El sistema internacional cibernético: elementos de análisis
Este artículo aporta algunas consideraciones sobre el debate de cuestiones cibernéticas y sus efectos sobre el entendimiento de nuevas temáticas de seguridad internacional. Además, propone la adopción de metodologías de la disciplina de relaciones internacionales para estudiar asuntos cibernéticos...
- Autores:
-
Patiño Orozco, Germán Alejandro
- Tipo de recurso:
- Article of journal
- Fecha de publicación:
- 2019
- Institución:
- Universidad Externado de Colombia
- Repositorio:
- Biblioteca Digital Universidad Externado de Colombia
- Idioma:
- spa
- OAI Identifier:
- oai:bdigital.uexternado.edu.co:001/8511
- Acceso en línea:
- https://bdigital.uexternado.edu.co/handle/001/8511
https://doi.org/10.18601/16577558.n30.10
- Palabra clave:
- cyberspace;
cybersecurity;
international security;
international cybersystem
ciberseguridad;
ciberespacio;
seguridad internacional;
sistema internacional cibernético
- Rights
- openAccess
- License
- Germán Alejandro Patiño Orozco - 2019
id |
uexternad2_e73202bd38598e7c3f1766bd55da25d8 |
---|---|
oai_identifier_str |
oai:bdigital.uexternado.edu.co:001/8511 |
network_acronym_str |
uexternad2 |
network_name_str |
Biblioteca Digital Universidad Externado de Colombia |
repository_id_str |
|
dc.title.spa.fl_str_mv |
El sistema internacional cibernético: elementos de análisis |
dc.title.translated.eng.fl_str_mv |
The international cybersystem: elements of analysis |
title |
El sistema internacional cibernético: elementos de análisis |
spellingShingle |
El sistema internacional cibernético: elementos de análisis cyberspace; cybersecurity; international security; international cybersystem ciberseguridad; ciberespacio; seguridad internacional; sistema internacional cibernético |
title_short |
El sistema internacional cibernético: elementos de análisis |
title_full |
El sistema internacional cibernético: elementos de análisis |
title_fullStr |
El sistema internacional cibernético: elementos de análisis |
title_full_unstemmed |
El sistema internacional cibernético: elementos de análisis |
title_sort |
El sistema internacional cibernético: elementos de análisis |
dc.creator.fl_str_mv |
Patiño Orozco, Germán Alejandro |
dc.contributor.author.spa.fl_str_mv |
Patiño Orozco, Germán Alejandro |
dc.subject.eng.fl_str_mv |
cyberspace; cybersecurity; international security; international cybersystem |
topic |
cyberspace; cybersecurity; international security; international cybersystem ciberseguridad; ciberespacio; seguridad internacional; sistema internacional cibernético |
dc.subject.spa.fl_str_mv |
ciberseguridad; ciberespacio; seguridad internacional; sistema internacional cibernético |
description |
Este artículo aporta algunas consideraciones sobre el debate de cuestiones cibernéticas y sus efectos sobre el entendimiento de nuevas temáticas de seguridad internacional. Además, propone la adopción de metodologías de la disciplina de relaciones internacionales para estudiar asuntos cibernéticos de carácter global. El artículo concluye con algunos lineamientos para profundizar acerca del análisis de temas cibernéticos con una perspectiva internacional. |
publishDate |
2019 |
dc.date.accessioned.none.fl_str_mv |
2019-06-26 10:32:22 2022-09-08T13:48:58Z |
dc.date.available.none.fl_str_mv |
2019-06-26 10:32:22 2022-09-08T13:48:58Z |
dc.date.issued.none.fl_str_mv |
2019-06-26 |
dc.type.spa.fl_str_mv |
Artículo de revista |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.coar.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 http://purl.org/coar/resource_type/c_6501 |
dc.type.coarversion.spa.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
dc.type.content.spa.fl_str_mv |
Text |
dc.type.driver.spa.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.local.eng.fl_str_mv |
Journal article |
dc.type.redcol.spa.fl_str_mv |
http://purl.org/redcol/resource_type/ARTREF |
dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
format |
http://purl.org/coar/resource_type/c_6501 |
status_str |
publishedVersion |
dc.identifier.doi.none.fl_str_mv |
10.18601/16577558.n30.10 |
dc.identifier.eissn.none.fl_str_mv |
2346-2132 |
dc.identifier.issn.none.fl_str_mv |
1657-7558 |
dc.identifier.uri.none.fl_str_mv |
https://bdigital.uexternado.edu.co/handle/001/8511 |
dc.identifier.url.none.fl_str_mv |
https://doi.org/10.18601/16577558.n30.10 |
identifier_str_mv |
10.18601/16577558.n30.10 2346-2132 1657-7558 |
url |
https://bdigital.uexternado.edu.co/handle/001/8511 https://doi.org/10.18601/16577558.n30.10 |
dc.language.iso.spa.fl_str_mv |
spa |
language |
spa |
dc.relation.bitstream.none.fl_str_mv |
https://revistas.uexternado.edu.co/index.php/oasis/article/download/6089/7807 https://revistas.uexternado.edu.co/index.php/oasis/article/download/6089/7978 https://revistas.uexternado.edu.co/index.php/oasis/article/download/6089/8549 |
dc.relation.citationedition.spa.fl_str_mv |
Núm. 30 , Año 2019 : Julio-Diciembre |
dc.relation.citationendpage.none.fl_str_mv |
186 |
dc.relation.citationissue.spa.fl_str_mv |
30 |
dc.relation.citationstartpage.none.fl_str_mv |
163 |
dc.relation.ispartofjournal.spa.fl_str_mv |
Oasis |
dc.relation.references.spa.fl_str_mv |
Allison, G. T. & Zelikow, P. (1999). Essence of Decision: Explaining the Cuban Missile Crisis, 2a. ed., Nueva York: Longman. Adler, E. (1992). The Emergence of Cooperation: Natio¬nal Epistemic Communities and the International Evolution of the idea of Nuclear Arms Control. International Organization, 46(1), 101-145. Adler, E. (1997). Seizing the Middle Ground: Cons¬tructivism in World Politics. European Journal of International Relations, 3(3), 319-363. Arquilla, J. & Ronfeldt, D. (1993). Cyberwar is Coming! Comparative Strategy, 12(2), 141-165. Beckley, M. (2011). China’s Century? Why America’s Edge Will Endure. International Security, 36(3), 41-78. Benedikt, M. (1994). Cyberspace: first steps. Cambridge, MA: mit Press. Betz, D. (2012). Cyberpower in Strategic Affairs: Neither Unthinkable Nor Blessed. Journal of Strategic Stu¬dies, 35(5), 689-711. Borg, S. (2005). Economically Complex Cyberattacks. IEEE Security and Privacy Magazine, 3(6), 64-67. Brenner, J. (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. Nueva York: Penguin. Brito, J. & Watkins, T. (2011). Loving the cyber bomb? The dangers of threat inflation. Arlington, VA: George Mason University. Buzan, B. & Hansen, L. (2009). The Evolution of Inter¬national Security Studies. Cambridge: Cambridge University Press. Camilleri, J. A. & Falk, J. (1992). The End of Sovereignty? The Politics of a Shrinking and Fragmenting World. Aldershot: Edward Elgar. Castells, M. (2009). Comunicación y poder. Madrid: Alianza Editorial. Choucri, N. (2012). Cyber Politics in International Rela¬tions. Cambridge: mit Press. Clark, D. D. (2010). Characterizing Cyberspace: past, presente and future. Cambridge: mit Press. Clarke, R. A. & Knake, R. K. (2010). Cyber War: The Next Threat . Nueva York: Ecco. Craig, A. J. & Valeriano, B. (2018). Realism and Cyber Conflict: Security in the Digital Age. In D. Orsi, J. R. Avgustin, & M. Nurnus, Realism in Practice: An Appraisal (pp. 85-101). Bristol, Reino Unido: E-International Relations Publishing. Crosset, V. & Dupont, B. (2018). Internet et propagande jihadiste: la régulation polycentrique du cyberes¬pace. Critique Internationale, 78(1), 107-125. Deibert, R. J. (2003). Black code: censorship, surveillan¬ce, and militarization of cyberspace. Millennium, 32(2), 501-530. Deibert, R. J. (2013). Black code: surveillance, privacy, and the dark side of the internet. Toronto: McCle¬lland & Stewart. Deibert, R. J. & Rohozinsky, R. (2010). Liberation vs Control in Cyberspace. Journal of Democracy, 21(4), 43-57. Deibert, R.; Palfrey, J.; Rohozinski, R. & Zittrain, J. (2010). Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace. Cambridge, MA: mit Press. Deibert, R.; Palfrey, J.; Rohozinski, R. & Zittrain, J. (2012). Access Contested: Security, Identity, and Resistance in Asian Cyberspace. Cambridge, MA: mit Press. Deibert, R.; Palfrrey, J.; Rohozinski, R. & Zittrain. (2008). Access Denied: the Practice and Policy of Global Inter¬net Filtering. Cambridge, MA: mit Press. Demchak, C. C. (2011). Wars of Disruption and Resilien¬ce: Cybered Conflict, Power, and National Security. Athens: University of Georgia Press. DeNardis, L. (2009). Protocol Politics: The Globalization of Internet Governance. Cambridge, MA: mit Press. DeNardis, L. (2014). The Global War for Internet Gover¬nance. New Haven: Yale University Press. Deutsch, K. (1963). The Nerves of the Government: Models of Political Communications and Control. Nueva York: Glencoe. Dobbins, J. (2012). War with China. Survival, 54(4), 7-24. Drezner, D. W. (2009). Bad Debts Assesing China’s Influence in Great Power Politics. International Security, 34(2), 7-45. Dunn Cavelty, M. (2008a). Cyber-Security and Threats Politics: U.S. Efforts to Secure the Information Age. Nueva York: Routledge. Dunn Cavelty, M. (2008b). Cyber-terror, looming threat or phantom menace: the framing of the US cyber-threat debate. Journal of Information & Technology Politics, 4(1), 19-36. Ebert, H. & Maurer, T. (2014). Revendications sur le cyberespace et puissances émergentes. Hérodote, 152-153(1), 276-295. Edde, R. (2018). Le droit? Un outil de régulation du cyberespace? Le cas du droit à l’oubil numérique. Homme et la Societe, 206(1), 69-94. Eriksson, J. & Giacomello, G. (. (2007). International Relations and Security in the Digital Age. Londres, Nueva York: Routledge. Eriksson, J. & Giacomello, G. (2006). The information revolution, security and international relations: the (IR) relevant theory? International Political Science Review, 27(3), 221-244. Escobar, A. (06/1994). Welcome to cyberia: notes on the anthology of cyberculture. Current Anthropology, 35(3), 211-231. Fearon, J. D. & Wendt, A. (2002). Realism v. Construc¬tivism: A Skeptical View. In Handbook of Inter¬national Relations. Londres: Sage Publications. Finnemore, M. & Sikkink, K. (1998). International Norm Dynamics and Political Change. Interna¬tional Organization, 52(4), 887-917. Foot, R. & Walter, A. (2010). China, the United States, and the Global Order. Nueva York: Oxford Uni¬versity Press. Franda, M. F. (2001). Governing the Internet: The Emer¬gence of an International Regime. Boulder, CO: Lynne Rienner. Friedberg, A. L. (2011). A Contest for Supremacy: China, America and the Struggle for Mastery in Asia. Nueva York: W.W. Norton. Friis, K. & Ringsmose, J. (n.d.). Conflict in Cyber Space: Theoretical, Strategic, and Legal Perspectives. Lon¬dres: Routledge. Glaser, C. L. (2004). When Are Arms Races Dangerous? Rational versus Suboptimal Arming. International Security, 28(4), 44-84. Gartzke, E. (2013). The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth. Inter¬national Security, 38(2), 41-73. Gilpin, R. (1981). War and Change in World Politics. Cambridge: Cambridge University Press. Gilpin, R. (1986). The Richness of the Tradition of Po¬litical Realism. In R. Keohane, Neorealism and Its Critics. New York: Columbia University Press. Giacomello, G. (2005). National Governments and Con¬trol of the Internet: A Digital Challenge. Londres: Routledge. Gibson, W. (1984). Neuromancer. Nueva York: Ace. Goldsmith, J. L. & Wu, T. (2006). Who Controls the Internet: Illusions of a Borderless World. Oxford: Oxford University Press. Goldstein, L. (2015). Meeting China Halfway. Washing¬ton, DC: Georgetown University Press. Gourevitch, P. (1978). The Second Image Reversed: The International Sources of Domestic Politics. Inter¬national Organization, 32(4), 881-912. Hansen, L. & Nissenbaum, H. (2009). Digital disas¬ter: cyber security, and the Copenhagen School. International Studies Quarterly (4), 1155-1175. Herz, M. (2013). Seguridad. In T. Legler, A. Santa Cruz, L. Zamudio (eds.), Introducción a las relaciones internacionales: América Latina y la política global (pp. 123-133). México: Oxford University Press. Ikenberry, J. (2009). Liberal Internationalism 3.0: Ame¬rica and the Dilemmas of World Order. Perspecti¬ves on Politics, 7(1), 71-87. Jacques, M. (2009). When China Rules the World: The End of the Western World and the Birth of a New Global Order. Nueva York: Penguin. Jervis, R. (1979). Deterrence Theory Revisited. World Politics, 31(2), 289-324. Johnston, A. I. (2013). How New and Assertive is China’s New Assertiveness? International Security, 37(4), 7-48. Junio, T. J. (2013). How Probable is Cyber War? Bringing IR Theory Back in to the Cyber Conflict Debate. Journal of Strategic Studies, 36(1), 125-133. Klimburg, A. (2017). The Darkening Web: The War for Cyberspace. New York: Penguin Press. Kello, L. (2013). The meaning of cyber revolution: perils to theory and statecraft. International Security, 38(2), 7-40. Kennedy, P. (1987). The Rise and Fall of Great Powers. Nueva York: Random House. Keohane, R. (1984). After Hegemony: Cooperation and Discord in the World Political Economy. Princeton: Princeton University Press. Keohane, R. O. & Nye, J. S. (1977). Power and Inter¬dependence: World Politics. Boston: Little Brown. Keohane, R. & Nye, J. S. (1998). Power and Interde¬pendence in the Information Age. Foreign Affairs, 77(5), 81-94. Khanna, P. (2016). Connectography: mapping the future of global civilization. Nueva York: Random House. Kirshner, J. (2010). The Tragedy of Offensive Realism: Classical Realism and the Rise of China. European Journal of International Relations, 18(1), 53-75. Kramer, F. D.; Starr, S. H.; Wentz, L. K. & (eds.). (2009). Cyberpower and National Security. Washington, DC: Potomac. Krauthamer, C. (31/07/1995). Why We Must Contain China. Time. Krishna-Hensel, S. F. (2007). Preface. Cybersecurity: Perspectives on the Challenges of the Information Revolution. In M. Dunn Cavelty, V. Mauer, S. F. Krishna-Hensel (eds.), Power and Security in the Information Age: Investigating the Role of the State in Cyberspace. Londres: mpg Books. Kupchan, C. (2012). No One’s World: the West, the Rising Rest, and the Coming Global Turn. New York: Oxford University Press. Lawson, S. (2013). Beyond Cyber-Doom: Assesing the Limits of Hypothetical Scenarios in the Framing of Cyber Threats. Journal of Information Tehcno¬logy & Politics, 10(1), 86-103. Layne, C. (2006). The Unipolar Illusion Revisited: the Coming End of the United States ‘Unipolar Mo¬ment’. International Security, 31(2), 7-41. Layne, C. (2009). The Unipolar Illusion Revisited: The Coming End of the United States’ Unipolar Moment. International Security, 34(1), 147-172. Layne, C. (2009). The Waning of U.S. Hegemony: Myth or Reality? A Review Essay. International Security, 34(1), 147-172. Li, R. (2009). A Rising China and Security in East Asia: Identity Construction and Security Discourse. Lon¬dres: Routledge. Libicki, M. C. (2007). Conquest in cyberspace: national security and information warfare. Nueva York: Cambridge University Press. Libicki, M. C. (2009). Cyberdeterrence and Cyberwar. Santa Monica, CA: rand. Liff, A. P. (2012). Cyberwar: a new absolute weapon? The proliferation of cyberwarfare capabilities and interstate war. Journal of Strategic Studies, 35(3), 401-428. Lindsay. (2013). Stuxnet and the Limits of Cyber War¬fare. Security Studies, 22(3), 365-404. Lindsay, J. R. (2015a). The impact of China cybersecu¬rity: fiction and friction. International Security, 39(3), 7-47. Lindsay, J. R. (2015b). Introduction. In J. R. Lindsay, T. Cheung, D. Reveron & (eds.), China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Area (pp. 1-26). Nueva York: Oxford University Press. Mattelart, A. (2007). Historia de la sociedad de la infor¬mación. Barcelona: Paidós. McEvoy, M. M. (2010). From global village to virtual battlespace: the colonizing of the internet and the extension of realpolitik. International Studies Quarterly, 54(2), 381-401. Mesa, L. (2009). El debate sobre la seguridad nacional en la República Islámica de Irán. Estudio del primer mandato del presidente hojatoleslam Seyed Moham¬med Khatami (1997-2001). México: El Colegio de México. Mitrany, D. (1948). The Functional Approach to World Organization. International Affairs, 24(3), 350- 363. Moravcsik, A. (1998). Centralization or Fragmentation? Europe Facing Challenges of Deepening, Diversity, and Democracy. New York: Council on Foreign Relations. Moravcsik, A. (1999). The Choice for Europe: Social Pur¬pose and State Power from Messina to Maastricht. Londres: UCL Press. Morgenthau, H. J. (1948). Politics Among Nations: The Stru¬ggle for Power and Peace. New York: McGraw Hill. Morozov, E. (2009). Cyber-scare: the exaggerated fear over digital warfare. Boston Review, 34(4). Morozov, E. (2011). The Net Delusion: The Dark Side of Internet Freedom. Nueva York: Public Affairs. Newitz, A. (16/09/2013). The Bizarre Evolution of the Word ‘Cyber’. Retrieved noviembre 12, 2018 from Gizmodo: https://io9.gizmodo.com/to¬day-cyber-means-war-but-back-in-the-1990s-it-mean-1325671487 Nye, J. (2010). Cyber Power. Belfer Center for Science and International