Mostrar el registro sencillo del ítem

Ciberseguridad y derecho internacional: el conflicto en el ciberespacio

dc.creatorÁvila García, Iván Leonardo
dc.date2024-12-30
dc.date.accessioned2025-06-06T23:02:09Z
dc.date.available2025-06-06T23:02:09Z
dc.identifierhttps://esdegrevistas.edu.co/index.php/rdcj/article/view/4946
dc.identifier10.25062/2955-0262.4946
dc.identifier.urihttps://hdl.handle.net/20.500.14205/11595
dc.descriptionThis article analyzes the growing challenge of cybersecurity in the field of international law, with special attention to conflict in cyberspace. As cyberattacks have intensified and diversified, the lines between cyberwarfare, espionage and digital terrorism have blurred, posing significant challenges for global security and regulation. This study is based on a comprehensive literature review of academic sources and international legal doctrines, providing a theoretical and practical understanding of cyber conflict. The objective is to analyze how international law has addressed this phenomenon, the adequacy of existing regulatory frameworks and the proposals for improvement that arise in specialized literature. We conclude that, although international law has begun to recognize cyberspace as a new domain of conflict, the lack of consensus and legal ambiguity make it difficult to define binding regulations.en-US
dc.descriptionEste artículo analiza el creciente desafío de la ciberseguridad en el ámbito del derecho internacional, con especial atención al conflicto en el ciberespacio. A medida que los ataques cibernéticos se han intensificado y diversificado, las fronteras entre la guerra cibernética, el espionaje y el terrorismo digital se han difuminado, lo cual plantea importantes retos para la regulación y la seguridad global. Este estudio se basa en una revisión bibliográfica exhaustiva de fuentes académicas y doctrinas jurídicas internacionales que proporciona una comprensión teórica y práctica del conflicto cibernético. El objetivo es analizar cómo el derecho internacional ha abordado este fenómeno, la adecuación de los marcos normativos existentes y las propuestas de mejora que surgen en la literatura especializada. Concluimos que, aunque el derecho internacional ha comenzado a reconocer el ciberespacio como un nuevo dominio de conflicto, la falta de consenso y la ambigüedad dificultan la definición de una normativa vinculante.es-ES
dc.formatapplication/pdf
dc.languagespa
dc.publisherSello Editorial ESDEGes-ES
dc.relationhttps://esdegrevistas.edu.co/index.php/rdcj/article/view/4946/5368
dc.relation/*ref*/Brown, T. J., & Tully, S. (2018). Cyber Operations and International Law. Lawfare Blog. https://www.cambridge.org/core/books/cyber-operations-and-international-law/74D210E76E46531542AD27CECF07ABDE
dc.relation/*ref*/Buchan, R. (2012). Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions? Journal of Conflict and Security Law, 17(2), 212-227. https://doi.org/10.1093/jcsl/krs014
dc.relation/*ref*/Christen, M., Gordijn, B., & Loi, M. (2020). The Ethics of Cybersecurity. Springer. https://tinyurl.com/5n8ppx4p
dc.relation/*ref*/Clark, D. D., & Landau, S. (2010). The Problem isn’t Attribution: It’s Multi-stage Attacks. Briscoe, B., & Steenkiste, P. (Eds.), ReARCH '10: Proceedings of the Re-Architecting the Internet Workshop (article 11, pp. 1–6). Association for Computing Machinery. https://doi.org/10.1145/1921233.1921247
dc.relation/*ref*/Clarke, R. A., & Knake, R. K. (2010). Cyber War: The Next Threat to National Security and What to Do About It. HarperCollins.
dc.relation/*ref*/Crawford, J. R. (2012). Brownlie's Principles of Public International Law (8.a ed.). Oxford University Press.
dc.relation/*ref*/Dinstein, Y. (2016). The Conduct of Hostilities under the Law of International Armed Conflict (3rd ed.). Cambridge University Press.
