<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1870-0063</journal-id>
<journal-title><![CDATA[Andamios]]></journal-title>
<abbrev-journal-title><![CDATA[Andamios]]></abbrev-journal-title>
<issn>1870-0063</issn>
<publisher>
<publisher-name><![CDATA[Universidad Autónoma de la Ciudad de México, Colegio de Humanidades y Ciencias Sociales]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1870-00632021000200143</article-id>
<article-id pub-id-type="doi">10.29092/uacm.v18i46.841</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Posverdad, agnotología e instrumentalidad en Internet]]></article-title>
<article-title xml:lang="en"><![CDATA[Post-truth, agnotology and instrumentality on the Internet]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Liceaga Mendoza]]></surname>
<given-names><![CDATA[Rodrigo Iván]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,UAM  ]]></institution>
<addr-line><![CDATA[Xochimilco ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>08</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>08</month>
<year>2021</year>
</pub-date>
<volume>18</volume>
<numero>46</numero>
<fpage>143</fpage>
<lpage>169</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1870-00632021000200143&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1870-00632021000200143&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1870-00632021000200143&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen En una época de relativización y descrédito por la verdad, como mera opinión o manipulación (posverdad), y de un uso deliberado de la producción y manipulación de la ignorancia (agnotología) que es crecientemente movilizado por medios digitales, nula atención se ha prestado a la relación entre estas prácticas y el diseño elemental de Internet. A partir del concepto de instrumentalidad, y por medio de un análisis de dispositivo (dispositif), el artículo analiza Internet en su diseño fundamental y función estratégica, para mostrar la estrecha relación entre éste y la producción y administración de ignorancia como instrumento de una tercera persona. Se argumenta que la agnotología es un elemento sistémico de Internet que beneficia intereses y valores generalmente desconocidos.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract In times of relativisation and discredit of truth, as mere opinion and manipulation (post-truth), and of deliberate use of the production and manipulation of ignorance (agnotology) increasingly mobilised through digital media, the relation between these practices and the core design of the Internet has not yet been addressed. Drawing on the concept of instrumentality and through a dispositf analysis, the article analyses the fundamental design of the Internet and its strategic function, to demonstrate the intertwinement between the latter and the production and management of ignorance as instrument of a third party. The main argument is that agnotology is a systemic component of the Internet that benefits generally unacknowledged values and interests.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Cambridge Analytica]]></kwd>
<kwd lng="es"><![CDATA[medios digitales]]></kwd>
<kwd lng="es"><![CDATA[diseño de Internet]]></kwd>
<kwd lng="es"><![CDATA[libre flujo de la información]]></kwd>
<kwd lng="es"><![CDATA[política exterior estadounidense]]></kwd>
<kwd lng="en"><![CDATA[Cambridge Analytica]]></kwd>
<kwd lng="en"><![CDATA[digital media]]></kwd>
<kwd lng="en"><![CDATA[Internet design]]></kwd>
<kwd lng="en"><![CDATA[free flow of information]]></kwd>
<kwd lng="en"><![CDATA[US foreign policy]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abbate]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Inventing the Internet]]></source>
<year>1999</year>
<publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[The MIT Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Agamben]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Use of Bodies, Homo Sacer IV]]></source>
<year>2015</year>
<publisher-loc><![CDATA[California ]]></publisher-loc>
<publisher-name><![CDATA[Stanford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aouragh]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Chakravartty]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Infrastructures of Empire: Towards a Critical Geopolitics of Media and Information Studies]]></article-title>
<source><![CDATA[Media, Culture &amp; Society]]></source>
<year>2016</year>
<volume>38</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>559-75</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<collab>BBC</collab>
<article-title xml:lang=""><![CDATA[Cambridge Analytica: the Data Firm&#8217;s Global Influence]]></article-title>
<source><![CDATA[BBC]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Berners-Lee]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Long Live the Web: a Call for Continous Open Standards and Neutrality]]></article-title>
<source><![CDATA[Scientific American]]></source>
<year>2010</year>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bijker]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[How is technology made? - That is the question!]]></article-title>
<source><![CDATA[Cambridge Journal of Economics]]></source>
<year>2010</year>
<numero>34</numero>
<issue>34</issue>
<page-range>63-76</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Blank]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Secret History of Silicon Valley]]></source>
<year>2011</year>
<publisher-name><![CDATA[University of California Berkeley]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carr]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Power Plays in Global Internet Governance]]></article-title>
<source><![CDATA[Millenium: Journal of International Studies]]></source>
<year>2015</year>
<volume>43</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>640-59</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carr]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Internet freedom, human rights and power]]></article-title>
<source><![CDATA[Australian Journal of International Affairs]]></source>
<year>2013</year>
<volume>67</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>621-37</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cerf]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Kahn]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Oral History of Robert Kahn]]></source>
<year>2006</year>
<publisher-loc><![CDATA[Virginia ]]></publisher-loc>
<publisher-name><![CDATA[Computer History Museum]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cerf]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Kahn]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Protocol for Packet Network Intercommunication]]></article-title>
<source><![CDATA[IEEE Transactions on Communications]]></source>
<year>1974</year>
<volume>22</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>637-48</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ceruzzi]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[History of Modern Computing]]></source>
