<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1870-2147</journal-id>
<journal-title><![CDATA[Revista IUS]]></journal-title>
<abbrev-journal-title><![CDATA[Rev. IUS]]></abbrev-journal-title>
<issn>1870-2147</issn>
<publisher>
<publisher-name><![CDATA[Centro Internacional de Estudios sobre Ley y Derecho A.C.]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1870-21472021000200009</article-id>
<article-id pub-id-type="doi">10.35487/rius.v15i48.2021.705</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Retos para la regulacio&#769;n juri&#769;dica de la Inteligencia Artificial en el ámbito de la Ciberseguridad]]></article-title>
<article-title xml:lang="en"><![CDATA[Challenges for the legal regulation of Artificial Intelligence in the field of Cybersecurity]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Becerril Gil]]></surname>
<given-names><![CDATA[Anahiby Anyel]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,anahiby@hotmail.com  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>México</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2021</year>
</pub-date>
<volume>15</volume>
<numero>48</numero>
<fpage>9</fpage>
<lpage>34</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1870-21472021000200009&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1870-21472021000200009&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1870-21472021000200009&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen:  La Inteligencia Artificial (IA) y las capacidades de aprendizaje automa&#769;tico esta&#769;n creciendo a un ritmo sin precedentes. La IA se presenta como una herramienta que puede mejorar el nivel de vida de los individuos, incluso resolver algunos de los desafi&#769;os ma&#769;s grandes del mundo. Tambie&#769;n es vista desde el enfoque de la salvaguarda de los ciudadanos, la defensa de las naciones y el mantenimiento de la paz y la estabilidad internacional. La IA se considera una tecnologi&#769;a de doble uso. La mejora en la toma de decisiones que se busca lograr con el empleo de IA se considera tambie&#769;n en el a&#769;mbito de la ciberseguridad. A medida que la IA esta&#769; cada vez ma&#769;s integrada en los sistemas cri&#769;ticos, deben protegerse ante posibles ciberataques. Los targeting killings, la desinformacio&#769;n y el empleo de sistemas inteligentes para buscar vulnerabilidades en infraestructuras se presentan como uno de los grandes desafi&#769;os de estos tiempos. En este trabajo analizamos diversas interrogantes sobre la regulacio&#769;n juri&#769;dica de la IA y sus impactos en el a&#769;mbito de la ciberseguridad.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract:  Artificial Intelligence (AI) and machine learning capabilities are growing at an unprecedented rate. AI is presented as a tool that can improve the living standards of individuals, even solve some of the biggest challenges in the world. It is also seen from the approach of safeguarding citizens, defending nations and maintaining peace and international stability. AI is considered a dual use technology. The improvement in decision- making that is sought with the use of AI is also considered in the field of cybersecurity. As AI is increasingly integrated into critical systems, they should be protected against possible cyberattacks. Targeting killings, misinformation and the use of intelligent systems to search for vulnerabilities in infrastructure are presented as one of the great challenges of these times. In this paper we analyze various questions about the legal regulation of AI and its impacts in the field of cybersecurity.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Inteligencia]]></kwd>
<kwd lng="es"><![CDATA[artificial]]></kwd>
<kwd lng="es"><![CDATA[algoritmos]]></kwd>
<kwd lng="es"><![CDATA[ciberseguridad]]></kwd>
<kwd lng="en"><![CDATA[Intelligence]]></kwd>
<kwd lng="en"><![CDATA[artificial]]></kwd>
<kwd lng="en"><![CDATA[algorithms]]></kwd>
<kwd lng="en"><![CDATA[cybersecurity]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="">
<collab>Asamblea General de Naciones Unidas</collab>
