La Ciberseguridad: análisis político y estratégico

Autores/as

  • Boris Saavedra Instituto Universitario Gutiérrez Mellado de la Universidad Nacional de Educación a Distancia, España
  • Luisa Parraguez Universidad Nacional Autónoma de México, México

DOI:

https://doi.org/10.25062/0120-0631.801

Biografía del autor/a

Boris Saavedra, Instituto Universitario Gutiérrez Mellado de la Universidad Nacional de Educación a Distancia, España

Doctor en Paz y Seguridad Internacional, Instituto Universitario Gutiérrez Mellado de la Universidad Nacional de Educación a Distancia en España; y Profesor de Seguridad Nacional, Centro de Estudios Hemisféricos de Defensa William J. Perry, Universidad Nacional de Defensa, Washington, D.C

Luisa Parraguez, Universidad Nacional Autónoma de México, México

Doctora en Relaciones Internacionales, Universidad Nacional Autónoma de México; Investigadora Fulbright, Centro de Estudios Hemisféricos de Defensa William J. Perry, Universidad de la Defensa Nacional, Washington, D.C.; y Profesora Investigadora del Tecnológico de Monterrey, Campus Ciudad de México.

Referencias bibliográficas

Campbell, R.J. (10 de junio del 2015). Cybersecurity Issues for the Bulk Power System. Washington DC Congressional Research Service. Obtenido de https://www.fas.org/sgp/crs/misc/R43989.pdf

Choucri, N. (2012). Cyberpolitics in International Relations. Nueva York: HarperCollins. https://doi.org/10.7551/mitpress/7736.001.0001

Clark, A. y Eddy, R.P. (2017). Warnings Finding Cassandras to Stop Catastrophes. Nueva York: HarperCollins publishers.

Connell, M. y Vogler, S. (2017). Russia's Approach to Cyber Warfare. CNA Analysis and Solutions. Obtenido de https://www.realclear-defense.com/articles/2017/05/09/russias_approach_to_cyber_warfare_111338.html

European Commission. (2017). Cybersecurity initiatives: working towards a more secure on- line environment. Obtenido de http://ec.europa.eu/information_society/newsroom/image/document/2017-3/factsheet_cybersecurity_update_january_2017_41543.pdf

European Commission. (2017). Building an Effective European Cyber Shield: Taking EU Cooperation to the Next Level. Obtenido de http://ec.europa.eu/epsc/publications/strategic-notes/building-effective-european-cyber-shield_en

Friedman, A. y Singer, P. W. (2014). Cyber- security and Cyberwar what everyone needs to know. Oxford: Oxford University Press.

Friedman, T. L. (2016). Thank You for Being Late: An optimist's Guide to Thriving in the Age of Acceleration. Nueva York: Farrar, Straus & Giroux.

Goodman, M. (2015). Future Crimes Everything is Connected Everyone is Vulnerable and What We Can Do about It. Nueva York, EE.UU: Doubleday.

Gordon, B. (2017). The EU Gets Serious About Cyber: The EU Cybersecurity Act and Other Elements of the Cyber Package. Obtenido de https://www.lexology.com/library/detail.aspx?g=c401bf00-99dd-4a11-8d63-9387f10374bd

KPMG. (2017). Overview of China's Cybersecurity Law. KPMG. Obtenido de https://assets.kpmg.com/content/dam/kpmg/cn/pdf/en/2017/02/overview-of-cybersecurity-law.pdf

Kramer, Franklin D., et al. (eds.). (2009) Cyberpower and National Security. Washington: National Defense University Press & Potomac Books, Inc.

Lindsay, J., et al. (2015). China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford: Oxford University Press. https://doi.org/10.1093/acprof:oso/9780190201265.001.0001

Luo, J., et al. (2014). A software vulnerability rating approach based on the vulnerability database. Journal of Applied Mathematics. Obtenido de https://www.hindawi.com/journals/jam/2014/932397/abs/ https://doi.org/10.1155/2014/932397

Meulen, van der, Nicole, et al. (2015). Cybersecurity in the European Union and Beyond: Exploring the Threats and Policy Responses, RAND Corporation, European Parliament.

NATO. (2017). Cyber defence. Acceso a https://www.nato.int/cps/en/natohq/topics_78170.htm.

Robles Carrillo, M. (2017). Gobernanza política versus gobernanza tecnológica del ciberespacio, Instituto Español de Estudios Estratégicos. Obtenido de http://www.ieee.es/Galerias/fichero/docs_opinion/2017/DIEEEO56-2017_Gobernanza_Margarita_Robles.pdf

Schmidt, E. y Cohen, J. (2013). The New Digital Age: Transforming Nations, Businesses and Our Lives. Nueva York: Vintage Company.

Schneier, B. (2015). Data and Goliath The Hidden Battles to Collect Your Data and Control Your World. Nueva York: W. W. Norton & Company, Inc.

Segal, A. (2016). The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Era. Nueva York: Public Affairs.

Shea, J. (2018). How is NATO Meeting the Challenge of Cyberspace? PRISM, 7(2), 19-29.

Simon, P. (2013). Too Big to Ignore: The Business Case of Big Data. Nueva Jersey: John Wiley & Sons, Inc. https://doi.org/10.1002/9781119204039

Singer P.W. y Friedman, A. (2014). Cybersecurity and Cyberwar what everyone needs to know. Oxford: Oxford University Press. https://doi.org/10.1093/wentk/9780199918096.001.0001

United Nations Office for Disarmament Affairs. (2018). Developments in the field of information and telecommunications in the context of international security. Obtenido de https://www.un.org/disarmament/topics/informationsecurity/

UNLP (2016). Minería de datos aplicada a datos masivos. Obtenido de http://sedici.unlp.edu.ar/handle/10915/52901

U.S. Department of Defense. (2015). The Department of Defense Cyber Strategy. Obtenido de https://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf

U.S. National Intelligence. (2018). Statement for the record: Worldwide Threat Assessment of the US Intelligence Community. Obtenido de https://www.intelligence.senate.gov/sites/default/files/documents/os-dcoats-021318.PDF

Vaishnav, C., et al. (2013). "Cyber International Relations as an Integrated System." Environment Systems and Decisions, 33(4), 561- 576. https://doi.org/10.1007/s10669-013-9480-3

Cómo citar

Saavedra, B. y Parraguez, L. (2018) «La Ciberseguridad: análisis político y estratégico», Revista de las Fuerzas Armadas, (244-245), pp. 73–80. doi: 10.25062/0120-0631.801.

Descargas

Los datos de descargas todavía no están disponibles.

Descargas

Publicado

2018-09-30

Métricas

Estadísticas de artículo
Vistas de resúmenes
Vistas de PDF
Descargas de PDF
Vistas de HTML
Otras vistas
QR Code