dc.contributorhttps://orcid.org/0000-0002-9250-7911
dc.contributorhttps://scholar.google.com/citations?user=hqvoNZ4AAAAJ&hl=es
dc.contributorhttps://scienti.colciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0001408533
dc.creatorGaitán Rodríguez, Andrés
dc.date.accessioned2019-02-07T00:38:41Z
dc.date.available2019-02-07T00:38:41Z
dc.date.created2019-02-07T00:38:41Z
dc.date.issued2018
dc.identifierGaitán, A. (2018). Ciberguerra. la consolidación de un nuevo poder en las relaciones internacionales contemporáneas. Bogotá: Ediciones USTA.
dc.identifier9789587821512
dc.identifierhttp://hdl.handle.net/11634/15412
dc.identifierhttps://doi.org/10.15332/li.lib.2018.00130
dc.description.abstractThe author of this work argues that cyberspace can be considered as a new dimension of human action to reproduce the interstate war typical of international relations. For its argumentation it proposes three objectives: first, to analyze the practice of war, its perennial elements and to understand its relationship with technology; second, to present the qualities and elements that make cyberspace a new dimension of optimal human action to reproduce the practice of war, and third, to describe the nature of cyberwar and the ways in which it has materialized in real life. Finally, the author also evidences the existence of new actors that seek to take advantage of the characteristics of the warlike confrontations in cyberspace. This book is a boost to the investigative and proactive work of other academics in the cyberspace and its relationship with vital political aspects -such as security and national defense-, and a necessary reference to generate a debate on the new responsibilities of the State with its citizens in the XXI century.
dc.languagespa
dc.publisherUniversidad Santo Tomás
dc.publisherProducción Editorial
dc.relationhttps://ediciones.usta.edu.co/index.php/publicaciones/titulos-disponibles/404/ciberguerra-la-consolidaci%C3%B3n-de-un-nuevo-poder-en-las-relaciones-internacionales-contempor%C3%A1neas-detail
dc.relationAbbate, J. E. (1994). From arpanet to Internet: A history of arpa-sponsored computer networks, 1966-1988. Pennsylvania: University of Pennsylvania.
dc.relationAdams, J. (2001). Virtual defense. Foreign Affairs, 80(3), 98-112.
dc.relationAlcaraz, C. y Zeadally, S. (2015). Critical infrastructure protection: Requirements and challenges for the 21st century. International Journal of Critical Infrastructure Protection, 8, 53-66.
dc.relationAllen, D. M. y Allen, J. H. (2012, enero). How to become a cyber warrior [Podcast de audio]. Recuperado de https://www.cert.org/podcasts/podcast_episode.cfm?episodeid=34730
dc.relationAllen, P. y Demchak, C. (2003). La guerra cibernética palestina-israelí. Military Review, 2, 52-59.
dc.relationAnding, D. E. (2007). Center of gravity and the range of military operations: Can an old dog apply to new tricks? Massachusetts: Naval War College.
dc.relationArquilla, J. y Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, 12(2), 141-165.
dc.relationArquilla, J. y Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, 12(2), 141-165.
dc.relationArquilla, J. y Ronfeldt, D. (1997a). A new epoch and espectrum of conflicts. En J. Arquilla y D. Ronfeldt (eds.), In Athena’s camp: Preparing for conflict in the information age (pp. 1-22). Santa Mónica, CA: rand
dc.relationArquilla, J. y Ronfeldt, D. (1997b). Cyberwar is coming! En J. Arquilla y D. Ronfeldt (eds.), In Athena’s camp: Preparing for conflict in the information age (pp. 23-60). Santa Mónica, CA: rand.
dc.relationArquilla, J. y Ronfeldt, D. (2001). Networks and netwars: The future of terror, crime, and militancy. Santa Mónica, CA: rand
dc.relationArquilla, J., Ronfeldt, D. y Zanini, M. (2000). Networks, netwar, and information-age terrorism. En Z. Khalilzad y J. White (eds.), Strategic appraisal: The changing role of information in warfare (pp. 75-111). Santa Mónica, CA: rand.
dc.relationAsaolu, O. S. (2006). On the emergence of new computer technologies. Educational Technology & Society, 9(1), 335-343.
dc.relationAsaro, P. M. (2012). How just could a robot war be? En P. Tamara y E. Gaston (eds.), Ethics of 21st century military conflict (pp. 257-269). Nueva York: International Debate Education Association.
dc.relationasce Critical Infrastructure Guidance Task Committee (2009). Guiding principles for the nation’s critical infrastructure. Virginia: American Society of Civil Engineers.
dc.relationAshmore, W. C. (2009). Impact of alleged russian cyber attacks. Baltic Security & Defence Review, 11, 4-40.
dc.relationBallén Molina, R. (2010). Las razones que motivan la guerra. Diálogos de saberes: investigaciones y ciencias sociales, 32, 103-120.
dc.relationBallina Talento, G. (2008). La evolución de la internet como medio de comunicación masivo (Tesis de grado, Universidad de San Carlos de Guatemala, Guatemala).
dc.relationBarfield, W. y Williams, A. (2017). Cyborgs and enhancement technology. Philosophies, 2(1)
dc.relationBazyan, S. (2012). Environmental impact of war technology and prohibition processes (Tesis de maestría, Mittuniversitetet, Östersund, Suecia).
dc.relationBejarano, P. (2014, febrero 6). Código Enigma, descifrado: el papel de Turing en la Segunda Guerra Mundial. Eldiario.es. Recuperado de http://www.eldiario.es/turing/criptografia/alan-turing-enigma-codigo_0_226078042.html
dc.relationBellamy, C. (2015). The evolution of modern land warfare: Theory and practice. Londres: Routledge
dc.relationBendrath, R. (2001). The ciberwar perceptions and politics in U.S. critical infrastructure protection. Information & Security: An International Journal, 7, 80-103.
dc.relationBerkowitz, B. D. (1997). Warfare in the information age. En J. Arquilla y D. Ronfeldt (eds.), In Athena’s camp: Preparing for conf
dc.relationBessani, A. N., Sousa, P., Correia, M., Neves, N. F. y Veríssimo, P. (2008). The crutial way o
dc.relationBhattacharjee, S. (2009). The strategic dimensions of cyber security in the indian context. Strategic Analysis, 33(2), 196-201.
dc.relationBieber, F. (2000). Cyberwar or sideshow? The Internet and the Balkan wars. Current History, 99(635), 124-128.
dc.relationBieber, F. (2000). Cyberwar or sideshow? The Internet and the Balkan wars. Current History, 99(635), 124-128.
dc.relationBishop, M. y Goldman, E. (2003). The strategy and tactics of information warfare. Contemporary Security Policy, 24(1), 113-139.
dc.relationBlack, J. (2009). The revolution in military affairs: The historian’s perspective. The RUSI Journal, 154(2), 98-102.
