El sistema internacional cibernético: elementos de análisis

The international cybersystem: elements of analysis

Contenido principal del artículo

Resumen

Este artículo aporta algunas consideraciones sobre el debate de cuestiones cibernéticas y sus efectos sobre el entendimiento de nuevas temáticas de seguridad internacional. Además, propone la adopción de metodologías de la disciplina de relaciones internacionales para es­tudiar asuntos cibernéticos de carácter global. El artículo concluye con algunos lineamientos para profundizar acerca del análisis de temas cibernéticos con una perspectiva internacional.

Descargas

Los datos de descargas todavía no están disponibles.

Detalles del artículo

Referencias (VER)

Allison, G. T. & Zelikow, P. (1999). Essence of Decision: Explaining the Cuban Missile Crisis, 2a. ed., Nueva York: Longman.

Adler, E. (1992). The Emergence of Cooperation: Natio¬nal Epistemic Communities and the International Evolution of the idea of Nuclear Arms Control. International Organization, 46(1), 101-145. DOI: https://doi.org/10.1017/S0020818300001466

Adler, E. (1997). Seizing the Middle Ground: Cons¬tructivism in World Politics. European Journal of International Relations, 3(3), 319-363. DOI: https://doi.org/10.1177/1354066197003003003

Arquilla, J. & Ronfeldt, D. (1993). Cyberwar is Coming! Comparative Strategy, 12(2), 141-165. DOI: https://doi.org/10.1080/01495939308402915

Beckley, M. (2011). China’s Century? Why America’s Edge Will Endure. International Security, 36(3), 41-78. DOI: https://doi.org/10.1162/ISEC_a_00066

Benedikt, M. (1994). Cyberspace: first steps. Cambridge, MA: mit Press.

Betz, D. (2012). Cyberpower in Strategic Affairs: Neither Unthinkable Nor Blessed. Journal of Strategic Stu¬dies, 35(5), 689-711. DOI: https://doi.org/10.1080/01402390.2012.706970

Borg, S. (2005). Economically Complex Cyberattacks. IEEE Security and Privacy Magazine, 3(6), 64-67. DOI: https://doi.org/10.1109/MSP.2005.146

Brenner, J. (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. Nueva York: Penguin.

Brito, J. & Watkins, T. (2011). Loving the cyber bomb? The dangers of threat inflation. Arlington, VA: George Mason University.

Buzan, B. & Hansen, L. (2009). The Evolution of Inter¬national Security Studies. Cambridge: Cambridge University Press. DOI: https://doi.org/10.1017/CBO9780511817762

Camilleri, J. A. & Falk, J. (1992). The End of Sovereignty? The Politics of a Shrinking and Fragmenting World. Aldershot: Edward Elgar.

Castells, M. (2009). Comunicación y poder. Madrid: Alianza Editorial.

Choucri, N. (2012). Cyber Politics in International Rela¬tions. Cambridge: mit Press. DOI: https://doi.org/10.7551/mitpress/7736.001.0001

Clark, D. D. (2010). Characterizing Cyberspace: past, presente and future. Cambridge: mit Press.

Clarke, R. A. & Knake, R. K. (2010). Cyber War: The Next Threat . Nueva York: Ecco.

Craig, A. J. & Valeriano, B. (2018). Realism and Cyber Conflict: Security in the Digital Age. In D. Orsi, J. R. Avgustin, & M. Nurnus, Realism in Practice: An Appraisal (pp. 85-101). Bristol, Reino Unido: E-International Relations Publishing.

Crosset, V. & Dupont, B. (2018). Internet et propagande jihadiste: la régulation polycentrique du cyberes¬pace. Critique Internationale, 78(1), 107-125. DOI: https://doi.org/10.3917/crii.078.0107

Deibert, R. J. (2003). Black code: censorship, surveillan¬ce, and militarization of cyberspace. Millennium, 32(2), 501-530. DOI: https://doi.org/10.1177/03058298030320030801

Deibert, R. J. (2013). Black code: surveillance, privacy, and the dark side of the internet. Toronto: McCle¬lland & Stewart.

