<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2007-3607</journal-id>
<journal-title><![CDATA[PAAKAT: revista de tecnología y sociedad]]></journal-title>
<abbrev-journal-title><![CDATA[PAAKAT: rev. tecnol. soc.]]></abbrev-journal-title>
<issn>2007-3607</issn>
<publisher>
<publisher-name><![CDATA[Universidad de Guadalajara, Sistema de Universidad Virtual]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2007-36072017000100006</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Seguridad en internet]]></article-title>
<article-title xml:lang="en"><![CDATA[Internet security]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Amaro López]]></surname>
<given-names><![CDATA[José Antonio]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rodríguez Rodríguez]]></surname>
<given-names><![CDATA[Citlalli Rosalba]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad de Guadalajara Centro Universitario de Ciencias Sociales y Humanidades ]]></institution>
<addr-line><![CDATA[México ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad de Guadalajara  ]]></institution>
<addr-line><![CDATA[México ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>02</month>
<year>2017</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>02</month>
<year>2017</year>
</pub-date>
<volume>6</volume>
<numero>11</numero>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S2007-36072017000100006&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S2007-36072017000100006&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S2007-36072017000100006&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen: El presente documento aborda la seguridad que existe en internet a través de casos y estadísticas acerca de las principales amenazas, así como de las acciones realizadas por parte de diversos países para regular su participación en la red de redes y otras recomendaciones que los usuarios pueden adoptar para mejorar su experiencia mientras navegan en esta red.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: In this document is an approach about of the security that exists on the Internet, presenting cases and statistics about the major threats and actions that have been made by countries to regulate their participation in this network and the readers we find a few recommendations that users can take to improve their experience while there are surfing the Internet.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Seguridad]]></kwd>
<kwd lng="es"><![CDATA[internet]]></kwd>
<kwd lng="es"><![CDATA[recomendaciones]]></kwd>
<kwd lng="es"><![CDATA[comunicaciones]]></kwd>
<kwd lng="es"><![CDATA[redes de computadoras]]></kwd>
<kwd lng="en"><![CDATA[Security]]></kwd>
<kwd lng="en"><![CDATA[Internet]]></kwd>
<kwd lng="en"><![CDATA[recommendations]]></kwd>
<kwd lng="en"><![CDATA[communications]]></kwd>
<kwd lng="en"><![CDATA[computers networks]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="">
<collab>Australian Ciber Security Center</collab>
<source><![CDATA[2015 cyber security survey: Major australian businesses]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[5 claves del comercio electrónico en 2015]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Caride]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
</person-group>
<source><![CDATA[Forbes]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="">
<collab>Certsuperior</collab>
<source><![CDATA[Centro de Información SSL]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="">
<collab>Certsuperior</collab>
<source><![CDATA[¿Qué es un Certificado Digital?]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="">
<collab>Certsuperior</collab>
<source><![CDATA[Qué es un certificado de seguridad]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="">
<collab>Council</collab>
<source><![CDATA[Action against cybercrime]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="">
<collab>Emarketer</collab>
<source><![CDATA[Worldwide Retail Ecommerce Sales: eMarketer's Updated Estimates and Forecast Through 2019]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Report of Emarketer ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="">
<collab>Eumed</collab>
<source><![CDATA[Seguridad en internet]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="">
<collab>Gestion.pe</collab>
<source><![CDATA[Crecimiento de comercio móvil triplicará al de e-commerce a nivel mundial]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="">
<collab>Globalwebindex</collab>
<source><![CDATA[GlobalWebIndex's bi-annual report on the latest trends in online commerce]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="">
<collab>International Telecomunication Union</collab>
<source><![CDATA[Measuring the information society report 2015]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kabay]]></surname>
<given-names><![CDATA[S. M. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Whyne]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<source><![CDATA[History of computer crime, computer security handbook]]></source>
<year>2009</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Wiley]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[What The Bangladesh SWIFT Hack Teaches About The Future Of Cybersecurity And Cyberwar]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leetaru]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<source><![CDATA[Forbes]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="">
<collab>Microsoft</collab>
<source><![CDATA[Online safety resources]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McDowell]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Householder]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Good Security Habits. US-CERT]]></source>
<year>2009</year>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nicholas]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[Six proposed norms to reduce conflict in cyberspace]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="">
<collab>ONU</collab>
<source><![CDATA[International code of conduct for information security]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="">
<collab>PayPal</collab>
<source><![CDATA[Tres preguntas a Dan Schulman [Comercio].]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="">
<collab>PricewaterhouseCoopers</collab>
<source><![CDATA[Key findings from the 2015 US State of cybercrime survey]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="">
<collab>Segu-info</collab>
<source><![CDATA[Seguridad Informática / Criptografía - Firma Digital]]></source>
<year></year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
