dc.creatorPatino Orozco, German Alejandro
dc.date.accessioned2021-05-11 12:13:51
dc.date.accessioned2022-09-08T13:50:02Z
dc.date.available2021-05-11 12:13:51
dc.date.available2022-09-08T13:50:02Z
dc.date.created2021-05-11 12:13:51
dc.date.created2022-09-08T13:50:02Z
dc.date.issued2021-05-11
dc.identifier10.18601/16577558.n34.07
dc.identifier2346-2132
dc.identifier1657-7558
dc.identifierhttps://bdigital.uexternado.edu.co/handle/001/8561
dc.identifierhttps://doi.org/10.18601/16577558.n34.07
dc.description.abstractEste artículo aporta algunas consideraciones sobre el debate acerca de la relevancia de la ciberseguridad como herramienta en la competencia internacional. El argumento central sostiene que las acciones en el campo de ciberseguridad representan una pieza clave en el marco de las relaciones competitivas de carácter gubernamental. A través del ejercicio de comparar el modelo de ciberseguridad chino y estadounidense se sostiene que este terreno se ha convertido en un imperativo de seguridad nacional para ambos países. Asimismo, propone la adopción de una forma comparativa integral para esquemas de ciberseguridad gubernamental. El artículo concluye con algunos tópicos para profundizar en el análisis de ciberseguridad bajo una perspectiva internacional.
dc.description.abstractThis article provides some insights into the debate about the relevance of cyber security as a tool for international competition. The central argument sustains that actions in the cyber security realm perform a key piece in competitive relations of governments. By making a comparison between Chinese and American cyber security models the text upholds that this realm has become a national security imperative. Likewise, it proposes the adoption of a comprehensive comparative cyber security models of governments. The article concludes by offering some issues to analyze cyber security within an international perspective.
dc.languagespa
dc.publisherFacultad de Finanzas, Gobierno y Relaciones Internacionales
dc.relationhttps://revistas.uexternado.edu.co/index.php/oasis/article/download/7166/10485
dc.relationhttps://revistas.uexternado.edu.co/index.php/oasis/article/download/7166/10486
dc.relationhttps://revistas.uexternado.edu.co/index.php/oasis/article/download/7166/10487
dc.relationNúm. 34 , Año 2021 : Julio-Diciembre
dc.relation126
dc.relation34
dc.relation107
dc.relationOasis
dc.relationJakarta Globe: http://jakartaglobe.id/international/xi-offers-visionchina-driven-asia-pacific-dream/
dc.relationDeLisle, J. & Goldstein, A. (2017). China’s Global Engagement: Cooperation, Competition and Influence in the 21st Century. Washington: Brookings Institution Press.
dc.relationDeibert, R. (2011). Tracking the Emerging Arms Race in Cyberspace. Bulletin of Atomic Scientists.
dc.relationDeibert, R. J. (2013). Black Code: Surveillance, Privacy, and the Dark Side of the Internet. Toronto: Mc-Clelland & Stewart.
dc.relationDeibert, R. J. & Rohozinsky, R. (2010). Liberation vs Control in Cyberspace. Journal of Democracy, 21(4), 43-57.
dc.relationDobbins, J. (2012). War with China. Survival, 54(4), 7-24.
dc.relationEscobar, A. (06/1994). Welcome to cyberia: notes on the anthology of cyberculture. Current Anthropology, 35(3), 211-231.
dc.relationFriedberg, A. L. (2011). A Contest for Supremacy: China, America and the Struggle for Mastery in Asia. Nueva York: W.W. Norton.
dc.relationGady, F.-S. (28/01/2016). What Does 2016 Hold for U.S.-China Relations in Cyberspace? Retrieved noviembre 15, 2018 from China-US Focus: https://www.chinausfocus.com/peace-security/what-does-the-year-2016-hold-for-china-u-srelations-in-cyberspace/
dc.relationGoldstein, L. J. (2015). Meeting China Halfway. How to Defuse the Emerging U.S.-China Rivalry. Washington: Georgetown University Press.
dc.relationGuimón, P. (15/05/2019). Trump blinda las telecomunicaciones de EE. UU. contra Huawei en una nueva ofensiva contra China. Retrieved mayo 16, 2019 from El País: https://elpais.com/internacional/2019/05/15/estados_unidos/1557957202_172429.html
dc.relationHelleiner, E. & Kirshner, J. (2014). The Great Wall of Money: Power and Politics in China’s International Monetary Relations. Ithaca: Cornell University Press.
