Show simple item record

dc.contributor.authorGaitán Rodríguez, Andrésspa
dc.date.accessioned2020-06-02T22:39:07Zspa
dc.date.available2020-06-02T22:39:07Zspa
dc.date.issued2020-06-01spa
dc.identifier.citationCastillo, A. (2017). Nociones sobre seguridad y paz en las relaciones internacionales contemporáneas. Bogotá: Ediciones USTA.spa
dc.identifier.urihttp://hdl.handle.net/11634/23703spa
dc.descriptionLos Estados, desde su construcción tras la Paz de Westfalia y su conso- lidación a finales del siglo XVIII, como principales actores del Sistema Internacional, se han mantenido en una búsqueda constante por los métodos más eficientes para la obtención de sus intereses nacionales, la adquisición y el mantenimiento del poder y conseguir su fin princi- pal: la supervivencia como unidad (Barbé, 1987). Esta indagación ha llevado a los Estados a crear estrategias para actuar de forma que pue- dan mantener una posición privilegiada y un estadio de paz: “El deseo de poder, del que participan muchas naciones, cada una procurando mantener o destruir el statu quo, conduce por necesidad a la configu- ración de lo que se ha llamado el equilibrio del poder” (Morgenthau, 1963, p. 227).spa
dc.format.mimetypeapplication/pdfspa
dc.rightsAtribución-NoComercial-SinDerivadas 2.5 Colombia*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/2.5/co/*
dc.titleCapitulo 2: Interpretaciones contemporáneas. Sección 4: De la era de la disuasión a la era del controlspa
dc.typeGeneración de Nuevo Conocimiento: Capítulos en libro resultado de investigación.spa
dc.subject.keywordPublic security - Colombiaspa
dc.subject.keywordCitizen Security - Colombiaspa
dc.subject.keywordArmed conflict - Colombiaspa
dc.subject.keywordTerrorismspa
dc.subject.lembSeguridad pública - Colombiaspa
dc.subject.lembSeguridad Ciudadana - Colombiaspa
dc.subject.lembConflicto armado - Colombiaspa
dc.subject.lembTerrorismospa
dc.coverage.campusCRAI-USTA Bogotáspa
dc.contributor.orcidhttps://orcid.org/0000-0002-9250-7911spa
dc.contributor.cvlachttp://scienti.colciencias.gov.co:8081/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0001408533spa
dc.description.domainhttp://unidadinvestigacion.usta.edu.cospa
dc.relation.referencesAbney, K.; Bekey, G. y Lin, P. (2008). Autonomous Military Robotics: Risk, Ethics, and Design. California: Department of the Navy.spa
dc.relation.referencesAlcolea Navarro, D. (2015). De la disuasión convencional a la protección. Revista Ejercito 76 (888), 8-15.spa
dc.relation.referencesAlvayay Castro, E. (2013). La disuasión convencional interestatal y su rela- ción con el rol de las Fuerzas Armadas en seguridad: un caso de éxito y otro de fracaso en América del Sur. Santiago de Chile: Academia de Guerra Naval.spa
dc.relation.referencesAngelini, M., Arcuri, M. C., Baldoni, R. y Ciccotelli, C. (2013). Critical Infras- tructure and Other Sensitive Sectors Readiness. Roma. Luiss Guido Carli.spa
dc.relation.referencesAsaro, P. (2012). How Just Could a Robot War Be? En E. Gaston y P. Tama- ra (Eds.), Ethics of 21st Century Military Conflict (pp. 257-269). New York: International Debate Education Association.spa
dc.relation.referencesAshmore, W. (2009). Impact of Alleged Russian Cyber Attacks. En Baltic Se- curity & Defence Review, 11, 4-40.spa
dc.relation.referencesBaich, R. (2011). Cyber Espionage: The harsh reality of advanced security threats. Londres: Deloitte.spa
