<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1900-6586</journal-id>
<journal-title><![CDATA[Revista Científica General José María Córdova]]></journal-title>
<abbrev-journal-title><![CDATA[Rev. Cient. Gen. José María Córdova]]></abbrev-journal-title>
<issn>1900-6586</issn>
<publisher>
<publisher-name><![CDATA[Escuela Militar de Cadetes "General José María Córdova"]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1900-65862022000400814</article-id>
<article-id pub-id-type="doi">10.21830/19006586.866</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Prospectiva de ciberseguridad nacional para Colombia a 2030]]></article-title>
<article-title xml:lang="en"><![CDATA[National cybersecurity outlook for Colombia to 2030]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Cano Martínez]]></surname>
<given-names><![CDATA[Jeimmy José]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Escuela Superior de Guerra &#8220;General Rafael Reyes Prieto&#8221;  ]]></institution>
<addr-line><![CDATA[Bogotá D.C. ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2022</year>
</pub-date>
<volume>20</volume>
<numero>40</numero>
<fpage>814</fpage>
<lpage>832</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S1900-65862022000400814&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S1900-65862022000400814&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S1900-65862022000400814&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen. Este artículo presenta un ejercicio prospectivo sobre la ciberseguridad nacional de Colombia a 2030, con base en la revisión de fuentes académicas, reportes internacionales y entrevistas con especialistas. Los resultados se agrupan en seis factores siguiendo el marco Pestel: político, económico, social, tecnológico, ecológico y legal, con el fin de ofrecer un panorama integrado útil para comprender y asumir el reto de la protección del Estado y la resiliencia de las organizaciones frente a las dinámicas internacionales de la transformación digital y una sociedad cada vez más presente en el ciberespacio. Este artículo aspira a motivar nuevas investigaciones desde esta prospectiva y apoyar la toma de decisiones frente a las realidades emergentes que hoy ya hacen parte de un entorno cada vez más incierto, complejo y volátil.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract. This article presents an outlook of Colombia&#8217;s national cybersecurity to 2030, based on the review of academic sources, international reports, and interviews with specialists. The results are grouped into six factors following the Pestel framework: political, economic, social, technological, ecological, and legal to offers an integrated panorama to help understand and address the challenge of protecting the State and the resilience of organizations in the face of the international dynamics of digital transformation and a society that is increasingly present in cyberspace. This article aims to motivate further research from this perspective and support decision-making involving the emerging realities, part of an increasingly uncertain, complex, and volatile environment.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[cibernética]]></kwd>
<kwd lng="es"><![CDATA[gobierno electrónico]]></kwd>
<kwd lng="es"><![CDATA[prospectiva]]></kwd>
<kwd lng="es"><![CDATA[protección de datos]]></kwd>
<kwd lng="es"><![CDATA[seguridad]]></kwd>
<kwd lng="en"><![CDATA[cybernetics]]></kwd>
<kwd lng="en"><![CDATA[data protection]]></kwd>
<kwd lng="en"><![CDATA[electronic government]]></kwd>
<kwd lng="en"><![CDATA[outlook]]></kwd>
<kwd lng="en"><![CDATA[security]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ahmad]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Yunos]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Sahib]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[YusofF]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Perception on cyber terrorism: A focus group discussion approach]]></article-title>
<source><![CDATA[Journal of Information Security]]></source>
<year>2012</year>
<volume>3</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alcolea]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Las nuevas estrategias de defensa nacional (Documento de Opinión n.° 68)]]></source>
<year>2012</year>
<publisher-name><![CDATA[Instituto Español de Estudios Estratégicos]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boney]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Hayslip]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Stamper]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[CISO Desk Reference Guide. A practical guide for CISOs]]></source>
<year>2018</year>
<volume>2</volume>
<publisher-name><![CDATA[CISO DTG Joint Venture Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boyes]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybersecurity and cyber-resilient supply chains]]></article-title>
<source><![CDATA[Technology Innovation Management Review]]></source>
<year>2013</year>
<volume>5</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>28-34</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Buchanan]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[The hacker and the state. Cyber attacks and the new normal of geopolitics]]></source>
<year>2020</year>
<publisher-name><![CDATA[Harvard University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="">
<collab>Campaña Defender la Libertad</collab>
<source><![CDATA[Fiscalía y Procuraduría deben investigar discursos de odio que han instigado los atentados sicariales en contra de las manifestantes del Paro Nacional]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cano]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Marroquín]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Responsabilidad digital corporativa: una revisión sistemática]]></source>
<year>2021</year>
<publisher-name><![CDATA[ISLA 2021 Proceedings 6]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cano]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Repensando los fundamentos de la gestión de riesgos. Una propuesta conceptual desde la incertidumbre y la complejidad]]></article-title>
<source><![CDATA[Revista Ibérica de Tecnología y Sistemas de la Información]]></source>
<year>2018</year>
<volume>E15</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>76-87</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cano]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ciberriesgo. Aprendizaje de un riesgo sistémico, emergente y disruptivo]]></article-title>
<source><![CDATA[Revista Sistemas]]></source>
<year>2019</year>
<numero>151</numero>
<issue>151</issue>
<page-range>63-73</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cano]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Ciberseguridad empresarial. Reflexiones y retos para los ejecutivos del siglo XXI]]></source>
<year>2021</year>
<publisher-name><![CDATA[Lemoine Editores]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Choucri]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyberpolitics in international relations]]></source>
<year>2012</year>
<publisher-name><![CDATA[The MIT Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dash]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Karimibiuki]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Pattabiraman]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Stealthy attacks against robotic vehicles protected by control-based intrusion detection techniques]]></article-title>
<source><![CDATA[Digital Threats: Research and Practice]]></source>
<year>2021</year>
<volume>2</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-25</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Daswani]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Understanding third-party hacks in the aftermath of the SolarWinds breach]]></source>
<year>2021</year>
<publisher-name><![CDATA[Helpnet Security]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="">
<collab>Deloitte Development</collab>
<source><![CDATA[The future of cyber survey 2019. Cyber everywhere. Succeed anywhere]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Donaldson]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Siegel]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Williams]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Aslam]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Enterprise cybersecurity. How to build a successful cyberdefense program against advanced threats]]></source>
<year>2015</year>
<publisher-name><![CDATA[Apress]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Douzet]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Understanding cyberspace with geopolitics]]></article-title>
<source><![CDATA[Hérodote]]></source>
<year>2014</year>
<volume>7-2</volume>
<numero>152-153</numero>
<issue>152-153</issue>
<page-range>3-21</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dupuy]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Nussbaum]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Butrimas]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Granitsas]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Energy security in the era of hybrid warfare]]></source>
<year>2021</year>
<publisher-name><![CDATA[NATO Review]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="">
<collab>El Tiempo</collab>
<source><![CDATA[Las noticias falsas que no debe creer en medio del paro]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fergnani]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hines]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Lanteri]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Esposito]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Corporate foresight in an ever-turbulent era]]></source>
<year>2020</year>
<publisher-name><![CDATA[European Business Review]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ganghi]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Sharma]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mahoney]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Sousan]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Laplante]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Dimension of cyber-attacks. Social, political, economic, and cultural]]></article-title>
<source><![CDATA[IEEE Technology and Society Magazine]]></source>
<year>2011</year>
<volume>30</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>28-38</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hepfer]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Powell]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Make cybersecurity a strategic asset]]></article-title>
<source><![CDATA[MIT Sloan Management Review]]></source>
<year>2020</year>
<volume>62</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>40-5</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hines]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Bishop]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[Thinking about the future. Guidelines for strategic foresight]]></source>
<year>2015</year>
<publisher-name><![CDATA[Formating Experts]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hoffman]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Levite]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Private sector cyber defense: Can active measures help stabilize cyberspace?]]></source>
<year>2017</year>
<publisher-name><![CDATA[Carnegie Endowment for International Peace]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="">
<collab>Infobae</collab>
<source><![CDATA[Gobierno dice que ciberataque a páginas de la Presidencia de Colombia se hizo desde Rusia y Ucrania]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="">
<collab>Infobae</collab>
<source><![CDATA[Estos son los ciberdelitos más comunes en Colombia, según la Policía Nacional]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jordán]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El conflicto internacional en la zona gris: una propuesta teórica desde la perspectiva del realismo ofensivo]]></article-title>
<source><![CDATA[Revista Española de Ciencia Política]]></source>
<year>2018</year>
<numero>48</numero>
<issue>48</issue>
<page-range>129-51</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jordán]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Disuasión en la zona gris: una valoración exploratoria aplicada a Ceuta y Melilla]]></source>
<year>2021</year>
<publisher-name><![CDATA[(Global Strategy Report 28). Global Strategy]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lonergan]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyber power and the international system]]></source>
<year>2017</year>
<publisher-name><![CDATA[Graduate School of Arts and Sciences, Columbia University, Columbia Academic Commons]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maurer]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyber mercenaries. The state, hackers, and power]]></source>
<year>2018</year>
<publisher-name><![CDATA[Cambridge University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="">
<collab>McKinsey &amp; Company</collab>
<source><![CDATA[The top trends in tech. Executive summary download]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McNulty]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[To see the future more clearly, find your blind spots]]></source>
<year>2021</year>
<publisher-name><![CDATA[Strategy &amp; Business]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Meza]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cuatro grandes mentiras sobre las vacunas contra el Covid-19]]></article-title>
<source><![CDATA[Revista Digital]]></source>
<year>2021</year>
<publisher-name><![CDATA[France24]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nogueira]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Reducir el CO2 a golpe de clic]]></source>
<year>2020</year>
<publisher-name><![CDATA[Ethic]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="">
<collab>Noticias Caracol</collab>
<source><![CDATA[La historia secreta del hackeo más grave contra las Fuerzas Militares de Colombia]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Oliver]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Bitcoins, el &#8216;supervillano&#8217; virtual del medio ambiente]]></source>
<year>2020</year>
<publisher-name><![CDATA[Ethic]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ospina-Valencia]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Protesta popular en Colombia: ¿guerra de imágenes falsas en redes sociales o realidad inimaginada en las calles?]]></source>
<year>2021</year>
<publisher-name><![CDATA[DW]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="">
<collab>Portafolio</collab>
<source><![CDATA[Por ahora, refugiados afganos no llegarán a Colombia]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="book">
<collab>Pricewaterhouse Coopers (PwC)</collab>
<source><![CDATA[Global Digital Trust Insights Survey 2021. Cybersecurity comes of age]]></source>
<year>2020</year>
<publisher-name><![CDATA[Global Report]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Raban]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Hauptman]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Foresight of cyber security threat drivers and affecting technologies]]></article-title>
<source><![CDATA[Foresight]]></source>
<year>2018</year>
<volume>20</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>353-63</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Riquelme]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Conoce a los robots con inteligencia artificial]]></source>
<year>2020</year>
<publisher-name><![CDATA[El Economista]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rowe]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The attribution of cyberwarfare]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Green]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyber warfare. A multidisciplinary analysis]]></source>
<year>2015</year>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Saha]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Green computing: current research trends]]></article-title>
<source><![CDATA[International Journal of Computer Sciences and Engineering]]></source>
<year>2018</year>
<volume>6</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>467-9</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="">
<collab>Semana</collab>
<source><![CDATA[Imitando la voz del gerente con computadora, ladrones hurtan más de 35 millones de dólares a un banco]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shiroishi]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Uchiyama]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Suzuki]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Society 5.0: for human security and well-being]]></article-title>
<source><![CDATA[IEEE Computer]]></source>
<year>2018</year>
<volume>51</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>51-5</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Singer]]></surname>
<given-names><![CDATA[P. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Brooking]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<source><![CDATA[Like War. The weaponization of social media]]></source>
<year>2018</year>
<publisher-name><![CDATA[Houghton Mifflin Harcourt Publishing Company]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Skopik]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Pahi]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Under false flag: using technical artifacts for cyber attack attribution]]></article-title>
<source><![CDATA[Cybersecurity]]></source>
<year>2020</year>
<volume>3</volume>
<numero>8</numero>
<issue>8</issue>
</nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Soler]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[El mundo en 2020: diez temas que marcarán la agenda global]]></source>
<year>2019</year>
<publisher-name><![CDATA[CIDOB Notes 220]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Téllez]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Prefijo CIBER: arqueología de su presencia en la sociedad del conocimiento]]></article-title>
<source><![CDATA[Investigación y Desarrollo]]></source>
<year>2016</year>
<volume>24</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>142-62</page-range></nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Torres]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Desde Venezuela se manipularon marchas en Colombia para generar violencia: John Müller]]></source>
<year>2020</year>
<publisher-name><![CDATA[La FM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wade]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Corporate responsibility in the digital era]]></article-title>
<source><![CDATA[Sloan Management Review]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wolfowitz]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Rivera]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Ware]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<source><![CDATA[Planning for the unexpected]]></source>
<year>2018</year>
<publisher-name><![CDATA[Strategy + Business]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="book">
<collab>World Economic Forum (WEF)</collab>
<source><![CDATA[COVID-19 Risks Outlook. A preliminary mapping and its implications]]></source>
<year>2020</year>
<publisher-name><![CDATA[Insight Report]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xiao]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Song]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<source><![CDATA[Generating adversarial examples with adversarial networks]]></source>
<year>2018</year>
<page-range>3905-11</page-range><publisher-name><![CDATA[Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yannakogeorgos]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Rethinking the threat of cyberterrorism]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Jarvis]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Macdonald]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyberterrorism. Understanding, assessment, and response]]></source>
<year>2014</year>
<page-range>43-62</page-range><publisher-name><![CDATA[Springer Verlag]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
