20170901.
| Journal Article
Human Rights and Cybersecurity Due Diligence: A Comparative StudyShackelford, ScottUniversity of Michigan Journal of Law Reform, vol. 50, (no. 4), pp. 859, 20170622.
| Journal Article
iGovernance: The Future of Multi-Stakeholder Internet Governance in the Wake of the Apple Encryption SagaShackelford, ScottNorth Carolina Journal of International Law, vol. 42, (no. 4), pp. 883, 20170622.
| Journal Article
Making democracy harder to hackShackelford, Scott⋅Schneier, Bruce⋅Sulmeyer, Michael⋅Boustead, Anne⋅Buchanan, Ben⋅Craig Deckard, Amanda⋅Herr, Trey and Smith, JessicaUniversity of Michigan Journal of Law Reform, vol. 50, (no. 3), pp. 629, 20170322.
| Journal Article
Paris, panels, and protectionism: matching US rhetoric with reality to save the planetStemler, Abbey⋅Stemler, Abbey⋅Shackelford, Scott⋅Shackelford, Scott⋅Richards, Eric and Richards, EricVanderbilt Journal of Entertainment and Technology Law, vol. 19, (no. 3), pp. 545, 20170322.
| Journal Article
The Law of Cyber PeaceShackelford, ScottChicago Journal of International Law, vol. 18, (no. 1), pp. 1-47, Summer 2017.
| Journal Article
When toasters attack a polycentric approach to enhancing the "security of things."Shackelford, Scott⋅Shackelford, Scott⋅Raymond, Anjanette⋅Raymond, Anjanette⋅Charoen, Danuvasin⋅Charoen, Danuvasin⋅Balakrishnan, Rakshana⋅Balakrishnan, Rakshana⋅Dixit, Prakhar⋅Dixit, Prakhar⋅Gjonaj, Julianna⋅Gjonaj, Julianna⋅Kavi, Rachith and Kavi, RachithUniversity of Illinois Law Review, vol. 2017, (no. 2), pp. 415, 20170322.
| Journal Article
2016
Business and cyber peaceShackelford, Scott JBusiness horizons, vol. 59, (no. 5), pp. 548, 2016.
| Journal Article
Business and cyber peaceShackelford, Scott JBusiness horizons, vol. 59, (no. 5), pp. 548, 2016.
| Journal Article
Business and cyber peaceShackelford, Scott JBusiness horizons, vol. 59, (no. 5), pp. 548, 2016.
| Journal Article
Business and cyber peace: We need youShackelford, Scott JBusiness Horizons, vol. 59, (no. 5), pp. 548, September-October 2016.
| Journal Article
On climate change and cyber attacks: leveraging polycentric governance to mitigate global collective action problemsShackelford, ScottVanderbilt Journal of Entertainment and Technology Law, vol. 18, (no. 4), pp. 653, 20160622.
| Journal Article
Operationalizing cybersecurity due diligence: a Transatlantic case studyShackelford, Scott and Russell, ScottSouth Carolina Law Review, vol. 67, (no. 3), pp. 609, 20160322.
| Journal Article
Securing North American critical infrastructure: a comparative case study in cybersecurity regulationShackelford, Scott and Bohm, ZacheryCanada-United States Law Journal, vol. 40, (no. 1), pp. 61, 20160322.
| Journal Article
Sustainable cybersecurity: applying lessons from the green movement to managing cyber attacksShackelford, Scott⋅Shackelford, Scott⋅Fort, Timothy⋅Fort, Timothy⋅Charoen, Danuvasin and Charoen, DanuvasinUniversity of Illinois Law Review, vol. 2016, (no. 5), pp. 1995, 20161222.
| Journal Article
The Angel on Your Shoulder: Prompting Employees to Do the Right Thing Through the Use of WearablesFort, Timothy⋅Fort, Timothy⋅Fort, Timothy⋅Raymond, Anjanette⋅Raymond, Anjanette⋅Raymond, Anjanette⋅Shackelford, Scott⋅Shackelford, Scott and Shackelford, ScottNorthwestern Journal of Technology and Intellectual Property, vol. 14, (no. 2), pp. 139-170, 2016.
| Journal Article