dc.relation.referencesBaker, S., Ivanov, G. y Waterman, S. (2010). In the Crossfire: Critical Infra- structure in the Age of Cyber War. California: McAfee.spa
dc.relation.referencesBarbé, E. (1987). EL papel del realismo en las relaciones internacionales (La teoría política internacional de Hans J. Morgenthau). Revista de Estu- dios Políticos, 57, 149-176spa
dc.relation.referencesBeaufre, A. (1966). Disuasión y estrategia. Madrid: Instituto de Estudios Políticos.spa
dc.relation.referencesBergman, T. y Ware, A. (2013). Dinosaur, Dragon or Durable Defence: Deter- rence in the 21st Century: A Summary of Perspectives on Nuclear Deter- rence. R. van Riet (Ed.), Moving Beyond Nuclear Deterrence to a Nuclear Weapons Free World (pp. 63-72). Londres: Nuclear Abolition Forum.spa
dc.relation.referencesBernard, V. (2012). Science cannot be placed above its Consequences. New technologies and warfare, 94 (886), 457-466.spa
dc.relation.referencesBessani, A., Correia, M., Ferreira, N., Sousa, P. y Verissimo, P. (2008, nov.- dic.). The Crucial Way of Critical Infrastructure Protection. IEEE Secu- rity and Privacy, 8, 18-25.spa
dc.relation.referencesBraganca, M. (2013, oct.). Hunt for Red October. The New Face of Cyber Espionage. SIAK-Journal, 2, 37- 44.spa
dc.relation.referencesBrimley, S. y Work, R. (2014). 20YY: Preparing for War in the Robotic Age. Washington D.C.: Center for a New American Security.spa
dc.relation.referencesBrodie, B. (1945). The atomic bomb and American security. Connecticut: Yale Institute of International studies.spa
dc.relation.referencesBrody, R. (1974). Enciclopedia de las Ciencias Sociales (vol. 3). Madrid: Aguilar.spa
dc.relation.referencesBustos Carrasco, M. y Rodríguez Marcos, P. (2004). La disuasión convencio- nal, conceptos y vigencia. Santiago de Chile: MAGO.spa
dc.relation.referencesCaballenas de Torres, G. (1961). Diccionario Militar, Aeronáutico, Naval y Terrestre. Buenos Aires: Claridad.spa
dc.relation.referencesCalduch, R. (1991). Relaciones Internacionales. Madrid: Ediciones Ciencias Sociales. Recuperado de http://pendientedemigracion.ucm.es/info/sdre- lint/indicelibro1.htmspa
dc.relation.referencesCarr, J. (2010). Inside Cyber Warfare. California: Mike Loukides.spa
dc.relation.referencesCasa Blanca (2003.) The National Strategy to Secure Cyberspace. Washing- ton D.C.: Casa Blanca.spa
dc.relation.referencesClarke, M., Gearson, J. y Shaud, J. (2010) Post-Conference Briefing Note. En A. Cain, Deterrence in the twenty-first century: proceedings (pp. 291- 296). Londres: Air University Pressspa
dc.relation.referencesCollins, J. (1980). Los principios de la disuasión. Washington D.C.: Air University.spa
dc.relation.referencesCopeland, C., Fischer, J. y Moteff, J. (2003). Critical Infrastructures: What Makes an Infrastructure Critical? Washington D.C.: The Library of Congress.spa
dc.relation.referencesCorbin, K. (2009, mar.). Lessons From the Russia-Georgia Cyberwar. In- ternetNews.com. Recuperado el 10 de marzo de 2016, de http://www. internetnews.com/government/article.php/3810011/Lessons-From-the- Russia-Georgia-Cyberwar.htmspa
dc.relation.referencesCox, A. (2013). The Cyber Espionage Blueprint: Understanding Commonal- ities In Targeted Malware Campaigns. Massachusetts: RSAspa
dc.relation.referencesCrawford, H. y Cronin, B. (1999). Information Warfare: It Application in Military and Civilian Contexts. The Information Society, 15, 257-263.spa