<year>2003</year>
<publisher-loc><![CDATA[Cambridge y Londres ]]></publisher-loc>
<publisher-name><![CDATA[The MIT Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chenou]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[From Cyber-Libertarianism to Neoliberalism: Internet Exceptionalism, Multi-stakeholderism, and the Institutionalisation of Internet Governance in the 1990s]]></article-title>
<source><![CDATA[Globalizations]]></source>
<year>2014</year>
<volume>11</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>205-23</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cohen]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Mass Surveillance and State Control]]></source>
<year>2010</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Palgrave]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Couldry]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Mejias]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Costs of Connection: How Data is Colonizing Human Life and Appropriating it for Capitalism]]></source>
<year>2019</year>
<publisher-loc><![CDATA[California ]]></publisher-loc>
<publisher-name><![CDATA[Stanford UP]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Curtis]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Hypernormalisation]]></source>
<year>2016</year>
<publisher-name><![CDATA[BBC film]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<collab>DARPA</collab>
<source><![CDATA[DARPA: Defense Advanced Research Projects Agency 1958-2018]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Florida ]]></publisher-loc>
<publisher-name><![CDATA[Faircount Media Group]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dean]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Democracy and Other Neoliberal Fantasies: Communicative Capitalism and Left Politics]]></source>
<year>2009</year>
<publisher-loc><![CDATA[USA ]]></publisher-loc>
<publisher-name><![CDATA[Duke University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[DeNardis]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Hackl]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Internet Governance by Social Media Platforms]]></article-title>
<source><![CDATA[Telecomunications Policy]]></source>
<year>2015</year>
<volume>39</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>761-70</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Deibert]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Crete-Nishihata]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Global Governance and the Spread of Cyberspace Controls]]></article-title>
<source><![CDATA[Global Governance]]></source>
<year>2012</year>
<numero>18</numero>
<issue>18</issue>
<page-range>339-61</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Edwards]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Closed World: Computers and the Politics of Discourse in Cold War America]]></source>
<year>1996</year>
<publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[The MIT Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="book">
<collab>Executive Office of the President of the U.S. (EOPUS)</collab>
<source><![CDATA[Cyberspace Policy Review (CPR)]]></source>
<year>2009</year>
<publisher-name><![CDATA[Department of Homeland Security]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<collab>Executive Office of the President of the U.S. (EOPUS)</collab>
<source><![CDATA[International Strategy for Cyberspace]]></source>
<year>2011</year>
<publisher-name><![CDATA[The White House]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Feenberg]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Transforming Technology: A Critical Theory Revisited]]></source>
<year>2002</year>
<publisher-loc><![CDATA[Oxford ]]></publisher-loc>
<publisher-name><![CDATA[Oxford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Foley]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[American Credo: The Place of Ideas in US Politics]]></source>
<year>2007</year>
<publisher-loc><![CDATA[Oxford ]]></publisher-loc>
<publisher-name><![CDATA[Oxford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Foucault]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Confessions of the flesh]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Gordon]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Power/Knowledge: Selected Interviews and Other Writings 1972-197]]></source>
<year>1977</year>
<page-range>194-228</page-range><publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Pantheon Books]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Foucault]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Technologies of the self]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Rabinow]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Essential Works of Michel Foucault 1954-1984, Volume 1: Ethics, Subjectivity and Truth]]></source>
<year>1997</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[The New York Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fuller]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Embrace the Inner Fox: Post-Truth as the STS Symmetry Principle Universalized]]></article-title>
<source><![CDATA[Social Epistemology Review and Reply Collective]]></source>
<year>2016</year>
<numero>25</numero>
<issue>25</issue>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fuchs]]></surname>
<given-names><![CDATA[Ch.]]></given-names>
</name>
</person-group>
<source><![CDATA[Social Media: A crticial introduction]]></source>
<year>2017</year>
<publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[Sage]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fuchs]]></surname>
<given-names><![CDATA[Ch.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[What would Marx have said about Facebook and Cambridge Analytica?]]></article-title>
<source><![CDATA[Open Democracy]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Galdos]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cambridge Analytica: The Mexico allegations]]></article-title>
<source><![CDATA[Channel 4]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Galloway]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Protocol: How control exists after decentralization]]></source>
<year>2004</year>
<publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[The MIT Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Golumbia]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Politics of Bitcoin: Software as Right-Wing Extremism]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Minneapolis ]]></publisher-loc>
<publisher-name><![CDATA[University of Minnesota Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Graham]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Culture and Propaganda: The Progressive Origins of American Public Diplomacy, 1936-1953]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Surrey ]]></publisher-loc>