Deibert, R. J. & Rohozinsky, R. (2010). Liberation vs Control in Cyberspace. Journal of Democracy, 21(4), 43-57. DOI: https://doi.org/10.1353/jod.2010.0010

Deibert, R.; Palfrey, J.; Rohozinski, R. & Zittrain, J. (2010). Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace. Cambridge, MA: mit Press. DOI: https://doi.org/10.7551/mitpress/8551.001.0001

Deibert, R.; Palfrey, J.; Rohozinski, R. & Zittrain, J. (2012). Access Contested: Security, Identity, and Resistance in Asian Cyberspace. Cambridge, MA: mit Press. DOI: https://doi.org/10.7551/mitpress/9780262016780.001.0001

Deibert, R.; Palfrrey, J.; Rohozinski, R. & Zittrain. (2008). Access Denied: the Practice and Policy of Global Inter¬net Filtering. Cambridge, MA: mit Press. DOI: https://doi.org/10.7551/mitpress/7617.001.0001

Demchak, C. C. (2011). Wars of Disruption and Resilien¬ce: Cybered Conflict, Power, and National Security. Athens: University of Georgia Press.

DeNardis, L. (2009). Protocol Politics: The Globalization of Internet Governance. Cambridge, MA: mit Press. DOI: https://doi.org/10.7551/mitpress/9780262042574.001.0001

DeNardis, L. (2014). The Global War for Internet Gover¬nance. New Haven: Yale University Press. DOI: https://doi.org/10.12987/yale/9780300181357.001.0001

Deutsch, K. (1963). The Nerves of the Government: Models of Political Communications and Control. Nueva York: Glencoe.

Dobbins, J. (2012). War with China. Survival, 54(4), 7-24. DOI: https://doi.org/10.1080/00396338.2012.709384

Drezner, D. W. (2009). Bad Debts Assesing China’s Influence in Great Power Politics. International Security, 34(2), 7-45. DOI: https://doi.org/10.1162/isec.2009.34.2.7

Dunn Cavelty, M. (2008a). Cyber-Security and Threats Politics: U.S. Efforts to Secure the Information Age. Nueva York: Routledge. DOI: https://doi.org/10.4324/9780203937419

Dunn Cavelty, M. (2008b). Cyber-terror, looming threat or phantom menace: the framing of the US cyber-threat debate. Journal of Information & Technology Politics, 4(1), 19-36. DOI: https://doi.org/10.1300/J516v04n01_03

Ebert, H. & Maurer, T. (2014). Revendications sur le cyberespace et puissances émergentes. Hérodote, 152-153(1), 276-295. DOI: https://doi.org/10.3917/her.152.0276

Edde, R. (2018). Le droit? Un outil de régulation du cyberespace? Le cas du droit à l’oubil numérique. Homme et la Societe, 206(1), 69-94. DOI: https://doi.org/10.3917/lhs.206.0069

Eriksson, J. & Giacomello, G. (. (2007). International Relations and Security in the Digital Age. Londres, Nueva York: Routledge. DOI: https://doi.org/10.4324/9780203964736

Eriksson, J. & Giacomello, G. (2006). The information revolution, security and international relations: the (IR) relevant theory? International Political Science Review, 27(3), 221-244. DOI: https://doi.org/10.1177/0192512106064462

Escobar, A. (06/1994). Welcome to cyberia: notes on the anthology of cyberculture. Current Anthropology, 35(3), 211-231. DOI: https://doi.org/10.1086/204266

Fearon, J. D. & Wendt, A. (2002). Realism v. Construc¬tivism: A Skeptical View. In Handbook of Inter¬national Relations. Londres: Sage Publications.

Finnemore, M. & Sikkink, K. (1998). International Norm Dynamics and Political Change. Interna¬tional Organization, 52(4), 887-917. DOI: https://doi.org/10.1162/002081898550789

Foot, R. & Walter, A. (2010). China, the United States, and the Global Order. Nueva York: Oxford Uni¬versity Press. DOI: https://doi.org/10.1017/CBO9780511782015

Franda, M. F. (2001). Governing the Internet: The Emer¬gence of an International Regime. Boulder, CO: Lynne Rienner.

Friedberg, A. L. (2011). A Contest for Supremacy: China, America and the Struggle for Mastery in Asia. Nueva York: W.W. Norton.

Friis, K. & Ringsmose, J. (n.d.). Conflict in Cyber Space: Theoretical, Strategic, and Legal Perspectives. Lon¬dres: Routledge.