dc.relation.referencesCyber Committee of AFCEA (2012). The Russo-Georgian War 2008: The Role of the cyberattacks in the conflict. Fairfax: AFCEA.spa
dc.relation.referencesDe Bordeje Marencos, F. (1981). Diccionario Militar, Estratégico y Político. Madrid: San Martínspa
dc.relation.referencesDelibasis, D. (2007). The Right to National Self-defense: In Information War- fare Operations. Tennessee: Arena.spa
dc.relation.referencesDelpech, T. (2012). Nuclear Deterrence in the 21st century Lessons from the Cold War for a New Era of Strategic Piracy. California: RAND Corporationspa
dc.relation.referencesDepartamento de Defensa (2015). Dictionary of Military and Associated Terms. Washington D.C.: Departamento de Defensa.spa
dc.relation.referencesDudenhoeffer, D., Hartley, S., Pederson, P. y Permann, M. (2006). Critical In- frastructure Interdependency Modeling: A Survey of U.S. and Interna- tional Research. Idaho: Idaho National Laboratory.spa
dc.relation.referencesEstado Mayor Conjunto (2006). The National Military Strategy for Cybers- pace Operations. Washington D.C.: Departamento de Defensa.spa
dc.relation.referencesFarwell, J. y Rohozinski, R. (2011, feb.-mar.). Stuxnet and the Future of Cy- berWar. Survival 53 (1), 23-40.spa
dc.relation.referencesFord, C. (2013). Conceptual Challenges to Nuclear Deterrence En R. van Riet (Ed.), Moving Beyond Nuclear Deterrence to a Nuclear Weapons Free World (pp. 4-7). Londres: Nuclear Abolition Forumspa
dc.relation.referencesFredericks, B. (1997). Information Warfare: The Organizational Dimension. En R. Neiison (Ed.), Sun Tzu and Information Warfare (pp. 79-102). Washington, D.C.: DIANE Publishing.spa
dc.relation.referencesFriedman, A. y Singer, P. W. (2014). Cybersecurity and Cyberwar: What ev- eryone needs to know. New York: Oxford University.spa
dc.relation.referencesGamero Garrido, A. (2014). Cyber Conflicts in International Relations: Frame- work and Case Studies. Massachusetts: Universidad de Harvard.spa
dc.relation.referencesGarcía Covarrubias, J. (2001). La disuasión convencional. Military Review, 81 (2), 72-80.spa
dc.relation.referencesGrauer, R. (2013, feb.). Old Wine in New Bottles: The Nature of Conflict in the 21st Century. The Whitehead Journal of Diplomacy and Internation- al Relations, Volumen 14. 9-23spa
dc.relation.referencesHamon, L. (1996). Estrategia contra la guerra. Madrid: Guadarrama.spa
dc.relation.referencesHerzog, S. (2011, jun.). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, 4 (2), 49-60.spa
dc.relation.referencesHowlett, D. (2002). New concepts of deterrence. Analysis, 16, 17-23.spa
dc.relation.referencesIasiello, E. (2013). Cyber Attack: A Dull Tool to Shape Foreign Policy. En M. May- baum, K. Podins y J. Stinissen (Eds.) (2013). 5th International Conference on Cyber Conflict (pp. 451-468). Tallin: NATO CCD COE Publications.spa
dc.relation.referencesJohnson, J. (1998). Encyclopedia of Applied Ethics. Oregon: Eastern Ore- gon State College. Recuperado de https://people.eou.edu/jjohnson/fi- les/2012/12/NUCLEAR-DETERRENCE.pdfspa
dc.relation.referencesJones, A., Kovachich, G. y Luzwick, P. (2002). Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and At- tain Competitive Advantages. Estados Unidos: Auerbach Publications.spa
