Professor Scott J. Shackelford serves on the faculty of Indiana University, where he teaches cybersecurity, business law and sustainability, among other courses, and is a fellow at the Center for Applied Cybersecurity Research. He has written more than 30 articles, essays and book chapters that have been published in outlets such as the Yale Law and Policy Review, the New York University Environmental Law Journal, the American Business Law Journal, the Stanford Journal of International Law, the Stanford Environmental Law Journal, the Berkeley Journal of International Law, and the Stanford Law Review Online. Professor Shackelford has also written op-eds on the topic of cybersecurity that have been published in the Huffington Post, the San Francisco Chronicle, Jurist, and the Washington Times, and his research has been covered by National Public Radio, Forbes, C-SPAN, USA Today, and Kelley Magazine. His academic work has been recognized with awards including the Stanford Law School Steven Block Civil Liberties Award for Writing on Civil Rights. Shackelford also received the Indiana University Trustees' Teaching Award for Excellence in 2011, and the Elinor Ostrom Award in 2015.
Part I. Foundations of Polycentric Regulation in Cyberspace: 1. Defining
the cyber threat in Internet governance; 2. Who controls cyberspace?
Analyzing cyberspace through polycentric governance; Part II. Managing
Vulnerabilities: 3. Hacking the planet, the Dalai Lama, and you: managing
technical vulnerabilities in the Internet; 4. The new cyberwarfare:
securing critical national infrastructure in the digital age; 5. Risky
business: enhancing private sector cybersecurity through the competitive
market; Part III. The Law, Politics, and Promise of Cyber Peace: 6. The law
of cyber war and peace; 7. Cyber peace.
Part I. Foundations of Polycentric Regulation in Cyberspace: 1. Defining the cyber threat in Internet governance; 2. Who controls cyberspace? Analyzing cyberspace through polycentric governance; Part II. Managing Vulnerabilities: 3. Hacking the planet, the Dalai Lama, and you: managing technical vulnerabilities in the Internet; 4. The new cyberwarfare: securing critical national infrastructure in the digital age; 5. Risky business: enhancing private sector cybersecurity through the competitive market; Part III. The Law, Politics, and Promise of Cyber Peace: 6. The law of cyber war and peace; 7. Cyber peace.