Mostrar el registro sencillo del ítem
Cybersecurity and International Law: Conflict in Cyberspace
Ciberseguridad y derecho internacional: el conflicto en el ciberespacio
dc.creator | Ávila García, Iván Leonardo | |
dc.date | 2024-12-30 | |
dc.date.accessioned | 2025-06-06T23:02:09Z | |
dc.date.available | 2025-06-06T23:02:09Z | |
dc.identifier | https://esdegrevistas.edu.co/index.php/rdcj/article/view/4946 | |
dc.identifier | 10.25062/2955-0262.4946 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14205/11595 | |
dc.description | This article analyzes the growing challenge of cybersecurity in the field of international law, with special attention to conflict in cyberspace. As cyberattacks have intensified and diversified, the lines between cyberwarfare, espionage and digital terrorism have blurred, posing significant challenges for global security and regulation. This study is based on a comprehensive literature review of academic sources and international legal doctrines, providing a theoretical and practical understanding of cyber conflict. The objective is to analyze how international law has addressed this phenomenon, the adequacy of existing regulatory frameworks and the proposals for improvement that arise in specialized literature. We conclude that, although international law has begun to recognize cyberspace as a new domain of conflict, the lack of consensus and legal ambiguity make it difficult to define binding regulations. | en-US |
dc.description | Este artículo analiza el creciente desafío de la ciberseguridad en el ámbito del derecho internacional, con especial atención al conflicto en el ciberespacio. A medida que los ataques cibernéticos se han intensificado y diversificado, las fronteras entre la guerra cibernética, el espionaje y el terrorismo digital se han difuminado, lo cual plantea importantes retos para la regulación y la seguridad global. Este estudio se basa en una revisión bibliográfica exhaustiva de fuentes académicas y doctrinas jurídicas internacionales que proporciona una comprensión teórica y práctica del conflicto cibernético. El objetivo es analizar cómo el derecho internacional ha abordado este fenómeno, la adecuación de los marcos normativos existentes y las propuestas de mejora que surgen en la literatura especializada. Concluimos que, aunque el derecho internacional ha comenzado a reconocer el ciberespacio como un nuevo dominio de conflicto, la falta de consenso y la ambigüedad dificultan la definición de una normativa vinculante. | es-ES |
dc.format | application/pdf | |
dc.language | spa | |
dc.publisher | Sello Editorial ESDEG | es-ES |
dc.relation | https://esdegrevistas.edu.co/index.php/rdcj/article/view/4946/5368 | |
dc.relation | /*ref*/Brown, T. J., & Tully, S. (2018). Cyber Operations and International Law. Lawfare Blog. https://www.cambridge.org/core/books/cyber-operations-and-international-law/74D210E76E46531542AD27CECF07ABDE | |
dc.relation | /*ref*/Buchan, R. (2012). Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions? Journal of Conflict and Security Law, 17(2), 212-227. https://doi.org/10.1093/jcsl/krs014 | |
dc.relation | /*ref*/Christen, M., Gordijn, B., & Loi, M. (2020). The Ethics of Cybersecurity. Springer. https://tinyurl.com/5n8ppx4p | |
dc.relation | /*ref*/Clark, D. D., & Landau, S. (2010). The Problem isn’t Attribution: It’s Multi-stage Attacks. Briscoe, B., & Steenkiste, P. (Eds.), ReARCH '10: Proceedings of the Re-Architecting the Internet Workshop (article 11, pp. 1–6). Association for Computing Machinery. https://doi.org/10.1145/1921233.1921247 | |
dc.relation | /*ref*/Clarke, R. A., & Knake, R. K. (2010). Cyber War: The Next Threat to National Security and What to Do About It. HarperCollins. | |
dc.relation | /*ref*/Crawford, J. R. (2012). Brownlie's Principles of Public International Law (8.a ed.). Oxford University Press. | |
dc.relation | /*ref*/Dinstein, Y. (2016). The Conduct of Hostilities under the Law of International Armed Conflict (3rd ed.). Cambridge University Press. | |