Affairs, Harvard Kennedy School. Cambridge: Harvard University. Nye, J. S. (2004a). Soft Power: The Means to Success in World Politics. New York: Public Affairs. Nye, J. S. (2004b). Power in the Global Information Age: From Realism to Globalization. Londres: Routledge. Nye, J. S. (2011). Nuclear lessons for cyber security? Strategic Studies Quarterly, 5(4), 18-38. Ohm, P. (2008). The Myth of the Superuser: Fear, Risk, and Harm Online. Univeristy of California Davis Law Review, 41(4), 1327-1402. Owens, W. A.; Dam, K. W.; Lin, H. S. (eds.). (2009). Technology, Policy, Law, and Ethics Regarding U.S. Adquisition and Use of Cyberattack Capabilities. Washington, DC: National Academies Press. Palfrey, J. (2010). Four phases of internet regulation. Social Research, 77(3), 981-996. Perrit, H. H. (1998). The Internet as a Threat to So¬vereignty? Thoughts on the Internet’s Role in Strenghtening National and Global Governance. Indiana Journal of Global Studies, 5(2), 423-442. Petterson, D. (2013). Offensive Cyber Weapons: Cons¬truction, Development, Employment. Journal of Strategic Studies, 36(1), 120-124. Pillsbury, M. (2015). The Hundred Year Marathon: China’s Secret Strategy to Replace America’s as the Global Superpower. Nueva York: Henry Holt. Rachman, G. (1996). Containing China. Washington Quarterly, 19(1), 129-140. Rattray, G. J. (2001). Strategic Warfare in Cyberspace. Cambridge: MIT Press. Reardon, R. & Nazli, C. (2012). The Role of Cyberspace in International Relations. San Diego, CA: ISA Annual Convention. Reveron, D. S. (eds.). (2012). Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World. Washington, DC: Georgetown University Press. Rid, T. (2012). Cyber War Will Not Take Place. Journal of Strategic Studies, 523-544. Risse-Kappen, T. (1995). Bringing Transnational Relations Back In: Non-State Actors, Domestic Structures, and International Institutions. Cambridge: Cambridge University Press. Rosenau, J. N. (1990). Turbulence in World Politics: A Theory of Change and Continuity. Princeton, NJ: Princeton University Press. Rosenau, J. N.; Singh, J. P. (2002). Information Tech¬nology and Global Politics: The Changing Scope of Power and Governance. Alabany: State University of New York Press. Ross, R. (1997). Beijing as a Conservative Power. Foreign Affairs, 76(2), 33-44. Ruggie, J. G. (1983). Continuity and Transformation in the World Polity: Toward a Neorealist Theory Synthesis. World Politics, 35(2), 261-285. Ruggie, J. G. (1998). Constructing the World Polity: Es¬says on International Institutionalism. Londres: Routledge. Russett, B. & Antholis, W. (1993). Grasping the World Polity: Essays on International Institutionalism. Londres: Routledge. Schmidt, M. (13/03/2012). New interest in hacking as threat to security. The New York Times. Schneier, B. (2012). Liars and Outliers: Enabling the Trust that Society Needs to Thrive. Indianapolis: Wiley. Schweller, R. & Pu, X. (2011). After Unipolarity: China’s Vision of International Order in an Era of U.S. Decline. 36(1), 47-72. Sanger, D. (2012). Confront and conceal: Obama’s secret wars and surprising use of American power. Nueva York: Crown. Santa Cruz, A. (2000). Un debate teórico empíricamente ilustrado: la construcción de la soberanía japonesa, 1853-1902. Guadalajara: Universidad de Gua¬dalajara. Santa Cruz, A. (2013). Constructivismo. In T. Legler, A. Santa Cruz & L. Zamudio, Introducción a las relaciones internacionales: América Latina y la política global (pp. 36-50). México: Oxford University Press. Sassen, S. (1998). On the Internet and Sovereignty. Indiana Journal of Global Legal Studies, 5(2), 545-559. Shambaugh, D. (1996). Containment or Engagement of China: Calculating Beijing’s Responses. Inter¬national Security, 21(2), 180-209. Shambaugh, D. (2013). China Goes Global: the Partial Power. Nueva York: Oxford University Press. Shapiro, I. & Wendt, A. (1992). The Difference that Realism Makes. Politics & Society (2). Shirky, C. (2011). The Political Power of Social Media: Technology, the Public Sphere, and Political Change. Foreign Affairs, 90(1), 28-41. Singer, P. W. & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Nueva York: Oxford University Press. Snyder, J. (1991). Myths of Empire. Ithaca, NY: Cornell University Press. Starrs, S. (2013). American Economic Power Hasn’t Declined- It Globalized! Summoning the Data and Taking Globalization Seriously. International Studies Quarterly, 57(4), 817-830. Steinfeld, E. S. (2010). Playing our Game: Why China’s Economic Rise Doesn’t Threaten the West. Oxford: Oxford University Press. Sterling-Folker, Jennifer. (2013). Making Sense of Interna¬tionl Relations Theory: Londres: Lyenne Rienner. Stone, J. (2012). Cyber War Will Take Place! Journal of Strategic Studies, 36(1), 101-108. Tammen, R. L. (ed.). (2000). Power Transitions Strategies for the 21st Century. Nueva York: Chatham House. Valeri, L. (2000). Securing Internet Society: Toward an International Regime for Information Assurance. Studies in Conflict and Terrorism, 23(2), 129-146. Valeriano, B. & Maness, R. C. (2015). Cyber war versus cyber realities: cyber conflict in the international system. Nueva York: Oxford University Press. Vaidhyanathan, S. (2018). Antisocial Media. Nueva York: Oxford University Press. Van Evera, S. (1997). Guide to Methods for Students of Political Science. Ithaca, Londres: Cornell Uni¬versity Press. Walker, R. B. (1993). Inside/Outside: International Rela¬tions ads Political Theory. Cambridge: Cambridge University Press. Walt, S. (1994). The Reinaissance of Security Studies. International Studies Quarterly, 35(2), 211-239. Walt, S. M. (2010). Is the Cyber Threat Overblown? Retrieved enero 2, 2018 from Foreign Policy: http://walt.foreignpolicy.com/posts/2010/03/30/is_the_cyber_threat_overblown Waltz, K. N. (1979). Theory of International Politics. Readings: Addison Wesley. Weldes, J. (1996). Constructing National Interest. Eu¬ropean Journal of International Relations, 2(3), 335-370. Wendt, A. (1999). Social Theory of International Politics. Cambridge: Cambridge University Press. Wiener, N. (1948). Cybernetics or Control and Commu¬nication in the Animal and the Machine. París: Hermann. Wu, I. S. (2008). Information, identity and institutions. Institute for the Study of Diplomacy. Washing¬ton, DC: Georgetown University. Zittrain, J. (2008). The future of the internet and how to stop it. New Haven: Yale University Press. |