<source><![CDATA[Preámbulos de las Resoluciones A/RES/55/28 de 20 de Noviembre del año 2000; A/RES/56/19 de 29 de noviembre de 2001; A/ RES/59/61 de 3 de diciembre de 2004; A/RES/60/45 de 8de diciembre de 2005; A/RES/61/54 de 6 de Diciembre de 2006; A/RES/62/17 de 05 de diciembre de 2007; A/RES/63/37 de 2 de diciembre de 2008; A/RES/64/25 de 2 de diciembre de 2009]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="">
<source><![CDATA[Comunicacion de la Comision al Parlamento Europeo, al Consejo, al Comite Economico y Social Europeo y al Comite de las Regiones, &#8220;Generar confianza en la inteligencia artificial centrada en el ser humano&#8221;]]></source>
<year>2019</year>
<publisher-loc><![CDATA[Bruselas ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="">
<collab>Corte Internacional de Justicia</collab>
<source><![CDATA[APPLICATION OF THE CONVENTION ON THE PREVENTION AND PUNISHMENT OF THE CRIME OF GENOCIDE, (THE GAMBIA v. MYANMAR), Request for the indication of provisional measures]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="">
<collab>Corte Internacional de Justicia</collab>
<source><![CDATA[APPLICATION OF THE CONVENTION ON THE PREVENTION AND PUNISHMENT OF THE CRIME OF GENOCIDE, (THE GAMBIA v. MYANMAR), Request for the indication of provisional measures]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="">
<collab>DARPA</collab>
<source><![CDATA[Collaborative Operations in Denied Environment]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="">
<source><![CDATA[Diccionario Real Academia Española]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Droege]]></surname>
<given-names><![CDATA[Cordula]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Foreword]]></article-title>
<source><![CDATA[ICRC The Potential Human Cost of Cyber Operations. IRCR Expert Meeting]]></source>
<year>2018</year>
<page-range>14-6</page-range><publisher-loc><![CDATA[Ginebra ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<collab>European Commission</collab>
<source><![CDATA[Cybersecurity Our Digital Anchor. A European Perspective]]></source>
<year></year>
<publisher-loc><![CDATA[Italia ]]></publisher-loc>
<publisher-name><![CDATA[European Comission, Joint Research Centre]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="">
<collab>European Commission</collab>
<source><![CDATA[Communication]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<collab>Foro Económico Mundial</collab>
<article-title xml:lang=""><![CDATA[Global Risk Report 2020]]></article-title>
<source><![CDATA[WEF]]></source>
<year>2020</year>
<publisher-loc><![CDATA[Ginebra ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gard]]></surname>
<given-names><![CDATA[Tom]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Google´s new AI is better at Creating AI Than the Company´s Engineers]]></article-title>
<source><![CDATA[Futurism]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<collab>High-Level Expert Group on Artificial Intelligence</collab>
<article-title xml:lang=""><![CDATA[A definition of AI: Main Capabilities and Disciplines]]></article-title>
<source><![CDATA[European Comission]]></source>
<year>2019</year>
<page-range>6</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<collab>International Committee of the Red Cross</collab>
<source><![CDATA[A Guide to the Legal Review of Weapons, Means and Methods of Warfare]]></source>
<year>2006</year>
<publisher-loc><![CDATA[Ginebra ]]></publisher-loc>
<publisher-name><![CDATA[ICRC]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Klaidman]]></surname>
<given-names><![CDATA[Daniel]]></given-names>
</name>
</person-group>
<source><![CDATA[Kill or Capture: The War on Terror and the Soul of the Obama Presidency]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Harcourt]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[Kai-Fu]]></given-names>
</name>
</person-group>
<source><![CDATA[AI SUPERPOWERS. CHINA, SILICON VALLEY, AND THE NEW WORLD ORDER]]></source>
<year>2018</year>
<publisher-name><![CDATA[Houghton Mifflin Harcourt]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Macron]]></surname>
<given-names><![CDATA[Emmanuel]]></given-names>
</name>
</person-group>
<source><![CDATA[Discours sur Iíntelligence artificielle au Collège de France]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="">
<collab>National Institute of Standards and Technology</collab>
<source><![CDATA[Dictionary of Algorithms and Data Structures]]></source>
<year>1998</year>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Thomson]]></surname>
<given-names><![CDATA[Nicholas]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Emmanuel Macron Talks to WIRED About France&#8217;s AI Strategy]]></article-title>
<source><![CDATA[Wired]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<collab>OCDE</collab>
<source><![CDATA[Algorithms and Collusion. Competition policy in the digital age]]></source>
<year>2017</year>
<publisher-name><![CDATA[OCDE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="">
<collab>Parlamento Europeo</collab>
<source><![CDATA[Resolución del Parlamento Europeo, de 16 de febrero de 2017, con recomendaciones destinadas a la Comisión sobre normas de Derecho civil sobre robótica]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Paoli. G.]]></surname>
<given-names><![CDATA[Persi]]></given-names>
</name>
<name>
<surname><![CDATA[Vignard]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Danks]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Meyer]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Modernizing Arms Control: Exploring responses to the use of AI in military decision-making]]></article-title>
<source><![CDATA[UNIDIR]]></source>
<year></year>
<page-range>2</page-range><publisher-loc><![CDATA[Ginebra ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="">
<source><![CDATA[Preámbulos de las Resoluciones A/RES/58/32 de 08 de diciembre de 2003; A/RES/59/61 de 3 de diciembre de 2004; A/RES/60/45 de 8 de diciembre de 2005; A/RES/61/54 de 6 de diciembre de 2006; A/RES/62/17 de 5 de diciembre de 2007; A/RES/63/37 de 2 de diciembre de 2008; A/RES/64/25 de 2 de diciembre de 2009]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="">
<source><![CDATA[Protocolo I adicional a los Convenios de Ginebra de 1949 relativo a la protección de las víctimas de los conflictos armados internacionales]]></source>
<year>1977</year>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="">
<source><![CDATA[Sesión pública celebrada el jueves 12 de diciembre de 2019, a las 10 a.m., en el Palacio de la Paz, Presidente Yusuf presidiendo, en el caso relativo a la aplicación de la Convención para prevenir y sancionar el delito de genocidio (Gambia c. Myanmar)]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sifton]]></surname>
<given-names><![CDATA[John]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Brief History of Drones]]></article-title>
<source><![CDATA[The Nation]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="">
<collab>UN HRC</collab>
<source><![CDATA[Report of the detailed findings of the Independent International Fact-Finding Mission on Myanmar]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<collab>United Nations Institute for Disarmament Research</collab>
<article-title xml:lang=""><![CDATA[Algorithmic Bias and the Weaponization of Increasingly Autonomous Technologies. A Primer]]></article-title>
<source><![CDATA[UNIDIR]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<collab>United Nations Institute for Disarmament Research</collab>
<article-title xml:lang=""><![CDATA[Swarm Robotics: Technical and Operational Overview of the Next Generation of Autonomous Systems]]></article-title>
<source><![CDATA[UNIDIR]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Villani]]></surname>
<given-names><![CDATA[Cédric]]></given-names>
</name>
</person-group>
<source><![CDATA[Rapport de Cédric Villani: donner un sens à l&#8217;intelligence artificielle (IA)]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Yilun]]></given-names>
</name>
<name>
<surname><![CDATA[Kosinski]]></surname>
<given-names><![CDATA[Michal]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deep neural networks are more accurate tan humans at detecting sexual orientation from facial image]]></article-title>
<source><![CDATA[Journal of Personality and Social Psychology]]></source>
<year>2018</year>
<volume>114</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>246-57</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Roper]]></surname>
<given-names><![CDATA[Will]]></given-names>
</name>
<name>
<surname><![CDATA[McCullough]]></surname>
<given-names><![CDATA[Amy]]></given-names>
</name>
</person-group>
<source><![CDATA[The Looming Swarm]]></source>
<year>2019</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