dc.relationBoaru, G. y Badita, G. I. (2008). Critical infrastructure interdependencies. En I. Bujoreanu y D. Sora (coords.), Defense resources management in the 21st century (pp. 130-146). Bucarest: National Defense University Carol I Publishing House
dc.relationBoot, M. (2003). The new American way of war. Foreign Affairs, 82(4), 41-58. Recuperado de https://www.foreignaffairs.com/articles/ united-states/2003-07-01/new-american-way-war
dc.relationBoyd Jara, C. (2009, agosto 5). Internet: el refugio de grupos terroristas [Entrada blog]. Recuperado de http://intelligenceservicechile.blogspot. com/2009/08/internet-el-refugio-de-grupos.html
dc.relationBradley, A. (2003). Anatomy of cyberterrorism is America vulnerable? (Tesis de grado, Air University, Alabama, Estados Unidos).
dc.relationBrenner, S. W. (2009). Cyberthreats: The emerging fault lines of the nation state. Oxford: Oxford University Press.
dc.relationBrey, P. A. y Mitcham, C. (2005). Prosthetics. En MacMillan Encyclopedia of Science, Technology and Ethics (pp. 1527-1532). Basingstoke: MacMillan Press.
dc.relationBrooks, S. G. y Wohlforth, W. C. (2007). Power, globalization, and the end of the cold war: Reevaluating a landmark case for ideas. En J. Levy y G. Goertz (eds.), Explaining war and peace: Case studies and necessary condition counterfactuals (pp. 195-236). Abingdon: Routledge.
dc.relationCarr, J. (2011). Inside cyber warfare: Mapping the cyber underworld. Massachusetts: O’ Really Media.
dc.relationCarrillo Payá, P. (2006). Terrorismo y ciberespacio. Recuperado de http:// www.assessorit.com/web/images/stories/prensa/pcarrillo-paper.pdf
dc.relationCasey, G. (2009). Future Soldier 2030 Initiative. rdecom. Recuperado de https://www.wired.com/images_blogs/dangerroom/2009/05/ dplus2009_11641-1.pdf
dc.relationCastells, M. (1997). An introduction to the information age. City, 2(7), 6-16.
dc.relationCastells, M. (1999). La era de la información: economía, sociedad y cultura (vol. 1). México: Siglo XXI.
dc.relationCastells, M. (2000). La sociedad red. Madrid: Alianza Editorial.
dc.relationCastells, M. (2001). Galaxia Internet. Barcelona: Plaza & Janés.
dc.relationCastells, M. (2004). The network society: A cross-cultural perspective. Cheltenham, MA: Edward Elgar Publishing.
dc.relationCastro, C. y Filippi, L. (2010). Modelos matemáticos de información y comunicación cibernética (Wiener, Shannon y Weaver): mejorar la comunicación es el desafío de nuestro destino cultural. Revista RE-Presentaciones Periodismo, Comunicación y Sociedad, 3(6), 145-161.
dc.relationCebrowski, A. K. y Garstka, J. J. (1998). Network-centric warfare: Its origin and future. U.S. Naval Institute Proceedings, 124(1), 28-35. .
dc.relationChandler, W. W. (1983). The installation and maintenance of Colossus. Annals of the History of Computing, 5(3), 260-262.
dc.relationChilton, K. P. (2009). Cyberspace leadership: Towards new culture, conduct, and capabilities. Air & Space Power Journal, 23(3), 5-11. Recuperado de http://go.galegroup.com/ps/anonymous?id=GALE%7CA212767728&sid=googleScholar&v=2.1&it=r&linkaccess=abs&issn=1555385X&p=AONE&sw=w.
dc.relationCounter-Terrorism Committee Executive Directorate (2017). Physical protection of critical infrastructure against terrorist attacks. Nueva York: Counter-Terrorism Committee Executive Directorate.
dc.relationClark, A. (2003). Natural-born cyborgs: Minds, technologies, and the future of human intelligence. Nueva York: Oxford University Press.
dc.relationClark, T. (2015). Autonomous robotics for military usage. Recuperado de http://www.pitt.edu/~trc50/writing_assignment_3.pdf
dc.relationClark, R. A. y Knake, R. K. (2010). Cyber war: The next threat to national security and what to do about it. Nueva York: ecco.
dc.relationClarke, B. (2015, septiembre 1). The 30 most important airplanes of all time the planes that defined the aerospace age. Popular Mechanics. Recuperado de http://www.popularmechanics.com/flight/g2142/ the-30-most-important-airplanes-of-all-time/
dc.relationDepartment of Defense (1997). C4ISR architecture framework version 2.0. Washington D. C.: C4ISR Architecture Working Group.
dc.relationClarke, R. (2009). War from cyberspace. The National Interest, 104, 31-36
dc.relationClausewitz, C. (1942). Principles of war. Pensilvania: Stackpole Books.
dc.relationClemente, D. (2013). Cyber security and global interdependence: What is critical? Londres: Chatham House, Royal Institute of International Affairs.
dc.relationCoeckelbergh, M. (2013). Drones, information technology, and distance: Mapping the moral epistemology of remote fighting. Ethics and Information Technology, 15(2), 87-98.
dc.relationCohen-Almagor, R. (2000). The terrorists’ best ally: The Quebec media coverage of the flq crisis in october 1970. Canadian Journal of Communication, 25(2), 251-284.
dc.relationCohen, J. (2013). Memory implants: A maverick neuroscientist believes he has deciphered the code by which the brain forms long-term memories. mit Technology Review. Recuperado de https://www.technologyreview. com/s/513681/memory-implants/
dc.relationCohnen, F. (2010). Las ciberguerras del siglo xxi. Antena de Telecomunicación, 179, 16-21.
dc.relationColesniuc, D. (2013). Cyberspace and critical information infrastructures. Informatica Economica, 17(4), 123-132.
dc.relationCooper, J. R. (1997). Another view of the revolution in military affairs. En J. Arquilla y D. Ronfeldt (eds.), In Athena’s camp: Preparing for conflict in the information age (pp. 99-140). Santa Mónica, CA: rand.
dc.relationConway, M. (2002). Reality bytes: Cyberterrorism and terrorist ‘use’ of the Internet. First Monday, 7(11). Recuperado de http://doras.dcu.ie/498/1/ first_mon_7_11_2002.pdf
dc.relationCordesman, A. H. y Wagner, A. R. (1990). The lessons of modern war. Boulder: Westview Press.
dc.relationCounter-Terrorism Committee Executive Directorate (2017). Physical protection of critical infrastructure against terrorist attacks. Nueva York: Counter-Terrorism Committee Executive Directorate.
dc.relationCriado Grande, J. I., Ramilo Araujo, M. C. y Serna, M. S. (2002). La necesidad de teoría(s) sobre gobierno electrónico: una propuesta integradora. Ponencia presentada en xvi Concurso de Ensayos y Monografías del.clad sobre Reforma del Estado y Modernización de la Administración Pública “Gobierno Electrónico”. Caracas, Venezuela. Recuperado de https://www.urbe.edu/info-consultas/web-profesor/12697883/articulos/ Comercio%20Electronico/la-necesidad-de-teoria(s)sobre-gobierno-electronico-una-propuesta-integradora.pdf
dc.relationCronin, B. y Crawford, H. (1999). Information warfare: Its application in military and civilian contexts. The Information Society, 15(4), 257-263.