<publisher-name><![CDATA[Ashgate]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Grassegger]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Krogerus]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Data That Turned the World Upside Down. How Cambridge Analytica used your Facebook data to help the Donald Trump campaign in the 2016 election]]></article-title>
<source><![CDATA[Motherboard]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hafner]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Lyon]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Where Wizards stay up late: The origins of the Internet]]></source>
<year>1998</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Touchstone]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hall]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Internet Core Protocols: The Definitive Guide]]></source>
<year>2000</year>
<publisher-loc><![CDATA[US ]]></publisher-loc>
<publisher-name><![CDATA[O&#8217;Reilly]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hansen]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Nissenbaum]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital Disaster, Cyber Security, and the Copenhagen School]]></article-title>
<source><![CDATA[International Studies Quarterly]]></source>
<year>2009</year>
<numero>53</numero>
<issue>53</issue>
<page-range>1155-75</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Henn]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[In-Q-Tel: The CIA&#8217;s Tax-Funded Player In Silicon Valley]]></article-title>
<source><![CDATA[NPR: All Tech Considered]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hern]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Internet Privacy: the Apps That Protect you from four apps]]></article-title>
<source><![CDATA[The Guardian]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hess]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Sociology of Ignorance and Post-Truth Politics]]></article-title>
<source><![CDATA[Sociological Forum]]></source>
<year>2020</year>
<volume>35</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>241-9</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="book">
<collab>Human Rights Council (HRC)</collab>
<source><![CDATA[Oral Revisions of 30 June: Promotion and Protection of all Human Rights, Civil, Political, Economic, Social and Cultural Rights, Rncluding the Right to Development]]></source>
<year>2016</year>
<publisher-name><![CDATA[United Nations]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jassanof]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The idiom of co-production y Ordering knowledge, ordering society]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Jassanof]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[States of Knowledge: The co-production of science and social order]]></source>
<year>2004</year>
<page-range>1-45</page-range><publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kempner]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Post-Truth and the Production of Ignorance]]></article-title>
<source><![CDATA[Sociological Forum]]></source>
<year>2020</year>
<volume>35</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>234-40</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kramer]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Guillory]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Hancock]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Experimental Evidence of Massive-scale Emotional Contagion Through Social Networks]]></article-title>
<source><![CDATA[Proceedings of the National Academy of Sciences of the United States of America]]></source>
<year>2014</year>
<volume>111</volume>
<numero>24</numero>
<issue>24</issue>
<page-range>8788-90</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Law]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wen-yuan]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Provincializing STS: Postcoloniality, Symmetry, and Method]]></article-title>
<source><![CDATA[East Asian Science, Technology and Society: An International Journal]]></source>
<year>2017</year>
<numero>11</numero>
<issue>11</issue>
<page-range>211-27</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lemke]]></surname>
<given-names><![CDATA[Th.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[New Materialisms: Foucault and the &#8216;Government of Things&#8217;]]></article-title>
<source><![CDATA[Theory, Culture &amp; Society]]></source>
<year>2015</year>
<volume>32</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>3-25</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Levine]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Surveillance Valley: The Secret Military History of the Internet]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Public Affairs]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lukasik]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Why the Arpanet Was Built]]></article-title>
<source><![CDATA[IEEE Annals of the History of Computing]]></source>
<year>2011</year>
<volume>33</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>4-20</page-range></nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mäyer-Schönberger]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Cukier]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Big Data: A Revolution That Will Transform How We Live, Work, and Think]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Boston ]]></publisher-loc>
<publisher-name><![CDATA[Houghton Mifflin Harcourt]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mazzucato]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Entrepreneurial State: Debunking Public vs Private sector myths]]></source>
<year>2014</year>
<publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[Anthe Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McCarthy]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Power, Information Technology, and International Relations Theory: The power and politics of US foreign policy and the Internet]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[Palgrave Macmillan]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McPherson]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Why Are the Digital Humanities So White? or Thinking the Histories of Race and Computation]]></article-title>
<source><![CDATA[Debates in the Digital Humanities]]></source>
<year>2009</year>
<page-range>139-60</page-range><publisher-loc><![CDATA[Minneapolis ]]></publisher-loc>
<publisher-name><![CDATA[University of Minnesota Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mejias]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
</person-group>
<source><![CDATA[Off the Network: Disrupting the Digital World]]></source>
<year>2010</year>
<publisher-loc><![CDATA[Minneapolis y Londres ]]></publisher-loc>
<publisher-name><![CDATA[University of Minessota Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mosco]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Pay-per Society: Computers and Communication in the Information Age: Essays in Critical Theory and Public Policy]]></source>
<year>1989</year>
<publisher-loc><![CDATA[Norwood ]]></publisher-loc>