dc.relation | /*ref*/Drezner, D. W. (2013). The Systemic Consequences of Cybersecurity. International Security, 38(2), 9-39. https://doi.org/10.1162/ISEC_a_00125 | |
dc.relation | /*ref*/Greenberg, A. (2019). Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers. Doubleday. | |
dc.relation | /*ref*/Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J. (2012). The Law of Cyber-Attack. California Law Review, 100(4), 817-885. http://hdl.handle.net/20.500.13051/3283 | |
dc.relation | /*ref*/Kello, L. (2017). Cybersecurity and the New World Disorder. https://nationalinterest.org/feature/cybersecurity-the-new-world-disorder-16273 | |
dc.relation | /*ref*/Kello, L. (2017). The Virtual Weapon and International Order. Yale University Press. | |
dc.relation | /*ref*/Landau, S. (2017). Security and Privacy in Cyber Space: A Multidisciplinary Perspective. Oxford University Press. | |
dc.relation | /*ref*/Lin, H. (2016). Attribution of Malicious Cyber Incidents: From Soup to Nuts. Journal of International Affairs, 70(1), 75-137. https://www.jstor.org/stable/90012598 | |
dc.relation | /*ref*/Lin, H. (2016). The Role of Attribution in Cybersecurity. Journal of Cyber Policy, 1(1), 12-24. https://doi.org/10.1080/23738871.2016.1153138 | |
dc.relation | /*ref*/Nye, J. S. (2017). Deterrence and Dissuasion in Cyberspace. International Security, 41(3), 44-71. https://doi.org/10.1162/ISEC_a_00266 | |
dc.relation | /*ref*/Rid, T. (2013). Cyber War Will Not Take Place. Oxford University Press. | |
dc.relation | /*ref*/Rid, T., & Buchanan, B. (2015). Attributing Cyber Attacks. Journal of Strategic Studies, 38(1-2), 4-37. https://doi.org/10.1080/01402390.2014.977382 | |
dc.relation | /*ref*/Sanger, D. E. (2018). The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Crown. | |
dc.relation | /*ref*/Schmitt, M. N. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press. https://doi.org/10.1017/CBO9781139169288 | |
dc.relation | /*ref*/Schmitt, M. N. (2014). The Law of Cyber Operations: Quo Vadis. Stanford Law and Policy Review, 25(269), 269-299. https://law.stanford.edu/wp-content/uploads/2018/03/schmitt.pdf | |
dc.relation | /*ref*/Schmitt, M. N. (2017). International Law and the Use of Force in Cyberspace. Journal of National Security Law & Policy, 4(1), 63-86. | |
dc.relation | /*ref*/Singer, P. W., & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press. | |
dc.relation | /*ref*/United Nations General Assembly. (2015). Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. https://tinyurl.com/4hstrvt9 | |
dc.relation | /*ref*/United States Department of Defense. (2018). Summary of the 2018 National Defense Strategy of the United States of America. https://tinyurl.com/4pvyds7h | |
dc.relation | /*ref*/Brown, T. J., & Tully, S. (2018). Cyber Operations and International Law. Lawfare Blog. https://www.cambridge.org/core/books/cyber-operations-and-international-law/74D210E76E46531542AD27CECF07ABDE | |
dc.relation | /*ref*/Buchan, R. (2012). Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions? Journal of Conflict and Security Law, 17(2), 212-227. https://doi.org/10.1093/jcsl/krs014 | |
dc.relation | /*ref*/Christen, M., Gordijn, B., & Loi, M. (2020). The Ethics of Cybersecurity. Springer. https://tinyurl.com/5n8ppx4p | |
dc.relation | /*ref*/Clark, D. D., & Landau, S. (2010). The Problem isn’t Attribution: It’s Multi-stage Attacks. Briscoe, B., & Steenkiste, P. (Eds.), ReARCH '10: Proceedings of the Re-Architecting the Internet Workshop (article 11, pp. 1–6). Association for Computing Machinery. https://doi.org/10.1145/1921233.1921247 | |
dc.relation | /*ref*/Clarke, R. A., & Knake, R. K. (2010). Cyber War: The Next Threat to National Security and What to Do About It. HarperCollins. | |
dc.relation | /*ref*/Crawford, J. R. (2012). Brownlie's Principles of Public International Law (8.a ed.). Oxford University Press. | |