dc.relationJacques, M. (2009). When China Rules the World: The End of the Western World and the Birth of a New Global Order. Nueva York: Penguin.
dc.relationJohnston, A. I. (2013). How New and Assertive is China’s New Assertiveness? International Security, 37(4), 7-48.
dc.relationKlimburg, A. (2017). The Darkening Web: The War for Cyberspace. New York: Penguin Press.
dc.relationKaplan, F. (2016). Dark Territory: The Secret History of Cyber War. Nueva York: Simon & Schuster.
dc.relationKirshner, J. (2010). The Tragedy of Offensive Realism: Classical Realism and the Rise of China. European Journal of International Relations, 18(1), 53-75.
dc.relationKnight, W. (13/02/2019). Claves para entender por qué ee.uu. teme que Huawei domine el 5G. Retrieved mayo 21, 2019 from MIT Technology Review: https://www.technologyreview.es/s/10935/claves-para-entender-por-que-ee-uu-teme-quehuawei-domine-el-5g?fbclid=IwAR0_jtOi_pIlz09ivuyKqBWpBeIl8KsvvIkHZFvyIP51o-311fV8rd9vwe0Q
dc.relationKramer, F. D., Starr, S. H., Wentz, L. K. & (eds.). (2009). Cyberpower and National Security. Washington, DC: Potomac Books.
dc.relationKrauthamer, C. (31/07/1995). Why We Must Contain China. Time.
dc.relationKupchan, C. (2012). No One’s World: the West, the Rising Rest, and the Coming Global Turn. New York: Oxford University Press.
dc.relationLayne, C. (2009). The Unipolar Illusion Revisited: The Coming End of the United States’ Unipolar Moment. International Security, 34(1), 147-172.
dc.relationLegro, J. W. (2000). Whence American Internationalism. International Organization, 54(2), 253-289.
dc.relationLewis, J. A. (30/11/2018). Technologial Competition and China. Retrieved enero 22, 2019 from Center for Strategic & International Studies: https://www.csis.org/analysis/technological-competition-andchina
dc.relationLi, Z. (16/01/2016). Different Values but Similar Visions for Cyberspace. Retrieved enero 17, 2016 from China-US Focus: https://www.chinausfocus.com/peace-security/different-values-but-similarvisions-for-cyberspace
dc.relationLieberthal, K. & Wang, J. (2012). Addressing U.S.-China Strategic Distrust. Washington, Beijing: John L. Thornton China Center, Beijing University Center for International and Strategic Studies.
dc.relationLu, C. (29/12/2017). China-US Cyberspace Relations in the Trump Era. Retrieved diciembre 29, 2018 from China-US Focus: https://www.chinausfocus.com/peace-security/china-us-cyberspacerelations-in-the-trump-era
dc.relationManess, R. C., Valeriano, B. & Jensen, B. (2017). The Dyadic Cyber Incident and Dispute Dataset. Retrieved julio 8, 2019 from http://www.brandonvaleriano.com/uploads/8/1/7/3/81735138/dcid_1.5_codebook.pdf
dc.relationMiller, T. (2017). China’s Asian Dream. Londres: Zed Books.
dc.relationMorales, D. (2018). Ciclos políticos hegemónicos: implicaciones para la gobernanza internacional. Brazilian Journal of International Relations, 7(3),452-493.
dc.relationMorgenthau, H. J. (1948). Politics Among Nations: The Struggle for Power and Peace. New York: McGraw Hill.
dc.relationMuñoz, R. (20/05/2019). Google rompe con Huawei, cuyos móviles se quedarían sin sus ‘apps’ y actualizaciones. Retrieved mayo 20, 2019 from El País: https://elpais.com/economia/2019/05/19/actualidad/1558294622_546268.html
dc.relationPillsbury, M. (2015). The Hundred Year Marathon: China’s Secret Strategy to Replace America’s as the Global Superpower. Nueva York: Henry Holt. Rachman, G. (1996). Containing China. Washington Quarterly, 19(1), 129-140.
dc.relationRovner, J. & Moore, T. (2017). Does the Internet Need a Hegemon? Journal of Global Security Studies, 2(3), 184-203.
