Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
- File Type
Articles 1 - 5 of 5
Full-Text Articles in Law
Unpacking The International Law On Cybersecurity Due Diligence: Lessons From The Public And Private Sectors, Scott J. Shackelford
Unpacking The International Law On Cybersecurity Due Diligence: Lessons From The Public And Private Sectors, Scott J. Shackelford
Scott Shackelford
Although there has been a relative abundance of work done on exploring the contours of the law of cyber war, far less attention has been paid to defining a law of cyber peace applicable below the armed attack threshold. Among the most important unanswered questions is what exactly nations’ due diligence obligations are to one another and to their respective private sectors. The International Court of Justice (“ICJ”) has not yet explicitly considered this topic, though it has ruled in the Corfu Channel case that one country’s territory should not be “used for acts that unlawfully harm other States.” But …
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Loyola of Los Angeles Law Review
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …
Proactive Cybersecurity: A Comparative Industry And Regulatory Analysis, Scott J. Shackelford, Amanda Craig, Janine Hiller
Proactive Cybersecurity: A Comparative Industry And Regulatory Analysis, Scott J. Shackelford, Amanda Craig, Janine Hiller
Scott Shackelford
This Article analyzes recent business realities and regulatory trends shaping the proactive cybersecurity industry. To provide a framework for our discussion, we begin by describing the historical development of the industry and how it has been shaped by the applicable law in the United States and other G8 nations. We then catalogue the proactive cybersecurity practices of more than twenty companies, focusing on four case studies that we consider in the context of polycentric “global security assemblages.” Finally, we assess the emergence of proactive cybersecurity norms, both within industry and international law, and consider the implications of this movement on …
Choosing The Partnership: English Business Organization Law During The Industrial Revolution, Ryan Bubb
Choosing The Partnership: English Business Organization Law During The Industrial Revolution, Ryan Bubb
Seattle University Law Review
For most of the period associated with the Industrial Revolution in Britain, English law restricted access to incorporation and the Bubble Act explicitly outlawed the formation of unincorporated joint stock companies with transferable shares. Furthermore, firms in the manufacturing industries most closely associated with the Industrial Revolution were overwhelmingly partnerships. These two facts have led some scholars to posit that the antiquated business organization law was a constraint on the structural transformation and growth that characterized the British economy during the period. Importantly, however, the vast majority of manufacturing firms in the modern sector were partnerships. An easy explanation for …
Whither The Web?: International Law, Cybersecurity, And Critical Infrastructure Protection, David P. Fidler
Whither The Web?: International Law, Cybersecurity, And Critical Infrastructure Protection, David P. Fidler
Articles by Maurer Faculty
No abstract provided.