Glaser, C. L. (2004). When Are Arms Races Dangerous? Rational versus Suboptimal Arming. International Security, 28(4), 44-84. DOI: https://doi.org/10.1162/0162288041588313

Gartzke, E. (2013). The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth. Inter¬national Security, 38(2), 41-73. DOI: https://doi.org/10.1162/ISEC_a_00136

Gilpin, R. (1981). War and Change in World Politics. Cambridge: Cambridge University Press. DOI: https://doi.org/10.1017/CBO9780511664267

Gilpin, R. (1986). The Richness of the Tradition of Po¬litical Realism. In R. Keohane, Neorealism and Its Critics. New York: Columbia University Press.

Giacomello, G. (2005). National Governments and Con¬trol of the Internet: A Digital Challenge. Londres: Routledge.

Gibson, W. (1984). Neuromancer. Nueva York: Ace.

Goldsmith, J. L. & Wu, T. (2006). Who Controls the Internet: Illusions of a Borderless World. Oxford: Oxford University Press. DOI: https://doi.org/10.1093/oso/9780195152661.001.0001

Goldstein, L. (2015). Meeting China Halfway. Washing¬ton, DC: Georgetown University Press.

Gourevitch, P. (1978). The Second Image Reversed: The International Sources of Domestic Politics. Inter¬national Organization, 32(4), 881-912. DOI: https://doi.org/10.1017/S002081830003201X

Hansen, L. & Nissenbaum, H. (2009). Digital disas¬ter: cyber security, and the Copenhagen School. International Studies Quarterly (4), 1155-1175. DOI: https://doi.org/10.1111/j.1468-2478.2009.00572.x

Herz, M. (2013). Seguridad. In T. Legler, A. Santa Cruz, L. Zamudio (eds.), Introducción a las relaciones internacionales: América Latina y la política global (pp. 123-133). México: Oxford University Press.

Ikenberry, J. (2009). Liberal Internationalism 3.0: Ame¬rica and the Dilemmas of World Order. Perspecti¬ves on Politics, 7(1), 71-87. DOI: https://doi.org/10.1017/S1537592709090112

Jacques, M. (2009). When China Rules the World: The End of the Western World and the Birth of a New Global Order. Nueva York: Penguin.

Jervis, R. (1979). Deterrence Theory Revisited. World Politics, 31(2), 289-324. DOI: https://doi.org/10.2307/2009945

Johnston, A. I. (2013). How New and Assertive is China’s New Assertiveness? International Security, 37(4), 7-48. DOI: https://doi.org/10.1162/ISEC_a_00115

Junio, T. J. (2013). How Probable is Cyber War? Bringing IR Theory Back in to the Cyber Conflict Debate. Journal of Strategic Studies, 36(1), 125-133. DOI: https://doi.org/10.1080/01402390.2012.739561

Klimburg, A. (2017). The Darkening Web: The War for Cyberspace. New York: Penguin Press.

Kello, L. (2013). The meaning of cyber revolution: perils to theory and statecraft. International Security, 38(2), 7-40. DOI: https://doi.org/10.1162/ISEC_a_00138

Kennedy, P. (1987). The Rise and Fall of Great Powers. Nueva York: Random House.

Keohane, R. (1984). After Hegemony: Cooperation and Discord in the World Political Economy. Princeton: Princeton University Press.

Keohane, R. O. & Nye, J. S. (1977). Power and Inter¬dependence: World Politics. Boston: Little Brown.

Keohane, R. & Nye, J. S. (1998). Power and Interde¬pendence in the Information Age. Foreign Affairs, 77(5), 81-94. DOI: https://doi.org/10.2307/20049052

Khanna, P. (2016). Connectography: mapping the future of global civilization. Nueva York: Random House.

Kirshner, J. (2010). The Tragedy of Offensive Realism: Classical Realism and the Rise of China. European Journal of International Relations, 18(1), 53-75. DOI: https://doi.org/10.1177/1354066110373949

Kramer, F. D.; Starr, S. H.; Wentz, L. K. & (eds.). (2009). Cyberpower and National Security. Washington, DC: Potomac.

Krauthamer, C. (31/07/1995). Why We Must Contain China. Time.

