<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1870-3550</journal-id>
<journal-title><![CDATA[Norteamérica]]></journal-title>
<abbrev-journal-title><![CDATA[Norteamérica]]></abbrev-journal-title>
<issn>1870-3550</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Centro de Investigaciones sobre América del Norte]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1870-35502024000100035</article-id>
<article-id pub-id-type="doi">10.22201/cisan.24487228e.2024.1.663</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Rezago y asimetrías de las políticas nacional e internacional de ciberseguridad de México frente a Estados Unidos y Canadá: retos de cooperación para Norteamérica]]></article-title>
<article-title xml:lang="en"><![CDATA[Disparities and Backlogs in Mexico's National and International Cybersecurity Policies vis-à-vis the United States and Canada: Challenges of Cooperation for North America]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Aguilar Antonio]]></surname>
<given-names><![CDATA[Juan Manuel]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Nacional Autónoma de México Centro de Investigaciones sobre América del Norte ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2024</year>
</pub-date>
<volume>19</volume>
<numero>1</numero>
<fpage>35</fpage>
<lpage>68</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1870-35502024000100035&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1870-35502024000100035&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1870-35502024000100035&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen En esta investigación se analiza la política nacional e internacional de ciberseguridad de Estados Unidos, México y Canadá. Se parte de la hipótesis de que el perfil de política exterior, de impacto regional e internacional, así como la trayectoria histórica individual, a lo largo de más de dos décadas, de Estados Unidos y Canadá, explican el nivel de consolidación de su política de ciberseguridad. Se trabajó con base en un conjunto ecléctico de teorías de relaciones internacionales como el realismo, el liberalismo, el constructivismo y la Teoría de la guerra para identificar elementos teóricos para abordar la política internacional y nacional de los tres países. Se concluye que tanto Estados Unidos, considerado una potencia global en ciberseguridad, y Canadá, potencia regional, poseen una política exterior activa de casi dos décadas, mientras que Mexico presenta un fuerte rezago en la materia, por lo que no cuenta con unas políticas nacional e internacional de ciberseguridad efectivas.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract The research analyzes the national and international cybersecurity policies of the United States, Mexico, and Canada. It is based on the hypothesis that the active foreign policy profile with regional and international impact, and the individual historical trajectory of more than two decades of the United States and Canada, can explain the level of consolidation in the development of their cybersecurity policy. An eclectic review of international relations theories such as realism, liberalism, constructivism, and the theory of war was conducted to identify theoretical elements for the analysis of the international and national policies of the three countries. The conclusion shows that both the United States, considered a global power in cybersecurity, and Canada, a regional power, have an active foreign policy in the field, with a near-two-decade trajectory. Meanwhile, Mexico has a significant backlog in the field unrelated to an effective national and international cybersecurity policy.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[ciberseguridad]]></kwd>
<kwd lng="es"><![CDATA[Estados Unidos]]></kwd>
<kwd lng="es"><![CDATA[México]]></kwd>
<kwd lng="es"><![CDATA[Canadá]]></kwd>
<kwd lng="es"><![CDATA[infraestructuras críticas]]></kwd>
<kwd lng="es"><![CDATA[política nacional de ciberseguridad]]></kwd>
<kwd lng="es"><![CDATA[delitos cibernéticos]]></kwd>
<kwd lng="es"><![CDATA[protección de datos]]></kwd>
<kwd lng="en"><![CDATA[cybersecurity]]></kwd>
<kwd lng="en"><![CDATA[United States]]></kwd>
<kwd lng="en"><![CDATA[Mexico]]></kwd>
<kwd lng="en"><![CDATA[Canada]]></kwd>
<kwd lng="en"><![CDATA[critical infrastructures]]></kwd>
<kwd lng="en"><![CDATA[national cybersecurity policy]]></kwd>
<kwd lng="en"><![CDATA[cybercrimes]]></kwd>
<kwd lng="en"><![CDATA[data protection]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aguilar Antonio]]></surname>
<given-names><![CDATA[Juan Manuel]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Retos y oportunidades en materia de ciberseguridad de América Latina frente al contexto global de ciberamenazas a la seguridad nacional y política exterior]]></article-title>
<source><![CDATA[Estudios Internacionales]]></source>
<year>2021</year>
<volume>53</volume>
<numero>198</numero>
<issue>198</issue>
<page-range>169-97</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aguilar Antonio]]></surname>
<given-names><![CDATA[Juan Manuel]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La brecha de ciberseguridad en América Latina frente al contexto global de ciberamenazas]]></article-title>
<source><![CDATA[Revista de Estudios en Seguridad Internacional]]></source>
<year>2020</year>
<volume>6</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>17-43</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aguilar Antonio]]></surname>
<given-names><![CDATA[Juan Manuel]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Presente y futuro de los retos de la ciberseguridad en México, una propuesta para la seguridad nacional]]></article-title>
<source><![CDATA[Revista Legislativa de Estudios Sociales y de Opinión Pública]]></source>
<year>2020</year>
<volume>13</volume>
<numero>29</numero>
<issue>29</issue>
<page-range>83-120</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aguilar Antonio]]></surname>
<given-names><![CDATA[Juan Manuel]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Hechos ciberfísicos: una propuesta de análisis para ciberamenazas en las 'Estrategias Nacionales de Ciberseguridad']]></article-title>
<source><![CDATA[URVIO. Revista Latinoamericana de Estudios de Seguridad]]></source>
<year>2019</year>
<numero>25</numero>
<issue>25</issue>
<page-range>24-40</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aguirre Quezada]]></surname>
<given-names><![CDATA[Juan Pablo]]></given-names>
</name>
</person-group>
<source><![CDATA[Ciberseguridad, desafío para México y trabajo legislativo]]></source>
<year>2022</year>
<numero>87</numero>
<issue>87</issue>
<publisher-name><![CDATA[Instituto Belisario Dominguez]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barnett]]></surname>
<given-names><![CDATA[Michael]]></given-names>
</name>
<name>
<surname><![CDATA[Finnemore]]></surname>
<given-names><![CDATA[Martha]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Power of Liberal International Organizations]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Barnett]]></surname>
<given-names><![CDATA[Michael]]></given-names>
</name>
<name>
<surname><![CDATA[Duvall]]></surname>
<given-names><![CDATA[Raymond]]></given-names>
</name>
</person-group>
<source><![CDATA[Power in Global Governance]]></source>
<year>2004</year>
<page-range>163-71</page-range><publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[Cambridge University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boyne]]></surname>
<given-names><![CDATA[Shawn]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Data protection in the United States]]></article-title>
<source><![CDATA[The American Journal of Comparative Law]]></source>
<year>2018</year>
<volume>66</volume>
<numero>^s1</numero>
<issue>^s1</issue>
<supplement>1</supplement>
<page-range>299-343</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Charlsey]]></surname>
<given-names><![CDATA[Kelly]]></given-names>
</name>
</person-group>
<source><![CDATA[Data Privacy Regulations in the United States, China, and the European Union]]></source>
<year>2022</year>
<publisher-name><![CDATA[Universidad del Sur de Georgia]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Colino]]></surname>
<given-names><![CDATA[César]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Método comparativo]]></article-title>
<source><![CDATA[Diccionario crítico de ciencias sociales. Terminología científico-social]]></source>
<year>2009</year>
<publisher-loc><![CDATA[Madrid ]]></publisher-loc>
<publisher-name><![CDATA[Plaza y Valdés]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="">
<collab>Consejo de Europa</collab>
<source><![CDATA[Convenio sobre la Ciberdelincuencia]]></source>
<year>2001</year>
<numero>185</numero>
<issue>185</issue>
<publisher-loc><![CDATA[Budapest ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="">
<collab>Consejo de Europa</collab>
<source><![CDATA[Convenio para la Proteccion de las Personas con respecto al Tratamiento Automatizado de Datos de Carácter Personal]]></source>
<year>1981</year>
<numero>108</numero>
<issue>108</issue>
<publisher-loc><![CDATA[Estrasburgo ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="">
<collab>E-Governance Academy</collab>
<source><![CDATA[National Cyber Security Index]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Finnemore]]></surname>
<given-names><![CDATA[Martha]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[International Organizations as Teachers of Norms: The United Nations Educational, Scientific, and Cutural Organization and Science Policy]]></article-title>
<source><![CDATA[International Organization]]></source>
<year>1993</year>
<volume>47</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>565-97</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[François]]></surname>
<given-names><![CDATA[Camille]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[Herb]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Strategic Surprise of Russian Information Operations on Social Media in 2016 in the United States: Mapping a Blind Spot]]></article-title>
<source><![CDATA[Journal Of Cyber Policy]]></source>
<year>2021</year>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>9-30</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gagnon]]></surname>
<given-names><![CDATA[Frédérick]]></given-names>
</name>
<name>
<surname><![CDATA[Rapin]]></surname>
<given-names><![CDATA[Alexis]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybersecurity in America: The US National Security Apparatus and Cyber Conflict Management]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Laurent]]></surname>
<given-names><![CDATA[Sebastien-Yves]]></given-names>
</name>
</person-group>
<source><![CDATA[Conflicts, Crimes and Regulations in Cyberspace]]></source>
<year>2021</year>
<page-range>43-62</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="">
<collab>Gobierno de Canadá</collab>
<source><![CDATA[Canada and the World Bank]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<collab>Gobierno de Canadá</collab>
<source><![CDATA[National Strategy for Critical Infrastructure]]></source>
<year>2023</year>
<publisher-name><![CDATA[Public Safety Canada]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="">
<collab>Gobierno de México</collab>
<source><![CDATA[Protocolo Nacional Homologado de Gestión de Incidentes Cibernéticos]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<collab>Gobierno de México</collab>
<source><![CDATA[Guía de ciberseguridad para instalaciones públicas de México]]></source>
<year>2018</year>
<publisher-name><![CDATA[WikiGuías]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="">
<collab>Gobierno de México</collab>
<source><![CDATA[Tratado entre México, Estados Unidos y Canadá]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Humphreys]]></surname>
<given-names><![CDATA[Brian E]]></given-names>
</name>
</person-group>
<source><![CDATA[Critical Infrastructure: Emerging Trends and Policy Considerations for Congress]]></source>
<year>2019</year>
<publisher-name><![CDATA[Congressional Research Service]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="">
<collab>International Institute for Strategic Studies</collab>
<source><![CDATA[Cyber Capabilities and National Power Volume 2]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="">
<collab>International Institute for Strategic Studies</collab>
<source><![CDATA[Cyber Capabilities and National Power: A Net Assesment]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="">
<collab>Intersog</collab>
<source><![CDATA[A Global View of Cyber Security]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Keohane]]></surname>
<given-names><![CDATA[Robert]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Twenty Years of Institutional Liberalism]]></article-title>
<source><![CDATA[International Relations]]></source>
<year>2012</year>
<volume>26</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>125-38</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kuner]]></surname>
<given-names><![CDATA[Christopher]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[International Agreements, Data Protection, and EU Fundamental Rights on the International Stage: Opinion 1/15 (EU-Canada PNR) of the Court of Justice of the EU]]></article-title>
<source><![CDATA[Common Market Law Review]]></source>
<year>2018</year>
<volume>55</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>857-82</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lewis]]></surname>
<given-names><![CDATA[James]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Confidence-building and International Agreement in Cybersecurity]]></article-title>
<source><![CDATA[Disarmament Forum]]></source>
<year>2011</year>
<volume>4</volume>
<page-range>51-9</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lewis]]></surname>
<given-names><![CDATA[Ted]]></given-names>
</name>
</person-group>
<source><![CDATA[Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation]]></source>
<year>2019</year>
<publisher-loc><![CDATA[Hoboken, N.J. ]]></publisher-loc>
<publisher-name><![CDATA[John Wiley &amp; Sons]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marín]]></surname>
<given-names><![CDATA[Jefferson]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Las teorías de la guerra justa. Implicaciones y limitaciones]]></article-title>
<source><![CDATA[Guillermo de Ockham]]></source>
<year>2005</year>
<volume>3</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mendoza Enríquez]]></surname>
<given-names><![CDATA[Olivio]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Marco jurídico de la protección de datos personales en las empresas de servicios establecidas en México: desafíos y cumplimiento]]></article-title>
<source><![CDATA[IUS]]></source>
<year>2018</year>
<volume>12</volume>
<numero>41</numero>
<issue>41</issue>
<page-range>267-91</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Moravcsik]]></surname>
<given-names><![CDATA[Andrew]]></given-names>
</name>
</person-group>
<source><![CDATA[Liberalism and International Relations Theory]]></source>
<year>1992</year>
<numero>92-6</numero>
<issue>92-6</issue>
<publisher-name><![CDATA[Centro de Estudios Europeos, Universidad de Harvard]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Intelligence]]></surname>
<given-names><![CDATA[Mordor]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyber Warfare Market Size &amp; Share Analysis-Growth Trends &amp; Forecasts (2024- 2029)]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nye Jr]]></surname>
<given-names><![CDATA[Joseph]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber Power]]></article-title>
<source><![CDATA[The Future of Power]]></source>
<year>2011</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Public Affairs]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nye Jr]]></surname>
<given-names><![CDATA[Joseph]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[When Hard Power Undermines Soft Power]]></article-title>
<source><![CDATA[New Persp. Q]]></source>
<year>2004</year>
<volume>21</volume>
<numero>13</numero>
<issue>13</issue>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pfluke]]></surname>
<given-names><![CDATA[Corey]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A History of the Five Eyes Alliance: Possibility For Reform And Additions]]></article-title>
<source><![CDATA[Comparative Strategy]]></source>
<year>2019</year>
<volume>38</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>302-15</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Roesener]]></surname>
<given-names><![CDATA[August]]></given-names>
</name>
<name>
<surname><![CDATA[Bottolfson]]></surname>
<given-names><![CDATA[Carl]]></given-names>
</name>
<name>
<surname><![CDATA[Fernandez]]></surname>
<given-names><![CDATA[Gerry]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Policy for US Cybersecurity]]></article-title>
<source><![CDATA[Air &amp; Space Power Journal]]></source>
<year>2014</year>
<volume>28</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>38-54</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="">
<collab>Royal Canadian Mounted Police</collab>
<source><![CDATA[Royal Canadian Mounted Police 2022-23. Departmental Results Report]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schmitt]]></surname>
<given-names><![CDATA[Michael]]></given-names>
</name>
</person-group>
<source><![CDATA[Tallinn Manual on the International Law Applicable to Cyber Warfare]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[Cambridge University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shackelford]]></surname>
<given-names><![CDATA[Scott]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Estonia Two-and-a-Half Years Later: A Progress Report on Combating Cyber Attacks]]></article-title>
<source><![CDATA[Journal of Internet Law]]></source>
<year>2009</year>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sürek]]></surname>
<given-names><![CDATA[Çagri]]></given-names>
</name>
</person-group>
<source><![CDATA[An Analysis of the August War: A Constructivist Perspective]]></source>
<year>2020</year>
<publisher-name><![CDATA[Middle East Technical University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sussmann]]></surname>
<given-names><![CDATA[Michael]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Critical Challenges from International High Tech and Computer Related Crime at the Millennium]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Carr]]></surname>
<given-names><![CDATA[Indira]]></given-names>
</name>
</person-group>
<source><![CDATA[Computer Crime]]></source>
<year>2017</year>
<page-range>379-418</page-range><publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Swartz]]></surname>
<given-names><![CDATA[Nikki]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Canada Reviews PIPEDA]]></article-title>
<source><![CDATA[Information Management]]></source>
<year>2007</year>
<volume>41</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>8</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sylvester]]></surname>
<given-names><![CDATA[Christine]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[War Experiences/War Practices/War Theory]]></article-title>
<source><![CDATA[Millennium]]></source>
<year>2012</year>
<volume>40</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>483-503</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Temple-Raston]]></surname>
<given-names><![CDATA[Dina]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[How the US hacked ISIS]]></article-title>
<source><![CDATA[]]></source>
<year>2019</year>
<publisher-name><![CDATA[National Public Radio]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tonon]]></surname>
<given-names><![CDATA[Graciela]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La utilización del método comparativo en estudios cualitativos en ciencia política y ciencias sociales: diseño y desarrollo de una tesis doctoral]]></article-title>
<source><![CDATA[Kairos: Revista de Temas Sociales]]></source>
<year>2011</year>
<numero>27</numero>
<issue>27</issue>
<page-range>167-79</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="">
<collab>Unión Internacional de Telecomunicaciones</collab>
<source><![CDATA[Global Cybersecurity Index]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="">
<collab>Unión Internacional de Telecomunicaciones</collab>
<source><![CDATA[Measuring Digital Development. Facts and Figures]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="">
<collab>Unión Internacional de Telecomunicaciones</collab>
<source><![CDATA[Global Cybersecurity Index]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="">
<collab>Unión Internacional de Telecomunicaciones</collab>
<source><![CDATA[Global Cybersecurity Index]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="">
<collab>Unión Internacional de Telecomunicaciones</collab>
<source><![CDATA[Global Cybersecurity Index]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="">
<collab>Unión Internacional de Telecomunicaciones</collab>
<source><![CDATA[La Agenda sobre Ciberseguridad Global]]></source>
<year>2004</year>
</nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="">
<collab>U. S. Department of Justice</collab>
<source><![CDATA[Report of the Attorney General's Cyber Digital Task Force]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Voo]]></surname>
<given-names><![CDATA[Julia]]></given-names>
</name>
<name>
<surname><![CDATA[Hemani]]></surname>
<given-names><![CDATA[Irfan]]></given-names>
</name>
<name>
<surname><![CDATA[Jones]]></surname>
<given-names><![CDATA[Simon]]></given-names>
</name>
<name>
<surname><![CDATA[DeSombre]]></surname>
<given-names><![CDATA[Winnona]]></given-names>
</name>
<name>
<surname><![CDATA[Cassidy]]></surname>
<given-names><![CDATA[Daniel]]></given-names>
</name>
<name>
<surname><![CDATA[Schwarzenbach]]></surname>
<given-names><![CDATA[Anina]]></given-names>
</name>
</person-group>
<source><![CDATA[National Cyber Power Index 2020]]></source>
<year>2020</year>
<publisher-name><![CDATA[Belfer Center for Science and International Affairs, Harvard Kennedy School]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Voo]]></surname>
<given-names><![CDATA[Julia]]></given-names>
</name>
<name>
<surname><![CDATA[Hemani]]></surname>
<given-names><![CDATA[Irfan]]></given-names>
</name>
<name>
<surname><![CDATA[Cassidy]]></surname>
<given-names><![CDATA[Daniel]]></given-names>
</name>
</person-group>
<source><![CDATA[National Cyber Power Index 2022]]></source>
<year>2022</year>
<publisher-name><![CDATA[Belfer Center for Science and International Affairs, Harvard Kennedy School]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wendt]]></surname>
<given-names><![CDATA[Alexander]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The State as Person in International Theory]]></article-title>
<source><![CDATA[Review of International Studies]]></source>
<year>2004</year>
<volume>30</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>289-316</page-range></nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wendt]]></surname>
<given-names><![CDATA[Alexander]]></given-names>
</name>
</person-group>
<source><![CDATA[Social Theory of International Politics]]></source>
<year>1999</year>
<publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[Cambridge University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Willett]]></surname>
<given-names><![CDATA[Marcus]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Lessons of the SolarWinds Hack]]></article-title>
<source><![CDATA[Survival Online]]></source>
<year>2021</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
