<?xml version="1.0" encoding="utf-8"?><mads xmlns="http://www.loc.gov/mads/" xmlns:mods="http://www.loc.gov/mods/v3" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/mads/
	mads.xsd"><authority><topic authority="https://tesauro.centrodememoriahistorica.gov.co/vocab/">Delitos informáticos</topic></authority><related type="narrower"><topic>Ciberacoso</topic></related><related type="narrower"><topic>Ciberataques</topic></related><related type="narrower"><topic>Ciberespionaje</topic></related><related type="narrower"><topic>Ciberterrorismo</topic></related><related type="narrower"><topic>Fraude por Internet</topic></related><related type="narrower"><topic>Grooming</topic></related><related type="narrower"><topic>Hacktivismo</topic></related><related type="narrower"><topic>Llamadas falsas a emergencias</topic></related><related type="narrower"><topic>Suplantación de identidad digital</topic></related><related type="narrower"><topic>Virus informáticos</topic></related><related type="other"><topic>Vigilancia electrónica</topic></related><related type="other"><topic>Desinformación</topic></related><related type="other"><topic>Protección de datos personales</topic></related><related type="other"><topic>Seguridad informática</topic></related><related type="other"><topic>Violencia digital</topic></related><related type="broader"><topic>Delitos</topic></related><variant type="other"><topic>Delitos tecnológicos</topic></variant><variant type="other"><topic>Delitos en Internet</topic></variant><variant type="other"><topic>Cibercrímenes</topic></variant><variant type="other"><topic>Cibercrimen</topic></variant><variant type="other"><topic>Delitos digitales</topic></variant><variant type="other"><topic>Delitos cibernéticos</topic></variant><variant type="other"><topic>Crímenes informáticos</topic></variant><variant type="other"><topic>Ciberdelitos</topic></variant><variant type="other"><topic>Ciberdelincuencia</topic></variant> <note xml:lang="es">&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &apos;Century Gothic&apos;,sans-serif;&quot;&gt;Úsese para los recursos sobre los delitos cometidos mediante el uso de tecnologías de la información y la comunicación, que afectan la confidencialidad, integridad, disponibilidad o veracidad de los sistemas informáticos, redes digitales o datos.&lt;/span&gt;&lt;/p&gt; </note></mads>