Krishna-Hensel, S. F. (2007). Preface. Cybersecurity: Perspectives on the Challenges of the Information Revolution. In M. Dunn Cavelty, V. Mauer, S. F.

Krishna-Hensel (eds.), Power and Security in the Information Age: Investigating the Role of the State in Cyberspace. Londres: mpg Books.

Kupchan, C. (2012). No One’s World: the West, the Rising Rest, and the Coming Global Turn. New York: Oxford University Press. DOI: https://doi.org/10.1093/acprof:osobl/9780199739394.001.0001

Lawson, S. (2013). Beyond Cyber-Doom: Assesing the Limits of Hypothetical Scenarios in the Framing of Cyber Threats. Journal of Information Tehcno¬logy & Politics, 10(1), 86-103. DOI: https://doi.org/10.1080/19331681.2012.759059

Layne, C. (2006). The Unipolar Illusion Revisited: the Coming End of the United States ‘Unipolar Mo¬ment’. International Security, 31(2), 7-41. DOI: https://doi.org/10.1162/isec.2006.31.2.7

Layne, C. (2009). The Unipolar Illusion Revisited: The Coming End of the United States’ Unipolar Moment. International Security, 34(1), 147-172.

Layne, C. (2009). The Waning of U.S. Hegemony: Myth or Reality? A Review Essay. International Security, 34(1), 147-172. DOI: https://doi.org/10.1162/isec.2009.34.1.147

Li, R. (2009). A Rising China and Security in East Asia: Identity Construction and Security Discourse. Lon¬dres: Routledge. DOI: https://doi.org/10.4324/9780203886946

Libicki, M. C. (2007). Conquest in cyberspace: national security and information warfare. Nueva York: Cambridge University Press. DOI: https://doi.org/10.1017/CBO9780511804250

Libicki, M. C. (2009). Cyberdeterrence and Cyberwar. Santa Monica, CA: rand.

Liff, A. P. (2012). Cyberwar: a new absolute weapon? The proliferation of cyberwarfare capabilities and interstate war. Journal of Strategic Studies, 35(3), 401-428. DOI: https://doi.org/10.1080/01402390.2012.663252

Lindsay. (2013). Stuxnet and the Limits of Cyber War¬fare. Security Studies, 22(3), 365-404. DOI: https://doi.org/10.1080/09636412.2013.816122

Lindsay, J. R. (2015a). The impact of China cybersecu¬rity: fiction and friction. International Security, 39(3), 7-47. DOI: https://doi.org/10.1162/ISEC_a_00189

Lindsay, J. R. (2015b). Introduction. In J. R. Lindsay, T. Cheung, D. Reveron & (eds.), China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Area (pp. 1-26). Nueva York: Oxford University Press. DOI: https://doi.org/10.1093/acprof:oso/9780190201265.001.0001

Mattelart, A. (2007). Historia de la sociedad de la infor¬mación. Barcelona: Paidós.

McEvoy, M. M. (2010). From global village to virtual battlespace: the colonizing of the internet and the extension of realpolitik. International Studies Quarterly, 54(2), 381-401. DOI: https://doi.org/10.1111/j.1468-2478.2010.00592.x

Mesa, L. (2009). El debate sobre la seguridad nacional en la República Islámica de Irán. Estudio del primer mandato del presidente hojatoleslam Seyed Moham¬med Khatami (1997-2001). México: El Colegio de México.

Mitrany, D. (1948). The Functional Approach to World Organization. International Affairs, 24(3), 350- 363. DOI: https://doi.org/10.2307/3018652

Moravcsik, A. (1998). Centralization or Fragmentation? Europe Facing Challenges of Deepening, Diversity, and Democracy. New York: Council on Foreign Relations.

Moravcsik, A. (1999). The Choice for Europe: Social Pur¬pose and State Power from Messina to Maastricht. Londres: UCL Press.

Morgenthau, H. J. (1948). Politics Among Nations: The Stru¬ggle for Power and Peace. New York: McGraw Hill.

Morozov, E. (2009). Cyber-scare: the exaggerated fear over digital warfare. Boston Review, 34(4).

Morozov, E. (2011). The Net Delusion: The Dark Side of Internet Freedom. Nueva York: Public Affairs.