<publisher-name><![CDATA[Ablex]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Naughton]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Brief History of the Future: The origins of the Internet]]></source>
<year>2000</year>
<publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[Phoenix Books]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Naughton]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The evolution of the Internet: from Military Experiment to General Purpose Technology]]></article-title>
<source><![CDATA[Journal of Cyber Policy]]></source>
<year>2016</year>
<volume>1</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>5-28</page-range></nlm-citation>
</ref>
<ref id="B58">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peoples]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Justifying Ballistic Missile Defense: Technology, Security and Culture]]></source>
<year>2010</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Cambridge University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B59">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Powers]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Jablonski]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Real Cyber War: the Political Economy of Internet Freedom]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Chicago ]]></publisher-loc>
<publisher-name><![CDATA[University of Illinois Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B60">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Proctor]]></surname>
<given-names><![CDATA[R. N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Agnotology: a Missing Term to Describe the Cultural Production of Ignorance (and its study)]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Proctor]]></surname>
<given-names><![CDATA[R. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Schiebinger]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Agnotology: The Making and Unmaking of Ignorance]]></source>
<year>2008</year>
<page-range>1-33</page-range><publisher-loc><![CDATA[Stanford ]]></publisher-loc>
<publisher-name><![CDATA[Stanford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B61">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Prozorov]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Why is there truth? Foucault in the age of post-truth politics]]></article-title>
<source><![CDATA[Constellations]]></source>
<year>2019</year>
<numero>26</numero>
<issue>26</issue>
<page-range>18-30</page-range></nlm-citation>
</ref>
<ref id="B62">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pomarentsev]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Nothing is True and Everything is Possible]]></source>
<year>2014</year>
<publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[Public Affairs]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B63">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Powles]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Can the Internet be Saved Without Harming Democracy?]]></article-title>
<source><![CDATA[The Guardian]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B64">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Reid]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Politicizing Connectivity: Beyond the Biopolitics of Information Technology in International Relations]]></article-title>
<source><![CDATA[Cambridge Review of International Affairs]]></source>
<year>2009</year>
<numero>22</numero>
<issue>22</issue>
<page-range>607-23</page-range></nlm-citation>
</ref>
<ref id="B65">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Reveron]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Introduction to National Security and Cyberspace]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Reveron]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World]]></source>
<year>2012</year>
<page-range>3-20</page-range><publisher-loc><![CDATA[Washington, DC ]]></publisher-loc>
<publisher-name><![CDATA[Georgetown UniversityPress]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B66">
<nlm-citation citation-type="book">
<collab>Secretary of Defense (SoD)</collab>
<source><![CDATA[Quadrennial Defense Review (QDR)]]></source>
<year>2014</year>
<publisher-loc><![CDATA[Washington, DC ]]></publisher-loc>
<publisher-name><![CDATA[Defense Pentagon]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B67">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shah]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Post-truth publications]]></article-title>
<source><![CDATA[Significance]]></source>
<year>2017</year>
<volume>14</volume>
<page-range>45</page-range></nlm-citation>
</ref>
<ref id="B68">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sismondo]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Post-Truth?]]></article-title>
<source><![CDATA[Social Studies of Science]]></source>
<year>2017</year>
<volume>47</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>3-6</page-range></nlm-citation>
</ref>
<ref id="B69">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tallis]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Living in Post-truth: Power, Knowledge/Responsibility]]></article-title>
<source><![CDATA[New Perspectives]]></source>
<year>2016</year>
<volume>24</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>7-18</page-range></nlm-citation>
</ref>
<ref id="B70">
<nlm-citation citation-type="journal">
<collab>Telegeography</collab>
<article-title xml:lang=""><![CDATA[Submarine Cable Map 2019]]></article-title>
<source><![CDATA[Telegeography Maps]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B71">
<nlm-citation citation-type="">
<collab>The White House (TWH)</collab>
<source><![CDATA[National Cyber Strategy of the United States of America]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B72">
<nlm-citation citation-type="book">
<collab>US Department of State (USDoS)</collab>
<source><![CDATA[Alliance of Youth Movements Summit]]></source>
<year>2009</year>
<publisher-loc><![CDATA[Washington, DC ]]></publisher-loc>
<publisher-name><![CDATA[Office of the Spokesman]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B73">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vanian]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[What the CIA and Silicon Valley have in Common]]></article-title>
<source><![CDATA[Fortune tech]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B74">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Viner]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Long Read: How technology disrupted the truth]]></article-title>
<source><![CDATA[The Guardian]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B75">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zuboff]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Age of Surveillance Capitalism: the Fight for a Human Future at the New Frontier of Power]]></source>
<year>2019</year>
<publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[Profile Books]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
