Loading…

Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis

This article traces the evolution of the proactive cybersecurity industry in a global legal environment. The authors argue that, while hard law exists in this space both within the US and globally, such laws were largely enacted at a time when proactive cybersecurity remained nascent; as a result, t...

Full description

Saved in:
Bibliographic Details
Published in:American business law journal 2015-12, Vol.52 (4), p.721-787
Main Authors: Craig, Amanda N., Shackelford, Scott J., Hiller, Janine S.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c4065-c1578a7f5cad7f58ed7709ac82f5dc17223c672e9df3ec0b11e151f0a0a86d3c3
cites cdi_FETCH-LOGICAL-c4065-c1578a7f5cad7f58ed7709ac82f5dc17223c672e9df3ec0b11e151f0a0a86d3c3
container_end_page 787
container_issue 4
container_start_page 721
container_title American business law journal
container_volume 52
creator Craig, Amanda N.
Shackelford, Scott J.
Hiller, Janine S.
description This article traces the evolution of the proactive cybersecurity industry in a global legal environment. The authors argue that, while hard law exists in this space both within the US and globally, such laws were largely enacted at a time when proactive cybersecurity remained nascent; as a result, the private sector has taken the lead in developing industry norms. Part I contextualizes the emergence of active cyber defense, describing private sector attempts to use proactive technologies in the early 2000s as well as the reasons that such technologies did not achieve widespread adoption or attention at that point. Next, Part II assesses the post-2010, maturing proactive-cybersecurity industry. Finally, Part III considers these organizations' proactive cybersecurity programs by using the literature on "global security assemblages" and polycentric governance to demonstrate their likely staying power and implications for business practices and policy making.
doi_str_mv 10.1111/ablj.12055
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1749575207</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3897037851</sourcerecordid><originalsourceid>FETCH-LOGICAL-c4065-c1578a7f5cad7f58ed7709ac82f5dc17223c672e9df3ec0b11e151f0a0a86d3c3</originalsourceid><addsrcrecordid>eNp9kMFOwzAMhiMEEmNw4QkqcUPqiNMm7riVCsbQBAiBJnGJsjRFHWUdSQv07clW4IgPtix_v2X_hBwDHYGPM7WoliNglPMdMgCM4xAQ4l0yoJSyEFGIfXLg3NK3ACgGZHJva6Wb8sMEWbcw1hnd2rLpzoM0yOq3tbJqO5yu8tY1tgvUKg8ezEtbqab2bbpSVedKd0j2ClU5c_RTh-Tp6vIxuw5nd5Npls5CHVPBQw0cE4UF1yr3OTE5Ih0rnbCC5xqQsUgLZGacF5HRdAFggENBFVWJyCMdDclJv3dt6_fWuEYu69b6I5z07445ckbRU6c9pW3tnDWFXNvyTdlOApUbo-TGKLk1ysPQw59lZbp_SJlezG5-NWGvKV1jvv40yr5KgRFyOb-dyEiI7BnmXGL0DaSbec8</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1749575207</pqid></control><display><type>article</type><title>Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis</title><source>EBSCOhost Business Source Ultimate</source><source>Nexis UK</source><source>Wiley-Blackwell Read &amp; Publish Collection</source><creator>Craig, Amanda N. ; Shackelford, Scott J. ; Hiller, Janine S.</creator><creatorcontrib>Craig, Amanda N. ; Shackelford, Scott J. ; Hiller, Janine S.</creatorcontrib><description>This article traces the evolution of the proactive cybersecurity industry in a global legal environment. The authors argue that, while hard law exists in this space both within the US and globally, such laws were largely enacted at a time when proactive cybersecurity remained nascent; as a result, the private sector has taken the lead in developing industry norms. Part I contextualizes the emergence of active cyber defense, describing private sector attempts to use proactive technologies in the early 2000s as well as the reasons that such technologies did not achieve widespread adoption or attention at that point. Next, Part II assesses the post-2010, maturing proactive-cybersecurity industry. Finally, Part III considers these organizations' proactive cybersecurity programs by using the literature on "global security assemblages" and polycentric governance to demonstrate their likely staying power and implications for business practices and policy making.</description><identifier>ISSN: 0002-7766</identifier><identifier>EISSN: 1744-1714</identifier><identifier>DOI: 10.1111/ablj.12055</identifier><identifier>CODEN: ABLJAN</identifier><language>eng</language><publisher>Oxford, Ohio: Blackwell Publishing Ltd</publisher><subject>Commercial law ; Cybersecurity ; Data integrity ; Information industry ; National security</subject><ispartof>American business law journal, 2015-12, Vol.52 (4), p.721-787</ispartof><rights>2015 The Authors American Business Law Journal © 2015 Academy of Legal Studies in Business</rights><rights>Copyright Academy of Legal Studies in Business Winter 2015</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c4065-c1578a7f5cad7f58ed7709ac82f5dc17223c672e9df3ec0b11e151f0a0a86d3c3</citedby><cites>FETCH-LOGICAL-c4065-c1578a7f5cad7f58ed7709ac82f5dc17223c672e9df3ec0b11e151f0a0a86d3c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904</link.rule.ids></links><search><creatorcontrib>Craig, Amanda N.</creatorcontrib><creatorcontrib>Shackelford, Scott J.</creatorcontrib><creatorcontrib>Hiller, Janine S.</creatorcontrib><title>Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis</title><title>American business law journal</title><addtitle>Am Bus Law J</addtitle><description>This article traces the evolution of the proactive cybersecurity industry in a global legal environment. The authors argue that, while hard law exists in this space both within the US and globally, such laws were largely enacted at a time when proactive cybersecurity remained nascent; as a result, the private sector has taken the lead in developing industry norms. Part I contextualizes the emergence of active cyber defense, describing private sector attempts to use proactive technologies in the early 2000s as well as the reasons that such technologies did not achieve widespread adoption or attention at that point. Next, Part II assesses the post-2010, maturing proactive-cybersecurity industry. Finally, Part III considers these organizations' proactive cybersecurity programs by using the literature on "global security assemblages" and polycentric governance to demonstrate their likely staying power and implications for business practices and policy making.</description><subject>Commercial law</subject><subject>Cybersecurity</subject><subject>Data integrity</subject><subject>Information industry</subject><subject>National security</subject><issn>0002-7766</issn><issn>1744-1714</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><recordid>eNp9kMFOwzAMhiMEEmNw4QkqcUPqiNMm7riVCsbQBAiBJnGJsjRFHWUdSQv07clW4IgPtix_v2X_hBwDHYGPM7WoliNglPMdMgCM4xAQ4l0yoJSyEFGIfXLg3NK3ACgGZHJva6Wb8sMEWbcw1hnd2rLpzoM0yOq3tbJqO5yu8tY1tgvUKg8ezEtbqab2bbpSVedKd0j2ClU5c_RTh-Tp6vIxuw5nd5Npls5CHVPBQw0cE4UF1yr3OTE5Ih0rnbCC5xqQsUgLZGacF5HRdAFggENBFVWJyCMdDclJv3dt6_fWuEYu69b6I5z07445ckbRU6c9pW3tnDWFXNvyTdlOApUbo-TGKLk1ysPQw59lZbp_SJlezG5-NWGvKV1jvv40yr5KgRFyOb-dyEiI7BnmXGL0DaSbec8</recordid><startdate>20151201</startdate><enddate>20151201</enddate><creator>Craig, Amanda N.</creator><creator>Shackelford, Scott J.</creator><creator>Hiller, Janine S.</creator><general>Blackwell Publishing Ltd</general><general>Academy of Legal Studies in Business</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20151201</creationdate><title>Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis</title><author>Craig, Amanda N. ; Shackelford, Scott J. ; Hiller, Janine S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c4065-c1578a7f5cad7f58ed7709ac82f5dc17223c672e9df3ec0b11e151f0a0a86d3c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Commercial law</topic><topic>Cybersecurity</topic><topic>Data integrity</topic><topic>Information industry</topic><topic>National security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Craig, Amanda N.</creatorcontrib><creatorcontrib>Shackelford, Scott J.</creatorcontrib><creatorcontrib>Hiller, Janine S.</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><jtitle>American business law journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Craig, Amanda N.</au><au>Shackelford, Scott J.</au><au>Hiller, Janine S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis</atitle><jtitle>American business law journal</jtitle><addtitle>Am Bus Law J</addtitle><date>2015-12-01</date><risdate>2015</risdate><volume>52</volume><issue>4</issue><spage>721</spage><epage>787</epage><pages>721-787</pages><issn>0002-7766</issn><eissn>1744-1714</eissn><coden>ABLJAN</coden><abstract>This article traces the evolution of the proactive cybersecurity industry in a global legal environment. The authors argue that, while hard law exists in this space both within the US and globally, such laws were largely enacted at a time when proactive cybersecurity remained nascent; as a result, the private sector has taken the lead in developing industry norms. Part I contextualizes the emergence of active cyber defense, describing private sector attempts to use proactive technologies in the early 2000s as well as the reasons that such technologies did not achieve widespread adoption or attention at that point. Next, Part II assesses the post-2010, maturing proactive-cybersecurity industry. Finally, Part III considers these organizations' proactive cybersecurity programs by using the literature on "global security assemblages" and polycentric governance to demonstrate their likely staying power and implications for business practices and policy making.</abstract><cop>Oxford, Ohio</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1111/ablj.12055</doi><tpages>67</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0002-7766
ispartof American business law journal, 2015-12, Vol.52 (4), p.721-787
issn 0002-7766
1744-1714
language eng
recordid cdi_proquest_journals_1749575207
source EBSCOhost Business Source Ultimate; Nexis UK; Wiley-Blackwell Read & Publish Collection
subjects Commercial law
Cybersecurity
Data integrity
Information industry
National security
title Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T05%3A17%3A58IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Proactive%20Cybersecurity:%20A%20Comparative%20Industry%20and%20Regulatory%20Analysis&rft.jtitle=American%20business%20law%20journal&rft.au=Craig,%20Amanda%20N.&rft.date=2015-12-01&rft.volume=52&rft.issue=4&rft.spage=721&rft.epage=787&rft.pages=721-787&rft.issn=0002-7766&rft.eissn=1744-1714&rft.coden=ABLJAN&rft_id=info:doi/10.1111/ablj.12055&rft_dat=%3Cproquest_cross%3E3897037851%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c4065-c1578a7f5cad7f58ed7709ac82f5dc17223c672e9df3ec0b11e151f0a0a86d3c3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1749575207&rft_id=info:pmid/&rfr_iscdi=true