dc.rights.spa.fl_str_mv |
Germán Alejandro Patiño Orozco - 2019 |
dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.coar.spa.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.uri.spa.fl_str_mv |
https://creativecommons.org/licenses/by-nc-sa/4.0/ |
rights_invalid_str_mv |
Germán Alejandro Patiño Orozco - 2019 http://purl.org/coar/access_right/c_abf2 https://creativecommons.org/licenses/by-nc-sa/4.0/ |
eu_rights_str_mv |
openAccess |
dc.format.mimetype.spa.fl_str_mv |
application/pdf text/html application/xml |
dc.publisher.spa.fl_str_mv |
Facultad de Finanzas, Gobierno y Relaciones Internacionales |
dc.source.spa.fl_str_mv |
https://revistas.uexternado.edu.co/index.php/oasis/article/view/6089 |
institution |
Universidad Externado de Colombia |
bitstream.url.fl_str_mv |
https://bdigital.uexternado.edu.co/bitstreams/778dbd84-0553-485d-8293-4d83c9caa282/download |
bitstream.checksum.fl_str_mv |
fa79e3ebb2e3bb1493a8c9fc0e394f8d |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 |
repository.name.fl_str_mv |
Universidad Externado de Colombia |
repository.mail.fl_str_mv |
metabiblioteca@metabiblioteca.org |
_version_ |
1814100449367687168 |
spelling |
Patiño Orozco, Germán Alejandrode270d97-dce2-4ec0-b4ba-ece2c6d653a42019-06-26 10:32:222022-09-08T13:48:58Z2019-06-26 10:32:222022-09-08T13:48:58Z2019-06-26Este artículo aporta algunas consideraciones sobre el debate de cuestiones cibernéticas y sus efectos sobre el entendimiento de nuevas temáticas de seguridad internacional. Además, propone la adopción de metodologías de la disciplina de relaciones internacionales para estudiar asuntos cibernéticos de carácter global. El artículo concluye con algunos lineamientos para profundizar acerca del análisis de temas cibernéticos con una perspectiva internacional.This article provides insights into the debate about cyber issues and its effects on our understanding of new international security topics. Moreover, this article proposes the adoption of principles from the discipline of International Relations to study cyber issues in the global realm. The article concludes by offering certain guidelines to delve further in the analysis of cyber topics from an international perspective.application/pdftext/htmlapplication/xml10.18601/16577558.n30.102346-21321657-7558https://bdigital.uexternado.edu.co/handle/001/8511https://doi.org/10.18601/16577558.n30.10spaFacultad de Finanzas, Gobierno y Relaciones Internacionaleshttps://revistas.uexternado.edu.co/index.php/oasis/article/download/6089/7807https://revistas.uexternado.edu.co/index.php/oasis/article/download/6089/7978https://revistas.uexternado.edu.co/index.php/oasis/article/download/6089/8549Núm. 30 , Año 2019 : Julio-Diciembre18630163OasisAllison, G. T. & Zelikow, P. (1999). Essence of Decision: Explaining the Cuban Missile Crisis, 2a. ed., Nueva York: Longman.Adler, E. (1992). The Emergence of Cooperation: Natio¬nal Epistemic Communities and the International Evolution of the idea of Nuclear Arms Control. International Organization, 46(1), 101-145.Adler, E. (1997). Seizing the Middle Ground: Cons¬tructivism in World Politics. European Journal of International Relations, 3(3), 319-363.Arquilla, J. & Ronfeldt, D. (1993). Cyberwar is Coming! Comparative Strategy, 12(2), 141-165.Beckley, M. (2011). China’s Century? Why America’s Edge Will Endure. International Security, 36(3), 41-78.Benedikt, M. (1994). Cyberspace: first steps. Cambridge, MA: mit Press.Betz, D. (2012). Cyberpower in Strategic Affairs: Neither Unthinkable Nor Blessed. Journal of Strategic Stu¬dies, 35(5), 689-711.Borg, S. (2005). Economically Complex Cyberattacks. IEEE Security and Privacy Magazine, 3(6), 64-67.Brenner, J. (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. Nueva York: Penguin.Brito, J. & Watkins, T. (2011). Loving the cyber bomb? The dangers of threat inflation. Arlington, VA: George Mason University.Buzan, B. & Hansen, L. (2009). The Evolution of Inter¬national Security Studies. Cambridge: Cambridge University Press.Camilleri, J. A. & Falk, J. (1992). The End of Sovereignty? The Politics of a Shrinking and Fragmenting World. Aldershot: Edward Elgar.Castells, M. (2009). Comunicación y poder. Madrid: Alianza Editorial.Choucri, N. (2012). Cyber Politics in International Rela¬tions. Cambridge: mit Press.Clark, D. D. (2010). Characterizing Cyberspace: past, presente and future. Cambridge: mit Press.Clarke, R. A. & Knake, R. K. (2010). Cyber War: The Next Threat . Nueva York: Ecco.Craig, A. J. & Valeriano, B. (2018). Realism and Cyber Conflict: Security in the Digital Age. In D. Orsi, J. R. Avgustin, & M. Nurnus, Realism in Practice: An Appraisal (pp. 85-101). Bristol, Reino Unido: E-International Relations Publishing.Crosset, V. & Dupont, B. (2018). Internet et propagande jihadiste: la régulation polycentrique du cyberes¬pace. Critique Internationale, 78(1), 107-125.Deibert, R. J. (2003). Black code: censorship, surveillan¬ce, and militarization of cyberspace. Millennium, 32(2), 501-530.Deibert, R. J. (2013). Black code: surveillance, privacy, and the dark side of the internet. Toronto: McCle¬lland & Stewart.Deibert, R. J. & Rohozinsky, R. (2010). Liberation vs Control in Cyberspace. Journal of Democracy, 21(4), 43-57.Deibert, R.; Palfrey, J.; Rohozinski, R. & Zittrain, J. (2010). Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace. Cambridge, MA: mit Press.Deibert, R.; Palfrey, J.; Rohozinski, R. & Zittrain, J. (2012). Access Contested: Security, Identity, and Resistance in Asian Cyberspace. Cambridge, MA: mit Press.Deibert, R.; Palfrrey, J.; Rohozinski, R. & Zittrain. (2008). Access Denied: the Practice and Policy of Global Inter¬net Filtering. Cambridge, MA: mit Press.Demchak, C. C. (2011). Wars of Disruption and Resilien¬ce: Cybered Conflict, Power, and National Security. Athens: University of Georgia Press.DeNardis, L. (2009). Protocol Politics: The Globalization of Internet Governance. Cambridge, MA: mit Press.DeNardis, L. (2014). The Global War for Internet Gover¬nance. New Haven: Yale University Press.Deutsch, K. (1963). The Nerves of the Government: Models of Political Communications and Control. Nueva York: Glencoe.Dobbins, J. (2012). War with China. Survival, 54(4), 7-24.Drezner, D. W. (2009). Bad Debts Assesing China’s Influence in Great Power Politics. International Security, 34(2), 7-45.Dunn Cavelty, M. (2008a). Cyber-Security and Threats Politics: U.S. Efforts to Secure the Information Age. Nueva York: Routledge.Dunn Cavelty, M. (2008b). Cyber-terror, looming threat or phantom menace: the framing of the US cyber-threat debate. Journal of Information & Technology Politics, 4(1), 19-36.Ebert, H. & Maurer, T. (2014). Revendications sur le cyberespace et puissances émergentes. Hérodote, 152-153(1), 276-295.Edde, R. (2018). Le droit? Un outil de régulation du cyberespace? Le cas du droit à l’oubil numérique. Homme et la Societe, 206(1), 69-94.Eriksson, J. & Giacomello, G. (. (2007). International Relations and Security in the Digital Age. Londres, Nueva York: Routledge.Eriksson, J. & Giacomello, G. (2006). The information revolution, security and international relations: the (IR) relevant theory? International Political Science Review, 27(3), 221-244.Escobar, A. (06/1994). Welcome to cyberia: notes on the anthology of cyberculture. Current Anthropology, 35(3), 211-231.Fearon, J. D. & Wendt, A. (2002). Realism v. Construc¬tivism: A Skeptical View. In Handbook of Inter¬national Relations. Londres: Sage Publications.Finnemore, M. & Sikkink, K. (1998). International Norm Dynamics and Political Change. Interna¬tional Organization, 52(4), 887-917.Foot, R. & Walter, A. (2010). China, the United States, and the Global Order. Nueva York: Oxford Uni¬versity Press.Franda, M. F. (2001). Governing the Internet: The Emer¬gence of an International Regime. Boulder, CO: Lynne Rienner.Friedberg, A. L. (2011). A Contest for Supremacy: China, America and the Struggle for Mastery in Asia. Nueva York: W.W. Norton.Friis, K. & Ringsmose, J. (n.d.). Conflict in Cyber Space: Theoretical, Strategic, and Legal Perspectives. Lon¬dres: Routledge.Glaser, C. L. (2004). When Are Arms Races Dangerous? Rational versus Suboptimal Arming. International Security, 28(4), 44-84.Gartzke, E. (2013). The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth. Inter¬national Security, 38(2), 41-73.Gilpin, R. (1981). War and Change in World Politics. Cambridge: Cambridge University Press.Gilpin, R. (1986). The Richness of the Tradition of Po¬litical Realism. In R. Keohane, Neorealism and Its Critics. New York: Columbia University Press.Giacomello, G. (2005). National Governments and Con¬trol of the Internet: A Digital Challenge. Londres: Routledge.Gibson, W. (1984). Neuromancer. Nueva York: Ace.Goldsmith, J. L. & Wu, T. (2006). Who Controls the Internet: Illusions of a Borderless World. Oxford: Oxford University Press.Goldstein, L. (2015). Meeting China Halfway. Washing¬ton, DC: Georgetown University Press.Gourevitch, P. (1978). The Second Image Reversed: The International Sources of Domestic Politics. Inter¬national Organization, 32(4), 881-912.Hansen, L. & Nissenbaum, H. (2009). Digital disas¬ter: cyber security, and the Copenhagen School. International Studies Quarterly (4), 1155-1175.Herz, M. (2013). Seguridad. In T. Legler, A. Santa Cruz, L. Zamudio (eds.), Introducción a las relaciones internacionales: América Latina y la política global (pp. 123-133). México: Oxford University Press.Ikenberry, J. (2009). Liberal Internationalism 3.0: Ame¬rica and the Dilemmas of World Order. Perspecti¬ves on Politics, 7(1), 71-87.Jacques, M. (2009). When China Rules the World: The End of the Western World and the Birth of a New Global Order. Nueva York: Penguin.Jervis, R. (1979). Deterrence Theory Revisited. World Politics, 31(2), 289-324.Johnston, A. I. (2013). How New and Assertive is China’s New Assertiveness? International Security, 37(4), 7-48.Junio, T. J. (2013). How Probable is Cyber War? Bringing IR Theory Back in to the Cyber Conflict Debate. Journal of Strategic Studies, 36(1), 125-133.Klimburg, A. (2017). The Darkening Web: The War for Cyberspace. New York: Penguin Press.Kello, L. (2013). The meaning of cyber revolution: perils to theory and statecraft. International Security, 38(2), 7-40.Kennedy, P. (1987). The Rise and Fall of Great Powers. Nueva York: Random House.Keohane, R. (1984). After Hegemony: Cooperation and Discord in the World Political Economy. Princeton: Princeton University Press.Keohane, R. O. & Nye, J. S. (1977). Power and Inter¬dependence: World Politics. Boston: Little Brown.Keohane, R. & Nye, J. S. (1998). Power and Interde¬pendence in the Information Age. Foreign Affairs, 77(5), 81-94.Khanna, P. (2016). Connectography: mapping the future of global civilization. Nueva York: Random House.Kirshner, J. (2010). The Tragedy of Offensive Realism: Classical Realism and the Rise of China. European Journal of International Relations, 18(1), 53-75.Kramer, F. D.; Starr, S. H.; Wentz, L. K. & (eds.). (2009). Cyberpower and National Security. Washington, DC: Potomac.Krauthamer, C. (31/07/1995). Why We Must Contain China. Time.Krishna-Hensel, S. F. (2007). Preface. Cybersecurity: Perspectives on the Challenges of the Information Revolution. In M. Dunn Cavelty, V. Mauer, S. F.Krishna-Hensel (eds.), Power and Security in the Information Age: Investigating the Role of the State in Cyberspace. Londres: mpg Books.Kupchan, C. (2012). No One’s World: the West, the Rising Rest, and the Coming Global Turn. New York: Oxford University Press.Lawson, S. (2013). Beyond Cyber-Doom: Assesing the Limits of Hypothetical Scenarios in the Framing of Cyber Threats. Journal of Information Tehcno¬logy & Politics, 10(1), 86-103.Layne, C. (2006). The Unipolar Illusion Revisited: the Coming End of the United States ‘Unipolar Mo¬ment’. International Security, 31(2), 7-41.Layne, C. (2009). The Unipolar Illusion Revisited: The Coming End of the United States’ Unipolar Moment. International Security, 34(1), 147-172.Layne, C. (2009). The Waning of U.S. Hegemony: Myth or Reality? A Review Essay. International Security, 34(1), 147-172.Li, R. (2009). A Rising China and Security in East Asia: Identity Construction and Security Discourse. Lon¬dres: Routledge.Libicki, M. C. (2007). Conquest in cyberspace: national security and information warfare. Nueva York: Cambridge University Press.Libicki, M. C. (2009). Cyberdeterrence and Cyberwar. Santa Monica, CA: rand.Liff, A. P. (2012). Cyberwar: a new absolute weapon? The proliferation of cyberwarfare capabilities and interstate war. Journal of Strategic Studies, 35(3), 401-428.Lindsay. (2013). Stuxnet and the Limits of Cyber War¬fare. Security Studies, 22(3), 365-404.Lindsay, J. R. (2015a). The impact of China cybersecu¬rity: fiction and friction. International Security, 39(3), 7-47.Lindsay, J. R. (2015b). Introduction. In J. R. Lindsay, T. Cheung, D. Reveron & (eds.), China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Area (pp. 1-26). Nueva York: Oxford University Press.Mattelart, A. (2007). Historia de la sociedad de la infor¬mación. Barcelona: Paidós.McEvoy, M. M. (2010). From global village to virtual battlespace: the colonizing of the internet and the extension of realpolitik. International Studies Quarterly, 54(2), 381-401.Mesa, L. (2009). El debate sobre la seguridad nacional en la República Islámica de Irán. Estudio del primer mandato del presidente hojatoleslam Seyed Moham¬med Khatami (1997-2001). México: El Colegio de México.Mitrany, D. (1948). The Functional Approach to World Organization. International Affairs, 24(3), 350- 363.Moravcsik, A. (1998). Centralization or Fragmentation? Europe Facing Challenges of Deepening, Diversity, and Democracy. New York: Council on Foreign Relations.Moravcsik, A. (1999). The Choice for Europe: Social Pur¬pose and State Power from Messina to Maastricht. Londres: UCL Press.Morgenthau, H. J. (1948). Politics Among Nations: The Stru¬ggle for Power and Peace. New York: McGraw Hill.Morozov, E. (2009). Cyber-scare: the exaggerated fear over digital warfare. Boston Review, 34(4).Morozov, E. (2011). The Net Delusion: The Dark Side of Internet Freedom. Nueva York: Public Affairs.Newitz, A. (16/09/2013). The Bizarre Evolution of the Word ‘Cyber’. Retrieved noviembre 12, 2018 from Gizmodo: https://io9.gizmodo.com/to¬day-cyber-means-war-but-back-in-the-1990s-it-mean-1325671487Nye, J. (2010). Cyber Power. Belfer Center for Science and International Affairs, Harvard Kennedy School. Cambridge: Harvard University.Nye, J. S. (2004a). Soft Power: The Means to Success in World Politics. New York: Public Affairs.Nye, J. S. (2004b). Power in the Global Information Age: From Realism to Globalization. Londres: Routledge.Nye, J. S. (2011). Nuclear lessons for cyber security? Strategic Studies Quarterly, 5(4), 18-38.Ohm, P. (2008). The Myth of the Superuser: Fear, Risk, and Harm Online. Univeristy of California Davis Law Review, 41(4), 1327-1402.Owens, W. A.; Dam, K. W.; Lin, H. S. (eds.). (2009). Technology, Policy, Law, and Ethics Regarding U.S. Adquisition and Use of Cyberattack Capabilities. Washington, DC: National Academies Press.Palfrey, J. (2010). Four phases of internet regulation. Social Research, 77(3), 981-996.Perrit, H. H. (1998). The Internet as a Threat to So¬vereignty? Thoughts on the Internet’s Role in Strenghtening National and Global Governance. Indiana Journal of Global Studies, 5(2), 423-442.Petterson, D. (2013). Offensive Cyber Weapons: Cons¬truction, Development, Employment. Journal of Strategic Studies, 36(1), 120-124.Pillsbury, M. (2015). The Hundred Year Marathon: China’s Secret Strategy to Replace America’s as the Global Superpower. Nueva York: Henry Holt.Rachman, G. (1996). Containing China. Washington Quarterly, 19(1), 129-140.Rattray, G. J. (2001). Strategic Warfare in Cyberspace. Cambridge: MIT Press.Reardon, R. & Nazli, C. (2012). The Role of Cyberspace in International Relations. San Diego, CA: ISA Annual Convention.Reveron, D. S. (eds.). (2012). Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World. Washington, DC: Georgetown University Press.Rid, T. (2012). Cyber War Will Not Take Place. Journal of Strategic Studies, 523-544.Risse-Kappen, T. (1995). Bringing Transnational Relations Back In: Non-State Actors, Domestic Structures, and International Institutions. Cambridge: Cambridge University Press.Rosenau, J. N. (1990). Turbulence in World Politics: A Theory of Change and Continuity. Princeton, NJ: Princeton University Press.Rosenau, J. N.; Singh, J. P. (2002). Information Tech¬nology and Global Politics: The Changing Scope of Power and Governance. Alabany: State University of New York Press.Ross, R. (1997). Beijing as a Conservative Power. Foreign Affairs, 76(2), 33-44.Ruggie, J. G. (1983). Continuity and Transformation in the World Polity: Toward a Neorealist Theory Synthesis. World Politics, 35(2), 261-285.Ruggie, J. G. (1998). Constructing the World Polity: Es¬says on International Institutionalism. Londres: Routledge.Russett, B. & Antholis, W. (1993). Grasping the World Polity: Essays on International Institutionalism. Londres: Routledge.Schmidt, M. (13/03/2012). New interest in hacking as threat to security. The New York Times.Schneier, B. (2012). Liars and Outliers: Enabling the Trust that Society Needs to Thrive. Indianapolis: Wiley.Schweller, R. & Pu, X. (2011). After Unipolarity: China’s Vision of International Order in an Era of U.S. Decline. 36(1), 47-72.Sanger, D. (2012). Confront and conceal: Obama’s secret wars and surprising use of American power. Nueva York: Crown.Santa Cruz, A. (2000). Un debate teórico empíricamente ilustrado: la construcción de la soberanía japonesa, 1853-1902. Guadalajara: Universidad de Gua¬dalajara.Santa Cruz, A. (2013). Constructivismo. In T. Legler, A. Santa Cruz & L. Zamudio, Introducción a las relaciones internacionales: América Latina y la política global (pp. 36-50). México: Oxford University Press.Sassen, S. (1998). On the Internet and Sovereignty. Indiana Journal of Global Legal Studies, 5(2), 545-559.Shambaugh, D. (1996). Containment or Engagement of China: Calculating Beijing’s Responses. Inter¬national Security, 21(2), 180-209.Shambaugh, D. (2013). China Goes Global: the Partial Power. Nueva York: Oxford University Press.Shapiro, I. & Wendt, A. (1992). The Difference that Realism Makes. Politics & Society (2).Shirky, C. (2011). The Political Power of Social Media: Technology, the Public Sphere, and Political Change. Foreign Affairs, 90(1), 28-41.Singer, P. W. & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Nueva York: Oxford University Press.Snyder, J. (1991). Myths of Empire. Ithaca, NY: Cornell University Press.Starrs, S. (2013). American Economic Power Hasn’t Declined- It Globalized! Summoning the Data and Taking Globalization Seriously. International Studies Quarterly, 57(4), 817-830.Steinfeld, E. S. (2010). Playing our Game: Why China’s Economic Rise Doesn’t Threaten the West. Oxford: Oxford University Press.Sterling-Folker, Jennifer. (2013). Making Sense of Interna¬tionl Relations Theory: Londres: Lyenne Rienner.Stone, J. (2012). Cyber War Will Take Place! Journal of Strategic Studies, 36(1), 101-108.Tammen, R. L. (ed.). (2000). Power Transitions Strategies for the 21st Century. Nueva York: Chatham House.Valeri, L. (2000). Securing Internet Society: Toward an International Regime for Information Assurance. Studies in Conflict and Terrorism, 23(2), 129-146.Valeriano, B. & Maness, R. C. (2015). Cyber war versus cyber realities: cyber conflict in the international system. Nueva York: Oxford University Press.Vaidhyanathan, S. (2018). Antisocial Media. Nueva York: Oxford University Press. Van Evera, S. (1997). Guide to Methods for Students of Political Science. Ithaca, Londres: Cornell Uni¬versity Press.Walker, R. B. (1993). Inside/Outside: International Rela¬tions ads Political Theory. Cambridge: Cambridge University Press.Walt, S. (1994). The Reinaissance of Security Studies. International Studies Quarterly, 35(2), 211-239.Walt, S. M. (2010). Is the Cyber Threat Overblown? Retrieved enero 2, 2018 from Foreign Policy: http://walt.foreignpolicy.com/posts/2010/03/30/is_the_cyber_threat_overblownWaltz, K. N. (1979). Theory of International Politics. Readings: Addison Wesley.Weldes, J. (1996). Constructing National Interest. Eu¬ropean Journal of International Relations, 2(3), 335-370.Wendt, A. (1999). Social Theory of International Politics. Cambridge: Cambridge University Press.Wiener, N. (1948). Cybernetics or Control and Commu¬nication in the Animal and the Machine. París: Hermann.Wu, I. S. (2008). Information, identity and institutions. Institute for the Study of Diplomacy. Washing¬ton, DC: Georgetown University.Zittrain, J. (2008). The future of the internet and how to stop it. New Haven: Yale University Press.Germán Alejandro Patiño Orozco - 2019info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2https://creativecommons.org/licenses/by-nc-sa/4.0/https://revistas.uexternado.edu.co/index.php/oasis/article/view/6089cyberspace;cybersecurity;international security;international cybersystemciberseguridad;ciberespacio;seguridad internacional;sistema internacional cibernéticoEl sistema internacional cibernético: elementos de análisisThe international cybersystem: elements of analysisArtículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/version/c_970fb48d4fbd8a85Textinfo:eu-repo/semantics/articleJournal articlehttp://purl.org/redcol/resource_type/ARTREFinfo:eu-repo/semantics/publishedVersionPublicationOREORE.xmltext/xml2543https://bdigital.uexternado.edu.co/bitstreams/778dbd84-0553-485d-8293-4d83c9caa282/downloadfa79e3ebb2e3bb1493a8c9fc0e394f8dMD51001/8511oai:bdigital.uexternado.edu.co:001/85112023-08-14 15:19:17.496https://creativecommons.org/licenses/by-nc-sa/4.0/Germán Alejandro Patiño Orozco - 2019https://bdigital.uexternado.edu.coUniversidad Externado de Colombiametabiblioteca@metabiblioteca.org |