dc.contributor | https://orcid.org/0000-0002-9250-7911 | |
dc.contributor | https://scholar.google.com/citations?user=hqvoNZ4AAAAJ&hl=es | |
dc.contributor | https://scienti.colciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0001408533 | |
dc.creator | Gaitán Rodríguez, Andrés | |
dc.date.accessioned | 2019-02-07T00:38:41Z | |
dc.date.available | 2019-02-07T00:38:41Z | |
dc.date.created | 2019-02-07T00:38:41Z | |
dc.date.issued | 2018 | |
dc.identifier | Gaitán, A. (2018). Ciberguerra. la consolidación de un nuevo poder en las relaciones internacionales contemporáneas. Bogotá: Ediciones USTA. | |
dc.identifier | 9789587821512 | |
dc.identifier | http://hdl.handle.net/11634/15412 | |
dc.identifier | https://doi.org/10.15332/li.lib.2018.00130 | |
dc.description.abstract | The author of this work argues that cyberspace can be considered as a new dimension of human action to reproduce the interstate war typical of international relations. For its argumentation it proposes three objectives: first, to analyze the practice of war, its perennial elements and to understand its relationship with technology; second, to present the qualities and elements that make cyberspace a new dimension of optimal human action to reproduce the practice of war, and third, to describe the nature of cyberwar and the ways in which it has materialized in real life. Finally, the author also evidences the existence of new actors that seek to take advantage of the characteristics of the warlike confrontations in cyberspace.
This book is a boost to the investigative and proactive work of other academics in the cyberspace and its relationship with vital political aspects -such as security and national defense-, and a necessary reference to generate a debate on the new responsibilities of the State with its citizens in the XXI century. | |
dc.language | spa | |
dc.publisher | Universidad Santo Tomás | |
dc.publisher | Producción Editorial | |
dc.relation | https://ediciones.usta.edu.co/index.php/publicaciones/titulos-disponibles/404/ciberguerra-la-consolidaci%C3%B3n-de-un-nuevo-poder-en-las-relaciones-internacionales-contempor%C3%A1neas-detail | |
dc.relation | Abbate, J. E. (1994). From arpanet to Internet: A history of arpa-sponsored
computer networks, 1966-1988. Pennsylvania: University of Pennsylvania. | |
dc.relation | Adams, J. (2001). Virtual defense. Foreign Affairs, 80(3), 98-112. | |
dc.relation | Alcaraz, C. y Zeadally, S. (2015). Critical infrastructure protection: Requirements and challenges for the 21st century. International Journal of Critical Infrastructure Protection, 8, 53-66. | |
dc.relation | Allen, D. M. y Allen, J. H. (2012, enero). How to become a cyber warrior
[Podcast de audio]. Recuperado de https://www.cert.org/podcasts/podcast_episode.cfm?episodeid=34730 | |
dc.relation | Allen, P. y Demchak, C. (2003). La guerra cibernética palestina-israelí. Military Review, 2, 52-59. | |
dc.relation | Anding, D. E. (2007). Center of gravity and the range of military operations: Can an old dog apply to new tricks? Massachusetts: Naval War College. | |
dc.relation | Arquilla, J. y Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, 12(2), 141-165. | |
dc.relation | Arquilla, J. y Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, 12(2), 141-165. | |
dc.relation | Arquilla, J. y Ronfeldt, D. (1997a). A new epoch and espectrum of conflicts.
En J. Arquilla y D. Ronfeldt (eds.), In Athena’s camp: Preparing for conflict in the information age (pp. 1-22). Santa Mónica, CA: rand | |
dc.relation | Arquilla, J. y Ronfeldt, D. (1997b). Cyberwar is coming! En J. Arquilla y D.
Ronfeldt (eds.), In Athena’s camp: Preparing for conflict in the information age (pp. 23-60). Santa Mónica, CA: rand. | |
dc.relation | Arquilla, J. y Ronfeldt, D. (2001). Networks and netwars: The future of terror, crime, and militancy. Santa Mónica, CA: rand | |
dc.relation | Arquilla, J., Ronfeldt, D. y Zanini, M. (2000). Networks, netwar, and information-age terrorism. En Z. Khalilzad y J. White (eds.), Strategic appraisal:
The changing role of information in warfare (pp. 75-111). Santa Mónica, CA: rand. | |
dc.relation | Asaolu, O. S. (2006). On the emergence of new computer technologies. Educational Technology & Society, 9(1), 335-343. | |
dc.relation | Asaro, P. M. (2012). How just could a robot war be? En P. Tamara y E. Gaston (eds.), Ethics of 21st century military conflict (pp. 257-269). Nueva
York: International Debate Education Association. | |
dc.relation | asce Critical Infrastructure Guidance Task Committee (2009). Guiding principles for the nation’s critical infrastructure. Virginia: American Society
of Civil Engineers. | |
dc.relation | Ashmore, W. C. (2009). Impact of alleged russian cyber attacks. Baltic Security & Defence Review, 11, 4-40. | |
dc.relation | Ballén Molina, R. (2010). Las razones que motivan la guerra. Diálogos de
saberes: investigaciones y ciencias sociales, 32, 103-120. | |
dc.relation | Ballina Talento, G. (2008). La evolución de la internet como medio de comunicación masivo (Tesis de grado, Universidad de San Carlos de Guatemala, Guatemala). | |
dc.relation | Barfield, W. y Williams, A. (2017). Cyborgs and enhancement technology.
Philosophies, 2(1) | |
dc.relation | Bazyan, S. (2012). Environmental impact of war technology and prohibition
processes (Tesis de maestría, Mittuniversitetet, Östersund, Suecia). | |
dc.relation | Bejarano, P. (2014, febrero 6). Código Enigma, descifrado: el papel de Turing en
la Segunda Guerra Mundial. Eldiario.es. Recuperado de http://www.eldiario.es/turing/criptografia/alan-turing-enigma-codigo_0_226078042.html | |
dc.relation | Bellamy, C. (2015). The evolution of modern land warfare: Theory and practice. Londres: Routledge | |
dc.relation | Bendrath, R. (2001). The ciberwar perceptions and politics in U.S. critical infrastructure protection. Information & Security: An International Journal, 7, 80-103. | |
dc.relation | Berkowitz, B. D. (1997). Warfare in the information age. En J. Arquilla y D.
Ronfeldt (eds.), In Athena’s camp: Preparing for conf | |
dc.relation | Bessani, A. N., Sousa, P., Correia, M., Neves, N. F. y Veríssimo, P. (2008). The
crutial way o | |
dc.relation | Bhattacharjee, S. (2009). The strategic dimensions of cyber security in the indian context. Strategic Analysis, 33(2), 196-201. | |
dc.relation | Bieber, F. (2000). Cyberwar or sideshow? The Internet and the Balkan wars.
Current History, 99(635), 124-128. | |
dc.relation | Bieber, F. (2000). Cyberwar or sideshow? The Internet and the Balkan wars.
Current History, 99(635), 124-128. | |
dc.relation | Bishop, M. y Goldman, E. (2003). The strategy and tactics of information
warfare. Contemporary Security Policy, 24(1), 113-139. | |
dc.relation | Black, J. (2009). The revolution in military affairs: The historian’s perspective. The RUSI Journal, 154(2), 98-102. | |
dc.relation | Boaru, G. y Badita, G. I. (2008). Critical infrastructure interdependencies. En
I. Bujoreanu y D. Sora (coords.), Defense resources management in the
21st century (pp. 130-146). Bucarest: National Defense University Carol I Publishing House | |
dc.relation | Boot, M. (2003). The new American way of war. Foreign Affairs, 82(4),
41-58. Recuperado de https://www.foreignaffairs.com/articles/
united-states/2003-07-01/new-american-way-war | |
dc.relation | Boyd Jara, C. (2009, agosto 5). Internet: el refugio de grupos terroristas
[Entrada blog]. Recuperado de http://intelligenceservicechile.blogspot.
com/2009/08/internet-el-refugio-de-grupos.html | |
dc.relation | Bradley, A. (2003). Anatomy of cyberterrorism is America vulnerable? (Tesis
de grado, Air University, Alabama, Estados Unidos). | |
dc.relation | Brenner, S. W. (2009). Cyberthreats: The emerging fault lines of the nation
state. Oxford: Oxford University Press. | |
dc.relation | Brey, P. A. y Mitcham, C. (2005). Prosthetics. En MacMillan Encyclopedia
of Science, Technology and Ethics (pp. 1527-1532). Basingstoke: MacMillan Press. | |
dc.relation | Brooks, S. G. y Wohlforth, W. C. (2007). Power, globalization, and the end
of the cold war: Reevaluating a landmark case for ideas. En J. Levy y G. Goertz (eds.), Explaining war and peace: Case studies and necessary
condition counterfactuals (pp. 195-236). Abingdon: Routledge. | |
dc.relation | Carr, J. (2011). Inside cyber warfare: Mapping the cyber underworld. Massachusetts: O’ Really Media. | |
dc.relation | Carrillo Payá, P. (2006). Terrorismo y ciberespacio. Recuperado de http://
www.assessorit.com/web/images/stories/prensa/pcarrillo-paper.pdf | |
dc.relation | Casey, G. (2009). Future Soldier 2030 Initiative. rdecom. Recuperado de https://www.wired.com/images_blogs/dangerroom/2009/05/
dplus2009_11641-1.pdf | |
dc.relation | Castells, M. (1997). An introduction to the information age. City, 2(7), 6-16. | |
dc.relation | Castells, M. (1999). La era de la información: economía, sociedad y cultura
(vol. 1). México: Siglo XXI. | |
dc.relation | Castells, M. (2000). La sociedad red. Madrid: Alianza Editorial. | |
dc.relation | Castells, M. (2001). Galaxia Internet. Barcelona: Plaza & Janés. | |
dc.relation | Castells, M. (2004). The network society: A cross-cultural perspective. Cheltenham, MA: Edward Elgar Publishing. | |
dc.relation | Castro, C. y Filippi, L. (2010). Modelos matemáticos de información y comunicación cibernética (Wiener, Shannon y Weaver): mejorar la comunicación es el desafío de nuestro destino cultural. Revista RE-Presentaciones
Periodismo, Comunicación y Sociedad, 3(6), 145-161. | |
dc.relation | Cebrowski, A. K. y Garstka, J. J. (1998). Network-centric warfare: Its origin
and future. U.S. Naval Institute Proceedings, 124(1), 28-35.
. | |
dc.relation | Chandler, W. W. (1983). The installation and maintenance of Colossus. Annals of the History of Computing, 5(3), 260-262. | |
dc.relation | Chilton, K. P. (2009). Cyberspace leadership: Towards new culture, conduct,
and capabilities. Air & Space Power Journal, 23(3), 5-11. Recuperado de
http://go.galegroup.com/ps/anonymous?id=GALE%7CA212767728&sid=googleScholar&v=2.1&it=r&linkaccess=abs&issn=1555385X&p=AONE&sw=w. | |
dc.relation | Counter-Terrorism Committee Executive Directorate (2017). Physical protection of critical infrastructure against terrorist attacks. Nueva York: Counter-Terrorism Committee Executive Directorate. | |
dc.relation | Clark, A. (2003). Natural-born cyborgs: Minds, technologies, and the future
of human intelligence. Nueva York: Oxford University Press. | |
dc.relation | Clark, T. (2015). Autonomous robotics for military usage. Recuperado de
http://www.pitt.edu/~trc50/writing_assignment_3.pdf | |
dc.relation | Clark, R. A. y Knake, R. K. (2010). Cyber war: The next threat to national
security and what to do about it. Nueva York: ecco. | |
dc.relation | Clarke, B. (2015, septiembre 1). The 30 most important airplanes of
all time the planes that defined the aerospace age. Popular Mechanics. Recuperado de http://www.popularmechanics.com/flight/g2142/
the-30-most-important-airplanes-of-all-time/ | |
dc.relation | Department of Defense (1997). C4ISR architecture framework version 2.0. Washington D. C.: C4ISR Architecture Working Group. | |
dc.relation | Clarke, R. (2009). War from cyberspace. The National Interest, 104, 31-36 | |
dc.relation | Clausewitz, C. (1942). Principles of war. Pensilvania: Stackpole Books. | |
dc.relation | Clemente, D. (2013). Cyber security and global interdependence: What is critical? Londres: Chatham House, Royal Institute of International Affairs. | |
dc.relation | Coeckelbergh, M. (2013). Drones, information technology, and distance: Mapping the moral epistemology of remote fighting. Ethics and Information
Technology, 15(2), 87-98. | |
dc.relation | Cohen-Almagor, R. (2000). The terrorists’ best ally: The Quebec media coverage of the flq crisis in october 1970. Canadian Journal of Communication, 25(2), 251-284. | |
dc.relation | Cohen, J. (2013). Memory implants: A maverick neuroscientist believes he
has deciphered the code by which the brain forms long-term memories.
mit Technology Review. Recuperado de https://www.technologyreview.
com/s/513681/memory-implants/ | |
dc.relation | Cohnen, F. (2010). Las ciberguerras del siglo xxi. Antena de Telecomunicación, 179, 16-21. | |
dc.relation | Colesniuc, D. (2013). Cyberspace and critical information infrastructures.
Informatica Economica, 17(4), 123-132. | |
dc.relation | Cooper, J. R. (1997). Another view of the revolution in military affairs. En J.
Arquilla y D. Ronfeldt (eds.), In Athena’s camp: Preparing for conflict in
the information age (pp. 99-140). Santa Mónica, CA: rand. | |
dc.relation | Conway, M. (2002). Reality bytes: Cyberterrorism and terrorist ‘use’ of the
Internet. First Monday, 7(11). Recuperado de http://doras.dcu.ie/498/1/
first_mon_7_11_2002.pdf | |
dc.relation | Cordesman, A. H. y Wagner, A. R. (1990). The lessons of modern war. Boulder: Westview Press. | |
dc.relation | Counter-Terrorism Committee Executive Directorate (2017). Physical protection of critical infrastructure against terrorist attacks. Nueva York:
Counter-Terrorism Committee Executive Directorate. | |
dc.relation | Criado Grande, J. I., Ramilo Araujo, M. C. y Serna, M. S. (2002). La necesidad de teoría(s) sobre gobierno electrónico: una propuesta integradora.