dc.relationCrowell, R. M. (2017). Some principles of cyber warfare using corbett to understand war in the early twenty: First century. Londres: The Corbett Centre for Maritime Policy Studies.
dc.relationDanet, D. y Hanon, J. P. (2014). Digitization and robotization of the battlefield: Evolution or robolution? En R. Doaré, D. Danet, J. P. Hanon y G. de Boisboissel, Robots on the battlefield: Contemporary perspectives and implications for the future (pp. xiii-xxxv). Kansas: Combat Studies Institute Press.
dc.relationDanish Institute For International Studies (2017). The un discusses lethal autonomous weapons Killer Robots: The future of war? Recuperado de http://pure.diis.dk/ws/files/817702/Killer_robots_WEB.pdf
dc.relationDavis, N. C. (1997). An information-based revolution in military affairs. En J. Arquilla y D. Ronfeldt (eds.), In Athena’s camp: Preparing for conflict in the information age (pp. 79-98). Santa Mónica, CA: rand.
dc.relationDe Boisboissel, G. (2014). The use of robots on the Battlefield: Benefits, constraints, and limitations for soldiers. En R. Doaré, D. Danet, J. P. Hanon y G. de Boisboissel, Robots on the battlefield: Contemporary perspectives and implications for the future (pp. 203-216). Kansas: Combat Studies Institute Press/
dc.relationDelibasis, D. (2007). The right to national self-defense: In information warfare operations. Tennessee: Arena books.
dc.relationDepartment of Defense (1997). C4ISR architecture framework version 2.0. Washington D. C.: C4ISR Architecture Working Group.
dc.relationdod Dictionary of Military and Associated Terms (2018). Recuperado de http://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary. pdf?ver=2018-07-25-091749-087
dc.relationDouhet, G. (2009). The command of the air. Alabama: University of Alabama Press.
dc.relationDoyle, D. J. (2014). Robots, androids, and cyborgs in warfare: Ethical and philosophical issues. Ethics in Biology, Engineering and Medicine: An International Journal, 5(1), 13-23.
dc.relationDroznes, L. (2005). El arte de la guerra: guía de aplicación de los principios básicos de la guerra a las realidades de los mercados competitivos contemporáneos. Buenos Aires: Autodesarrollo.
dc.relationDunlap Jr, C. J. (2006). Neo-strategicon: Modernized principles of war for the 21st century. Military Review, 42-48
dc.relationDunn Cavelty, M. (2010). Cyberwar: Concept, status quo, and limitations. CSS Analysis in Security Policy, 71, 1-3.
dc.relationDunn, M. A. (2001). The cyberspace dimension in armed conflict: Approaching a complex issue with assistance of the morphological method. Information & Security, 7, 145-158.
dc.relationEchevarría, A. (2003). Clausewitz’s Center of Gravity: It’s not what we thought. Naval War College Review, 108-123.
dc.relationEchavarría Jesús, C. (2009, diciembre 23). La innovación yihadista: propaganda, ciberterrorismo, armas y tácticas. Grupo de Estudios Estratégicos. Recuperado de http://www.gees.org/articulos/ la-innovacion-yihadista-propaganda-ciberterrorismo-armas-y-tacticas
dc.relationEl Mundo (2002, febrero 23). Musharraf ordena la detención de todos los miembros del grupo que degolló al periodista Daniel Pearl. Recuperado de http://www.elmundo.es/elmundo/2002/02/21/internacional/1014327615. html
dc.relationEikmeier, D. C. (2004). Center of gravity analysis. Military Review, 84(4), 2-5.
dc.relationEnders, W. y Sandler, T. (2000). Is transnational terrorism becoming more threatening? A time-series investigation. Journal of Conflict Resolution, 44(3), 307-332.
dc.relationEmol.com (2007, noviembre 15). En marcha computadora de la Segunda Guerra Mundial. Recuperado de http://www.emol.com/noticias/tecnologia/2007/11/15/281942/en-marcha-computadora-de-la-segunda-guerra-mundial.html
dc.relationEstupiñán Bethencour, F. (2001). Mitos sobre la globalización y las nuevas tecnologías de la comunicación. Revista Latina de Comunicación Social, 4(38), 1-2.
dc.relationFabricio, A. (s. f.). Concepto de doctrina. Recuperado de https://es.scribd. com/doc/57143024/CONCEPTO-DE-DOCTRINA
dc.relationFadok, D. S. (1995). John Boyd and John Warden: Air power’s quest for strategic paralysis. Alabama: School of Advanced Airpower Studies.
dc.relationFazio Vengoa, H. (2003). Globalización y guerra: una compleja relación. Revista de Estudios Sociales, 16, 42-56.
dc.relationFitzgerald, F. (2001). Way out there in the blue: Reagan, star wars and the end of the cold war. Nueva York: Simon and Schuster.
dc.relationFleming, J. L. (1993). Capital ships: A historical perspective. Rhode Island: Naval War College.
dc.relationFojón, J. E. (2006). Vigencia y limitaciones de la guerra de cuarta generación. Real Instituto Alcano de Estudios Internacionales y Estratégicos. Recuperado de http://documentostics.com/component/option,com_docman/ task,doc_view/gid,864/Itemid,5/
dc.relationFoster, Jr , J. S., Gjelde, E., Graham, W. R., Hermann, R. J., Kluepfel, H. M., Lawson, R. L. … Woodard, J. B. (2008). Report of the Commission to Assess the Threat to the United States from emp Attack: Critical national infrastructures. Washington D. C.: Congressional emp Commission.
dc.relationFredericks, B. (1997). Information warfare: The organizational dimension. En R. E. Neilson (ed.), Sun Tzu and information warfare: A collection of winning papers from the Sun Tzu art of war in information warfare competition (pp. 79-102). Washington D. C.: National Defense University Press Publications.
dc.relationFulp, J. D. (2003). Training the cyber warrior. En C. Irvine y H. Armstrong (eds.), Security education and critical infrastructures (pp. 261-273). Boston, MA: Springer.
dc.relationGaddis, J. L. (1997). History, theory, and common ground. International Security, 22(1), 75-85.
dc.relationGamero-Garrido, A. (2014). Cyber conflicts in international relations: Framework and case studies. Recuperado de https://papers.ssrn.com/sol3/ papers.cfm?abstract_id=2427993
dc.relationGates, B. (1995). Camino al futuro. Bogotá: McGraw-Hill.
dc.relationGeers, K. (2008). Cyberspace and the changing nature of warfare. Recuperado de https://www.sto.nato.int/publications/STO%20Meeting%20Proceedings/RTO-MP-IST-076/$MP-IST-076-KN.pdf
dc.relationGeers, K. (2009). The cyber threat to national critical infrastructures: Beyond theory. Information Security Journal: A Global Perspective, 18(1), 1-7.
dc.relationGeers, K. (2010). The challenge of cyber attack deterrence. Computer Law & Security Review, 26(3), 298-303.
dc.relationGibbs, S. y Hern, A. (2017, mayo 12). What is WannaCry ransomware and why is it attacking global computers? The Guardian. Recuperado de https://www.theguardian.com/technology/2017/may/12/ nhs-ransomware-cyber-attack-what-is-wanacrypt0r-20
dc.relationGibson, W. (1984). Neuromancer. Nueva York: Ace Books.
dc.relationGlavanakova, A. (2006). Cyborg body politics. Bulgarian Journal of American and Transatlantic Studies, 1. Recuperado de https://research.uni-sofia.bg/handle/123456789/1245
dc.relationGlebocki, J. (2008). dod Computer Network Operations: Time to hit the send button. Carlisle Barracks, PA: U.S. Army War College. Recuperado de http://www.dtic.mil/dtic/tr/fulltext/u2/a478337.pdf
dc.relationGhosh, S. (2004). The nature of cyber-attacks in the future: A position paper. Information Systems Security, 13(1), 18-33.
dc.relationGorman, S. P. (2005). Networks, Security and Complexity: The role of public policy in critical infrastructure protection. Cheltenham: Edward Elgar Publishing
dc.relationGranada, S. y Sánchez Meertens, C. (2009). Correlación de fuerzas en disputas de guerras civiles: una aplicación al caso colombiano. En J. A. Restrepo y D. Aponte (eds.), Guerra y violencias en Colombia: herramientas e interpretaciones (pp. 233-272). Bogotá: Pontificia Universidad Javeriana.
dc.relationGrauer, R. (2013). Old wine in new bottles: The nature of conflict in the 21st century. The Whitehead Journal of Diplomacy and International Relations, 14(9), 9-23
dc.relationGreen, J. (2002). The myth of cyberterrorism. Washington Monthly, 34(11), 8-13.
dc.relationGrinter, L. E. y Schneider, B. R. (1998). Battlefield of the future: 21st century warfare issues. Alabama: Air University Press.
dc.relationGros Salvat, B. (2001). De la cibernética clásica a la cibercultura: herramientas conceptuales desde donde mirar el mundo cambiante. Education in the Knowledge Society (eks), 2. Recuperado de https://dialnet.unirioja. es/servlet/articulo?codigo=1243527
dc.relationGuarín, R. (2009). Medios de comunicación, terrorismo y antiterrorismo. Bogotá: Escuela de Inteligencia y Contra Inteligencia Brigadier General Ricardo Charry.
dc.relationGutiérrez Díez, L. A. (1995). Evolución de la tecnología militar y “su impacto” en España. Cuadernos de Estrategia, 75, 83-114.
dc.relationGutiérrez, M. F. (2010). Virus y cibervirus: virus biológicos y virus informáticos llaman la tensión de los virólogos. Innovación y Ciencia, 17(1), 50-56.
dc.relationHables Gray, C. (1997). Postmodern war: The new politics of conflict. Nueva York: Guilford Publications.
dc.relationHaeni, R. E. (1997). Information warfare: An introduction. Washington D. C.: The George Washington University
dc.relationHarshberger, E. y Ochmanek, D. (1999). Information and warfare: New opportunities for U.S. military forces. En Z. Khalilzad y J. White (eds.), Strategic appraisal: The changing role of informatin in warfare (pp. 157- 178). Santa Mónica, CA: rand
dc.relationHaulman, D. (2003). One hundred years of flight usaf chronology of significant air and space events 1903-2002. Alabama: Air University Press.
dc.relationHenry, R. y Peartree, C. E. (1998). Military theory and information warfare. Parameters, 28, 121-135
dc.relationHerr, H., Whiteley, G. P. y Childress, D. (2003). Cyborg technology: Biomimetic orthotic and prosthetic technology. En Y. Bar-Cohen y C. Breazeal, Biologically inspired intelligent robots (pp. 103-143). Washington D. C.: spie Press.
dc.relationHeylighen, F. y Joslyn, C. (2001). Cybernetics and second-order cybernetics. En R. A. Meyers (ed.), Encyclopedia of physical science & technology (3.ª ed., pp. 155-170). Nueva York: Academic Press.
dc.relationHollis, D. (2011). Cyberwar case study: Georgia 2008. Small Wars Journal, 6(1), 1-10.
dc.relationHolmes, R. (ed.) (2007). Campos de batalla: las guerras que han marcado la historia. Barcelona: Ariel.
dc.relationHosek, J. R. (2003). The soldier of the 21st century. En S. E. Johnson, M. C. Libicki y G. F. Treverton (eds.), New challenges, new tools for defense decisionmaking (pp. 181-209). Santa Mónica, CA: rand
dc.relationHosmer, S. T. (1999). The information revolution and psychological effects. En Z. Khalilazad y J. White (eds.), The changing role of information in warfare (pp. 217-252). Santa Mónica, CA: rand.
dc.relationInternet Society (2014, junio 3). Global internet report 2014: Open and sustainable acces for all. Ginebra: Internet Society
dc.relationJablonsky, D. (1994). U.S. Military Doctrine and the Revolution in Military Affairs. Parameters, 24(3), 18-36
dc.relationJackson, G. M. (2000). Warden’s five-ring system theory: Legitimate wartime military targeting or an increased potential to violate the law and norms of expected behavior? (Tesis de grado, Maxwell Air Force Base, Alabama, Estados Unidos).
dc.relationJain, G. (2005). Cyber terrorism: A clear and present danger to civilized society? Information Systems Education Journal, 3(44), 1-8
dc.relationJiménez Cruz, J. (2008). Cibernética, inteligencia artificial y robótica. Casa del Tiempo, 5(13), 52-56.
dc.relationJoshi, A. (2000). The scourge of cyber-terrorism. Strategic Analysis, 24(4), 827-831.
dc.relationJoyner, C. C. y Lotrionte, C. (2001). Information warfare as international coercion: Elements of a legal framework. European Journal of International Law, 12(5), 825-865.
dc.relationKaldor, M. (1998). New and old wars: Organized violence in a global era. Lincolnshire: Stanford University Press.
dc.relationKellermann, T., Martinez, P., Contreras, B. y Marchiori, B. (2015). Report on cybersecurity and critical infrastructure in the Americas. Washington D. C.: oas Secretariat for Multidimensional Security.
dc.relationKemp, S. (2017, enero 24). Digital in 2017: Global overview. We Are Social. Recuperado de https://wearesocial.com/special-reports/ digital-in-2017-global-overview
dc.relationKerr, P. K., Rollins, J. y Theohary, C. A. (2010). The Stuxnet computer worm: Harbinger of an emerging warfare capability. crs Report for Congress. Recuperado de http://www.fas.org/sgp/crs/natsec/R41524.pdf
dc.relationMestres, F. y Vives-Rego, J. (2016). Reflexiones sobre los cyborgs y los robots: evolución humana y aumentación. Ludus Vitalis, 20(37), 225-252.
dc.relationKesan, J. P. y Hayes, C. M. (2010). Thinking through active defense in cyberspace. En Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U. S. Policy (pp. 327-341). Washington D. C.: The National Academies Press.
dc.relationKhan, K. (2013). Understanding information warfare and its relevance to Pakistan. Strategic Studies, 32(4), 138-159.
dc.relationKhan, Z. (2015, diciembre 2). 5 technologies that transformed warfare. TechoMag. Recuperado de http://www.techomag. com/5-technologies-that-transformed-warfare/
dc.relationKhiabany, G. (2003). Globalization and the internet: Myths and realities. Trends in Communication, 11(2), 137-153.
dc.relationKorns, S. W. y Kastenberg, J. E. (2009). Georgia’s cyber left hook. Parameters, 60-76./
dc.relationKozlowski, A. (2014). Comparative analysis of cyberattacks on Estonia, Georgia and Kyrgyzstan. European Scientific Journal, 3, 237-245.
dc.relationKuehl, D. T. (2009). From cyberspace to cyberpower: Efining the problem. En F. D. Kramer, S. H. Starr y L. K. Wentz (eds.), Cyberpower and national security (pp. 26-43). Virginia: Potomac Books.
dc.relationKushner, H. W. (2003). Encyclopedia of terrorism. Londres: Sage.
dc.relationLaqueur, W. (1987). The age of terrorism. Boston: Little Brown.
dc.relationLee, R. M., Assante, M. J. y Conway, T. (2014). German steel mill cyber attack. Recuperado de https://ics.sans.org/media/ICS-CPPE-case-Study-2-German-Steelworks_Facility.pdf
dc.relationLemley, M. A., Menell, P. S., Merges, R. P. y Samuelson, P. (2000). Software and internet law. (3.ª ed.). Cambridge, MA: Aspen Law & Business
dc.relationLewis, J. A. (2002). Assessing the risks of cyber terrorism, cyber war and other cyber threats. Recuperado de https://csis-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/media/csis/pubs/021101_risks_of_cyberterror.pdf
dc.relationLeveringhaus, A. y Giacca, G. (2014). Robo-Wars: The regulation of robotic weapons. Oxford: University of Oxford.
dc.relationLi, J. y Daugherty, L. (2015). Training cyber warriors: What can be learned from defense language training? Santa Mónica, CA: rand.
dc.relationLiang, Q. y Xiangsui, W. (1999). Unrestricted warfare. Beijin: pla Literature and Arts Publishing House.
dc.relationLibicki, M. C. (1998). Information war, information peace. Journal of International Affairs, 51(2), 411-428.
dc.relationLibicki, M. C. (2009). Cyberdeterrence and cyberwar. Santa Mónica: rand.
dc.relationLiddell Hart, B. (1967). Strategy: The indirect approach. Los Ángeles: University of California.
dc.relationLiivoja, R. (2015). Technological change and the evolution of the law of war. International Review of the Red Cross, 97(900), 1157-1177.
dc.relationLin, H. y Kerr, J. (2017). On cyber-enabled information/influence warfare and manipulation. Recuperado de https://papers.ssrn.com/sol3/papers. cfm?abstract_id=3015680
dc.relationLin, P., Bekey, G. y Abney, K. (2008). Autonomous military robotics: Risk, ethics, and design. California Polytechnic State University, San Luis Obispo.
dc.relationLind, W. S. (2004, marzo 2). Fifth generation warfare. Recuperado de http:// www.dnipogo.org/lind/lind_2_03_04.htm
dc.relationLind, W. S. (2004). Understanding fourth generation war. Military Review, 84(5), 12-16.
dc.relationLind, W. S., Nightengale, C. K., Schmitt, J. F., Sutton, J. W. y Wilson, G. I. (1989). The changing face of war: Into the fourth generation. Recuperado de http://www.lesc.net/system/files/4GW+Original+Article+1989.pdf
dc.relationLópez, C. (2007). La guerra informática. Boletín del Centro Naval, 817, 219-224.
dc.relationLópez de Turizo y Sánchez, J. (2012). La evolución del conflicto hacia un nuevo escenario bélico. El ciberespacio: nuevo escenario de confrontación, 126, 117-167
dc.relationLorents, P. y Ottis, R. (2010). Knowledge based framework for cyber weapons and conflict. En C. Czosseck y K. Podins (eds.), Conference on Cyber Conflict Proceedings (pp. 129-142). Tallin: ccd coe Publications.
dc.relationMaggio González, G. (2013). El sun tzu aplicado a la competencia por el mercado. Madrid: Habilitas
dc.relationMallick, P. K. (2009). Principles of war: Time for relook. Nueva Delhi: Center for Land Warfare Studies.
dc.relationManthorpe, W. H. (1996). The emerging joint system of systems: A systems engineering challenge and opportunity for apl. Johns Hopkins apl Technical Digest, 17(3), 305-307.
dc.relationMartí Sempere, C. (2006). Tecnología de la defensa: análisis de la situación española. Madrid: Instituto Universitario General Gutiérrez Mellado.
dc.relationMasters, C. (2010, mayo 20). Cyborg soldiers and militarised masculinities. Euozine. Recuperado de http://www.eurozine.com/ cíborg-soldiers-and-militarised-masculinities/
dc.relationMatusitz, J. (2005). Cyberterrorism: How can American foreign policy be strengthened in the information age? American Foreign Policy Interests, 27(2), 137-147.
dc.relationMayntz, R. (2004). Organizational forms of terrorism: Hierarchy, network, or a type sui generis? Recuperado de https://www.econstor.eu/ handle/10419/19906
dc.relationMcKitrick, J., Blackwell, J., Littlepage, F., Kraus, G., Blanchfield, R. y Hill, D. (2001). The revolutions in military affairs. En B. R. Scheneider y L. E. Grinter (eds.), Battlefield of the future: 21st century warfare issues (pp. 65-98). Alabama: Air University Press.
dc.relationMehan, J. (2014). Cyberwar, cyberterror, cybercrime and cyberactivism. Cambridge: IT Gobernance.
dc.relationMestres, F. y Vives-Rego, J. (2016). Reflexiones sobre los cyborgs y los robots: evolución humana y aumentación. Ludus Vitalis, 20(37), 225-252.
dc.relationMetz, S. y Kievit, J. (1995). Strategy and the revolution in military affairs: From theory to policy. diane Publishing. Recuperado de http://ssi.armywarcollege.edu/pdffiles/00229.pdf .
dc.relationMillán Barbany, G. (2000). La conquista del espacio. En Horizontes culturales: las fronteras de la ciencia: 1998 (pp. 207-220). Madrid: Espasa-Calpe.
dc.relationMiller, J. H. (1997). Information warfare: Issues and perspectives. En R. E. Neilson (ed.), Sun Tzu and information warfare: A collection of winning papers from the Sun Tzu art of war in information warfare competition (pp. 145-167). Washington D. C.: National Defense University Press Publications.
dc.relationMiller, R. A. y Kuehl, D. T. (2009). Cyberspace and the “First Battle” in 21st-century war. Defense Horizons, 68, 1-6. Mills, E. (2010, febrero 23). Experts warn of
dc.relationMills, E. (2010, febrero 23). Experts warn of catastrophe from cyberattacks. cnet. Recuperado de https://www.cnet.com/news/ experts-warn-of-catastrophe-from-cyberattacks/
dc.relationmit Media Lab People (s. f.). Hugh Her Biomechatronics. Recuperado de https://www.media.mit.edu/people/hherr/overview/
dc.relationMolander, R. C., Riddile, A., Wilson, P. A. y Williamson, S. (1998). Strategic information warfare: A new face of war. Santa Mónica: rand.
dc.relationMolano Rojas, A. (2009). El nombre y la cosa: aportes al debate definicional sobre el terrorismo. Bogotá: Escuela de Inteligencia y Contrainteligencia BG. Ricardo Charry Solano.
dc.relationMontanari, L. y Querzoni, L. (eds.) (2014). Critical infrastructure protection: Threats, attacks and countermeasures. Tenace. Recuperado de http:// www.dis.uniroma1.it/~tenace/download/deliverable/Report_tenace.pdf
dc.relationMoteff, J., Copeland, C. y Fischer, J. (2003). Critical infrastructures: What makes an infrastructure critical? Washington D. C.: The Library of Congress.
dc.relationMotoike, I. y Yoshikawa, K. (1999). Information operations with an excitable field. Physical Review E, 59(5), 5354.
dc.relationMünkler, H. (2005). The new wars. Cambridge: Polity Press.
dc.relationNagpal, R. (2002). Cyber terrorism in the context of globalization. Ponencia presentada en ii World Congress on Informatics and Law, Madrid, España.
dc.relationNational Aeronautics and Space Administration (s. f.). A pictorial history of rockets. Recuperado de https://www.nasa.gov/pdf/153410main_Rockets_History.pdf.
dc.relationNational Cyber Security Center (2014). International case report on cyber security incidents: Reflections on three cyber incidents in the Netherlands, Germany and Sweden. Estocolmo: National Cyber Security Center.
dc.relationNational Institute of Standards and Technology (2014). Framework for improving critical infrastructure cybersecurity. Maryland: National Institute of Standards and Technology.
dc.relationNational Institute of Standards and Technology (2017). Framework for improving critical infrastructure cybersecurity. Maryland: National Institute of Standards and Technology.
dc.relationNichiporuk, B. (1999). U.S. Military Opportunities: Information-warfare concepts of operation. En Z. Khalilazad y J. White (eds.), The changing role of information in warfare (pp. 179-216). Santa Mónica, CA: rand.
dc.relationNorman, D. (1997). An information-based revolution in military affairs. En J. Arquilla y D. Ronfeldt (eds.), In Athena’s camp: Preparing for conflict in the information age (pp. 79-98). Santa Mónica, CA: rand.
dc.relationNovikov, D. A. (2016). Cybernetics: From past to future. Moscú: Springer.
dc.relationNye, Jr., J. S. y Owens, W. A. (1996). America’s information edge. Foreign Affairs. Recuperado de https://www.foreignaffairs.com/articles/ united-states/1996-03-01/americas-information-edge
dc.relationOrganisation for Economic Co-operation and Development (2008). Protection of ‘Critical Infrastructure’ and the role of investment policies relating to national security. París: Organisation for Economic Co-operation and Development.
dc.relationTOrtega, L. F. (2012). La ciberseguridad y la ciberdefensa. En El ciberespacio: nuevo escenario de confrontación (pp. 35-70). Madrid: Ministerio de Defensa.
dc.relationOrtiz, R. D. (1996). Amenazas transnacionales a la seguridad, tecnología e ingobernabilidad: Colombia. Ponencia presentada en iv Congreso Español de Ciencia Política y de la Administración, Granada, España.
dc.relationOttis, R. (2010). From pitchforks to laptops: Volunteers in cyber conflicts. En C. Czosseck y K. Podins (eds.), Conference on Cyber Conflict Proceedings (pp. 97-109). Tallin: ccd coe Publications.
dc.relationPaul, C., Porche III, I. R. y Axelband, E. (2014). The other quiet professionals: Lessons for future cyber forces from the evolution of special forces. Santa Mónica, CA: rand.
dc.relationPáez, E. P. (2014). La guerra cibernética en el nivel operacional (Trabajo final integrador, Escuela Superior de Guerra Conjunta de las Fuerzas Armadas, Madrid, Colombia).
dc.relationPeña Galbán, L. Y., Casas Rodríguez, L. y Mena Fernández, M. (2009). La guerra psicológica contemporánea: conceptos esenciales y características. Revista Humnidades Médicas, 9(2). Recuperado de http://scielo.sld.cu/ scielo.php?script=sci_arttext&pid=S1727-81202009000200012
dc.relationPerešin, A. (2007). Mass media and terrorism. Medijska istraživanja, 13(1), 5-22.
dc.relationPollitt, M. M. (1998). Cyberterrorism: Fact or fancy? Computer Fraud & Security, 1998(2), 8-10.
dc.relationPorteus, H. (2010, octubre 7). The stuxnet worm: Just another computer attack or a game changer? Recuperado de https://lop.parl.ca/Content/LOP/ ResearchPublications/2010-81-e.pdf
dc.relationPress, G. (2015, enero 2). A very short history of the internet and the web. Forbes. Recuperado de https://www.forbes.com/sites/gilpress/2015/01/02/avery-short-history-of-the-internet-and-the-web-2/#663ccb907a4e
dc.relationRandell, B. (1980). The Colossus. En N. Metropolis, J. Howlett y G.-C. Rota (eds.), A history of computing in the twentieth century: A collection of essays. Massachusetts: Academic Press.
dc.relationRinaldi, S. M., Peerenboom, J. P. y Kelly, T. K. (2001). Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Systems, 21(6), 11-25.
dc.relationRogers, J. D. (1998). Internetworking and the politics of science: nsfnet in Internet history. The Information Society, 14(3), 213-228.
dc.relationRosenfield, D. K. (2009). Rethinking cyber war. Critical Review, 21(1), 77-90
dc.relationSampaio, F. (2001). Ciberguerra: guerra eletrônica e informacional, um novo desafio estratégico. Porto Alegra: Escola Superior de Geopolítica e Estratégia.
dc.relationSánchez, J. (2017). Restoring active memory (ram). Defense Advanced Research Projects Agency. Recuperado de https://www.darpa.mil/program/ restoring-active-memory Sánchez Medero, G. (2008). Cib
dc.relationSánchez Medero, G. (2009a). Ciberguerra y ciberterrorismo: ¿realidad o ficción? Una nueva forma de guerra asimétrica. En F. A. Cuervo-Arango y J. d. Peñaranda Algar (coords.), Dos décadas de posguerra fría: Actas de las I Jornadas de Estudios de Seguridad de la Comunidad de Estudios de Seguridad General Gutiérrez Mellado (pp. 215-242). Madrid: Comunidad de Estudios de Seguridad General Gutiérrez Mellado
dc.relationSánchez Medero, G. (2009b). Internet: una herramienta para las guerras en el siglo xxi. Revista Política y Estrategia, 114, 224-242.
dc.relationSánchez Medero, G. (2010). Los Estados y la ciberguerra. Boletín de Información, 317, 63-76.
dc.relationSánchez Medero, G. (2012). La ciberguerra: los casos de Stuxnet y Anonymous. Derecom, 11, 124-133.
dc.relationSchneier, B. (2017, mayo 23). Who are the shadow brokers? The Atlantic. Recuperado de https://www.theatlantic.com/technology/archive/2017/05/ shadow-brokers/527778/
dc.relationSchreier, F. (2015). On cyberwarfare. Ginebra: Centre for the Democratic Control of Armed Forces.
dc.relationShakarian, P. (2011). Stuxnet: Cyberwar revolution in military affairs. Air & Space Power Journal, 50-59.
dc.relationShakarian, P., Shakarian, J. y Ruef, A. (2013). Introduction to cyber-warfare: A multidisciplinary approach. Massachusetts: Chris Katsaropoulos y Benjamin Rearick.
dc.relationShea, D. A. (2003). Critical infrastructure: Control systems and the terrorist threat. Congressional Research Service. Recuperado de https://fas.org/ irp/crs/RL31534.pdf
dc.relationSierra Caballero, F. (2002). Guerra informacional y sociedad-red: la potencia inmaterial de los ejércitos. Signo y Pensamiento, 21(40), 32-41.
dc.relationSierra Caballero, F. (2003). La guerra en la era de la información: propaganda, violencia simbólica y desarrollo panóptico del sistema global de comunicaciones. Sphera Pública, 3, 253-268.
dc.relationSilberstein, G. E. (1992). Seizing the enigma: The race to break the German U-boat codes, 1939-1943. History: Reviews of New Books, 20(4).
dc.relationSiles González, I. (2007). Cibernética y sociedad de la información: el retorno de un sueño eterno. Signo y Pensamiento, 26(50), 84-99.
dc.relationSimon, T. (2017). Critical infrastructure and the internet of things. Ontario: Centre for International Governance Innovation and Chatham House.
dc.relationSimon, T. (2017). Critical infrastructure and the internet of things. Ontario: Centre for International Governance Innovation and Chatham House.
dc.relationSimonetti, B. (2008). Guerra cibernética. Santa Maria: Universidade Federal de Santa Maria.
dc.relationSinger, P. W. y Friedman, A. (2014). Cybersecurity: What everyone needs to know. Oxford: Oxford University Press.
dc.relationSmith, G. S. (2004). Recognizing and preparing loss estimates from cyber-attacks. Information Systems Security, 12(6), 46-57.
dc.relationSteering Committee for Foundations for Innovation in Cyber-Physical Systems (2012). Strategic R&D opportunities for 21st century, cyber-physical systems, connecting computer and information systems with the physical world. Illinois: Foundation for Innovation in Cyber-Physical Systems.
dc.relationStein, G. J. (2001). Information war, cyberwar, netwar. En L. Grinter y B. Scheneider, Battlefield of the future: 21st century warfare issues (pp. 153-170). Alabama: Air University Press.
dc.relationStel, E. (2014). Seguridad y defensa del ciberespacio. Buenos Aires: Dunken.
dc.relationStrange, J. (2005). Centers of gravity & critical vulnerabilities: Building on the Clausewitzian foundation so that we can all speak the same language. Virginia: Defense Automated Printing Service Center.
dc.relationSulaiman, R. (2005). Information warfare. Global Information Assurance Certification Paper. Recuperado de https://www.giac.org/paper/gsec/1870/ information-warfare/103284
dc.relationTaddeo, M. (2012a). An analysis for a just cyber warfare. En C. Czosseck, R. Ottis y K. Ziolkowski (eds.), 2012 4th International Conference on Cyber Conflict (pp. 209-218). Tallin: nato ccd coe Publications.
dc.relationTaddeo, M. (2012b). Information warfare: A philosophical perspective. Philosophy & Technology, 25(1), 105-120.
dc.relationTalking Exoskeletons with suitX Founder Dr. Homayoon Kazerooni (2016, febrero 12). Recuperado de https://www.roboticsbusinessreview.com/ rbr/talking_exoskeletons_with_suitx_founder_dr_homayoon_kazerooni/
dc.relationTéllez Acuña, F. R. (2016). Prefijo ciber: arqueología de su presencia en la sociedad del conocimiento. Investigación y Desarrollo, 24(1), 142-162.
dc.relationThayer Mahan, A. (1911). Naval strategy. Pensilvania: U.S. Marine Corps
dc.relationThe Economist (2007, mayo 10). Estonia and Russia A cyber-riot. Recuperado de http://www.economist.com/node/9163598
dc.relationThe Economist (2010, julio 1). War in the fifth domain. Recuperado de http:// www.economist.com/node/16478792
dc.relationThe U.S.-China Economic and Security Review Commission (2009). Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. The U.S.-China Economic. Virginia: Northrop Grumman Corporation.
dc.relationThe White House (2003). The National Strategy to Secure Cyberspace. Washington D. C.: The White House.
dc.relationThomas, T. L. (2003). Al Qaeda and the Internet: The Danger of “Cyberplanning”. Parameters, 33, 112-123.
dc.relationThomas, T. L. (2007). Hizbulá, Israel, and Cyber psyop. Isphere, 30-35.
dc.relationThong, M. C. S. S., Howe, M. T. C. y Lee, M. N. W. J. (2012). Unmanned technology: The holy grail for militaries? pointer, Journal of the Singapore Armed Forces, 38(4), 16-25.
dc.relationTibbetts, P. S. (2002). Terrorist use of the internet and related information technologies (Tesis de grado, School of Advanced Military Studies, Kansas, Estados Unidos).
dc.relationTisseron, A. (2014). Robotic and future wars: When land forces facetechnological developments. En R. Doaré, D. Danet, J. P. Hanon y G. de Boisboissel, Robots on the battlefield: Contemporary perspectives and implications for the future (pp. 3-18). Kansas: Combat Studies Institute Press.
dc.relationToffler, A. y Toffler, H. (1994). Las guerras del futuro: la supervivencia en el alba del siglo xxi. Barcelona: Plaza & Janés.
dc.relationToffler, A., Toffler, H. y Solana, G. (1994). Las guerras del futuro: la supervivencia en el alba del siglo xxi. Barcelona: Plaza & Janés.
dc.relationTorres Sorian, M. (2009). Terrorismo yihadista y nuevos usos de internet: la distribución de propaganda (ari). Real Instituto El Cano. Recuperado de http://www.realinstitutoelcano.org/wps/portal/web/rielcano_es/ contenido?WCM_GLOBAL_CONTEXT=/elcano/elcano_es/zonas_es/ terrorismo+internacional/ari110-2009
dc.relationTrachtman, J. P. (2004). Global cyberterrorism, jurisdiction, and international organization. Recuperado de https://papers.ssrn.com/sol3/papers. cfm?abstract_id=566361
dc.relationTrafton, A. (2013, julio 25). Neuroscientists plant false memories in the brain. Recuperado de http://news.mit.edu/2013/ neuroscientists-plant-false-memories-in-the-brain-0725
dc.relationTrias, E. D. y Bell, B. M. (2010). Ciber esto, ciber aquello… ¿Y qué? Air and Space Power Journal, 22(3), 77-87.
dc.relationTzu, S. (1999). El arte de la guerra. Bogotá: Panamericana.
dc.relationTzu, S., Von Clausewitz, K. y Musashi, M. (2016). Genios de la estrategia militar (vol. 1). Nueva York: Luis Alberto Villamarín Pulido.
dc.relationUnión Internacional de Telecomunicaciones (2014). La uit publica las cifras de tic de 2014. Recuperado de http://www.itu.int/net/pressoffice/press_ releases/2014/23-es.aspx#.WpauM0xFzIU
dc.relationU.K. Office of Cyber Security (2009). Cyber security strategy of the United Kingdom: Safety, security and resilience in cyber space. Londres: Crown Copyright.
dc.relationU.S. Army Cyber Command (2016a). The facts: Cyber enlisted soldier careers. Recuperado de http://www.arcyber.army.mil/Style20Library/ARCYBER%20Custom%20Assets/factsheets/ARCYBER%20fact%20sheet%20 -%20Cyber%20Enlisted%20Careers%20%282March2016%29.pdf
dc.relationU.S. Army Cyber Command (2016b). The facts: Training for cyber soldiers. Recuperado de http://arcyber.army.mil/Style%20Library/ARCYBER%20 Custom%20Assets/factsheets/ARCYBER%20fact%20sheet%20-%20 Cyber%20Training%20at%20CCOE%20(15March2016).pdf
dc.relationU.S. Department of Defense (1996). Joint Vision 2010. Recuperado de http:// webapp1.dlib.indiana.edu/virtual_disk_library/index.cgi/4240529/ FID378/pdfdocs/2010/Jv2010.pdf
dc.relationU.S. Department of Defense (2010). Joint Publication 3.0. Wahington D.C., Estados Unidos: Estado Mayor Conjunto.
dc.relationusaf College of Aerospace Doctrine, Research and Education (1997). Three levels of war. En Air and space power mentoring guide (vol. 1). Maxwell AFB, AL: Air University Press
dc.relationVan Creveld, M. (1991). The transformation of war: The most radical reinterpretation of armed conflict since Clausewitz. Nueva York: Free Press
dc.relationVargas Vargas, E. M. (2014). Ciberseguridad y ciberdefensa: ¿qué implicaciones tienen para la seguridad nacional? (Tesis de grado, Universidad Militar Nueva Granada, Bogotá, Colombia).
dc.relationVázquez Liñán, M. (2000). La propaganda de guerra en la internet. Historia y Comunicación Social, 5, 53-74.
dc.relationVelandia Mora, M. A. (2006). Estrategias para construir la convivencia solidaria en el aula universitaria: trabajo en equipo y comunicación generadora de mundos. Bogotá: Universidad Cooperativa de Colombia
dc.relationVerising (2009). Cyber Threats and Trends. idefense Topical Research Report, Estados Unidos.
dc.relationVerton, D. (2004). La amenaza invisible del ciberterrorismo. Nueva York: McGraw Hill.
dc.relationWarden, J. A. (1995). The air campaign: Planning for combat. Pensilvania: diane Publishing.
dc.relationWander Nascimento, J. (2003). Ciberwar uma proposta gen érica de ações defensivas para a MB. Mharina do Brasil. Escola de Guerra Naval
dc.relationWeimann, G. (2004). Cyberterrorism: How real is the threat? Washington D. C.: United States Institute of Peace.
dc.relationWilson, C. (2004). Information warfare and cyberwar: Capabilities and related policy issues. crs Report for Congress. Recuperado de https://fas. org/irp/crs/RL31787.pdf
dc.relationWilson, C. (2005). Computer attack and cyberterrorism: Vulnerabilities and policy issues for congress. Washington D. C.: Congressional Research Service.
dc.relationWilson, C. (2007). Information operations, electronic warfare, and cyberwar: Capabilities and related policy issues. Washington D. C.: Congressional Research Service.
dc.relationWisskirchen, G., Biacabe, B. T., Bormann, U., Muntz, A., Niehaus, G., Soler, G. J. y Von Brauchitsch, B. (2017). Artificial intelligence and robotics and their impact on the workplace. Londres: iba Global Employment Institute.
dc.relationWittes, B. y Chong, J. (2014). Our cyborg future: Law and policy implications. Washington D. C.: Center for Technology Innovation at Brookings.
dc.relationWolthusen, S. D. (2003). Asymmetric information warfare: Cyberterrorism critical infrastructures. Ponencia presentada en Proceedings of the xv International Amaldi Conference of Academies of Science and National Scientific Societies on Problems of Global Security, Helsinki, Finlandia.
dc.relationWork, R. O. y Brimley, S. (2014, enero 22). 20YY: Preparing for war in the robotic age. Recuperado de https://www.cnas.org/publications/ reports/20yy-preparing-for-war-in-the-robotic-age
dc.relationZeng, D. y Wu, Z. (2014). From artificial intelligence to cyborg intelligence. ieee Intelligent Systems, 29(5), 2-4.
dc.relationZanini, M. (1999). Middle Eastern terrorism and netwar. Studies in Conflict and Terrorism, 22(3), 247-256.
dc.relationZanini, M. y Edwards, S. J. (2001). The networking of terror in the information age. En J. Arquilla y D. Ronfeldt, Networks and netwars the future of terror, crime, and militancy (pp. 29-60). Santa Mónica: rand.
dc.rightshttp://creativecommons.org/licenses/by-nc-nd/2.5/co/
dc.rightsAbierto (Texto Completo)
dc.rightsAtribución-NoComercial-SinDerivadas 2.5 Colombia
dc.sourceinstname:Universidad Santo Tomás
dc.sourcereponame:Repositorio Institucional Universidad Santo Tomás
dc.titleCiberguerra. La consolidación de un nuevo poder en las relaciones internacionales contemporáneas


Este ítem pertenece a la siguiente institución