Scott J. Shackelford
Affiliated Professor of Law; Associate Professor of Business Law and Ethics; Cybersecurity Program Chair, IU Bloomington; Director, Ostrom Workshop Program on Cybersecurity and Internet Governance
- E-mail firstname.lastname@example.org
- Phone (812) 856-6728
- Location Hodge Hall 4080
- B.A. summa cum laude, Indiana University
- Masters in International Relations, first honors, University of Cambridge
- PhD, Politics and International Studies, University of Cambridge
- JD with academic and pro bono distinction, Stanford University
Professor Scott J. Shackelford serves on the faculty of Indiana University, where he is cybersecurity program chair and director of the Ostrom Workshop Program on Cybersecurity and Internet Governance. He is also an affiliated scholar at both the Harvard Kennedy School’s Belfer Center for Science and International Affairs and Stanford’s Center for Internet and Society, as well as a senior fellow at the Center for Applied Cybersecurity Research, and a term member at the Council on Foreign Relations.
Shackelford has written more than 100 articles, book chapters, essays, and op-eds for diverse outlets ranging from the University of Illinois Law Review and the American Business Law Journal to the Christian Science Monitor, Huffington Post, Slate, The Conversation, and the San Francisco Chronicle. Similarly, his research has been covered by diverse outlets, including Politico, NPR, Marketplace, Forbes, Time, Associated Press, Forensics Magazine, Law360, the Indianapolis Star, Washington Post, and the Los Angeles Times. He is also the author of Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace (Cambridge University Press, 2014).
Both Shackelford’s academic work and teaching have been recognized with numerous awards, including a Harvard University Research Fellowship, a Stanford University Hoover Institution National Fellowship, a Notre Dame Institute for Advanced Study Distinguished Fellowship, the 2014 Indiana University Outstanding Junior Faculty Award, and the 2015 Elinor Ostrom Award.
In the media
- Quoted in "Capital One breach is case study in cyber defenses, vulnerabilities," WIBC Radio (7/30/2019)
- Wrote about "Five ways to protect yourself from cybercrime," The Conversation (7/23/2019)
- Wrote an article titled "Companies' self-regulation doesn't have to be bad for the public," The Conversation (6/12/2019)
- Wrote an op-ed titled "The US needs an NTSB for cyberattacks," The Wall Street Journal (sub. req.) (6/4/2019)
- Was featured in a "National Security Podcast: Tech, law, and when cyber turned kinetic," Policy Forum (5/16/2019)
- Quoted in "Three ideas for solving the cybersecurity skills gap," The Wall Street Journal (9/19/2018)
- Authored "Facebook's social responsibility should include privacy protection," The Conversation (4/12/2018)
- Quoted in "Indiana University suggests creation of independent cybersecurity agency," WBIW (2/19/2018)
- GOVERNING NEW FRONTIERS IN THE INFORMATION AGE: TOWARD CYBER PEACE (Cambridge University Press, forthcoming 2019).
- THE INTERNET OF EVERYTHING: WHAT EVERYONE NEEDS TO KNOW (Oxford University Press, forthcoming 2019)(with Amanda N. Craig Deckard).
- MANAGING CYBER ATTACKS IN INTERNATIONAL LAW, BUSINESS AND RELATIONS: IN SEARCH OF CYBER PEACE (Cambridge University Press, 2014).
- The Sport of Cybersecurity: How Professional Sports Leagues Can Better Protect the Competitive Integrity of their Games, __ BOSTON COLLEGE LAW REVIEW __ (forthcoming 2020) (with Nathaniel Grow).
- The Future of Frontiers, __ LEWIS & CLARK LAW REVIEW __ (forthcoming 2020).
- Rethinking Active Defense: A Comparative Analysis of Proactive Cybersecurity Policymaking, __ UNIVERSITY OF PENNSYLVANIA JOURNAL OF INTERNATIONAL LAW __ (forthcoming 2019) (with Danuvasin Charoen, Tristen Waite, & Nancy Zhang).
- Smart Factories, Dumb Policy? Managing Cybersecurity and Data Privacy Risks in the Industrial Internet of Things, __ MINNESOTA JOURNAL OF LAW, SCIENCE, & TECHNOLOGY __ (forthcoming 2019).
- Unpacking the Rise of Benefit Corporations: A Transatlantic Comparative Case Study, __ VIRGINIA JOURNAL OF INTERNATIONAL LAW __ (forthcoming 2019) (with Janine Hiller & Xiao Ma).T
- The Firm and Common Pool Resource Theory: Understanding the Rise of Benefit Corporations, 55 AMERICAN BUSINESS LAW JOURNAL 5 (2018) (with Janine S. Hiller).
- Securing the Internet of Healthcare, 19 MINNESOTA JOURNAL OF LAW, SCIENCE AND TECHNOLOGY 405 (2018) (with Michael Mattioli, Steve Myers, Austin Brady, Yvette Wang, and Stephanie Wong).
- When Toasters Attack: Enhancing the ‘Security of Things’ through Polycentric Governance, 2017 UNIVERSITY OF ILLINOIS LAW REVIEW 415 (2017) (with Anjanette Raymond, Danuvasin Charoen, Rakshana Balakrishnan, Prakhar Dixit, Julianna Gjonaj, & Rachith Kavi).
- Making Democracy Harder to Hack: Should Elections be Classified as ‘Critical Infrastructure?’, 50 MICHIGAN JOURNAL OF LAW REFORM 629 (2017) (with Michael Sulmeyer, Bruce Schneier, Anne Boustead, Ben Buchanan, Amanda Craig, Trey Herr, & Jessica Malekos Smith).
- The Law of Cyber Peace, 18 CHICAGO JOURNAL OF INTERNATIONAL LAW 1 (2017).
- Block-by-Block: Leveraging the Power of Blockchain Technology to Build Trust and Promote Cyber Peace, 19 YALE JOURNAL OF LAW AND TECHNOLOGY 334 (2017) (with Steve Myers).
- Cybersecurity and privacy
- International law and relations