dc.relation | /*ref*/Dinstein, Y. (2016). The Conduct of Hostilities under the Law of International Armed Conflict (3rd ed.). Cambridge University Press. | |
dc.relation | /*ref*/Drezner, D. W. (2013). The Systemic Consequences of Cybersecurity. International Security, 38(2), 9-39. https://doi.org/10.1162/ISEC_a_00125 | |
dc.relation | /*ref*/Greenberg, A. (2019). Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers. Doubleday. | |
dc.relation | /*ref*/Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J. (2012). The Law of Cyber-Attack. California Law Review, 100(4), 817-885. http://hdl.handle.net/20.500.13051/3283 | |
dc.relation | /*ref*/Kello, L. (2017). Cybersecurity and the New World Disorder. https://nationalinterest.org/feature/cybersecurity-the-new-world-disorder-16273 | |
dc.relation | /*ref*/Kello, L. (2017). The Virtual Weapon and International Order. Yale University Press. | |
dc.relation | /*ref*/Landau, S. (2017). Security and Privacy in Cyber Space: A Multidisciplinary Perspective. Oxford University Press. | |
dc.relation | /*ref*/Lin, H. (2016). Attribution of Malicious Cyber Incidents: From Soup to Nuts. Journal of International Affairs, 70(1), 75-137. https://www.jstor.org/stable/90012598 | |
dc.relation | /*ref*/Lin, H. (2016). The Role of Attribution in Cybersecurity. Journal of Cyber Policy, 1(1), 12-24. https://doi.org/10.1080/23738871.2016.1153138 | |
dc.relation | /*ref*/Nye, J. S. (2017). Deterrence and Dissuasion in Cyberspace. International Security, 41(3), 44-71. https://doi.org/10.1162/ISEC_a_00266 | |
dc.relation | /*ref*/Rid, T. (2013). Cyber War Will Not Take Place. Oxford University Press. | |
dc.relation | /*ref*/Rid, T., & Buchanan, B. (2015). Attributing Cyber Attacks. Journal of Strategic Studies, 38(1-2), 4-37. https://doi.org/10.1080/01402390.2014.977382 | |
dc.relation | /*ref*/Sanger, D. E. (2018). The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Crown. | |
dc.relation | /*ref*/Schmitt, M. N. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press. https://doi.org/10.1017/CBO9781139169288 | |
dc.relation | /*ref*/Schmitt, M. N. (2014). The Law of Cyber Operations: Quo Vadis. Stanford Law and Policy Review, 25(269), 269-299. https://law.stanford.edu/wp-content/uploads/2018/03/schmitt.pdf | |
dc.relation | /*ref*/Schmitt, M. N. (2017). International Law and the Use of Force in Cyberspace. Journal of National Security Law & Policy, 4(1), 63-86. | |
dc.relation | /*ref*/Singer, P. W., & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press. | |
dc.relation | /*ref*/United Nations General Assembly. (2015). Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. https://tinyurl.com/4hstrvt9 | |
dc.relation | /*ref*/United States Department of Defense. (2018). Summary of the 2018 National Defense Strategy of the United States of America. https://tinyurl.com/4pvyds7h | |
dc.rights | Derechos de autor 2024 Revista Derechos Humanos, Conflicto y Justicia | es-ES |
dc.rights | https://creativecommons.org/licenses/by-nc-nd/4.0 | es-ES |
dc.source | Revista Derechos Humanos, Conflicto y Justicia; Vol. 3 Núm. 6 (2024): Los Derechos Humanos en tiempos de transformación global; 115-127 | es-ES |
dc.source | 2955-0262 | |
dc.subject | ciberseguridad | es-ES |
dc.subject | conflicto cibernético | es-ES |
dc.subject | derecho internacional | es-ES |
dc.subject | guerra cibernética | es-ES |
dc.subject | terrorismo digital | es-ES |
dc.subject | cybersecurity | en-US |
dc.subject | cyber conflict | en-US |
dc.subject | cyber warfare | en-US |
dc.subject | digital terrorism | en-US |
dc.subject | international law | en-US |
dc.title | Cybersecurity and International Law: Conflict in Cyberspace | en-US |
dc.title | Ciberseguridad y derecho internacional: el conflicto en el ciberespacio | es-ES |
dc.type | info:eu-repo/semantics/article | |
dc.type | info:eu-repo/semantics/publishedVersion |
Ficheros en el ítem
Ficheros | Tamaño | Formato | Ver |
---|---|---|---|
No hay ficheros asociados a este ítem. |