Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Law

Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic Jan 2015

Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic

Scott Shackelford

There is a growing consensus that nations bear increasing responsibility for enhancing cybersecurity. A related recent trend has been the adoption of long-term strategic plans to help deter, protect, and defend against cyber threats. These national cybersecurity strategies outline a nation’s core values and goals in the realm of cybersecurity law and policy, from mitigating cybercrime and espionage to preparing for cyber warfare. This Article assesses the notion that nations bear the primary responsibility for managing cyber attacks and mitigating cybercrime by analyzing thirty-four national cybersecurity strategies as a vehicle to discover governance trends that could give rise to customary …


Toward Cyber Peace: Managing Cyber Attacks Through Polycentric Governance, Scott Shackelford Aug 2012

Toward Cyber Peace: Managing Cyber Attacks Through Polycentric Governance, Scott Shackelford

Scott Shackelford

Views range widely about the seriousness of cyber attacks and the likelihood of cyber war. But even framing cyber attacks within the context of a loaded category like war can be an oversimplification that shifts focus away from enhancing cybersecurity against the full range of threats now facing companies, countries, and the international community. Current methods are proving ineffective at managing cyber attacks, and as cybersecurity legislation is being debated in the U.S. Congress and around the world the time is ripe for a fresh look at this critical topic. This Article searches for alternative avenues to foster cyber peace …


Governing The Final Frontier: A Polycentric Approach To Managing Space Weaponization And Debris, Scott Shackelford Feb 2012

Governing The Final Frontier: A Polycentric Approach To Managing Space Weaponization And Debris, Scott Shackelford

Scott Shackelford

Effective space governance has become increasingly important to spacefaring and non-spacefaring powers alike given the interrelated problems of space weaponization and debris management, but thus far the applicable legal regimes remain amorphous and outdated. For example, the 1967 Outer Space Treaty (OST) establishes space as being free from national appropriation, while setting out certain property rights. But legal ambiguities persist, such as regarding what weapons are permitted in space since the military use of space has not been forbidden, only the placement of weapons of mass destruction in orbit and the establishment of military bases on the moon or other …


From Nuclear War To Net War: Analogizing Cyber Attacks In International Law, Scott James Shackelford Jul 2008

From Nuclear War To Net War: Analogizing Cyber Attacks In International Law, Scott James Shackelford

Scott Shackelford

On April 27, 2007, Estonia was attacked by a computer network causing widespread damage. It is currently unclear what legal rights a state has as a victim of a cyber attack. Even if Estonia could conclusively prove that it was Russia, for example, behind the March 2007 attack, could it respond with force or its own cyber attack? There is a paucity of literature dealing with these questions, as well as the ethical, humanitarian, and human rights implications of information warfare (“IW”) on national and international security. Treatments of IW outside the orthodox international humanitarian law (“IHL”) framework are nearly …