Newitz, A. (16/09/2013). The Bizarre Evolution of the Word ‘Cyber’. Retrieved noviembre 12, 2018 from Gizmodo: https://io9.gizmodo.com/to¬day-cyber-means-war-but-back-in-the-1990s-it-mean-1325671487

Nye, J. (2010). Cyber Power. Belfer Center for Science and International Affairs, Harvard Kennedy School. Cambridge: Harvard University.

Nye, J. S. (2004a). Soft Power: The Means to Success in World Politics. New York: Public Affairs.

Nye, J. S. (2004b). Power in the Global Information Age: From Realism to Globalization. Londres: Routledge.

Nye, J. S. (2011). Nuclear lessons for cyber security? Strategic Studies Quarterly, 5(4), 18-38. DOI: https://doi.org/10.21236/ADA553620

Ohm, P. (2008). The Myth of the Superuser: Fear, Risk, and Harm Online. Univeristy of California Davis Law Review, 41(4), 1327-1402.

Owens, W. A.; Dam, K. W.; Lin, H. S. (eds.). (2009). Technology, Policy, Law, and Ethics Regarding U.S. Adquisition and Use of Cyberattack Capabilities. Washington, DC: National Academies Press.

Palfrey, J. (2010). Four phases of internet regulation. Social Research, 77(3), 981-996.

Perrit, H. H. (1998). The Internet as a Threat to So¬vereignty? Thoughts on the Internet’s Role in Strenghtening National and Global Governance. Indiana Journal of Global Studies, 5(2), 423-442.

Petterson, D. (2013). Offensive Cyber Weapons: Cons¬truction, Development, Employment. Journal of Strategic Studies, 36(1), 120-124. DOI: https://doi.org/10.1080/01402390.2012.742014

Pillsbury, M. (2015). The Hundred Year Marathon: China’s Secret Strategy to Replace America’s as the Global Superpower. Nueva York: Henry Holt.

Rachman, G. (1996). Containing China. Washington Quarterly, 19(1), 129-140. DOI: https://doi.org/10.1080/01636609609550186

Rattray, G. J. (2001). Strategic Warfare in Cyberspace. Cambridge: MIT Press. DOI: https://doi.org/10.7551/mitpress/6483.001.0001

Reardon, R. & Nazli, C. (2012). The Role of Cyberspace in International Relations. San Diego, CA: ISA Annual Convention.

Reveron, D. S. (eds.). (2012). Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World. Washington, DC: Georgetown University Press.

Rid, T. (2012). Cyber War Will Not Take Place. Journal of Strategic Studies, 523-544. DOI: https://doi.org/10.1080/01402390.2011.608939

Risse-Kappen, T. (1995). Bringing Transnational Relations Back In: Non-State Actors, Domestic Structures, and International Institutions. Cambridge: Cambridge University Press. DOI: https://doi.org/10.1017/CBO9780511598760

Rosenau, J. N. (1990). Turbulence in World Politics: A Theory of Change and Continuity. Princeton, NJ: Princeton University Press. DOI: https://doi.org/10.1515/9780691188522

Rosenau, J. N.; Singh, J. P. (2002). Information Tech¬nology and Global Politics: The Changing Scope of Power and Governance. Alabany: State University of New York Press.

Ross, R. (1997). Beijing as a Conservative Power. Foreign Affairs, 76(2), 33-44. DOI: https://doi.org/10.2307/20047935

Ruggie, J. G. (1983). Continuity and Transformation in the World Polity: Toward a Neorealist Theory Synthesis. World Politics, 35(2), 261-285. DOI: https://doi.org/10.2307/2010273

Ruggie, J. G. (1998). Constructing the World Polity: Es¬says on International Institutionalism. Londres: Routledge.

Russett, B. & Antholis, W. (1993). Grasping the World Polity: Essays on International Institutionalism. Londres: Routledge.

Schmidt, M. (13/03/2012). New interest in hacking as threat to security. The New York Times.

Schneier, B. (2012). Liars and Outliers: Enabling the Trust that Society Needs to Thrive. Indianapolis: Wiley.

Schweller, R. & Pu, X. (2011). After Unipolarity: China’s Vision of International Order in an Era of U.S. Decline. 36(1), 47-72. DOI: https://doi.org/10.1162/ISEC_a_00044

Sanger, D. (2012). Confront and conceal: Obama’s secret wars and surprising use of American power. Nueva York: Crown.

Santa Cruz, A. (2000). Un debate teórico empíricamente ilustrado: la construcción de la soberanía japonesa, 1853-1902. Guadalajara: Universidad de Gua¬dalajara.

Santa Cruz, A. (2013). Constructivismo. In T. Legler, A. Santa Cruz & L. Zamudio, Introducción a las relaciones internacionales: América Latina y la política global (pp. 36-50). México: Oxford University Press.

Sassen, S. (1998). On the Internet and Sovereignty. Indiana Journal of Global Legal Studies, 5(2), 545-559.

Shambaugh, D. (1996). Containment or Engagement of China: Calculating Beijing’s Responses. Inter¬national Security, 21(2), 180-209. DOI: https://doi.org/10.1162/isec.21.2.180

Shambaugh, D. (2013). China Goes Global: the Partial Power. Nueva York: Oxford University Press.

Shapiro, I. & Wendt, A. (1992). The Difference that Realism Makes. Politics & Society (2). DOI: https://doi.org/10.1177/0032329292020002004

Shirky, C. (2011). The Political Power of Social Media: Technology, the Public Sphere, and Political Change. Foreign Affairs, 90(1), 28-41.

Singer, P. W. & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Nueva York: Oxford University Press. DOI: https://doi.org/10.1093/wentk/9780199918096.001.0001

Snyder, J. (1991). Myths of Empire. Ithaca, NY: Cornell University Press.

Starrs, S. (2013). American Economic Power Hasn’t Declined- It Globalized! Summoning the Data and Taking Globalization Seriously. International Studies Quarterly, 57(4), 817-830. DOI: https://doi.org/10.1111/isqu.12053

Steinfeld, E. S. (2010). Playing our Game: Why China’s Economic Rise Doesn’t Threaten the West. Oxford: Oxford University Press.

Sterling-Folker, Jennifer. (2013). Making Sense of Interna¬tionl Relations Theory: Londres: Lyenne Rienner.

Stone, J. (2012). Cyber War Will Take Place! Journal of Strategic Studies, 36(1), 101-108. DOI: https://doi.org/10.1080/01402390.2012.730485

Tammen, R. L. (ed.). (2000). Power Transitions Strategies for the 21st Century. Nueva York: Chatham House.

Valeri, L. (2000). Securing Internet Society: Toward an International Regime for Information Assurance. Studies in Conflict and Terrorism, 23(2), 129-146. DOI: https://doi.org/10.1080/105761000265566

Valeriano, B. & Maness, R. C. (2015). Cyber war versus cyber realities: cyber conflict in the international system. Nueva York: Oxford University Press. DOI: https://doi.org/10.1093/acprof:oso/9780190204792.001.0001

Vaidhyanathan, S. (2018). Antisocial Media. Nueva York: Oxford University Press.

Van Evera, S. (1997). Guide to Methods for Students of Political Science. Ithaca, Londres: Cornell Uni¬versity Press.

Walker, R. B. (1993). Inside/Outside: International Rela¬tions ads Political Theory. Cambridge: Cambridge University Press.

Walt, S. (1994). The Reinaissance of Security Studies. International Studies Quarterly, 35(2), 211-239. DOI: https://doi.org/10.2307/2600471

Walt, S. M. (2010). Is the Cyber Threat Overblown? Retrieved enero 2, 2018 from Foreign Policy: http://walt.foreignpolicy.com/posts/2010/03/30/is_the_cyber_threat_overblown

Waltz, K. N. (1979). Theory of International Politics. Readings: Addison Wesley.

Weldes, J. (1996). Constructing National Interest. Eu¬ropean Journal of International Relations, 2(3), 335-370. DOI: https://doi.org/10.1177/1354066196002003001

Wendt, A. (1999). Social Theory of International Politics. Cambridge: Cambridge University Press. DOI: https://doi.org/10.1017/CBO9780511612183

Wiener, N. (1948). Cybernetics or Control and Commu¬nication in the Animal and the Machine. París: Hermann.

Wu, I. S. (2008). Information, identity and institutions. Institute for the Study of Diplomacy. Washing¬ton, DC: Georgetown University.

Zittrain, J. (2008). The future of the internet and how to stop it. New Haven: Yale University Press.

Citado por