<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1794-3108</journal-id>
<journal-title><![CDATA[Revista Criminalidad]]></journal-title>
<abbrev-journal-title><![CDATA[Rev. Crim.]]></abbrev-journal-title>
<issn>1794-3108</issn>
<publisher>
<publisher-name><![CDATA[Policía Nacional de Colombia]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1794-31082024000300011</article-id>
<article-id pub-id-type="doi">10.47741/17943108.658</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Gobernanza policéntrica, big data e inteligencia artificial: herramientas para la seguridad ciudadana en Colombia]]></article-title>
<article-title xml:lang="en"><![CDATA[Polycentric governance, big data and artificial intelligence: Tools for citizen security in Colombia]]></article-title>
<article-title xml:lang="pt"><![CDATA[Governança policêntrica, big data e inteligência artificial: ferramentas para a segurança cidadã na Colômbia]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Fernández-Osorio]]></surname>
<given-names><![CDATA[Andrés Eduardo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Villalba-García]]></surname>
<given-names><![CDATA[Luisa Fernanda]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Velandia-Pardo]]></surname>
<given-names><![CDATA[Elmers Freddy]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Escuela Militar de Cadetes General José María Córdova  ]]></institution>
<addr-line><![CDATA[Bogotá ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Militar Nueva Granada  ]]></institution>
<addr-line><![CDATA[Bogotá ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Universidad Militar Nueva Granada  ]]></institution>
<addr-line><![CDATA[Bogotá ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2024</year>
</pub-date>
<volume>66</volume>
<numero>3</numero>
<fpage>11</fpage>
<lpage>25</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S1794-31082024000300011&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S1794-31082024000300011&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S1794-31082024000300011&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen En la era digital, en la cual los ciberataques son cada vez más sofisticados y persistentes, la capacidad de recopilar y analizar datos en tiempo real es fundamental para responder rápidamente a las amenazas emergentes. No obstante, la complejidad de administrar las diversas redes de interacción así como la multiplicidad de sus actores motiva la búsqueda de nuevas perspectivas para la lucha contra los delitos informáticos. Este artículo propone la utilización de una gobernanza policéntrica en Colombia, soportada en herramientas como la big data (BD) y la inteligencia artificial (IA), para contribuir a la seguridad ciudadana mediante nuevas perspectivas para la protección de datos. Por medio de un enfoque cualitativo se explora el escenario de ciberseguridad y ciberdefensa colombiano para interpretar el contexto de las amenazas en el ciberespacio e identificar los desafíos y las oportunidades relacionadas con el uso de la gobernanza policéntrica, la BD y la IA para la anticipación estratégica y la defensa de la nación.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract In the digital era, in which cyber-attacks are becoming increasingly sophisticated and persistent, the ability to collect and analyse data in real time is essential to respond quickly to emerging threats. However, the complexity of managing the various interaction networks, as well as the multiplicity of their actors, motivates the search for new perspectives in the fight against cybercrime. This article proposes the use of polycentric governance in Colombia, supported by tools such as big data (BD) and artificial intelligence (AI), to contribute to citizen security through new perspectives for data protection. Through a qualitative approach, the Colombian cybersecurity and cyber-defence scenario is explored to interpret the context of threats in cyberspace and identify challenges and opportunities related to the use of polycentric governance, BD and AI for strategic anticipation and defence of the nation.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo Na era digital, em que os ataques cibernéticos estão se tornando cada vez mais sofisticados e persistentes, a capacidade de coletar e analisar dados em tempo real é essencial para responder rapidamente às ameaças emergentes. No entanto, a complexidade de gerenciar as várias redes de interação, bem como a multiplicidade de seus atores, motiva a busca de novas perspectivas na luta contra o crime cibernético. Este artigo propõe o uso da governança policêntrica na Colômbia, apoiada por ferramentas como big data (BD) e inteligência artificial (IA), para contribuir com a segurança cidadã por meio de novas perspectivas de proteção de dados. Por meio de uma abordagem qualitativa, o cenário colombiano de segurança cibernética e defesa cibernética é explorado para interpretar o contexto das ameaças no espaço cibernético e identificar os desafios e as oportunidades relacionados ao uso da governança policêntrica, do BD e da IA para a antecipação estratégica e a defesa da nação.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Big data]]></kwd>
<kwd lng="es"><![CDATA[ciberdefensa]]></kwd>
<kwd lng="es"><![CDATA[ciberseguridad]]></kwd>
<kwd lng="es"><![CDATA[gobernanza policéntrica]]></kwd>