dc.relation/*ref*/Drezner, D. W. (2013). The Systemic Consequences of Cybersecurity. International Security, 38(2), 9-39. https://doi.org/10.1162/ISEC_a_00125
dc.relation/*ref*/Greenberg, A. (2019). Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers. Doubleday.
dc.relation/*ref*/Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J. (2012). The Law of Cyber-Attack. California Law Review, 100(4), 817-885. http://hdl.handle.net/20.500.13051/3283
dc.relation/*ref*/Kello, L. (2017). Cybersecurity and the New World Disorder. https://nationalinterest.org/feature/cybersecurity-the-new-world-disorder-16273
dc.relation/*ref*/Kello, L. (2017). The Virtual Weapon and International Order. Yale University Press.
dc.relation/*ref*/Landau, S. (2017). Security and Privacy in Cyber Space: A Multidisciplinary Perspective. Oxford University Press.
dc.relation/*ref*/Lin, H. (2016). Attribution of Malicious Cyber Incidents: From Soup to Nuts. Journal of International Affairs, 70(1), 75-137. https://www.jstor.org/stable/90012598
dc.relation/*ref*/Lin, H. (2016). The Role of Attribution in Cybersecurity. Journal of Cyber Policy, 1(1), 12-24. https://doi.org/10.1080/23738871.2016.1153138
dc.relation/*ref*/Nye, J. S. (2017). Deterrence and Dissuasion in Cyberspace. International Security, 41(3), 44-71. https://doi.org/10.1162/ISEC_a_00266
dc.relation/*ref*/Rid, T. (2013). Cyber War Will Not Take Place. Oxford University Press.
dc.relation/*ref*/Rid, T., & Buchanan, B. (2015). Attributing Cyber Attacks. Journal of Strategic Studies, 38(1-2), 4-37. https://doi.org/10.1080/01402390.2014.977382
dc.relation/*ref*/Sanger, D. E. (2018). The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Crown.
dc.relation/*ref*/Schmitt, M. N. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press. https://doi.org/10.1017/CBO9781139169288
dc.relation/*ref*/Schmitt, M. N. (2014). The Law of Cyber Operations: Quo Vadis. Stanford Law and Policy Review, 25(269), 269-299. https://law.stanford.edu/wp-content/uploads/2018/03/schmitt.pdf
dc.relation/*ref*/Schmitt, M. N. (2017). International Law and the Use of Force in Cyberspace. Journal of National Security Law & Policy, 4(1), 63-86.
dc.relation/*ref*/Singer, P. W., & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.
dc.relation/*ref*/United Nations General Assembly. (2015). Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. https://tinyurl.com/4hstrvt9
dc.relation/*ref*/United States Department of Defense. (2018). Summary of the 2018 National Defense Strategy of the United States of America. https://tinyurl.com/4pvyds7h
dc.relation/*ref*/Brown, T. J., & Tully, S. (2018). Cyber Operations and International Law. Lawfare Blog. https://www.cambridge.org/core/books/cyber-operations-and-international-law/74D210E76E46531542AD27CECF07ABDE
dc.relation/*ref*/Buchan, R. (2012). Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions? Journal of Conflict and Security Law, 17(2), 212-227. https://doi.org/10.1093/jcsl/krs014
dc.relation/*ref*/Christen, M., Gordijn, B., & Loi, M. (2020). The Ethics of Cybersecurity. Springer. https://tinyurl.com/5n8ppx4p
dc.relation/*ref*/Clark, D. D., & Landau, S. (2010). The Problem isn’t Attribution: It’s Multi-stage Attacks. Briscoe, B., & Steenkiste, P. (Eds.), ReARCH '10: Proceedings of the Re-Architecting the Internet Workshop (article 11, pp. 1–6). Association for Computing Machinery. https://doi.org/10.1145/1921233.1921247
dc.relation/*ref*/Clarke, R. A., & Knake, R. K. (2010). Cyber War: The Next Threat to National Security and What to Do About It. HarperCollins.
dc.relation/*ref*/Crawford, J. R. (2012). Brownlie's Principles of Public International Law (8.a ed.). Oxford University Press.
dc.relation/*ref*/Dinstein, Y. (2016). The Conduct of Hostilities under the Law of International Armed Conflict (3rd ed.). Cambridge University Press.
dc.relation/*ref*/Drezner, D. W. (2013). The Systemic Consequences of Cybersecurity. International Security, 38(2), 9-39. https://doi.org/10.1162/ISEC_a_00125
dc.relation/*ref*/Greenberg, A. (2019). Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers. Doubleday.
dc.relation/*ref*/Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J. (2012). The Law of Cyber-Attack. California Law Review, 100(4), 817-885. http://hdl.handle.net/20.500.13051/3283
dc.relation/*ref*/Kello, L. (2017). Cybersecurity and the New World Disorder. https://nationalinterest.org/feature/cybersecurity-the-new-world-disorder-16273
dc.relation/*ref*/Kello, L. (2017). The Virtual Weapon and International Order. Yale University Press.
dc.relation/*ref*/Landau, S. (2017). Security and Privacy in Cyber Space: A Multidisciplinary Perspective. Oxford University Press.
dc.relation/*ref*/Lin, H. (2016). Attribution of Malicious Cyber Incidents: From Soup to Nuts. Journal of International Affairs, 70(1), 75-137. https://www.jstor.org/stable/90012598
dc.relation/*ref*/Lin, H. (2016). The Role of Attribution in Cybersecurity. Journal of Cyber Policy, 1(1), 12-24. https://doi.org/10.1080/23738871.2016.1153138
dc.relation/*ref*/Nye, J. S. (2017). Deterrence and Dissuasion in Cyberspace. International Security, 41(3), 44-71. https://doi.org/10.1162/ISEC_a_00266
dc.relation/*ref*/Rid, T. (2013). Cyber War Will Not Take Place. Oxford University Press.
dc.relation/*ref*/Rid, T., & Buchanan, B. (2015). Attributing Cyber Attacks. Journal of Strategic Studies, 38(1-2), 4-37. https://doi.org/10.1080/01402390.2014.977382
dc.relation/*ref*/Sanger, D. E. (2018). The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age. Crown.
dc.relation/*ref*/Schmitt, M. N. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press. https://doi.org/10.1017/CBO9781139169288
dc.relation/*ref*/Schmitt, M. N. (2014). The Law of Cyber Operations: Quo Vadis. Stanford Law and Policy Review, 25(269), 269-299. https://law.stanford.edu/wp-content/uploads/2018/03/schmitt.pdf
dc.relation/*ref*/Schmitt, M. N. (2017). International Law and the Use of Force in Cyberspace. Journal of National Security Law & Policy, 4(1), 63-86.
dc.relation/*ref*/Singer, P. W., & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.
dc.relation/*ref*/United Nations General Assembly. (2015). Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. https://tinyurl.com/4hstrvt9
dc.relation/*ref*/United States Department of Defense. (2018). Summary of the 2018 National Defense Strategy of the United States of America. https://tinyurl.com/4pvyds7h
dc.rightsDerechos de autor 2024 Revista Derechos Humanos, Conflicto y Justiciaes-ES
dc.rightshttps://creativecommons.org/licenses/by-nc-nd/4.0es-ES
dc.sourceRevista Derechos Humanos, Conflicto y Justicia; Vol. 3 Núm. 6 (2024): Los Derechos Humanos en tiempos de transformación global; 115-127es-ES
dc.source2955-0262
dc.subjectciberseguridades-ES
dc.subjectconflicto cibernéticoes-ES
dc.subjectderecho internacionales-ES
dc.subjectguerra cibernéticaes-ES
dc.subjectterrorismo digitales-ES
dc.subjectcybersecurityen-US
dc.subjectcyber conflicten-US
dc.subjectcyber warfareen-US
dc.subjectdigital terrorismen-US
dc.subjectinternational lawen-US
dc.titleCybersecurity and International Law: Conflict in Cyberspaceen-US
dc.titleCiberseguridad y derecho internacional: el conflicto en el ciberespacioes-ES
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion


Ficheros en el ítem

FicherosTamañoFormatoVer

No hay ficheros asociados a este ítem.

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem