El sistema internacional cibernético: elementos de análisis

Main Article Content

Autores

Germán Alejandro Patiño Orozco
https://orcid.org/0000-0003-0275-0238

Resumen

Este artículo aporta algunas consideraciones sobre el debate de cuestiones cibernéticas y sus efectos sobre el entendimiento de nuevas temáticas de seguridad internacional. Además, propone la adopción de metodologías de la disciplina de relaciones internacionales para es­tudiar asuntos cibernéticos de carácter global. El artículo concluye con algunos lineamientos para profundizar acerca del análisis de temas cibernéticos con una perspectiva internacional.

Palabras clave:

Article Details

Referencias

Allison, G. T. & Zelikow, P. (1999). Essence of Decision: Explaining the Cuban Missile Crisis, 2a. ed., Nueva York: Longman.

Adler, E. (1992). The Emergence of Cooperation: Natio¬nal Epistemic Communities and the International Evolution of the idea of Nuclear Arms Control. International Organization, 46(1), 101-145.

Adler, E. (1997). Seizing the Middle Ground: Cons¬tructivism in World Politics. European Journal of International Relations, 3(3), 319-363.

Arquilla, J. & Ronfeldt, D. (1993). Cyberwar is Coming! Comparative Strategy, 12(2), 141-165.

Beckley, M. (2011). China’s Century? Why America’s Edge Will Endure. International Security, 36(3), 41-78.

Benedikt, M. (1994). Cyberspace: first steps. Cambridge, MA: mit Press.

Betz, D. (2012). Cyberpower in Strategic Affairs: Neither Unthinkable Nor Blessed. Journal of Strategic Stu¬dies, 35(5), 689-711.

Borg, S. (2005). Economically Complex Cyberattacks. IEEE Security and Privacy Magazine, 3(6), 64-67.

Brenner, J. (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. Nueva York: Penguin.

Brito, J. & Watkins, T. (2011). Loving the cyber bomb? The dangers of threat inflation. Arlington, VA: George Mason University.

Buzan, B. & Hansen, L. (2009). The Evolution of Inter¬national Security Studies. Cambridge: Cambridge University Press.

Camilleri, J. A. & Falk, J. (1992). The End of Sovereignty? The Politics of a Shrinking and Fragmenting World. Aldershot: Edward Elgar.

Castells, M. (2009). Comunicación y poder. Madrid: Alianza Editorial.

Choucri, N. (2012). Cyber Politics in International Rela¬tions. Cambridge: mit Press.

Clark, D. D. (2010). Characterizing Cyberspace: past, presente and future. Cambridge: mit Press.

Clarke, R. A. & Knake, R. K. (2010). Cyber War: The Next Threat . Nueva York: Ecco.

Craig, A. J. & Valeriano, B. (2018). Realism and Cyber Conflict: Security in the Digital Age. In D. Orsi, J. R. Avgustin, & M. Nurnus, Realism in Practice: An Appraisal (pp. 85-101). Bristol, Reino Unido: E-International Relations Publishing.

Crosset, V. & Dupont, B. (2018). Internet et propagande jihadiste: la régulation polycentrique du cyberes¬pace. Critique Internationale, 78(1), 107-125.

Deibert, R. J. (2003). Black code: censorship, surveillan¬ce, and militarization of cyberspace. Millennium, 32(2), 501-530.

Deibert, R. J. (2013). Black code: surveillance, privacy, and the dark side of the internet. Toronto: McCle¬lland & Stewart.

Deibert, R. J. & Rohozinsky, R. (2010). Liberation vs Control in Cyberspace. Journal of Democracy, 21(4), 43-57.

Deibert, R.; Palfrey, J.; Rohozinski, R. & Zittrain, J. (2010). Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace. Cambridge, MA: mit Press.

Deibert, R.; Palfrey, J.; Rohozinski, R. & Zittrain, J. (2012). Access Contested: Security, Identity, and Resistance in Asian Cyberspace. Cambridge, MA: mit Press.

Deibert, R.; Palfrrey, J.; Rohozinski, R. & Zittrain. (2008). Access Denied: the Practice and Policy of Global Inter¬net Filtering. Cambridge, MA: mit Press.

