Loading…
Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis
This article traces the evolution of the proactive cybersecurity industry in a global legal environment. The authors argue that, while hard law exists in this space both within the US and globally, such laws were largely enacted at a time when proactive cybersecurity remained nascent; as a result, t...
Saved in:
Published in: | American business law journal 2015-12, Vol.52 (4), p.721-787 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c4065-c1578a7f5cad7f58ed7709ac82f5dc17223c672e9df3ec0b11e151f0a0a86d3c3 |
---|---|
cites | cdi_FETCH-LOGICAL-c4065-c1578a7f5cad7f58ed7709ac82f5dc17223c672e9df3ec0b11e151f0a0a86d3c3 |
container_end_page | 787 |
container_issue | 4 |
container_start_page | 721 |
container_title | American business law journal |
container_volume | 52 |
creator | Craig, Amanda N. Shackelford, Scott J. Hiller, Janine S. |
description | This article traces the evolution of the proactive cybersecurity industry in a global legal environment. The authors argue that, while hard law exists in this space both within the US and globally, such laws were largely enacted at a time when proactive cybersecurity remained nascent; as a result, the private sector has taken the lead in developing industry norms. Part I contextualizes the emergence of active cyber defense, describing private sector attempts to use proactive technologies in the early 2000s as well as the reasons that such technologies did not achieve widespread adoption or attention at that point. Next, Part II assesses the post-2010, maturing proactive-cybersecurity industry. Finally, Part III considers these organizations' proactive cybersecurity programs by using the literature on "global security assemblages" and polycentric governance to demonstrate their likely staying power and implications for business practices and policy making. |
doi_str_mv | 10.1111/ablj.12055 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1749575207</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3897037851</sourcerecordid><originalsourceid>FETCH-LOGICAL-c4065-c1578a7f5cad7f58ed7709ac82f5dc17223c672e9df3ec0b11e151f0a0a86d3c3</originalsourceid><addsrcrecordid>eNp9kMFOwzAMhiMEEmNw4QkqcUPqiNMm7riVCsbQBAiBJnGJsjRFHWUdSQv07clW4IgPtix_v2X_hBwDHYGPM7WoliNglPMdMgCM4xAQ4l0yoJSyEFGIfXLg3NK3ACgGZHJva6Wb8sMEWbcw1hnd2rLpzoM0yOq3tbJqO5yu8tY1tgvUKg8ezEtbqab2bbpSVedKd0j2ClU5c_RTh-Tp6vIxuw5nd5Npls5CHVPBQw0cE4UF1yr3OTE5Ih0rnbCC5xqQsUgLZGacF5HRdAFggENBFVWJyCMdDclJv3dt6_fWuEYu69b6I5z07445ckbRU6c9pW3tnDWFXNvyTdlOApUbo-TGKLk1ysPQw59lZbp_SJlezG5-NWGvKV1jvv40yr5KgRFyOb-dyEiI7BnmXGL0DaSbec8</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1749575207</pqid></control><display><type>article</type><title>Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis</title><source>EBSCOhost Business Source Ultimate</source><source>Nexis UK</source><source>Wiley-Blackwell Read & Publish Collection</source><creator>Craig, Amanda N. ; Shackelford, Scott J. ; Hiller, Janine S.</creator><creatorcontrib>Craig, Amanda N. ; Shackelford, Scott J. ; Hiller, Janine S.</creatorcontrib><description>This article traces the evolution of the proactive cybersecurity industry in a global legal environment. The authors argue that, while hard law exists in this space both within the US and globally, such laws were largely enacted at a time when proactive cybersecurity remained nascent; as a result, the private sector has taken the lead in developing industry norms. Part I contextualizes the emergence of active cyber defense, describing private sector attempts to use proactive technologies in the early 2000s as well as the reasons that such technologies did not achieve widespread adoption or attention at that point. Next, Part II assesses the post-2010, maturing proactive-cybersecurity industry. Finally, Part III considers these organizations' proactive cybersecurity programs by using the literature on "global security assemblages" and polycentric governance to demonstrate their likely staying power and implications for business practices and policy making.</description><identifier>ISSN: 0002-7766</identifier><identifier>EISSN: 1744-1714</identifier><identifier>DOI: 10.1111/ablj.12055</identifier><identifier>CODEN: ABLJAN</identifier><language>eng</language><publisher>Oxford, Ohio: Blackwell Publishing Ltd</publisher><subject>Commercial law ; Cybersecurity ; Data integrity ; Information industry ; National security</subject><ispartof>American business law journal, 2015-12, Vol.52 (4), p.721-787</ispartof><rights>2015 The Authors American Business Law Journal © 2015 Academy of Legal Studies in Business</rights><rights>Copyright Academy of Legal Studies in Business Winter 2015</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c4065-c1578a7f5cad7f58ed7709ac82f5dc17223c672e9df3ec0b11e151f0a0a86d3c3</citedby><cites>FETCH-LOGICAL-c4065-c1578a7f5cad7f58ed7709ac82f5dc17223c672e9df3ec0b11e151f0a0a86d3c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904</link.rule.ids></links><search><creatorcontrib>Craig, Amanda N.</creatorcontrib><creatorcontrib>Shackelford, Scott J.</creatorcontrib><creatorcontrib>Hiller, Janine S.</creatorcontrib><title>Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis</title><title>American business law journal</title><addtitle>Am Bus Law J</addtitle><description>This article traces the evolution of the proactive cybersecurity industry in a global legal environment. The authors argue that, while hard law exists in this space both within the US and globally, such laws were largely enacted at a time when proactive cybersecurity remained nascent; as a result, the private sector has taken the lead in developing industry norms. Part I contextualizes the emergence of active cyber defense, describing private sector attempts to use proactive technologies in the early 2000s as well as the reasons that such technologies did not achieve widespread adoption or attention at that point. Next, Part II assesses the post-2010, maturing proactive-cybersecurity industry. Finally, Part III considers these organizations' proactive cybersecurity programs by using the literature on "global security assemblages" and polycentric governance to demonstrate their likely staying power and implications for business practices and policy making.</description><subject>Commercial law</subject><subject>Cybersecurity</subject><subject>Data integrity</subject><subject>Information industry</subject><subject>National security</subject><issn>0002-7766</issn><issn>1744-1714</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><recordid>eNp9kMFOwzAMhiMEEmNw4QkqcUPqiNMm7riVCsbQBAiBJnGJsjRFHWUdSQv07clW4IgPtix_v2X_hBwDHYGPM7WoliNglPMdMgCM4xAQ4l0yoJSyEFGIfXLg3NK3ACgGZHJva6Wb8sMEWbcw1hnd2rLpzoM0yOq3tbJqO5yu8tY1tgvUKg8ezEtbqab2bbpSVedKd0j2ClU5c_RTh-Tp6vIxuw5nd5Npls5CHVPBQw0cE4UF1yr3OTE5Ih0rnbCC5xqQsUgLZGacF5HRdAFggENBFVWJyCMdDclJv3dt6_fWuEYu69b6I5z07445ckbRU6c9pW3tnDWFXNvyTdlOApUbo-TGKLk1ysPQw59lZbp_SJlezG5-NWGvKV1jvv40yr5KgRFyOb-dyEiI7BnmXGL0DaSbec8</recordid><startdate>20151201</startdate><enddate>20151201</enddate><creator>Craig, Amanda N.</creator><creator>Shackelford, Scott J.</creator><creator>Hiller, Janine S.</creator><general>Blackwell Publishing Ltd</general><general>Academy of Legal Studies in Business</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20151201</creationdate><title>Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis</title><author>Craig, Amanda N. ; Shackelford, Scott J. ; Hiller, Janine S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c4065-c1578a7f5cad7f58ed7709ac82f5dc17223c672e9df3ec0b11e151f0a0a86d3c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Commercial law</topic><topic>Cybersecurity</topic><topic>Data integrity</topic><topic>Information industry</topic><topic>National security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Craig, Amanda N.</creatorcontrib><creatorcontrib>Shackelford, Scott J.</creatorcontrib><creatorcontrib>Hiller, Janine S.</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><jtitle>American business law journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Craig, Amanda N.</au><au>Shackelford, Scott J.</au><au>Hiller, Janine S.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis</atitle><jtitle>American business law journal</jtitle><addtitle>Am Bus Law J</addtitle><date>2015-12-01</date><risdate>2015</risdate><volume>52</volume><issue>4</issue><spage>721</spage><epage>787</epage><pages>721-787</pages><issn>0002-7766</issn><eissn>1744-1714</eissn><coden>ABLJAN</coden><abstract>This article traces the evolution of the proactive cybersecurity industry in a global legal environment. The authors argue that, while hard law exists in this space both within the US and globally, such laws were largely enacted at a time when proactive cybersecurity remained nascent; as a result, the private sector has taken the lead in developing industry norms. Part I contextualizes the emergence of active cyber defense, describing private sector attempts to use proactive technologies in the early 2000s as well as the reasons that such technologies did not achieve widespread adoption or attention at that point. Next, Part II assesses the post-2010, maturing proactive-cybersecurity industry. Finally, Part III considers these organizations' proactive cybersecurity programs by using the literature on "global security assemblages" and polycentric governance to demonstrate their likely staying power and implications for business practices and policy making.</abstract><cop>Oxford, Ohio</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1111/ablj.12055</doi><tpages>67</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0002-7766 |
ispartof | American business law journal, 2015-12, Vol.52 (4), p.721-787 |
issn | 0002-7766 1744-1714 |
language | eng |
recordid | cdi_proquest_journals_1749575207 |
source | EBSCOhost Business Source Ultimate; Nexis UK; Wiley-Blackwell Read & Publish Collection |
subjects | Commercial law Cybersecurity Data integrity Information industry National security |
title | Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T05%3A17%3A58IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Proactive%20Cybersecurity:%20A%20Comparative%20Industry%20and%20Regulatory%20Analysis&rft.jtitle=American%20business%20law%20journal&rft.au=Craig,%20Amanda%20N.&rft.date=2015-12-01&rft.volume=52&rft.issue=4&rft.spage=721&rft.epage=787&rft.pages=721-787&rft.issn=0002-7766&rft.eissn=1744-1714&rft.coden=ABLJAN&rft_id=info:doi/10.1111/ablj.12055&rft_dat=%3Cproquest_cross%3E3897037851%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c4065-c1578a7f5cad7f58ed7709ac82f5dc17223c672e9df3ec0b11e151f0a0a86d3c3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1749575207&rft_id=info:pmid/&rfr_iscdi=true |