<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2218-3620</journal-id>
<journal-title><![CDATA[Revista Universidad y Sociedad]]></journal-title>
<abbrev-journal-title><![CDATA[Universidad y Sociedad]]></abbrev-journal-title>
<issn>2218-3620</issn>
<publisher>
<publisher-name><![CDATA[Editorial "Universo Sur"]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2218-36202022000600690</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Regulación global para evitar la suplantación de identidad digital]]></article-title>
<article-title xml:lang="en"><![CDATA[Global regulation to prevent digital identity theft]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Moreno Arvelo]]></surname>
<given-names><![CDATA[Pamilys Milagros]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Paucar Paucar]]></surname>
<given-names><![CDATA[Cesar Elías]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Cajas Parraga]]></surname>
<given-names><![CDATA[Cinthia Mariela]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Regional Autónoma de los Andes Quevedo. Uniandes  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Ecuador</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2022</year>
</pub-date>
<volume>14</volume>
<numero>6</numero>
<fpage>690</fpage>
<lpage>696</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S2218-36202022000600690&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_abstract&amp;pid=S2218-36202022000600690&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_pdf&amp;pid=S2218-36202022000600690&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN El siguiente trabajo trata sobre la suplantación de identidad digital, siendo tratado como una realidad del desarrollo de la tecnología. Lo que busca esta investigación es realizar un análisis de la suplantación digital que lleve a una propuesta de regulación jurídica para garantizar el derecho humano a la identidad. Los métodos aplicados en la investigación fueron el sintético y el inductivo, siendo utilizada como instrumento la entrevista, misma que se hizo a expertos en el área del derecho tecnológico y penal. Se llegó a la conclusión de que en algunos Estados es más desarrollada que en otras la regulatoria de la suplantación de identidad, es necesario una regulación global ante esta problemática, a través de tratados internacionales que ayuden a la solución sobre este tema.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT The following work deals with digital identity theft, being treated as a reality of the development of technology. The purpose of this research is to perform an analysis of digital impersonation that leads to a proposal of legal regulation to guarantee the human right to identity. The methods applied in the research were synthetic and inductive, being used as an instrument the interview, which was made to experts in the area of technological and criminal law. It was concluded that in some States the regulation of identity theft is more developed than in others, it is necessary a global regulation of this problem, through international treaties that help to solve this issue.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Identidad digital]]></kwd>
<kwd lng="es"><![CDATA[suplantación de identidad]]></kwd>
<kwd lng="es"><![CDATA[regulación jurídica]]></kwd>
<kwd lng="es"><![CDATA[derecho humano a la identidad]]></kwd>
<kwd lng="en"><![CDATA[digital identity]]></kwd>
<kwd lng="en"><![CDATA[identity theft]]></kwd>
<kwd lng="en"><![CDATA[legal regulation]]></kwd>
<kwd lng="en"><![CDATA[human right to identity]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Area]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Tic, identidad digital y educación. Cuatro reflexiones.]]></article-title>
<source><![CDATA[Reencuentro. Análisis de Problemas Universitarios]]></source>
<year>2011</year>
<numero>62</numero>
<issue>62</issue>
<page-range>97-9</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beduschi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital identity: Contemporary challenges for data protection, privacy and non-discrimination rights]]></article-title>
<source><![CDATA[Big Data &amp; Society]]></source>
<year>2019</year>
<volume>6</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Champo]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El derecho penal frente a la globalización]]></article-title>
<source><![CDATA[Boletín mexicano de derecho comparado]]></source>
<year>2006</year>
<volume>39</volume>
<numero>116</numero>
<issue>116</issue>
<page-range>405-28</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chomczyk]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Regulación de blockchain e identidad digital en América Latina/el futuro de la identidad digital]]></source>
<year>2020</year>
<publisher-name><![CDATA[Banco Interamericano de Desarrollo]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Masiero]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Arvidsson]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Degenerative outcomes of digital identity platforms for development]]></article-title>
<source><![CDATA[Information Systems Journal]]></source>
<year>2021</year>
<volume>31</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>903-28</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mir]]></surname>
<given-names><![CDATA[U. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Kar]]></surname>
<given-names><![CDATA[A. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Dwivedi]]></surname>
<given-names><![CDATA[Y. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[M. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Sharma]]></surname>
<given-names><![CDATA[R. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Realizing digital identity in government: Prioritizing design and implementation objectives for Aadhaar in India]]></article-title>
<source><![CDATA[Government Information Quarterly]]></source>
<year>2020</year>
<volume>37</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>101442</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<collab>Naciones Unidas</collab>
<source><![CDATA[Objetivos y metas del desarrollo sostenible]]></source>
<year>2016</year>
<publisher-name><![CDATA[Naciones Unidas]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Núñez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Derecho de identidad digital en internet]]></source>
<year>2016</year>
<publisher-name><![CDATA[Universidad Nacional Mayor de San Marcos]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sáenz]]></surname>
<given-names><![CDATA[J. E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Enfoque jurídico penal de los delitos transnacionales según la legislación penal panameña]]></article-title>
<source><![CDATA[Revista Metropolitana de Ciencias Aplicadas]]></source>
<year>2020</year>
<volume>3</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>141-8</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sullivan]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital identity-From emergent legal concept to new reality.]]></article-title>
<source><![CDATA[Computer Law &amp; Security Review]]></source>
<year>2018</year>
<volume>34</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>723-31</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Telefónica]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Identidad Digital: El nuevo usuario en el mundo digital]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Barcelona ]]></publisher-loc>
<publisher-name><![CDATA[Editorial Ariel]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vanitha]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Akila]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Carmel]]></surname>
<given-names><![CDATA[V. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Akila]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey on biometric authentication systems in cloud to combat identity theft]]></article-title>
<source><![CDATA[J Crit Rev]]></source>
<year>2020</year>
<volume>7</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>540-7</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