dc.relationSanger, D. E., Barnes, J. E., Zhong, R. & Santora, M. (26/01/2019). In 5G Race with China, U.S. Pushes Allies to Fight Huawei. Retrieved enero 28, 2019 from The New York Times: https://www.nytimes.com/2019/01/26/us/politics/huaweichina-us-5g-technology.html
dc.relationSegal, A. (2018). When China Rules the Web: Technology in the Service of the State. Foreign Affairs, 97(5), 10-18.
dc.relationShambaugh, D. (2013). China Goes Global. The Partial Power. Nueva York: Columbia University Press.
dc.relationSinger, P. W. & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Nueva York: Oxford University Press.
dc.relationSouth China Morning Post; Abacus; Edith Yeung. (2019). China Internet Report 2019. Hong Kong: South China Morning Post.
dc.relationSteinfeld, E. S. (2017). Teams of Rivals: China, the United States, and the Race to Develop Technologies for a Sustainable Future. In J. deLisle, & A. Goldstein, China’s Global Engagement: Cooperation, Competition, and Influence in the 21st Century (pp. 91-121). Washington: Brookings Institution Press.
dc.relationToca, G. (10/04/2019). 5G: la otra cara de la guerra digital. Retrieved abril 11, 2019 from Esglobal: https://www.esglobal.org/5g-la-otra-cara-de-la-guerradigital/?utm_campaign=shareaholic&utm_medium=twitter&utm_source=socialnetwork
dc.relationU.S. Cyber Command. (04/2018). Achieve and Maintain Cyberspace Superiority. Command Vision for US Cyber Command. Retrieved enero 23, 2019 from U.S. Cyber Command: https://www.cybercom.mil/Portals/56/Documents/UScybercom%20Vision%20April%202018.pdf?ver=2018-06-14-152556-010
dc.relationU.S. Cyber Command. (04/2018a). Achieve and Maintain Cyberspace Superiority. Command Vision for US Cyber Command. Retrieved enero 23, 2019 from U.S. Cyber Command: https://www.cybercom.mil/Portals/56/Documents/UScybercom%20Vision%20April%202018.pdf?ver=2018-06-14-152556-010
dc.relationU.S. Government White House. (09/2018). National Cyber Strategy of the United States of America. Retrieved enero 23, 2019 from U.S. Government White House: https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf
dc.relationValeriano, B., Jensen, B. & Maness, R. C. (2019). Cyber Strategy: The Evolving Character of Power and Coercion. Nueva York: Oxford University Press.
dc.relationVida Liy, M. & Mars, A. (21/05/2019). Donald Trum da una tregua de tres meses para imponer el veto a Huawei. Retrieved mayo 21, 2019 from El País: https://elpais.com/economia/2019/05/21/actualidad/1558417928_415258.html
dc.relationXi, J. (2014). The Governance of China. Beijing: Foreign Languages Press.
dc.relationYuan, L. (03/10/2018). Private Businesses Built Modern China. Now Gov’t Is Pushing Back. Retrieved mayo 21, 2019 from The New York Times: https://www.nytimes.com/2018/10/03/business/chinaeconomy-private-enterprise.html
dc.relationZuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future a the New Frontier Power. New Yok: Public Affairs.
dc.rightsinfo:eu-repo/semantics/openAccess
dc.rightshttp://purl.org/coar/access_right/c_abf2
dc.rightsEsta obra está bajo una licencia internacional Creative Commons Atribución-NoComercial-CompartirIgual 4.0.
dc.rightshttp://creativecommons.org/licenses/by-nc-sa/4.0
dc.rightsGerman Alejandro Patino Orozco - 2021
dc.sourcehttps://revistas.uexternado.edu.co/index.php/oasis/article/view/7166
dc.subjectcyber security;
dc.subjectinternational competition;
dc.subjectcyberspace;
dc.subjectnational security;
dc.subjectcyber-sovereignty
dc.subjectciberseguridad;
dc.subjectcompetencia internacional;
dc.subjectciberespacio;
dc.subjectseguridad nacional;
dc.subjectsoberanía cibernética
dc.titleUna comparativa de los esquemas de ciberseguridad de China y Estados Unidos
dc.typeArtículo de revista


Este ítem pertenece a la siguiente institución