- (812) 856-6728
- Hodge Hall 4080
- B.A. summa cum laude, Indiana University
- Masters in International Relations, first honors, University of Cambridge
- PhD, Politics and International Studies, University of Cambridge
- JD with academic and pro bono distinction, Stanford University
Professor Scott J. Shackelford serves on the faculty of Indiana University, where he is cybersecurity program chair and director of the Ostrom Workshop Program on Cybersecurity and Internet Governance. He is also an affiliated scholar at both the Harvard Kennedy School’s Belfer Center for Science and International Affairs and Stanford’s Center for Internet and Society, as well as a senior fellow at the Center for Applied Cybersecurity Research, and a term member at the Council on Foreign Relations.
Shackelford has written more than 100 articles, book chapters, essays, and op-eds for diverse outlets ranging from the University of Illinois Law Review and the American Business Law Journal to the Christian Science Monitor, Huffington Post, Slate, The Conversation, and the San Francisco Chronicle. Similarly, his research has been covered by diverse outlets, including Politico, NPR, Marketplace, Forbes, Time, Associated Press, Forensics Magazine, Law360, the Indianapolis Star, Washington Post, and the Los Angeles Times. He is also the author of Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace (Cambridge University Press, 2014).
Both Shackelford’s academic work and teaching have been recognized with numerous awards, including a Harvard University Research Fellowship, a Stanford University Hoover Institution National Fellowship, a Notre Dame Institute for Advanced Study Distinguished Fellowship, the 2014 Indiana University Outstanding Junior Faculty Award, and the 2015 Elinor Ostrom Award.
In the media
- Quoted in "Cyber attacks surging; Hoosiers need to be extra vigilant," WTHR (10/5/2020)
- Quoted in "To secure elections, paper ballots, risk-limiting audits and fighting misinformation are required: IU study," Chicago Tribune (10/2/2020)
- Quoted in "Carmel city website back online after hacker gained access," WISH-TV (9/18/2020)
- Quoted in "WeChat going silent, time running out for TikTok," WTHR (9/18/2020)
- Quoted in "FBI joins probe of Carmel website hack. Site still shut down," The Indianapolis Star (9/18/2020)
- Quoted in "K-12 schools increasingly the target of ransomware attacks during pandemic," KEYE TV (9/15/2020)
- Quoted in "What the U.S. needs to do to secure election 2020," Nextgov (9/14/2020)
- Quoted in "Paper ballots, risk-limiting audits can help defend elections and democracy, IU study finds," IU Newsroom (9/2/2020)
- Quoted in "Scholar outlines possible alternatives to US lunar exploitation rules," Sputnik (5/20/2020) and in Alton (Ill.) Telegraph
- Quoted in "Born in India, Cyber Peace Corps trains tacklers of disinformation, online challenges," MeriTalk (5/7/2020)
- Quoted in "As schools move online, so do security threats. Here's what experts say you can do," WFYI (4/15/2020)
- Quoted in "The next frontier of baseball cheating: the Cloud," OZY (4/14/2020)
- Wrote an op-ed titled "The battle against disinformation is global," The Conversation (3/20/2020)
- Quoted in "Everyone counts: Why Indianapolis is urging residents to respond to the 2020 census," The Indianapolis Star (subscription) (3/14/2020)
- Quoted in "A judge resigns after using the n-word in texts that she says the public was never meant to see," The Washington Post (2/27/2020)
- Quoted in "Equifax left unencrypted data open to Chinese hackers. Most big US companies are just as negligent," Los Angeles Times (2/10/2020)
- Wrote a blog post titled "Hack your way to power? Election protection lessons from other nations," The National Interest (2/5/2020)
- Mentioned in "IU's Ostrom Workshop names executive director," Inside Indiana Business (2/4/2020)
- Wrote an essay titled "US could learn how to improve election protection from other nations," The Conversation (2/4/2020) and in Midland Daily News, The Fulcrum
- Quoted in "As use of facial recognition expands, travelers worry about privacy," The Washington Post (1/23/2020)
- Quoted in "Hackers held patient files at a Battle Creek doctor's office for ransom," The Battle Creek Enquirer (subscription) (8/22/2019)
- Quoted in "Capital One breach is case study in cyber defenses, vulnerabilities," WIBC Radio (7/30/2019)
- Wrote about "Five ways to protect yourself from cybercrime," The Conversation (7/23/2019)
- Wrote an article titled "Companies' self-regulation doesn't have to be bad for the public," The Conversation (6/12/2019)
- Wrote an op-ed titled "The US needs an NTSB for cyberattacks," The Wall Street Journal (sub. req.) (6/4/2019)
- Was featured in a "National Security Podcast: Tech, law, and when cyber turned kinetic," Policy Forum (5/16/2019)
- GOVERNING NEW FRONTIERS IN THE INFORMATION AGE: TOWARD CYBER PEACE (Cambridge University Press, forthcoming 2020).