<kwd lng="es"><![CDATA[inteligencia artificial]]></kwd>
<kwd lng="es"><![CDATA[seguridad ciudadana]]></kwd>
<kwd lng="en"><![CDATA[Big data]]></kwd>
<kwd lng="en"><![CDATA[cyber-defence]]></kwd>
<kwd lng="en"><![CDATA[cybersecurity]]></kwd>
<kwd lng="en"><![CDATA[polycentric governance]]></kwd>
<kwd lng="en"><![CDATA[artificial intelligence]]></kwd>
<kwd lng="en"><![CDATA[citizen Security.]]></kwd>
<kwd lng="pt"><![CDATA[Big data]]></kwd>
<kwd lng="pt"><![CDATA[defesa cibernética]]></kwd>
<kwd lng="pt"><![CDATA[segurança cibernética]]></kwd>
<kwd lng="pt"><![CDATA[governança policêntrica]]></kwd>
<kwd lng="pt"><![CDATA[inteligência artificial]]></kwd>
<kwd lng="pt"><![CDATA[segurança cidadã]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Acevedo-Navas]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ejes temáticos estratégicos en seguridad y defensa en Colombia]]></article-title>
<source><![CDATA[Revista Científica General José María Córdova]]></source>
<year>2023</year>
<volume>21</volume>
<numero>42</numero>
<issue>42</issue>
<page-range>303-26</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Adorno]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Collective action and sociological research networks in the fight against crime in Brazil]]></article-title>
<source><![CDATA[Revista Científica General José María Córdova]]></source>
<year>2024</year>
<volume>22</volume>
<numero>46</numero>
<issue>46</issue>
<page-range>433-56</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aguilera Eguía]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[¿Revisión sistemática, revisión narrativa o metaanálisis?]]></article-title>
<source><![CDATA[Revista de la Sociedad Española del Dolor]]></source>
<year>2014</year>
<volume>21</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>359-60</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ahsan]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Nygard]]></surname>
<given-names><![CDATA[K. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Gomes]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Chowdhury]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rifat]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Connolly]]></surname>
<given-names><![CDATA[J. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybersecurity threats and their mitigation approaches using machine learning-a review]]></article-title>
<source><![CDATA[Journal of Cybersecurity and Privacy]]></source>
<year>2022</year>
<volume>2</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>527-55</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bancal]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Ebel]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Vicogne]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Fortunato]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Beirnaert- Huvelle]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Hennecart]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Clarhaut]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Schalkwijk]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Rault]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Dubourgnoux]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Crocfer]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Lasson]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Seguridad informática. Ethical Hacking: Conocer el ataque para una mejor defensa]]></source>
<year>2022</year>
<publisher-name><![CDATA[Ediciones ENI]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brayne]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Predict and surveil: Data, discretion, and the future of policing]]></source>
<year>2020</year>
<publisher-name><![CDATA[Oxford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Buchanan]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[The hacker and the state: Cyber attacks and the new normal of geopolitics]]></source>
<year>2020</year>
<publisher-name><![CDATA[Harvard University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cano-Martínez]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Prospectiva de ciberseguridad nacional para Colombia a 2030]]></article-title>
<source><![CDATA[Revista Científica General José María Córdova]]></source>
<year>2022</year>
<volume>20</volume>
<numero>40</numero>
<issue>40</issue>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cavelty]]></surname>
<given-names><![CDATA[M. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Egloff]]></surname>
<given-names><![CDATA[F. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The politics of cybersecurity: Balancing different roles of the State]]></article-title>
<source><![CDATA[St Antony&#8217;s International Review]]></source>
<year>2019</year>
<volume>15</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>37-57</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chayal]]></surname>
<given-names><![CDATA[N. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Patel]]></surname>
<given-names><![CDATA[N. P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Review of machine learning and data mining methods to predict different cyberattacks. En K. Kotecha, V. Piuri, H. Shah y R. Patel (eds.), Data Science and Intelligent Applications]]></source>
<year>2021</year>
