<?xml version="1.0" encoding="utf-8"?><mads xmlns="http://www.loc.gov/mads/" xmlns:mods="http://www.loc.gov/mods/v3" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/mads/
	mads.xsd"><authority><topic authority="https://r020.com.ar/tematres/demo/">delitos informáticos</topic></authority><related type="narrower"><topic>daño informático</topic></related><related type="narrower"><topic>estafa informática</topic></related><related type="narrower"><topic>hurto de tiempo</topic></related><related type="narrower"><topic>pharming</topic></related><related type="narrower"><topic>phishing</topic></related><related type="narrower"><topic>piratería de software</topic></related><related type="narrower"><topic>virus informático</topic></related><related type="other"><topic>defraudación informática</topic></related><related type="other"><topic>clasificación de delitos</topic></related><related type="other"><topic>grooming</topic></related><related type="other"><topic>REDES SOCIALES</topic></related><related type="other"><topic>suplantación de identidad digital</topic></related><related type="broader"><topic>Derecho Informatico</topic></related><variant type="other"><topic>ciberdelito</topic></variant></mads>