85 Publications (Page 1 of 4)
2020
The Sport of Cybersecurity: How Professional Sport Leagues Can Better Protect the Competitive Integrity of Their Games
Grow, NathanielGrow, NathanielShackelford, Scott J and Shackelford, Scott J
Boston College. Law School. Boston College Law Review, vol. 61, (no. 2), pp. 473-521,473A, 2020. | Journal Article
 
THE SPORT OF CYBERSECURITY: HOW PROFESSIONAL SPORTS LEAGUES CAN BETTER PROTECT THE COMPETITIVE INTEGRITY OF THEIR GAMES
Grow, NathanielGrow, NathanielShackelford, Scott and Shackelford, Scott
Boston College Law Review, vol. 61, (no. 2), pp. 474, 20200201. | Journal Article
2019
GOVERNING THE INTERNET OF EVERYTHING
Shackelford, Scott
Cardozo Arts & Entertainment Law Journal, vol. 37, (no. 3), pp. 701, 20191222. | Journal Article
 
SHOULD CYBERSECURITY BE A HUMAN RIGHT? EXPLORING THE 'SHARED RESPONSIBILITY' OF CYBER PEACE
Shackelford, Scott
Stanford Journal of International Law, vol. 55, (no. 2), pp. 155, 20190622. | Journal Article
2018
BUILDING A BETTER HAL 9000: ALGORITHMS, THE MARKET, AND THE NEED TO PREVENT THE ENGRAINING OF BIAS
Raymond, AnjanetteRaymond, AnjanetteYoung, EmmaYoung, EmmaShackelford, Scott and Shackelford, Scott
Northwestern Journal of Technology and Intellectual Property, vol. 15, (no. 3), pp. 254, 20180101. | Journal Article
 
IS IT TIME FOR A NATIONAL CYBERSECURITY SAFETY BOARD? EXAMINING THE POLICY IMPLICATIONS AND POLITICAL PUSHBACK
Shackelford, Scott and Brady, Austin
Albany Law Journal of Science & Technology, vol. 28, (no. 2), pp. 56, 20180622. | Journal Article
 
The Firm and Common Pool Resource Theory: Understanding the Rise of Benefit Corporations
Hiller, Janine S and Shackelford, Scott J
American Business Law Journal, vol. 55, (no. 1), pp. 51, Spring 2018. | Journal Article
2017
Block-by-Block: Leveraging the Power of Blockchain Technology to Build Trust and Promote Cyber Peace
Shackelford, Scott and Myers, Steve
Yale Journal of Law & Technology, vol. 19, (no. 1), pp. 334, 20170101. | Journal Article
 
From Russia with Love: Understanding the Russian Cyber Threat to U.S. Critical Infrastructure and What to Do About It
Shackelford, ScottSulmeyer, MichaelDeckard, AmandaBuchanan, Ben and Micic, Brian
Nebraska Law Review, vol. 96, (no. 2), pp. 320, 20170922. | Journal Article
 
Generating Student-based Inquiry Using Compelling Questions from the World of Sports
Zardin, RachaelEndacott, JasonWoodworth, AllisonBarr, ReevesJamell, FeliciaRipplemeyer, JosiahSneed, NatalieAkers, JillianBalmer, JordanCole, EthanChavis, KatyShackelford, ScottSloan, SarahFreeman, Laura and Harris, Eric
Social Education, vol. 81, (no. 4), pp. 218, 20170901. | Journal Article
 
Human Rights and Cybersecurity Due Diligence: A Comparative Study
Shackelford, Scott
University of Michigan Journal of Law Reform, vol. 50, (no. 4), pp. 859, 20170622. | Journal Article
 
iGovernance: The Future of Multi-Stakeholder Internet Governance in the Wake of the Apple Encryption Saga
Shackelford, Scott
North Carolina Journal of International Law, vol. 42, (no. 4), pp. 883, 20170622. | Journal Article
 
Making democracy harder to hack
Shackelford, ScottSchneier, BruceSulmeyer, MichaelBoustead, AnneBuchanan, BenCraig Deckard, AmandaHerr, Trey and Smith, Jessica
University of Michigan Journal of Law Reform, vol. 50, (no. 3), pp. 629, 20170322. | Journal Article
 
Paris, panels, and protectionism: matching US rhetoric with reality to save the planet
Stemler, AbbeyStemler, AbbeyShackelford, ScottShackelford, ScottRichards, Eric and Richards, Eric
Vanderbilt Journal of Entertainment and Technology Law, vol. 19, (no. 3), pp. 545, 20170322. | Journal Article
 
The Law of Cyber Peace
Shackelford, Scott
Chicago Journal of International Law, vol. 18, (no. 1), pp. 1-47, Summer 2017. | Journal Article
 
When toasters attack a polycentric approach to enhancing the "security of things."
Shackelford, ScottShackelford, ScottRaymond, AnjanetteRaymond, AnjanetteCharoen, DanuvasinCharoen, DanuvasinBalakrishnan, RakshanaBalakrishnan, RakshanaDixit, PrakharDixit, PrakharGjonaj, JuliannaGjonaj, JuliannaKavi, Rachith and Kavi, Rachith
University of Illinois Law Review, vol. 2017, (no. 2), pp. 415, 20170322. | Journal Article
2016
Business and cyber peace
Shackelford, Scott J
Business horizons, vol. 59, (no. 5), pp. 548, 2016. | Journal Article
 
Business and cyber peace
Shackelford, Scott J
Business horizons, vol. 59, (no. 5), pp. 548, 2016. | Journal Article
 
Business and cyber peace
Shackelford, Scott J
Business horizons, vol. 59, (no. 5), pp. 548, 2016. | Journal Article
 
Business and cyber peace: We need you
Shackelford, Scott J
Business Horizons, vol. 59, (no. 5), pp. 548, September-October 2016. | Journal Article
 
On climate change and cyber attacks: leveraging polycentric governance to mitigate global collective action problems
Shackelford, Scott
Vanderbilt Journal of Entertainment and Technology Law, vol. 18, (no. 4), pp. 653, 20160622. | Journal Article
 
Operationalizing cybersecurity due diligence: a Transatlantic case study
Shackelford, Scott and Russell, Scott
South Carolina Law Review, vol. 67, (no. 3), pp. 609, 20160322. | Journal Article
 
Securing North American critical infrastructure: a comparative case study in cybersecurity regulation
Shackelford, Scott and Bohm, Zachery
Canada-United States Law Journal, vol. 40, (no. 1), pp. 61, 20160322. | Journal Article
 
Sustainable cybersecurity: applying lessons from the green movement to managing cyber attacks
Shackelford, ScottShackelford, ScottFort, TimothyFort, TimothyCharoen, Danuvasin and Charoen, Danuvasin
University of Illinois Law Review, vol. 2016, (no. 5), pp. 1995, 20161222. | Journal Article
 
The Angel on Your Shoulder: Prompting Employees to Do the Right Thing Through the Use of Wearables
Fort, TimothyFort, TimothyFort, TimothyRaymond, AnjanetteRaymond, AnjanetteRaymond, AnjanetteShackelford, ScottShackelford, Scott and Shackelford, Scott
Northwestern Journal of Technology and Intellectual Property, vol. 14, (no. 2), pp. 139-170, 2016. | Journal Article