- THE INTERNET OF EVERYTHING: WHAT EVERYONE NEEDS TO KNOW (Oxford University Press, forthcoming 2020).
- MANAGING CYBER ATTACKS IN INTERNATIONAL LAW, BUSINESS AND RELATIONS: IN SEARCH OF CYBER PEACE (Cambridge University Press, 2014).
- The Sport of Cybersecurity: How Professional Sports Leagues Can Better Protect the Competitive Integrity of their Games, __ BOSTON COLLEGE LAW REVIEW __ (forthcoming 2020) (with Nathaniel Grow).
- The Future of Frontiers, __ LEWIS & CLARK LAW REVIEW __ (forthcoming 2020).
- Rethinking Active Defense: A Comparative Analysis of Proactive Cybersecurity Policymaking, __ UNIVERSITY OF PENNSYLVANIA JOURNAL OF INTERNATIONAL LAW __ (forthcoming 2020) (with Danuvasin Charoen, Tristen Waite, & Nancy Zhang).
- Smart Factories, Dumb Policy? Managing Cybersecurity and Data Privacy Risks in the Industrial Internet of Things, __ MINNESOTA JOURNAL OF LAW, SCIENCE, & TECHNOLOGY __ (forthcoming 2020).
- Unpacking the Rise of Benefit Corporations: A Transatlantic Comparative Case Study, __ VIRGINIA JOURNAL OF INTERNATIONAL LAW __ (2019) (with Janine Hiller & Xiao Ma).T
- The Firm and Common Pool Resource Theory: Understanding the Rise of Benefit Corporations, 55 AMERICAN BUSINESS LAW JOURNAL 5 (2018) (with Janine S. Hiller).
- Securing the Internet of Healthcare, 19 MINNESOTA JOURNAL OF LAW, SCIENCE AND TECHNOLOGY 405 (2018) (with Michael Mattioli, Steve Myers, Austin Brady, Yvette Wang, and Stephanie Wong).
- When Toasters Attack: Enhancing the ‘Security of Things’ through Polycentric Governance, 2017 UNIVERSITY OF ILLINOIS LAW REVIEW 415 (2017) (with Anjanette Raymond, Danuvasin Charoen, Rakshana Balakrishnan, Prakhar Dixit, Julianna Gjonaj, & Rachith Kavi).
- Making Democracy Harder to Hack: Should Elections be Classified as ‘Critical Infrastructure?’, 50 MICHIGAN JOURNAL OF LAW REFORM 629 (2017) (with Michael Sulmeyer, Bruce Schneier, Anne Boustead, Ben Buchanan, Amanda Craig, Trey Herr, & Jessica Malekos Smith).
- The Law of Cyber Peace, 18 CHICAGO JOURNAL OF INTERNATIONAL LAW 1 (2017).
- Block-by-Block: Leveraging the Power of Blockchain Technology to Build Trust and Promote Cyber Peace, 19 YALE JOURNAL OF LAW AND TECHNOLOGY 334 (2017) (with Steve Myers).
- Cybersecurity and privacy
- International law and relations