Número completo
Full number

 

 

 

 

 

 

 

 

 

 


La Ciberseguridad como pilar de la calidad científica, la competitividad y la legitimidad académica

Jesús Alfonso Soto Pineda. Universidad Complutense de Madrid.

Capítulo completo (español)

Full chapter (Spanish)

 

https://doi.org/10.54988/uaj.979-13-990252-7-9_04

 

Número completo
Full number

 

 

 

 

 

 

 

 

 

 


La Ciberseguridad como pilar de la calidad científica, la competitividad y la legitimidad académica

Jesús Alfonso Soto Pineda. Universidad Complutense de Madrid.

Capítulo completo (español)

Full chapter (Spanish)

 

https://doi.org/10.54988/uaj.979-13-990252-7-9_04

 

Resumen/Abstract

Resumen / Abstract


El presente documento analiza el papel de la ciberseguridad como un componente estratégico, jurídico y ético dentro del ecosistema de la investigación científica contemporánea. Con la creciente digitalización del entorno académico y la aparición de amenazas cibernéticas de mayor sofisticación, la ciberseguridad debe ser concebida no como un complemento técnico, sino como una dimensión transversal de la calidad científica que a su vez promueve la competitividad institucional. Por ello, este texto presenta casos recientes de ciberataques a universidades, explora el marco vigente de actuación y su razón de ser, y revisa modelos y estrategias de protección aplicadas por instituciones públicas y privadas. Asimismo, se proponen principios de actuación y recomendaciones para desarrollar una política integral de ciberseguridad en el ámbito universitario, dirigida a fortalecer la reputación y la competitividad, y a favorecer la implementación de políticas que tomen en consideración de manera nuclear la gobernanza institucional, la infraestructura tecnológica, la cooperación internacional y la formación ética.

This document analyzes the role of cybersecurity as a strategic, legal, and ethical component within the contemporary scientific research ecosystem. With the increasing digitalization of the academic environment and the emergence of more sophisticated cyber threats, cybersecurity must be understood not as a mere technical add-on, but as a cross-cutting dimension of scientific quality that also enhances institutional competitiveness. Accordingly, this paper presents recent cases of cyberattacks on universities, explores the current regulatory framework and its underlying rationale, and reviews protection models and strategies adopted by both public and private institutions. Furthermore, it proposes guiding principles and recommendations for developing a comprehensive cybersecurity policy in the university setting—one aimed at strengthening institutional reputation and competitiveness, while promoting the implementation of policies that place institutional governance, technological infrastructure, international cooperation, and ethical training at their core.

Palabras Clave/Keywords

Palabras Clave / Keywords


Ciberseguridad académica, ética de la investigación, gobernanza universitaria, protección de datos, competitividad.

Academic cybersecurity, research ethics, university governance, data protection, competitiveness.

Referencias/References

Referencias / References


1. Armas, R.; Taherdoost, H. (2025). Building a Cybersecurity Culture in Higher Education: Proposing a Cybersecurity Awareness Paradigm. Information 2025, 16, 336.

2. Aslan, A., Rahman, S., & Krempl, S. (2023). Cyber Threats and Research Integrity in Academia. Journal of Cybersecurity and Education, 15(2), 102–119.

3. Borgman, C. L. (2015). Big Data, Little Data, No Data: Scholarship in the Networked World. MIT Press.

4. Borgman, C. L. (2018). Open Data, Grey Data, and Stewardship: Universities at the Privacy Frontier. arXiv. Recuperado de https://arxiv.org/abs/1802.02953

5. Chertoff, M., & Simon, T. (2021). The Impact of Cybersecurity on Scientific Research. Brookings Institution Report.

6. CIO España. (2021). La UAB sufre un ciberataque y sus sistemas quedan paralizados. Recuperado de https://www.ciospain.es

7. Crick, T., Davenport, J. H., Irons, A., & Prickett, T. (2019). A UK case study on cybersecurity education and accreditation. 1–16.

8. DoD (Department of Defense). (2020). Cybersecurity Maturity Model Certification (CMMC) v1.0. https://www.acq.osd.mil

9. ENISA. (2023). Annual Threat Landscape Report. European Union Agency for Cybersecurity.

10. Fecher, B., & Friesike, S. (2014). Open Science: One Term, Five Schools of Thought. In Bartling, S. & Friesike, S. (Eds.), Opening Science (pp. 17–47). Springer.

11. Floridi, L. (2014). The Fourth Revolution: How the Infosphere is Reshaping Human Reality. Oxford University Press.

12. Georgieva, I. (2022). Cybersecurity and Legal Accountability in Research Institutions. Journal of Law and Technology, 45(2), 135–154.

13. Haque, A., Ahmad, S., John, A., Mishra, K., Kumar Mishra, B., Kumar, K & Nazeer, J. (2023). Cybersecurity in Universities: An Evaluation Model. SN COMPUT.SCI. 4 (569).

14. Hey, T., Tansley, S., & Tolle, K. (2009). The Fourth Paradigm: Data-Intensive Scientific Discovery. Microsoft Research.

15. Hiller, J. S., & Russell, R. S. (2021). Information security and ethics in the university setting. Journal of Higher Education Policy and Management, 43(1), 1–16.

16. Jakobsson, M., & Myers, S. (Eds.). (2007). Phishing and countermeasures: Understanding the increasing problem of electronic identity theft. Wiley-Interscience.

17. Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973–993.

18. Jiang, X., Li, Y., & He, Y. (2021). Cybersecurity threats to biomedical research during the COVID-19 pandemic: Challenges and countermeasures. Journal of Medical Internet Research, 23(5), e26545. https://doi.org/10.2196/26545

19. Kotsopoulou, A. (2019). Data protection challenges in academic research under the GDPR. International Data Privacy Law, 9(1), 28–45.

20. Landi, H. (2020). UCSF pays hackers $1.1M to regain access to medical school servers. Fierce Healthcare. https://www.fiercehealthcare.com/tech/ucsf-pays-hackers-1-14m-to-regain-access-to-medical-school-servers

21. Lipton, A. B. (2022). Cybersecurity, intellectual property, and the global university: Policy challenges in the age of digital espionage. Journal of Higher Education Policy and Management, 44(3), 267–281.

22. Lujan-Salamanca, A., Infante-Moro, A., Infante Moro, J.C., Gallardo-Pérez, J. (2024). La ciberseguridad en las empresas: estudio biométrico. Revista de Pensamiento Estratégico y Seguridad CISDE, 9(2), 61–73

23. Maastricht University. (2020). UM paid ransom to regain access to data after cyber attack. https://www.maastrichtuniversity.nl/news/um-paid-ransom-regain-access-data-after-cyber-attack

24. Modi, A., Kuzminykh, I., & Ghita, B. (2023). Data driven approaches to cybersecurity governance for board decision-making, 1–13.

25. National Academies of Sciences, Engineering, and Medicine. (2020). Protecting Research Integrity in a Digital Age. The National Academies Press.

26. Nature Editorial. (2020). Cybersecurity: A Scientific Priority. Nature, 580(7803), 563.

27. OECD. (2021). Digitalisation and Science: Research in a Time of Disruption. OECD Publishing.

28. O’Hanley, J. R., & Tiller, M. S. (2021). Cyber resilience in research ecosystems: Best practices and institutional challenges. Information Security Journal, 30(4), 201–215.

29. Pomerleau, M., & Martell, B. (2020). Data sabotage in machine learning systems: Implications for scientific integrity. Journal of Cybersecurity, 6(1)

30. Riebe, B. (2020). University of Maastricht pays ransom after ransomware attack. European Cybersecurity Journal, 6(2), 45–47.

31. Ross, R. S., McEvilley, M., & Oren, J. (2020). Protecting university infrastructure from distributed denial-of-service attacks. National Institute of Standards and Technology (NIST SP 800-82 Rev. 2).

32. Scott, J., & Spaniel, D. (2022). Cyber Espionage in the Age of Pandemics. International Journal of Cybersecurity, 8(1), 88–103.

33. Seshagirirao, V. K., & Babatope, A. B. (2024). The role of data governance in enhancing cybersecurity resilience for global enterprises. World Journal of Advanced Research and Reviews, 24(1), 1420–1432.

34. Shore, R., & Stein, M. (2021). Securing knowledge: Cybersecurity risks in higher education. Cyber Policy Studies Review, 4(3), 112–127.

35. Unión Europea. Reglamento (UE) 2016/679 del Parlamento Europeo y del Consejo de 27 de abril de 2016. Relativo a la protección de las personas físicas en lo que respecta al tratamiento de datos personales.

36. University of Newcastle. (2023). Internal audit report on AI project data integrity incident. (Documento institucional interno; citado con autorización).

37. UNViMe. (2023). UBA confirma ataque ransomware y activa protocolos de contingencia. https://www.unvime.edu.ar

38. UNESCO. (2021). Recommendation on Open Science. https://unesdoc.unesco.org

39. Yang, L., Li, J., Elisa, N., Prickett, T. & Chao, F. (2019). Towards big data governance in cybersecurity. Data-Enabled Discovery and Applications, 3(1), Article 10.

Cómo citar / How to cite


Soto Pineda, J. A. (2025). La Ciberseguridad como pilar de la calidad científica, la competitividad y la legitimidad académica. En Academia Iberoamericana de La Rábida, (1ª ed.), Formación en ciberseguridad y ética en trabajos académicos y científicos (pp. 97-112). Huelva: Academia Iberoamericana de La Rábida / United Academic Journals (UA Journals). https://doi.org/10.54988/uaj.979-13-990252-7-9_04


 

Información de Contanto

Grupo de Investigación GITICE, Universidad de Huelva - +34 628714391 - Campus de "La Merced". Plaza de la Merced, 11. CP: 21071 Huelva (Spain)

Esta dirección de correo electrónico está protegida contra spambots. Usted necesita tener Javascript activado para poder verla.

 

Usted está aquí: UA Journals LIBROS Revista Ref. 000031-004