Demchak, C. C. (2011). Wars of Disruption and Resilien¬ce: Cybered Conflict, Power, and National Security. Athens: University of Georgia Press.

DeNardis, L. (2009). Protocol Politics: The Globalization of Internet Governance. Cambridge, MA: mit Press.

DeNardis, L. (2014). The Global War for Internet Gover¬nance. New Haven: Yale University Press.

Deutsch, K. (1963). The Nerves of the Government: Models of Political Communications and Control. Nueva York: Glencoe.

Dobbins, J. (2012). War with China. Survival, 54(4), 7-24.

Drezner, D. W. (2009). Bad Debts Assesing China’s Influence in Great Power Politics. International Security, 34(2), 7-45.

Dunn Cavelty, M. (2008a). Cyber-Security and Threats Politics: U.S. Efforts to Secure the Information Age. Nueva York: Routledge.

Dunn Cavelty, M. (2008b). Cyber-terror, looming threat or phantom menace: the framing of the US cyber-threat debate. Journal of Information & Technology Politics, 4(1), 19-36.

Ebert, H. & Maurer, T. (2014). Revendications sur le cyberespace et puissances émergentes. Hérodote, 152-153(1), 276-295.

Edde, R. (2018). Le droit? Un outil de régulation du cyberespace? Le cas du droit à l’oubil numérique. Homme et la Societe, 206(1), 69-94.

Eriksson, J. & Giacomello, G. (. (2007). International Relations and Security in the Digital Age. Londres, Nueva York: Routledge.

Eriksson, J. & Giacomello, G. (2006). The information revolution, security and international relations: the (IR) relevant theory? International Political Science Review, 27(3), 221-244.

Escobar, A. (06/1994). Welcome to cyberia: notes on the anthology of cyberculture. Current Anthropology, 35(3), 211-231.

Fearon, J. D. & Wendt, A. (2002). Realism v. Construc¬tivism: A Skeptical View. In Handbook of Inter¬national Relations. Londres: Sage Publications.

Finnemore, M. & Sikkink, K. (1998). International Norm Dynamics and Political Change. Interna¬tional Organization, 52(4), 887-917.

Foot, R. & Walter, A. (2010). China, the United States, and the Global Order. Nueva York: Oxford Uni¬versity Press.

Franda, M. F. (2001). Governing the Internet: The Emer¬gence of an International Regime. Boulder, CO: Lynne Rienner.

Friedberg, A. L. (2011). A Contest for Supremacy: China, America and the Struggle for Mastery in Asia. Nueva York: W.W. Norton.

Friis, K. & Ringsmose, J. (n.d.). Conflict in Cyber Space: Theoretical, Strategic, and Legal Perspectives. Lon¬dres: Routledge.

Glaser, C. L. (2004). When Are Arms Races Dangerous? Rational versus Suboptimal Arming. International Security, 28(4), 44-84.

Gartzke, E. (2013). The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth. Inter¬national Security, 38(2), 41-73.

Gilpin, R. (1981). War and Change in World Politics. Cambridge: Cambridge University Press.

Gilpin, R. (1986). The Richness of the Tradition of Po¬litical Realism. In R. Keohane, Neorealism and Its Critics. New York: Columbia University Press.

Giacomello, G. (2005). National Governments and Con¬trol of the Internet: A Digital Challenge. Londres: Routledge.

Gibson, W. (1984). Neuromancer. Nueva York: Ace.

Goldsmith, J. L. & Wu, T. (2006). Who Controls the Internet: Illusions of a Borderless World. Oxford: Oxford University Press.

Goldstein, L. (2015). Meeting China Halfway. Washing¬ton, DC: Georgetown University Press.

Gourevitch, P. (1978). The Second Image Reversed: The International Sources of Domestic Politics. Inter¬national Organization, 32(4), 881-912.

Hansen, L. & Nissenbaum, H. (2009). Digital disas¬ter: cyber security, and the Copenhagen School. International Studies Quarterly (4), 1155-1175.

Herz, M. (2013). Seguridad. In T. Legler, A. Santa Cruz, L. Zamudio (eds.), Introducción a las relaciones internacionales: América Latina y la política global (pp. 123-133). México: Oxford University Press.

Ikenberry, J. (2009). Liberal Internationalism 3.0: Ame¬rica and the Dilemmas of World Order. Perspecti¬ves on Politics, 7(1), 71-87.

Jacques, M. (2009). When China Rules the World: The End of the Western World and the Birth of a New Global Order. Nueva York: Penguin.

Jervis, R. (1979). Deterrence Theory Revisited. World Politics, 31(2), 289-324.

Johnston, A. I. (2013). How New and Assertive is China’s New Assertiveness? International Security, 37(4), 7-48.

Junio, T. J. (2013). How Probable is Cyber War? Bringing IR Theory Back in to the Cyber Conflict Debate. Journal of Strategic Studies, 36(1), 125-133.

Klimburg, A. (2017). The Darkening Web: The War for Cyberspace. New York: Penguin Press.

Kello, L. (2013). The meaning of cyber revolution: perils to theory and statecraft. International Security, 38(2), 7-40.

Kennedy, P. (1987). The Rise and Fall of Great Powers. Nueva York: Random House.

Keohane, R. (1984). After Hegemony: Cooperation and Discord in the World Political Economy. Princeton: Princeton University Press.

Keohane, R. O. & Nye, J. S. (1977). Power and Inter¬dependence: World Politics. Boston: Little Brown.

Keohane, R. & Nye, J. S. (1998). Power and Interde¬pendence in the Information Age. Foreign Affairs, 77(5), 81-94.

Khanna, P. (2016). Connectography: mapping the future of global civilization. Nueva York: Random House.

Kirshner, J. (2010). The Tragedy of Offensive Realism: Classical Realism and the Rise of China. European Journal of International Relations, 18(1), 53-75.

Kramer, F. D.; Starr, S. H.; Wentz, L. K. & (eds.). (2009). Cyberpower and National Security. Washington, DC: Potomac.

Krauthamer, C. (31/07/1995). Why We Must Contain China. Time.

Krishna-Hensel, S. F. (2007). Preface. Cybersecurity: Perspectives on the Challenges of the Information Revolution. In M. Dunn Cavelty, V. Mauer, S. F.

Krishna-Hensel (eds.), Power and Security in the Information Age: Investigating the Role of the State in Cyberspace. Londres: mpg Books.

Kupchan, C. (2012). No One’s World: the West, the Rising Rest, and the Coming Global Turn. New York: Oxford University Press.

Lawson, S. (2013). Beyond Cyber-Doom: Assesing the Limits of Hypothetical Scenarios in the Framing of Cyber Threats. Journal of Information Tehcno¬logy & Politics, 10(1), 86-103.

Layne, C. (2006). The Unipolar Illusion Revisited: the Coming End of the United States ‘Unipolar Mo¬ment’. International Security, 31(2), 7-41.

Layne, C. (2009). The Unipolar Illusion Revisited: The Coming End of the United States’ Unipolar Moment. International Security, 34(1), 147-172.

Layne, C. (2009). The Waning of U.S. Hegemony: Myth or Reality? A Review Essay. International Security, 34(1), 147-172.

Li, R. (2009). A Rising China and Security in East Asia: Identity Construction and Security Discourse. Lon¬dres: Routledge.

Libicki, M. C. (2007). Conquest in cyberspace: national security and information warfare. Nueva York: Cambridge University Press.

Libicki, M. C. (2009). Cyberdeterrence and Cyberwar. Santa Monica, CA: rand.

Liff, A. P. (2012). Cyberwar: a new absolute weapon? The proliferation of cyberwarfare capabilities and interstate war. Journal of Strategic Studies, 35(3), 401-428.

Lindsay. (2013). Stuxnet and the Limits of Cyber War¬fare. Security Studies, 22(3), 365-404.

Lindsay, J. R. (2015a). The impact of China cybersecu¬rity: fiction and friction. International Security, 39(3), 7-47.

Lindsay, J. R. (2015b). Introduction. In J. R. Lindsay, T. Cheung, D. Reveron & (eds.), China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Area (pp. 1-26). Nueva York: Oxford University Press.

Mattelart, A. (2007). Historia de la sociedad de la infor¬mación. Barcelona: Paidós.

McEvoy, M. M. (2010). From global village to virtual battlespace: the colonizing of the internet and the extension of realpolitik. International Studies Quarterly, 54(2), 381-401.

Mesa, L. (2009). El debate sobre la seguridad nacional en la República Islámica de Irán. Estudio del primer mandato del presidente hojatoleslam Seyed Moham¬med Khatami (1997-2001). México: El Colegio de México.

Mitrany, D. (1948). The Functional Approach to World Organization. International Affairs, 24(3), 350- 363.

Moravcsik, A. (1998). Centralization or Fragmentation? Europe Facing Challenges of Deepening, Diversity, and Democracy. New York: Council on Foreign Relations.

Moravcsik, A. (1999). The Choice for Europe: Social Pur¬pose and State Power from Messina to Maastricht. Londres: UCL Press.

Morgenthau, H. J. (1948). Politics Among Nations: The Stru¬ggle for Power and Peace. New York: McGraw Hill.

Morozov, E. (2009). Cyber-scare: the exaggerated fear over digital warfare. Boston Review, 34(4).

Morozov, E. (2011). The Net Delusion: The Dark Side of Internet Freedom. Nueva York: Public Affairs.

Newitz, A. (16/09/2013). The Bizarre Evolution of the Word ‘Cyber’. Retrieved noviembre 12, 2018 from Gizmodo: https://io9.gizmodo.com/to¬day-cyber-means-war-but-back-in-the-1990s-it-mean-1325671487

Nye, J. (2010). Cyber Power. Belfer Center for Science and International Affairs, Harvard Kennedy School. Cambridge: Harvard University.

Nye, J. S. (2004a). Soft Power: The Means to Success in World Politics. New York: Public Affairs.

Nye, J. S. (2004b). Power in the Global Information Age: From Realism to Globalization. Londres: Routledge.

Nye, J. S. (2011). Nuclear lessons for cyber security? Strategic Studies Quarterly, 5(4), 18-38.

Ohm, P. (2008). The Myth of the Superuser: Fear, Risk, and Harm Online. Univeristy of California Davis Law Review, 41(4), 1327-1402.

Owens, W. A.; Dam, K. W.; Lin, H. S. (eds.). (2009). Technology, Policy, Law, and Ethics Regarding U.S. Adquisition and Use of Cyberattack Capabilities. Washington, DC: National Academies Press.

Palfrey, J. (2010). Four phases of internet regulation. Social Research, 77(3), 981-996.

Perrit, H. H. (1998). The Internet as a Threat to So¬vereignty? Thoughts on the Internet’s Role in Strenghtening National and Global Governance. Indiana Journal of Global Studies, 5(2), 423-442.

Petterson, D. (2013). Offensive Cyber Weapons: Cons¬truction, Development, Employment. Journal of Strategic Studies, 36(1), 120-124.

Pillsbury, M. (2015). The Hundred Year Marathon: China’s Secret Strategy to Replace America’s as the Global Superpower. Nueva York: Henry Holt.

Rachman, G. (1996). Containing China. Washington Quarterly, 19(1), 129-140.

Rattray, G. J. (2001). Strategic Warfare in Cyberspace. Cambridge: MIT Press.

Reardon, R. & Nazli, C. (2012). The Role of Cyberspace in International Relations. San Diego, CA: ISA Annual Convention.

Reveron, D. S. (eds.). (2012). Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World. Washington, DC: Georgetown University Press.

Rid, T. (2012). Cyber War Will Not Take Place. Journal of Strategic Studies, 523-544.

Risse-Kappen, T. (1995). Bringing Transnational Relations Back In: Non-State Actors, Domestic Structures, and International Institutions. Cambridge: Cambridge University Press.

Rosenau, J. N. (1990). Turbulence in World Politics: A Theory of Change and Continuity. Princeton, NJ: Princeton University Press.

Rosenau, J. N.; Singh, J. P. (2002). Information Tech¬nology and Global Politics: The Changing Scope of Power and Governance. Alabany: State University of New York Press.

Ross, R. (1997). Beijing as a Conservative Power. Foreign Affairs, 76(2), 33-44.

Ruggie, J. G. (1983). Continuity and Transformation in the World Polity: Toward a Neorealist Theory Synthesis. World Politics, 35(2), 261-285.

Ruggie, J. G. (1998). Constructing the World Polity: Es¬says on International Institutionalism. Londres: Routledge.

Russett, B. & Antholis, W. (1993). Grasping the World Polity: Essays on International Institutionalism. Londres: Routledge.

Schmidt, M. (13/03/2012). New interest in hacking as threat to security. The New York Times.

Schneier, B. (2012). Liars and Outliers: Enabling the Trust that Society Needs to Thrive. Indianapolis: Wiley.

Schweller, R. & Pu, X. (2011). After Unipolarity: China’s Vision of International Order in an Era of U.S. Decline. 36(1), 47-72.

Sanger, D. (2012). Confront and conceal: Obama’s secret wars and surprising use of American power. Nueva York: Crown.

Santa Cruz, A. (2000). Un debate teórico empíricamente ilustrado: la construcción de la soberanía japonesa, 1853-1902. Guadalajara: Universidad de Gua¬dalajara.

Santa Cruz, A. (2013). Constructivismo. In T. Legler, A. Santa Cruz & L. Zamudio, Introducción a las relaciones internacionales: América Latina y la política global (pp. 36-50). México: Oxford University Press.

Sassen, S. (1998). On the Internet and Sovereignty. Indiana Journal of Global Legal Studies, 5(2), 545-559.

Shambaugh, D. (1996). Containment or Engagement of China: Calculating Beijing’s Responses. Inter¬national Security, 21(2), 180-209.

Shambaugh, D. (2013). China Goes Global: the Partial Power. Nueva York: Oxford University Press.

Shapiro, I. & Wendt, A. (1992). The Difference that Realism Makes. Politics & Society (2).

Shirky, C. (2011). The Political Power of Social Media: Technology, the Public Sphere, and Political Change. Foreign Affairs, 90(1), 28-41.

Singer, P. W. & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Nueva York: Oxford University Press.

Snyder, J. (1991). Myths of Empire. Ithaca, NY: Cornell University Press.

Starrs, S. (2013). American Economic Power Hasn’t Declined- It Globalized! Summoning the Data and Taking Globalization Seriously. International Studies Quarterly, 57(4), 817-830.

Steinfeld, E. S. (2010). Playing our Game: Why China’s Economic Rise Doesn’t Threaten the West. Oxford: Oxford University Press.

Sterling-Folker, Jennifer. (2013). Making Sense of Interna¬tionl Relations Theory: Londres: Lyenne Rienner.

Stone, J. (2012). Cyber War Will Take Place! Journal of Strategic Studies, 36(1), 101-108.

Tammen, R. L. (ed.). (2000). Power Transitions Strategies for the 21st Century. Nueva York: Chatham House.

Valeri, L. (2000). Securing Internet Society: Toward an International Regime for Information Assurance. Studies in Conflict and Terrorism, 23(2), 129-146.

Valeriano, B. & Maness, R. C. (2015). Cyber war versus cyber realities: cyber conflict in the international system. Nueva York: Oxford University Press.

Vaidhyanathan, S. (2018). Antisocial Media. Nueva York: Oxford University Press.
Van Evera, S. (1997). Guide to Methods for Students of Political Science. Ithaca, Londres: Cornell Uni¬versity Press.

Walker, R. B. (1993). Inside/Outside: International Rela¬tions ads Political Theory. Cambridge: Cambridge University Press.

Walt, S. (1994). The Reinaissance of Security Studies. International Studies Quarterly, 35(2), 211-239.

Walt, S. M. (2010). Is the Cyber Threat Overblown? Retrieved enero 2, 2018 from Foreign Policy: http://walt.foreignpolicy.com/posts/2010/03/30/is_the_cyber_threat_overblown

Waltz, K. N. (1979). Theory of International Politics. Readings: Addison Wesley.

Weldes, J. (1996). Constructing National Interest. Eu¬ropean Journal of International Relations, 2(3), 335-370.

Wendt, A. (1999). Social Theory of International Politics. Cambridge: Cambridge University Press.

Wiener, N. (1948). Cybernetics or Control and Commu¬nication in the Animal and the Machine. París: Hermann.

Wu, I. S. (2008). Information, identity and institutions. Institute for the Study of Diplomacy. Washing¬ton, DC: Georgetown University.

Zittrain, J. (2008). The future of the internet and how to stop it. New Haven: Yale University Press.

Descargas

La descarga de datos todavía no está disponible.