Read more
Informationen zum Autor Professor Scott J. Shackelford serves on the faculty of Indiana University, where he teaches cybersecurity, business law and sustainability, among other courses, and is a fellow at the Center for Applied Cybersecurity Research. He has written more than 30 articles, essays and book chapters that have been published in outlets such as the Yale Law and Policy Review, the New York University Environmental Law Journal, the American Business Law Journal, the Stanford Journal of International Law, the Stanford Environmental Law Journal, the Berkeley Journal of International Law, and the Stanford Law Review Online. Professor Shackelford has also written op-eds on the topic of cybersecurity that have been published in the Huffington Post, the San Francisco Chronicle, Jurist, and the Washington Times, and his research has been covered by National Public Radio, Forbes, C-SPAN, USA Today, and Kelley Magazine. His academic work has been recognized with awards including the Stanford Law School Steven Block Civil Liberties Award for Writing on Civil Rights. Shackelford also received the Indiana University Trustees' Teaching Award for Excellence in 2011, and the Elinor Ostrom Award in 2015. Klappentext This book presents a novel framework to reconceptualize internet governance and better manage cyber attacks. Zusammenfassung This book presents a novel framework to reconceptualize internet governance and better manage cyber attacks. It makes an original contribution by examining the potential of polycentric regulation to increase accountability through bottom-up action. Throughout the book! cybersecurity is treated holistically! covering outstanding issues in law! science! economics and politics. Inhaltsverzeichnis Part I. Foundations of Polycentric Regulation in Cyberspace: 1. Defining the cyber threat in Internet governance; 2. Who controls cyberspace? Analyzing cyberspace through polycentric governance; Part II. Managing Vulnerabilities: 3. Hacking the planet, the Dalai Lama, and you: managing technical vulnerabilities in the Internet; 4. The new cyberwarfare: securing critical national infrastructure in the digital age; 5. Risky business: enhancing private sector cybersecurity through the competitive market; Part III. The Law, Politics, and Promise of Cyber Peace: 6. The law of cyber war and peace; 7. Cyber peace....