dc.relation.referencesKaspersky, E. (2013). Who’s spying on you? No business is safe from cyber-es- pionage. Moscu: Kaspersky Lab.spa
dc.relation.referencesKastenberg, J. y Korns, S. (2009). Georgia’s Cyber Left Hook. Parameters, Volumen 38. 60-76.spa
dc.relation.referencesKelly, T. K., Peerenboom, J. P. y Rinaldi, S. M. (2001). Identifying, under- standing, and analyzing critical infrastructure interdependencies. IEEE Control Systems Magazine, 11-25.spa
dc.relation.referencesKerr, P., Rollins, J. y Theohary, C. (2012, dic.). The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability. En CRS Report for Con- gress. Washington D.C.: UNT Digital Libraryspa
dc.relation.referencesKumar, A. (2007). Theories of Deterrence and Nuclear Deterrence in the Sub- continent. En E. Sridharan (Ed.), The India-Pakistan Nuclear Relation- ship: Theories of Deterrence and International Relations (pp. 239-265). New Delhi: Routledge.spa
dc.relation.referencesLieberthal, K. y Singer, P. W. (2012). Cybersecurity and U.S.-China Relations. Washington D. C.: Brookings Institute.spa
dc.relation.referencesLópez de Turizo y Sánchez, J. (2012, feb.). La evolución del conflicto hacia un nuevo escenario bélico. El Ciberespacio: nuevo escenario de confron- tación, 126, 117-167spa
dc.relation.referencesLópez, C. C. (2007, may-ago.). La guerra informática. Boletín del Centro Naval, 817, 219-224.spa
dc.relation.referencesLord, K. y Sharp, T. (2011). America’s Cyber Future. Security and Prosperi- ty in the Information Age Volume I. Washington, D.C.: Center of New American Security.spa
dc.relation.referencesLowter, A. (2010) Framing Deterrence in the Twenty-first Century. Confer- ence Summary. En A. Cain (Ed.), Deterrence in the twenty-first century: proceedings (pp. 1-14). Londres: Air University Press.spa
dc.relation.referencesMancera, J. M. (2014). La ciberguerra china desde la lógica de la guerra irres- tricta. Ciencia y Poder Aéreo, 9, 89-96.spa
dc.relation.referencesMccGwire, M. (2006). Nuclear Deterrence. International Affairs, 82 (4), 771-784spa
dc.relation.referencesMcDaniel Chairman, M. y Stephan, R. (2008). A Guide to Critical Infrastruc- ture and Key Resources Protection at the State, Regional, Local, Tribal, and Territorial Level. Washington D.C.: Office of Infrastructure Protection.spa
dc.relation.referencesMearsheimer, J. (1983). Conventional Deterrence. Londres: Cornell Univer- sity Press.spa
dc.relation.referencesMiller, J. (1997). Information Warfare: Issues and Perspectives. R. Neiison (Ed.). Sun Tzu and Information Warfare (pp. 145-167). Washington, D.C.: DIANE Publishing.spa
dc.relation.referencesMolander, R., Riddile, A. y Wilson, P. (1996). Strategic Information Warfare: A new face of war. Estados Unidos: RAND Corporation.spa
dc.relation.referencesMorgenthau, H. (1963). La lucha por el poder y por la paz. Buenos Aires: Editorial Sudamericana.spa
dc.relation.referencesNakashima, E. y Warrick, J. (2012, jun.). Stuxnet was work of U.S. and Israeli experts, officials say. The Washington Post. Recuperado el 15 de marzo de 2016, de https://www.washingtonpost.com/world/national-security/ stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJ- QAlnEy6U_story.htmlspa
dc.relation.referencesOppenheimer, R. (1946). The Atomic Bomb and College Education. En J. Ka- plan (Ed.) (1992), Bartlett’s Familiar Quotations. Boston: Little Brown.spa