Ponencia presentada en xvi Concurso de Ensayos y Monografías del.clad sobre Reforma del Estado y Modernización de la Administración
Pública “Gobierno Electrónico”. Caracas, Venezuela. Recuperado de
https://www.urbe.edu/info-consultas/web-profesor/12697883/articulos/
Comercio%20Electronico/la-necesidad-de-teoria(s)sobre-gobierno-electronico-una-propuesta-integradora.pdf | |
dc.relation | Cronin, B. y Crawford, H. (1999). Information warfare: Its application in
military and civilian contexts. The Information Society, 15(4), 257-263. | |
dc.relation | Crowell, R. M. (2017). Some principles of cyber warfare using corbett to understand war in the early twenty: First century. Londres: The Corbett
Centre for Maritime Policy Studies. | |
dc.relation | Danet, D. y Hanon, J. P. (2014). Digitization and robotization of the battlefield: Evolution or robolution? En R. Doaré, D. Danet, J. P. Hanon y
G. de Boisboissel, Robots on the battlefield: Contemporary perspectives
and implications for the future (pp. xiii-xxxv). Kansas: Combat Studies
Institute Press. | |
dc.relation | Danish Institute For International Studies (2017). The un discusses lethal
autonomous weapons Killer Robots: The future of war? Recuperado de
http://pure.diis.dk/ws/files/817702/Killer_robots_WEB.pdf | |
dc.relation | Davis, N. C. (1997). An information-based revolution in military affairs. En
J. Arquilla y D. Ronfeldt (eds.), In Athena’s camp: Preparing for conflict
in the information age (pp. 79-98). Santa Mónica, CA: rand. | |
dc.relation | De Boisboissel, G. (2014). The use of robots on the Battlefield: Benefits, constraints, and limitations for soldiers. En R. Doaré, D. Danet, J. P. Hanon
y G. de Boisboissel, Robots on the battlefield: Contemporary perspectives and implications for the future (pp. 203-216). Kansas: Combat Studies Institute Press/ | |
dc.relation | Delibasis, D. (2007). The right to national self-defense: In information warfare operations. Tennessee: Arena books. | |
dc.relation | Department of Defense (1997). C4ISR architecture framework version 2.0.
Washington D. C.: C4ISR Architecture Working Group. | |
dc.relation | dod Dictionary of Military and Associated Terms (2018). Recuperado de
http://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.
pdf?ver=2018-07-25-091749-087 | |
dc.relation | Douhet, G. (2009). The command of the air. Alabama: University of Alabama Press. | |
dc.relation | Doyle, D. J. (2014). Robots, androids, and cyborgs in warfare: Ethical and
philosophical issues. Ethics in Biology, Engineering and Medicine: An
International Journal, 5(1), 13-23. | |
dc.relation | Droznes, L. (2005). El arte de la guerra: guía de aplicación de los principios
básicos de la guerra a las realidades de los mercados competitivos contemporáneos. Buenos Aires: Autodesarrollo. | |
dc.relation | Dunlap Jr, C. J. (2006). Neo-strategicon: Modernized principles of war for
the 21st century. Military Review, 42-48 | |
dc.relation | Dunn Cavelty, M. (2010). Cyberwar: Concept, status quo, and limitations.
CSS Analysis in Security Policy, 71, 1-3. | |
dc.relation | Dunn, M. A. (2001). The cyberspace dimension in armed conflict: Approaching a complex issue with assistance of the morphological method. Information & Security, 7, 145-158. | |
dc.relation | Echevarría, A. (2003). Clausewitz’s Center of Gravity: It’s not what we thought. Naval War College Review, 108-123. | |
dc.relation | Echavarría Jesús, C. (2009, diciembre 23). La innovación yihadista: propaganda, ciberterrorismo, armas y tácticas. Grupo de Estudios Estratégicos. Recuperado de http://www.gees.org/articulos/
la-innovacion-yihadista-propaganda-ciberterrorismo-armas-y-tacticas | |
dc.relation | El Mundo (2002, febrero 23). Musharraf ordena la detención de todos los
miembros del grupo que degolló al periodista Daniel Pearl. Recuperado de
http://www.elmundo.es/elmundo/2002/02/21/internacional/1014327615.
html | |
dc.relation | Eikmeier, D. C. (2004). Center of gravity analysis. Military Review, 84(4), 2-5. | |
dc.relation | Enders, W. y Sandler, T. (2000). Is transnational terrorism becoming more
threatening? A time-series investigation. Journal of Conflict Resolution,
44(3), 307-332. | |
dc.relation | Emol.com (2007, noviembre 15). En marcha computadora de la Segunda
Guerra Mundial. Recuperado de http://www.emol.com/noticias/tecnologia/2007/11/15/281942/en-marcha-computadora-de-la-segunda-guerra-mundial.html | |
dc.relation | Estupiñán Bethencour, F. (2001). Mitos sobre la globalización y las nuevas
tecnologías de la comunicación. Revista Latina de Comunicación Social, 4(38), 1-2. | |
dc.relation | Fabricio, A. (s. f.). Concepto de doctrina. Recuperado de https://es.scribd.
com/doc/57143024/CONCEPTO-DE-DOCTRINA | |
dc.relation | Fadok, D. S. (1995). John Boyd and John Warden: Air power’s quest for strategic paralysis. Alabama: School of Advanced Airpower Studies. | |
dc.relation | Fazio Vengoa, H. (2003). Globalización y guerra: una compleja relación. Revista de Estudios Sociales, 16, 42-56. | |
dc.relation | Fitzgerald, F. (2001). Way out there in the blue: Reagan, star wars and the
end of the cold war. Nueva York: Simon and Schuster. | |
dc.relation | Fleming, J. L. (1993). Capital ships: A historical perspective. Rhode Island:
Naval War College. | |
dc.relation | Fojón, J. E. (2006). Vigencia y limitaciones de la guerra de cuarta generación.
Real Instituto Alcano de Estudios Internacionales y Estratégicos. Recuperado de http://documentostics.com/component/option,com_docman/
task,doc_view/gid,864/Itemid,5/ | |
dc.relation | Foster, Jr , J. S., Gjelde, E., Graham, W. R., Hermann, R. J., Kluepfel, H. M.,
Lawson, R. L. … Woodard, J. B. (2008). Report of the Commission to
Assess the Threat to the United States from emp Attack: Critical national infrastructures. Washington D. C.: Congressional emp Commission. | |
dc.relation | Fredericks, B. (1997). Information warfare: The organizational dimension.
En R. E. Neilson (ed.), Sun Tzu and information warfare: A collection
of winning papers from the Sun Tzu art of war in information warfare
competition (pp. 79-102). Washington D. C.: National Defense University Press Publications. | |
dc.relation | Fulp, J. D. (2003). Training the cyber warrior. En C. Irvine y H. Armstrong
(eds.), Security education and critical infrastructures (pp. 261-273). Boston, MA: Springer. | |
dc.relation | Gaddis, J. L. (1997). History, theory, and common ground. International Security, 22(1), 75-85. | |
dc.relation | Gamero-Garrido, A. (2014). Cyber conflicts in international relations: Framework and case studies. Recuperado de https://papers.ssrn.com/sol3/
papers.cfm?abstract_id=2427993 | |
dc.relation | Gates, B. (1995). Camino al futuro. Bogotá: McGraw-Hill. | |
dc.relation | Geers, K. (2008). Cyberspace and the changing nature of warfare. Recuperado de https://www.sto.nato.int/publications/STO%20Meeting%20Proceedings/RTO-MP-IST-076/$MP-IST-076-KN.pdf | |
dc.relation | Geers, K. (2009). The cyber threat to national critical infrastructures: Beyond
theory. Information Security Journal: A Global Perspective, 18(1), 1-7. | |
dc.relation | Geers, K. (2010). The challenge of cyber attack deterrence. Computer Law
& Security Review, 26(3), 298-303. | |
dc.relation | Gibbs, S. y Hern, A. (2017, mayo 12). What is WannaCry ransomware and why is it attacking global computers? The Guardian. Recuperado de https://www.theguardian.com/technology/2017/may/12/
nhs-ransomware-cyber-attack-what-is-wanacrypt0r-20 | |
dc.relation | Gibson, W. (1984). Neuromancer. Nueva York: Ace Books. | |
dc.relation | Glavanakova, A. (2006). Cyborg body politics. Bulgarian Journal of American and Transatlantic Studies, 1. Recuperado de https://research.uni-sofia.bg/handle/123456789/1245 | |
dc.relation | Glebocki, J. (2008). dod Computer Network Operations: Time to hit the send
button. Carlisle Barracks, PA: U.S. Army War College. Recuperado de
http://www.dtic.mil/dtic/tr/fulltext/u2/a478337.pdf | |
dc.relation | Ghosh, S. (2004). The nature of cyber-attacks in the future: A position paper.
Information Systems Security, 13(1), 18-33. | |
dc.relation | Gorman, S. P. (2005). Networks, Security and Complexity: The role of public policy in critical infrastructure protection. Cheltenham: Edward Elgar Publishing | |
dc.relation | Granada, S. y Sánchez Meertens, C. (2009). Correlación de fuerzas en disputas
de guerras civiles: una aplicación al caso colombiano. En J. A. Restrepo
y D. Aponte (eds.), Guerra y violencias en Colombia: herramientas e interpretaciones (pp. 233-272). Bogotá: Pontificia Universidad Javeriana. | |
dc.relation | Grauer, R. (2013). Old wine in new bottles: The nature of conflict in the 21st
century. The Whitehead Journal of Diplomacy and International Relations, 14(9), 9-23 | |
dc.relation | Green, J. (2002). The myth of cyberterrorism. Washington Monthly, 34(11),
8-13. | |
dc.relation | Grinter, L. E. y Schneider, B. R. (1998). Battlefield of the future: 21st century
warfare issues. Alabama: Air University Press. | |
dc.relation | Gros Salvat, B. (2001). De la cibernética clásica a la cibercultura: herramientas conceptuales desde donde mirar el mundo cambiante. Education in
the Knowledge Society (eks), 2. Recuperado de https://dialnet.unirioja.
es/servlet/articulo?codigo=1243527 | |
dc.relation | Guarín, R. (2009). Medios de comunicación, terrorismo y antiterrorismo.
Bogotá: Escuela de Inteligencia y Contra Inteligencia Brigadier General
Ricardo Charry. | |
dc.relation | Gutiérrez Díez, L. A. (1995). Evolución de la tecnología militar y “su impacto” en España. Cuadernos de Estrategia, 75, 83-114. | |
dc.relation | Gutiérrez, M. F. (2010). Virus y cibervirus: virus biológicos y virus informáticos llaman la tensión de los virólogos. Innovación y Ciencia, 17(1), 50-56. | |
dc.relation | Hables Gray, C. (1997). Postmodern war: The new politics of conflict. Nueva York: Guilford Publications. | |
dc.relation | Haeni, R. E. (1997). Information warfare: An introduction. Washington D. C.:
The George Washington University | |
dc.relation | Harshberger, E. y Ochmanek, D. (1999). Information and warfare: New
opportunities for U.S. military forces. En Z. Khalilzad y J. White (eds.),
Strategic appraisal: The changing role of informatin in warfare (pp. 157-
178). Santa Mónica, CA: rand | |
dc.relation | Haulman, D. (2003). One hundred years of flight usaf chronology of significant air and space events 1903-2002. Alabama: Air University Press. | |
dc.relation | Henry, R. y Peartree, C. E. (1998). Military theory and information warfare.
Parameters, 28, 121-135 | |
dc.relation | Herr, H., Whiteley, G. P. y Childress, D. (2003). Cyborg technology: Biomimetic orthotic and prosthetic technology. En Y. Bar-Cohen y C. Breazeal,
Biologically inspired intelligent robots (pp. 103-143). Washington D. C.:
spie Press. | |
dc.relation | Heylighen, F. y Joslyn, C. (2001). Cybernetics and second-order cybernetics.
En R. A. Meyers (ed.), Encyclopedia of physical science & technology
(3.ª ed., pp. 155-170). Nueva York: Academic Press. | |
dc.relation | Hollis, D. (2011). Cyberwar case study: Georgia 2008. Small Wars Journal,
6(1), 1-10. | |
dc.relation | Holmes, R. (ed.) (2007). Campos de batalla: las guerras que han marcado la
historia. Barcelona: Ariel. | |
dc.relation | Hosek, J. R. (2003). The soldier of the 21st century. En S. E. Johnson, M. C.
Libicki y G. F. Treverton (eds.), New challenges, new tools for defense
decisionmaking (pp. 181-209). Santa Mónica, CA: rand | |
dc.relation | Hosmer, S. T. (1999). The information revolution and psychological effects.
En Z. Khalilazad y J. White (eds.), The changing role of information in
warfare (pp. 217-252). Santa Mónica, CA: rand. | |
dc.relation | Internet Society (2014, junio 3). Global internet report 2014: Open and sustainable acces for all. Ginebra: Internet Society | |
dc.relation | Jablonsky, D. (1994). U.S. Military Doctrine and the Revolution in Military
Affairs. Parameters, 24(3), 18-36 | |
dc.relation | Jackson, G. M. (2000). Warden’s five-ring system theory: Legitimate wartime military targeting or an increased potential to violate the law and
norms of expected behavior? (Tesis de grado, Maxwell Air Force Base,
Alabama, Estados Unidos). | |
dc.relation | Jain, G. (2005). Cyber terrorism: A clear and present danger to civilized society? Information Systems Education Journal, 3(44), 1-8 | |
dc.relation | Jiménez Cruz, J. (2008). Cibernética, inteligencia artificial y robótica. Casa
del Tiempo, 5(13), 52-56. | |
dc.relation | Joshi, A. (2000). The scourge of cyber-terrorism. Strategic Analysis, 24(4),
827-831. | |
dc.relation | Joyner, C. C. y Lotrionte, C. (2001). Information warfare as international
coercion: Elements of a legal framework. European Journal of International Law, 12(5), 825-865. | |
dc.relation | Kaldor, M. (1998). New and old wars: Organized violence in a global era.
Lincolnshire: Stanford University Press. | |
dc.relation | Kellermann, T., Martinez, P., Contreras, B. y Marchiori, B. (2015). Report
on cybersecurity and critical infrastructure in the Americas. Washington
D. C.: oas Secretariat for Multidimensional Security. | |
dc.relation | Kemp, S. (2017, enero 24). Digital in 2017: Global overview. We Are
Social. Recuperado de https://wearesocial.com/special-reports/
digital-in-2017-global-overview | |
dc.relation | Kerr, P. K., Rollins, J. y Theohary, C. A. (2010). The Stuxnet computer worm:
Harbinger of an emerging warfare capability. crs Report for Congress.
Recuperado de http://www.fas.org/sgp/crs/natsec/R41524.pdf | |
dc.relation | Mestres, F. y Vives-Rego, J. (2016). Reflexiones sobre los cyborgs y los robots: evolución humana y aumentación. Ludus Vitalis, 20(37), 225-252. | |
dc.relation | Kesan, J. P. y Hayes, C. M. (2010). Thinking through active defense in cyberspace. En Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U. S. Policy (pp. 327-341).
Washington D. C.: The National Academies Press. | |
dc.relation | Khan, K. (2013). Understanding information warfare and its relevance to Pakistan. Strategic Studies, 32(4), 138-159. | |
dc.relation | Khan, Z. (2015, diciembre 2). 5 technologies that transformed warfare. TechoMag. Recuperado de http://www.techomag.
com/5-technologies-that-transformed-warfare/ | |
dc.relation | Khiabany, G. (2003). Globalization and the internet: Myths and realities.
Trends in Communication, 11(2), 137-153. | |
dc.relation | Korns, S. W. y Kastenberg, J. E. (2009). Georgia’s cyber left hook. Parameters, 60-76./ | |
dc.relation | Kozlowski, A. (2014). Comparative analysis of cyberattacks on Estonia, Georgia and Kyrgyzstan. European Scientific Journal, 3, 237-245. | |
dc.relation | Kuehl, D. T. (2009). From cyberspace to cyberpower: Efining the problem. En
F. D. Kramer, S. H. Starr y L. K. Wentz (eds.), Cyberpower and national
security (pp. 26-43). Virginia: Potomac Books. | |
dc.relation | Kushner, H. W. (2003). Encyclopedia of terrorism. Londres: Sage. | |
dc.relation | Laqueur, W. (1987). The age of terrorism. Boston: Little Brown. | |
dc.relation | Lee, R. M., Assante, M. J. y Conway, T. (2014). German steel mill cyber attack.
Recuperado de https://ics.sans.org/media/ICS-CPPE-case-Study-2-German-Steelworks_Facility.pdf | |
dc.relation | Lemley, M. A., Menell, P. S., Merges, R. P. y Samuelson, P. (2000). Software and internet law. (3.ª ed.). Cambridge, MA: Aspen Law & Business | |
dc.relation | Lewis, J. A. (2002). Assessing the risks of cyber terrorism, cyber war and other
cyber threats. Recuperado de https://csis-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/media/csis/pubs/021101_risks_of_cyberterror.pdf | |
dc.relation | Leveringhaus, A. y Giacca, G. (2014). Robo-Wars: The regulation of robotic
weapons. Oxford: University of Oxford. | |
dc.relation | Li, J. y Daugherty, L. (2015). Training cyber warriors: What can be learned
from defense language training? Santa Mónica, CA: rand. | |
dc.relation | Liang, Q. y Xiangsui, W. (1999). Unrestricted warfare. Beijin: pla Literature
and Arts Publishing House. | |
dc.relation | Libicki, M. C. (1998). Information war, information peace. Journal of International Affairs, 51(2), 411-428. | |
dc.relation | Libicki, M. C. (2009). Cyberdeterrence and cyberwar. Santa Mónica: rand. | |
dc.relation | Liddell Hart, B. (1967). Strategy: The indirect approach. Los Ángeles: University of California. | |
dc.relation | Liivoja, R. (2015). Technological change and the evolution of the law of war.
International Review of the Red Cross, 97(900), 1157-1177. | |
dc.relation | Lin, H. y Kerr, J. (2017). On cyber-enabled information/influence warfare
and manipulation. Recuperado de https://papers.ssrn.com/sol3/papers.
cfm?abstract_id=3015680 | |
dc.relation | Lin, P., Bekey, G. y Abney, K. (2008). Autonomous military robotics: Risk,
ethics, and design. California Polytechnic State University, San Luis
Obispo. | |
dc.relation | Lind, W. S. (2004, marzo 2). Fifth generation warfare. Recuperado de http://
www.dnipogo.org/lind/lind_2_03_04.htm | |
dc.relation | Lind, W. S. (2004). Understanding fourth generation war. Military Review,
84(5), 12-16. | |
dc.relation | Lind, W. S., Nightengale, C. K., Schmitt, J. F., Sutton, J. W. y Wilson, G. I.
(1989). The changing face of war: Into the fourth generation. Recuperado de http://www.lesc.net/system/files/4GW+Original+Article+1989.pdf | |
dc.relation | López, C. (2007). La guerra informática. Boletín del Centro Naval, 817,
219-224. | |
dc.relation | López de Turizo y Sánchez, J. (2012). La evolución del conflicto hacia un
nuevo escenario bélico. El ciberespacio: nuevo escenario de confrontación, 126, 117-167 | |
dc.relation | Lorents, P. y Ottis, R. (2010). Knowledge based framework for cyber weapons and conflict. En C. Czosseck y K. Podins (eds.), Conference on Cyber Conflict Proceedings (pp. 129-142). Tallin: ccd coe Publications. | |
dc.relation | Maggio González, G. (2013). El sun tzu aplicado a la competencia por el
mercado. Madrid: Habilitas | |
dc.relation | Mallick, P. K. (2009). Principles of war: Time for relook. Nueva Delhi: Center for Land Warfare Studies. | |
dc.relation | Manthorpe, W. H. (1996). The emerging joint system of systems: A systems
engineering challenge and opportunity for apl. Johns Hopkins apl Technical Digest, 17(3), 305-307. | |
dc.relation | Martí Sempere, C. (2006). Tecnología de la defensa: análisis de la situación
española. Madrid: Instituto Universitario General Gutiérrez Mellado. | |
dc.relation | Masters, C. (2010, mayo 20). Cyborg soldiers and militarised masculinities. Euozine. Recuperado de http://www.eurozine.com/
cíborg-soldiers-and-militarised-masculinities/ | |
dc.relation | Matusitz, J. (2005). Cyberterrorism: How can American foreign policy be
strengthened in the information age? American Foreign Policy Interests,
27(2), 137-147. | |
dc.relation | Mayntz, R. (2004). Organizational forms of terrorism: Hierarchy, network, or a type sui generis? Recuperado de https://www.econstor.eu/
handle/10419/19906 | |
dc.relation | McKitrick, J., Blackwell, J., Littlepage, F., Kraus, G., Blanchfield, R. y Hill, D.
(2001). The revolutions in military affairs. En B. R. Scheneider y L. E.
Grinter (eds.), Battlefield of the future: 21st century warfare issues (pp.
65-98). Alabama: Air University Press. | |
dc.relation | Mehan, J. (2014). Cyberwar, cyberterror, cybercrime and cyberactivism. Cambridge: IT Gobernance. | |
dc.relation | Mestres, F. y Vives-Rego, J. (2016). Reflexiones sobre los cyborgs y los robots: evolución humana y aumentación. Ludus Vitalis, 20(37), 225-252. | |
dc.relation | Metz, S. y Kievit, J. (1995). Strategy and the revolution in military affairs:
From theory to policy. diane Publishing. Recuperado de http://ssi.armywarcollege.edu/pdffiles/00229.pdf
. | |
dc.relation | Millán Barbany, G. (2000). La conquista del espacio. En Horizontes culturales:
las fronteras de la ciencia: 1998 (pp. 207-220). Madrid: Espasa-Calpe. | |
dc.relation | Miller, J. H. (1997). Information warfare: Issues and perspectives. En R. E.
Neilson (ed.), Sun Tzu and information warfare: A collection of winning papers from the Sun Tzu art of war in information warfare competition (pp. 145-167). Washington D. C.: National Defense University
Press Publications. | |
dc.relation | Miller, R. A. y Kuehl, D. T. (2009). Cyberspace and the “First Battle” in
21st-century war. Defense Horizons, 68, 1-6.
Mills, E. (2010, febrero 23). Experts warn of | |
dc.relation | Mills, E. (2010, febrero 23). Experts warn of catastrophe from cyberattacks. cnet. Recuperado de https://www.cnet.com/news/
experts-warn-of-catastrophe-from-cyberattacks/ | |
dc.relation | mit Media Lab People (s. f.). Hugh Her Biomechatronics. Recuperado de
https://www.media.mit.edu/people/hherr/overview/ | |
dc.relation | Molander, R. C., Riddile, A., Wilson, P. A. y Williamson, S. (1998). Strategic
information warfare: A new face of war. Santa Mónica: rand. | |
dc.relation | Molano Rojas, A. (2009). El nombre y la cosa: aportes al debate definicional
sobre el terrorismo. Bogotá: Escuela de Inteligencia y Contrainteligencia
BG. Ricardo Charry Solano. | |
dc.relation | Montanari, L. y Querzoni, L. (eds.) (2014). Critical infrastructure protection:
Threats, attacks and countermeasures. Tenace. Recuperado de http://
www.dis.uniroma1.it/~tenace/download/deliverable/Report_tenace.pdf | |
dc.relation | Moteff, J., Copeland, C. y Fischer, J. (2003). Critical infrastructures: What
makes an infrastructure critical? Washington D. C.: The Library of
Congress. | |
dc.relation | Motoike, I. y Yoshikawa, K. (1999). Information operations with an excitable field. Physical Review E, 59(5), 5354. | |
dc.relation | Münkler, H. (2005). The new wars. Cambridge: Polity Press. | |
dc.relation | Nagpal, R. (2002). Cyber terrorism in the context of globalization. Ponencia
presentada en ii World Congress on Informatics and Law, Madrid, España. | |
dc.relation | National Aeronautics and Space Administration (s. f.). A pictorial history of
rockets. Recuperado de https://www.nasa.gov/pdf/153410main_Rockets_History.pdf. | |
dc.relation | National Cyber Security Center (2014). International case report on cyber
security incidents: Reflections on three cyber incidents in the Netherlands, Germany and Sweden. Estocolmo: National Cyber Security Center. | |
dc.relation | National Institute of Standards and Technology (2014). Framework for improving critical infrastructure cybersecurity. Maryland: National Institute of Standards and Technology. | |
dc.relation | National Institute of Standards and Technology (2017). Framework for improving critical infrastructure cybersecurity. Maryland: National Institute of Standards and Technology. | |
dc.relation | Nichiporuk, B. (1999). U.S. Military Opportunities: Information-warfare
concepts of operation. En Z. Khalilazad y J. White (eds.), The changing
role of information in warfare (pp. 179-216). Santa Mónica, CA: rand. | |
dc.relation | Norman, D. (1997). An information-based revolution in military affairs. En
J. Arquilla y D. Ronfeldt (eds.), In Athena’s camp: Preparing for conflict
in the information age (pp. 79-98). Santa Mónica, CA: rand. | |
dc.relation | Novikov, D. A. (2016). Cybernetics: From past to future. Moscú: Springer. | |
dc.relation | Nye, Jr., J. S. y Owens, W. A. (1996). America’s information edge. Foreign Affairs. Recuperado de https://www.foreignaffairs.com/articles/
united-states/1996-03-01/americas-information-edge | |
dc.relation | Organisation for Economic Co-operation and Development (2008). Protection of ‘Critical Infrastructure’ and the role of investment policies relating to national security. París: Organisation for Economic Co-operation and Development. | |
dc.relation | TOrtega, L. F. (2012). La ciberseguridad y la ciberdefensa. En El ciberespacio: nuevo escenario de confrontación (pp. 35-70). Madrid: Ministerio
de Defensa. | |
dc.relation | Ortiz, R. D. (1996). Amenazas transnacionales a la seguridad, tecnología e ingobernabilidad: Colombia. Ponencia presentada en iv Congreso Español
de Ciencia Política y de la Administración, Granada, España. | |
dc.relation | Ottis, R. (2010). From pitchforks to laptops: Volunteers in cyber conflicts.
En C. Czosseck y K. Podins (eds.), Conference on Cyber Conflict Proceedings (pp. 97-109). Tallin: ccd coe Publications. | |
dc.relation | Paul, C., Porche III, I. R. y Axelband, E. (2014). The other quiet professionals: Lessons for future cyber forces from the evolution of special forces.
Santa Mónica, CA: rand. | |
dc.relation | Páez, E. P. (2014). La guerra cibernética en el nivel operacional (Trabajo final
integrador, Escuela Superior de Guerra Conjunta de las Fuerzas Armadas, Madrid, Colombia). | |
dc.relation | Peña Galbán, L. Y., Casas Rodríguez, L. y Mena Fernández, M. (2009). La
guerra psicológica contemporánea: conceptos esenciales y características.
Revista Humnidades Médicas, 9(2). Recuperado de http://scielo.sld.cu/
scielo.php?script=sci_arttext&pid=S1727-81202009000200012 | |
dc.relation | Perešin, A. (2007). Mass media and terrorism. Medijska istraživanja, 13(1),
5-22. | |
dc.relation | Pollitt, M. M. (1998). Cyberterrorism: Fact or fancy? Computer Fraud & Security, 1998(2), 8-10. | |
dc.relation | Porteus, H. (2010, octubre 7). The stuxnet worm: Just another computer attack or a game changer? Recuperado de https://lop.parl.ca/Content/LOP/
ResearchPublications/2010-81-e.pdf | |
dc.relation | Press, G. (2015, enero 2). A very short history of the internet and the web. Forbes. Recuperado de https://www.forbes.com/sites/gilpress/2015/01/02/avery-short-history-of-the-internet-and-the-web-2/#663ccb907a4e | |
dc.relation | Randell, B. (1980). The Colossus. En N. Metropolis, J. Howlett y G.-C. Rota
(eds.), A history of computing in the twentieth century: A collection of
essays. Massachusetts: Academic Press. | |
dc.relation | Rinaldi, S. M., Peerenboom, J. P. y Kelly, T. K. (2001). Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Systems, 21(6), 11-25. | |
dc.relation | Rogers, J. D. (1998). Internetworking and the politics of science: nsfnet in
Internet history. The Information Society, 14(3), 213-228. | |
dc.relation | Rosenfield, D. K. (2009). Rethinking cyber war. Critical Review, 21(1), 77-90 | |
dc.relation | Sampaio, F. (2001). Ciberguerra: guerra eletrônica e informacional, um novo desafio estratégico. Porto Alegra: Escola Superior de Geopolítica e Estratégia. | |
dc.relation | Sánchez, J. (2017). Restoring active memory (ram). Defense Advanced Research Projects Agency. Recuperado de https://www.darpa.mil/program/
restoring-active-memory
Sánchez Medero, G. (2008). Cib | |
dc.relation | Sánchez Medero, G. (2009a). Ciberguerra y ciberterrorismo: ¿realidad o
ficción? Una nueva forma de guerra asimétrica. En F. A. Cuervo-Arango y J. d. Peñaranda Algar (coords.), Dos décadas de posguerra fría:
Actas de las I Jornadas de Estudios de Seguridad de la Comunidad de
Estudios de Seguridad General Gutiérrez Mellado (pp. 215-242). Madrid: Comunidad de Estudios de Seguridad General Gutiérrez Mellado | |
dc.relation | Sánchez Medero, G. (2009b). Internet: una herramienta para las guerras en
el siglo xxi. Revista Política y Estrategia, 114, 224-242. | |
dc.relation | Sánchez Medero, G. (2010). Los Estados y la ciberguerra. Boletín de Información, 317, 63-76. | |
dc.relation | Sánchez Medero, G. (2012). La ciberguerra: los casos de Stuxnet y Anonymous. Derecom, 11, 124-133. | |
dc.relation | Schneier, B. (2017, mayo 23). Who are the shadow brokers? The Atlantic. Recuperado de https://www.theatlantic.com/technology/archive/2017/05/
shadow-brokers/527778/ | |
dc.relation | Schreier, F. (2015). On cyberwarfare. Ginebra: Centre for the Democratic
Control of Armed Forces. | |
dc.relation | Shakarian, P. (2011). Stuxnet: Cyberwar revolution in military affairs. Air &
Space Power Journal, 50-59. | |
dc.relation | Shakarian, P., Shakarian, J. y Ruef, A. (2013). Introduction to cyber-warfare: A multidisciplinary approach. Massachusetts: Chris Katsaropoulos
y Benjamin Rearick. | |
dc.relation | Shea, D. A. (2003). Critical infrastructure: Control systems and the terrorist
threat. Congressional Research Service. Recuperado de https://fas.org/
irp/crs/RL31534.pdf | |
dc.relation | Sierra Caballero, F. (2002). Guerra informacional y sociedad-red: la potencia
inmaterial de los ejércitos. Signo y Pensamiento, 21(40), 32-41. | |
dc.relation | Sierra Caballero, F. (2003). La guerra en la era de la información: propaganda, violencia simbólica y desarrollo panóptico del sistema global de comunicaciones. Sphera Pública, 3, 253-268. | |
dc.relation | Silberstein, G. E. (1992). Seizing the enigma: The race to break the German
U-boat codes, 1939-1943. History: Reviews of New Books, 20(4). | |
dc.relation | Siles González, I. (2007). Cibernética y sociedad de la información: el retorno
de un sueño eterno. Signo y Pensamiento, 26(50), 84-99. | |
dc.relation | Simon, T. (2017). Critical infrastructure and the internet of things. Ontario:
Centre for International Governance Innovation and Chatham House. | |
dc.relation | Simon, T. (2017). Critical infrastructure and the internet of things. Ontario:
Centre for International Governance Innovation and Chatham House. | |
dc.relation | Simonetti, B. (2008). Guerra cibernética. Santa Maria: Universidade Federal
de Santa Maria. | |
dc.relation | Singer, P. W. y Friedman, A. (2014). Cybersecurity: What everyone needs to
know. Oxford: Oxford University Press. | |
dc.relation | Smith, G. S. (2004). Recognizing and preparing loss estimates from cyber-attacks. Information Systems Security, 12(6), 46-57. | |
dc.relation | Steering Committee for Foundations for Innovation in Cyber-Physical Systems
(2012). Strategic R&D opportunities for 21st century, cyber-physical systems, connecting computer and information systems with the physical
world. Illinois: Foundation for Innovation in Cyber-Physical Systems. | |
dc.relation | Stein, G. J. (2001). Information war, cyberwar, netwar. En L. Grinter y B. Scheneider, Battlefield of the future: 21st century warfare issues (pp. 153-170).
Alabama: Air University Press. | |
dc.relation | Stel, E. (2014). Seguridad y defensa del ciberespacio. Buenos Aires: Dunken. | |
dc.relation | Strange, J. (2005). Centers of gravity & critical vulnerabilities: Building on
the Clausewitzian foundation so that we can all speak the same language. Virginia: Defense Automated Printing Service Center. | |
dc.relation | Sulaiman, R. (2005). Information warfare. Global Information Assurance Certification Paper. Recuperado de https://www.giac.org/paper/gsec/1870/
information-warfare/103284 | |
dc.relation | Taddeo, M. (2012a). An analysis for a just cyber warfare. En C. Czosseck, R.
Ottis y K. Ziolkowski (eds.), 2012 4th International Conference on Cyber Conflict (pp. 209-218). Tallin: nato ccd coe Publications. | |
dc.relation | Taddeo, M. (2012b). Information warfare: A philosophical perspective. Philosophy & Technology, 25(1), 105-120. | |
dc.relation | Talking Exoskeletons with suitX Founder Dr. Homayoon Kazerooni (2016,
febrero 12). Recuperado de https://www.roboticsbusinessreview.com/
rbr/talking_exoskeletons_with_suitx_founder_dr_homayoon_kazerooni/ | |
dc.relation | Téllez Acuña, F. R. (2016). Prefijo ciber: arqueología de su presencia en la
sociedad del conocimiento. Investigación y Desarrollo, 24(1), 142-162. | |
dc.relation | Thayer Mahan, A. (1911). Naval strategy. Pensilvania: U.S. Marine Corps | |
dc.relation | The Economist (2007, mayo 10). Estonia and Russia A cyber-riot. Recuperado de http://www.economist.com/node/9163598 | |
dc.relation | The Economist (2010, julio 1). War in the fifth domain. Recuperado de http://
www.economist.com/node/16478792 | |
dc.relation | The U.S.-China Economic and Security Review Commission (2009). Capability of the People’s Republic of China to Conduct Cyber Warfare and
Computer Network Exploitation. The U.S.-China Economic. Virginia:
Northrop Grumman Corporation. | |
dc.relation | The White House (2003). The National Strategy to Secure Cyberspace. Washington D. C.: The White House. | |
dc.relation | Thomas, T. L. (2003). Al Qaeda and the Internet: The Danger of “Cyberplanning”. Parameters, 33, 112-123. | |
dc.relation | Thomas, T. L. (2007). Hizbulá, Israel, and Cyber psyop. Isphere, 30-35. | |
dc.relation | Thong, M. C. S. S., Howe, M. T. C. y Lee, M. N. W. J. (2012). Unmanned technology: The holy grail for militaries? pointer, Journal of the Singapore Armed Forces, 38(4), 16-25. | |
dc.relation | Tibbetts, P. S. (2002). Terrorist use of the internet and related information
technologies (Tesis de grado, School of Advanced Military Studies, Kansas, Estados Unidos). | |
dc.relation | Tisseron, A. (2014). Robotic and future wars: When land forces facetechnological developments. En R. Doaré, D. Danet, J. P. Hanon y G. de Boisboissel,
Robots on the battlefield: Contemporary perspectives and implications
for the future (pp. 3-18). Kansas: Combat Studies Institute Press. | |
dc.relation | Toffler, A. y Toffler, H. (1994). Las guerras del futuro: la supervivencia en el
alba del siglo xxi. Barcelona: Plaza & Janés. | |
dc.relation | Toffler, A., Toffler, H. y Solana, G. (1994). Las guerras del futuro: la supervivencia en el alba del siglo xxi. Barcelona: Plaza & Janés. | |
dc.relation | Torres Sorian, M. (2009). Terrorismo yihadista y nuevos usos de internet:
la distribución de propaganda (ari). Real Instituto El Cano. Recuperado de http://www.realinstitutoelcano.org/wps/portal/web/rielcano_es/
contenido?WCM_GLOBAL_CONTEXT=/elcano/elcano_es/zonas_es/
terrorismo+internacional/ari110-2009 | |
dc.relation | Trachtman, J. P. (2004). Global cyberterrorism, jurisdiction, and international organization. Recuperado de https://papers.ssrn.com/sol3/papers.
cfm?abstract_id=566361 | |
dc.relation | Trafton, A. (2013, julio 25). Neuroscientists plant false memories in the brain. Recuperado de http://news.mit.edu/2013/
neuroscientists-plant-false-memories-in-the-brain-0725 | |
dc.relation | Trias, E. D. y Bell, B. M. (2010). Ciber esto, ciber aquello… ¿Y qué? Air and
Space Power Journal, 22(3), 77-87. | |
dc.relation | Tzu, S. (1999). El arte de la guerra. Bogotá: Panamericana. | |
dc.relation | Tzu, S., Von Clausewitz, K. y Musashi, M. (2016). Genios de la estrategia militar (vol. 1). Nueva York: Luis Alberto Villamarín Pulido. | |
dc.relation | Unión Internacional de Telecomunicaciones (2014). La uit publica las cifras
de tic de 2014. Recuperado de http://www.itu.int/net/pressoffice/press_
releases/2014/23-es.aspx#.WpauM0xFzIU | |
dc.relation | U.K. Office of Cyber Security (2009). Cyber security strategy of the United
Kingdom: Safety, security and resilience in cyber space. Londres: Crown
Copyright. | |
dc.relation | U.S. Army Cyber Command (2016a). The facts: Cyber enlisted soldier careers. Recuperado de http://www.arcyber.army.mil/Style20Library/ARCYBER%20Custom%20Assets/factsheets/ARCYBER%20fact%20sheet%20
-%20Cyber%20Enlisted%20Careers%20%282March2016%29.pdf | |
dc.relation | U.S. Army Cyber Command (2016b). The facts: Training for cyber soldiers.
Recuperado de http://arcyber.army.mil/Style%20Library/ARCYBER%20
Custom%20Assets/factsheets/ARCYBER%20fact%20sheet%20-%20
Cyber%20Training%20at%20CCOE%20(15March2016).pdf | |
dc.relation | U.S. Department of Defense (1996). Joint Vision 2010. Recuperado de http://
webapp1.dlib.indiana.edu/virtual_disk_library/index.cgi/4240529/
FID378/pdfdocs/2010/Jv2010.pdf | |
dc.relation | U.S. Department of Defense (2010). Joint Publication 3.0. Wahington D.C.,
Estados Unidos: Estado Mayor Conjunto. | |
dc.relation | usaf College of Aerospace Doctrine, Research and Education (1997). Three
levels of war. En Air and space power mentoring guide (vol. 1). Maxwell
AFB, AL: Air University Press | |
dc.relation | Van Creveld, M. (1991). The transformation of war: The most radical reinterpretation of armed conflict since Clausewitz. Nueva York: Free Press | |
dc.relation | Vargas Vargas, E. M. (2014). Ciberseguridad y ciberdefensa: ¿qué implicaciones tienen para la seguridad nacional? (Tesis de grado, Universidad
Militar Nueva Granada, Bogotá, Colombia). | |
dc.relation | Vázquez Liñán, M. (2000). La propaganda de guerra en la internet. Historia
y Comunicación Social, 5, 53-74. | |
dc.relation | Velandia Mora, M. A. (2006). Estrategias para construir la convivencia solidaria en el aula universitaria: trabajo en equipo y comunicación generadora de mundos. Bogotá: Universidad Cooperativa de Colombia | |
dc.relation | Verising (2009). Cyber Threats and Trends. idefense Topical Research Report, Estados Unidos. | |
dc.relation | Verton, D. (2004). La amenaza invisible del ciberterrorismo. Nueva York:
McGraw Hill. | |
dc.relation | Warden, J. A. (1995). The air campaign: Planning for combat. Pensilvania:
diane Publishing. | |
dc.relation | Wander Nascimento, J. (2003). Ciberwar uma proposta gen érica de ações
defensivas para a MB. Mharina do Brasil. Escola de Guerra Naval | |
dc.relation | Weimann, G. (2004). Cyberterrorism: How real is the threat? Washington
D. C.: United States Institute of Peace. | |
dc.relation | Wilson, C. (2004). Information warfare and cyberwar: Capabilities and related policy issues. crs Report for Congress. Recuperado de https://fas.
org/irp/crs/RL31787.pdf | |
dc.relation | Wilson, C. (2005). Computer attack and cyberterrorism: Vulnerabilities and
policy issues for congress. Washington D. C.: Congressional Research
Service. | |
dc.relation | Wilson, C. (2007). Information operations, electronic warfare, and cyberwar:
Capabilities and related policy issues. Washington D. C.: Congressional
Research Service. | |
dc.relation | Wisskirchen, G., Biacabe, B. T., Bormann, U., Muntz, A., Niehaus, G., Soler,
G. J. y Von Brauchitsch, B. (2017). Artificial intelligence and robotics and
their impact on the workplace. Londres: iba Global Employment Institute. | |
dc.relation | Wittes, B. y Chong, J. (2014). Our cyborg future: Law and policy implications. Washington D. C.: Center for Technology Innovation at Brookings. | |
dc.relation | Wolthusen, S. D. (2003). Asymmetric information warfare: Cyberterrorism
critical infrastructures. Ponencia presentada en Proceedings of the xv
International Amaldi Conference of Academies of Science and National
Scientific Societies on Problems of Global Security, Helsinki, Finlandia. | |
dc.relation | Work, R. O. y Brimley, S. (2014, enero 22). 20YY: Preparing for war in
the robotic age. Recuperado de https://www.cnas.org/publications/
reports/20yy-preparing-for-war-in-the-robotic-age | |
dc.relation | Zeng, D. y Wu, Z. (2014). From artificial intelligence to cyborg intelligence.
ieee Intelligent Systems, 29(5), 2-4. | |
dc.relation | Zanini, M. (1999). Middle Eastern terrorism and netwar. Studies in Conflict
and Terrorism, 22(3), 247-256. | |
dc.relation | Zanini, M. y Edwards, S. J. (2001). The networking of terror in the information age. En J. Arquilla y D. Ronfeldt, Networks and netwars the future
of terror, crime, and militancy (pp. 29-60). Santa Mónica: rand. | |
dc.rights | http://creativecommons.org/licenses/by-nc-nd/2.5/co/ | |
dc.rights | Abierto (Texto Completo) | |
dc.rights | Atribución-NoComercial-SinDerivadas 2.5 Colombia | |
dc.source | instname:Universidad Santo Tomás | |
dc.source | reponame:Repositorio Institucional Universidad Santo Tomás | |
dc.title | Ciberguerra. La consolidación de un nuevo poder en las relaciones internacionales contemporáneas | |