<page-range>43-51</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cortés Borrero]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Estado actual de la política pública de ciberseguridad y ciberdefensa en Colombia]]></article-title>
<source><![CDATA[Revista de Derecho, Comunicaciones y Nuevas Tecnologías]]></source>
<year>2015</year>
<volume>14</volume>
<page-range>1-17</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cotino]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[El Dret enfrontat las reptes del Big Data i l&#8217;automatització de les decisions. Seminario de Derecho de la Universidad de Valencia, España, 1-28]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="">
<collab>Decreto 1874</collab>
<source><![CDATA[Por el cual se modifica la estructura del Ministerio de Defensa Nacional, se crean nuevas dependencias, funciones y se dictan otras disposiciones. Ministerio de Defensa Nacional]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Díaz-Roman]]></surname>
<given-names><![CDATA[M. P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Crimen organizado en el Centro Histórico de la Ciudad de México: paradoja, percepción y evidencia]]></article-title>
<source><![CDATA[Revista Científica General José María Córdova]]></source>
<year>2024</year>
<volume>22</volume>
<numero>46</numero>
<issue>46</issue>
<page-range>361-82</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Díaz Samper]]></surname>
<given-names><![CDATA[G. A. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Molina Garzón]]></surname>
<given-names><![CDATA[A. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Serrador Osorio]]></surname>
<given-names><![CDATA[L. E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Aproximación al ciberdelincuente desde la perspectiva del control social]]></article-title>
<source><![CDATA[Revista Criminalidad]]></source>
<year>2024</year>
<volume>65</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>81-95</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Duxbury]]></surname>
<given-names><![CDATA[S. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Andrabi]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The boys in blue are watching you: The shifting metropolitan landscape and big data police surveillance in the United States]]></article-title>
<source><![CDATA[Social Problems]]></source>
<year>2024</year>
<volume>71</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>912-37</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Elizalde Castañeda]]></surname>
<given-names><![CDATA[R. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Flores Ramírez]]></surname>
<given-names><![CDATA[H. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Castro Lorzo]]></surname>
<given-names><![CDATA[E. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Los delitos cibernéticos en Chile, México y Colombia. Un estudio de Derecho Comparado]]></article-title>
<source><![CDATA[Ius Comitialis]]></source>
<year>2021</year>
<volume>4</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>252</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fernández-Hernández]]></surname>
<given-names><![CDATA[J. Á.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Eficacia colectiva para dos espacios urbanos en la zona metropolitana del valle de México]]></article-title>
<source><![CDATA[Revista Científica General José María Córdova]]></source>
<year>2024</year>
<volume>22</volume>
<numero>46</numero>
<issue>46</issue>
<page-range>265-88</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fontalvo-Herrera]]></surname>
<given-names><![CDATA[T. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Vega-Hernández]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mejía- Zambrano]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Método de clustering e inteligencia artificial para clasificar y proyectar delitos violentos en Colombia]]></article-title>
<source><![CDATA[Revista Científica General José María Córdova]]></source>
<year>2023</year>
<volume>21</volume>
<numero>42</numero>
<issue>42</issue>
<page-range>551-72</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<collab>Forbes</collab>
<source><![CDATA[Colombia sigue siendo el país con más ataques de ciberseguridad en Latinoamérica, según IBM]]></source>
<year>2024</year>
<publisher-name><![CDATA[Forbes]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[García Torres]]></surname>
<given-names><![CDATA[M. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ciberseguridad vs.ciberdelincuencia: obstáculos procesales en la persecución de la ciberdelincuencia organizada]]></article-title>
<source><![CDATA[Propuestas para una más eficaz represión de los ciberdelitos. Ciencia Policial]]></source>
<year>2024</year>
<volume>182</volume>
<page-range>15-69</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Garzón Pulgar]]></surname>
<given-names><![CDATA[J. O.]]></given-names>
</name>
<name>
<surname><![CDATA[Cuero Quiñones]]></surname>
<given-names><![CDATA[K. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Una mirada a la Cibercriminalidad en Colombia y su asimilación con los delitos de impacto]]></article-title>
<source><![CDATA[Revista Criminalidad]]></source>
<year>2022</year>
<volume>64</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>203</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gómez]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Zapata]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Efectividad de la política criminal colombiana hacia la prevención del delito]]></article-title>
<source><![CDATA[Revista Criminalidad]]></source>
<year>2020</year>
<volume>62</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>103-18</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guembe]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Azeta]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Misra]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Osamor]]></surname>
<given-names><![CDATA[V. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Fernandez- Sanz]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Pospelova]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The emerging threat of ai-driven cyber attacks: A review]]></article-title>
<source><![CDATA[Applied Artificial Intelligence]]></source>
<year>2022</year>
<volume>36</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-34</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Habegger]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Securing the future: The use of strategic foresight in the security sector]]></article-title>
<source><![CDATA[Strategic Security Analysis]]></source>
<year>2022</year>
<volume>23</volume>
<page-range>1-12</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Herald]]></surname>
<given-names><![CDATA[N. E.]]></given-names>
</name>
<name>
<surname><![CDATA[David]]></surname>
<given-names><![CDATA[M. W.]]></given-names>
</name>
</person-group>
<source><![CDATA[A framework for making effective responses to cyberattacks]]></source>
<year>2018</year>
<conf-name><![CDATA[ 2018 IEEE International Conference on Big Data (Big Data)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>4798-805</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="">
<collab>IBM</collab>
<source><![CDATA[¿Qué es la IA?]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jardine]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Porter]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Shandler]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberattacks and public opinion - The effect of uncertainty in guiding preferences]]></article-title>
<source><![CDATA[Journal of Peace Research]]></source>
<year>2024</year>
<volume>61</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>103-18</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kochhar]]></surname>
<given-names><![CDATA[S. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhatia]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Tomer]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Using deep learning and big data analytics for managing cyber-attacks. En K. Periyaswami, P. F. Katina y S. P. Anandaraj (eds.), New Approaches to Data Analytics and Internet of Things Through Digital Twin]]></source>
<year>2022</year>
<page-range>146-78</page-range><publisher-name><![CDATA[IGI Global]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lawson]]></surname>
<given-names><![CDATA[S. T. yeo]]></given-names>
</name>
<name>
<surname><![CDATA[S. K.]]></surname>
<given-names><![CDATA[Haoran Yu]]></given-names>
</name>
<name>
<surname><![CDATA[Greene]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[The cyber-doom effect: The impact of fear appeals in the US cyber security debate]]></source>
<year>2016</year>
<conf-name><![CDATA[ 2016 8th International Conference on Cyber Conflict (CyCon)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>65-80</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="">
<collab>Ley 1273</collab>
<source><![CDATA[Por medio de la cual se modifica el Código Penal, se crea un nuevo bien jurídico tutelado -denominado &#8220;de la protección de la información y de los datos&#8221; - y se preservan integralmente los sistemas que utilicen las tecnologías de la info. Congreso de la República de Colombia]]></source>
<year>2009</year>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="">
<collab>Ley 1341</collab>
<source><![CDATA[Por la cual se definen principios y conceptos sobre la sociedad de la información y la organización de las Tecnologías de la Información y las Comunicaciones -TIC-, se crea la Agencia Nacional de Espectro y se dictan otras disposiciones. Congreso de la República de Colombia]]></source>
<year>2009</year>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="">
<collab>Ley 1712</collab>
<source><![CDATA[Por medio de la cual se crea la Ley de Transparencia y del Derecho de Acceso a la Información Pública Nacional y se dictan otras disposiciones. Congreso de la República de Colombia]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="">
<collab>Ley 1928</collab>
<source><![CDATA[Por medio de la cual se aprueba el &#8220;Convenio sobre la Ciberdelincuencia&#8221;, adoptado el 23 de noviembre de 2001, en Budapest. Congreso de la República de Colombia]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="">
<collab>Ley 527</collab>
<source><![CDATA[Por medio de la cual se define y reglamenta el acceso y uso de los mensajes de datos, del comercio electrónico y de las firmas digitales, y se establecen las entidades de certificación y se dictan otras disposiciones. Congreso de la República de Colombia]]></source>
<year>1999</year>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Macana Gutiérrez]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El castigo como institución social. Una aproximación de la literatura a partir del estudio del castigo en los delitos sexuales en Colombia]]></article-title>
<source><![CDATA[Revista Vía Iuris]]></source>
<year>2021</year>
<volume>31</volume>
<page-range>1-42</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Manzano-Chávez]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Jiménez-García]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Vega-Torrejon]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Validación del concepto de eficacia colectiva. Un estudio en barrios latinoamericanos]]></article-title>
<source><![CDATA[Revista Científica General José María Córdova]]></source>
<year>2024</year>
<volume>22</volume>
<numero>46</numero>
<issue>46</issue>
<page-range>383-407</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Margulies]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sovereignty and cyber attacks: Technology&#8217;s challenge to the law of state responsibility]]></article-title>
<source><![CDATA[Melbourne Journal of International Law]]></source>
<year>2013</year>
<volume>14</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>496-519</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McGinnis]]></surname>
<given-names><![CDATA[Michael D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Costs and challenges of polycentric governance: An equilibrium concept and examples from U.S. health care]]></article-title>
<source><![CDATA[SSRN Electronic Journal]]></source>
<year>2013</year>
<page-range>1-23</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Medina Martínez]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Cárdenas Osorio]]></surname>
<given-names><![CDATA[C. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Mejía Lobo]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Análisis del phishing y la ley de delitos informáticos en Colombia]]></article-title>
<source><![CDATA[Cuaderno de investigaciones: semilleros andina]]></source>
<year>2021</year>
<volume>1</volume>
<numero>14</numero>
<issue>14</issue>
<page-range>75-80</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mejía-Lobo]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hurtado-Gil]]></surname>
<given-names><![CDATA[S. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Grisales-Aguirre]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ley de delitos informáticos colombiana, el convenio de Budapest y otras legislaciones: Estudio comparativo]]></article-title>
<source><![CDATA[Revista de Ciencias Sociales]]></source>
<year>2023</year>
<volume>XXIX</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>356-72</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="">
<collab>Ministerio de Defensa Nacional</collab>
<source><![CDATA[Seguimiento a indicadores de seguridad y resultados operacionales junio 2024]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="">
<collab>Ministerio de Defensa Nacional. Ministerio de Tecnologías de la Información y las Comunicaciones</collab>
<source><![CDATA[Acerca de colCERT]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="book">
<collab>MinTIC</collab>
<source><![CDATA[Ministro TIC presenta la estrategia de cuatro puntos para hacer de Colombia una potencia en Ciberseguridad]]></source>
<year>2023</year>
<publisher-name><![CDATA[Cyber Summit]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Miró Llinares]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Predictive policing: utopia or dystopia? On attitudes towards the use of big data algorithms for law enforcement]]></article-title>
<source><![CDATA[IDP: revista de Internet, derecho y política]]></source>
<year>2020</year>
<volume>30</volume>
<page-range>1-18</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Moynihan]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[The application of international law to cyberspace: Sovereignty and non-intervention. En Just Security (December)]]></source>
<year>2019</year>
<publisher-name><![CDATA[Chatham House]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Murillo Herrera]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Por qué Colombia recibió tantos ciberataques durante primer semestre]]></source>
<year>2023</year>
<publisher-name><![CDATA[Portafolio]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Oatley]]></surname>
<given-names><![CDATA[G. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Themes in data mining, big data, and crime analytics]]></article-title>
<source><![CDATA[WIREs Data Mining and Knowledge Discovery]]></source>
<year>2022</year>
<volume>12</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="">
<collab>Oracle</collab>
<source><![CDATA[What Is Big Data?]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ostrom]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Polycentricity. En Michael Dean McGinnis (ed.), Polycentricity and Local Public Economies. Readings from the Workshop in Political Theory and Policy Analysis]]></source>
<year>1999</year>
<page-range>52-74</page-range><publisher-name><![CDATA[University of Michigan Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Padilla-Oñate]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Policía de proximidad y confianza ciudadana]]></article-title>
<source><![CDATA[Revista Científica General José María Córdova]]></source>
<year>2024</year>
<volume>22</volume>
<numero>46</numero>
<issue>46</issue>
<page-range>289-312</page-range></nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pastrana Buelvas]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Gehring]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Fuerzas Militares de Colombia: nuevos roles y desafíos nacionales e internacionales]]></source>
<year>2019</year>
<publisher-name><![CDATA[Fundación Konrad Adenauer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peña Suárez]]></surname>
<given-names><![CDATA[J. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ciberseguridad, un desafío para las Fuerzas Militares colombianas en la era digital]]></article-title>
<source><![CDATA[Perspectivas en Inteligencia]]></source>
<year>2023</year>
<volume>15</volume>
<numero>24</numero>
<issue>24</issue>
<page-range>333-59</page-range></nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Perafán Del Campo]]></surname>
<given-names><![CDATA[E. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Polo Alvis]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Sánchez Acevedo]]></surname>
<given-names><![CDATA[M. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Miranda Aguirre]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Estado y soberanía en el ciberespacio]]></article-title>
<source><![CDATA[Via Inveniendi Et Iudicandi]]></source>
<year>2021</year>
<volume>16</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="">
<collab>PNUD</collab>
<source><![CDATA[Sinopsis: seguridad ciudadana. En Prevencio&#769;n de Crisis y Recuperacio&#769;n. Programa de las Naciones Unidas para el Desarrollo]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pons Gamon]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Internet, la nueva era del delito: ciberdelito, ciberterrorismo, legislación y ciberseguridad]]></article-title>
<source><![CDATA[URVIO - Revista Latinoamericana de Estudios de Seguridad]]></source>
<year>2017</year>
<volume>20</volume>
</nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="book">
<collab>República de Colombia</collab>
<source><![CDATA[Conpes 3701. Lineamientos de política para ciberseguridad y ciberdefensa]]></source>
<year>2011</year>
<publisher-name><![CDATA[Consejo Nacional de Política Económica y Social]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B58">
<nlm-citation citation-type="book">
<collab>República de Colombia</collab>
<source><![CDATA[Conpes 3854. Política Nacional de Seguridad Digital]]></source>
<year>2016</year>
<publisher-name><![CDATA[Consejo Nacional de Política Económica y Social]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B59">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rincón Arteaga]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Quijano Díaz]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Castiblanco Hernández]]></surname>
<given-names><![CDATA[S. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Urquijo Vanegas]]></surname>
<given-names><![CDATA[J. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Pregonero León]]></surname>
<given-names><![CDATA[Y. K. P. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ciberdelincuencia en Colombia: ¿qué tan eficiente ha sido la Ley de Delitos Informáticos?]]></article-title>
<source><![CDATA[Revista Criminalidad]]></source>
<year>2022</year>
<volume>64</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>95-116</page-range></nlm-citation>
</ref>
<ref id="B60">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez-Ortega]]></surname>
<given-names><![CDATA[J. D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El uso de la información ciudadana en la investigación criminal mediante un proceso de innovación tecnológico colaborativo para contrarrestar el hurto a personas en Bogotá]]></article-title>
<source><![CDATA[Revista Criminalidad]]></source>
<year>2024</year>
<volume>65</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>11-30</page-range></nlm-citation>
</ref>
<ref id="B61">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sánchez Barahona]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Perfiles del ciberdelito: un campo de estudio inexplorado]]></article-title>
<source><![CDATA[Revista de Derecho]]></source>
<year>2021</year>
<volume>30</volume>
<page-range>67-76</page-range></nlm-citation>
</ref>
<ref id="B62">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Semanate Esquivel]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Recalde]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El Estado y la defensa del ciberespacio]]></article-title>
<source><![CDATA[Revista de la Academia del Guerra del Ejército Ecuatoriano]]></source>
<year>2023</year>
<volume>16</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>11</page-range></nlm-citation>
</ref>
<ref id="B63">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shackelford]]></surname>
<given-names><![CDATA[S. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Toward cyberpeace: Managing cyberattacks through polycentric governance]]></article-title>
<source><![CDATA[American University Law Review]]></source>
<year>2013</year>
<volume>62</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>1273-364</page-range></nlm-citation>
</ref>
<ref id="B64">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shackelford]]></surname>
<given-names><![CDATA[S. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Andres]]></surname>
<given-names><![CDATA[R. B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[State responsibility for cyberattacks: Competing standards for a growing problem]]></article-title>
<source><![CDATA[Georgetown Journal of International Law]]></source>
<year>2010</year>
<volume>42</volume>
<page-range>972-90</page-range></nlm-citation>
</ref>
<ref id="B65">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sokolov]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Nyrkov]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Knysh]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Shvets]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Countering cyberattacks during information operations. En A. Mottaeva (ed.)]]></source>
<year>2021</year>
<conf-name><![CDATA[ Proceedings of the XIII International Scientific Conference on Architecture and Construction]]></conf-name>
<conf-loc> </conf-loc>
<page-range>84-100</page-range></nlm-citation>
</ref>
<ref id="B66">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Solar]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybersecurity and cyber defence in the emerging democracies]]></article-title>
<source><![CDATA[Journal of Cyber Policy]]></source>
<year>2020</year>
<volume>5</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>392-412</page-range></nlm-citation>
</ref>
<ref id="B67">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tamayo Arboleda]]></surname>
<given-names><![CDATA[F. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Norza Céspedes]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Midiendo el crimen: cifras de criminalidad y operatividad policial en Colombia]]></article-title>
<source><![CDATA[Revista Criminalidad]]></source>
<year>2017</year>
<volume>60</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>49-7</page-range></nlm-citation>
</ref>
<ref id="B68">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tsagourias]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber attacks, self-defence and the problem of attribution]]></article-title>
<source><![CDATA[Journal of Conflict and Security Law]]></source>
<year>2012</year>
<volume>17</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>229-44</page-range></nlm-citation>
</ref>
<ref id="B69">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Valencia Casallas]]></surname>
<given-names><![CDATA[O. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Delitos de corrupción en Colombia: variables socioculturales, institucionales y criminológicas]]></article-title>
<source><![CDATA[Diversitas]]></source>
<year>2020</year>
<volume>16</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>181-99</page-range></nlm-citation>
</ref>
<ref id="B70">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vargas Borbúa]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Reyes Chicango]]></surname>
<given-names><![CDATA[R. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Recalde Herrera]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ciberdefensa y ciberseguridad, más allá del mundo virtual: modelo ecuatoriano de gobernanza en ciberdefensa. URVIO]]></article-title>
<source><![CDATA[Revista Latinoamericana de Estudios de Seguridad]]></source>
<year>2017</year>
<volume>20</volume>
<page-range>31-45</page-range></nlm-citation>
</ref>
<ref id="B71">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vargas]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Las empresas que han sido blanco de ciberataques en Colombia en el último año]]></source>
<year>2023</year>
<publisher-name><![CDATA[La República]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B72">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Verhelst]]></surname>
<given-names><![CDATA[H. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Stannat]]></surname>
<given-names><![CDATA[A. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Mecacci]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Machine learning against terrorism: How big data collection and analysis influences the privacy-security dilemma]]></article-title>
<source><![CDATA[Science and Engineering Ethics]]></source>
<year>2020</year>
<volume>26</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>2975-84</page-range></nlm-citation>
</ref>
<ref id="B73">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Villalobos Fonseca]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El desarrollo tecnológico en materia policial: una receta de éxito para la prevención del delito]]></article-title>
<source><![CDATA[Revista de Relaciones Internacionales, Estrategia y Seguridad]]></source>
<year>2020</year>
<volume>15</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>79-97</page-range></nlm-citation>
</ref>
<ref id="B74">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yamin]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ullah]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ullah]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Katt]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Weaponized AI for cyber attacks]]></article-title>
<source><![CDATA[Journal of Information Security and Applications]]></source>
<year>2021</year>
<volume>57</volume>
<page-range>1-35</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