dc.relation.referencesPardesi, M. (2005). The Impact of RMA on Conventional Deterrence: A The- oretical Analysis. Singapur: Institute of Defence and Strategic Studies.spa
dc.relation.referencesPaul, T.V. (2009). Complex Deterrence: Strategy in the Global Age. Illinois: University of Chicago Pressspa
dc.relation.referencesPérez Cortés, M. (2012, feb.). Tecnologías para la defensa en el ciberespacio. En: El ciberespacio: Nuevo escenario de confrontación 126, 255-304.spa
dc.relation.referencesQuilés, P. (2013). Nuclear Deterrence: Not Suitable for the 21st Century. En R. van Riet (Ed.), Moving Beyond Nuclear Deterrence to a Nucle- ar Weapons Free World (pp. 8-12). Londres: Nuclear Abolition Forum.spa
dc.relation.referencesQuinlan, M. (2004). Deterrence and Deterrability. Contemporary Security Policy, 25 (1), 11-17.spa
dc.relation.referencesRajmil, D. (2015) Oriente próximo; disuasión y disuasión nuclear. Revis- ta IEEE, 2. Recuperado de http://revista.ieee.es/index.php/ieee/article/ view/239/324.spa
dc.relation.referencesRattray, G. (2001). Strategic warfare in cyberspace. Massachusetts: Massa- chusetts Institute of Technology.spa
dc.relation.referencesReal Academia Española (s. f.). Diccionario de la Lengua Española. Recu- perado de http://dle.rae.es/?id=DzWnEaAspa
dc.relation.referencesRuef, A., Shakarian, J. y Shakarian, P. (2013). Introduction to Cyber-Warfare: A multidisciplinary approach. Massachusetts: Elsevier.spa
dc.relation.referencesSáez Collantes, L. F. (2012). La ciberguerra en los conflic- tos modernos. Santiago de Chile. Recuperado el 15 de mar- z o d e 2 0 1 6 , d e h t t p s : / / w w w. a c a d e m i a . e d u / 9 3 3 9 2 1 3 / LA_CIBERGUERRA_EN_LOS_CONFLICTOS_MODERNOSspa
dc.relation.referencesSchdmit, A. (2013). The Estonian Cyberattacks. En J. Healey (Ed.), The fierce domain – conflicts in cyberspace 1986-2012. Washington D.C.: Atlan- tic Council.spa
dc.relation.referencesShakarian, P. (2011, abr.). Stuxnet: Cyberwar Revolution in Military Affairs. Air & Space Power Journal, Volumen 8 Número 98. 50-59.spa
dc.relation.referencesSodupe, K. (1991). La teoría de la disuasión: un análisis de las debilidades del paradigma estatocentrico. Afers Internacionals, 22, 53-79.spa
dc.relation.referencesSteering Committee for Foundations for Innovation in Cyber-Physical Systems (2012). Strategic R&D Opportunities for 21 Century Cyber-Physical Sys- tems: Connecting computer and information systems with the physical world. Illinois: Foundation for Innovation in Cyber-Physical Systemsspa
dc.relation.referencesStel, E. (2014). Seguridad y Defensa del Ciberespacio. Ayacucho: Editorial Dunken.spa
dc.relation.referencesTaddeo, M. (2012, mar.). Information Warfare: A Philosophical Perspective. Philosophy & Technology, 25 (1), 105-120spa
dc.relation.referencesWaterfall, G. (2011). E-espionage What risks does your organization face from cyber-attacks? Londres: PricewaterhouseCoopers LLP.spa
dc.relation.referencesYost, D. (2005) Dissuasion and Allies. Strategic Insights, 4 (2). Recuperado de http://calhoun.nps.edu/bitstream/handle/10945/11472/yostfeb05. pdf?sequence=1spa
dc.relation.annexedhttps://repository.usta.edu.co/handle/11634/12038spa


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Atribución-NoComercial-SinDerivadas 2.5 Colombia
Except where otherwise noted, this item's license is described as Atribución-NoComercial-SinDerivadas 2.5 Colombia

Indexado por: