Una comparativa de los esquemas de ciberseguridad de China y Estados Unidos

Este artículo aporta algunas consideraciones sobre el debate acerca de la relevancia de la ciberseguridad como herramienta en la competencia internacional. El argumento central sostiene que las acciones en el campo de ciberseguridad representan una pieza clave en el marco de las relaciones competiti...

Full description

Autores:
Patino Orozco, German Alejandro
Tipo de recurso:
Article of journal
Fecha de publicación:
2021
Institución:
Universidad Externado de Colombia
Repositorio:
Biblioteca Digital Universidad Externado de Colombia
Idioma:
spa
OAI Identifier:
oai:bdigital.uexternado.edu.co:001/8561
Acceso en línea:
https://bdigital.uexternado.edu.co/handle/001/8561
https://doi.org/10.18601/16577558.n34.07
Palabra clave:
cyber security;
international competition;
cyberspace;
national security;
cyber-sovereignty
ciberseguridad;
competencia internacional;
ciberespacio;
seguridad nacional;
soberanía cibernética
Rights
openAccess
License
German Alejandro Patino Orozco - 2021
id uexternad2_86ffb850f8769a16f10df3587ce41b0e
oai_identifier_str oai:bdigital.uexternado.edu.co:001/8561
network_acronym_str uexternad2
network_name_str Biblioteca Digital Universidad Externado de Colombia
repository_id_str
dc.title.spa.fl_str_mv Una comparativa de los esquemas de ciberseguridad de China y Estados Unidos
dc.title.translated.eng.fl_str_mv Chinese and American Cyber Security Models: A Comparative
title Una comparativa de los esquemas de ciberseguridad de China y Estados Unidos
spellingShingle Una comparativa de los esquemas de ciberseguridad de China y Estados Unidos
cyber security;
international competition;
cyberspace;
national security;
cyber-sovereignty
ciberseguridad;
competencia internacional;
ciberespacio;
seguridad nacional;
soberanía cibernética
title_short Una comparativa de los esquemas de ciberseguridad de China y Estados Unidos
title_full Una comparativa de los esquemas de ciberseguridad de China y Estados Unidos
title_fullStr Una comparativa de los esquemas de ciberseguridad de China y Estados Unidos
title_full_unstemmed Una comparativa de los esquemas de ciberseguridad de China y Estados Unidos
title_sort Una comparativa de los esquemas de ciberseguridad de China y Estados Unidos
dc.creator.fl_str_mv Patino Orozco, German Alejandro
dc.contributor.author.spa.fl_str_mv Patino Orozco, German Alejandro
dc.subject.eng.fl_str_mv cyber security;
international competition;
cyberspace;
national security;
cyber-sovereignty
topic cyber security;
international competition;
cyberspace;
national security;
cyber-sovereignty
ciberseguridad;
competencia internacional;
ciberespacio;
seguridad nacional;
soberanía cibernética
dc.subject.spa.fl_str_mv ciberseguridad;
competencia internacional;
ciberespacio;
seguridad nacional;
soberanía cibernética
description Este artículo aporta algunas consideraciones sobre el debate acerca de la relevancia de la ciberseguridad como herramienta en la competencia internacional. El argumento central sostiene que las acciones en el campo de ciberseguridad representan una pieza clave en el marco de las relaciones competitivas de carácter gubernamental. A través del ejercicio de comparar el modelo de ciberseguridad chino y estadounidense se sostiene que este terreno se ha convertido en un imperativo de seguridad nacional para ambos países. Asimismo, propone la adopción de una forma comparativa integral para esquemas de ciberseguridad gubernamental. El artículo concluye con algunos tópicos para profundizar en el análisis de ciberseguridad bajo una perspectiva internacional.
publishDate 2021
dc.date.accessioned.none.fl_str_mv 2021-05-11 12:13:51
2022-09-08T13:50:02Z
dc.date.available.none.fl_str_mv 2021-05-11 12:13:51
2022-09-08T13:50:02Z
dc.date.issued.none.fl_str_mv 2021-05-11
dc.type.spa.fl_str_mv Artículo de revista
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_6501
http://purl.org/coar/resource_type/c_6501
dc.type.coarversion.spa.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.content.spa.fl_str_mv Text
dc.type.driver.spa.fl_str_mv info:eu-repo/semantics/article
dc.type.local.eng.fl_str_mv Journal article
dc.type.redcol.spa.fl_str_mv http://purl.org/redcol/resource_type/ARTREF
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/publishedVersion
format http://purl.org/coar/resource_type/c_6501
status_str publishedVersion
dc.identifier.doi.none.fl_str_mv 10.18601/16577558.n34.07
dc.identifier.eissn.none.fl_str_mv 2346-2132
dc.identifier.issn.none.fl_str_mv 1657-7558
dc.identifier.uri.none.fl_str_mv https://bdigital.uexternado.edu.co/handle/001/8561
dc.identifier.url.none.fl_str_mv https://doi.org/10.18601/16577558.n34.07
identifier_str_mv 10.18601/16577558.n34.07
2346-2132
1657-7558
url https://bdigital.uexternado.edu.co/handle/001/8561
https://doi.org/10.18601/16577558.n34.07
dc.language.iso.spa.fl_str_mv spa
language spa
dc.relation.bitstream.none.fl_str_mv https://revistas.uexternado.edu.co/index.php/oasis/article/download/7166/10485
https://revistas.uexternado.edu.co/index.php/oasis/article/download/7166/10486
https://revistas.uexternado.edu.co/index.php/oasis/article/download/7166/10487
dc.relation.citationedition.spa.fl_str_mv Núm. 34 , Año 2021 : Julio-Diciembre
dc.relation.citationendpage.none.fl_str_mv 126
dc.relation.citationissue.spa.fl_str_mv 34
dc.relation.citationstartpage.none.fl_str_mv 107
dc.relation.ispartofjournal.spa.fl_str_mv Oasis
dc.relation.references.spa.fl_str_mv Jakarta Globe: http://jakartaglobe.id/international/xi-offers-visionchina-driven-asia-pacific-dream/
DeLisle, J. & Goldstein, A. (2017). China’s Global Engagement: Cooperation, Competition and Influence in the 21st Century. Washington: Brookings Institution Press.
Deibert, R. (2011). Tracking the Emerging Arms Race in Cyberspace. Bulletin of Atomic Scientists.
Deibert, R. J. (2013). Black Code: Surveillance, Privacy, and the Dark Side of the Internet. Toronto: Mc-Clelland & Stewart.
Deibert, R. J. & Rohozinsky, R. (2010). Liberation vs Control in Cyberspace. Journal of Democracy, 21(4), 43-57.
Dobbins, J. (2012). War with China. Survival, 54(4), 7-24.
Escobar, A. (06/1994). Welcome to cyberia: notes on the anthology of cyberculture. Current Anthropology, 35(3), 211-231.
Friedberg, A. L. (2011). A Contest for Supremacy: China, America and the Struggle for Mastery in Asia. Nueva York: W.W. Norton.
Gady, F.-S. (28/01/2016). What Does 2016 Hold for U.S.-China Relations in Cyberspace? Retrieved noviembre 15, 2018 from China-US Focus: https://www.chinausfocus.com/peace-security/what-does-the-year-2016-hold-for-china-u-srelations-in-cyberspace/
Goldstein, L. J. (2015). Meeting China Halfway. How to Defuse the Emerging U.S.-China Rivalry. Washington: Georgetown University Press.
Guimón, P. (15/05/2019). Trump blinda las telecomunicaciones de EE. UU. contra Huawei en una nueva ofensiva contra China. Retrieved mayo 16, 2019 from El País: https://elpais.com/internacional/2019/05/15/estados_unidos/1557957202_172429.html
Helleiner, E. & Kirshner, J. (2014). The Great Wall of Money: Power and Politics in China’s International Monetary Relations. Ithaca: Cornell University Press.
Jacques, M. (2009). When China Rules the World: The End of the Western World and the Birth of a New Global Order. Nueva York: Penguin.
Johnston, A. I. (2013). How New and Assertive is China’s New Assertiveness? International Security, 37(4), 7-48.
Klimburg, A. (2017). The Darkening Web: The War for Cyberspace. New York: Penguin Press.
Kaplan, F. (2016). Dark Territory: The Secret History of Cyber War. Nueva York: Simon & Schuster.
Kirshner, J. (2010). The Tragedy of Offensive Realism: Classical Realism and the Rise of China. European Journal of International Relations, 18(1), 53-75.
Knight, W. (13/02/2019). Claves para entender por qué ee.uu. teme que Huawei domine el 5G. Retrieved mayo 21, 2019 from MIT Technology Review: https://www.technologyreview.es/s/10935/claves-para-entender-por-que-ee-uu-teme-quehuawei-domine-el-5g?fbclid=IwAR0_jtOi_pIlz09ivuyKqBWpBeIl8KsvvIkHZFvyIP51o-311fV8rd9vwe0Q
Kramer, F. D., Starr, S. H., Wentz, L. K. & (eds.). (2009). Cyberpower and National Security. Washington, DC: Potomac Books.
Krauthamer, C. (31/07/1995). Why We Must Contain China. Time.
Kupchan, C. (2012). No One’s World: the West, the Rising Rest, and the Coming Global Turn. New York: Oxford University Press.
Layne, C. (2009). The Unipolar Illusion Revisited: The Coming End of the United States’ Unipolar Moment. International Security, 34(1), 147-172.
Legro, J. W. (2000). Whence American Internationalism. International Organization, 54(2), 253-289.
Lewis, J. A. (30/11/2018). Technologial Competition and China. Retrieved enero 22, 2019 from Center for Strategic & International Studies: https://www.csis.org/analysis/technological-competition-andchina
Li, Z. (16/01/2016). Different Values but Similar Visions for Cyberspace. Retrieved enero 17, 2016 from China-US Focus: https://www.chinausfocus.com/peace-security/different-values-but-similarvisions-for-cyberspace
Lieberthal, K. & Wang, J. (2012). Addressing U.S.-China Strategic Distrust. Washington, Beijing: John L. Thornton China Center, Beijing University Center for International and Strategic Studies.
Lu, C. (29/12/2017). China-US Cyberspace Relations in the Trump Era. Retrieved diciembre 29, 2018 from China-US Focus: https://www.chinausfocus.com/peace-security/china-us-cyberspacerelations-in-the-trump-era
Maness, R. C., Valeriano, B. & Jensen, B. (2017). The Dyadic Cyber Incident and Dispute Dataset. Retrieved julio 8, 2019 from http://www.brandonvaleriano.com/uploads/8/1/7/3/81735138/dcid_1.5_codebook.pdf
Miller, T. (2017). China’s Asian Dream. Londres: Zed Books.
Morales, D. (2018). Ciclos políticos hegemónicos: implicaciones para la gobernanza internacional. Brazilian Journal of International Relations, 7(3),452-493.
Morgenthau, H. J. (1948). Politics Among Nations: The Struggle for Power and Peace. New York: McGraw Hill.
Muñoz, R. (20/05/2019). Google rompe con Huawei, cuyos móviles se quedarían sin sus ‘apps’ y actualizaciones. Retrieved mayo 20, 2019 from El País: https://elpais.com/economia/2019/05/19/actualidad/1558294622_546268.html
Pillsbury, M. (2015). The Hundred Year Marathon: China’s Secret Strategy to Replace America’s as the Global Superpower. Nueva York: Henry Holt. Rachman, G. (1996). Containing China. Washington Quarterly, 19(1), 129-140.
Rovner, J. & Moore, T. (2017). Does the Internet Need a Hegemon? Journal of Global Security Studies, 2(3), 184-203.
Sanger, D. E., Barnes, J. E., Zhong, R. & Santora, M. (26/01/2019). In 5G Race with China, U.S. Pushes Allies to Fight Huawei. Retrieved enero 28, 2019 from The New York Times: https://www.nytimes.com/2019/01/26/us/politics/huaweichina-us-5g-technology.html
Segal, A. (2018). When China Rules the Web: Technology in the Service of the State. Foreign Affairs, 97(5), 10-18.
Shambaugh, D. (2013). China Goes Global. The Partial Power. Nueva York: Columbia University Press.
Singer, P. W. & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Nueva York: Oxford University Press.
South China Morning Post; Abacus; Edith Yeung. (2019). China Internet Report 2019. Hong Kong: South China Morning Post.
Steinfeld, E. S. (2017). Teams of Rivals: China, the United States, and the Race to Develop Technologies for a Sustainable Future. In J. deLisle, & A. Goldstein, China’s Global Engagement: Cooperation, Competition, and Influence in the 21st Century (pp. 91-121). Washington: Brookings Institution Press.
Toca, G. (10/04/2019). 5G: la otra cara de la guerra digital. Retrieved abril 11, 2019 from Esglobal: https://www.esglobal.org/5g-la-otra-cara-de-la-guerradigital/?utm_campaign=shareaholic&utm_medium=twitter&utm_source=socialnetwork
U.S. Cyber Command. (04/2018). Achieve and Maintain Cyberspace Superiority. Command Vision for US Cyber Command. Retrieved enero 23, 2019 from U.S. Cyber Command: https://www.cybercom.mil/Portals/56/Documents/UScybercom%20Vision%20April%202018.pdf?ver=2018-06-14-152556-010
U.S. Cyber Command. (04/2018a). Achieve and Maintain Cyberspace Superiority. Command Vision for US Cyber Command. Retrieved enero 23, 2019 from U.S. Cyber Command: https://www.cybercom.mil/Portals/56/Documents/UScybercom%20Vision%20April%202018.pdf?ver=2018-06-14-152556-010
U.S. Government White House. (09/2018). National Cyber Strategy of the United States of America. Retrieved enero 23, 2019 from U.S. Government White House: https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf
Valeriano, B., Jensen, B. & Maness, R. C. (2019). Cyber Strategy: The Evolving Character of Power and Coercion. Nueva York: Oxford University Press.
Vida Liy, M. & Mars, A. (21/05/2019). Donald Trum da una tregua de tres meses para imponer el veto a Huawei. Retrieved mayo 21, 2019 from El País: https://elpais.com/economia/2019/05/21/actualidad/1558417928_415258.html
Xi, J. (2014). The Governance of China. Beijing: Foreign Languages Press.
Yuan, L. (03/10/2018). Private Businesses Built Modern China. Now Gov’t Is Pushing Back. Retrieved mayo 21, 2019 from The New York Times: https://www.nytimes.com/2018/10/03/business/chinaeconomy-private-enterprise.html
Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future a the New Frontier Power. New Yok: Public Affairs.
dc.rights.spa.fl_str_mv German Alejandro Patino Orozco - 2021
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.coar.spa.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.uri.spa.fl_str_mv http://creativecommons.org/licenses/by-nc-sa/4.0
rights_invalid_str_mv German Alejandro Patino Orozco - 2021
http://purl.org/coar/access_right/c_abf2
http://creativecommons.org/licenses/by-nc-sa/4.0
eu_rights_str_mv openAccess
dc.format.mimetype.spa.fl_str_mv application/pdf
text/html
text/xml
dc.publisher.spa.fl_str_mv Facultad de Finanzas, Gobierno y Relaciones Internacionales
dc.source.spa.fl_str_mv https://revistas.uexternado.edu.co/index.php/oasis/article/view/7166
institution Universidad Externado de Colombia
bitstream.url.fl_str_mv https://bdigital.uexternado.edu.co/bitstreams/f508ecd9-2f6b-4b2e-8a35-dac3f1cf2d9d/download
bitstream.checksum.fl_str_mv 25418049221884ca42377cf0c6b4423a
bitstream.checksumAlgorithm.fl_str_mv MD5
repository.name.fl_str_mv Universidad Externado de Colombia
repository.mail.fl_str_mv metabiblioteca@metabiblioteca.org
_version_ 1814100390570885120
spelling Patino Orozco, German Alejandro07096857-884c-4e64-8db8-610144d29ca12021-05-11 12:13:512022-09-08T13:50:02Z2021-05-11 12:13:512022-09-08T13:50:02Z2021-05-11Este artículo aporta algunas consideraciones sobre el debate acerca de la relevancia de la ciberseguridad como herramienta en la competencia internacional. El argumento central sostiene que las acciones en el campo de ciberseguridad representan una pieza clave en el marco de las relaciones competitivas de carácter gubernamental. A través del ejercicio de comparar el modelo de ciberseguridad chino y estadounidense se sostiene que este terreno se ha convertido en un imperativo de seguridad nacional para ambos países. Asimismo, propone la adopción de una forma comparativa integral para esquemas de ciberseguridad gubernamental. El artículo concluye con algunos tópicos para profundizar en el análisis de ciberseguridad bajo una perspectiva internacional.This article provides some insights into the debate about the relevance of cyber security as a tool for international competition. The central argument sustains that actions in the cyber security realm perform a key piece in competitive relations of governments. By making a comparison between Chinese and American cyber security models the text upholds that this realm has become a national security imperative. Likewise, it proposes the adoption of a comprehensive comparative cyber security models of governments. The article concludes by offering some issues to analyze cyber security within an international perspective.application/pdftext/htmltext/xml10.18601/16577558.n34.072346-21321657-7558https://bdigital.uexternado.edu.co/handle/001/8561https://doi.org/10.18601/16577558.n34.07spaFacultad de Finanzas, Gobierno y Relaciones Internacionaleshttps://revistas.uexternado.edu.co/index.php/oasis/article/download/7166/10485https://revistas.uexternado.edu.co/index.php/oasis/article/download/7166/10486https://revistas.uexternado.edu.co/index.php/oasis/article/download/7166/10487Núm. 34 , Año 2021 : Julio-Diciembre12634107OasisJakarta Globe: http://jakartaglobe.id/international/xi-offers-visionchina-driven-asia-pacific-dream/DeLisle, J. & Goldstein, A. (2017). China’s Global Engagement: Cooperation, Competition and Influence in the 21st Century. Washington: Brookings Institution Press.Deibert, R. (2011). Tracking the Emerging Arms Race in Cyberspace. Bulletin of Atomic Scientists.Deibert, R. J. (2013). Black Code: Surveillance, Privacy, and the Dark Side of the Internet. Toronto: Mc-Clelland & Stewart.Deibert, R. J. & Rohozinsky, R. (2010). Liberation vs Control in Cyberspace. Journal of Democracy, 21(4), 43-57.Dobbins, J. (2012). War with China. Survival, 54(4), 7-24.Escobar, A. (06/1994). Welcome to cyberia: notes on the anthology of cyberculture. Current Anthropology, 35(3), 211-231.Friedberg, A. L. (2011). A Contest for Supremacy: China, America and the Struggle for Mastery in Asia. Nueva York: W.W. Norton.Gady, F.-S. (28/01/2016). What Does 2016 Hold for U.S.-China Relations in Cyberspace? Retrieved noviembre 15, 2018 from China-US Focus: https://www.chinausfocus.com/peace-security/what-does-the-year-2016-hold-for-china-u-srelations-in-cyberspace/Goldstein, L. J. (2015). Meeting China Halfway. How to Defuse the Emerging U.S.-China Rivalry. Washington: Georgetown University Press.Guimón, P. (15/05/2019). Trump blinda las telecomunicaciones de EE. UU. contra Huawei en una nueva ofensiva contra China. Retrieved mayo 16, 2019 from El País: https://elpais.com/internacional/2019/05/15/estados_unidos/1557957202_172429.htmlHelleiner, E. & Kirshner, J. (2014). The Great Wall of Money: Power and Politics in China’s International Monetary Relations. Ithaca: Cornell University Press.Jacques, M. (2009). When China Rules the World: The End of the Western World and the Birth of a New Global Order. Nueva York: Penguin.Johnston, A. I. (2013). How New and Assertive is China’s New Assertiveness? International Security, 37(4), 7-48.Klimburg, A. (2017). The Darkening Web: The War for Cyberspace. New York: Penguin Press.Kaplan, F. (2016). Dark Territory: The Secret History of Cyber War. Nueva York: Simon & Schuster.Kirshner, J. (2010). The Tragedy of Offensive Realism: Classical Realism and the Rise of China. European Journal of International Relations, 18(1), 53-75.Knight, W. (13/02/2019). Claves para entender por qué ee.uu. teme que Huawei domine el 5G. Retrieved mayo 21, 2019 from MIT Technology Review: https://www.technologyreview.es/s/10935/claves-para-entender-por-que-ee-uu-teme-quehuawei-domine-el-5g?fbclid=IwAR0_jtOi_pIlz09ivuyKqBWpBeIl8KsvvIkHZFvyIP51o-311fV8rd9vwe0QKramer, F. D., Starr, S. H., Wentz, L. K. & (eds.). (2009). Cyberpower and National Security. Washington, DC: Potomac Books.Krauthamer, C. (31/07/1995). Why We Must Contain China. Time.Kupchan, C. (2012). No One’s World: the West, the Rising Rest, and the Coming Global Turn. New York: Oxford University Press.Layne, C. (2009). The Unipolar Illusion Revisited: The Coming End of the United States’ Unipolar Moment. International Security, 34(1), 147-172.Legro, J. W. (2000). Whence American Internationalism. International Organization, 54(2), 253-289.Lewis, J. A. (30/11/2018). Technologial Competition and China. Retrieved enero 22, 2019 from Center for Strategic & International Studies: https://www.csis.org/analysis/technological-competition-andchinaLi, Z. (16/01/2016). Different Values but Similar Visions for Cyberspace. Retrieved enero 17, 2016 from China-US Focus: https://www.chinausfocus.com/peace-security/different-values-but-similarvisions-for-cyberspaceLieberthal, K. & Wang, J. (2012). Addressing U.S.-China Strategic Distrust. Washington, Beijing: John L. Thornton China Center, Beijing University Center for International and Strategic Studies.Lu, C. (29/12/2017). China-US Cyberspace Relations in the Trump Era. Retrieved diciembre 29, 2018 from China-US Focus: https://www.chinausfocus.com/peace-security/china-us-cyberspacerelations-in-the-trump-eraManess, R. C., Valeriano, B. & Jensen, B. (2017). The Dyadic Cyber Incident and Dispute Dataset. Retrieved julio 8, 2019 from http://www.brandonvaleriano.com/uploads/8/1/7/3/81735138/dcid_1.5_codebook.pdfMiller, T. (2017). China’s Asian Dream. Londres: Zed Books.Morales, D. (2018). Ciclos políticos hegemónicos: implicaciones para la gobernanza internacional. Brazilian Journal of International Relations, 7(3),452-493.Morgenthau, H. J. (1948). Politics Among Nations: The Struggle for Power and Peace. New York: McGraw Hill.Muñoz, R. (20/05/2019). Google rompe con Huawei, cuyos móviles se quedarían sin sus ‘apps’ y actualizaciones. Retrieved mayo 20, 2019 from El País: https://elpais.com/economia/2019/05/19/actualidad/1558294622_546268.htmlPillsbury, M. (2015). The Hundred Year Marathon: China’s Secret Strategy to Replace America’s as the Global Superpower. Nueva York: Henry Holt. Rachman, G. (1996). Containing China. Washington Quarterly, 19(1), 129-140.Rovner, J. & Moore, T. (2017). Does the Internet Need a Hegemon? Journal of Global Security Studies, 2(3), 184-203.Sanger, D. E., Barnes, J. E., Zhong, R. & Santora, M. (26/01/2019). In 5G Race with China, U.S. Pushes Allies to Fight Huawei. Retrieved enero 28, 2019 from The New York Times: https://www.nytimes.com/2019/01/26/us/politics/huaweichina-us-5g-technology.htmlSegal, A. (2018). When China Rules the Web: Technology in the Service of the State. Foreign Affairs, 97(5), 10-18.Shambaugh, D. (2013). China Goes Global. The Partial Power. Nueva York: Columbia University Press.Singer, P. W. & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Nueva York: Oxford University Press.South China Morning Post; Abacus; Edith Yeung. (2019). China Internet Report 2019. Hong Kong: South China Morning Post.Steinfeld, E. S. (2017). Teams of Rivals: China, the United States, and the Race to Develop Technologies for a Sustainable Future. In J. deLisle, & A. Goldstein, China’s Global Engagement: Cooperation, Competition, and Influence in the 21st Century (pp. 91-121). Washington: Brookings Institution Press.Toca, G. (10/04/2019). 5G: la otra cara de la guerra digital. Retrieved abril 11, 2019 from Esglobal: https://www.esglobal.org/5g-la-otra-cara-de-la-guerradigital/?utm_campaign=shareaholic&utm_medium=twitter&utm_source=socialnetworkU.S. Cyber Command. (04/2018). Achieve and Maintain Cyberspace Superiority. Command Vision for US Cyber Command. Retrieved enero 23, 2019 from U.S. Cyber Command: https://www.cybercom.mil/Portals/56/Documents/UScybercom%20Vision%20April%202018.pdf?ver=2018-06-14-152556-010U.S. Cyber Command. (04/2018a). Achieve and Maintain Cyberspace Superiority. Command Vision for US Cyber Command. Retrieved enero 23, 2019 from U.S. Cyber Command: https://www.cybercom.mil/Portals/56/Documents/UScybercom%20Vision%20April%202018.pdf?ver=2018-06-14-152556-010U.S. Government White House. (09/2018). National Cyber Strategy of the United States of America. Retrieved enero 23, 2019 from U.S. Government White House: https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdfValeriano, B., Jensen, B. & Maness, R. C. (2019). Cyber Strategy: The Evolving Character of Power and Coercion. Nueva York: Oxford University Press.Vida Liy, M. & Mars, A. (21/05/2019). Donald Trum da una tregua de tres meses para imponer el veto a Huawei. Retrieved mayo 21, 2019 from El País: https://elpais.com/economia/2019/05/21/actualidad/1558417928_415258.htmlXi, J. (2014). The Governance of China. Beijing: Foreign Languages Press.Yuan, L. (03/10/2018). Private Businesses Built Modern China. Now Gov’t Is Pushing Back. Retrieved mayo 21, 2019 from The New York Times: https://www.nytimes.com/2018/10/03/business/chinaeconomy-private-enterprise.htmlZuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future a the New Frontier Power. New Yok: Public Affairs.German Alejandro Patino Orozco - 2021info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Esta obra está bajo una licencia internacional Creative Commons Atribución-NoComercial-CompartirIgual 4.0.http://creativecommons.org/licenses/by-nc-sa/4.0https://revistas.uexternado.edu.co/index.php/oasis/article/view/7166cyber security;international competition;cyberspace;national security;cyber-sovereigntyciberseguridad;competencia internacional;ciberespacio;seguridad nacional;soberanía cibernéticaUna comparativa de los esquemas de ciberseguridad de China y Estados UnidosChinese and American Cyber Security Models: A ComparativeArtículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/version/c_970fb48d4fbd8a85Textinfo:eu-repo/semantics/articleJournal articlehttp://purl.org/redcol/resource_type/ARTREFinfo:eu-repo/semantics/publishedVersionPublicationOREORE.xmltext/xml2571https://bdigital.uexternado.edu.co/bitstreams/f508ecd9-2f6b-4b2e-8a35-dac3f1cf2d9d/download25418049221884ca42377cf0c6b4423aMD51001/8561oai:bdigital.uexternado.edu.co:001/85612023-08-14 15:08:55.097http://creativecommons.org/licenses/by-nc-sa/4.0German Alejandro Patino Orozco - 2021https://bdigital.uexternado.edu.coUniversidad Externado de Colombiametabiblioteca@metabiblioteca.org